c7-monit.txt 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150
  1. CCiTT #7 Monitoring
  2. The information presented here is based on Data of :
  3. þ Bellcore (Bell Communication Research) - USA
  4. þ Mercury Communications - United Kingdom
  5. þ Telekom - Germany
  6. þ AcceSS 7 - Hewlett Packard Research CCiTT #7 Monitoring System
  7. Note that some of the data presented in this article might be
  8. classified material by some of those companies.
  9. What is CCiTT #7
  10. ----------------
  11. CCiTT #7 is the newest signalling system also called SS7 (or also Common
  12. Channel Signalling No.7). It uses two channels for communication.
  13. The first is the voice channel (or what ever you are transmitting over it)
  14. and the second is the data channel. This data channels is completly seperated
  15. from the voice channel and holds all calling information in it plus has got
  16. the advanced features of caller ID, call forwarding, conference calling,
  17. credit card calls, collect calls etc.
  18. This extra data channel was put in since ccitt #6 because first it disables
  19. now the "famous" blueboxing possiblity, second enhances line quality and
  20. third expands possiblities for new features like caller ID etc.
  21. It is used in nearly all west european countries, but now more and more
  22. other countries change to this system as well like israel for example.
  23. Monitoring Systems for CCiTT #7
  24. -------------------------------
  25. As far as i know the following Monitoring Systems are in existance and
  26. available for telecommunication companies :
  27. þ Bellcore : Davin and NetMavin
  28. þ Hewlett Packard : HP E4250A, also known as AcceSS 7
  29. þ Unisys : NIRIS Information Platform
  30. þ Algen : Probe
  31. þ Bellcore's monitoring system is based on unix and is programmed in C using
  32. the X11 Unix Window System but can also be run on vt100 terminals and soon
  33. on Macintoshs too. It can run on any workstation which is Unix compactible.
  34. It has got also the possbility to work with data from other
  35. Monitoring Systems like AcceSS 7 from HP and also use the C libraries from
  36. HP's system.
  37. It's easy to use with mouse support, Window graphic displays in realtime,
  38. Zooming etc.
  39. Interesting Options are for example :
  40. Monitoring calls from a specific telephone number
  41. Automatic Fraud Detection
  42. Multiple simultaneos call traced (up to 100)
  43. Bellcore's Davin and NetMavin is used by Bell and Mercury Telecommunication.
  44. þ Hewlett Packards monitoring system is more general than Bellcore's.
  45. It's based on HP unix machines (Apollos I think) running HPUX Unix.
  46. It is very flexible and can link in any CCiTT #7 system.
  47. Everything is written in C and the customer can program, enhance and tune
  48. the monitoring tools as they like. Basic Tools are implemented so is the
  49. monitoring data collection tools, but everything else must be programmed
  50. by the customer or by an HP service team - but be sure they know what they
  51. can do and will program everything to get you.
  52. HP's AcceSS 7 System is used by the german Telecom.
  53. (Installed in Frankfurt, Duesseldorf, Stuttgart and Nuernberg with
  54. Controll Centers in Frankfurt and Bamberg)
  55. þ Sorry, on the two others i haven't got any information, and i don't know
  56. if other monitoring systems exist.
  57. Of course Fraud Detection is not the main point of CCiTT #7 Monitoring.
  58. It's more gathering traffic statistics for network planning, optimizing,
  59. error controlling & detecting, and market decicions - but fraud detection
  60. is an important part.
  61. How does CCiTT #7 Fraud Detection work
  62. --------------------------------------
  63. Automatic Fraud Detection is based on pattern matching.
  64. Patterns must first be measured for each every communication network/area.
  65. Everything which is out of this pattern triggers an alarm.
  66. Out-of-Pattern are :
  67. identify calls of long duration
  68. repeated calls to a particular dialed number from the same area of origin
  69. repeated calls from the same area of origin to different numbers
  70. long/many calls from an unbillable number
  71. dialing special numbers
  72. dialing many toll free numbers
  73. A triggered alarm can result in anything, also depending on type of alarm :
  74. saving data to log
  75. continued electronical oberservation to detect more out-of-pattern behavior
  76. autotrace
  77. alarm operator
  78. XXXXXXXXXXXXXXXX
  79. XXXXXXXXXXXXXXXX \
  80. XXXXXXXXXXXXXXXX \
  81. XXXXXXXXXXXXXXXX \ Out-of- --> XXXXXXXX \ Continues --> XX
  82. XXXXXXXXXXXXXXXX - Pattern --> XXXXXXXX - Out-of-Pattern --> XX
  83. XXXXXXXXXXXXXXXX / XXXXXXXX / or
  84. XXXXXXXXXXXXXXXX / Manual
  85. XXXXXXXXXXXXXXXX / Inverstigation
  86. XXXXXXXXXXXXXXXX
  87. Calls going Monitoring Alarms of Continued FRAUD
  88. though Monitoring system Monitoring Out-of-Pattern CASES
  89. system Analyzing system or
  90. Manual Investigation
  91. Yes thats all ... there aren't much information available and even those
  92. mentioned here are only known to a small group, although someone could
  93. logically think it would be this way, but now you know it for sure ;-)
  94. Please note that some data might be wrong or outdated (also it should not).
  95. If so please tell me and in the next issue I'll present the new/corrected data.
  96. If you got additional data, do something for the phreaker community and
  97. send it me to release it in the next magazine or release it on your own!
  98. Ciao...
  99. van Hauser
  100.