-
Research of Caller ID Spoofing Launch, Detection, and Defense
Authors:
Volodymyr Buriachok,
Volodymyr Sokolov,
Mahyar TajDini
Abstract:
Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the develo** communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult to have protection against it. In addition, there…
▽ More
Caller ID parodying produces the valid Caller character, in this manner deciding seem to start from another client. This apparently basic assault strategy has been utilized in the develo** communication fake and trick calls, bringing about significant financial trouble. Unfortunately, callerID spoofing is easy to implement but yet it is difficult to have protection against it. In addition, there are not effective and defense solutions available right now. In this research it is suggested the CIVE (Callee Inference & VErification), a compelling and viable guard against Caller ID spoofing. This way it is described how it's possible to lunch call spoofing and between line describe how CIVE approach method can help to prevent somehow this kind of attacks. Caller ID Spoofing could cause huge financial and political issues special nowadays, when many things even sometimes authentication and verification are available by phone call, like banks approving transactions or two factor authentications and many other things. We believe critical industries specially banks and payment service providers should be protected against such vulnerabilities with their system and make an approach to prevent it, also it is very important to learn people specially who has special social place like politicians or celebrities to know such kind of attack are already exist. For this paper we implemented a call from white house to show there is no limitation and no matter whom you try to spoof, but destination which is the victim receive the call and that make this attack vector dangerous. And even modern communication and even devices like 4G and smart phones are not able to prevent or even detect this kind of attack. This study is a demonstration of the vulnerabilities available. All experiments were conducted on isolated mock-ups.
△ Less
Submitted 1 April, 2020;
originally announced April 2020.
-
Results and Tools for Evaluating the Effectiveness of Focusing Systems to Improve Accessibility in Wireless Networks
Authors:
Volodymyr Astapenya,
Volodymyr Sokolov,
Mahyar TajDini
Abstract:
The widespread use of wireless technologies leads to an ever-increasing number of users and permanently functioning devices. However, the growth of the number of wireless users in a limited space and a limited frequency range leads to an increase in their mutual influence, which ultimately affects the throughput of wireless channels and even the performance of the system as a whole. The article pr…
▽ More
The widespread use of wireless technologies leads to an ever-increasing number of users and permanently functioning devices. However, the growth of the number of wireless users in a limited space and a limited frequency range leads to an increase in their mutual influence, which ultimately affects the throughput of wireless channels and even the performance of the system as a whole. The article presents the statistics and tendencies of the distribution of wireless networks of the IEEE 802.11 standard systems, as well as analyzes the main problems that arise during the expansion of their use. Substantiation and choice of ways to overcome these difficulties largely depends on the objective control of radiation parameters of access points and subscriber funds in a particular environment. The review of the state control facilities provided by the developers of the equipment is presented, and author's variants of experimental measuring complexes are offered, allowing to control signal and information parameters of Wi-Fi systems. The experimental results obtained with the use of the indicated means, obtained using the accelerating metal-plate lens as an additional autonomous element for focusing the field, including for MIMO systems, the effect of the accelerating metal-plate lens on the spatial distribution of the field, on the spectral structure of the signal are presented. In addition, polarization effects were investigated. Possible ways to further increase the availability, integrity of information and energy efficiency of wireless access systems are discussed. The authors propose simpler and less costly options for increasing the direction of radiation on the basis of an accelerating metal-plate lens, experimentally tested, as well as the use of zone zoning on the path of the computer.
△ Less
Submitted 1 July, 2019;
originally announced July 2019.
-
Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio
Authors:
Mahyar TajDini,
Volodymyr Sokolov,
Volodymyr Buriachok
Abstract:
The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area, provides a comparative analysis of SDRs…
▽ More
The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves with the focus on Bluetooth. The paper contains the analysis of the latest scientific work in this area, provides a comparative analysis of SDRs and the rationale for the choice of hardware, gives the sequence of actions for collecting wireless data packets and data collection from ZigBee and BLE devices, and analyzes ways to improve captured wireless packet analysis techniques. For the study collected experimental setup, the results of which are analyzed in real time. The collected wireless data packets are compared with those sent. The result of the experiment shows the weaknesses of local wireless networks.
△ Less
Submitted 26 June, 2019;
originally announced June 2019.