skip to main content
10.1145/3056662.3056687acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article

A near real time SMS grey traffic detection

Published: 26 February 2017 Publication History

Abstract

Lately, mobile operators experience threats from SMS grey routes which are used by fraudsters to evade SMS fees and to deny them millions in revenues. But more serious are the threats to the user's security and privacy and consequently the operator's reputation. Therefore, it is crucial for operators to have adequate solutions to protect both their network and their customers against this kind of fraud. Unfortunately, so far there is no sufficiently efficient countermeasure against grey routes. This paper proposes a near real time SMS grey traffic detection which makes use of Counting Bloom Filters combined with blacklist and whitelist to detect SMS grey traffic on the fly and to block them. The proposed detection has been implemented and proved to be quite efficient. The paper provides also comprehensive explanation of SMS grey routes and the challenges in their detection. The implementation and verification are also described thoroughly.

References

[1]
3rd Generation Partnership Project; Technical realization of the Short Message Service (SMS), 3GPP TS 23.040
[2]
3rd Generation Partnership Project; Point-to-Point Short Message Service (SMS) support on mobile radio interface. 3GPP TS 24.011
[3]
International Telecommunication Union ITU-T: Introduction to CCITT Signalling System No. 7 Recommendation Q.700 (03/93)
[4]
ETSI: Digital cellular telecommunications system (Phase 2); Mobile Application Part (MAP) specification (GSM 09.02 version 4.19.1) ETS 300 599
[5]
International Telecommunication Union ITU-T: Signalling connection control part formats and codes Recommendation Q.713
[6]
PurgeFraud.com: Bypass Fraud
[7]
Ovum: Sustaining A2P SMS growth while securing mobile networks - Harnessing pricing elasticity to optimize enterprise messaging revenues, 2015
[8]
Tretyakov, K: Machine Learning Techniques in Spam Filtering, Data Mining Problem-oriented Seminar, MTAT.03.177, May 2004, pp. 60--79
[9]
Nelson, B. et all: Exploiting Machine Learning to Subvert Your Spam Filter, LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, California --- April 15 -- 15, 2008
[10]
Coskun, B. & Giura, P.: Mitigating SMS Spam by Online Detection of Repetitive Near-Duplicate Messages, Proceeding of 2012 IEEE International Conference on Communications (ICC)
[11]
Jensen, Kristoffer, Do, Thanh van, Nguyen, Hai Thanh & Årnes, Andre: Better Protection of SS7 Networks With Machine Learning, Proceeding of ICITS 2016 - International Conference on IT Convergence and Security, August 2016
[12]
Do, Thanh van et all: Detecting IMSI-Catcher Using Soft Computing, Proceeding of First International Conference on Soft Computing in Data Science, September 2015 Jaccard, P. (1901) Distribution de la flore alpine dans le bassin des Dranses et dans quelques régions voisines. Bulletin de la Société Vaudoise des Sciences Naturelles 37, 241--272
[13]
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, pp. 422--426, July 1970. [Online]. Available
[14]
M. Ponec, P. Giura, H. Bronnimann, and J. Wein, "Highly efficient techniques for network forensics," in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 150--160. [Online]. Available: http://dl.acm.org/citation.cfm?doid=1315245.1315265

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICSCA '17: Proceedings of the 6th International Conference on Software and Computer Applications
February 2017
339 pages
ISBN:9781450348577
DOI:10.1145/3056662
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 February 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. artificial intelligence
  2. cyber security
  3. machine learning
  4. mobile network fraud
  5. mobile network security
  6. privacy
  7. vulnerability

Qualifiers

  • Research-article

Conference

ICSCA 2017

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 106
    Total Downloads
  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media