Masters Seminar 2015. Privacy, security and fraud detection solutions for communication services



Similar documents
VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

Communications Fraud Control Association Global Fraud Loss Survey

TELECOM FRAUD CALL SCENARIOS

International Dialing and Roaming: Preventing Fraud and Revenue Leakage

List of Figures Analysis Executive Summary 1. International Call Volumes and Growth Rates, Compounded Annual Traffic Growth Rate by

Product Overview & Quick Start Guide

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

[PRIVATE LABEL TELEPHONY SOLUTION]

Table of Contents. CallPro CRM CloudCall Plugin Overview 1 Company Overview 1 Product Overview 1 How to order CloudCall Click 2

VOIP Security Essentials. Jeff Waldron

How the ETM (Enterprise Telephony Management) System Relates to Session Border Controllers (SBCs) A Corporate Whitepaper by SecureLogix Corporation

SIP SECURITY JULY 2014

Managed VoIP platform for delivering business class features to your clients. Deliver reliable Voice Over IP service without licensing costs

Scientific Knowledge and Reference Management with Zotero Concentrate on research and not re-searching

Definitions of the Telecommunication indicators used in the EUROSTAT telecommunications inquiry

Product Overview & Quick Start Guide

BITEK INTERNATIONAL INC PRESENTS: MANAGING VOIP

Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the

Telecommunications Fraud Organized approaches to fight it

Softswitch & Asterisk Billing System

Barbados Voice over Internet Protocol (VoIP) Policy

Anti Fraud Services. Associate Member of..

Company Profile. Business Proposal

Security and Risk Analysis of VoIP Networks

VOIP THEFT OF SERVICE: PROTECTING YOUR NETWORK ======

CONSULTATION. National Numbering Plan Review. A short Consultation issued by the Telecommunications Regulatory Authority 28 August 2007

VoIP Security Methodology and Results. NGS Software Ltd

Product Overview & Quick Start Guide

ICTTEN4051A Install configuration programs on PC based customer equipment

Swisscom Service description for Microsoft Office 365

Choosing a SIP trunk provider

[Asterisk IP Telephony Solutions]

Asterisk Calling Card & Billing System

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE

Case Study. Checkmarq VBX Solution for Dutch Property Agent. Overview

Enabling Innovation with KPI-based Service Management Operator Key Performance Indicators (KPIs)

Solution Review: Siemens Enterprise Communications OpenScape Session Border Controller

Product Overview & Quick Start Guide

Levelling the Playing Field

U.S. Mobile Payments Landscape NCSL Legislative Summit 2013

Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group

CARRIER GRADE TECHNOLOGY FOR ENTREPRENEURS. DELIVER RELIABLE VOICE OVER IP SERVICE WITHOUT HEFTY LICENSING COSTS.

White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers

Voice Over IP: Security & QOS Test Lab

Contents. Specialty Answering Service. All rights reserved.

MVNO Solution for Highly Profitable Global Roaming Services

How to Secure TYPO3 Installations

Managed Services Billing Platform For MVNOs

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

White Paper. avaya.com 1. Table of Contents. Starting Points

Callika Internet Telephony Voice Over IP (VoIP) Private Label Reseller Program

Speedflow presents exceptional range of software solutions Single Point of Control solutions from Speedflow include:

Voice over IP is Transforming Business Communications

ivoice Networks Pte Ltd

WHAT THE FRAUD? A Look at Telecommunications Fraud and Its Impacts

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

Security Features and Considerations

The Business Value of Call Accounting

NATIONAL COST OF VoIP BYPASS

The Business Case for Unified Communications November 2013

NAPCS Product List for NAICS 517: Telecom Products

WHY IP-PBX SYSTEMS ARE GOOD FOR BUSINESS

Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.

VoIP Timing and Synchronization Best Practices

Telco Carrier xsps Solutions.

Building Wireless Networks. Tariq Hasan Regional Sales Manager, MENA Wireless Network Solutions Motorola Solutions

VoIP / SIP Planning and Disclosure

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

Position Paper 4. Closer understanding of the term third party networks and service providers" in relation to its application in Directive 2006/24/EC

Voice Call Addon for Ozeki NG SMS Gateway

NewNet Communication Technologies Foundations for Network Innovation Secure Transactions

Uninterrupted Internet:

Three Network Technologies

Whitepaper cost comparison hosted PBX versus traditional PBX

Post, Broadcasting & Telecommunications Annual Market Review 2012/2013

FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID

Transcription:

Masters Seminar 2015 Privacy, security and fraud detection solutions for communication services

Agenda 1. Your Team 2. Organizational Issues 3. Introduction to the Topics 4. Distribution of Topics 5. Scientific Working 7. Your Questions 2

Holder of the Chair of Mobile Business & Multilateral Security Research Interests Mobile applications and Multilateral Security in e.g. Mobile Business, Mobile Commerce, Mobile Banking, and Location Based Services Privacy and identity management, communication infrastructures and devices, such as personal security assistants and services IT security evaluation and certification Your Team Prof. Dr. Kai Rannenberg 3

Ahmed Yesuf Research Assistant Research Focus: Validation and evaluation of security solutions Metrics to evaluate security approaches Research areas: System security and modelling Secure software development Design and requirements engineering Project involved: TREsPASS (Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security) 14.04.2015 4

Stephan Heim Research Assistant Research Interests User Acceptance of Social Network Services in Multinational Enterprises Privacy in Enterprise Communities Privacy in Mobile Communities Completed Projects Privacy and Identity Management for Community Services (PICOS) Attribute-based Credentials for Trust (ABC4Trust) Industry Projects 14.04.2015 5

2. ORGANIZATIONAL ISSUES 6

Course Language: English. Organizational Issues Language Seminar paper and presentation slides have to be delivered in English (except Seminar Papers marked with GER). Presentations have to be held in English. 7

Seminar Paper Organizational Issues Deliverables Scientific paper presenting your research question, methodology, results, and the used literature. Has to be structured according to scientific guidelines. Around 20 pages (excluding references). Deadlines: Draft version: 01.06.2015 (e-mail, editable document) Final Version: 08.06.2015, 3 PM (printed + e-mail) Deliver to Elvira Koch, RuW 2.257 Template available: Link (Please use the citation style from WIRTSCHAFTSINFORMATIK: Link or MISQ Link) 8

Organizational Issues Deliverables Presentation Slide set summarizing your results and research methodology. Presentation time: 30 min + 15 min discussion Format: PowerPoint or OpenOffice Impress Deadline final version: 18.06.2015, 23:59 (CEST) (via e- mail to your supervisor) 9

Organizational Dates & Rooms Time Room 14.04.15, 10:00-12:00 2.202 (RuW) Introduction & Assignment of Topics 25.06.15, 09:00-18:00 2.202 (RuW) Presentations (Day 1)* 26.06.15, 09:00-18:00 2.202 (RuW) Presentations (Day 2)* * The agenda will be sent to you a few days in advance

Organizational Issues Final Grade Presentation 20%* Seminar Paper 80%* 11 *Participation in both parts is required for the successful completion of the seminar.

Organizational Issues Contact For organizational issues: seminar@m-chair.de For topic-specific issues: Ahmed.yesuf@m-chair.de or Stephan.heim@m-chair.de 12

13 3. INTRODUCTION

Intro PART I: FRAUD PREVENTION TECHNIQUES FOR TELECOM COMPANIES 14

Introduction Telecommunication services Telecommunication services: Voice mail, data services, audio/video tex services, Fixed telephone services Cellular mobile telephone services Carrier services Provision of call management services Data transmission services

Years Introduction Telecommunication Fraud The use of telecommunication services or products with no intention of payment. [1] Approximately $46.3 billion (USD) lost in 2013 (up to 15% increase from 2011) Fraud loss (in billion USD) $4.42 Billion (USD) PBX Hacking 2013 2011 2009 2006 2003 $46.30 $40.1 $54-60 $35,00 $72-80 $3.62 Billion (USD) VoIP Hacking $6.11 Billion (USD) Roaming Fraud [1] 16

Roaming Fraud roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area provided by their normal network operator. The GSM Association Roaming services: voice, data, MMS, and SMS [2] 17

Roaming Fraud Fraud based on technical network factors Interoperability Information transmission delays Configuration flaws Fraud based on other business flaws Subscription fraud Internal frauds M-commerce Copyright and hacking 18

PBX fraud PBX (Private Branch Exchange): a private telephone network within an enterprise. Types of PBX 1. TDM (Time Division Multiplexer) 2. IP PBX 3. Hybrid PBX 19

PBX fraud NEC Nederland BV ( NEC ), the Dutch branch of NEC Corporation which is a worldwide provider of IT and communication solutions, uses voice services provided by KPN BV ( KPN ), a Dutch telecom provider. Unauthorized parties got access to the data lines via a badly secured NEC PBX device and set up a dial up service through which telephone traffic with East Timor took place. KPN invoiced NEC for the costs involved, in the sum of EUR 176,895. [3] 20

Topics Topic 1: Actors involved in IP PBX fraud Who (person, software or organisation) are involved in committing IP PBX fraud? Example scenarios when necessary Topic 2: Potential emerging risks of IP PBX system What are the risks of current IP PBX systems? One or two scenarios two show the risk Topic 3: Potential emerging risks of Roaming What are the risks of current Roaming? One or two scenarios to show the risks

Topics Topic 4: The economic impact of roaming fraud to operators discussion on one or two scenarios Topic 5: The economic impact of roaming fraud to the subscribers discussion on one or two scenarios Topic 6: The impact of roaming fraud on the reputation of operators discussion on one or two scenarios

Topics... Topic 7: Who is legally liable for damage accused by IP PBX fraud? Discussion on a or two scenarios Topic 8: Requirements (considerations) of an IP PBX fraud prevention systems (approaches) What will a prevention system (approach) has to fulfil in order to prevent from fraud? Topic 9: Requirements (considerations) of a Roaming fraud prevention systems (approaches) What will a prevention system (approach) has to fulfil in order to prevent from fraud?

Intro PART II: FRAUD SCENARIOS IN MOBILE WALLET AND BITCOIN ECOSYSTEMS 24

Bitcoin What is a Bitcoin? Bitcoin is a digital currency that can be exchanged for goods and services. Bitcoins cannot be printed or physically made. They must be generated through computerized methods. Dezentralized: Bitcoins are not regulated by any government or banking institution

Bitcoin Fraud scenarios Consumers risks Transaction monitoring Identity leaks De-anonymisation of transactions Compromise of Bitcoin wallets Scams with fake bitcoin merchants and retailers Etc Merchants and Retailers DDos attacks Hacking Double spending Etc.

Mobile Wallet Landscape at POS today Different Technology involved Payment and Value Added Services are managed independently from each other

Mobile Wallet Landscape with Mobile Wallet Standardized interfaces between NFC device, terminal and register IT complexity can be improved, while NFC service is improved

Mobile Wallet User centric Wallet as a paradigm

Topics Topic 1: Bitcoin Consumer security risks Topic 2: Fraud scenarios and security attacks in the Bitcoin ecosystem affecting retailers and merchants Topic 3: Fraud scenarios in the mobile wallet ecosystem Topic 4: Security risks for mobile wallet consumers

Intro PART III: IMPACT OF PRIVACY TECHNOLOGIES IN ONLINE SOCIAL NETWORKS 31

http://online-social-networking.com/tag/social-networking-sites

Topics Topic 1: Why users participate in Online Social Networks Topic 2: Privacy expectations of digital natives in Online Social Networks Define attitudes about online privacy focusing on OSN Topic 3:Potential threats to Privacy associated with the use of Online Social Networks

Topics Topic 4: Workplace Privacy Policies and their capability to protect employees Topic 5: Privacy technologies in Online Social Networks

4. DISTRIBUTION OF TOPICS 35

Overview Topics I.1 Actors involved in IP PBX fraud II.1 Bitcoin Consumer security risks I.2 Potential emerging risks of IP PBX system II.2 Fraud scenarios and security attacks in the Bitcoin ecosystem affecting retailers and merchants I.3 Potential emerging risks of Roaming II.3 Fraud scenarios in the mobile wallet ecosystem I.4 The economic impact of roaming fraud to operators II.4 Security risks for mobile wallet consumers I.5 The economic impact of roaming fraud to the subscribers III.1 Why users participate in Online Social Networks I.6 The impact of roaming fraud on the reputation of operators III.2 Privacy expectations of digital natives in Online Social Networks I.7 Who is legally liable for damage accused by IP PBX fraud? III.3 Potential threats to Privacy associated with the use of Online Social Networks I.8 Requirements (considerations) of an IP PBX fraud prevention systems (approaches) III.4 Why users participate in business realted Online Social Networks I.9 Requirements (considerations) of a Roaming fraud prevention systems (approaches) III.5 Privacy Technologies in Online Social Networks Seminar Paper can be submitted in german 36

Distribution of Topics You will receive your anchor literature until start of next week (1-2 papers). Send 150-word abstract and first table of contents to your supervisor until May 1. Individual appointments possible on-request in the starting phase and in the final phase. 37

38 5. SCIENTIFIC WORKING

Scientific Working (1) Based on the structure of common scientific papers (conference papers, journal articles, etc.): Problem statement / Motivation / Introduction State of research / Related work Own contribution / Methodology Summary / Conclusion / Future work Other formal requirements: 39 Table of contents / Structuring Standardized reference list Table of figures / tables

Scientific Working (2) Style: No colloquial language Be precise Grammar and typo check No headwords, write line of thought fully out References: Any direct or indirect passages taken from other publications HAVE to be precisely referenced (according to the citation style of WIRTSCHAFTSINFORMATIK or MISQ) Same for figures and tables, etc. Avoid foot notes 40

Scientific Working (3) Literature Research: Work with scientific publications Avoid articles from Wikipedia and/or popular literature Include the state of the art Use databases for scientific literature (Google Scholar, ACM, JSTOR, citeseer, Web of Knowledge, AISNET.) 41

Scientific Working (4) Literature Management tools help with the organization of used literature. Mendeley: Online/Offline synchronization File organizer One-click import Word Plug-in BibTex export Sharing through Social Networking Support of many citation styles Client for Windows and Mac It s free (up to 2 GB) http://www.mendeley.com/ 42

Important Dates Time Where/How 14.04.15, 10:00-12:00 2.202 (RuW) Introduction & Assignment of Topics 01.05.15, 23:59 e-mail Abstract & TOC 01.06.15, 23:59 e-mail Draft version seminar paper 08.06.15, 15:00 2.257 (RuW) + e-mail Final version seminar paper 18.06.15, 23:59 e-mail Final version presentation 25.06.14, 09:00-18:00 2.202 (RuW) Presentations (Day 1)* 26.06.14, 09:00-18:00 2.202 (RuW) Presentations (Day 2)*

44 7. YOUR QUESTIONS

Literature 1. Keromytis, Angelos D. "A comprehensive survey of voice over IP security research." Communications Surveys & Tutorials, IEEE 14.2 (2012): 514-537. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5742777&abstrac taccess=no&usertype=inst 2. Rezac, Filip, and Miroslav Voznak. "Security risks in IP telephony." Advances in Electrical and Electronic Engineering 8.1 (2011): 15-23. http://advances.uniza.sk/index.php/aeee/article/view/12 3. Macia-Fernandez, Gabriel, Pedro Garcia-Teodoro, and Jesus Diaz-Verdejo. "Fraud in roaming scenarios: an overview." IEEE Wireless Communications16.6 (2009): 88. http://www.researchgate.net/profile/jesus_diaz- Verdejo/publication/224093590_Fraud_in_roaming_scenarios_an_overvie w/links/0deec528c816a9c13a000000.pdf 4. D. Richard. Kuhn, National Institute of Standards, and Technology (U.S.). PBX vulnerability analysis: finding holes in your PBX before someone else does [Washington, D.C, 2001] http://csrc.nist.gov/publications/nistpubs/800-24/sp800-24pbx.pdf

References [1] N. By, G LOBAL T ELECOM F RAUD I NCREASES BY 0. 21 % FROM 2011, S TILL N EAR 5-Y EAR L OW COMMUNICATIONS FRAUD CONTROL ASSOCIATION ( CFCA ), pp. 0 1, 2013. [2], Macia-Fernandez, G., Garcia-Teodoro, P., & Diaz-Verdejo, J. (2009). Fraud in roaming scenarios: an overview. IEEE Wireless Communications, 16(6), 88. [3], Nick Pantlin, European national news, (2014)

Back up topics Topic A: Risk prevention mechanisms for IP PBX fraud Review the fraud prevention techniques of IP PBX fraud Topic B: Risk prevention mechanisms for roaming fraud Review the fraud prevention techniques of roaming fraud Topic C: Investigation of fraud detection and prevention techniques for IP PBX fraud show the difference between IP PBX fraud detection and prevention from economic perspective Topic D: Investigation of fraud detection and prevention techniques for IP PBX fraud show the difference between roaming fraud detection and prevention from economic perspective

48 BACKUP

Telecommunication fraud Different type and methods of fraud Top four type of fraud: Roaming fraud Wholesale fraud Premium Rate Service Hardware reselling Methods of fraud: Subscription fraud PBX hacking Account takeover VoIP hacking Dealer fraud

PBX fraud Dial through For both traditional and IP PBX, finding the PBX number Attacks on the end point control E.g. attack through the web interface of the end points Attacks to PBX admin portal When the attacker got the administration portal, all the controls on PBX will be disclosed. Automatic call generation or dial through could happen Misconfiguration of the PBX 50