3D physical localization of voice phishing SIMBOX on cellular networks셀룰러 네트워크 환경에서 보이스피싱 심박스의 물리적 위치 추적에 관한 연구

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 221
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKim, Yongdae-
dc.contributor.advisor김용대-
dc.contributor.authorOh, Taekkyung-
dc.date.accessioned2023-06-26T19:31:56Z-
dc.date.available2023-06-26T19:31:56Z-
dc.date.issued2021-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=1007059&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/309614-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2021.8,[iv, 20 p. :]-
dc.description.abstractThe total financial loss due to voice phishing within Korea has risen to over USD 620 million in 2020. Most of the crimes involve a SIMBOX, serving as a VoIP (Voice over IP) gateway, that can hide the origin of the call. Voice phishers located outside of a country utilize the SIMBOX to make a fraudulent local mobile call. To address voice phishing crime, various methods have been proposed and utilized, most of which are passive. One active defense mechanism currently be used is to physically localize and confiscate the SIMBOX. At present, to confiscate the SIMBOX, the police obtain information of the cellular base station where the SIMBOX is located with the cooperation of the carriers. As most of the existing SIMBOXes support 3G calls, they then monitor the existence of the uplink 3G communication signal within the base station using radio equipment. Finally, using directional antennas, they can localize the SIMBOX by following the direction of the signal. This mechanism, however, would not work against SIMBOX supporting VoLTE (Voice over LTE), because most of the UE (User Equipment) currently utilize VoLTE. More precisely, it is impossible to distinguish whether the uplink signal is generated by the SIMBOX used for voice phishing or normal UE in the current cellular network. To solve this problem, we propose two approaches for the 3D physical localization of voice phishing SIMBOX on LTE cellular networks. First, we develop a technique that can distinguish the uplink signal of the SIMBOX from that of the normal UE. Second, we propose a mechanism where the base station directly allocates a specific uplink frequency to fingerprint the signal from the SIMBOX. Using directional antennas, we can localize the SIMBOX as in 3G cases.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectCellular network▼aVoIP▼aLTE▼aVoLTE▼aVoice phishing▼aSIMBOX-
dc.subject셀룰러 네트워크▼a브이오아이피▼a엘티이▼a브이오엘티이▼a보이스피싱▼a심박스-
dc.title3D physical localization of voice phishing SIMBOX on cellular networks-
dc.title.alternative셀룰러 네트워크 환경에서 보이스피싱 심박스의 물리적 위치 추적에 관한 연구-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
dc.contributor.alternativeauthor오택경-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0