Mark and Sweep Robocall Detection and Prevention. By Dan Weber, Alan Basinger, Dean Willis, and David Schwartz
|
|
|
- Constance Dalton
- 10 years ago
- Views:
Transcription
1 Mark and Sweep Robocall Detection and Prevention By Dan Weber, Alan Basinger, Dean Willis, and David Schwartz
2 Background of the Robocall Problem Current Solution Attempts Solution Deployability Incentives Response to Challenge Questions Background of the Robocall Problem Hi, This is Ann from Account Services. There s no problem with your current account, but Ann has recently been making calls from One of our team members receives over 10 misdials per day on a number differing by one row on the keypad -- mostly from angry people demanding not to be called back. No do not call list can solve this, because it s driven by human error in response to illegal robo-calls. Robo-calls are clearly a big problem. The economics of spam drive robo-calls. What s more lucrative than getting something for nothing? There are number collectors, number validators, list-sellers, robo-call sourcers, and advertisers, all making a profit. Some are legitimate but misguided businesses, and others are fraudsters and thieves. None have a vested interest in complying with do not call lists. The vast majority of robo-calls source from foreign VoIP devices, traverse the Internet, pass through middlemen, and deliver to our phone-numbered devices using PSTN termination services. These services are provided by large Internet telephony Service Providers, most of whom are unaware of the problem and have no vested interest to do anything about it.
3 Figure 1: Topology of Robocall Delivery Since most of the originations are foreign, there s little oversight available from US regulators at this level. However, transit (middlemen) operators are potentially regulatable, and the termination providers are typically large US companies like Level 3 that are clearly within the US regulatory scope. But these transit and termination providers lack the tools to really do anything, and have little incentive to invest in such tools given the economics -- in fact, they probably make money off of the robocalls, due to things like Feature Group D settlements. Consequently, costs charged back to the originators are very low (<1 cent/min), making large call volumes cost-effective and very, very annoying. In short, advertisers seek to continue robodialing for one simple reason. It provides a very cost effective solution to sell products and services, many of which are fraudulent, to the world s largest consumer market, the American public. Current Solution Attempts Robo-calls, also called SPAM over Internet Telephony, or SPIT, are analogous to the unsolicited commercial plague on the Internet known as SPAM. To some extent, similar tools can be deployed to combat it. These SPAM blocking systems commonly perform Bayesian filter matching against common signatures, source IP addresses and host name verification, looking at time-frequency domain aspects of the sender, and so on. Indeed, a Google patent search for spam telephony reports 12,800 related patents and applications. Controlling SPIT has been widely discussed in the Internet Engineering Task Force (IETF). A Google search for IETF and SPIT returns over 500,000 hits, many of which are records of mailing-list discussions between some of the smartest people in the network world. This challenge is not the first
4 attempt to solve the problem. Despite all these patents and efforts, there are no widely available tools recognized as generally effective. Why? Because most of the proposed solutions fail to understand the economic realities, consumer behaviors, and underlying business practices that have made robo-calling so successful. Consequently, most widely-proposed solutions are impractical. Proposed Solution Making SPIT and other unsolicited commercial calling illegal Do-Not-Call Lists Reliance on Caller-ID Captcha/Challenge Response Smart Apps on the Called Phone Elimination of VoIP services Why it Doesn t Work When robo-calls are outlawed, only the outlaws have robo-calls. The senders are generally outside US enforcement scope, and US authorities can t touch them. They are essentially another form of organized crime. Since the SPITters don t care about the laws, they ll happily download the do-not-call lists, then call everybody on them. What s better than a list of pre-validated legitimate phone numbers? Caller-ID is only a best effort to present the source telephone number. It is easily and frequently spoofed, wildly inaccurate, and unreliable as an authenticator. Attempts to make callers prove they are human, rather than bots. This requires EVERY call to be screened, probably by a human (due to the use of improving speechrecognition technology), and vast changes in user behavior. This would take us back to the days when the operator had to connect all of our calls. It s not happening. Smartphone apps could do some filtering, but all they have to work from is Caller-ID, or use challenge-response. Since Caller-ID is often spoofed, and challenge-response requires changes to the calling user s behavior, and not everybody has a smart-phone, this doesn t work on any scale. We re in the process of shutting down the circuit switched world in favor of VoIP. Changing this would be insanely expensive.
