Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

draft-TR 33.832 (SA3)
Study on IMS Enhanced Spoofed Call Prevention and Detection

ToC   3GPP‑Page   Help    
V0.3.0 (Wzip)  2015/09  15 p.


Rapporteur:  Mr. Schumacher, Greg
See also:  –

Caller identity spoofing or malicious modification of caller information such as Calling Line Identification and Caller Name (Caller ID) has become a significant problem in many countries. The complaints regarding these calls range from nuisance calls, violations of various phone solicitation rules (such as the US Federal Trade Commission's Telemarketing Sales Rules) to being used as a platform for significant fraud, identity theft and social engineering. Various malicious uses of caller information spoofing include these categories: swatting, vishing, and TDOS.

Both IETF and 3GPP SA3 have dealt with aspects of this issue a number of times in the past. 3GPP SA3 has completed the study of spoofed call detection in TR 33.831, addressing spoofed calls in a CS environment, without recommending any specific approach. However the problem of spoofed calls is continuing to increase and growing attention is coming from consumers, journalists, and regulatory/legislative bodies demanding a solution.

The latest IETF effort supporting the detection of spoofed calls is taking place in the IETF STIR working group, and has progressed to a a point where evaluation of the use of STIR's active drafts to address the spoofed call problem can take place.


 

Here   Top

 

 

1  ScopeWord-p. 4
2  ReferencesWord-p. 5
3  Definitions, symbols and abbreviations
4  History of past solutions
5  Spoofed call scenarios in IMS
6  Potential security requirementsWord-p. 9
7  Potential solutions
8  ConsiderationsWord-p. 13
9  Conclusions and recommendationsWord-p. 14
X  Change historyWord-p. 15

Up   Top