SlideShare a Scribd company logo
An Introduction
and Closer Look
1
June 2019
2
Today’s Presenters:
Alan D Percy
CMO at TelcoBridges
alan.percy@telcobridges.com
Mike Stukalin
VP of Sales at JeraSoft
mike@jerasoft.net
3
Agenda
• Introductions
• Impact of Telecom Fraud
• Fraud Methods and Attack Profiles
• Real-Time Fraud Protection
• How to Implement Fraud Detection and Prevention
• Where to Learn More
• Your Questions
Billing Solution for Telecom Industry
JeraSoft is a passionate team of engineers focused on
development and integration of highly productive Billing
Solutions for Telecom (Mobile VoIP, Business Telephony,
OTT, Wholesale VoIP and SMS) and IoT/M2M Providers
around the world.
Since 2005 JeraSoft has been putting together key insight
and successful billing management practices, combining
them with state-of-the-art web and telecom technologies.
The result is a powerful platform the Telecom and IoT
Providers can use to streamline Billing Processes and add
value to their business.
About Us
Solutions
IoT / M2M Retail VoIP Wholesale VoIP
OTT
SMS Wholesale MVNO
Business
Telephony
Mobile VoIP
Components
An extensive software, allowing you
to provide services like Enterprise
Telephony, OTT, MVNO, End-user
retail, etc.
Retail
Services
This module contains Rates
Generator and Rates Notifications
features, allowing you to compose a
rates list and run notifications.
Dynamic
Routing
A feature that allows you to run
your business more efficiently by
providing automated management
of your routes.
Rates Management Jurisdictional Billing
An extra module that supports
domestic long distance calls in the
USA— phone calls made outside
a certain local call area and
LATAs.
According to the Communications Fraud Control Association
(CFCA) in their 2017 survey of telecom fraud loss, organizations
and carriers were hit with losses of $29.2 billion in 2017.
Cost of Telecom Fraud for the Industry
Source: Communications Fraud Control Association (CFCA)
The Real Cost of Telecommunications Fraud
Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA
shook out:
Source: Communications Fraud Control Association (CFCA)
Fraudsters’ Targets
Fraud against service providers. In this case fraud scenarios are more
complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes.
Fraud against customers. This scenario assumes any case of gaining access to
customer’s account in order to make free calls.
Generally there are two categories to distinguish between major telecom fraud scenarios,
accordingly to the fraudsters’ target:
Target: Service Providers
Call transfer fraud
Wholesale SIP trunking fraud
False answer supervision (FAS)
Location routing number fraud
Multiple transfer fraud
Call forwarding fraud
Traffic pumping and related
services
International revenue sharing
fraud (IRSF)
Target: Customers
Telecom denial-of-service (TDOS)
Vishing (Voice fishing)
Account takeover, etc
Callback (Wangiri) scam
Real-time fraud protection
Before the call is connected
Uses real-time patterns
Works on per-call basis
Scenario:
1. Alert notification
2. Specific call blocking
Real-time VS Non Real-time Fraud
Protection
Non real-time fraud protection
After the call is connected
Uses statistics analysis
Works on array of calls
Scenario:
1. Alert notification
2. Client / Destination blocking
Double Fraud Protection
The right combination of Billing platform and an SBC allows:
● Fraud prevention and protection for service providers.
AND
● Fraud prevention and protection for end customers.
Double Fraud Protection
Abnormal expenses pattern scenario
Allows to protect from unusual financial spending.
Quality statistics control
Monitoring and controlling call quality.
Abnormal usage behaviour (geo)
Enables unusual usage behavior protection connected with call destination.
Balance usage and Capacity control
The customer may set the limits for account balance, the calls will stop after the
amount set will be spent.
Allows to limit the number of calls from 1 account. Unusual behavior and patterns
are analysed by soft switch.
JeraSoft Billing Fraud Protection Scenarios
• Customers are protected against financial losses.
• Service providers improve customer satisfaction and
revenue retention while protecting themselves and end-
customers from financial damage.
• Today’s communications business can’t afford to
operate without a comprehensive fraud protection.
Benefits of Fraud Protection
Let us help you make the right choice for your Billing needs and
Fraud protection scenarios
UK+44 (203) 129-9126
US+1 (415) 520-7883
info@jerasoft.net
www.jerasoft.net
TelcoBridges Inc.
19
Confidential
Roll of SBCs in Real-Time Billing
TelcoBridges Inc.
• Manufacturer of VoIP gateways and
telecom solution platforms for carriers
• Privately held
• Founded in 2002
• Employees: ~35
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Poland, Turkey, Hong Kong
• 24/7 technical support
20
TelcoBridges HQ
21
IPRN Fraud Infographic
International Premium Rate Numbers
https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
Common Billing Interfaces
Call Detail Records (CDR)
• Record details of each call
• Text file (CSV)
• Batch processing
• Not Real-time
• No Authentication
• No Ability to Route Calls
RADIUS
Confidential 22
• RFC 2865 and RFC 2966
• IP-based
• Multiple Transactions per Call
• Real-Time processing
• Authentication per Call
• Supports Forwarding/Routing
• Session Duration Timeout
23
Service Provider Networks
Confidential
Billing
IPX
PSTN
IPX
PSTN
SoftSwitch
Trunking
Subscribers
RADIUS
Links
Egress
SBC or
Gateway
Ingress
SBC or
Gateway
24
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Route to
PSTN, no
time limit
I’d like to
make a
call…
25
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Bad number,
do not route
26
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Accept
(Route, Duration…)
Accounting-Request
(Start time, End time, Route…)
When a Call Request is Accepted:
Accounting-Response
.
.
.
27
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Reject
Accounting-Request
(Start time, End time, Duration=0)
Accounting-Response
When a Call Request is Rejected:
GEO Redundancy
SBC or
Gateway
SBC or
Gateway
Billing Billing
TelcoBridges Portfolio
Confidential 29
Signaling and
Media Gateways
TMG800
Virtualized
Session Border Controller
Software
Support and
Professional
Services
TMG3200
TMG7800
30
SBC Product Positioning
 Tier 1/2/3 Service Providers and Enterprise
 Access, Peering, SaaS…
 CDR and RADIUS Support
 Commercial Applications
 Encryption & HA Support
 Live Support w/ 24/7 opt.
 $1/Session/Year
31
Learn More:
Download your ProSBC software:
www.prosbc.com
Frequently Asked Questions at:
forums.freesbc.com
Other educational webinars at:
YouTube.com/telcobridges
Q/A
BONUS CONTENT
32
Confidential
Why JeraSoft?
Providing Stable Billing
Solution for 14 Years
Serving 250+ Clients in
35 Countries
Configured Specially
for Your Business
100% Integration
with
Third Party Systems
Industry Leading
24/7 Support Team
Customized License
Options and Components
Full Training and
Dedicated Initial Help
New Feature-Rich Releases
Throughout the Year
34
Impact of Fraud
• Fraud is costing the industry
$17bn in lost revenues every
year, with the proceeds being
used to finance organized crime
and terrorism.
- Financial Times
• The Department of Social Affairs
in Ireland was defrauded to the
tune of €300,000.
- Ireland Comptroller and Auditor General
Source: siliconrepublic.com/comms/telecoms-fraud
35
Methods of Telecom Fraud
• Billing Fraud
• Subscription Fraud
• Assaulting security weaknesses
• Credit Card Fraud
• Network Fraud
• Bypass Fraud
• Hacking IP Addresses
• Call Forwarding and other attacks
https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf

More Related Content

Similar to How to Prevent Telecom Fraud in Real-Time

Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
hSenid Mobile Marketing
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsHow Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
ThousandEyes
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overviewvismayibhat
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5Shobhit Srivastava
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_FinancialAnthony Whittle
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
Jive Communications
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Carl Blume
 
How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)
Greg Naderi
 
101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)Greg Naderi
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profileDev IPage
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profile
rsaini12
 
Dial shree presentation
Dial shree presentationDial shree presentation
Dial shree presentation
dialshree
 
Managed Services For Telecom Operators
Managed Services For Telecom OperatorsManaged Services For Telecom Operators
Managed Services For Telecom Operators
Rifaat Abbas Suliman MBA,PMP,PMOC,ITIL,CDCMP
 
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Alan Quayle
 
tw telecom Overview
tw telecom Overviewtw telecom Overview
tw telecom Overview
jlburns222
 

Similar to How to Prevent Telecom Fraud in Real-Time (20)

Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsHow Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overview
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)
 
101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)
 
Srikanth-Resume
Srikanth-ResumeSrikanth-Resume
Srikanth-Resume
 
I page telecom corp profile
I page telecom corp profileI page telecom corp profile
I page telecom corp profile
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profile
 
Dial shree presentation
Dial shree presentationDial shree presentation
Dial shree presentation
 
Managed Services For Telecom Operators
Managed Services For Telecom OperatorsManaged Services For Telecom Operators
Managed Services For Telecom Operators
 
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
Powering End User Experiences with Communication APIs Nexmo, Alex Economon TA...
 
tw telecom Overview
tw telecom Overviewtw telecom Overview
tw telecom Overview
 

More from TelcoBridges Inc.

