Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 33.831
Word version: 12.0.0
0…
4…
4
Spoofed call scenarios
5
Potential security requirements for detection
6
Potential solutions for detection
7
Out-of-band methods closed to user group
8
Evaluation of potential solutions
9
Conclusions and recommendations
$
Change History
4
Spoofed call scenarios
p. 8
4.0
Background
p. 8
4.0.1
General background
p. 8
4.0.2
Standardization background
p. 8
4.1
Scenario 1: Spoofed call using the VoIP
p. 9
4.2
Scenario 2: Spoofed call using the PRI/PBX
p. 9
4.3
Scenario 3: Spoofing identities from an application server
p. 10
4.4
Scenario 4: Spoofing identities from an IP-PBX towards IMS
p. 10
4.5
Scenario 5: Spoofing of caller ID
p. 10
4.6
Scenario 6: Spoofing of caller location
p. 11
4.7
Scenario 7: Internal spoofing
p. 11
4.8
Scenario 8: Direct interconnect
p. 11
4.9
Scenario 9: Transit interconnect
p. 12
5
Potential security requirements for detection
p. 13
6
Potential solutions for detection
p. 13
6.1
IBCF checking incoming requests from untrusted networks
p. 13
6.2
Present only trusted CLIs
p. 15
7
Out-of-band methods closed to user group
p. 18
7.1
Verifying through "middle" 3rd party
p. 18
7.1.1
Process description
p. 18
7.1.2
Call process diagram
p. 20
7.2
Using TOTP to verify caller
p. 21
7.2.1
TOTP key exchange
p. 22
7.2.2
Call process
p. 23
7.3
Verifying caller through shared confidential data
p. 23
7.3.1
Company confirming information with customer
p. 24
7.3.2
Data registration
p. 25
7.3.3
Call process
p. 26
8
Evaluation of potential solutions
p. 26
9
Conclusions and recommendations
p. 26
$
Change History
p. 28