SlideShare a Scribd company logo
An Introduction
and Closer Look
1
June 2019
2
Today’s Presenters:
Alan D Percy
CMO at TelcoBridges
alan.percy@telcobridges.com
Mike Stukalin
VP of Sales at JeraSoft
mike@jerasoft.net
3
Agenda
• Introductions
• Impact of Telecom Fraud
• Fraud Methods and Attack Profiles
• Real-Time Fraud Protection
• How to Implement Fraud Detection and Prevention
• Where to Learn More
• Your Questions
Billing Solution for Telecom Industry
JeraSoft is a passionate team of engineers focused on
development and integration of highly productive Billing
Solutions for Telecom (Mobile VoIP, Business Telephony,
OTT, Wholesale VoIP and SMS) and IoT/M2M Providers
around the world.
Since 2005 JeraSoft has been putting together key insight
and successful billing management practices, combining
them with state-of-the-art web and telecom technologies.
The result is a powerful platform the Telecom and IoT
Providers can use to streamline Billing Processes and add
value to their business.
About Us
Solutions
IoT / M2M Retail VoIP Wholesale VoIP
OTTSMS Wholesale MVNOBusiness
Telephony
Mobile VoIP
Components
An extensive software, allowing you
to provide services like Enterprise
Telephony, OTT, MVNO, End-user
retail, etc.
Retail
Services
This module contains Rates
Generator and Rates Notifications
features, allowing you to compose a
rates list and run notifications.
Dynamic
Routing
A feature that allows you to run
your business more efficiently by
providing automated management
of your routes.
Rates Management Jurisdictional Billing
An extra module that supports
domestic long distance calls in the
USA— phone calls made outside
a certain local call area and
LATAs.
According to the Communications Fraud Control Association
(CFCA) in their 2017 survey of telecom fraud loss, organizations
and carriers were hit with losses of $29.2 billion in 2017.
Cost of Telecom Fraud for the Industry
Source: Communications Fraud Control Association (CFCA)
The Real Cost of Telecommunications Fraud
Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA
shook out:
Source: Communications Fraud Control Association (CFCA)
Fraudsters’ Targets
Fraud against service providers. In this case fraud scenarios are more
complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes.
Fraud against customers. This scenario assumes any case of gaining access to
customer’s account in order to make free calls.
Generally there are two categories to distinguish between major telecom fraud scenarios,
accordingly to the fraudsters’ target:
Target: Service Providers
Call transfer fraud
Wholesale SIP trunking fraud
False answer supervision (FAS)
Location routing number fraud
Multiple transfer fraud
Call forwarding fraud
Traffic pumping and related
services
International revenue sharing
fraud (IRSF)
Target: Customers
Telecom denial-of-service (TDOS)
Vishing (Voice fishing)
Account takeover, etc
Callback (Wangiri) scam
Real-time fraud protection
Before the call is connected
Uses real-time patterns
Works on per-call basis
Scenario:
1. Alert notification
2. Specific call blocking
Real-time VS Non Real-time Fraud
Protection
Non real-time fraud protection
After the call is connected
Uses statistics analysis
Works on array of calls
Scenario:
1. Alert notification
2. Client / Destination blocking
Double Fraud Protection
The right combination of Billing platform and an SBC allows:
● Fraud prevention and protection for service providers.
AND
● Fraud prevention and protection for end customers.
Double Fraud Protection
Abnormal expenses pattern scenario
Allows to protect from unusual financial spending.
Quality statistics control
Monitoring and controlling call quality.
Abnormal usage behaviour (geo)
Enables unusual usage behavior protection connected with call destination.
Balance usage and Capacity control
The customer may set the limits for account balance, the calls will stop after the
amount set will be spent.
Allows to limit the number of calls from 1 account. Unusual behavior and patterns
are analysed by soft switch.
