Over-the-top bypass: Study of a recent telephony fraud

Sahin, Merve; Francillon, Aurélien
CCS 2016, 23rd ACM conference on Computer and communications security, October 24-28, 2016, Vienna, Austria

In this paper, we study the Over-The-Top (OTT) bypass fraud, a recent form of interconnect telecom fraud. In OTT bypass, a normal phone call is diverted over IP to a voice chat application on a smartphone, instead of being terminated over the normal telecom infrastructure. This rerouting (or hijack) is performed by an international transit operator in coordination with the OTT service provider, but without explicit authorization from the caller, callee and their operators. By doing so, they collect a large share of the call charge and induce a significant loss of revenue to the bypassed operators. Moreover, this practice degrades the quality of service without providing any benefits for the users.

In this paper, we study the possible techniques to detect and measure this fraud and evaluate the real impact of OTT bypass on a small European country. For this, we performed more than 15,000 test calls during 8 months and conducted a user study with more than 8,000 users.

In our measurements, we observed up to 83% of calls being subject to OTT bypass. Additionally, we show that OTT bypass degrades the quality of service, and sometimes collide with other fraud schemes, exacerbating the quality issues. Our user study shows that OTT bypass and its effects are poorly understood by users.


DOI
Type:
Conference
City:
Vienna
Date:
2016-10-24
Department:
Digital Security
Eurecom Ref:
5019
Copyright:
© ACM, 2016. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS 2016, 23rd ACM conference on Computer and communications security, October 24-28, 2016, Vienna, Austria http://dx.doi.org/10.1145/2976749.2978334

PERMALINK : https://www.eurecom.fr/publication/5019