scispace - formally typeset
Proceedings ArticleDOI

Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation

TLDR
Nascent, Network-assisted caller ID authentication, is proposed to validate the caller-ID used during call setup which may not match the previously-authenticated ID, and significantly reduces overhead compared to the state-of-the-art, without sacrificing effectiveness.
Abstract
Caller-ID spoofing deceives the callee into believing a call is originating from another user. Spoofing has been strategically used in the now-pervasive telephone fraud, causing substantial monetary loss and sensitive data leakage. Unfortunately, caller-ID spoofing is feasible even when user authentication is in place. State-of-the-art solutions either exhibit high overhead or require extensive upgrades, and thus are unlikely to be deployed in the near future. In this paper, we seek an effective and efficient solution for 4G (and conceptually 5G) carrier networks to detect (and block) caller-ID spoofing. Specifically, we propose Nascent, Network-assisted caller ID authentication, to validate the caller-ID used during call setup which may not match the previously-authenticated ID. Nascent functionality is split between data-plane gateways and call control session functions. By leveraging existing communication interfaces between the two and authentication data already available at the gateways, Nascent only requires small, standard-compatible patches to the existing 4G infrastructure. We prototype and experimentally evaluate three variants of Nascent in traditional and Network Functions Virtualization (NFV) deployments. We demonstrate that Nascent significantly reduces overhead compared to the state-of-the-art, without sacrificing effectiveness.

read more

Citations
More filters
Proceedings ArticleDOI

Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators.

TL;DR: This paper identifies common real-time security indicators used in the most popular anti-robocall applications and demonstrates that the most powerful indicators can reduce the likelihood that users will answer such calls by as much as 43%.
Journal ArticleDOI

An analysis of scam baiting calls: Identifying and extracting scam stages and scripts

TL;DR: In this article , the authors apply topic and time series modeling alongside emotion recognition to scammer utterances and found clear evidence of scripted scam progressions that matched their expectations from close reading.
Journal ArticleDOI

Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures

TL;DR: In this paper , the authors show that the signaling and voice sessions of VoWiFi can both be hijacked by a malicious adversary, which can make ghost calls to launch stealthy DoS (Denial of Service) or caller ID spoofing attacks against specific cellular users.
References
More filters

Diameter Base Protocol

TL;DR: The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting framework for applications such as network access or IP mobility, and needs to be supported by all Diameter implementations.
Proceedings ArticleDOI

Insecurity of Voice Solution VoLTE in LTE Mobile Networks

TL;DR: This work conducts the first study on VoLTE security before its full rollout, discovering several vulnerabilities in both its control-plane and data-plane functions, which can be exploited to disrupt both data and voice in operational networks.
Proceedings ArticleDOI

Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations

TL;DR: In the process of unveiling the free data channels, this paper identifies a number of additional vulnerabilities of early VoLTE implementations, which lead to serious exploits, such as caller spoofing, over-billing, and denial-of-service attacks.
Patent

Systems and methods for caller ID authentication, spoof detection and list based call handling

TL;DR: In this paper, caller ID authentication is performed by an authentication device connected to the calling party telephone transmitting the source and destination telephone numbers of the call to an authentication server, where the caller ID of the incoming call and the telephone number of the called party are transmitted to the authentication server.
Proceedings ArticleDOI

The impact of TLS on SIP server performance

TL;DR: It is shown that using TLS can reduce performance by up to a factor of 17 compared to the typical case of SIP-over-UDP, and a measurement-driven cost model is provided for use in provisioning SIP servers using TLS.
Related Papers (5)