RESEARCH OF CALLER ID SPOOFING LAUNCH, DETECTION, AND DEFENSE
Open Access
- 1 January 2020
- journal article
- Published by Borys Grinchenko Kyiv University in Cybersecurity: Education, Science, Technique
- Vol. 3 (7), 6-16
- https://doi.org/10.28925/2663-4023.2020.7.616
Abstract
Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the developing communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult to have protection against it. In addition, there are not effective and defense solutions available right now. In this research it is suggested the CIVE (Callee Inference & VErification), a compelling and viable guard against Caller ID spoofing. This way it is described how it’s possible to lunch call spoofing and between line describe how CIVE approach method can help to prevent somehow this kind of attacks. Caller ID Spoofing could cause huge financial and political issues special nowadays, when many things even sometimes authentication and verification are available by phone call, like banks approving transactions or two factor authentications and many other things. We believe critical industries specially banks and payment service providers should be protected against such vulnerabilities with their system and make an approach to prevent it, also it is very important to learn people specially who has special social place like politicians or celebrities to know such kind of attack are already exist. For this paper we implemented a call from white house to show there is no limitation and no matter whom you try to spoof, but destination which is the victim receive the call and that make this attack vector dangerous. And even modern communication and even devices like 4G and smart phones are not able to prevent or even detect this kind of attack. This study is a demonstration of the vulnerabilities available. All experiments were conducted on isolated mock-ups.Keywords
This publication has 7 references indexed in Scilit:
- COMPARATIVE BANDWIDTH ANALYSIS OF LOWPOWER WIRELESS IOT-SWITCHESCybersecurity: Education, Science, Technique, 2019
- RESEARCH OF STABILITYIN AD HOC SELF-ORGANIZATED WIRELESS NETWORKSCybersecurity: Education, Science, Technique, 2019
- Monitoring Subsystem for Wireless Systems Based on Miniature Spectrum AnalyzersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- COMPARISON OF POSSIBLE APPROACHES FOR THE DEVELOPMENT OF LOW-BUDGET SPECTRUM ANALYZERS FOR SENSORY NETWORKS IN THE RANGE OF 2.4–2.5 GHZCybersecurity: Education, Science, Technique, 2018
- Scheme for dynamic channel allocation with interference reduction in wireless sensor networkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Experimental evaluation of the shading effect of accelerating lens in azimuth planePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Modified accelerating lens as a means of increasing the throughput, range and noise immunity of IEEE 802.11 systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015