SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Introduction of LTE
Specification, Facts & Advantage of LTE
New types of threats and frauds
Requirement for NGN Frauds Management System
Key Takeaways
Thank You
LTE stands for Long Term Evolution and it was started as a project
in 2004 by telecommunication body known as the Third Generation
Partnership Project (3GPP). SAE (System Architecture Evolution) is
the corresponding evolution of the GPRS/3G packet core network
evolution. The term LTE is typically used to represent both LTE and
SAE.
The main goal of LTE is to provide a high data rate, low latency and
packet optimized radio access technology supporting flexible
bandwidth deployments. Same time its network architecture has
been designed with the goal to support packet-switched traffic with
seamless mobility and great quality of service. The LTE wireless
interface is incompatible with 2G and 3G networks, so that it must
be operated on a separate wireless spectrum.
HSDPA LTE
14 Mbps DL 100 Mbps DL
5,7 Mbps UL 50 Mbps UL
LTE has 10X users per cell than HSDPA
LTE is the successor technology not only of UMTS but also of CDMA
2000.
LTE is important because it will bring up to 50 times performance
improvement and much better spectral efficiency to cellular networks.
LTE introduced to get higher data rates, 300Mbps peak downlink and
75 Mbps peak uplink. In a 20MHz carrier, data rates beyond 300Mbps
can be achieved under very good signal conditions.
LTE is an ideal technology to support high date rates for the services
such as voice over IP (VOIP), streaming multimedia, video
conferencing or even a high-speed cellular modem.
All LTE devices have to support (MIMO) Multiple Input Multiple Output
transmissions, which allow the base station to transmit several data
streams over the same carrier simultaneously.
High throughput: High data rates can be achieved in both
downlink as well as uplink. This causes high throughput.
Low latency: Time required to connect to the network is in range
of a few hundred milliseconds and power saving states can now be
entered and exited very quickly.
Seamless Connection: LTE will also support seamless
connection to existing networks such as GSM, CDMA and WCDMA.
FDD and TDD in the same platform: Frequency Division
Duplex (FDD) and Time Division Duplex (FDD), both schemes can
be used on same platform.
Fraud management is the process of identifying, stopping or
preventing situations where customers, employees or professional
fraudster set out to make use of telecommunications services with
the intention of avoiding full or partial payment.
Fraud is a major concern for all telecom operators /providers as it
directly linked with revenue fall.
Avialable Products:
- Subex Nikira Fraud Management System
- MEGS Optel Fraud Management System
- Neural Fraud Management System
Bill Spreading Fraud
Call Sell Fraud
Roaming Fraud
Prepaid Fraud
Cloning Fraud
SIM Box/Bypass Fraud
PRS Fraud
Wangiri Fraud
Non Authorized Content Broadcast
Distribution of Illegal or Unwanted Content
P2P Content Reselling
Video Share
Mobile/ Smartphone Malware
Consumption of Network Resources with no revenue or ability to bill
Change of billing model making it impossible to bill
ID Spoofing (Access and Services Identity)
‱ DDoS  The target network is flooded by traffic of multiple sources.
‱ Ping Flood  A large volume of ping packets causes a
network to crash. In a “ Ping of death ” malformed ping requests
are used.
‱ Replay Attack  The attacker intercepts legitimate signaling
traffic & retransmits it until the network is over whelmed.
‱ SQL Injection  The attacker sends malicious commands in
statement to SQL database to make unauthorized changes to the
database or to get a copy of the database.
‱ DNS Hijacking  The attacker redirects DNS queries to a rogue DNS
server.
A distributed denial of service (DoS) attack, or DDoS, is
much like the ping flood method, only multiple computers are being
used. In this instance, the computers that are being used may or
may not be aware of the fact that they are attacking a website or
network. Trojans and viruses commonly give the hacker control of a
computer, and thus, the ability to use them for attack. In this case
the victim computers are called zombies.
A DDoS attack is very tough to overcome. The first thing to do is
to contact your hosting provider or internet service provider,
depending on what is under attack. They will usually be able to filter
out the bulk of the traffic based on where it’s coming from. For more
large-scale attacks, you’ll have to become more creative.
If you have access to your router, enter the following command into
your router command prompt : No IP verify unicast reverse-path.
This will ensure that attackers can’t spoof their IP address.
The most basic of attacks is the Ping flood attack. It relies on the
ICMP echo command, more popularly known as ping . In legitimate
situations the ping command is used by network administrators to
test connectivity between two computers. In the ping flood attack, it
is used to flood large amounts of data packets to the victim’s
computer in an attempt to overload it. You can see an example of
the ping flood attack below.