5 Moving everything to VoIP and authenticating senders Individually-managed black-and-white lists End User Tagging Solutions (star codes) This could be a long-term solution, but the vast majority of the world s users are operating from legacy devices today. Difficult to use: either the lists are configured tight and block legitimate calls, or loose and let in SPIT. Given that they only work on Caller-ID, they re not reliable. As a standalone solution, it depends on information that is available to the carrier at the time the tag is made, and is often limited to time of day, duration, origination number, and destination number. It does not provide adequate information to easily identify a spammer consistently. In summary, to be effective, a robo-call solution must: 1. Not require dramatic changes to consumer equipment 2. Not require dramatic changes to user behavior. 3. Not be dependent on any universal database of caller identification information 4. Not be dependent on international governmental participation 5. Not require the creation of new regulatory bodies or other political infeasibilities 6. Be incrementally implementable at the transit and termination ITSP level 7. Provide value to existing stakeholders including telecommunication companies, regulatory bodies, and corporate users 8. Lead to a general decline in the viability of the SPIT ecosystem by attacking the profit 9. Have a low false-positive rate; not block legal calls 10. Adapt to changing conditions and bypass attempts at the source Solution Solving the problem of robocalls takes a good understanding of how they work. Take a moment to consider how a robocall works in today s environment. First, an autodialer exists somewhere, likely in a foreign country. It takes a list of phone numbers and calls each one with a pre-recorded message. For the clear cost advantages, those calls go out to the internet as SIP or another VOIP technology towards their VOIP carrier. Then, more than likely their VOIP carrier forwards the call to its transit carriers trying to minimize its own cost for termination. At each termination point, the call pathway becomes masqueraded further by each transit carrier. By doing this, it can become difficult to track the true path of a call. Given this complex and convoluted path, it s easy to understand how no solution can eliminate illicit robocallers completely. Fighting a moving target means that they will continue to adapt and try to
6 thwart any mechanism designed to stop them. But, what if it was possible to tag and identify the bad players such as the carriers, peers, and customers who knowingly or unknowingly let these annoying calls through? What possibilities could this entail? Our solution called Robocall Mark and Sweep (RMS -- US Patent Pending) is a high performance adaptive detection and classification system for SPIT. Inspired by SpamAssassin and Spamhaus, it can provide real-time scoring and classification of incoming calls based off predefined criteria including: 1. Call duration 2. Number validity 3. Caller Name/ID Lookups 4. IP Black-and-white lists 5. Geolocation 6. Calling patterns such as Random and Sequential dialing 7. Destination Number 8. Acoustic Fingerprinting 9. Do Not Call list participation 10. Text derived from speech This scoring/classification event is then delivered to carrier systems which in turn follow rules and criteria defined by the carrier on how to process the call. In this manner, RMS is a multi component system that operates on both egress and ingress telephony traffic, and is designed to be used within the constraints of existing telephony infrastructure. Now, think about Ann from Account Services for a moment. When calls from that autodialer come in, it ultimately terminates on the PSTN through at least one VOIP carrier if not a series of VOIP carriers. Each carrier in the pipeline has rules and criteria they track for. For instance, if a series of calls with a call duration of 10 seconds or less come in rapid succession, geolocation of the originating IPs is China or Nigeria, and the number dialed participates in a Do-Not-Call list, it s a reasonably safe assumption that this is an illicit call. RMS then monitoring the call flows provides an event notification in real time to the carrier. At its sole discretion, the carrier then can take action. It could immediately notify their customer or peer for potential fraud. It could throttle calls. It could redirect the call to a real person to validate that the caller is human. Any number of options are available, and it allows the carrier to make the best decision given its needs and circumstances. To understand how RMS works, think about a simple hub and spoke architecture. At the center of the hub, a central processing system (CPS) or automated validation center correlates data to generate actionable events and reports. This information is received from passive (ingress) and active (egress) listener devices. The passive listeners include devices such as Sonus equipment that generate call detail records, packet capture devices designed for call probing and so forth. With an active listener, such as a honeypot, it listens for inbound calls like a voic box with a predefined prompt that sounds human. Acoustic fingerprinting
