An Examination of CAPTCHA for Tolerance of Relay Attacks and Automated Attacks

被引:0
|
作者
Tatsuda, Ryohei [1 ]
Yamaba, Hisaaki [1 ]
Aburada, Kentaro [1 ]
Katayama, Tetsuro [1 ]
Park, Mirang [2 ]
Shiratori, Norio [3 ]
Okazaki, Naonobu [1 ]
机构
[1] Univ Miyazaki, 1-1 Gakuen Kibanadai Nishi, Miyazaki 8892192, Japan
[2] Kanagawa Inst Technol, 1030 Shimo Ogino, Atsugi, Kanagawa 2430292, Japan
[3] Chuo Univ, Res & Dev Initiat, Bunkyo Ku, 1-13-27 Kasuga, Tokyo 1128551, Japan
关键词
D O I
10.1007/978-3-319-75928-9_80
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CAPTCHA is a type of challenge response test used to distinguish human users from malicious computer programs such as bots, and is used to protect email, blogs, and other web services from bot attacks. So far, research on enhance of CAPTCHA's resistance to bot attacks has been proceeded to counter advanced automated attacks method. However, an attack technique known as a relay attack has been devised to circumvent CAPTCHA. In this attack, since human solves CAPTCHA, the existing measures assuming bots have no effect on this attack. We designed a new CAPTCHA scheme for relay attacks tolerance and automated attacks tolerance. In this paper, we tested the robustness of the proposed method against several types of automated attacks. We constructed an experimental environment in which a relay attack can be simulated, and designed a series of experiments to evaluate the performance of the proposed method. As a result, we found that the proposed CAPTCHA scheme offers some of level of resistance to automated attacks and relay attacks.
引用
收藏
页码:870 / 879
页数:10
相关论文
共 50 条
  • [41] Automated Discovery of Adaptive Attacks on Adversarial Defenses
    Yao, Chengyuan
    Bielik, Pavol
    Tsankov, Petar
    Vechev, Martin
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [42] Tolerance of intentional attacks in complex communication networks
    Xiao, Shi
    Xiao, Gaoxi
    Cheng, Tee Hiang
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (01) : 146 - 152
  • [43] Automated Identification of Desynchronisation Attacks on Shared Secrets
    Mauw, Sjouke
    Smith, Zach
    Toro-Pozo, Jorge
    Trujillo-Rasua, Rolando
    COMPUTER SECURITY (ESORICS 2018), PT I, 2018, 11098 : 406 - 426
  • [44] Automated Signature Extraction for High Volume Attacks
    Afek, Yehuda
    Bremler-Barr, Anat
    Feibish, Shir Landau
    2013 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2013, : 147 - 156
  • [45] Preventing Real-world Relay Attacks on Contactless Devices
    Henzl, Martin
    Hanacek, Petr
    Kacic, Matej
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [46] On addressing RFID/NFC-based relay attacks: An overview
    Tu, Yu-Ju
    Piramuthu, Selwyn
    DECISION SUPPORT SYSTEMS, 2020, 129
  • [47] Make Noise and Whisper: A Solution to Relay Attacks (Transcript of Discussion)
    Choudary, Omar
    SECURITY PROTOCOLS XIX, 2011, 7114 : 284 - 295
  • [48] Chaotic masking for securing RFID systems against relay attacks
    Malek, Behzad
    Miri, Ali
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1496 - 1508
  • [49] Cooperative Relay Transmission in Advanced Metering Infrastructure with Wireless Attacks
    Cao, Yang
    Qiu, Xuesong
    Zhang, Bing
    Qi, Feng
    Wei, Jiaolong
    JOURNAL OF LOW POWER ELECTRONICS, 2016, 12 (04) : 328 - 334
  • [50] Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs
    Lounis, Karim
    Zulkernine, Mohammad
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2020), 2021, 12528 : 49 - 66