SlideShare a Scribd company logo
1 of 35
Download to read offline
An Introduction
and Closer Look
1
June 2019
2
Today’s Presenters:
Alan D Percy
CMO at TelcoBridges
alan.percy@telcobridges.com
Mike Stukalin
VP of Sales at JeraSoft
mike@jerasoft.net
3
Agenda
• Introductions
• Impact of Telecom Fraud
• Fraud Methods and Attack Profiles
• Real-Time Fraud Protection
• How to Implement Fraud Detection and Prevention
• Where to Learn More
• Your Questions
Billing Solution for Telecom Industry
JeraSoft is a passionate team of engineers focused on
development and integration of highly productive Billing
Solutions for Telecom (Mobile VoIP, Business Telephony,
OTT, Wholesale VoIP and SMS) and IoT/M2M Providers
around the world.
Since 2005 JeraSoft has been putting together key insight
and successful billing management practices, combining
them with state-of-the-art web and telecom technologies.
The result is a powerful platform the Telecom and IoT
Providers can use to streamline Billing Processes and add
value to their business.
About Us
Solutions
IoT / M2M Retail VoIP Wholesale VoIP
OTT
SMS Wholesale MVNO
Business
Telephony
Mobile VoIP
Components
An extensive software, allowing you
to provide services like Enterprise
Telephony, OTT, MVNO, End-user
retail, etc.
Retail
Services
This module contains Rates
Generator and Rates Notifications
features, allowing you to compose a
rates list and run notifications.
Dynamic
Routing
A feature that allows you to run
your business more efficiently by
providing automated management
of your routes.
Rates Management Jurisdictional Billing
An extra module that supports
domestic long distance calls in the
USA— phone calls made outside
a certain local call area and
LATAs.
According to the Communications Fraud Control Association
(CFCA) in their 2017 survey of telecom fraud loss, organizations
and carriers were hit with losses of $29.2 billion in 2017.
Cost of Telecom Fraud for the Industry
Source: Communications Fraud Control Association (CFCA)
The Real Cost of Telecommunications Fraud
Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA
shook out:
Source: Communications Fraud Control Association (CFCA)
Fraudsters’ Targets
Fraud against service providers. In this case fraud scenarios are more
complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes.
Fraud against customers. This scenario assumes any case of gaining access to
customer’s account in order to make free calls.
Generally there are two categories to distinguish between major telecom fraud scenarios,
accordingly to the fraudsters’ target:
Target: Service Providers
Call transfer fraud
Wholesale SIP trunking fraud
False answer supervision (FAS)
Location routing number fraud
Multiple transfer fraud
Call forwarding fraud
Traffic pumping and related
services
International revenue sharing
fraud (IRSF)
Target: Customers
Telecom denial-of-service (TDOS)
Vishing (Voice fishing)
Account takeover, etc
Callback (Wangiri) scam
Real-time fraud protection
Before the call is connected
Uses real-time patterns
Works on per-call basis
Scenario:
1. Alert notification
2. Specific call blocking
Real-time VS Non Real-time Fraud
Protection
Non real-time fraud protection
After the call is connected
Uses statistics analysis
Works on array of calls
Scenario:
1. Alert notification
2. Client / Destination blocking
Double Fraud Protection
The right combination of Billing platform and an SBC allows:
● Fraud prevention and protection for service providers.
AND
● Fraud prevention and protection for end customers.
Double Fraud Protection
Abnormal expenses pattern scenario
Allows to protect from unusual financial spending.
Quality statistics control
Monitoring and controlling call quality.
Abnormal usage behaviour (geo)
Enables unusual usage behavior protection connected with call destination.
Balance usage and Capacity control