7 technologies applied to the messages then provide consistent identification of the robo-dialers. The combination of acoustic fingerprinting with other predefined criteria allows for an adaptive learning system similar to those used in existing SPAM defense systems. With human defined rules, bayesian filtering, and neural networks as methods of correlation and adaptation, the CPS makes an informed decision to classify and score a telephone call. Upon detection of fraudulent activity, RMS generates events customized to the carrier needs. Like described previously, an event can be used as a trigger for any number of actions including but not limited to, routing table adjustments, throttling, call redirection or blocking and so forth. The decoupled design creates flexibility to adapt and adjust to continuously evolving customer requirements in the field. This allows the carrier to take responsibility for deciding what actions to take, if any, based off of the events that occur. Likewise, it reduces the liability of using any one robo-call blocking method. This solution is also capable of supporting end user tagging as a source of input events assuming appropriate support exists from within the telephony infrastructure. End user tagging using a star code is another simple example of generating events to RMS for processing. Provided it delivers the previous origination number, destination number, timestamp and some other unique identifier, RMS can lookup the previous call metrics to match the call and mark it as SPIT, thus further enhancing the training of the system. Our design recommends that the honeypot receive calls from unused or recycled phone numbers, as well as, receive calls from syndicated known bad numbers. The latter could effectively be implemented by adding known bad numbers to the Do-Not-Call list and cycling them on a regular basis. The objective of the honeypot is to capture and identify as many known spammers as possible in a way that is not easily detectable to the robo-caller. The information retrieved in both the acoustic fingerprint as well as the recording allows a trained human operator or a support desk to evaluate whether or not a call is illegal as well as provide classification to which type of call it is including: political, healthcare, non-profit, etc. This output is then used to train the system in identifying known spammers to include in blacklists. Likewise, it will populate whitelists with known good callers. For instance, a call from your neighborhood pharmacy or doctor s office would be easily identified and whitelisted. Via network taps and monitoring ports from switches at the edge of telephony networks, packet capture appliances provide ingress events to the CPS which captures criteria such as source IP address, origination and destination numbers, and other metrics on all calls. This allows for a drop-in installation within carrier networks without large changes in infrastructure and functionality. In conjunction with other sources of data such as device logging provided by carrier endpoints themselves, information can be derived from all legitimate and illegitimate calls that make it through the system.
8 Figure 2 Combined with other egress and ingress solutions, Robocall Mark and Sweep provides a comprehensive solution to handle SPIT at all points in the call process including post call workflows such as end user tagging. Deployability The Robocall Mark and Sweep system plugs into the transit and terminating ITSP infrastructure without significant changes. Only three modifications are required: 1. Implementation of RMS listeners within carrier networks by means of rackspace and appropriate network connectivity. 2. Data provided to our system by the carrier such as: 1. Feeding the call logs into the analysis system 2. Diverting honeypot numbers (which can be selected from the unassigned number pools, plus advertised decoy numbers) to the automated validation system. 3. SIP Messaging off the wire.
