Filters








131 Hits in 7.4 sec

Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge

Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor
2015 USENIX Security Symposium  
In this paper, we present a passive detection technique for combating simboxes at a cellular base station.  ...  In so doing, we demonstrate that fraud that degrades network quality and costs telecommunications billions of dollars annually can easily be detected and counteracted in real time.  ...  Michael Good was instrumental in early work 24th USENIX Security Symposium 847 on this project that was not published in this paper, and conversations with Charles Lever were especially helpful to work out  ... 
dblp:conf/uss/ReavesSBCT15 fatcat:blqmjwetjjf7npru5zny3nw6k4

A Plethoric Literature Survey on SIMBox Fraud Detection in Telecommunication Industry

Lateef Gbolahan Salaudeen, Aliyu Rufai Yauri, Garba Muhammad, Hassan Umar Suru, Alimi O. Al-Maru'f, Danlami Gabi, Suleiman Musa Argungun, Muhammad Sirajo Aliyu
2022 Direct Research Journal of Engineering and Information Technology  
SIMBox or Interconnect Bypass Fraud is one of the most rapidly emerging frauds in today's telecommunications industry, costing the industry between $3 and $7 billion USD in annual revenue losses.  ...  Fraudsters effectively avoid the inter-connect toll charging points by exploiting the difference between the high interconnect rates and the low retail price for on-network calls, thereby avoiding payment  ...  Also, we acknowledge the tremendous cooperation of Nigerian mobile telecommunication company and fraud department of MTN.  ... 
doi:10.26765/drjeit14035036 fatcat:wthbftjvjngbvjdlfgqd5kuzhe

Threat modeling framework for mobile communication systems [article]

Siddharth Prakash Rao, Silke Holtmanns, Tuomas Aura
2020 arXiv   pre-print
We also provide concrete examples of using the framework for modeling the attacks individually and comparing them with similar ones.  ...  Due to the complex nature of mobile communication systems, most of the security efforts in its domain are isolated and scattered across underlying technologies.  ...  Most commonly, such techniques aim for billing frauds [186] and denial of service [53, 166] using SIP protocols. e GPRS tra c emerging from the interconnection and roaming network can also give initial  ... 
arXiv:2005.05110v1 fatcat:icrim7s3nnck3edcmxnb7bo3hu

Distributed Denial-of-Service (DDoS) Attacks and Defence Mechanisms in Various Web-enabled Computing Platforms

2022 International Journal on Semantic Web and Information Systems (IJSWIS)  
The demand for Internet security has escalated in the last two decades because the rapid proliferation in the number of Internet users has presented attackers with new detrimental opportunities.  ...  One of the simple yet powerful attack, lurking around the Internet today, is the Distributed Denial-of-Service (DDoS) attack.  ...  Ingress/Egress packet filtering (Aamir & Zaidi, 2014; Peng et al., 2007; Zargar et al., 2013 ) is one of the early countermeasures against DDoS attacks, deployed at the edge routers of the networks.  ... 
doi:10.4018/ijswis.297143 fatcat:imoau72665dxbmfdoxvntbyyiq

Electronic Commerce: A Half-Empty Glass?

Sasha Dekleva
2000 Communications of the Association for Information Systems  
Yet, they need to be worked out if electronic commerce is to be successful in both the developed and the underdeveloped world.  ...  The first theme--building trust for users and consumers--involves privacy protection, security, consumer protection, authentication and confidentiality, and access blocking.  ...  Certificate services will be widely available and applications will use PKI right out of the box." [Levitt 1999 ] He warns, though, that PKI is still a challenging application.  ... 
doi:10.17705/1cais.00318 fatcat:bm623paj6fc27odj65zr6epxpy

Distributed Vehicular Computing at the Dawn of 5G: a Survey [article]

Ahmad Alhilal, Benjamin Finley, Tristan Braud, Dongzhe Su, Pan Hui
2022 arXiv   pre-print
As a major part of 5G, edge computing allows data offloading and computation at the edge of the network, ensuring low-latency and context-awareness, and 5G efficiency.  ...  Relatedly, the fifth generation of cellular networks (5G) was developed to respond to communication challenges by providing for low-latency, high-reliability, and high bandwidth communications.  ...  ACKNOWLEDGMENT This research has been supported in part by project 16214817 from the Research Grants Council of Hong Kong, and the 5GEAR and FIT projects from Academy of Finland.  ... 
arXiv:2001.07077v2 fatcat:ixgjkwdx6zdsvfcpviptpf32by

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
at Terahertz bands and attacks against pervasive intelligence.  ...  Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion.  ...  in cellular networks.  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Strategy for Fintech Applications in the Pacific Island Countries

Sonja Davidovic, Elena Loukoianova, Cormac Sullivan, Hervé Tourpe
2019 Departmental Papers / Policy Papers  
This paper looks at how some elements of the Bali Fintech Agenda could be used in Pacific island countries, which face significant financial-structural challenges.  ...  The agenda aims to harness the potential of fintech while managing associated risks.  ...  The authors are grateful to Kenneth Kang, Alison Stuart, and our colleagues who provided useful comments, guidance, and support.  ... 
doi:10.5089/9781498326735.087 fatcat:ru34iyp3cbeqxnbfyx66tzabjy

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
The deliverable describes the state of the current technologies and the planned innovations applied to internet-of-things (IoT) data management and applications.  ...  This document describes the approach of iNGENIOUS to develop an interoperable layer, aggregating data coming from different existing and forthcoming IoT technologies.  ...  collected in a block at once; • Blocks are created by miners who try to make the block acceptable to the network by guessing a value of a nonce which depends on the difficulty of the network and is also  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Net neutrality - How relevant is it to Australia?

James Endres
2009 Telecommunications Journal of Australia  
ACKNOWLEDGEMENTS Portions of this essay come from earlier testimony before the U.S. Congress. I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance.  ...  ACKNOWLEDGEMENTS The authors benefited from generous assistance from colleagues and interns including Alana Maurushat, Reg Leones, Adam Arnold and Joanna Chow.  ...  NTT now only proposes that ISPs bear the cost of network termination equipment at the edge of the NGN, or where their Internet connection is interconnected with the NGN.  ... 
doi:10.2104/tja09022 fatcat:iyhfeahrmverdoaskclswtokx4

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
The deliverable starts with an overview of AI applications and edge computing market trends.  ...  In the last part of the deliverable, we report an overview of the performance modelling solutions, security, and privacy problems for AI applications in edge environments.  ...  Looking at the European scenario, beyond professional services, that will be interested in the build out of the edge value chain, to provide AI solutions at the edge to customers in other industries, Retail  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty

A Comparison of Recruitment Methods for an mHealth Intervention Targeting Mothers: Lessons from the Growing Healthy Program

Rachel A Laws, Eloise-Kate V Litterbach, Elizabeth A Denney-Wilson, Catherine G Russell, Sarah Taki, Kok-Leong Ong, Rosalind M Elliott, Sharyn J Lymer, Karen J Campbell
2016 Journal of Medical Internet Research  
fraud.  ...  Box 1.1 (continued) Box carried out over Wi-Fi. Indeed, the "mobile" in "mobile applications" refers as much to the type of device as the manner of usage.  ...  Summarizing current thinking and seeking to inform the debate on the use of mobile phones to improve livelihoods, the report looks, in particular, at key ecosystem-based applications in agriculture, health  ... 
doi:10.2196/jmir.5691 pmid:27634633 pmcid:PMC5043120 fatcat:rbg45p6xzzcgxe3b43jnav7nuy

A Survey on Metaverse: Fundamentals, Security, and Privacy [article]

Yuntao Wang, Zhou Su, Ning Zhang, Rui Xing, Dongxiao Liu, Tom H. Luan, Xuemin Shen
2022 arXiv   pre-print
At the same time, a series of fundamental challenges (e.g., scalability and interoperability) can arise in metaverse security provisioning owing to the intrinsic characteristics of metaverse, such as immersive  ...  Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures.  ...  For example, adversaries may be able to out-vote genuine nodes by producing sufficient Sybil identities to refuse to deliver or receive some blocks, thereby effectively blocking other nodes from a blockchain  ... 
arXiv:2203.02662v3 fatcat:iudwizbvp5cv3fga6lpvydlrna

Federalism and the Telephone: The Case for Preemptive Federal Deregulation in the New World of Intermodal Competition

Charles J. Cooper, Brian Stuart Koukoutchos
2007 Social Science Research Network  
See Mike Farrell, All's Quiet on the Cutting Edge, MULTICHANNEL NEWS, Feb. 23, 2004, available at http://www.multichannel.com/article/CA382799.html.  ...  in the cell phone subscriber's home market where the call will access the subscriber's cellular network.  ... 
doi:10.2139/ssrn.959720 fatcat:epakugjigffbhdk5ibyvc4goby

Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)

Parya Haji Mirzaee, Mohammad Shojafar, Haitham Cruickshank, Rahim Tafazolli
2022 IEEE Access  
The integration of power networks with information and communication technologies enables pervasive control, automation and connectivity from the energy generation power plants to the consumption level  ...  Smart Grid (SG) is the revolutionised power network characterised by a bidirectional flow of energy and information between customers and suppliers.  ...  Identity theft can occur at various SG scales, from stealing IP meters to impersonating network suppliers and creating fraud against users.  ... 
doi:10.1109/access.2022.3174259 fatcat:txuebjhpnre73cq5lbx77ugmhq
« Previous Showing results 1 — 15 out of 131 results