SlideShare ist ein Scribd-Unternehmen logo
1 von 35
An Introduction
and Closer Look
1
June 2019
2
Today’s Presenters:
Alan D Percy
CMO at TelcoBridges
alan.percy@telcobridges.com
Mike Stukalin
VP of Sales at JeraSoft
mike@jerasoft.net
3
Agenda
• Introductions
• Impact of Telecom Fraud
• Fraud Methods and Attack Profiles
• Real-Time Fraud Protection
• How to Implement Fraud Detection and Prevention
• Where to Learn More
• Your Questions
Billing Solution for Telecom Industry
JeraSoft is a passionate team of engineers focused on
development and integration of highly productive Billing
Solutions for Telecom (Mobile VoIP, Business Telephony,
OTT, Wholesale VoIP and SMS) and IoT/M2M Providers
around the world.
Since 2005 JeraSoft has been putting together key insight
and successful billing management practices, combining
them with state-of-the-art web and telecom technologies.
The result is a powerful platform the Telecom and IoT
Providers can use to streamline Billing Processes and add
value to their business.
About Us
Solutions
IoT / M2M Retail VoIP Wholesale VoIP
OTTSMS Wholesale MVNOBusiness
Telephony
Mobile VoIP
Components
An extensive software, allowing you
to provide services like Enterprise
Telephony, OTT, MVNO, End-user
retail, etc.
Retail
Services
This module contains Rates
Generator and Rates Notifications
features, allowing you to compose a
rates list and run notifications.
Dynamic
Routing
A feature that allows you to run
your business more efficiently by
providing automated management
of your routes.
Rates Management Jurisdictional Billing
An extra module that supports
domestic long distance calls in the
USA— phone calls made outside
a certain local call area and
LATAs.
According to the Communications Fraud Control Association
(CFCA) in their 2017 survey of telecom fraud loss, organizations
and carriers were hit with losses of $29.2 billion in 2017.
Cost of Telecom Fraud for the Industry
Source: Communications Fraud Control Association (CFCA)
The Real Cost of Telecommunications Fraud
Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA
shook out:
Source: Communications Fraud Control Association (CFCA)
Fraudsters’ Targets
Fraud against service providers. In this case fraud scenarios are more
complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes.
Fraud against customers. This scenario assumes any case of gaining access to
customer’s account in order to make free calls.
Generally there are two categories to distinguish between major telecom fraud scenarios,
accordingly to the fraudsters’ target:
Target: Service Providers
Call transfer fraud
Wholesale SIP trunking fraud
False answer supervision (FAS)
Location routing number fraud
Multiple transfer fraud
Call forwarding fraud
Traffic pumping and related
services
International revenue sharing
fraud (IRSF)
Target: Customers
Telecom denial-of-service (TDOS)
Vishing (Voice fishing)
Account takeover, etc
Callback (Wangiri) scam
Real-time fraud protection
Before the call is connected
Uses real-time patterns
Works on per-call basis
Scenario:
1. Alert notification
2. Specific call blocking
Real-time VS Non Real-time Fraud
Protection
Non real-time fraud protection
After the call is connected
Uses statistics analysis
Works on array of calls
Scenario:
1. Alert notification
2. Client / Destination blocking
Double Fraud Protection
The right combination of Billing platform and an SBC allows:
● Fraud prevention and protection for service providers.
AND
● Fraud prevention and protection for end customers.
Double Fraud Protection
Abnormal expenses pattern scenario
Allows to protect from unusual financial spending.
Quality statistics control
Monitoring and controlling call quality.
Abnormal usage behaviour (geo)
Enables unusual usage behavior protection connected with call destination.
Balance usage and Capacity control
The customer may set the limits for account balance, the calls will stop after the
amount set will be spent.
Allows to limit the number of calls from 1 account. Unusual behavior and patterns
are analysed by soft switch.
JeraSoft Billing Fraud Protection Scenarios
• Customers are protected against financial losses.
• Service providers improve customer satisfaction and
revenue retention while protecting themselves and end-
customers from financial damage.
• Today’s communications business can’t afford to
operate without a comprehensive fraud protection.
Benefits of Fraud Protection
Let us help you make the right choice for your Billing needs and
Fraud protection scenarios
UK+44 (203) 129-9126
US+1 (415) 520-7883
info@jerasoft.net
www.jerasoft.net
TelcoBridges Inc.
19Confidential
Roll of SBCs in Real-Time Billing
TelcoBridges Inc.
• Manufacturer of VoIP gateways and
telecom solution platforms for carriers
• Privately held
• Founded in 2002
• Employees: ~35
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Poland, Turkey, Hong Kong
• 24/7 technical support
20
TelcoBridges HQ
21
IPRN Fraud Infographic
International Premium Rate Numbers
https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
Common Billing Interfaces
Call Detail Records (CDR)
• Record details of each call
• Text file (CSV)
• Batch processing
• Not Real-time
• No Authentication
• No Ability to Route Calls
RADIUS
Confidential 22
• RFC 2865 and RFC 2966
• IP-based
• Multiple Transactions per Call
• Real-Time processing
• Authentication per Call
• Supports Forwarding/Routing
• Session Duration Timeout
23
Service Provider Networks
Confidential
Billing
IPX
PSTN
IPX
PSTN
SoftSwitch
Trunking
Subscribers
RADIUS
Links
Egress
SBC or
Gateway
Ingress
SBC or
Gateway
24
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Route to
PSTN, no
time limit
I’d like to
make a
call…
25
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Bad number,
do not route
26
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Accept
(Route, Duration…)
Accounting-Request
(Start time, End time, Route…)
When a Call Request is Accepted:
Accounting-Response
.
.
.
27
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Reject
Accounting-Request
(Start time, End time, Duration=0)
Accounting-Response
When a Call Request is Rejected:
GEO Redundancy
SBC or
Gateway
SBC or
Gateway
Billing Billing
TelcoBridges Portfolio
Confidential 29
Signaling and
Media Gateways
TMG800
Virtualized
Session Border Controller
Software
Support and
Professional
Services
TMG3200
TMG7800
30
SBC Product Positioning
 Tier 1/2/3 Service Providers and Enterprise
 Access, Peering, SaaS…
 CDR and RADIUS Support
 Commercial Applications
 Encryption & HA Support
 Live Support w/ 24/7 opt.
 $1/Session/Year
31
Learn More:
Download your ProSBC software:
www.prosbc.com
Frequently Asked Questions at:
forums.freesbc.com
Other educational webinars at:
YouTube.com/telcobridges
Q/A
BONUS CONTENT
32Confidential
Why JeraSoft?
Providing Stable Billing
Solution for 14 Years
Serving 250+ Clients in
35 Countries
Configured Specially
for Your Business
100% Integration
with
Third Party Systems
Industry Leading
24/7 Support Team
Customized License
Options and Components
Full Training and
Dedicated Initial Help
New Feature-Rich Releases
Throughout the Year
34
Impact of Fraud
• Fraud is costing the industry
$17bn in lost revenues every
year, with the proceeds being
used to finance organized crime
and terrorism.
- Financial Times
• The Department of Social Affairs
in Ireland was defrauded to the
tune of €300,000.
- Ireland Comptroller and Auditor General
Source: siliconrepublic.com/comms/telecoms-fraud
35
Methods of Telecom Fraud
• Billing Fraud
• Subscription Fraud
• Assaulting security weaknesses
• Credit Card Fraud
• Network Fraud
• Bypass Fraud
• Hacking IP Addresses
• Call Forwarding and other attacks
https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf

Weitere ähnliche Inhalte

Was ist angesagt?

Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
cVidya Networks
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
kkvences
 
smart guide to compliant call recording
smart guide to compliant call recordingsmart guide to compliant call recording
smart guide to compliant call recording
mParticle
 
Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14
David Krasinski
 

Was ist angesagt? (20)

Comprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraudComprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraud
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
 
Telecommunication Fraud Detection and Prevention
Telecommunication Fraud Detection and PreventionTelecommunication Fraud Detection and Prevention
Telecommunication Fraud Detection and Prevention
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015
 
smart guide to compliant call recording
smart guide to compliant call recordingsmart guide to compliant call recording
smart guide to compliant call recording
 
TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017? TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017?
 
Pymnts BlueFin Webinar
Pymnts BlueFin WebinarPymnts BlueFin Webinar
Pymnts BlueFin Webinar
 
Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 

Ähnlich wie How to Prevent Telecom Fraud in Real-Time

Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_Sheet
Juan Illidge
 
Top 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsTop 6 Telecom Industry Trends
Top 6 Telecom Industry Trends
Sam Sansome
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
Olya Saiko
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
Anthony Whittle
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overview
vismayibhat
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
Shobhit Srivastava
 

Ähnlich wie How to Prevent Telecom Fraud in Real-Time (20)

New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_Sheet
 
Lttc 6262013
Lttc 6262013Lttc 6262013
Lttc 6262013
 
Top 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsTop 6 Telecom Industry Trends
Top 6 Telecom Industry Trends
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study.
 
2020 kyriba payment_network
2020 kyriba payment_network2020 kyriba payment_network
2020 kyriba payment_network
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overview
 
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsHow Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
Srikanth-Resume
Srikanth-ResumeSrikanth-Resume
Srikanth-Resume
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profile
 