The customer may set the limits for account balance, the calls will stop after the
amount set will be spent.
Allows to limit the number of calls from 1 account. Unusual behavior and patterns
are analysed by soft switch.
JeraSoft Billing Fraud Protection Scenarios
• Customers are protected against financial losses.
• Service providers improve customer satisfaction and
revenue retention while protecting themselves and end-
customers from financial damage.
• Today’s communications business can’t afford to
operate without a comprehensive fraud protection.
Benefits of Fraud Protection
Let us help you make the right choice for your Billing needs and
Fraud protection scenarios
UK+44 (203) 129-9126
US+1 (415) 520-7883
info@jerasoft.net
www.jerasoft.net
TelcoBridges Inc.
19
Confidential
Roll of SBCs in Real-Time Billing
TelcoBridges Inc.
• Manufacturer of VoIP gateways and
telecom solution platforms for carriers
• Privately held
• Founded in 2002
• Employees: ~35
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Poland, Turkey, Hong Kong
• 24/7 technical support
20
TelcoBridges HQ
21
IPRN Fraud Infographic
International Premium Rate Numbers
https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
Common Billing Interfaces
Call Detail Records (CDR)
• Record details of each call
• Text file (CSV)
• Batch processing
• Not Real-time
• No Authentication
• No Ability to Route Calls
RADIUS
Confidential 22
• RFC 2865 and RFC 2966
• IP-based
• Multiple Transactions per Call
• Real-Time processing
• Authentication per Call
• Supports Forwarding/Routing
• Session Duration Timeout
23
Service Provider Networks
Confidential
Billing
IPX
PSTN
IPX
PSTN
SoftSwitch
Trunking
Subscribers
RADIUS
Links
Egress
SBC or
Gateway
Ingress
SBC or
Gateway
24
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Route to
PSTN, no
time limit
I’d like to
make a
call…
25
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Bad number,
do not route
26
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Accept
(Route, Duration…)
Accounting-Request
(Start time, End time, Route…)
When a Call Request is Accepted:
Accounting-Response
.
.
.
27
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Reject
Accounting-Request
(Start time, End time, Duration=0)
Accounting-Response
When a Call Request is Rejected:
GEO Redundancy
SBC or
Gateway
SBC or
Gateway
Billing Billing
TelcoBridges Portfolio
Confidential 29
Signaling and
Media Gateways
TMG800
Virtualized
Session Border Controller
Software
Support and
Professional
Services
TMG3200
TMG7800
30
SBC Product Positioning
 Tier 1/2/3 Service Providers and Enterprise
 Access, Peering, SaaS…
 CDR and RADIUS Support
 Commercial Applications
 Encryption & HA Support
 Live Support w/ 24/7 opt.
 $1/Session/Year
31
Learn More:
Download your ProSBC software:
www.prosbc.com
Frequently Asked Questions at:
forums.freesbc.com
Other educational webinars at:
YouTube.com/telcobridges
Q/A
BONUS CONTENT
32
Confidential
Why JeraSoft?
Providing Stable Billing
Solution for 14 Years
Serving 250+ Clients in
35 Countries
Configured Specially
for Your Business
100% Integration
with
Third Party Systems
Industry Leading
24/7 Support Team
Customized License
Options and Components
Full Training and
Dedicated Initial Help
New Feature-Rich Releases
Throughout the Year
34
Impact of Fraud
• Fraud is costing the industry
$17bn in lost revenues every
year, with the proceeds being
used to finance organized crime
and terrorism.
- Financial Times
• The Department of Social Affairs
in Ireland was defrauded to the
tune of €300,000.
- Ireland Comptroller and Auditor General
Source: siliconrepublic.com/comms/telecoms-fraud
35
Methods of Telecom Fraud
• Billing Fraud
• Subscription Fraud
• Assaulting security weaknesses
• Credit Card Fraud
• Network Fraud
• Bypass Fraud
• Hacking IP Addresses
• Call Forwarding and other attacks
https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf

More Related Content

Similar to How to Prevent Telecom Fraud in Real-Time

Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsHow Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsThousandEyes
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overviewvismayibhat
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5Shobhit Srivastava
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_FinancialAnthony Whittle
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths DebunkedJive Communications
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Carl Blume
 
How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)Greg Naderi
 
101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)Greg Naderi
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profileDev IPage
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profilersaini12
 
Dial shree presentation
Dial shree presentationDial shree presentation
Dial shree presentationdialshree
 
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...Alan Quayle
 
tw telecom Overview
tw telecom Overviewtw telecom Overview
tw telecom Overviewjlburns222
 

Similar to How to Prevent Telecom Fraud in Real-Time (20)

Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsHow Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overview
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)
 
101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)
 
Srikanth-Resume
Srikanth-ResumeSrikanth-Resume
Srikanth-Resume
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profile
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profile
 
Dial shree presentation
Dial shree presentationDial shree presentation
Dial shree presentation
 
Managed Services For Telecom Operators
Managed Services For Telecom OperatorsManaged Services For Telecom Operators
Managed Services For Telecom Operators
 
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
 
tw telecom Overview
tw telecom Overviewtw telecom Overview
tw telecom Overview
 

More from TelcoBridges Inc.

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesTelcoBridges Inc.
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionTelcoBridges Inc.
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTelcoBridges Inc.
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?TelcoBridges Inc.
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsTelcoBridges Inc.
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesTelcoBridges Inc.
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCTelcoBridges Inc.
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityTelcoBridges Inc.
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsTelcoBridges Inc.
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media GatewaysTelcoBridges Inc.
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksTelcoBridges Inc.
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialTelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsTelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsTelcoBridges Inc.
 

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud Protection
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

