<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-CA">
	<id>https://nmsl.cs.sfu.ca/index.php?action=history&amp;feed=atom&amp;title=Private%3Asip_botnet</id>
	<title>Private:sip botnet - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://nmsl.cs.sfu.ca/index.php?action=history&amp;feed=atom&amp;title=Private%3Asip_botnet"/>
	<link rel="alternate" type="text/html" href="https://nmsl.cs.sfu.ca/index.php?title=Private:sip_botnet&amp;action=history"/>
	<updated>2026-04-05T11:06:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://nmsl.cs.sfu.ca/index.php?title=Private:sip_botnet&amp;diff=4297&amp;oldid=prev</id>
		<title>Mhefeeda: New page:  '''Detection of Botnets Mounted on the Session Initiation Protocol'''  Botnet is a group of compromised computers (called bots) controlled by remote attackers to distribute Spam emails, l...</title>
		<link rel="alternate" type="text/html" href="https://nmsl.cs.sfu.ca/index.php?title=Private:sip_botnet&amp;diff=4297&amp;oldid=prev"/>
		<updated>2011-03-19T20:43:52Z</updated>

		<summary type="html">&lt;p&gt;New page:  &amp;#039;&amp;#039;&amp;#039;Detection of Botnets Mounted on the Session Initiation Protocol&amp;#039;&amp;#039;&amp;#039;  Botnet is a group of compromised computers (called bots) controlled by remote attackers to distribute Spam emails, l...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
'''Detection of Botnets Mounted on the Session Initiation Protocol'''&lt;br /&gt;
&lt;br /&gt;
Botnet is a group of compromised computers (called bots) controlled by remote attackers to distribute&lt;br /&gt;
Spam emails, launch denial of service attacks, and perform other malicious activities. Botnets can be&lt;br /&gt;
deployed on top of different protocols, such as Internet Relay Chat (IRC), Hyper Text Transfer Protocol&lt;br /&gt;
(HTTP), and Session Initiation Protocol (SIP). SIP is widely used to initiate voice over IP sessions, and&lt;br /&gt;
it has been recently adopted by the telecommunications standards bodies to be the signaling protocol&lt;br /&gt;
for mobile telecommunication core networks. Such adoption will introduce a huge number of potential&lt;br /&gt;
devices to botnets. Therefore, botnets deployed over SIP present a serious threat for the Internet. We&lt;br /&gt;
propose a novel approach to detect SIP botnets by looking for users who behave in similar and coordinated&lt;br /&gt;
patterns. We show through extensive experimental evaluations that the proposed approach achieves low&lt;br /&gt;
false positive and false negative rates.&lt;br /&gt;
&lt;br /&gt;
== References and Links == &lt;br /&gt;
*&lt;/div&gt;</summary>
		<author><name>Mhefeeda</name></author>
	</entry>
</feed>