SlideShare a Scribd company logo
1 of 25
Download to read offline
The Role of SBCs
in Fraud Prevention
Alan D. Percy, CMO
alan.percy@telcobridges.com
April 2022
1
2
Agenda
• Who is TelcoBridges?
• Where do we see Fraud?
• What is an SBC?
• Fraud protection use cases for SBCs
• Where to learn more?
A
D
N
E
G
A
TelcoBridges Today
• Manufacturer of VoIP gateways and
session border controller software for
telecom carriers
• Privately held
• Founded in 2002
• Employees: ~40
• Headquarters: Boucherville, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Marketing/Support:
Boucherville, Buffalo, Hong Kong, Italy,
Turkey, Colombia, Vietnam
• 24/7 technical support
Confidential
TelcoBridges HQ
138 de la Barre
Boucherville, QC
Canada
Who Buys our Products?
• Global carrier network solutions
• OEM Supplier to TEMS
• Enterprise
Confidential
5
Where Does Fraud Occur?
• Extortion
• DOS / DDOS / TDOS Attacks
• Registration floods
• Illegal Robocalls
• Impersonation / Identity Theft
• Unauthorized Brand Usage
• Wire Fraud
• Theft of Services
What is a Session Border Controller?
Network
Border
SBC
• Anywhere two SIP networks intersect
• Software-based “Network Function”
• Deployed in:
• Appliances, Virtualized, or Cloud
SIP SIP
Service
Provider
Network
Service
Provider
Network
Routing Engine
Media
Media
Engine
SIP
Session
s
B2BUA
UAS UAC
Private LAN
192.168.0.X
Public WAN
34.0.0.1
Session Border Controller
SIP
Applicatio
ns
Session Border Controller Architecture
Firewall
8
Seven Fraud Protection Cases
1. Block DOS/DDOS/TDOS attacks (extortion)
2. Illegal Robocall Detection/Blocking
3. Reputation Analytics/Blocking
4. STIR/SHAKEN Verification
5. Brand Impersonation Protection
6. Lawful Intercept & Selective Call Recording
7. Call Detail Record (CDR) Analytics
Real Attacks – Real Impact
DDoS attack cost Bandwidth.com
nearly $12 million
• Bandwidth CEO David Morken
confirmed that it was suffering
from outages … dealing with a
DDoS attack.
• “… the company estimates that
the impact of the DDoS attack
may reduce CPaaS revenue for
the full year of 2021 by an
amount between $9 million and
$12 million, …"
9
DOS/DDOS/Intrusion Prevention
Network
Border
Service
Provider
Network
Detects and deflects
DOS/DDOS/TDOS and Registration Floods
Real-Time
Internet
TDOS Attacks
• Major car dealership chain in
Florida
• Phone lines were flooded with
calls, tying up their lines and
people
• Most had mal-formed numbers
• Blocking mal-formed numbers
allowed good calls to get
through
11
Mal-formed Number Screening
12
SIP
Interconnect
Carrier(s)
Service Provider
Is Calling #
a valid format?
(NPA) NXX-XXXX
Subscriber
Real-Time
SoftSwitch
Robocalls - Neighbor Spoofing
• Offender makes calls using a
similar telephone number to
the called party
• Increases answer rate
• Often uses in-active numbers
• Hard to prevent with black-lists
or simple pattern matching
• “Snowshoeing”
• Abuse and move on
13
Reputation Analytics
14
SIP
Interconnect
Carrier(s)
Service Provider / Enterprise
Subscriber
Reputation
Analytics
Call from:
(212) 555-1212
Score
Real-Time
SoftSwitch
STIR/SHAKEN
STIR/SHAKEN
Authentication Service
SIP SIP
Originating Service Provider
Transit
STIR/SHAKEN
Verification Service
Terminating Service Provider
Token Token
Verification Status
(verstat)
Calling from:
(212) 555-1212
Call from:
(212) 555-1212
Real-Time
SoftSwitch SoftSwitch
Brand Impersonation
• Calls that appear to be from
legitimate businesses
• Banks, financial institutions, auto
companies, and hotel chains
• Attempting to get victim to provide
personal or account information
• Goal: access to accounts
16
Brand Impersonation Protection
17
SIP
Contact Center
Enterprise
Subscriber
Agent Calling
Mobile
Carrier(s)
Bank of Akron
Bank of Akron
Calling
This is “legit”
Real-Time
Lawful Intercept
• “Wire tap”
• Terrorism, financial crimes,
conspiracy, insurrection
• Requested by Law
Enforcement
• Requires court order
• Record either:
• Call traffic/meta data
• Actual voice calls
18
Lawful Intercept/Recording
19
SIP
Interconnect
Carrier(s)
Service Provider
Subscriber
Law Enforcement
“Record any call
to/from
(212) 555-1212”
Call
Details or
Audio
Recording
ETSI 201 671 v3-1-1
Real-Time
SoftSwitch
Telecom Service Provider “Supervision”
• TRACED Act makes ignoring
illegal traffic a crime
• Offending service providers are
being charged/convicted
• Court and plaintiff agree to a
“consent decree”
• Appoints a third-party to
monitor call traffic
• Essentially a “Telecom ankle
monitor”
20
Call Detail Records
21
SIP
Interconnect
Carrier(s)
Service Provider
Subscriber
Call Detail
Records
(CDR)
Law Enforcement
CDR
Analytics
Non-Real-Time
SoftSwitch
BONUS
REAL-WORLD STORY
22
23
Real-world Story
• VoIP service provider
• Credit check all good
• Issues numbers – “A” attestation
• Two weeks – numbers get blocked
• Identity was stolen
• Payment bounced
• Offender tried again!
Video Library on YouTube
• ProSBC Training Modules
• Recorded webinars
• How-to Tutorials
• Customer interviews
• Frequently Asked Questions
• Recorded podcasts
• And more…
24
youtube.com/telcobridges
Enabling the Migration to
Cloud Communications
25
apercy@telcobridges.com
www.telcobridges.com
Youtube.com/telcobridges
Q/A

