An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks

被引:0
|
作者
Tatsuda, Ryohei [1 ]
Yamaba, Hisaaki [1 ]
Aburada, Kentaro [1 ]
Katayama, Tetsuro [1 ]
Park, Mirang [2 ]
Shiratori, Norio [3 ]
Okazaki, Naonobu [1 ]
机构
[1] Univ Miyazaki, 1-1 Gakuen Kibanadai Nishi, Miyazaki 8892192, Japan
[2] Kanagawa Inst Technol, 1030 Shimo Ogino, Atsugi, Kanagawa 2430292, Japan
[3] Chuo Univ, Res & Dev Initiat, Bunkyo Ku, 1-13-27 Kasuga, Tokyo 1128551, Japan
关键词
D O I
10.1007/978-3-319-75928-9_80
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CAPTCHA is a type of challenge response test used to distinguish human users from malicious computer programs such as bots, and is used to protect email, blogs, and other web services from bot attacks. So far, research on enhance of CAPTCHA's resistance to bot attacks has been proceeded to counter advanced automated attacks method. However, an attack technique known as a relay attack has been devised to circumvent CAPTCHA. In this attack, since human solves CAPTCHA, the existing measures assuming bots have no effect on this attack. We designed a new CAPTCHA scheme for relay attacks tolerance and automated attacks tolerance. In this paper, we tested the robustness of the proposed method against several types of automated attacks. We constructed an experimental environment in which a relay attack can be simulated, and designed a series of experiments to evaluate the performance of the proposed method. As a result, we found that the proposed CAPTCHA scheme offers some of level of resistance to automated attacks and relay attacks.
引用
收藏
页码:870 / 879
页数:10
相关论文
共 50 条
  • [21] Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks
    Alamri, Emtethal K.
    Alnajim, Abdullah M.
    Alsuhibany, Suliman A.
    FUTURE INTERNET, 2022, 14 (03):
  • [22] Make Noise and Whisper: A Solution to Relay Attacks
    Choudary, Omar
    Stajano, Frank
    SECURITY PROTOCOLS XIX, 2011, 7114 : 271 - 283
  • [23] ANGIOGRAPHIC EXAMINATION OF TRANSIENT ISCHEMIC ATTACKS
    FRIEDMAN, DP
    AMERICAN JOURNAL OF ROENTGENOLOGY, 1995, 165 (02) : 482 - 482
  • [24] An Examination of Distributed Denial of Service Attacks
    Bartholemy, Alex
    Chen, Weifeng
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2015, : 274 - 279
  • [25] On alcohol tolerance changes in dipsomania attacks
    Bonhoeffer, K
    ZEITSCHRIFT FUR DIE GESAMTE NEUROLOGIE UND PSYCHIATRIE, 1930, 127 : 483 - 489
  • [26] Style matching CAPTCHA: match neural transferred styles to thwart intelligent attacks
    Ray, Palash
    Bera, Asish
    Giri, Debasis
    Bhattacharjee, Debotosh
    MULTIMEDIA SYSTEMS, 2023, 29 (04) : 1865 - 1895
  • [27] Automated Classification of Computer Network Attacks
    van Heerden, Renier
    Leenen, Louise
    Irwin, Barry
    2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,
  • [28] Style matching CAPTCHA: match neural transferred styles to thwart intelligent attacks
    Palash Ray
    Asish Bera
    Debasis Giri
    Debotosh Bhattacharjee
    Multimedia Systems, 2023, 29 : 1865 - 1895
  • [29] Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks
    Hitaj, Dorjan
    Hitaj, Briland
    Jajodia, Sushil
    Mancini, Luigi, V
    IEEE INTELLIGENT SYSTEMS, 2021, 36 (05) : 104 - 111
  • [30] Lightweight Distance Bounding Protocol against Relay Attacks
    Kim, Jin Seok
    Cho, Kookrae
    Yum, Dae Hyun
    Hong, Sung Je
    Lee, Pil Joong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (04): : 1155 - 1158