How to Prevent Telecom Fraud in Real-Time

  • 1. An Introduction and Closer Look 1 June 2019
  • 2. 2 Today’s Presenters: Alan D Percy CMO at TelcoBridges alan.percy@telcobridges.com Mike Stukalin VP of Sales at JeraSoft mike@jerasoft.net
  • 3. 3 Agenda • Introductions • Impact of Telecom Fraud • Fraud Methods and Attack Profiles • Real-Time Fraud Protection • How to Implement Fraud Detection and Prevention • Where to Learn More • Your Questions
  • 4. Billing Solution for Telecom Industry
  • 5. JeraSoft is a passionate team of engineers focused on development and integration of highly productive Billing Solutions for Telecom (Mobile VoIP, Business Telephony, OTT, Wholesale VoIP and SMS) and IoT/M2M Providers around the world. Since 2005 JeraSoft has been putting together key insight and successful billing management practices, combining them with state-of-the-art web and telecom technologies. The result is a powerful platform the Telecom and IoT Providers can use to streamline Billing Processes and add value to their business. About Us
  • 6. Solutions IoT / M2M Retail VoIP Wholesale VoIP OTT SMS Wholesale MVNO Business Telephony Mobile VoIP
  • 7. Components An extensive software, allowing you to provide services like Enterprise Telephony, OTT, MVNO, End-user retail, etc. Retail Services This module contains Rates Generator and Rates Notifications features, allowing you to compose a rates list and run notifications. Dynamic Routing A feature that allows you to run your business more efficiently by providing automated management of your routes. Rates Management Jurisdictional Billing An extra module that supports domestic long distance calls in the USA— phone calls made outside a certain local call area and LATAs.
  • 8. According to the Communications Fraud Control Association (CFCA) in their 2017 survey of telecom fraud loss, organizations and carriers were hit with losses of $29.2 billion in 2017. Cost of Telecom Fraud for the Industry Source: Communications Fraud Control Association (CFCA)
  • 9. The Real Cost of Telecommunications Fraud Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA shook out: Source: Communications Fraud Control Association (CFCA)
  • 10. Fraudsters’ Targets Fraud against service providers. In this case fraud scenarios are more complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes. Fraud against customers. This scenario assumes any case of gaining access to customer’s account in order to make free calls. Generally there are two categories to distinguish between major telecom fraud scenarios, accordingly to the fraudsters’ target:
  • 11. Target: Service Providers Call transfer fraud Wholesale SIP trunking fraud False answer supervision (FAS) Location routing number fraud Multiple transfer fraud Call forwarding fraud Traffic pumping and related services International revenue sharing fraud (IRSF)
  • 12. Target: Customers Telecom denial-of-service (TDOS) Vishing (Voice fishing) Account takeover, etc Callback (Wangiri) scam
  • 13. Real-time fraud protection Before the call is connected Uses real-time patterns Works on per-call basis Scenario: 1. Alert notification 2. Specific call blocking Real-time VS Non Real-time Fraud Protection Non real-time fraud protection After the call is connected Uses statistics analysis Works on array of calls Scenario: 1. Alert notification 2. Client / Destination blocking
  • 14. Double Fraud Protection The right combination of Billing platform and an SBC allows: ● Fraud prevention and protection for service providers. AND ● Fraud prevention and protection for end customers.
  • 16. Abnormal expenses pattern scenario Allows to protect from unusual financial spending. Quality statistics control Monitoring and controlling call quality. Abnormal usage behaviour (geo) Enables unusual usage behavior protection connected with call destination. Balance usage and Capacity control The customer may set the limits for account balance, the calls will stop after the amount set will be spent. Allows to limit the number of calls from 1 account. Unusual behavior and patterns are analysed by soft switch. JeraSoft Billing Fraud Protection Scenarios
  • 17. • Customers are protected against financial losses. • Service providers improve customer satisfaction and revenue retention while protecting themselves and end- customers from financial damage. • Today’s communications business can’t afford to operate without a comprehensive fraud protection. Benefits of Fraud Protection
  • 18. Let us help you make the right choice for your Billing needs and Fraud protection scenarios UK+44 (203) 129-9126 US+1 (415) 520-7883 info@jerasoft.net www.jerasoft.net
  • 19. TelcoBridges Inc. 19 Confidential Roll of SBCs in Real-Time Billing
  • 20. TelcoBridges Inc. • Manufacturer of VoIP gateways and telecom solution platforms for carriers • Privately held • Founded in 2002 • Employees: ~35 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Poland, Turkey, Hong Kong • 24/7 technical support 20 TelcoBridges HQ
  • 21. 21 IPRN Fraud Infographic International Premium Rate Numbers https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
  • 22. Common Billing Interfaces Call Detail Records (CDR) • Record details of each call • Text file (CSV) • Batch processing • Not Real-time • No Authentication • No Ability to Route Calls RADIUS Confidential 22 • RFC 2865 and RFC 2966 • IP-based • Multiple Transactions per Call • Real-Time processing • Authentication per Call • Supports Forwarding/Routing • Session Duration Timeout
  • 24. 24 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Route to PSTN, no time limit I’d like to make a call…
  • 25. 25 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Bad number, do not route
  • 26. 26 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Accept (Route, Duration…) Accounting-Request (Start time, End time, Route…) When a Call Request is Accepted: Accounting-Response . . .
  • 27. 27 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Reject Accounting-Request (Start time, End time, Duration=0) Accounting-Response When a Call Request is Rejected:
  • 28. GEO Redundancy SBC or Gateway SBC or Gateway Billing Billing
  • 29. TelcoBridges Portfolio Confidential 29 Signaling and Media Gateways TMG800 Virtualized Session Border Controller Software Support and Professional Services TMG3200 TMG7800
  • 30. 30 SBC Product Positioning  Tier 1/2/3 Service Providers and Enterprise  Access, Peering, SaaS…  CDR and RADIUS Support  Commercial Applications  Encryption & HA Support  Live Support w/ 24/7 opt.  $1/Session/Year
  • 31. 31 Learn More: Download your ProSBC software: www.prosbc.com Frequently Asked Questions at: forums.freesbc.com Other educational webinars at: YouTube.com/telcobridges Q/A
  • 33. Why JeraSoft? Providing Stable Billing Solution for 14 Years Serving 250+ Clients in 35 Countries Configured Specially for Your Business 100% Integration with Third Party Systems Industry Leading 24/7 Support Team Customized License Options and Components Full Training and Dedicated Initial Help New Feature-Rich Releases Throughout the Year
  • 34. 34 Impact of Fraud • Fraud is costing the industry $17bn in lost revenues every year, with the proceeds being used to finance organized crime and terrorism. - Financial Times • The Department of Social Affairs in Ireland was defrauded to the tune of €300,000. - Ireland Comptroller and Auditor General Source: siliconrepublic.com/comms/telecoms-fraud
  • 35. 35 Methods of Telecom Fraud • Billing Fraud • Subscription Fraud • Assaulting security weaknesses • Credit Card Fraud • Network Fraud • Bypass Fraud • Hacking IP Addresses • Call Forwarding and other attacks https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf