Detection Of Smart Phones

Improved Essays
Smart phones play a vital role in today’s economy as it has emerged as a major business. Most of the people prefer smart phones as it provides a wide range of features and facilities to its users.
Because of its usefulness and the money involved in the business, it is subject to fraud. Moreover, nowadays an increased number of fraudulent works are in existence. One such fraudulent activity is the caller identification spoofing attack. Unfortunately, the security standards are not strong enough to detect and prevent such fake calls. They become dangerous conduits for Internet security threats to reach the telecommunication infrastructure. This paper aims at detecting the spoofed phone calls and preventing such calls. This scheme is
implemented
…show more content…
Detecting Spoofed calls
Detection of caller identification spoof is by an end-to-end caller identification verification mechanism. The detection mechanism is automated and requires very little user input. Considering A as the caller, B as the receiver, and C as the attacker who tries to spoof A’s caller identification while calling B. In such a spoofing scenario, A may not be in B’s contact list (unknown), and A’s number could be invalid (unreachable). Since the verification operation is preformed automatically, we expand our definition of the names and refer A,
B, and C to the devices of caller, receiver and attacker respectively. In addition A, B, and C can be a smart phone, a mobile phone, a PSTN phone, or a VoIP phone. In all such cases the detection is made successful.
3. Use Cases
SpoofControl relies on a covert channel that is built on top of an end-to-end communication services in telephone networks for verification. SpoofControl can detect spoofing even if caller identification is not in the contact list or is unreachable. There are two use cases of SpoofControl, one for an emergency call scenario and the other for a regular call scenario. In both cases, the end users can utilize SpoofControl to verify caller

Related Documents

  • Decent Essays

    Great news! In an effort to increase security, we have decided to add a layer of security with new technology called PhoneFactor. PhoneFactor allows you to authenticate to our network using only your network login credentials and your phone. Please take 5 minutes to configure your PhoneFactor account now. Visit the link and follow the instructions listed below under What do I need to do to begin using PhoneFactor?…

    • 429 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cell Phones Dbq

    • 683 Words
    • 3 Pages

    Cell phones are already one of the most revolutionary products in history. In 10 short years, cell phones are a common thing in every corner of the planet. In some places there are more people with access to smartphones than to functioning plumbing. Cell phones are very useful and should not be banned or limited by the government or by schools. While technology may isolate people, they can be a great tool for communication and fuels creativity and our hunger for knowledge.…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Ctc Vs Coscia Case

    • 763 Words
    • 4 Pages

    QUESTION PRESENTED What factors do the U.S. Commodity Futures Trading Commission (“CFTC”) and Department of Justice (“DOJ”) examine to determine whether spoofing violations have occurred for prosecution under the 2010 Frank-Dodd Act? How is this demonstrated in the context of the United States v. Coscia case? SHORT ANSWER Intent is the biggest factor in whether the CFTC and DOJ can successfully prosecute under the anti-spoofing laws. To prove an anti-spoofing violation has occurred, the prosecutor must show that the defendants systematically placed orders they didn’t intend to execute.…

    • 763 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Conspiracy Pros And Cons

    • 632 Words
    • 3 Pages

    To accomplish this, the N.S.A. phone program was created, where it could track the callers and messages sent between parties. However, the call or message must…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Robocall Research Paper

    • 467 Words
    • 2 Pages

    When Are Robocalls Illegal? Determining the exact legality of these calls varies from state to state. 23 states currently have laws in place in addition to what the F.T.C. Has set forward in the Telephone Consumer Protection Act of 1991. For example, some states require a live person to introduce the call and ask for permission to play a recording or the call must state exactly who paid for the call and the name and other information on the company must be shared. .…

    • 467 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    How phones effect your everyday life Rough Draft For many of us, myself included, our cell phone screens are the last thing we check before we go to bed at night and the first thing we look in the morning. I see people texting and driving and almost every day I am behind someone at a red light who is looking down when the light turn greens. When you eat out, it is completely normal to see patron's cell phones at the table by their beverage. Also normal to see them checking their device during the duration of their dining experience. You almost never see children (even toddlers) sitting at the table without a tablet or phone as they play a game or watch a show or movie.…

    • 885 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Igms

    • 2070 Words
    • 9 Pages

    1.Describe the key security enhancements in UMTS that overcome GSM design weaknesses? Ans: 1. Encryption algorithms used in GSM were not disclosed, aiming to achieve ‘security through obscurity’. Their shortcomings were discovered by reverse engineering an actual GSM phone. The design of algorithms was kept secret (it was disclosed only on a need-to-know basis, under and non-disclosure agreement, to GSM manufacturers).…

    • 2070 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    1984 Vs Today

    • 451 Words
    • 2 Pages

    There are over 1.2 million individuals on the NSA watch list, though many are unaware of the surveillance on them every day. (Gomez) Many popular phone companies such as Verizon and AT&T agreed to release customer data, phone numbers, and access to tap into phone lines and user calls, putting nearly everyone in the United States under constant watch. A person’s cellphone may be the most widely used.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the article entitled Hooked on Our Smartphones written by Jane E. Brody. She stated that many men, women and children spend their days glued to their smartphones. Jane observed that technology is transforming modern society in ways that can have negative effects on physical and mental health, neurological development and personal relationships. Moreover, she states that many people have become “disconnected from what really matters, from what makes us feel nourished and grounded as human beings.”…

    • 314 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cell Phones In Conformity

    • 197 Words
    • 1 Pages

    An exceedingly massive community of adults and youths is currently making use of smartphones to gratify diverse daily needs, and their cell phone usage is undeviating with their everyday lives. “You are either on the phone or carrying one, and the moment it rings you will be transported out of real space into a virtual realm” (Goldberger, 473). Both the adults and younger generation are elaborating in using smartphones in conformity with the situation they are in. For example, some individuals tend to text message other mobile phone users for different reasons and situations. And other individuals may use text messaging services to send reminders to their group members and in order to provide updates regarding the standing of a project.…

    • 197 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Cell Phone Safety

    • 1387 Words
    • 6 Pages

    The mobile phone is great technology and is a must-have for life in the 21st century. Today smart phones are a part of everyday life. Millions of people wouldn’t leave their homes without it. Communication and mobility are two very important things in today’s society. The Smartphone enables both.…

    • 1387 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Over the course of time, my use of technology has gradually increased. However, unfortunately, I’m not the only person that’s struggling with the same problem. According to the article “Are Smartphones Making Us Stupid?” , Christopher Bergland states that everyone around the world is engaged with some sort of technology. Technology ranges from phones, computers, television, tablets, etc.…

    • 1092 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Throughout the years, phones have had modifications and improvements that have changed the world. The phone was invented in 1876 by a man named Alexander Graham Bell. Although the phone was simply used for communication, the fact that technology could send sound waves through an electronic device was unbelieveable. Slowly, as the years went on, more advancements were made. The phone became portable and smaller, texting was invented, cameras were conjoined with the phone, and the internet was accessible.…

    • 1015 Words
    • 5 Pages
    Improved Essays