Tech-invite  3GPPspecsRELsGlossariesSIP

Top   in Index   Prev   Next

TR 33.831SA3
Study on Security on
Spoofed Call Detection and Prevention

use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V12.0.0 (Wzip)  2014/10  25 p.

Rapporteur:  Mr. Li, Xiangjun

The present document studies the means to identify calls with spoofed Calling Line Identification terminating in the CS domain where the call could have originated from either inside or outside the CS domain. Calling Line Identification (CLI or CLID), also called Caller Identification (CID), evaluates and transmits a caller's number while Calling Line Identity Presentation (CLIP) enables displaying the caller's number during call setup or ringing. Usual applications for CLIP are: But CLI can also be misused to display a misleading number in the display that is in no way related to the originator of the call. This behaviour is called CLI spoofing or spoofed call. CLI spoofing ranges from harmless hoax to criminal activities like for example Voice Phishing (vishing) by displaying the forged number of a bank in order to steal the callee's credentials. And although CLI may be unreliable, people use it to decide whether to accept a call or not.
This study item studies the detection of a spoofed call as the first step, and prevention as a second step if detection is achievable. In particular, the goals of this document are:
  • Outline valid threat scenarios for spoofed calls coming to 2G and 3G CS domains;
  • Analyze and evaluate if any tools in 3GPP can be used to counteract spoofed call detection and prevention;
  • Study and identify any other suitable techniques or mechanisms for spoofed call detection and prevention.

full Table of Contents for  TR 33.831  Word version:   12.0.0

Here   Top
1  ScopeWord-p. 6
2  References
3  Definitions and abbreviationsWord-p. 7
4  Spoofed call scenariosWord-p. 8
5  Potential security requirements for detectionWord-p. 13
6  Potential solutions for detection
7  Out-of-band methods closed to user groupWord-p. 18
8  Evaluation of potential solutions
9  Conclusions and recommendations
A  Change historyWord-p. 28

Up   Top