Assessment of SIMBox Fraud: An Approach to National Security Threat

Kala, N. (2021) Assessment of SIMBox Fraud: An Approach to National Security Threat. In: Innovations in Science and Technology Vol. 1. B P International, pp. 61-74. ISBN 978-93-5547-209-0

Full text not available from this repository.

Abstract

SIMBox fraud is one of the most sophisticated fraud types in the recent times. Telecom regulators and mobile operators are facing massive revenue losses as bypass fraud continues to be one of the most prolific and costly frauds. To terminate international inbound calls to local subscribers, gateway equipment such as fixed, Voice over Internet Protocol (VoIP), Global System for Mobile Communication (GSM), Code Division Multiple Access (CDMA), VOIP to GSM, and fixed line gateway are used. Fraudsters bypass the connections by diverting traffic away from legal interconnect gateways. Fraudulent Operators sending outbound international traffic connect to interconnect operators with lower rates, leading to loss of revenue for the original internet service provider. SIMBox fraud is considered illegal since those who undertake it are not licensed to provide telecommunication services. SIMBox fraud is also considered as a national security threat since terrorist groups use this device to make international calls at local call rates. The main objectives of this study is to provide background of cellular networks, internet gateway, voice over internet protocol, preliminary overview to SIMBox architecture, internet bypass fraud - including GSM gateway fraud and SIMBox fraud and the State-of-Art Procedures to combat SIMBox fraud. This chapter focuses on the study of SIMBox fraud as a National Security threat. Further this study also suggests the methods for mitigating such security threat and the next generation forensic detection methods.

Item Type: Book Section
Subjects: Opene Prints > Multidisciplinary
Depositing User: Managing Editor
Date Deposited: 20 Oct 2023 04:13
Last Modified: 20 Oct 2023 04:13
URI: http://geographical.go2journals.com/id/eprint/2744

Actions (login required)

View Item
View Item