
iVisher: Real‐Time Detection of Caller ID Spoofing
Author(s) -
Song Jaeseung,
Kim Hyoungshick,
Gkelias Athanasios
Publication year - 2014
Publication title -
etri journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.295
H-Index - 46
eISSN - 2233-7326
pISSN - 1225-6463
DOI - 10.4218/etrij.14.0113.0798
Subject(s) - phone , phishing , spoofing attack , voice over ip , computer security , session (web analytics) , computer science , internet privacy , telephone number , session initiation protocol , protocol (science) , the internet , computer network , world wide web , server , medicine , philosophy , linguistics , alternative medicine , pathology
Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol–based Voice‐over‐Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.