Fighting IP Telephony Fraud with Oracle Enterprise Session Border Controllers


Oracle recently introduced a number of new Enterprise Session Border Controller (E-SBC) features to help businesses fight VoIP fraud. This case study reviews common IP telephony scams and explains how the new Oracle E-SBC capabilities, along with other security measures, can help network administrators combat service theft and mitigate risks.

Telephony fraud poses a significant threat to both businesses and communications services providers. A 2015 Communications Fraud Control Association (CFCA) survey estimates global telecommunications fraud loss at $38.1 billion (USD) annually. A good chunk of that--about $3.5 billion--is attributed to corporate IP-PBX and unified communications system service theft.

IP-PBXs and UC systems are vulnerable to a wide range of increasingly sophisticated attacks. Cybercriminals can leverage open source scanning tools to identify VoIP endpoints and systems with weak passwords, apply common Internet hacking techniques to gain access to IP communications systems, or exploit known vulnerabilities in specific vendor platforms or other voice network components to commit fraud.

IP telephony scams can come in many forms, can originate from inside or outside the company, and can impact any business regardless of size or industry. In simple cases, hackers gain access to corporate voice networks to make free international calls. In more sophisticated attacks, cybercriminals concoct complicated schemes to reap real financial rewards. For example, scammers engage in hijacking schemes to generate illicit revenue as rogue service providers. They break into a corporate voice network and "resell" international minutes to other service providers or unsuspecting consumers. In a widely published Massachusetts case, cybercriminals hacked into a small-business phone system and made $900,000 in calls to Somalia. (The story made headlines when the service provider sued the business owner, who had refused payment.)

Still other cyberthieves engage in traffic pumping schemes. They lease a premium telephone number in a foreign country (similar to a 900 number in the United States), hack into a corporate voice network and generate calls to that number. In many cases the criminals receive remuneration from the intermediate service provider before the victim even realizes its phone system has been compromised. In other versions of the scam, criminals collude with legitimate premium number owners, steering calls to them for a kickback.

Combat Voice Over IP Fraud with New Oracle E-SBC Capabilities

Webtorials readers are very familiar with the unique security challenges inherent in IP communications networks and the role enterprise session border controllers play in protecting premise-based systems from denial of service, address scanning, man-in-the-middle, and other attacks. Deployed at the edge of the enterprise network, Oracle Enterprise Session Border Controllers (E-SBCs) are ideally positioned to protect against IP telephony fraud as well. To that end, Oracle recently introduced a number of new features to help businesses proactively combat VoIP fraud and mitigate financial risks.

Blacklisting and Whitelisting

The new Oracle E-SBC blacklist/whitelist capability lets you explicitly block outbound calls to specific phone numbers (or SIP URIs) or ranges of phone numbers. The combination of blacklisting and whitelisting enables a flexible strategy for thwarting both hijacking and traffic pumping schemes. Forbidden destinations are blacklisted. Exceptions are whitelisted. For example, the CFCA study lists Cuba, Somalia, Bosnia and Herzegovina, and Estonia and Latvia as the top destinations for fraudulent calls. You can blacklist all calls to those countries and whitelist exceptions, such as valid calls to a trusted software contractor based in Latvia. Blacklists/whitelists are easily configured via a graphical user interface or an XML file upload. Wildcards are supported to effortlessly block all calls to a specific country or SIP URI domain name. You can use the XML capability to easily import fraudulent number lists from a telephone fraud watchdog service.

Call Rate Limiting

The new call rate limiting feature lets you restrict outbound call volumes to specific phone numbers (or SIP URIs) or ranges of phone numbers. It is useful for mitigating the effects of traffic pumping scams. Similar to blacklists/whitelists, call rate limits are defined via a GUI or XML file, with wildcard support for easy configuration. Call rate limiting enables a proactive fraud mitigation strategy. For example, you can allow unlimited calls/day to the United Kingdom but only one call/day to Estonia. The feature can also be used reactively. For example, you can throttle calls from certain sources or to certain destinations while analyzing and isolating a threat.

Call Redirection

The new call redirection feature lets you automatically transfer blocked calls to another destination, such as a media server, monitoring system, or recording system. For example in hijacking schemes, you can redirect the calling party to a media server that plays an announcement indicating the call cannot be completed as dialed. Alternatively, you may route the call through monitoring and/or recording systems to enable further analysis.

Additional Tips for Protecting Your IP Communications Infrastructure

The latest Oracle E-SBC fraud protection capabilities help you proactively mitigate risks in the event a hacker gains access to your corporate voice network. These should be used in conjunction with other security measures to build a multi-layered approach to security. (Prevent hackers from gaining access to the network as a first line of defense. Contain hackers from doing harm as a second line of defense.)

For ultimate protection:

  • Deploy Oracle E-SBCs at Internet and SIP trunking service borders to protect premise-based IP networks against the widest range of external threats.
  • Use strong passwords in SIP endpoints and UC clients to safeguard against unauthorized access from inside or outside the company.
  • Place IP-PBX traffic on a distinct VLAN to protect against eavesdropping and internal perpetrators.
  • Keep abreast of the latest security warnings and software patches for all your IP communications systems--PBXs, UC platforms, voicemail systems, etc.
  • Regularly review call detail records for patterns of service theft.

By deploying Oracle E-SBCs with telephony fraud protection capabilities in conjunction with other security systems and practices you can take full advantage of today's IP-based communications platforms while minimizing the risk of fraud, eavesdropping, denial of service, and other threats.

Next Steps

Visit the Oracle Enterprise Session Border Controller web page to learn how Oracle E-SBCs can help you combat IP telephony fraud and other security threats. Already an Oracle E-SBC customer? Update your E-SBC software today to enhance the security of your IP network.


Search Webtorials

Get E-News and Notices via Email


  

 



  

I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites






















Archives

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.