z-logo
open-access-imgOpen Access
iVisher: Real‐Time Detection of Caller ID Spoofing
Author(s) -
Song Jaeseung,
Kim Hyoungshick,
Gkelias Athanasios
Publication year - 2014
Publication title -
etri journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.295
H-Index - 46
eISSN - 2233-7326
pISSN - 1225-6463
DOI - 10.4218/etrij.14.0113.0798
Subject(s) - phone , phishing , spoofing attack , voice over ip , computer security , session (web analytics) , computer science , internet privacy , telephone number , session initiation protocol , protocol (science) , the internet , computer network , world wide web , server , medicine , philosophy , linguistics , alternative medicine , pathology
Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol–based Voice‐over‐Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here