JeraSoft Billing Fraud Protection Scenarios
• Customers are protected against financial losses.
• Service providers improve customer satisfaction and
revenue retention while protecting themselves and end-
customers from financial damage.
• Today’s communications business can’t afford to
operate without a comprehensive fraud protection.
Benefits of Fraud Protection
Let us help you make the right choice for your Billing needs and
Fraud protection scenarios
UK+44 (203) 129-9126
US+1 (415) 520-7883
info@jerasoft.net
www.jerasoft.net
TelcoBridges Inc.
19Confidential
Roll of SBCs in Real-Time Billing
TelcoBridges Inc.
• Manufacturer of VoIP gateways and
telecom solution platforms for carriers
• Privately held
• Founded in 2002
• Employees: ~35
• Headquarters: Montreal, Canada
• Hardware & software R&D as well as
production of its products in Montreal
• Sales/Support offices:
Poland, Turkey, Hong Kong
• 24/7 technical support
20
TelcoBridges HQ
21
IPRN Fraud Infographic
International Premium Rate Numbers
https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
Common Billing Interfaces
Call Detail Records (CDR)
• Record details of each call
• Text file (CSV)
• Batch processing
• Not Real-time
• No Authentication
• No Ability to Route Calls
RADIUS
Confidential 22
• RFC 2865 and RFC 2966
• IP-based
• Multiple Transactions per Call
• Real-Time processing
• Authentication per Call
• Supports Forwarding/Routing
• Session Duration Timeout
23
Service Provider Networks
Confidential
Billing
IPX
PSTN
IPX
PSTN
SoftSwitch
Trunking
Subscribers
RADIUS
Links
Egress
SBC or
Gateway
Ingress
SBC or
Gateway
24
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Route to
PSTN, no
time limit
I’d like to
make a
call…
25
UCaaS Network
• SBC Protects Service Provider
and provides billing interface
• Billing system detects and
prevents fraudulent traffic
SMB/Enterprise
IAD/Router
UCaaS
Service Provider
UCaaS
Billing
RADIUS
Link
SBC
PSTN
Where
should we
route this?
Bad number,
do not route
26
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Accept
(Route, Duration…)
Accounting-Request
(Start time, End time, Route…)
When a Call Request is Accepted:
Accounting-Response
.
.
.
27
RADIUS Authentication/Routing
SBC or
Gateway
Billing
Access Request
(Called/Calling #/Session ID)
Access-Reject
Accounting-Request
(Start time, End time, Duration=0)
Accounting-Response
When a Call Request is Rejected:
GEO Redundancy
SBC or
Gateway
SBC or
Gateway
Billing Billing
TelcoBridges Portfolio
Confidential 29
Signaling and
Media Gateways
TMG800
Virtualized
Session Border Controller
Software
Support and
Professional
Services
TMG3200
TMG7800
30
SBC Product Positioning
 Tier 1/2/3 Service Providers and Enterprise
 Access, Peering, SaaS…
 CDR and RADIUS Support
 Commercial Applications
 Encryption & HA Support
 Live Support w/ 24/7 opt.
 $1/Session/Year
31
Learn More:
Download your ProSBC software:
www.prosbc.com
Frequently Asked Questions at:
forums.freesbc.com
Other educational webinars at:
YouTube.com/telcobridges
Q/A
BONUS CONTENT
32Confidential
Why JeraSoft?
Providing Stable Billing
Solution for 14 Years
Serving 250+ Clients in
35 Countries
Configured Specially
for Your Business
100% Integration
with
Third Party Systems
Industry Leading
24/7 Support Team
Customized License
Options and Components
Full Training and
Dedicated Initial Help
New Feature-Rich Releases
Throughout the Year
34
Impact of Fraud
• Fraud is costing the industry
$17bn in lost revenues every
year, with the proceeds being
used to finance organized crime
and terrorism.
- Financial Times
• The Department of Social Affairs
in Ireland was defrauded to the
tune of €300,000.
- Ireland Comptroller and Auditor General
Source: siliconrepublic.com/comms/telecoms-fraud
35
Methods of Telecom Fraud
• Billing Fraud
• Subscription Fraud
• Assaulting security weaknesses
• Credit Card Fraud
• Network Fraud
• Bypass Fraud
• Hacking IP Addresses
• Call Forwarding and other attacks
https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf

More Related Content

What's hot

Comprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraudComprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraud
Massango Junior
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyacVidya Networks
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
mmavis
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
Mohammed Kharma
 
Telecommunication Fraud Detection and Prevention
Telecommunication Fraud Detection and PreventionTelecommunication Fraud Detection and Prevention
Telecommunication Fraud Detection and Prevention
Sumera Khan
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
Firdaus Fadzil
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
cVidya Networks
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
Eckoh
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
Sagar Patekar
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fmskkvences
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
Alan Quayle
 
TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015
Connect First
 
smart guide to compliant call recording
smart guide to compliant call recordingsmart guide to compliant call recording
smart guide to compliant call recordingmParticle
 
TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017? TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017?
Ryan Thurman
 
Pymnts BlueFin Webinar
Pymnts BlueFin WebinarPymnts BlueFin Webinar
Pymnts BlueFin Webinar
Romana Hai
 
Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14David Krasinski
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
Alan Percy
 
Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003
Credit Management Association
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
Thomas McNally
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV
 

What's hot (20)

Comprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraudComprehensive training on bypass sim box fraud
Comprehensive training on bypass sim box fraud
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
 
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...A data mining framework for fraud detection in telecom based on MapReduce (Pr...
A data mining framework for fraud detection in telecom based on MapReduce (Pr...
 
Telecommunication Fraud Detection and Prevention
Telecommunication Fraud Detection and PreventionTelecommunication Fraud Detection and Prevention
Telecommunication Fraud Detection and Prevention
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
The Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact CentersThe Rise of Card Not Present Crime in Contact Centers
The Rise of Card Not Present Crime in Contact Centers
 
Ethics in Telecom Sector
Ethics in Telecom SectorEthics in Telecom Sector
Ethics in Telecom Sector
 
Ict2005 fms
Ict2005 fmsIct2005 fms
Ict2005 fms
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015 TCPA Compliance Experts Explain How to Avoid Fines in 2015
TCPA Compliance Experts Explain How to Avoid Fines in 2015
 
smart guide to compliant call recording
smart guide to compliant call recordingsmart guide to compliant call recording
smart guide to compliant call recording
 
TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017? TCPA and Contact Center Law: What's on the Horizon in 2017?
TCPA and Contact Center Law: What's on the Horizon in 2017?
 
Pymnts BlueFin Webinar
Pymnts BlueFin WebinarPymnts BlueFin Webinar
Pymnts BlueFin Webinar
 
Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14Neustar Guide to TCPA Risk Mitigation Jan14
Neustar Guide to TCPA Risk Mitigation Jan14
 
Battling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKEN
 
Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 

Similar to How to Prevent Telecom Fraud in Real-Time

New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
TelcoBridges Inc.
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
Alan Percy
 
Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_SheetJuan Illidge
 
Top 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsTop 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsSam Sansome
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study.
Compliance3
 
2020 kyriba payment_network
2020 kyriba payment_network2020 kyriba payment_network
2020 kyriba payment_network
Chris-Marty MABELLA
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
hSenid Mobile Marketing
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
Dr. Eman Gawish
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
Jive Communications
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_FinancialAnthony Whittle
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overviewvismayibhat
 
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsHow Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
ThousandEyes
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5Shobhit Srivastava
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Carl Blume
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profile
rsaini12
 

Similar to How to Prevent Telecom Fraud in Real-Time (20)

New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How ToNew Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
 
Faudalert_Data_Sheet
Faudalert_Data_SheetFaudalert_Data_Sheet
Faudalert_Data_Sheet
 
Lttc 6262013
Lttc 6262013Lttc 6262013
Lttc 6262013
 
Top 6 Telecom Industry Trends
Top 6 Telecom Industry TrendsTop 6 Telecom Industry Trends
Top 6 Telecom Industry Trends
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study.
 
2020 kyriba payment_network
2020 kyriba payment_network2020 kyriba payment_network
2020 kyriba payment_network
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
The future of r av3
The future of r av3The future of r av3
The future of r av3
 
5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked5 Common Hosted VoIP Myths Debunked
5 Common Hosted VoIP Myths Debunked
 
TFS Brochure 4_Financial
TFS Brochure 4_FinancialTFS Brochure 4_Financial
TFS Brochure 4_Financial
 
24online-Product Overview
24online-Product Overview24online-Product Overview
24online-Product Overview
 
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital EngagementsHow Financial Institutions Can Deliver Seamless Customer Digital Engagements
How Financial Institutions Can Deliver Seamless Customer Digital Engagements
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
 
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
Are You Vulnerable to IP Telephony Fraud and Cyber Threats?
 
Srikanth-Resume
Srikanth-ResumeSrikanth-Resume
Srikanth-Resume
 
Aria Telecom Profile
Aria Telecom ProfileAria Telecom Profile
Aria Telecom Profile
 

More from Alan Percy

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
Alan Percy
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
Alan Percy
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
Alan Percy
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Alan Percy
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
Alan Percy
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
Alan Percy
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
Alan Percy
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
Alan Percy
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
Alan Percy
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
Alan Percy
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
Alan Percy
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
Alan Percy
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
Alan Percy
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
Alan Percy
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
Alan Percy
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
Alan Percy
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
Alan Percy
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
Alan Percy
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
Alan Percy
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
Alan Percy
 

More from Alan Percy (20)

Network Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptxNetwork Transformation Best Practices-Working.pptx
Network Transformation Best Practices-Working.pptx
 
The Role of SBC in Fraud Protection
The Role of SBC in Fraud ProtectionThe Role of SBC in Fraud Protection
The Role of SBC in Fraud Protection
 
Tmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ SessionTmedia for Metaswitch - an FAQ Session
Tmedia for Metaswitch - an FAQ Session
 
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?Will STIR/SHAKEN Solve the Illegal Robocall Problem?
Will STIR/SHAKEN Solve the Illegal Robocall Problem?
 
Marketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 TipsMarketing Open Source Software - 10 Tips
Marketing Open Source Software - 10 Tips
 
Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes Contact Center as a Service - Challenges and Successes
Contact Center as a Service - Challenges and Successes
 
Robocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBCRobocall Mitigation with YouMail and ProSBC
Robocall Mitigation with YouMail and ProSBC
 
How to Measure VoIP Voice Quality
How to Measure VoIP Voice QualityHow to Measure VoIP Voice Quality
How to Measure VoIP Voice Quality
 
What is SS7? An Introduction to Signaling System 7
What is SS7?  An Introduction to Signaling System 7What is SS7?  An Introduction to Signaling System 7
What is SS7? An Introduction to Signaling System 7
 
RESTful APIs and SBCs
RESTful APIs and SBCsRESTful APIs and SBCs
RESTful APIs and SBCs
 
VoIP Frequently Asked Questions
VoIP Frequently Asked QuestionsVoIP Frequently Asked Questions
VoIP Frequently Asked Questions
 
UCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBCUCaaS with 3cx and ProSBC
UCaaS with 3cx and ProSBC
 
The Future of Media Gateways
The Future of Media GatewaysThe Future of Media Gateways
The Future of Media Gateways
 
How to Protect Against TDOS Attacks
How to Protect Against TDOS AttacksHow to Protect Against TDOS Attacks
How to Protect Against TDOS Attacks
 
ProSBC on Azure - A Tutorial
ProSBC on Azure - A TutorialProSBC on Azure - A Tutorial
ProSBC on Azure - A Tutorial
 
uCPE and VNFs Explained
uCPE and VNFs ExplaineduCPE and VNFs Explained
uCPE and VNFs Explained
 
ProSBC a Deep Dive
ProSBC a Deep DiveProSBC a Deep Dive
ProSBC a Deep Dive
 
Enabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCsEnabling business with CPaaS and SBCs
Enabling business with CPaaS and SBCs
 
Scaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCsScaling Open Source Applications with SBCs
Scaling Open Source Applications with SBCs
 
ProSBC introduction
ProSBC introductionProSBC introduction
ProSBC introduction
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

How to Prevent Telecom Fraud in Real-Time

  • 1. An Introduction and Closer Look 1 June 2019
  • 2. 2 Today’s Presenters: Alan D Percy CMO at TelcoBridges alan.percy@telcobridges.com Mike Stukalin VP of Sales at JeraSoft mike@jerasoft.net
  • 3. 3 Agenda • Introductions • Impact of Telecom Fraud • Fraud Methods and Attack Profiles • Real-Time Fraud Protection • How to Implement Fraud Detection and Prevention • Where to Learn More • Your Questions
  • 4. Billing Solution for Telecom Industry
  • 5. JeraSoft is a passionate team of engineers focused on development and integration of highly productive Billing Solutions for Telecom (Mobile VoIP, Business Telephony, OTT, Wholesale VoIP and SMS) and IoT/M2M Providers around the world. Since 2005 JeraSoft has been putting together key insight and successful billing management practices, combining them with state-of-the-art web and telecom technologies. The result is a powerful platform the Telecom and IoT Providers can use to streamline Billing Processes and add value to their business. About Us
  • 6. Solutions IoT / M2M Retail VoIP Wholesale VoIP OTTSMS Wholesale MVNOBusiness Telephony Mobile VoIP
  • 7. Components An extensive software, allowing you to provide services like Enterprise Telephony, OTT, MVNO, End-user retail, etc. Retail Services This module contains Rates Generator and Rates Notifications features, allowing you to compose a rates list and run notifications. Dynamic Routing A feature that allows you to run your business more efficiently by providing automated management of your routes. Rates Management Jurisdictional Billing An extra module that supports domestic long distance calls in the USA— phone calls made outside a certain local call area and LATAs.
  • 8. According to the Communications Fraud Control Association (CFCA) in their 2017 survey of telecom fraud loss, organizations and carriers were hit with losses of $29.2 billion in 2017. Cost of Telecom Fraud for the Industry Source: Communications Fraud Control Association (CFCA)
  • 9. The Real Cost of Telecommunications Fraud Here’s how the top fraud loss categories reported by operators in 2015 to the CFCA shook out: Source: Communications Fraud Control Association (CFCA)
  • 10. Fraudsters’ Targets Fraud against service providers. In this case fraud scenarios are more complicated and can possess SIP trunking, stimulated traffic, regulatory loopholes. Fraud against customers. This scenario assumes any case of gaining access to customer’s account in order to make free calls. Generally there are two categories to distinguish between major telecom fraud scenarios, accordingly to the fraudsters’ target:
  • 11. Target: Service Providers Call transfer fraud Wholesale SIP trunking fraud False answer supervision (FAS) Location routing number fraud Multiple transfer fraud Call forwarding fraud Traffic pumping and related services International revenue sharing fraud (IRSF)
  • 12. Target: Customers Telecom denial-of-service (TDOS) Vishing (Voice fishing) Account takeover, etc Callback (Wangiri) scam
  • 13. Real-time fraud protection Before the call is connected Uses real-time patterns Works on per-call basis Scenario: 1. Alert notification 2. Specific call blocking Real-time VS Non Real-time Fraud Protection Non real-time fraud protection After the call is connected Uses statistics analysis Works on array of calls Scenario: 1. Alert notification 2. Client / Destination blocking
  • 14. Double Fraud Protection The right combination of Billing platform and an SBC allows: ● Fraud prevention and protection for service providers. AND ● Fraud prevention and protection for end customers.
  • 16. Abnormal expenses pattern scenario Allows to protect from unusual financial spending. Quality statistics control Monitoring and controlling call quality. Abnormal usage behaviour (geo) Enables unusual usage behavior protection connected with call destination. Balance usage and Capacity control The customer may set the limits for account balance, the calls will stop after the amount set will be spent. Allows to limit the number of calls from 1 account. Unusual behavior and patterns are analysed by soft switch. JeraSoft Billing Fraud Protection Scenarios