Mehr von Alan Percy

Mehr von Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

How to Prevent Telecom Fraud in Real-Time

  • 1. An Introduction and Closer Look 1 June 2019
  • 2. 2 Today’s Presenters: Alan D Percy CMO at TelcoBridges alan.percy@telcobridges.com Mike Stukalin VP of Sales at JeraSoft mike@jerasoft.net
  • 3. 3 Agenda • Introductions • Impact of Telecom Fraud • Fraud Methods and Attack Profiles • Real-Time Fraud Protection • How to Implement Fraud Detection and Prevention • Where to Learn More • Your Questions
  • 4. Billing Solution for Telecom Industry
  • 5. JeraSoft is a passionate team of engineers focused on development and integration of highly productive Billing Solutions for Telecom (Mobile VoIP, Business Telephony, OTT, Wholesale VoIP and SMS) and IoT/M2M Providers around the world. Since 2005 JeraSoft has been putting together key insight and successful billing management practices, combining them with state-of-the-art web and telecom technologies. The result is a powerful platform the Telecom and IoT Providers can use to streamline Billing Processes and add value to their business. About Us
  • 6. Solutions IoT / M2M Retail VoIP Wholesale VoIP OTTSMS Wholesale MVNOBusiness Telephony Mobile VoIP
  • 7. Components An extensive software, allowing you to provide services like Enterprise Telephony, OTT, MVNO, End-user retail, etc. Retail Services This module contains Rates Generator and Rates Notifications features, allowing you to compose a rates list and run notifications. Dynamic Routing A feature that allows you to run your business more efficiently by providing automated management of your routes. Rates Management Jurisdictional Billing An extra module that supports domestic long distance calls in the USA— phone calls made outside a certain local call area and LATAs.
  • 8. According to the Communications Fraud Control Association (CFCA) in their 2017 survey of telecom fraud loss, organizations and carriers were hit with losses of $29.2 billion in 2017. Cost of Telecom Fraud for the Industry Source: Communications Fraud Control Association (CFCA)
  • 9. The Real Cost of Telecommunications Fraud Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA shook out: Source: Communications Fraud Control Association (CFCA)
  • 10. Fraudsters’ Targets Fraud against service providers. In this case fraud scenarios are more complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes. Fraud against customers. This scenario assumes any case of gaining access to customer’s account in order to make free calls. Generally there are two categories to distinguish between major telecom fraud scenarios, accordingly to the fraudsters’ target:
  • 11. Target: Service Providers Call transfer fraud Wholesale SIP trunking fraud False answer supervision (FAS) Location routing number fraud Multiple transfer fraud Call forwarding fraud Traffic pumping and related services International revenue sharing fraud (IRSF)
  • 12. Target: Customers Telecom denial-of-service (TDOS) Vishing (Voice fishing) Account takeover, etc Callback (Wangiri) scam
  • 13. Real-time fraud protection Before the call is connected Uses real-time patterns Works on per-call basis Scenario: 1. Alert notification 2. Specific call blocking Real-time VS Non Real-time Fraud Protection Non real-time fraud protection After the call is connected Uses statistics analysis Works on array of calls Scenario: 1. Alert notification 2. Client / Destination blocking
  • 14. Double Fraud Protection The right combination of Billing platform and an SBC allows: ● Fraud prevention and protection for service providers. AND ● Fraud prevention and protection for end customers.
  • 16. Abnormal expenses pattern scenario Allows to protect from unusual financial spending. Quality statistics control Monitoring and controlling call quality. Abnormal usage behaviour (geo) Enables unusual usage behavior protection connected with call destination. Balance usage and Capacity control The customer may set the limits for account balance, the calls will stop after the amount set will be spent. Allows to limit the number of calls from 1 account. Unusual behavior and patterns are analysed by soft switch. JeraSoft Billing Fraud Protection Scenarios
  • 17. • Customers are protected against financial losses. • Service providers improve customer satisfaction and revenue retention while protecting themselves and end- customers from financial damage. • Today’s communications business can’t afford to operate without a comprehensive fraud protection. Benefits of Fraud Protection
  • 18. Let us help you make the right choice for your Billing needs and Fraud protection scenarios UK+44 (203) 129-9126 US+1 (415) 520-7883 info@jerasoft.net www.jerasoft.net
  • 19. TelcoBridges Inc. 19Confidential Roll of SBCs in Real-Time Billing
  • 20. TelcoBridges Inc. • Manufacturer of VoIP gateways and telecom solution platforms for carriers • Privately held • Founded in 2002 • Employees: ~35 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Poland, Turkey, Hong Kong • 24/7 technical support 20 TelcoBridges HQ
  • 21. 21 IPRN Fraud Infographic International Premium Rate Numbers https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
  • 22. Common Billing Interfaces Call Detail Records (CDR) • Record details of each call • Text file (CSV) • Batch processing • Not Real-time • No Authentication • No Ability to Route Calls RADIUS Confidential 22 • RFC 2865 and RFC 2966 • IP-based • Multiple Transactions per Call • Real-Time processing • Authentication per Call • Supports Forwarding/Routing • Session Duration Timeout
  • 24. 24 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Route to PSTN, no time limit I’d like to make a call…
  • 25. 25 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Bad number, do not route
  • 26. 26 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Accept (Route, Duration…) Accounting-Request (Start time, End time, Route…) When a Call Request is Accepted: Accounting-Response . . .
  • 27. 27 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Reject Accounting-Request (Start time, End time, Duration=0) Accounting-Response When a Call Request is Rejected:
  • 28. GEO Redundancy SBC or Gateway SBC or Gateway Billing Billing
  • 29. TelcoBridges Portfolio Confidential 29 Signaling and Media Gateways TMG800 Virtualized Session Border Controller Software Support and Professional Services TMG3200 TMG7800
  • 30. 30 SBC Product Positioning  Tier 1/2/3 Service Providers and Enterprise  Access, Peering, SaaS…  CDR and RADIUS Support  Commercial Applications  Encryption & HA Support  Live Support w/ 24/7 opt.  $1/Session/Year
  • 31. 31 Learn More: Download your ProSBC software: www.prosbc.com Frequently Asked Questions at: forums.freesbc.com Other educational webinars at: YouTube.com/telcobridges Q/A
  • 33. Why JeraSoft? Providing Stable Billing Solution for 14 Years Serving 250+ Clients in 35 Countries Configured Specially for Your Business 100% Integration with Third Party Systems Industry Leading 24/7 Support Team Customized License Options and Components Full Training and Dedicated Initial Help New Feature-Rich Releases Throughout the Year
  • 34. 34 Impact of Fraud • Fraud is costing the industry $17bn in lost revenues every year, with the proceeds being used to finance organized crime and terrorism. - Financial Times • The Department of Social Affairs in Ireland was defrauded to the tune of €300,000. - Ireland Comptroller and Auditor General Source: siliconrepublic.com/comms/telecoms-fraud
  • 35. 35 Methods of Telecom Fraud • Billing Fraud • Subscription Fraud • Assaulting security weaknesses • Credit Card Fraud • Network Fraud • Bypass Fraud • Hacking IP Addresses • Call Forwarding and other attacks https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf

Hinweis der Redaktion

  1. Some introductions to get started:
  2. Active/standby RADIUS Servers redundancy One server is the “Current” server where CDRs are sent. Failed to send a CDR request to the “Current” server: the next server is selected and become the “Current” server