论文标题

呼叫者ID欺骗发射,检测和防御的研究

Research of Caller ID Spoofing Launch, Detection, and Defense

论文作者

Buriachok, Volodymyr, Sokolov, Volodymyr, TajDini, Mahyar

论文摘要

呼叫者ID模仿会产生有效的呼叫者角色,以这种方式决定从另一个客户开始。这种显然的基本攻击策略已用于开发伪造和技巧呼叫的沟通中,这带来了巨大的财务问题。不幸的是,CallerId欺骗很容易实施,但是很难保护它。此外,现在没有有效的防御解决方案。在这项研究中,建议Cive(Callee推理和验证),这是一种令人信服且可行的防守,以防止呼叫者ID欺骗。这样可以描述如何可以午餐呼叫欺骗以及在线之间描述Cive方法方法如何帮助防止这种攻击。当今的呼叫者ID欺骗可能会引起巨大的财务和政治问题,当时许多事情有时甚至有时可以通过电话进行认证和验证,例如银行批准交易或两个因素身份验证以及许多其他事情。我们认为,关键行业特别是银行和支付服务提供商应受到系统的保护,并采取一种方法来预防它,也非常重要的是,要专门学习具有特殊社交场所(例如政治家或名人)的人们,知道这种攻击已经存在。在本文中,我们实施了白宫的电话,以表明没有限制,无论您试图欺骗谁,但目的地是受害者接到电话,这使该攻击向量危险。甚至现代通信甚至4G和智能手机等设备也无法预防甚至检测到这种攻击。这项研究表明了可用的漏洞。所有实验均在孤立的模型上进行。

Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the developing communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult to have protection against it. In addition, there are not effective and defense solutions available right now. In this research it is suggested the CIVE (Callee Inference & VErification), a compelling and viable guard against Caller ID spoofing. This way it is described how it's possible to lunch call spoofing and between line describe how CIVE approach method can help to prevent somehow this kind of attacks. Caller ID Spoofing could cause huge financial and political issues special nowadays, when many things even sometimes authentication and verification are available by phone call, like banks approving transactions or two factor authentications and many other things. We believe critical industries specially banks and payment service providers should be protected against such vulnerabilities with their system and make an approach to prevent it, also it is very important to learn people specially who has special social place like politicians or celebrities to know such kind of attack are already exist. For this paper we implemented a call from white house to show there is no limitation and no matter whom you try to spoof, but destination which is the victim receive the call and that make this attack vector dangerous. And even modern communication and even devices like 4G and smart phones are not able to prevent or even detect this kind of attack. This study is a demonstration of the vulnerabilities available. All experiments were conducted on isolated mock-ups.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源