9 3. Carrier system acceptance of feedback from RMS to places that can include among others: 1. Least cost routing engines 2. Call center support queues 3. Session border controllers Additionally, terminating ISPs can provide user tagging of unwanted calls as optional input to the automated validation centers. False-positives can be further reduced by human operator review of high-probability samples as a follow-on stage after automated validation. Incentives No SPIT control system is likely to succeed without engagement by the telecommunications companies. While legislative or regulatory mandates may be effective in starting action, these have not been shown to produce a high level of enthusiasm. In other words, without clear incentives, carriers are likely to drag their feet on implementation. The first-order effect of Robocall Mark and Sweep is that it provides a first-ever tool for identifying the bad players who are sourcing high SPIT volumes. This gives transit and termination providers the tools needed to enforce their usage and service-level agreements. It also puts peer pressure on the bad players to reform. This in turn leads to public pressure: since end-users hate SPIT, they re going to pressure their providers to be actively engaged in blocking it, and may vote with their feet in favor of operators who are more successful. This provides an incentive for operators to enforce SPIT controls. The second-order effect of Robocall Mark And Sweep is the potential it offers for ITSPs to provide additional services (for a fee) to their users, including consumer-grade anti-spit services, commercial-level reporting and tracking functions, as well as other potential valueadds. Response to Challenge Questions Does it work? (weighted at 50%)
10 How successful is the proposed solution likely to be in blocking illegal robocalls? Will it block wanted calls? An ideal solution blocks all illegal robocalls and no calls that are legally permitted. (For example, automated calls by political parties, charities, and health care providers, as well as reverse 911 calls, are not illegal robocalls.) How many consumer phones can be protected? What types of phones? Mobile phones? Traditional wired lines? VoIP land lines? Proposals that will work for all phones will be more heavily weighted. What evidence do you already have to support your idea? Running code? Experiments? Peer-reviewed publications? While no solution will block 100% of illegal robocalls, our solution will provide 100% blocking of identifiable robocalls and is flexible enough to insure no wanted calls are blocked. The solution should be highly effective in blocking repeated illegal robocalls, or robocalls from repeat offenders. Legal automated calls are protected by whitelists and optionally by human validation. All consumer phones serviced by a Telephony Internet Service Provider can be protected. It can provide protection to all PSTN phone types, which include VoIP, Wired landlines, and Wireless/Cellular phones. We are using a proven and widely deployed method of identification and marking solution based upon proven spam fighting techniques. Like SPAM, robocalls or SPIT (Spam over IP Telephony) is very similar in action. The processes used to combat one are easily adapted to fight the other. And, like spam we can do it at the carrier level. How easy might it be for robocallers to adapt and counter your scheme? How flexible is your scheme to adapt to new calling techniques? How have you validated these points? Remember that the real test of a security system is not whether or not you can break it; it s whether or not other people can. Any solution once deployed will cause robocallers to adapt. Our solution accounts for this and adapts accordingly. Combining a honeypot to capture and identify illegal robocallers with acoustic fingerprinting we can quickly keep up with any changes in calling techniques. These processes are validated by years of effective SPAM prevention and are currently in use. Is it easy to use? (weighted at 25%) How difficult would it be for a consumer to learn to use your solution? How efficient would it be to use your solution, from a consumer s perspective? Are there mistakes consumers might make in using your solution, and how severe would they be? Consumers use the basic functions transparently, with no training or notice. Extremely efficient; most consumers would never notice the system. No. Consumers can t make mistakes in a system they have no direct interaction with.
11 How satisfying would it be to use your solution? Would your solution be accessible to people with disabilities? As the system is transparent, most users will neither be satisfied or dissatisfied -- they just won t get as many robocalls. The optional end-user tagging or a star code add-on may provide visceral satisfaction for its users. Yes. It would be completely accessible with no additional changes to existing means of accessing the current telecommunications network. Can it be rolled out? (weighted at 25%) What has to be changed for your idea to work? Can it function in today s marketplace? (E.g., Does it require changes to all phone switches world-wide, and require active cooperation by all of the world s phone companies and VoIP gateways, or can it work with limited adoption?) Solutions that are deployable at once will be more heavily weighted, as will solutions that give immediate benefits with even small-scale deployment. Is deployment economically realistic? How rapidly can your idea be put into production? Three changes are required: Implementation of our system within the carrier s network, Data provided to our system by the carrier, and Carrier processing of our system feedback (spam calls routed to appropriate systems) The system can be deployed incrementally on a per-operator basis in today s marketplace, and begins to provide its value immediately. Using off the shelf inexpensive hardware the systems can be deployed cost effectively. Also it can provide carriers with an opportunity for financial gain. The idea can be put into production in a phased manner, starting within a few months of acceptance. Automated systems can scale easily using low cost hardware and virtualization platforms.
The Banana Phone Project:
The Banana Phone Project: A Technical Proposal for the Solution of Illegal Robocalls Alexander E. Ruiz ABSTRACT The current problem of illegal robocalls is one of intelligent software attacking archaic
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY
PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2
Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2 Updated: February 2009 Microsoft Response Point is a small-business phone solution that is designed to be easy to use and
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE
TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE Ringing Off the Hook: Examining the Proliferation of Unwanted Calls
The following is a list of the features available with the managed Intersoft IP Telephony Services.