Reconfigure your perimeter router or firewall to disallow ICMP echo
requests (pings) on your internal network. This configuration will
prevent flood attacks that originate from outside your network, but it
will not prevent internal flood attacks.
A replay attack is a form of network attack in which a valid data
transmission is maliciously or fraudulently repeated or delayed. This is
carried out either by the originator or by an adversary who intercepts the
data and retransmits it, possibly as part of a masquerade attacks by IP
packet substitution.
Encapsulating Security Payload (ESP) can protect against replay
attacks by using a mathematically generated sequence number.
When a packet is sent to a recipient, the recipient extracts the
sequence number and records the sequence number in a table.
Now, suppose a hacker captured and replayed a packet. The
recipient would extract the sequence number and compare it
against the table that it has been recording. But the packet's
sequence number will already exist in the table, so the packet is
assumed to be fraudulent and is therefore discarded.
An SQL Injection (also known as "Failure to Preserve SQL Query
Structure") is one of the most common and most dangerous security
issues. SQL injections are dangerous because they are a door wide
open to hackers to enter your system through your Web interface
and to do whatever they please - i.e. delete tables, modify
databases, even get hold of your corporate network. SQL injections
are a programming error and they have nothing to do with your web
site hosting provider.
Prevent an SQL Injection
‱Install patches regularly and timely.
‱Use automated test tools for SQL injections.
‱Remove all functionality you don't use.
DNS hijacking or DNS redirection is the practice of subverting
the resolution of Domain Name System (DNS) queries. This can be
achieved by malware that overrides a computer's TCP/IP
configuration to point at a rogue DNS server under the control of an
attacker, or through modifying the behavior of a trusted DNS server
so that it does not comply with internet standards.
‱To change your DNS servers
‱To use the HTTPS connection
HTTPS will be harder for ISPs to hijack and redirect your queries.
‱Knowledge on NGN network Fraud environment.
‱New detection techniques.
Effective fraud detection means identifying fraud accurately, with no
false alarms.
This requires a combination of excellent systems, expert people,
good global intelligence and efficient processes, every hour of the
day and every day of the year.
Flexibility : The FMS must be application independent to detect any type
of fraud for any type of service, regardless of its underlying technology. The
FMS architecture must also be flexible to enable the easy addition, removal
and update of fraud detection algorithms to accommodate changing fraud
scenarios.
Complete network coverage : The FMS needs to analyze all the data
flowing through all the different access points in NGNs. Indeed, due to the
availability of several access mechanisms in NGNs(e.g. wire, wireless,
cable, modem), fraud attacks can be launched from various access points
simultaneously.
Scalability : New fraud scenarios will appear, which implies that more
fraud rules will have to be added to the FMS detection engine. The number
of billing records to inspect will also increase with the new service offered.
The FMS architecture must be able to easily scale up or down to
accommodate the dynamic NGN environment.
‱Use network intelligence and visibility of real-time traffic patterns to
improve detection of malicious attacks and accidental traffic floods, And
to understand how they impact the mobile network.
‱Adopt scalable, distributed, and flexible security solutions to smoothly
manage the transition to more porous IP - based LTE networks, keep
up with the increase in user and signaling traffic volume, and cope with
advanced policy, QoS and charging tools.
‱Strengthen protection of corporate networks, which are increasingly
accessed by mobile devices that are often outside the control of IT
managers.
We know the rules which we are currently applying to detect the
existing frauds. For NGN fraud we can use the new technique of fraud
detection by using an example given below :
International call scenario –
Call frequency: 229 calls made in 4 minutes; frequency is 57/min,
50/min is used as threshold.
Count of dialed numbers: 100 different numbers were dialed from
the same number, 50 is used as threshold.
Rule : If call type = International
And count dialed number from the same reference X > 50
And call frequency from X > 50
And average call duration from X < 20 s
Then alert on likely for analyst.
As an industry we need to review the structure and design of our
fraud teams in order to ensure maximum effectiveness and delivery
for our organizations.
In order to target success in our fight against frauds we must ensure
we have:
Appropriate Structure Develop fraud awareness
Correct focus & strategy Exchange intelligence & best
practice
Appropriate skill sets Assess the fraud exposure of
new services
Appropriate tools Collaborate with other GSMA
working groups and projects
Thank YouThank You

