SUBSCRIBE TO TMCnet
TMCnet - World's Largest Communications and Technology Community

CHANNEL BY TOPICS


QUICK LINKS




VoIP Switch - The Threat of VoIP Fraud
View More VoIP Switch Channel Stories

The Threat of VoIP Fraud

 
December 19, 2013
By Susan J. Campbell, TMCnet Contributing Editor
 

The buzz in the telecommunications space is that VoIP is the end-all for seamless communications, but the hype surrounding the benefits often overshadows some real threats that exist. This is not to suggest that companies should avoid VoIP solutions, as the benefits are indeed significant. Instead, it’s simply important that IT managers have a realistic view of what could happen and how to make sure their systems stay protected.  


A recent Telecom Tech News post highlighted some of the vulnerabilities that exist with VoIP. Hackers know about these vulnerabilities and will go after them for profit. The biggest culprits involve three-way calls and call transfers. Hackers have the ability to inject call signals into the network, essentially hijacking calls. Service providers track the usage, but then have no one to bill.

Unfortunately, it’s rather simple to modify the setup of existing calls. Anyone who understands VoIP can easily make adjustments that mask calling activity from the service provider, meaning lost revenue. Until VoIP technology commands are sent with encryption requiring authorization, this vulnerability may continue to exist.

While these threats do exist and the vulnerabilities are inherent – just like anything else over the public Internet– it doesn’t mean that service providers have to be sitting ducks. For example, service providers can encrypt commands and signaling across the network. The challenge, of course, is that the process does incur an additional cost and it may cause performance issues.

A less intrusive approach is to introduce active VoIP policy controls in front of the call session control function (CSCF). As a gateway solution, it can block or challenge call control messages to prove authenticity before they are passed along to the CSCF. For this process to work successfully, service provider policy gateways have to easily adapt their methods to constantly evolving techniques and security threats.

VoIP switch vendors must be able to provide the reporting tools that allow for tracking and the identification of threats that currently exist. Such tools need to be configured so detect activity that may put the service provider or its customers at risk. VoIP fraud is big business in criminal sects around the world, and a lack of tracking at any time can leave a security gap big enough to draw in millions in stolen revenue.

The end user is generally unaffected by such intrusions, thus the service provider owes it to themselve to put systems in place to help recognize when they occur. 




Edited by Blaise McNamee
 
View More VoIP Switch Channel Stories






Technology Marketing Corporation

2 Trap Falls Road Suite 106, Shelton, CT 06484 USA
Ph: +1-203-852-6800, 800-243-6002

General comments: [email protected].
Comments about this site: [email protected].

STAY CURRENT YOUR WAY

© 2024 Technology Marketing Corporation. All rights reserved | Privacy Policy