The following is a list of the features available with the managed Intersoft IP Telephony Services. Call Forwarding When you are not at your desk, be sure not to miss important calls. Forward call to another
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Device SIP Trunking Administrator Manual
Table of Contents Device SIP Trunking Administrator Manual Version 20090401 Table of Contents... 1 Your SIP Trunking Service... 2 Terminology and Definitions... 2 PBX, IP-PBX or Key System... 2 Multi-port
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation
How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation Introduction Enterprises are continuing to convert and
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
SIP Trunking Configuration with
SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
With 360 Cloud VoIP, your company will benefit from more advanced features:
Voice over IP (VoIP) has emerged as the new leader in cost-effective standards based communications. 360 Cloud VoIP enables customers have the benefits of an Enterprise PBX for a fraction of the cost of
ROBOBLASTER ILLEGAL ROBOCALLER BLOCKER
ROBOBLASTER ILLEGAL ROBOCALLER BLOCKER 1. OVERVIEW AND THE BIG PICTURE How the RoboBlaster Works and What it all Entails The RoboBlaster blocks 95% of illegal robocaller calls to the consumer on the fly.
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum
Integration of Voice over Internet Protocol Experiment in Computer Engineering Technology Curriculum V. Rajaravivarma and Farid Farahmand Computer Electronics and Graphics Technology School of Technology,
Sprint s Partner Interexchange Network (PIN) A New Approach to Scalable Voice Peering
Sprint s Partner Interexchange Network (PIN) A New Approach to Scalable Voice Peering Sprint Wholesale White Paper October, 2009 Executive Overview has caused Sprint to develop a a larger community of
CE 817 - Advanced Network Security VoIP Security
CE 817 - Advanced Network Security VoIP Security Lecture 25 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially
VoIP in the Enterprise
VoIP in the Enterprise Date: March. 2005 Author: Sonia Hanson Version: 1.1 1 1 Background Voice over IP In the late 1990s Voice over IP (VoIP) was seen as a disruptive new technology that had the potential
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION
HOW WE DELIVER A SECURE & ROBUST HOSTED TELEPHONY SOLUTION 01 INTRODUCTION Inclarity is the UK s leading provider of Hosted Telephony, Hosted UC and Hosted Video solutions. We help our customers to communicate
Http://www.passcert.com
Http://www.passcert.com Exam : 70-337 Title : Enterprise Voice & Online Services with Microsoft Lync Server 2013 Version : DEMO 1 / 18 Topic 1, Litware, Inc Case A Overview Litware, Inc., is an international
How To Get A Phone Service For Free
1900 Wright Place, Suite 250 Carlsbad, CA 92008 (888) 441-4466 The Future of Phone Systems What features to look for in 2015 2014 Business.com Media, Inc. All Rights Reserved. The Future of Phone Systems:
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
SIP Trunking The Provider s Perspective
SIP Trunking The Provider s Perspective Presented by Pete Sandstrom, CTO BandTel Advanced SIP Session Overview 1. Open Systems Interconnection Model (OSI) is more than a model 2. Quality of Service (QoS)
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions
The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
X X X X X. Platinum Edition. Unlimited Extensions. Unlimited Auto Attendants. Unlimited Voicemail Boxes. ACD Features
Feature Name Unlimited Extensions Unlimited Auto Attendants Unlimited Voicemail Boxes ACD Features Feature Description With Evo IP-PB you can add an extension at any time, with no limits and no need to
Cisco Security Intelligence Operations
Operations Operations of 1 Operations Operations of Today s organizations require security solutions that accurately detect threats, provide holistic protection, and continually adapt to a rapidly evolving,
Authenticated Caller ID Plus Regulatory Changes
Authenticated Caller ID Plus Regulatory Changes By Vincent A. Lucas, Ph.D. Presented to the FTC Robocall Challenge This paper provides solutions to two problems faced in the enforcement of the Telephone
Converged Telephony Solution. Technical White Paper
CTS White Paper Page 1 of 11 Converged Telephony Solution Technical White Paper ٠ May 2004 CTS White Paper Page 2 of 11 Converged Telephony Solution White Paper The focus of this white paper is to explain
PBX Fraud Educational Information for PBX Customers
PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
Fabrizio Volpe. MVP Directory Services MCITP Lync 2010. @Fabriziovlp. [email protected]. http://www.linkedin.com/in/fabriziov
Fabrizio Volpe MVP Directory Services MCITP Lync 2010 @Fabriziovlp [email protected] http://www.linkedin.com/in/fabriziov Agenda Intro to Lync Server Lync Features : Presence Integration with Sharepoint,
Single-User VoIP Service User Manual. Version 20080501 Revised 20110202
Single-User VoIP Service User Manual Version 20080501 Revised 20110202 Table of Contents Table of Contents... 2 Your VoIP Service... 2 Who Should Read this Manual... 2 Basic Features... 2 Optional Features...
