ATIS 1000072-2016 Analysis of Mitigation Techniques for Calling Party Spoofing.pdf
《ATIS 1000072-2016 Analysis of Mitigation Techniques for Calling Party Spoofing.pdf》由会员分享,可在线阅读,更多相关《ATIS 1000072-2016 Analysis of Mitigation Techniques for Calling Party Spoofing.pdf(28页珍藏版)》请在麦多课文档分享上搜索。
1、 TECHNICAL REPORT ATIS-1000072 Analysis of Mitigation Techniques for Calling Party Spoofing As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (ATIS) brings together the top global ICT companies to advance the industrys most pressin
2、g business priorities. ATIS nearly 200 member companies are currently working to address the All-IP transition, 5G, network functions virtualization, big data analytics, cloud services, device solutions, emergency services, M2M, cyber security, network evolution, quality of service, billing support,
3、 operations, and much more. These priorities follow a fast-track development lifecycle from design and innovation through standards, specifications, requirements, business use cases, software toolkits, open source solutions, and interoperability testing. ATIS is accredited by the American National S
4、tandards Institute (ANSI). The organization is the North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of the oneM2M global initiative, a member of and major U.S. contributor to the International Telecommunication Union (ITU), as well as a memb
5、er of the Inter-American Telecommunication Commission (CITEL). For more information, visit www.atis.org. Notice of Disclaimer Number Signaling and Validation Techniques (Secure Telephone Identity Revisited/Secure Handling of Asserted Identities Using Tokens STIR/SHAKEN Framework), including that of
6、the Calling Party and International Gateway;Certificate Granularity (Service Provider versus “per TN”); Blacklists (local and global); Whitelists (local and global); Honeypots; Post call notification (e.g., dial a “*” code after hanging up); Network verification of Session Initiation Protocol (SIP)
7、PAI/FROM for IP Private Branch Exchange (PBX) call originations; Do Not Originate; Call Detail Records (CDR) Trace. The mitigation techniques provided in this analysis also apply to illegitimate robocalls. 1.2 Purpose The purpose of this document is to provide an analysis of the available and propos
8、ed mitigation techniques, and guidance on standard approaches for addressing originating party spoofing. 1.3 Application ATIS member companies may rely on this paper to conduct meetings with policymakers at all levels of government who are dealing with constituents concerns about caller identificati
9、on services (caller ID) spoofing and robocalling. Those meetings may educate government officials about these practices and may involve advocacy against premature regulation and legislation that could cement solutions or create regulatory barriers to the flexibility industry needs to mitigate caller
10、 ID spoofing and robocalling. 2 Normative References The following standards contain provisions which, through reference in this text, constitute provisions of this Standard. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreemen
11、ts based on this Standard are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below. ATIS-1000072 2 ATIS-0300114, Next Generation Network (NGN) Reference Document Caller ID and Caller ID Spoofing.1 Draft 3GPP TR 33.8de V0.4.0, Security study
12、on spoofed call detection and prevention. 3 Definitions, Acronyms, ATIS Verified Token; Secure Telephone Identity Revisited (STIR): signing parts of SIP messages based on RFC 4474bis; Blacklists (local and global); Whitelists (local and global); Honeypots; Post call notification (e.g., dial a “*” co
13、de after hanging up); Network Verification of SIP PAI/FROM for IP PBX call originations; Do Not Originate. The pros and cons analysis will address coverage (e.g., IP, circuit switched, wireless), availability, and deployment complexity. 6.1 3GPP PAI Trust Model 6.1.1 Description P-Asserted-Identity
14、and Privacy headers are defined in RFC 3325. The P-Asserted-Identity contains the caller ID information for the call on the INVITE SIP packet. The Privacy header contains information on which parts of the 2Table 5.2 is adapted from ATIS-0300105, Next Generation Interconnection Interoperability Forum
15、 (NGIIF) Auto Dialers Reference Document, Table 8.1, Robocall Matrix. ATIS-1000072 15 caller ID are private. In “trusted” networks, the identity of the Calling Party Number (CPN) is validated and placed in the SIP PAI header. 6.1.2 Pros Useful in “trusted” network deployments for IP to IP calls, ass
16、uming a “trusted” chain of trust between all service providers in the call path. 6.1.3 Cons Does not address CS originated calls. Can be modified by Man In The Middle (MITM) computer security attacks. IP PBXs send PAI to the originating SP, who is likely not authenticating use of the number. Not all
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS10000722016ANALYSISOFMITIGATIONTECHNIQUESFORCALLINGPARTYSPOOFINGPDF

链接地址:http://www.mydoc123.com/p-541480.html