More Related Content

Similar to The Role of SBCs in Preventing Telecom Fraud

How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeAlan Percy
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023lindsey601888
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdfLilminow
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQAlan Percy
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENTelcoBridges Inc.
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths DebunkedJive Communications
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPROIDEA
 
Dialstreet presentation
Dialstreet presentationDialstreet presentation
Dialstreet presentationTanya Kumbhat
 
Brander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address BlocksBrander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address BlocksJakeIskhakov
 
Effective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayEffective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayDonaldStDenis1
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCAlan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCTelcoBridges Inc.
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths DebunkedJive Communications
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP Fatih Ozavci
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Carl Blume
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profileDev IPage
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
Elision company presentation
Elision company presentationElision company presentation
Elision company presentationdialshree
 
Voxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Corp
 

Similar to The Role of SBCs in Preventing Telecom Fraud (20)

How to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-TimeHow to Prevent Telecom Fraud in Real-Time
How to Prevent Telecom Fraud in Real-Time
 
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
SHAKEN without the EARTHQUAKE - Blocking calls with STIR/SHAKEN in 2023
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
2019_USA RSAConference_stir-shake-n-sip-to-stop-robocalling.pdf
 
STIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQ
 
Battling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKEN
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP SecurityPLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
 
Dialstreet presentation
Dialstreet presentationDialstreet presentation
Dialstreet presentation
 
Brander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address BlocksBrander Group Buy IPv4 Address Blocks
Brander Group Buy IPv4 Address Blocks
 
Effective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayEffective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work Today
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP VoIP Wars : Return of the SIP
VoIP Wars : Return of the SIP
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profile
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Elision company presentation
Elision company presentationElision company presentation
Elision company presentation
 
Voxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactionsVoxeo Summit Day 2 - Securing customer interactions
Voxeo Summit Day 2 - Securing customer interactions
 

More from TelcoBridges Inc.

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesTelcoBridges Inc.
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTelcoBridges Inc.
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsTelcoBridges Inc.
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesTelcoBridges Inc.
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityTelcoBridges Inc.
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsTelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToTelcoBridges Inc.
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media GatewaysTelcoBridges Inc.
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialTelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsTelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsTelcoBridges Inc.
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANTelcoBridges Inc.
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENTelcoBridges Inc.
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQTelcoBridges Inc.
 

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 
Extending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRANExtending the Life of your SS7 Network with SIGTRAN
Extending the Life of your SS7 Network with SIGTRAN
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Session Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQSession Border Controllers - Top 10 FAQ
Session Border Controllers - Top 10 FAQ
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

The Role of SBCs in Preventing Telecom Fraud

  • 1. The Role of SBCs in Fraud Prevention Alan D. Percy, CMO alan.percy@telcobridges.com April 2022 1
  • 2. 2 Agenda • Who is TelcoBridges? • Where do we see Fraud? • What is an SBC? • Fraud protection use cases for SBCs • Where to learn more? A D N E G A
  • 3. TelcoBridges Today • Manufacturer of VoIP gateways and session border controller software for telecom carriers • Privately held • Founded in 2002 • Employees: ~40 • Headquarters: Boucherville, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Marketing/Support: Boucherville, Buffalo, Hong Kong, Italy, Turkey, Colombia, Vietnam • 24/7 technical support Confidential TelcoBridges HQ 138 de la Barre Boucherville, QC Canada
  • 4. Who Buys our Products? • Global carrier network solutions • OEM Supplier to TEMS • Enterprise Confidential
  • 5. 5 Where Does Fraud Occur? • Extortion • DOS / DDOS / TDOS Attacks • Registration floods • Illegal Robocalls • Impersonation / Identity Theft • Unauthorized Brand Usage • Wire Fraud • Theft of Services
  • 6. What is a Session Border Controller? Network Border SBC • Anywhere two SIP networks intersect • Software-based “Network Function” • Deployed in: • Appliances, Virtualized, or Cloud SIP SIP Service Provider Network Service Provider Network
  • 7. Routing Engine Media Media Engine SIP Session s B2BUA UAS UAC Private LAN 192.168.0.X Public WAN 34.0.0.1 Session Border Controller SIP Applicatio ns Session Border Controller Architecture Firewall
  • 8. 8 Seven Fraud Protection Cases 1. Block DOS/DDOS/TDOS attacks (extortion) 2. Illegal Robocall Detection/Blocking 3. Reputation Analytics/Blocking 4. STIR/SHAKEN Verification 5. Brand Impersonation Protection 6. Lawful Intercept & Selective Call Recording 7. Call Detail Record (CDR) Analytics
  • 9. Real Attacks – Real Impact DDoS attack cost Bandwidth.com nearly $12 million • Bandwidth CEO David Morken confirmed that it was suffering from outages … dealing with a DDoS attack. • “… the company estimates that the impact of the DDoS attack may reduce CPaaS revenue for the full year of 2021 by an amount between $9 million and $12 million, …" 9
  • 10. DOS/DDOS/Intrusion Prevention Network Border Service Provider Network Detects and deflects DOS/DDOS/TDOS and Registration Floods Real-Time Internet
  • 11. TDOS Attacks • Major car dealership chain in Florida • Phone lines were flooded with calls, tying up their lines and people • Most had mal-formed numbers • Blocking mal-formed numbers allowed good calls to get through 11
  • 12. Mal-formed Number Screening 12 SIP Interconnect Carrier(s) Service Provider Is Calling # a valid format? (NPA) NXX-XXXX Subscriber Real-Time SoftSwitch
  • 13. Robocalls - Neighbor Spoofing • Offender makes calls using a similar telephone number to the called party • Increases answer rate • Often uses in-active numbers • Hard to prevent with black-lists or simple pattern matching • “Snowshoeing” • Abuse and move on 13
  • 14. Reputation Analytics 14 SIP Interconnect Carrier(s) Service Provider / Enterprise Subscriber Reputation Analytics Call from: (212) 555-1212 Score Real-Time SoftSwitch
  • 15. STIR/SHAKEN STIR/SHAKEN Authentication Service SIP SIP Originating Service Provider Transit STIR/SHAKEN Verification Service Terminating Service Provider Token Token Verification Status (verstat) Calling from: (212) 555-1212 Call from: (212) 555-1212 Real-Time SoftSwitch SoftSwitch
  • 16. Brand Impersonation • Calls that appear to be from legitimate businesses • Banks, financial institutions, auto companies, and hotel chains • Attempting to get victim to provide personal or account information • Goal: access to accounts 16
  • 17. Brand Impersonation Protection 17 SIP Contact Center Enterprise Subscriber Agent Calling Mobile Carrier(s) Bank of Akron Bank of Akron Calling This is “legit” Real-Time
  • 18. Lawful Intercept • “Wire tap” • Terrorism, financial crimes, conspiracy, insurrection • Requested by Law Enforcement • Requires court order • Record either: • Call traffic/meta data • Actual voice calls 18
  • 19. Lawful Intercept/Recording 19 SIP Interconnect Carrier(s) Service Provider Subscriber Law Enforcement “Record any call to/from (212) 555-1212” Call Details or Audio Recording ETSI 201 671 v3-1-1 Real-Time SoftSwitch
  • 20. Telecom Service Provider “Supervision” • TRACED Act makes ignoring illegal traffic a crime • Offending service providers are being charged/convicted • Court and plaintiff agree to a “consent decree” • Appoints a third-party to monitor call traffic • Essentially a “Telecom ankle monitor” 20
  • 21. Call Detail Records 21 SIP Interconnect Carrier(s) Service Provider Subscriber Call Detail Records (CDR) Law Enforcement CDR Analytics Non-Real-Time SoftSwitch
  • 23. 23 Real-world Story • VoIP service provider • Credit check all good • Issues numbers – “A” attestation • Two weeks – numbers get blocked • Identity was stolen • Payment bounced • Offender tried again!
  • 24. Video Library on YouTube • ProSBC Training Modules • Recorded webinars • How-to Tutorials • Customer interviews • Frequently Asked Questions • Recorded podcasts • And more… 24 youtube.com/telcobridges
  • 25. Enabling the Migration to Cloud Communications 25 apercy@telcobridges.com www.telcobridges.com Youtube.com/telcobridges Q/A