Modelling telecom fraud with e3value

Dan Ionita, Sebastiaan Koenen, Roelf J. Wieringa

    Research output: Book/ReportReportProfessional

    291 Downloads (Pure)

    Abstract

    Telecommunication services are complex product packages that rely on a large and complex technical infrastructure. However, fraudulent use of such telecommunication services rarely exploits hardware vulnerabilities. Instead, most common exploits operate at a business level, capitalizing on the unexpected interaction between various product packages from multiple providers. As such, an assumption was made that in order to fully describe the scenarios, a modelling language capable of describing value transactions between actors is required. In order to validate this assumption, a business value modelling language, e3value was selected, generic (non-misuse) business models were created and four misuse scenarios were modelled. This report showcases the models, discusses strengths and limitations encountered during modelling and draws conclusions with regard to the applicability, usability and utility of e3value models in modelling (Telecom) fraud as well as more generally in Risk Assessment.
    Original languageEnglish
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Number of pages28
    Publication statusPublished - 31 Oct 2014

    Publication series

    NameCTIT Technical Report Series
    PublisherUniversity of Twente, Centre for Telematics and Information Technology (CTIT)
    No.TR-CTIT-14-11
    ISSN (Print)1381-3625

    Keywords

    • EC Grant Agreement nr.: FP7/2007-2013
    • Telecom fraud
    • Attacker motivation
    • Impact estimation
    • Business value
    • EC Grant Agreement nr.: FP7/318003

    Fingerprint

    Dive into the research topics of 'Modelling telecom fraud with e3value'. Together they form a unique fingerprint.

    Cite this