Gathering Threat Intelligence on Telephony Scams to Detect Fraud

Gathering Threat Intelligence on Telephony Scams to Detect Fraud

Black Hat via YouTube Direct link

Phoneprinting distinct telephony infrastructures

15 of 24

15 of 24

Phoneprinting distinct telephony infrastructures

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Gathering Threat Intelligence on Telephony Scams to Detect Fraud

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 Phoneypot IN ONE MONTH
  4. 4 PHONEYPOT VS ONLINE COMMENTS
  5. 5 System Overview
  6. 6 System Details
  7. 7 Call Transcription & processing
  8. 8 Natural Language Processing
  9. 9 Examples of Topics from Robocalls
  10. 10 Keywords are too noisy
  11. 11 Clustering of transcripts similarity matrix
  12. 12 Cluster extraction
  13. 13 Cluster Phoneprinting
  14. 14 Phoneprints are voice agnostic
  15. 15 Phoneprinting distinct telephony infrastructures
  16. 16 Google-related scams
  17. 17 Sharon, your Google specialist
  18. 18 Google Business Listing
  19. 19 Debt Collectors
  20. 20 Election year
  21. 21 Automating scamy spam detection and tracking
  22. 22 Conclusion
  23. 23 Acknowledgements & Questions
  24. 24 Experiment Overview

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.