Abstract:
A device may receive, from a network device, call information associated with a call. The call may be from a calling party device. The call may appear to be intended for a destination device. The call information may be received, from the network device, based on the network device having routed the call. The device may determine, based on the call information, that the call appears to have been forwarded to a called party device that is different from the destination device. The device may determine, based on the call information, a forwarding characteristic for the call. The device may determine that the forwarding characteristic satisfies a criterion. The device may send an output message based on the forwarding characteristic satisfying the criterion to support responding to call forwarding activity that has the forwarding characteristic.
Abstract:
A device may receive, from a network device, call information associated with a call. The call may be from a calling party device. The call may appear to be intended for a destination device. The call information may be received, from the network device, based on the network device having routed the call. The device may determine, based on the call information, that the call appears to have been forwarded to a called party device that is different from the destination device. The device may determine, based on the call information, a forwarding characteristic for the call. The device may determine that the forwarding characteristic satisfies a criterion. The device may send an output message based on the forwarding characteristic satisfying the criterion to support responding to call forwarding activity that has the forwarding characteristic.
Abstract:
A network traffic monitoring system detects an identity associated with a telephone call that enters a network and queries a first identity source list that includes entries representative of illegitimate identities and a second identity source list that includes entries representative of legitimate identities to determine whether the detected identity associated with the telephone call matches an entry included in the first identity source list or an entry included in the second identity source list. If the detected identity matches the entry included in the first identity source list, the network traffic monitoring system automatically determines that the detected identity is fake. If the detected identity matches the entry included in the second identity source list, the network traffic monitoring system analyzes one or more attributes of the telephone call other than the detected identity to determine whether the detected identity is fake.