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
TelcoBridges Inc.
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud Protection
TelcoBridges Inc.
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
TelcoBridges Inc.
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
TelcoBridges Inc.
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
TelcoBridges Inc.
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
TelcoBridges Inc.
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
TelcoBridges Inc.
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
TelcoBridges Inc.
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
TelcoBridges Inc.
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
TelcoBridges Inc.
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
TelcoBridges Inc.
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
TelcoBridges Inc.
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
TelcoBridges Inc.
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
TelcoBridges Inc.
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
TelcoBridges Inc.
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
TelcoBridges Inc.
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
TelcoBridges Inc.
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
TelcoBridges Inc.
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
TelcoBridges Inc.
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
TelcoBridges Inc.
 

More from TelcoBridges Inc. (20)

Network Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best PracticesNetwork Transformation - Top 5 Best Practices
Network Transformation - Top 5 Best Practices
 
The Role of SBCs in Fraud Protection
The Role of SBCs in Fraud ProtectionThe Role of SBCs in Fraud Protection
The Role of SBCs in Fraud Protection
 
Tmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ SessionTmedia for Metaswitch - a FAQ Session
Tmedia for Metaswitch - a FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and SuccessesContact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7What is SS7? An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC Introduction
ProSBC IntroductionProSBC Introduction
ProSBC Introduction
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

How to Prevent Telecom Fraud in Real-Time

  • 1. An Introduction and Closer Look 1 June 2019
  • 2. 2 Today’s Presenters: Alan D Percy CMO at TelcoBridges alan.percy@telcobridges.com Mike Stukalin VP of Sales at JeraSoft mike@jerasoft.net
  • 3. 3 Agenda • Introductions • Impact of Telecom Fraud • Fraud Methods and Attack Profiles • Real-Time Fraud Protection • How to Implement Fraud Detection and Prevention • Where to Learn More • Your Questions
  • 4. Billing Solution for Telecom Industry
  • 5. JeraSoft is a passionate team of engineers focused on development and integration of highly productive Billing Solutions for Telecom (Mobile VoIP, Business Telephony, OTT, Wholesale VoIP and SMS) and IoT/M2M Providers around the world. Since 2005 JeraSoft has been putting together key insight and successful billing management practices, combining them with state-of-the-art web and telecom technologies. The result is a powerful platform the Telecom and IoT Providers can use to streamline Billing Processes and add value to their business. About Us
  • 6. Solutions IoT / M2M Retail VoIP Wholesale VoIP OTT SMS Wholesale MVNO Business Telephony Mobile VoIP
  • 7. Components An extensive software, allowing you to provide services like Enterprise Telephony, OTT, MVNO, End-user retail, etc. Retail Services This module contains Rates Generator and Rates Notifications features, allowing you to compose a rates list and run notifications. Dynamic Routing A feature that allows you to run your business more efficiently by providing automated management of your routes. Rates Management Jurisdictional Billing An extra module that supports domestic long distance calls in the USA— phone calls made outside a certain local call area and LATAs.
  • 8. According to the Communications Fraud Control Association (CFCA) in their 2017 survey of telecom fraud loss, organizations and carriers were hit with losses of $29.2 billion in 2017. Cost of Telecom Fraud for the Industry Source: Communications Fraud Control Association (CFCA)
  • 9. The Real Cost of Telecommunications Fraud Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA shook out: Source: Communications Fraud Control Association (CFCA)
  • 10. Fraudsters’ Targets Fraud against service providers. In this case fraud scenarios are more complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes. Fraud against customers. This scenario assumes any case of gaining access to customer’s account in order to make free calls. Generally there are two categories to distinguish between major telecom fraud scenarios, accordingly to the fraudsters’ target:
  • 11. Target: Service Providers Call transfer fraud Wholesale SIP trunking fraud False answer supervision (FAS) Location routing number fraud Multiple transfer fraud Call forwarding fraud Traffic pumping and related services International revenue sharing fraud (IRSF)
  • 12. Target: Customers Telecom denial-of-service (TDOS) Vishing (Voice fishing) Account takeover, etc Callback (Wangiri) scam
  • 13. Real-time fraud protection Before the call is connected Uses real-time patterns Works on per-call basis Scenario: 1. Alert notification 2. Specific call blocking Real-time VS Non Real-time Fraud Protection Non real-time fraud protection After the call is connected Uses statistics analysis Works on array of calls Scenario: 1. Alert notification 2. Client / Destination blocking
  • 14. Double Fraud Protection The right combination of Billing platform and an SBC allows: ● Fraud prevention and protection for service providers. AND ● Fraud prevention and protection for end customers.
  • 16. Abnormal expenses pattern scenario Allows to protect from unusual financial spending. Quality statistics control Monitoring and controlling call quality. Abnormal usage behaviour (geo) Enables unusual usage behavior protection connected with call destination. Balance usage and Capacity control The customer may set the limits for account balance, the calls will stop after the amount set will be spent. Allows to limit the number of calls from 1 account. Unusual behavior and patterns are analysed by soft switch. JeraSoft Billing Fraud Protection Scenarios
  • 17. • Customers are protected against financial losses. • Service providers improve customer satisfaction and revenue retention while protecting themselves and end- customers from financial damage. • Today’s communications business can’t afford to operate without a comprehensive fraud protection. Benefits of Fraud Protection
  • 18. Let us help you make the right choice for your Billing needs and Fraud protection scenarios UK+44 (203) 129-9126 US+1 (415) 520-7883 info@jerasoft.net www.jerasoft.net
  • 19. TelcoBridges Inc. 19 Confidential Roll of SBCs in Real-Time Billing
  • 20. TelcoBridges Inc. • Manufacturer of VoIP gateways and telecom solution platforms for carriers • Privately held • Founded in 2002 • Employees: ~35 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Poland, Turkey, Hong Kong • 24/7 technical support 20 TelcoBridges HQ
  • 21. 21 IPRN Fraud Infographic International Premium Rate Numbers https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
  • 22. Common Billing Interfaces Call Detail Records (CDR) • Record details of each call • Text file (CSV) • Batch processing • Not Real-time • No Authentication • No Ability to Route Calls RADIUS Confidential 22 • RFC 2865 and RFC 2966 • IP-based • Multiple Transactions per Call • Real-Time processing • Authentication per Call • Supports Forwarding/Routing • Session Duration Timeout
  • 24. 24 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Route to PSTN, no time limit I’d like to make a call…
  • 25. 25 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Bad number, do not route
  • 26. 26 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Accept (Route, Duration…) Accounting-Request (Start time, End time, Route…) When a Call Request is Accepted: Accounting-Response . . .
  • 27. 27 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Reject Accounting-Request (Start time, End time, Duration=0) Accounting-Response When a Call Request is Rejected:
  • 28. GEO Redundancy SBC or Gateway SBC or Gateway Billing Billing
  • 29. TelcoBridges Portfolio Confidential 29 Signaling and Media Gateways TMG800 Virtualized Session Border Controller Software Support and Professional Services TMG3200 TMG7800
  • 30. 30 SBC Product Positioning  Tier 1/2/3 Service Providers and Enterprise  Access, Peering, SaaS…  CDR and RADIUS Support  Commercial Applications  Encryption & HA Support  Live Support w/ 24/7 opt.  $1/Session/Year
  • 31. 31 Learn More: Download your ProSBC software: www.prosbc.com Frequently Asked Questions at: forums.freesbc.com Other educational webinars at: YouTube.com/telcobridges Q/A
  • 33. Why JeraSoft? Providing Stable Billing Solution for 14 Years Serving 250+ Clients in 35 Countries Configured Specially for Your Business 100% Integration with Third Party Systems Industry Leading 24/7 Support Team Customized License Options and Components Full Training and Dedicated Initial Help New Feature-Rich Releases Throughout the Year
  • 34. 34 Impact of Fraud • Fraud is costing the industry $17bn in lost revenues every year, with the proceeds being used to finance organized crime and terrorism. - Financial Times • The Department of Social Affairs in Ireland was defrauded to the tune of €300,000. - Ireland Comptroller and Auditor General Source: siliconrepublic.com/comms/telecoms-fraud
  • 35. 35 Methods of Telecom Fraud • Billing Fraud • Subscription Fraud • Assaulting security weaknesses • Credit Card Fraud • Network Fraud • Bypass Fraud • Hacking IP Addresses • Call Forwarding and other attacks https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf