Data-driven approach for automatic telephony threat analysis and campaign detection

被引:3
|
作者
Bordjiba, Houssem Eddine [1 ]
Karbab, ElMouatez Billah [1 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Montreal, PQ, Canada
关键词
Telephony abuse; Telephony complaints; Vishing; Spoofing; Telephony abuse campaigns;
D O I
10.1016/j.diin.2018.01.016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The growth of the telephone network and the availability of Voice over Internet Protocol (VoIP) have both contributed to the availability of a flexible and easy to use artifact for users, but also to a significant increase in cyberecriminal activity. These criminals use emergent technologies to conduct illegal and suspicious activities. For instance, they use VoIP's flexibility to abuse and scam victims. According to (F. I. F.. N. D. N. C. R. D. Book, Available at: https://www. ftc. gov/news-events/press-releases/2016/12/ftc-issues- fy-2016-national-do-not-call-registry-data-book, accessed on: 27 August 2017), US government revealed receiving more than 5.3 million telephony abuse complaints in 2016. Based on this report, more than 226 million phone numbers were registered on the Do Not Call Registry list as not to receive tele-marketing calls. For instance, they use VoIP's flexibility to abuse and scam victims. A lot of interest has been expressed into the analysis and assessment of telephony cyber-threats. A better understanding of these types of abuse is required in order to detect, mitigate, and attribute these attacks. The purpose of this research work is to generate relevant and timely telephony abuse intelligence that can support the mitigation and/or the investigation of such activities. To achieve this objective, we present, in this paper, the design and implementation of a Telephony Abuse Intelligence Framework (TAINT) that automatically aggregates, analyzes and reports on telephony abuse activities. We deploy our framework on a large dataset of telephony complaints, spanning over seven years, to provide in-depth insights and intelligence about emerging telephony threats. The framework presented in this paper is of a paramount importance when it comes to the mitigation, the prevention and the attribution of telephony abuse incidents. We analyze the data and report on the complaint distribution, the used numbers and the spoofed callers' identifiers. In addition, we identify and geo-locate the sources of the phone calls, and further investigate the underlying telephony threats. Moreover, we quantify the similarity between reported phone numbers to unveil potential groups that are behind specific telephony abuse activities that are actually launched as telephony abuse campaigns. (C) 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S131 / S141
页数:11
相关论文
共 50 条
  • [1] Automatic meter error detection with a data-driven approach
    Chu, Ruimin
    Chik, Li
    Chan, Jeffrey
    Gutzmann, Kurt
    Li, Xiaodong
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 123
  • [2] Automatic detection of wakefulness and rest intervals in actigraphic signals: A data-driven approach
    Martin-Martinez, D.
    Casaseca-de-la-Higuera, P.
    Andres-de-Llano, J. M.
    Garmendia-Leiza, J. R.
    Alberola-Lopez, S.
    Alberola-Lopez, C.
    [J]. MEDICAL ENGINEERING & PHYSICS, 2014, 36 (12) : 1585 - 1592
  • [3] Phoneypot: Data-driven Understanding of Telephony Threats
    Gupta, Payas
    Srinivasan, Bharat
    Balasubramaniyan, Vijay
    Ahamad, Mustaque
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [4] A Framework for Data-Driven Physical Security and Insider Threat Detection
    Mavroeidis, Vasileios
    Vishi, Kamer
    Josang, Audun
    [J]. 2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 1108 - 1115
  • [5] Automatic User Preferences Elicitation: A Data-Driven Approach
    Li, Tong
    Zhang, Fan
    Wang, Dan
    [J]. REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY (REFSQ 2018), 2018, 10753 : 324 - 331
  • [6] Automatic data-driven spectral analysis based on a multi-estimator approach
    Martin, Nadine
    Mailhes, Corinne
    [J]. SIGNAL PROCESSING, 2018, 146 : 112 - 125
  • [7] A Data-Driven Analysis of Robust Automatic Piano Transcription
    Edwards, Drew
    Dixon, Simon
    Benetos, Emmanouil
    Maezawa, Akira
    Kusaka, Yuta
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 681 - 685
  • [8] Towards a data-driven behavioral approach to prediction of insider-threat
    Basu, Subhasree
    Chua, Yi Han Victoria
    Lee, Mei Wah
    Lim, Wanyu Geraldine
    Maszczyk, Tomasz
    Guo, Zheng
    Dauwels, Justin
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4994 - 5001
  • [9] Early wheel flat detection: an automatic data-driven wavelet-based approach for railways
    Mosleh, Araliya
    Meixedo, Andreia
    Ribeiro, Diogo
    Montenegro, Pedro
    Calcada, Rui
    [J]. VEHICLE SYSTEM DYNAMICS, 2023, 61 (06) : 1644 - 1673
  • [10] Data-driven approach for automatic detection of aortic valve opening: B point detection from impedance cardiogram
    Sheikh, Shafa-at Ali
    Gurel, Nil Z.
    Gupta, Shishir
    Chukwu, Ikenna V.
    Levantsevych, Oleksiy
    Alkhalaf, Mhmtjamil
    Soudan, Majd
    Abdulbaki, Rami
    Haffar, Ammer
    Vaccarino, Viola
    Inan, Omer T.
    Shah, Amit J.
    Clifford, Gari D.
    Bahrami Rad, Ali
    [J]. PSYCHOPHYSIOLOGY, 2022, 59 (12)