Weitere Àhnliche Inhalte

Was ist angesagt?

Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
Information Technology
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentation
acaiani
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
Rajesh Thakur
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
DĂąn ChÆĄi
 

Was ist angesagt? (20)

Topic22
Topic22Topic22
Topic22
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Deep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test MethodologyDeep Packet Inspection (DPI) Test Methodology
Deep Packet Inspection (DPI) Test Methodology
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Speedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhanSpeedy ip trace back(sipt) for identifying sadhan
Speedy ip trace back(sipt) for identifying sadhan
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
VPN
VPNVPN
VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Ip Guardian customer presentation
Ip Guardian customer presentationIp Guardian customer presentation
Ip Guardian customer presentation
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 
Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overview
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
Network security
Network securityNetwork security
Network security
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 

Andere mochten auch

Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
EC-Council
 
presentacion en power point sobre el manual de convivencia
presentacion en power point sobre el manual de convivenciapresentacion en power point sobre el manual de convivencia
presentacion en power point sobre el manual de convivencia
JosselinRomero
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9
eel4514team9
 
Analisis dan penafsiran data
Analisis dan penafsiran dataAnalisis dan penafsiran data
Analisis dan penafsiran data
huuriyahbahiirah
 

Andere mochten auch (19)

Overview and Basics of LTE
Overview and Basics of LTEOverview and Basics of LTE
Overview and Basics of LTE
 
RA self tuning on LTE
RA self tuning on LTERA self tuning on LTE
RA self tuning on LTE
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...
 
Lte rach configuration and capacity
Lte rach configuration and capacityLte rach configuration and capacity
Lte rach configuration and capacity
 
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
Radisys & Airspan -  Small Cells and LTE-A Webinar PresentationRadisys & Airspan -  Small Cells and LTE-A Webinar Presentation
Radisys & Airspan - Small Cells and LTE-A Webinar Presentation
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
 
presentacion en power point sobre el manual de convivencia
presentacion en power point sobre el manual de convivenciapresentacion en power point sobre el manual de convivencia
presentacion en power point sobre el manual de convivencia
 
Five Steps to Delivering a Competency-Based Development Plan
Five Steps to Delivering a Competency-Based Development PlanFive Steps to Delivering a Competency-Based Development Plan
Five Steps to Delivering a Competency-Based Development Plan
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
LTE Basics - II
LTE Basics - IILTE Basics - II
LTE Basics - II
 
Introduction to LTE
Introduction to LTEIntroduction to LTE
Introduction to LTE
 
4G LTE Presentation Group 9
4G LTE Presentation Group 94G LTE Presentation Group 9
4G LTE Presentation Group 9
 
LTE ADVANCED PPT
LTE ADVANCED PPTLTE ADVANCED PPT
LTE ADVANCED PPT
 
Analisis dan penafsiran data
Analisis dan penafsiran dataAnalisis dan penafsiran data
Analisis dan penafsiran data
 
LTE Basics
LTE BasicsLTE Basics
LTE Basics
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Ppt
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Ähnlich wie Lte and future frauds

Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Entropy based DDos Detection in SDN
Entropy based DDos Detection in SDNEntropy based DDos Detection in SDN
Entropy based DDos Detection in SDN
Vishal Vasudev
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
rock73
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
swang2010
 

Ähnlich wie Lte and future frauds (20)

Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted ConnectivitySecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
 
Proactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenProactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGen
 
Understanding SS7 Attacks and Their Implications.pdf
Understanding SS7 Attacks and Their Implications.pdfUnderstanding SS7 Attacks and Their Implications.pdf
Understanding SS7 Attacks and Their Implications.pdf
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Entropy based DDos Detection in SDN
Entropy based DDos Detection in SDNEntropy based DDos Detection in SDN
Entropy based DDos Detection in SDN
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
EFFICIENT IDENTIFICATION AND REDUCTION OF MULTIPLE ATTACKS ADD VICTIMISATION ...
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Presentation1 shweta
Presentation1 shweta Presentation1 shweta
Presentation1 shweta
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Fortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_IntroductionFortinet_FortiDDoS_Introduction
Fortinet_FortiDDoS_Introduction
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
 