  • 17. • Customers are protected against financial losses. • Service providers improve customer satisfaction and revenue retention while protecting themselves and end- customers from financial damage. • Today’s communications business can’t afford to operate without a comprehensive fraud protection. Benefits of Fraud Protection
  • 18. Let us help you make the right choice for your Billing needs and Fraud protection scenarios UK+44 (203) 129-9126 US+1 (415) 520-7883 info@jerasoft.net www.jerasoft.net
  • 19. TelcoBridges Inc. 19Confidential Roll of SBCs in Real-Time Billing
  • 20. TelcoBridges Inc. • Manufacturer of VoIP gateways and telecom solution platforms for carriers • Privately held • Founded in 2002 • Employees: ~35 • Headquarters: Montreal, Canada • Hardware & software R&D as well as production of its products in Montreal • Sales/Support offices: Poland, Turkey, Hong Kong • 24/7 technical support 20 TelcoBridges HQ
  • 21. 21 IPRN Fraud Infographic International Premium Rate Numbers https://www.europol.europa.eu/activities-services/public-awareness-and-prevention-guides/telecommunications-fraud
  • 22. Common Billing Interfaces Call Detail Records (CDR) • Record details of each call • Text file (CSV) • Batch processing • Not Real-time • No Authentication • No Ability to Route Calls RADIUS Confidential 22 • RFC 2865 and RFC 2966 • IP-based • Multiple Transactions per Call • Real-Time processing • Authentication per Call • Supports Forwarding/Routing • Session Duration Timeout
  • 24. 24 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Route to PSTN, no time limit I’d like to make a call…
  • 25. 25 UCaaS Network • SBC Protects Service Provider and provides billing interface • Billing system detects and prevents fraudulent traffic SMB/Enterprise IAD/Router UCaaS Service Provider UCaaS Billing RADIUS Link SBC PSTN Where should we route this? Bad number, do not route
  • 26. 26 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Accept (Route, Duration…) Accounting-Request (Start time, End time, Route…) When a Call Request is Accepted: Accounting-Response . . .
  • 27. 27 RADIUS Authentication/Routing SBC or Gateway Billing Access Request (Called/Calling #/Session ID) Access-Reject Accounting-Request (Start time, End time, Duration=0) Accounting-Response When a Call Request is Rejected:
  • 28. GEO Redundancy SBC or Gateway SBC or Gateway Billing Billing
  • 29. TelcoBridges Portfolio Confidential 29 Signaling and Media Gateways TMG800 Virtualized Session Border Controller Software Support and Professional Services TMG3200 TMG7800
  • 30. 30 SBC Product Positioning  Tier 1/2/3 Service Providers and Enterprise  Access, Peering, SaaS…  CDR and RADIUS Support  Commercial Applications  Encryption & HA Support  Live Support w/ 24/7 opt.  $1/Session/Year
  • 31. 31 Learn More: Download your ProSBC software: www.prosbc.com Frequently Asked Questions at: forums.freesbc.com Other educational webinars at: YouTube.com/telcobridges Q/A
  • 33. Why JeraSoft? Providing Stable Billing Solution for 14 Years Serving 250+ Clients in 35 Countries Configured Specially for Your Business 100% Integration with Third Party Systems Industry Leading 24/7 Support Team Customized License Options and Components Full Training and Dedicated Initial Help New Feature-Rich Releases Throughout the Year
  • 34. 34 Impact of Fraud • Fraud is costing the industry $17bn in lost revenues every year, with the proceeds being used to finance organized crime and terrorism. - Financial Times • The Department of Social Affairs in Ireland was defrauded to the tune of €300,000. - Ireland Comptroller and Auditor General Source: siliconrepublic.com/comms/telecoms-fraud
  • 35. 35 Methods of Telecom Fraud • Billing Fraud • Subscription Fraud • Assaulting security weaknesses • Credit Card Fraud • Network Fraud • Bypass Fraud • Hacking IP Addresses • Call Forwarding and other attacks https://www2.deloitte.com/content/dam/Deloitte/us/Documents/finance/us-advisory-data-synthesis-In-fraud-detection-for-tsp.pdf

Editor's Notes

  1. Some introductions to get started:
  2. Active/standby RADIUS Servers redundancy One server is the “Current” server where CDRs are sent. Failed to send a CDR request to the “Current” server: the next server is selected and become the “Current” server