Phoneypot: Data-driven Understanding of Telephony Threats

نویسندگان

  • Payas Gupta
  • Bharat Srinivasan
  • Vijay Balasubramaniyan
  • Mustaque Ahamad
چکیده

Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to craft attacks that are being used to scam unsuspecting users who have traditionally trusted the telephone. It is necessary to better understand telephony threats to effectively combat them. Although there exist crowd sourced complaint datasets about telephony abuse, such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important information. We believe honeypot technologies can be used to augment telephony abuse intelligence and improve its quality. However, a telephony honeypot presents several new challenges that do not arise in other traditional honeypot settings. We present Phoneypot, a first large scale telephony honeypot, that allowed us to explore ways to address these challenges. By presenting a concrete implementation of Phoneypot using a cloud infrastructure and 39,696 phone numbers (phoneytokens), we provide evidence of the benefits of telephony honeypots. Phoneypot received 1.3 million calls from 250K unique sources over a period of seven weeks. We detected several debt collectors and telemarketers calling patterns and an instance of a telephony denial-of-service attack. This provides us with new insights into telephony abuse and attack patterns.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Through the Looking Glass: Security Issues in Voip Applications

Recent Voice over Internet Protocol (VoIP) technology is attracting more and more attention and interest in the industry. VoIP applications such as IP telephony systems involve sending voice transmissions as data packets over private or public IP networks as well as reassembled and decoded on the receiving side. Security concerns are always the major barrier that prevents many businesses from e...

متن کامل

Forecasting Capital Investment for Fixed-Telephony Network Switching Equipment in Tandem with NGN Migration Using Cobb-Douglas Model

This paper tries to estimate the capital investment required for the fixed-telephony network switching equipment as demanded by the fourth national development plan. As a first step, the Cobb-Douglas model is used as a successful demand forecasting model to estimate the demand over the target years. Then, an architectural plan is developed for the fixed-telephony switching network that takes in...

متن کامل

PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security

The threats mobile phone users face, are about to increase due to the rapid penetration of advanced smartphone devices and the growing Internet access using them. As such, reinforcing users’ security has become a critical imperative. This paper refers to a system that pinpoints and informs mobile phone users that have a low security level, thus helping them protect themselves. The system consis...

متن کامل

Ontologies for Provision of HIV/Aids Information Using Telephony Infrastructure

Over the years, the number of new telephony services has increased drastically. This increase can, in part, be attributed to the public switched telephone network (PSTN) converging with computer networks into a single network, based on the Internet Protocol (IP), as well as the advent of mobile telephony. Although innovative, many of these services are database driven and consequently lack intr...

متن کامل

Voice over IP: Risks, Threats and Vulnerabilities

Voice over IP (VoIP) and Internet Multimedia Subsystem (IMS) technologies are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. Howeve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015