Guangdong Mobile teamed up with the police to use big data to accurately attack pseudo base stations.
Core reading
The pseudo base station is called by everyone, but how can it show its original shape? Guangdong Mobile uses big data to deploy tight encirclement. According to the cell phone signal data, timely warning; End, tube and cloud data linkage to accurately identify pseudo base station short messages; Cooperate with the police to locate the attack. The data shows that the activity of pseudo base stations has dropped significantly.
"Dear users, hello. You get the discount of sending 50 yuan to 100 yuan. Click wap.××××××.com to recharge, which is limited to this machine. China Mobile. " Seeing this message from "10086", Zhang Xuewei hesitated and felt that the recharge website was suspicious. Fortunately, another early warning message from China Mobile came immediately, reminding him that he might have been attacked by a pseudo base station just now.
As a common tool of criminals, the harm of pseudo base stations has attracted the attention of the whole society. If you impersonate a bank to send a short message with a virus link, once the user clicks on the link, it will lead to cell phone poisoning, privacy information being stolen, and then property losses will be caused.
Zhang Xuewei is located in Foshan, Guangdong Province. This time, he accepted the free early warning service of pseudo base stations independently developed by Guangdong Mobile based on big data. The service was piloted in Foshan, Jieyang and Chaozhou at the beginning of November last year, and so far more than 600,000 users have been reminded.
Use signal data to see through pseudo base stations and give early warning in time.
Normal base station: "Where does your signal come from?"
Mobile phone: "I came from a base station."
Normal base station: "No, I don’t even know this guy. It’s definitely not ours ‘ Little friend ’ !”
The normal base station keenly found that the mobile phone had been held by a pseudo base station, so it reported it to the network system.
When Zhang Xuewei received the fraudulent short message, the above "conversation" started between the normal base station and his mobile phone.
Pseudo base station is an illegal device that does not access the operator’s network. It can simulate any number to send illegal short messages. "It’s a base station, but there are actually two small boxes." Along the direction of Liu Shaocong’s finger in Guangdong Mobile Wireless Optimization Center, two "iron boxes" are lying on the table, one is smaller than the computer case, and the other is only the size of a shoe box.
At present, the pseudo base station technology and price threshold are very low. Moreover, as the volume shrinks, the forms of crime are more diverse: some throw pseudo base stations next to roadside garbage bins; Some put it in their backpacks and get on the bus to move and signal; And hire someone else to carry it, hide in the dark and send it remotely with a mobile phone … …
However, "no matter how cunning a fox is, it can’t fool a good hunter." Pseudo-base stations switch mobile phone signals with stronger power, which also becomes a breakthrough for technicians to detect pseudo-base stations. Simply put, when a mobile phone that has been held hostage by a pseudo base station signal is reconnected to the normal base station network, it will bring the relevant signal data of the pseudo base station.
"At this time, big data will come in handy." Liu Shaocong said that the abnormal signaling found by the normal base station will be uploaded to the network and compared with a large number of normal signaling, and finally it is determined that this unknown guy is a "bad guy." Then, an early warning message will be sent to the user’s mobile phone.
End, pipe and cloud data linkage, accurate identification
Pseudo base stations can change their numbers at will. In a bunch of normal short messages, how can we find out the fraudulent information at once?
Xu Jiajun, who works in Guangdong Mobile Network Management Center, took out a mobile phone with an APP application — — Safety pioneer. With the captured pseudo base station, he sent a test message; Then, open the security pioneer and click "pseudo base station identification". In less than 30 seconds, a short message "stands out" from hundreds of short messages in the inbox. At first glance, it is the one just sent.
This self-developed "pseudo base station SMS identification technology" is also based on big data. Collect short message features through the mobile phone terminal, compare them with a large number of short message features of pseudo base stations stored in the cloud library, and check the transmission pipeline at the same time. Generally speaking, whether a mobile user sends or receives a short message, it is recorded in the short message center. If it is not recorded and matches the above characteristics, it can basically be judged as a pseudo base station message.
This big data identification technology, which adopts the linkage of end, pipe and cloud, can identify the short messages of pseudo base stations in the province’s ports. The advantage of security pioneer lies in not only the data of mobile phone terminal, but also the data of short message transmission pipeline.
Real-time calculation, with the police positioning strike
"There is pseudo base station activity near Chebei subway station in Tianhe District". According to the monitoring of Guangzhou Mobile, technicians immediately rushed to the scene to track with instruments.
A man riding an electric car came into sight. At first glance, his dress is no different from that of ordinary food delivery staff, but this disguise can’t escape the "eye-catching" of technicians. After the alarm, the public security personnel quickly arrived to control the man and seized a set of pseudo base station equipment from the disguised takeaway box on the spot.
Here, the "golden eye" is the "pseudo base station detection and tracking system". "Big data detection, early warning and accurate identification, if only used to remind users ‘ Don’t be fooled ’ The intensity of cracking down on pseudo base stations is undoubtedly greatly reduced. We not only passively prevent, but also take the initiative to cooperate with the public security organs to pull out the pseudo base station. " Kang Yong, the security director of Guangzhou Mobile who is responsible for the pseudo base station attack, said.
On the basis of detecting and warning short messages from pseudo base stations, the system performs big data processing to lock a large area where a user’s mobile phone is attacked by pseudo base stations at the same time or continuously; Then analyze the location and moving path of each mobile phone and calculate the accurate location of the pseudo base station.
"The current pseudo base stations are often in motion, which requires higher real-time computing power for big data." Liu Shaocong revealed that with advanced positioning technology, the positioning accuracy of pseudo base stations can be controlled at around 100 meters.
In the current high-pressure situation of cracking down on telecommunication network fraud, Guangzhou police have treated the pseudo base station case as a major warning and established a linkage mechanism with Guangzhou Mobile. Once the location of the pseudo base station was located in the system, the police immediately dispatched police forces nearby to jointly attack with the road patrol personnel sent by Mobile. As soon as the suspect is identified, arrest him immediately.
Since 2015, Guangdong Mobile has cooperated with public security organs to crack 818 cases of pseudo base stations, arrested 1,095 suspects, seized 985 sets of pseudo base station equipment and 456 vehicles, which effectively shocked the illegal and criminal activities of pseudo base stations. According to the relevant network data of Guangdong Mobile, the number of abnormal registration location updates caused by pseudo base stations decreased by 57% year-on-year, indicating that the activity of pseudo base stations decreased significantly.