Behavioral Analytics has made a noticeable impact in the generic security threat detection community. However, the UC community is greatly underserved with regard to behavioral analytics and anomaly detection-based solutions. With the wide varieties and inherent complexities of SIP and VoIP protocols, UC environments can only stand to benefit from the added value of behavioral analytics and anomaly detection. Specific to the UC environment, network behavioral analysis has become crucial for detecting many types of fraudulent activity.
Features & Benefits
- Using analytics for the anomaly detection process of searching through UC networks and infrastructure for coordinated / advanced threats that are evading existing security solutions and defenses such as your SBCs and FWs.
- Detect and stop toll fraud by continually analyzing metrics such as call attempts, call duration, calling number, called number, types of calls (Local, Long Distance, International) during working hours as well as non-working hours.
- Telephony denial of service (T-DoS) attacks can take on many forms. Some can be identified by basic volumetric violations. However, some are far more clever and disguise themselves. This is where behavioral analytics can be an integral component in the layered security detail.
- One of the many benefits of using behavioral analytics in your layered security approach, is that a well-defined baseline of what is categorized as “normal” activity is established. Deviations from this baseline can be quickly identified and mitigated
- As the FCC is encouraging service providers to take measures to address robocalling, implementing solutions have become a priority. With known bad actor databases and the capabilities of behavioral analytics, a 2 pronged attack can filter and block the major percentage of inbound robocalls