How To Protect Your Business From A Voice Firewall
VOICE FIREWALL Secure your voice network edge and prevent financial losses. The ETM Voice Firewall secures your critical networking resources and lowers telecom expenses by protecting your enterprise voice
Barbados Voice over Internet Protocol (VoIP) Policy
Barbados Voice over Internet Protocol (VoIP) Policy Policy in accordance with sections 4 (2)(b) and 4 (2)(f) of the Telecommunications Act Cap 282B. This policy describes the terms and outlines the techniques
Should the IETF do anything about DDoS attacks? Mark Handley
Should the IETF do anything about DDoS attacks? Mark Handley The Problem The Internet architecture was designed to delivery packets to the destination efficiently. Even if the destination does not want
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Enterprise Voice and Online Services with Microsoft Lync Server 2013
Course 20337B: Enterprise Voice and Online Services with Microsoft Lync Server 2013 Course Details Course Outline Module 1: Voice Architecture This module introduce Enterprise Voice features of Lync Server
Feature and Technical
BlackBerry Mobile Voice System for SIP Gateways and the Avaya Aura Session Manager Version: 5.3 Feature and Technical Overview Published: 2013-06-19 SWD-20130619135120555 Contents 1 Overview...4 2 Features...5
PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY
PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities
Call-Blocking Technology
Call-Blocking Technology MODERATOR: Bikram Bandy, FTC PANELISTS: Andrew Whitt, Verizon Communications Jeff Stalnaker, PrivacyStar Matt Stein, Primus Telecommunications Canada Inc. Andrew Whitt Director
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Internet Telephony Terminology
Internet Telephony Terminology Understanding the business phone system world can be a daunting task to a lay person who just wants a system that serves his or her business needs. The purpose of this paper
Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat K.Guirguis
Alexandria University Institute of Graduate Studies and Research Department of Information Technology. Voice over Internet Protocol (VOIP) By: Ahmed Said Mahmoud 2004-3-167 Supervisor: Prof.Dr. Shawkat
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes
ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
How emails are sent from Xero
How emails are sent from Xero Technical discussion In June 2013 we made a change to the way emails are sent from Xero. Some of our users have asked us why the change was necessary and whether we are planning
Chapter 1 - Introduction
Chapter 1 - Introduction Asterisk is revolutionary, reliable, scalable, open source, free software that makes possible powerful enterprise telephone systems. Asterisk systems are in use world-wide, reliably
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
Fighting Spam in an ISP Environment:
White Paper Fighting Spam in an ISP Environment: Challenges, Solutions and Best Practices April, 2007 Summary An ISP presents one of the most complex environments for managing spam because of the high
T.38 fax transmission over Internet Security FAQ
August 17, 2011 T.38 fax transmission over Internet Security FAQ Give me a rundown on the basics of T.38 Fax over IP security. Real time faxing using T.38 SIP trunks is just as secure as sending faxes
UK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
BlackBerry Mobile Voice System
BlackBerry Mobile Voice System Mobile Unified Communications BlackBerry Mobile Voice System (BlackBerry MVS) brings desk phone features to BlackBerry smartphones. Work with one business number at the office
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
6 Steps to SIP trunking security. How securing your network secures your phone lines.
6 Steps to SIP trunking security How securing your network secures your phone lines. The myths about SIP trunking can be misleading. There are stories that SIP has set off a cyber crime wave of corporate
VOICE OVER IP THAT BOOSTS BUSINESS EFFICIENCY- TEN TIPS FOR GETTING IT RIGHT
VOICE OVER IP THAT BOOSTS BUSINESS EFFICIENCY- TEN TIPS FOR GETTING IT RIGHT Voice Over IP that Boosts Business Efficiency Ten Tips for Getting It Right Business phone service with VoIP is the new face
How To Use Blackberry Mobile Voice System On A Blackberry Phone
B l a c k B e r r y M o b i l e Vo i c e S y s t e m BlackBerry Mobile Voice System Mobile Unified Communications Mobile Voice System ( MVS) is designed to unify desk phone features on smartphones and
Implementing Intercluster Lookup Service
Appendix 11 Implementing Intercluster Lookup Service Overview When using the Session Initiation Protocol (SIP), it is possible to use the Uniform Resource Identifier (URI) format for addressing an end
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
Spam goes VoIP. Number Harvesting for Fun and Profit. Hack in The Box 2007 Dubai Hendrik Scholz [email protected]
Spam goes VoIP Number Harvesting for Fun and Profit Hack in The Box 2007 Dubai Hendrik Scholz [email protected] 1 Agenda VoIP Threads Difference between Spam and SPIT Use Cases for VoIP numbers Number Harvesting
SPRINT SIP TRUNKING SERVICE PRODUCT ANNEX
SPRINT SIP TRUNKING SERVICE PRODUCT ANNEX The following terms and conditions in this Sprint SIP Trunking Service Product Annex ( Annex ), together with the applicable Sprint service agreement ( Agreement
Building Voice VPN with Simton IPX
Building Voice VPN with Simton IPX (Simton Technologies, Inc.) Version 6 With Simton IPX, the small and medium businesses can easily consolidate data and voice network together to increase productivity,
WHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
PETER CUTLER SCOTT PAGE. November 15, 2011
Future of Fax: SIP Trunking PETER CUTLER SCOTT PAGE November 15, 2011 QUESTIONS AND ANSWERS TODAY S SPEAKERS Peter Cutler Vice President of Sales Instant InfoSystems Scott Page Subject Matter Expert Dialogic
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Mail Server Scenarios and Configurations
Mail Server Scenarios and Configurations Scenario 1: Using Wingate as the main Mail Server on your network. Computers on your LAN (Local Area Network) Internet Computers In the example above you would
The Business Value of Call Accounting
WHITE PAPER The Business Value of Call Accounting How Call Accounting Software Helps Reduce Business Expenses and Improve Productivity Introduction Call accounting software has been available for more
Threat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
Building a Scalable Numbering Plan
Building a Scalable Numbering Plan Scalable Numbering Plan This topic describes the need for a scalable numbering plan in a VoIP network. Dial Plans Dial plans contain specific dialing patterns for a user
Overview ENUM ENUM. VoIP Introduction (2/2) VoIP Introduction (1/2)
Overview Voice-over over-ip (VoIP) ENUM VoIP Introduction Basic PSTN Concepts and SS7 Old Private Telephony Solutions Internet Telephony and Services VoIP-PSTN Interoperability IP PBX Network Convergence
PBX Security in the VoIP environment
PBX Security in the VoIP environment Defending against telephony fraud Executive Summary In today s communications environment a voice network is just as likely to come under attack as a data network.
ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms
Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5
QRadar SIEM 7.2 Flows Overview
QRadar SIEM 7.2 Flows Overview Panelists Dwight Spencer Principal Solutions Architect & Co-founder of Q1 Labs Aaron Breen QRadar World-wide Support Leader Adam Frank Principal Solutions Architect Dale
SIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
Predictive Dialer. and most important of all to control costs( one way to do this is to employ fewer live agents to handle routine calls)
Predictive Dialer Introduction Ever thought how a call center functions? How it handles so many outbound calls and incoming calls? Call centers of business companies, like mail order catalogue firms, customer
