19-Oct-2016 11:47

How AntiFraud Systems of Operators Work

New business green

Cellular operators are investing heavily in the development of so-called AntiFraud systems. With their help it is possible to monitor the GSM termination using gateways. When the suspiciously high activity is detected, the systems block SIM-cards, which are used to terminate calls.

AntiFraud analytical and calling systems

Any AntiFraud system includes 2 components - the analytic and calling. The analytic component works by means of the following principle: analyzing the various parameters of the subscriber behavior in a network, it identifies terminated GSM traffic, whereupon the SIM-lock mechanism is activated. The antifraud calling system calls numbers, which fall under the suspicions, by VoIP. If the call takes place, it signals the cellular operator about GSM termination.

"Humanity" Parameters

There are special "humanity parameters" to determine terminated SIM-cards. AntiFraud systems allow for certain statistics about the behavior of a real person on the network and compare them with the "behavior" of the SIM-card. It is known that mobile operators are beginning to follow the subscriber number from the activation date.

GoAntiFraud will allow you to minimize the risks of the SIM-lock in the GSM termination. Reduce business costs on the purchase of new SIM-cards by buying the service license and you will get more profit!

Assessing the SIM-card, the system takes the following parameters into account:

  • The number of outgoing calls to different numbers cannot exceed 30 calls by a real person.
  • The ratio of outgoing calls and incoming calls should be about 20%.
  • The ratio of the total duration of outgoing calls to the total duration of incoming calls.
  • "Preferred numbers". These groups of subscriber numbers to which a living person calls frequently, and they call him back. AntiFraud system can also take into account the percentage of calls to "preferred numbers" among the total number of calls.
  • The registration of the SIM-card to different base stations, whose coverage does not overlap area for a certain period (typically 1 week).
  • The total number of calls to unique numbers for a certain time period.
  • The period of activity of SIM-cards during the day (the real user activity changes in the morning, afternoon and night periods).
  • The number of calls that are made within the same region (city, region).
  • The number of sent SMS-messages.
  • USSD-requests.
  • A number of calls to other mobile operators.
  • Call Detail Record.
  • Changing the type of activity (degree of load on the card) in the business time and "home time".
  • SIM card time "on air".

Both the parameters and their numerical values change depending on the mobile operator and country in which the calls are terminated.

To work around Antifraud systems, terminators use different methods to simulate the behavior of a real user on the network. GoAntiFraud will help you build an efficient GSM termination logic. We offer proven masking tools for SIM-cards and use software for the computerized control of the voip gsm gateway. Our service also helps circumvent the calling by the operator, thanks to the "white" and "black" lists function.
New business green

Related Articles


The "SIM-card Travel" Function in the SIM-banks

18 Oct 2016 09:34
The SIM-bank is a device, without which it is difficult to land large amounts of traffic. It provides centralized storage of all SIM cards required for GSM termination in one particular place. As a part of the cards is blocked by mobile operators, it is possible to quickly download new ones into gat...

The GSM Termination Business. Important Aspects

23 Jun 2016 08:49
Buying the VoIP-equipment and connecting it to the server is only half the battle in organizing the GSM termination business. The successful call landing and making money involve the protection of the SIM-cards from the lock and trustworthy originators. In addition, it is worth considering some nuan...

STUN Protocol in VoIP Telephony

28 Sep 2016 13:54
Current routers with voip have built-in STUN. Because of this they can effectively bypass the NAT mechanisms. STUN abbreviation can be deciphered as Simple Traversal of UDP through NATs, which means "easy circumvention of UDP through NAT". This protocol helps to route packets of devices that are ...

The Classical and Cloud VoIP-systems. What to choose?

02 Jun 2016 08:50
Attracting customers is one of the most important components of a successful business in any area. Today, companies can promote their product or service through multiple channels - using e-mail newsletters and advertising in social networks, in addition to voice communications. But, even with such a...

Features of VoIP 3CX System

20 May 2016 15:14
Currently, the technology of the voice traffic transfer via networks is undergoing a kind of "boom". There have been already developed many different voip solutions that make Internet telephony possible not only with Asterisk. One of the most promising technologies is 3CX Phone System. Voip 3cx r...

Advantages of Cloud VoIP Provider

13 Apr 2016 12:46
Every entrepreneur eventually asks what the cloud voip provider is and what advantages in working with such a service he can get. Judge for yourself, cloud voip providers have the function of auto-attendants, saving funds for the work of additional staff. Apart from the basic functions to make ca...

Difficulties in Rotating SIM-cards

14 Sep 2016 14:30
Migration and rotation of SIM-cards are necessary measures, which a terminator should provide to protect cards from AntiFraud systems. Migration allows you to simulate the movement around the city, while the rotation is designed to move multiple virtual cards in a single GSM-channel. For this purpos...

GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud
GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud GoAntiFraud