KĂŒrzlich hochgeladen

KĂŒrzlich hochgeladen (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Lte and future frauds

  • 1.
  • 2. Introduction of LTE Specification, Facts & Advantage of LTE New types of threats and frauds Requirement for NGN Frauds Management System Key Takeaways Thank You
  • 3. LTE stands for Long Term Evolution and it was started as a project in 2004 by telecommunication body known as the Third Generation Partnership Project (3GPP). SAE (System Architecture Evolution) is the corresponding evolution of the GPRS/3G packet core network evolution. The term LTE is typically used to represent both LTE and SAE. The main goal of LTE is to provide a high data rate, low latency and packet optimized radio access technology supporting flexible bandwidth deployments. Same time its network architecture has been designed with the goal to support packet-switched traffic with seamless mobility and great quality of service. The LTE wireless interface is incompatible with 2G and 3G networks, so that it must be operated on a separate wireless spectrum.
  • 4. HSDPA LTE 14 Mbps DL 100 Mbps DL 5,7 Mbps UL 50 Mbps UL LTE has 10X users per cell than HSDPA
  • 5. LTE is the successor technology not only of UMTS but also of CDMA 2000. LTE is important because it will bring up to 50 times performance improvement and much better spectral efficiency to cellular networks. LTE introduced to get higher data rates, 300Mbps peak downlink and 75 Mbps peak uplink. In a 20MHz carrier, data rates beyond 300Mbps can be achieved under very good signal conditions. LTE is an ideal technology to support high date rates for the services such as voice over IP (VOIP), streaming multimedia, video conferencing or even a high-speed cellular modem. All LTE devices have to support (MIMO) Multiple Input Multiple Output transmissions, which allow the base station to transmit several data streams over the same carrier simultaneously.
  • 6. High throughput: High data rates can be achieved in both downlink as well as uplink. This causes high throughput. Low latency: Time required to connect to the network is in range of a few hundred milliseconds and power saving states can now be entered and exited very quickly. Seamless Connection: LTE will also support seamless connection to existing networks such as GSM, CDMA and WCDMA. FDD and TDD in the same platform: Frequency Division Duplex (FDD) and Time Division Duplex (FDD), both schemes can be used on same platform.
  • 7. Fraud management is the process of identifying, stopping or preventing situations where customers, employees or professional fraudster set out to make use of telecommunications services with the intention of avoiding full or partial payment. Fraud is a major concern for all telecom operators /providers as it directly linked with revenue fall. Avialable Products: - Subex Nikira Fraud Management System - MEGS Optel Fraud Management System - Neural Fraud Management System
  • 8. Bill Spreading Fraud Call Sell Fraud Roaming Fraud Prepaid Fraud Cloning Fraud SIM Box/Bypass Fraud PRS Fraud Wangiri Fraud
  • 9. Non Authorized Content Broadcast Distribution of Illegal or Unwanted Content P2P Content Reselling Video Share Mobile/ Smartphone Malware Consumption of Network Resources with no revenue or ability to bill Change of billing model making it impossible to bill ID Spoofing (Access and Services Identity)
  • 10. ‱ DDoS  The target network is flooded by traffic of multiple sources. ‱ Ping Flood  A large volume of ping packets causes a network to crash. In a “ Ping of death ” malformed ping requests are used. ‱ Replay Attack  The attacker intercepts legitimate signaling traffic & retransmits it until the network is over whelmed. ‱ SQL Injection  The attacker sends malicious commands in statement to SQL database to make unauthorized changes to the database or to get a copy of the database. ‱ DNS Hijacking  The attacker redirects DNS queries to a rogue DNS server.
  • 11. A distributed denial of service (DoS) attack, or DDoS, is much like the ping flood method, only multiple computers are being used. In this instance, the computers that are being used may or may not be aware of the fact that they are attacking a website or network. Trojans and viruses commonly give the hacker control of a computer, and thus, the ability to use them for attack. In this case the victim computers are called zombies.
  • 12. A DDoS attack is very tough to overcome. The first thing to do is to contact your hosting provider or internet service provider, depending on what is under attack. They will usually be able to filter out the bulk of the traffic based on where it’s coming from. For more large-scale attacks, you’ll have to become more creative. If you have access to your router, enter the following command into your router command prompt : No IP verify unicast reverse-path. This will ensure that attackers can’t spoof their IP address.
  • 13. The most basic of attacks is the Ping flood attack. It relies on the ICMP echo command, more popularly known as ping . In legitimate situations the ping command is used by network administrators to test connectivity between two computers. In the ping flood attack, it is used to flood large amounts of data packets to the victim’s computer in an attempt to overload it. You can see an example of the ping flood attack below.
  • 14. Reconfigure your perimeter router or firewall to disallow ICMP echo requests (pings) on your internal network. This configuration will prevent flood attacks that originate from outside your network, but it will not prevent internal flood attacks.
  • 15. A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attacks by IP packet substitution.
  • 16. Encapsulating Security Payload (ESP) can protect against replay attacks by using a mathematically generated sequence number. When a packet is sent to a recipient, the recipient extracts the sequence number and records the sequence number in a table. Now, suppose a hacker captured and replayed a packet. The recipient would extract the sequence number and compare it against the table that it has been recording. But the packet's sequence number will already exist in the table, so the packet is assumed to be fraudulent and is therefore discarded.
  • 17. An SQL Injection (also known as "Failure to Preserve SQL Query Structure") is one of the most common and most dangerous security issues. SQL injections are dangerous because they are a door wide open to hackers to enter your system through your Web interface and to do whatever they please - i.e. delete tables, modify databases, even get hold of your corporate network. SQL injections are a programming error and they have nothing to do with your web site hosting provider. Prevent an SQL Injection ‱Install patches regularly and timely. ‱Use automated test tools for SQL injections. ‱Remove all functionality you don't use.
  • 18. DNS hijacking or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behavior of a trusted DNS server so that it does not comply with internet standards. ‱To change your DNS servers ‱To use the HTTPS connection HTTPS will be harder for ISPs to hijack and redirect your queries.
  • 19. ‱Knowledge on NGN network Fraud environment. ‱New detection techniques. Effective fraud detection means identifying fraud accurately, with no false alarms. This requires a combination of excellent systems, expert people, good global intelligence and efficient processes, every hour of the day and every day of the year.
  • 20. Flexibility : The FMS must be application independent to detect any type of fraud for any type of service, regardless of its underlying technology. The FMS architecture must also be flexible to enable the easy addition, removal and update of fraud detection algorithms to accommodate changing fraud scenarios. Complete network coverage : The FMS needs to analyze all the data flowing through all the different access points in NGNs. Indeed, due to the availability of several access mechanisms in NGNs(e.g. wire, wireless, cable, modem), fraud attacks can be launched from various access points simultaneously. Scalability : New fraud scenarios will appear, which implies that more fraud rules will have to be added to the FMS detection engine. The number of billing records to inspect will also increase with the new service offered. The FMS architecture must be able to easily scale up or down to accommodate the dynamic NGN environment.
  • 21. ‱Use network intelligence and visibility of real-time traffic patterns to improve detection of malicious attacks and accidental traffic floods, And to understand how they impact the mobile network. ‱Adopt scalable, distributed, and flexible security solutions to smoothly manage the transition to more porous IP - based LTE networks, keep up with the increase in user and signaling traffic volume, and cope with advanced policy, QoS and charging tools. ‱Strengthen protection of corporate networks, which are increasingly accessed by mobile devices that are often outside the control of IT managers.
  • 22. We know the rules which we are currently applying to detect the existing frauds. For NGN fraud we can use the new technique of fraud detection by using an example given below : International call scenario – Call frequency: 229 calls made in 4 minutes; frequency is 57/min, 50/min is used as threshold. Count of dialed numbers: 100 different numbers were dialed from the same number, 50 is used as threshold. Rule : If call type = International And count dialed number from the same reference X > 50 And call frequency from X > 50 And average call duration from X < 20 s Then alert on likely for analyst.
  • 23. As an industry we need to review the structure and design of our fraud teams in order to ensure maximum effectiveness and delivery for our organizations. In order to target success in our fight against frauds we must ensure we have: Appropriate Structure Develop fraud awareness Correct focus & strategy Exchange intelligence & best practice Appropriate skill sets Assess the fraud exposure of new services Appropriate tools Collaborate with other GSMA working groups and projects