Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Detecting Caller ID Spoofing Attacks

Aman Donald Ram


Department of Computer Science and Engineering
Lovely Professional University, Punjab

Abstract—Caller ID (caller identification) is a service pro- causing a loss of more than $15 million dollars annually;
vided by telephone carriers to transmit the phone number caller ID spoofing is also a common technique used for
and/or the name of a caller to a callee. Today, most people swatting, which is an attempt to trick an emergency service
trust the caller ID information, and it is increasingly used to
authenticate customers (e.g., by banks or credit card with false reporting of an incident — for instance, police
companies). However, with the proliferation of smartphones officers were tied-up in responding to a non-existent robbery
and VoIP, it is easy to spoof caller ID by installing reported by pranksters; drugs were misused as a result of
corresponding Apps on smartphones or by using fake ID spoofed pharmacists’ phone number, other incidents include
providers. As telephone networks are fragmented between identity theft, purchase scams, etc. Due to the proliferation
enterprises and countries, no mechanism is available today to
easily detect such spoofing attacks. This vulnerability has of detrimental incidents caused by caller ID spoofing, the
already been exploited with crucial consequences such as US government passed the legislation Truth in Caller ID
faking caller IDs to emergency services (e.g., 9-1-1) or to Act of 2009 making it illegal to transmit misleading or
commit fraud. inaccurate caller ID information with the intent to defraud.
In this paper, we propose an end-to-end caller ID verification However, the legislation does not stop the misuse or
mechanism CallerDec that works with existing combinations
of landlines, cellular and VoIP networks. CallerDec can be fraud, and today spoofing caller IDs has become much
deployed at the liberty of users, without any modification to the easier, because many VoIP providers allow anyone to claim
existing infrastructures. We implemented our scheme as an App arbitrary caller IDs through VoIP client software (e.g., x-
for Android-based phones and validated the effectiveness of our lite), and fake ID providers allow their customers to claim
solution in detecting spoofing attacks in various scenarios. any caller ID by simply dialing a special phone number or by
Keywords-End-user Security; Caller ID Spoofing; utilizing readily available Apps on smartphones (e.g., Caller
ID Faker). Thus, in this paper, we focus on detecting caller
I. I NTRODUCTION ID spoofing attacks.
“What’s worse than a bad authentication system? Caller ID spoofing is possible because caller IDs are
A bad authentication system that people have transmitted in plaintext with no authentication mechanisms
learned to trust”. in place. When a call is routed between different carriers,
Caller ID services transmit the phone number and/or the callee’s carrier will simply accept the caller ID claimed
the name of a caller to the recipient (callee) as caller ID by a caller’s carrier. Given the lack of authentication be-
intending to provide informed consent to the callee before tween carriers, caller IDs could be trustworthy if (a) the
answering calls. However, Caller ID has been increasingly telephone service providers do not manipulate caller IDs,
used to authenticate the identities of callers, or to verify their (b) The telephone infrastructure is tightly controlled, and no
physical locations in several systems, ranging from 9-1-1 intruders could tap into the infrastructure to create an
emergency services, automatic telephone banking systems, arbitrary caller ID. These conditions were true in the early
credit card activation systems, to voicemail services. Un- days as the telephone network used dedicated lines operated
fortunately, existing caller ID protocols do not provide real by a monopoly. Today, with current converging phone/data
authentication and hence are untrustworthy for authenticat- networks and diversity of telephone service carriers, neither
ing callers’ locations or identities, because caller IDs are holds any more. Moreover, telephone carriers may not be
vulnerable to spoofing attacks; i.e., an attacker can easily able to solve the problem even if they can redesign the
send a fake caller ID to a callee. This vulnerability has protocols. This is because the entire telephone infrastructure
already been exploited in a variety of misuse and fraud comprises several telephone carriers with their own trusteds
incidents: In the US, thousands of people were victimized domains, and a carrier can at most verify calls originated in
by credit card fraud with the help of caller ID spoofing, its own network but not from other networks. To the best of

* This author is the corresponding author.


our knowledge, no mechanism is currently available to users SS7/VoIP
for detecting caller ID spoofing without answering the call €aller's €allee's
€arrier €arrier
first or without a special interface (and agreement) provided
by the carrier, as used by commercial solution TrustID.
Challenges and contributions. We propose to design an
Fake ID
end-to-end solution to detect caller ID spoofing. Designing Provider
such a practical mechanism is challenging: First, only lim-
Eve Bob
ited information and resources are available at end users. The
route of call signalling is unknown. Second, compatibility Figure 1. An illustration of how a fake ID provider spoofs a caller ID
to different protocols (GSM, VoIP, PSTN) limits the design leveraging the loophole in network interconnection protocols.
space. Third, a large deviation from the regular calling causes any caller identification service to knowingly transmit
procedure is unlikely to be accepted by most people. Thus, misleading or inaccurate caller identification information
naive solutions such as rejecting an incoming call and then with the intent to defraud, cause harm, or wrongfully obtain
calling back, are not an option. The detection mechanisms anything of value. This definition makes it difficult to detect
should be mostly automated and require little user input. caller ID spoofing, since there are a few standard, non-
Fourth, a few legitimate services provided by telephone malicious telecommunication services that result in a
companies allow the caller IDs to be different from the mismatch of the displayed number and should not be
calling numbers, making those caller IDs appear to be classified as caller ID spoofing. In this section, we first
spoofed. However, those scenarios should not be classified as discuss spoofing attacks that can be carried out in different
caller ID spoofing attacks. We address all these requirements telephone setups, and then discuss scenarios that should not
and design an end-to-end caller ID verification scheme that be identified as spoofing attacks.
we call CallerDec. Essentially, CallerDec utilizes a
covert timing channel between end users to verify the caller. A. Spoofing via Fake ID Providers
The timing channel in telephone networks is feasible because Fake ID providers offer caller ID spoofing services. They
delays in circuit-switched telephone networks are stable due establish SS7/VoIP connections with various telephone car-
to their quality of service (QoS) requirements, unlike the riers (e.g., AVOICS), and act as intermediary between
ones in Internet. We summarize our contributions as attackers and victims to relay caller IDs specified by its cus-
follows: tomers (attackers in this case). Fig. 1 illustrates an example,
• We propose CallerDec, an end-to-end caller ID where an attacker (Eve) tries to call the victim (Bob) faking
verification scheme that requires no modification to Alice’s caller ID. First, Eve calls the fake ID provider, and
the existing telephone infrastructure and is applica- supplies Bob’s phone number as the destination number and
ble to calling parties using any telephone services. Alice’s phone number as the desired spoofed caller ID. Then,
CallerDec can detect spoofing even if a caller ID the fake ID provider establishes a call to Bob with Alice’s
is not in the contact list or is unreachable. caller ID, and finally connects Eve with Bob once the call
• We present two use cases of CallerDec, one for an
is answered. Eve can subscribe to a fake ID provider and
emergency call scenario (e.g., 9-1-1 call) and the other carry out spoofing attacks towards any victim from any type
for a regular call scenario. In both cases, the end users, of phone, provided that the fake ID provider is connected to
(e.g., a 9-1-1 service or an individual customer) can the victim’s network.
utilize CallerDec to verify caller IDs. B. Spoofing via VoIP Services
• We implement CallerDec as an App for Android-based
smartphones where we tackle several technical chal- Many VoIP carriers allow their customers to specify their
lenges caused by the limited API support for controlling own caller ID, and will forward the caller ID to the callee’s
calls. We examine the CallerDec performance in carrier without modifications. An adversary can subscribe
various scenarios, and show that it can detect spoofed to a VoIP carrier that allows caller ID manipulation and can
caller ID effectively and efficiently (i.e. incurring al- either use VoIP client software or a VoIP phone to claim
most no extra energy overhead). arbitrary caller IDs.
We stress that, while we implemented CallerDec on C. Spoofing via Automated Phone Systems
Android smartphones as a case study, our solution can also Automated phone systems provide Interactive Voice Re-
be integrated in any other telephone devices. sponse (IVR) services for purposes of marketing, survey
collection, etc. Some service providers (e.g., Voxeo, Nuance
II. C ALLER ID S POOFING ATTACKS
Cafe) allow their subscribers to select their own caller IDs
Caller ID spoofing is defined in the US legislation act as: and will deliver the selected caller IDs for their subscribers
A caller ID spoofing attack is a malicious action that regardless of their intention. Because these
providers connect to major telephone carriers via SS7 or reject voicemail
VoIP protocols, the downstream telephone carriers will new verification call answer
simply accept any caller IDs, including the spoofed ones.
verification straight to
reject after ıv pressed “1”
D. A Mismatched Caller ID but not Spoofing call after ısv voicemail
no no yes yes
no no
The caller ID blocking services and Primary Rate In- yes
terface (PRI) lines generate a mismatched caller ID, but
should not be classified as caller ID spoofing. For caller ID original no yes pressed “2”
no
blocking service, a carrier will transmit the text BLOCKED call active?
yes
or UNAVAILABLE instead of the real caller ID to the callee. yes
PRI lines are designed for business organizations that want VALID SPOOFED NOTSUPPORTED
to support multiple simultaneous calls (i.e., 32 channels for
an E1 line ) while sharing one single caller ID for all their
phone lines. In a PRI system, each phone line inside an end
organization is connected to the PRI line through a Private
Branch Exchange (PBX), which assigns the same caller ID
to all outgoing calls. The mismatched caller IDs in PRI lines
are different from caller ID spoofing because the caller ID confirming the caller ID or to press “2#” to reject
associated with a PRI line is officially owned by the business the verification. To proof her Caller ID, Alice
organization and once assigned, and the caller ID cannot be presses the proper keys, and Bob will conclude
changed without the permission from telephone carriers. Our that the caller ID is VALID. Alternatively, Alice
CallerDec will recognize both blocking services and PRI may press a random key, and then Bob will
lines as non-spoofing cases. conclude that CallerDec is NOTSUPPORTED at
Alice’s end. In addition, Alice may ignore the call
III. C ALLER D EC : V ERIFYING C ALLER IDS or may reject the call. For both responses, Bob will
conclude NOTSUPPORTED.
A. Overview i. Spoof a Reachable User. Similarly,
The basic idea of CallerDec is to create a trusted Alice may answer
covert channel between Alice and Bob, i.e., the the verification call. After Alice enters the
channel allows Alice and Bob to perform a challenge- proper input (i.e., “2#”), Bob will conclude that the
response but it is inaccessible to Eve. Forming such caller ID is SPOOFED. For all other key-press
an end-to-end covert channel is tricky as CallerDec (except “1#”), Bob will conclude
considers a telephone network as a black box and NOTSUPPORTED. In cases that Alice rejects the
the covert channel has to be compatible with all verification call, Bob will use the classifier to
types of telephone networks. Thus, we utilize the end- verify whether Alice has waited for an interval τv
to-end service —traditional phone call service— to before rejecting the call. Since the value of τv is
form an end-to-end covert channel between Alice and chosen before- hand to ensure that it is unlikely for
Bob. a human to reject calls after τv interval (e.g., τv =
Essentially, the covert channel is built on top of the 0), Bob’s CallerDec concludes
control channel that is used for call signaling in a NOTSUPPORTED. In cases that Alice ignores the
traditional telephone network where no users can call and the verification call goes to a voicemail
manipulate control channels directly. Nevertheless, after timeout on ringing, Bob will conservatively
the calling parties can ac- quire the status of the conclude that CallerDec is NOTSUPPORTED.
phone call (e.g., answered/rejected). Since Eve cannot ii. Spoof an Unreachable User. The
control or access the calls between Alice and Bob, verification call will go to a voicemail directly, and
they form a trusted covert channel by initializing, Bob can identify the situation utilizing the classifier
answering, or rejecting phone calls between them. and will conclude that CallerDec is SPOOFED.
REFERENCES
IV. C ONCLUSION [1] B. Schneier, http://www.schneier.com/blog/archives/2006/03/-
caller_id_spoof.html.
In this paper, we investigated caller ID spoofing attacks
[2] ABCNews, Caller ID Scam Solicits Personal Info, Money.
and identified that it is the network interconnection proto-
abcnews.go.com/GMA/Consumer/story?id=3305916, 2007.
cols that make caller ID spoofing possible. We designed
[3] D. Cuellar, Pranksters Terrorize Delco Family in “swatting”
an end-to-end solution, which we call CallerDec, to Call. WPVI-TV, Philadelphia, PA, 2010.
detect a spoofed caller ID. CallerDec verifies the caller [4] Rep. Engel Anti-Spoofing Bill Passes House,
ID using a covert channel, which is built on top of the http://engel.house.gov/latest-news1/rep-engel-anti-spoofing-
verification call from the callee to the claimed caller, and bill-passes-house.
CallerDec uses timing estimation together with the call [5] https://en.wikipedia.org/wiki/Caller_ID_spoofing
status for verification. We implemented CallerDec in
Android-based phones and validated that CallerDec can
effectively verify caller ID. Although the end-to-end delay
for completing a verification takes a few seconds, such delay
can be hidden when the verification is performed in parallel
to the voice call.
We studied CallerDec on Android-based phones as
a case study, but CallerDec can be integrated to other
types of phone terminals to protect end users from caller
ID spoofing attacks. In addition, the current CallerDec
will conclude NOTSUPPORTED when CallerDec is
not implemented by a phone terminal. We envision that
NOTSUPPORTED can be eliminated once the CallerDec
is supported on all telephone terminals.

View publication stats

You might also like