Anti Fraud Services Founding Member Associate Member of..

Similar documents
Customer Portal Quick Reference User Guide

Mindmapping: A General Purpose (Test) Planning Tool

Data Warehousing. Paper

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

System and Software Architecture Description (SSAD)

MOTIF XF Extension Owner s Manual

Anti-addiction System Development Based on Android Smartphone. Xiafu Pan

BGP Attributes and Path Selection. ISP Training Workshops

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

Building Your Security Operations Center and Taking it to the Next Level

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Complete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel.

150 Internet Exchange Points And Beyond!

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Table 2 GSM, UMTS and LTE Coverage Levels

What are Information Systems?

Innovative. Pharma-Tech Process Services is a high-energy, schedule-driven, technical service provider. Our innovative consulting services cover

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

DATA MINING II - 1DL460

EDICOM has an undertaking with clients to comply with three key variables that guarantee the service quality:

27 Refraction, Dispersion, Internal Reflection

Firewall and IDS. TELE3119: Week8

The Implementation of the National Probation Service Information Systems Strategy

Data Protection: Your Choice Is Simple PARTNER LOGO

Baan Tools User Management

100 Internet Exchange Points And Beyond!

Introduction to OSPF. ISP Training Workshops

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Intelligent Systems in Retail. Powered by Windows Embedded

1 Enterprise Modeler

SCAN INSPECT TRACK SOLVE

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security of Bluetooth: An overview of Bluetooth Security

CA Top Secret r14 for z/os

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

Lecture 28: Data Link Layer

FIRST-QUARTER 2017 REVENUES

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

Image Segmentation EEE 508

STRATEGIC. alliances & Services

Python Programming: An Introduction to Computer Science

Continuity Logic Frontline Live

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

THIRD-QUARTER 2017 REVENUES

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Application Notes for configuring Agent AG Headsets from Corporate Telecommunications with Avaya one-x Communicator using a USB 2.0 Chord Issue 1.

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Lecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

Avid Interplay Bundle

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Windows Server 2008 R2 networking

Oracle Process Manufacturing

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation

Transforming Railroad Asset Management: Going Smart with Predictive Maintenance

Architectural styles for software systems The client-server style

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Panel for Adobe Premiere Pro CC Partner Solution

Python Programming: An Introduction to Computer Science

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.

PayMobile. Features Overview

Going Mobile with. SYSPRO Espresso

How Asigra Cloud Backup Protects Your Network

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

CS 683: Advanced Design and Analysis of Algorithms

n Explore virtualization concepts n Become familiar with cloud concepts

Evaluation scheme for Tracking in AMI

Chapter 3 DB-Gateways

Shielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework

THIRD-QUARTER 2016 REVENUES

3D Model Retrieval Method Based on Sample Prediction

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Web OS Switch Software

Improving Template Based Spike Detection

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

Oracle Server. What s New in this Release? Release Notes

DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

BEA WebLogic Commerce Server. Registration and User Processing Package

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

State of Mobile Payments. Tom Zalewski Aikon Consulting Dallas, TX

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Goals of this Lecture Activity Diagram Example

Outline. A Probabilistic Deduplication, Record Linkage and Geocoding System. Data cleaning and standardisation (2)

Getting the Most out of IoT with an Effective Data Lifecycle Management Strategy

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

. Written in factored form it is easy to see that the roots are 2, 2, i,

Strengthening Privacy Protection with the European General Data Protection Regulation

Transcription:

Ati Fraud Services Foudig Member Associate Member of..

Ati Fraud Overview BTS prides itself o its developmet ad deploymet of its Ati-Fraud services. Its Fraud prevetio services provide a seamless fraud solutio by combiig early detectio of fraud activities ad real-time blockig of traffic to maximize rapid respose. It reuires prior aalysis to systematically moitor customer activity, busiess relatioships ad o-et trasactios or processes. Whe suspicious traffic is detected ad meets the thresholds established, the system will dyamically cofigure the SBC to stop or degrade the traffic withi miutes. The real-time detectio protects reveue losses by collectig data o a rage of actioable metrics which is stored i a database. This iformatio is aalyzed to provide real-time feed of curret threats ad traffic patters. The process geerates alarms, otificatios, historical aalysis, real-time traffic reports ad segmeted data for greater precise measuremets. It s time to fight fraud together BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 2

Detectio & Prevetio Platform BTS Fraud Detectio Services provides operators a strategic advatage eeded to stop mobile fraud. Our experiece ad prove results to stop SIM Box fraud ad other mobile fraud techiues, has provided BTS with a soudig track record & experiece for customers to realize the assurace of a secure etwork. Operators worldwide are experiecig reveue loss, high customer chur ad degraded customer uality of experiece due to advaces i mobile fraud. BTS platform combats the followig fraud techiues: SIM Box Elimiatio Iteratioal Reveue Share Fraud (IRSF) Prepaid Chargig Abuse Iter-Market Bypass Fraud Tromboig (Reverse Bypass Fraud) These fraud actios decrease customer chur rate & geerates immediate reveue icrease whe a fraud operatio is shut dow BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 3

Security Services Telecoms Fraud prevetio services reuires prior aalysis to systematically moitor customer activity, busiess relatioships ad o-et trasactios or processes. BTS is recogized worldwide for its leadership i the fight agaist fraud i the telecoms sector. Wherever BTS s ati-fraud service has bee implemeted, the discoectio of fraudulet lies traslates ito a icrease i the volume of legal calls ad a subseuet icrease i reveues for local operators ad govermets. I a cocise approach combiig iovative detectio techologies ad multilateral collaboratio, BTS s Fraud Maagemet Departmet works closely with all stakeholders to couter curret ad ew fraudulet patters. Network Security Audit Patter aalysis Risk Idex creatio Classificatio i traffic flows Real-Time Traffic Aalisys Call Batteries with itelliget routig CDR exchage program SIMbox locatio BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 4

Network Security Audit BTS has ivested i Research ad Developmet kow-how i creatig the prevetive tools ad services eeded to idetify ad combat these fraudulet practices. The Network Security Audit helps Wholesale Fraud Maagers to face the challeges icludig FAS (False Aswer Supervisio) Bypass, Arbitrage, Traffic Pumpig, Tromboig ad more. It also assists the Wholesale Fraud Maagemet uit whe hadlig disputes betwee carriers resultig from fraud which reuires access to detail traffic iformatio. Through BTS s Network Security Audit, a process of o-itrusive auditig most of which is doe without the eed for MNO s techical staff or facility access. BTS will review ad aalyze the customer s etwork security profile. BTS will traslate the complex techical data ito clear busiess risk statemets, eable the leadership team to make the appropriate busiess decisios ad follow GSMA stadard etwork security. Phase 1: Short Aalysis Iitial Network Security Profile Assessmet & Report Phase 2: Coect with Network Departmet Techical Review & Advaced Network Security Audit Phase 3: O-goig Audits ad Veificatios Verificatio Audit & Security Risk Mitigatios BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 5

BTS Ati-Fraud Alarms Alarms soud whe icreases i traffic volumes to destiatios outside the customer s ormal traffic patter are detected. Alarms soud whe detectio of a 10% icrease i call duratio from calls received by customer is reached. Alarms soud whe o average whe more tha 10% of a customer s call experieces a 50% icrease withi the hour over the average ACD measuremet. ANI s DNI Criteria Whe repeated ANI appears with low ASR comig from the same supplier. Whe ANI ad/or DNI umbers are repeated more tha 4 times i a hour with a duratio higher tha 8 miutes. Duplicated calls usig the same umber for origiatio ad termiatio of a call. ANIs & DNIs registerig more tha 60 miutes withi a 3 hour period. Supplier Detectio Alarm Warig System Suppliers registerig higher statistics over pre-defied parameters for a give destiatio as compared to others. Suppliers that cotiuously are repeat offeders to the aalysis metioed above. BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 6

A robocall is a self-geerated phoe call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. BTS has: Access to hudreds of suppliers. Market itelligece to kow where the traffic is. Pricig aalysis of suspicious routes to sell below market price. Usig this iformatio, test systems are cofigured to detect illegal routes. Robocall Detectio Calls ca be geerated to a BTS gateway istalled o the cliet facilities. The customer must provide the SIM cards to BTS for testig. BTS will geerate calls to the cliet SIM cards. BTS will preset daily reports ad aalysis about the geerated calls. Geerated calls from the cliet will be routed to the destiy etwork via BTS. CDRs Exchage to the cliet etwork. Use of market itelligece to idetify the origi of this fraudulet traffic. BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 7

