Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014
DOI: 10.4218/etrij.14.0113.0798
|View full text |Cite
|
Sign up to set email alerts
|

iVisher: Real-Time Detection of Caller ID Spoofing

Abstract: Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…As for Attack-1 , the caller ID shown on the callee side is not forged. Therefore, the found attack can bypass any state-of-the-art defense mechanisms for caller ID spoofing, i.e., callee-end defense [21] and in-network defense [55]. Additionally, the adversary could also receive callbacks from the callee for confirmation.…”
Section: Attack 1: Ue Screen Lock Bypassingmentioning
confidence: 99%
“…As for Attack-1 , the caller ID shown on the callee side is not forged. Therefore, the found attack can bypass any state-of-the-art defense mechanisms for caller ID spoofing, i.e., callee-end defense [21] and in-network defense [55]. Additionally, the adversary could also receive callbacks from the callee for confirmation.…”
Section: Attack 1: Ue Screen Lock Bypassingmentioning
confidence: 99%
“…In SS7 or VOIP, there is no caller ID verification mechanism between carriers along with other vulnerabilities [24] [25]. So, 1.…”
Section: Network Interconnection Protocolsmentioning
confidence: 99%
“…The major tasks of an intrusion detection system (IDS) are to collect data from multiple sources (e.g., host, network), analyze these data to find security-relevant behaviors, and report the results to the system administrator [6,7,[11][12][13][14][15][16][17][18][19][20][21][22]. As shown in Fig.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%