Geneva, Switzerland, 2 June 2014 Analysis of Caller ID delivery in China Hexian Huang CATR, China ITU Workshop on “Caller ID Spoofing”

Slides:



Advertisements
Similar presentations
Geneva, Switzerland, 13 July 2013 M ulti D omain S egmented network P rotection (MDSP) Huub van Helvoort, Senior Researcher Huawei Technologies Joint IEEE-SA.
Advertisements

Geneva, Switzerland, 13 July 2013 Moderator Summary Ethernet Protection Summary Ghani Abbas, Ericsson – ITU-T SG15 vice chair Steve Haddock – IEEE
Geneva, Switzerland, 2 June 2014 Caller ID Spoofing, Egypt experience Dr. Hosam Abd Elmaoula NTRA EGYPT ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Secure Communication Architectures.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
E-Security Background IT Infrastructure in Sikkim Current Status of Cyber Security& Cyber Crime in SIkkimCurrent Status of Cyber Security& Cyber Crime.
Geneva, Switzerland, 2 June 2014 The Regulatory aspects of CPND, CLI and OI “the ITRs” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing”
TELEPHONE NUMBER TELEPHONE NUMBER
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Geneva, Switzerland, 14 November 2014 Cloud Related Activities of CCSA Gao Wei, Director Engineer, CATR ITU Workshop on “Cloud Computing.
Chapter Chapter 13-2 Chapter 13 Data Modeling Introduction An Overview of Databases Steps in Creating a Database Using Rea Creating Database Tables.
Recent Developments in Mobile Communication Cyrus Yun November 24, 2003.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
1 Hackers 101 Julie Keil JoAna Swan John Adamo John Ponessa Arturo Jose` Ortiz.
Rajeev Bevara CS-555 Security Threats in VoIP. What is VoIP ? ➔ VOIP - Voice Over Internet Protocol. ➔ Delivery of voice communications and multimedia.
Geneva, Switzerland, 2 June 2014 Study on Spoofed Call Detection and Prevention in 3GPP China Mobile ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland,
Geneva, Switzerland, 2 June 2014 Experience of an inbound telephony provider Anne-Valérie Heuschen, Head of legal & regulatory affairs, Voxbone, Belgium.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
Geneva, Switzerland, 2 June 2014 SG2: WTSA and PP Resolutions “Recommendation E.157” Sherif Guinena SG2 Chairman ITU Workshop on “Caller ID Spoofing” (Geneva,
Session 4.2: Creation of national ICT security infrastructure for developing countries National IP-based Networks Security Centres for Developing Countries.
What is internet telephony?  IP telephony uses the Internet to send audio, video, fax etc between two or more users in real time, so the users can converse.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
A History of WEP The Ups and Downs of Wireless Security.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
User Identification Solutions in Converging Networks Mike Pluke ETSI Specialist Task Force STF 157 Leader of :
International Telecommunication Union Committed to connecting the world ITU/EBU Workshop Accessibility to Broadcasting and IPTV ACCESS for ALL, 23 – 24.
EVALUATING SECURITY OF SMART PHONE MESSAGING APPLICATIONS PRESENTED BY SUDHEER AKURATHI.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Geneva, Switzerland, 11 June 2012 Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic) Martin Waldburger, University of Zurich,
Geneva, Switzerland, October 2013 Title of presentation Verdana 32 Name of Speaker, Title, Organization & Verdana 24 ITU Workshop on “Making.
Document IPW-10 User Identification Solutions in Converging Networks Mike Pluke Castle Consulting Ltd. ETSI Specialist Task Force STF 157 Leader of :
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
OSIA Portal Project developing a portal for the future.
Internet of Things in Industries
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
Geneva, Switzerland, 2 June 2014 Collaborative policy development at M3AAWG VTASIG and LAP DNC Hein Dries-Ziekenheiner VIGILO ITU Workshop.
Geneva, Switzerland, 17 October 2011 Summary of Session 2: " Experiences of SDP deployments and business models" Olivier Le Grand, France Telecom Orange.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Ethernet Basics – 7 IP Addressing. Introducing IP Addressing  IP address (TCP/IP address)  Not unique (but should be), user assigned  Layer 3  4 byte.
Five Steps to Creating Quality Assessment Plans and Reports Spring 2009.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NUR IZZATI BINTI AHMED AZMAN TSK 1.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Unlinking Private Data
Online Banking. Learning Objectives To learn how society has been affected by online banking.
ITU Workshop on “SS7 Security” Geneva, Switzerland 29 June 2016
Candidate Subjects for Collaboration among CJK
PABX Telecommunication System Suppliers in UAE
Biometrics.
Multi Domain Segmented network Protection (MDSP)
Using MIS Part 4 Information Systems Management 10th Edition
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Standardization activities on IPTV in CCSA
Biometrics.
Cloud & Developing Nations
National Bureau of Statistics of China
Henning Schulzrinne Columbia University
Tussles for Edge Network Caching
Moderator Summary Ethernet Protection Summary
Using MIS Part 4 Information Systems Management 10th Edition
Mitigating Ransomware
IEEE MEDIA INDEPENDENT HANDOVER DCN: MISU Title: Proposal on new MIH Service for Broadband Access via heterogeneous access systems.
Session 5 Trust services and cloud security
IEEE MEDIA INDEPENDENT HANDOVER DCN: MISU Title: Proposal on new MIH Service for Broadband Access via heterogeneous access systems.
Presentation transcript:

Geneva, Switzerland, 2 June 2014 Analysis of Caller ID delivery in China Hexian Huang CATR, China ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014)

Geneva, Switzerland, 2 June Service about caller ID delivery Connected line identification presentation (COLP) is a service provided to the user. This service should identify the caller ID accurately, and call back conveniently, which is also a requirement in China.

The Condition of Caller ID delivery for traditional Network in China China have strict requirements for caller ID delivery in the traditional network. There are standards about caller ID delivery inter- operations’ networks, which include the caller ID format, bit length, etc. All the standards are on service level. Geneva, Switzerland, 2 June

The Condition of Caller ID Modification for Traditional Network To satisfy the needs of user privacy, some services of changing the caller is allowed in China. While such operations are strictly controlled and these change must be traceable, so that we can find the real caller. Geneva, Switzerland, 2 June

The Fraud Cases Caused by Caller ID Spoofing In recent years, the telephone fraud cases appear frequently. A large part of them use the caller ID which make the called user misunderstanding and fooled easily. Geneva, Switzerland, 2 June

The Fraud Cases Caused by Caller ID Spoofing The spoofing caller ID includes: Police department telephone number State organs telephone number Notary departments telephone number Impersonate any international numbers, etc. Geneva, Switzerland, 2 June

The Fraud Cases Caused by Caller ID Spoofing The fraud by internet calls have made a lot of users suffered economic loss in China. Most of these fraud calls are from the international, which increases the difficulty for investigative. Geneva, Switzerland, 2 June

Interworking between the Internet and traditional network Geneva, Switzerland, 2 June There are two scenarios: Scenario 1: Scenario 2: Unique caller ID No unauthorized modification of caller ID Identify the source of the call

Proposal We hope that we can work together on reducing the caller ID spoofing and protect the interests of users from two sides: Developing more complete standards Strengthen the supervision on it Geneva, Switzerland, 2 June

Thanks ! Geneva, Switzerland, 2 June 2014