CDRs exchage: Robocall Detectio (Phases) BTS ca provide all CDRs calls to the cliet etwork i a secure FTP (SFTP) o a daily basis for the customer to cotrast with their records ad idetify illegal calls. Alteratively, the customer ca provide all (atioal ad iteratioal) BTS daily CDRs ad idetify which of the calls that passed through the etwork of BTS were illegal. Phase 1: Traffic Geeratio Batteries geeratio calls via TeleCop Dyamic routig alteratig carriers Geerated traffics i differet backgrouds Usig LCR for routig calls battery Phase 2: Maual Call Dialig Creatig a tuel for geeratio of maual calls Calls ca be geerated by the cliet, simulatig origi USA / Spai ad accessig all termiatio offers. Phase 3: Data Collectio Aalysis Collectio of geerated calls, CDRs of all tests. CDRs delivery to the cliet for his aalysis.. Iformatio Aalysis ANI ad / or Route / Carrier / Natioal or Iteratioal Reports delivery about geerated traffic, carriers used, rates offered BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 8

Real-Time Traffic Aalysis BTS has developed prove skills i idetifyig solutios that help combat fraud worldwide. Together after cosultatio, solutios are customized to fit the mobile phoe operators uiue reuiremets i order to attai the highest customer satisfactio. BTS has extesive experiece workig with PTT s, MO s, MVNO s, Carriers ad govermets combatig the fraud ecosystem. ANALYZE We work with MNOs to support Call Data Records (CDRs) data collectio ad provide aalysis usig CDRs ad Test Call detectios. Gather data Look for patters Calculate locatio estimate BTS provides optioal data collectio DEFFINE PATTERN Several idicators are cosidered as iputs to the classificatio algorithm A ad B umbers ALOC ad ASR Date ad time of the calls IP media address Codecs Call hold (for 3-way callig) BLOCK Calls ca be routed to recordigs, dowgrade uality or block callers Provide fidigs to authorities to support takedow. Ivestigatio report Authority cosultatio Authorities shutdow fraud operatios BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 9

SIM BOX Locatio More tha 60% of iteratioal calls termiate o mobile etworks. Ed to ed VoIP calls accouts for more tha 20% of global voice traffic of witch 70% of iteratioal VoIP calls are estimated to be routed via SIM boxes. The BTS SIM Box Locator service aims to detect the fraud related MSISDNs ad prevet them from beig used for further bypass activity. By cotractig to the BTS SIM Box Locator service, oe is able to detect, defed ad deter bypass activity. The detectio is doe by usig a sophisticated test call applicatio which ca simulate iteratioal calls from aroud the world. The results are traced via a probe istalled i the cliet s etwork ad immediate aalysis of results is reported back to the cliet. The cliet ca defed itself from the MSISDNs idetified o its etwork by blockig them thus prevetig them from cotiued use for bypass activities. We help customers to idetify SIM Boxes termiatig traffic to the etwork illegally via fixed, mobile etwork callig cards or through VoIP routes. The service is desiged to cotiuously moitor the fraudulet actios ad will adapt detectio methods to evetually deter SIM box operatios. The Real Time Detectio solutio idetifies SIM boxes o a real time basis ad shares relevat records effectively, so that oe ca cut correspodig SIM cards immediately. Guaratees stop of reveue losses with very limited iput from cliets staff SIM boxes are detected withi miutes ad reported i real time BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 10

Cotact Us MIAMI - USA 2620 SW 27 Aveue. FL-33133-3005 Tel. +1 305 358 5850 MADRID - SPAIN Serrao, º 85 2º Derecha 28006 Tel. +34 91 291 83 50 ZARAGOZA - SPAIN Josefa Amar y Borbo 10, P 3º 50001 Tel. +34 976 214 883 ROME ITALY Via Ippolito Nievo, 62 00153 Rome Tel. +39 065 830 1322 SINGAPORE 11 Collyer Quay, Level 17, #1728, 049317 Tel. +1 786 664 6882 BUENOS AIRES - ARGENTINA Pacheco de Melo 2095, P 4º C1126AAE CABA Tel. +1 786 664 6898 Marketig@bts.io www.bts.io BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 11

Thak you