SlideShare uma empresa Scribd logo
1 de 16
iCAPTCHAiCAPTCHA
CAPTCHA AND iCAPTCHACAPTCHA AND iCAPTCHA
TECHNOLOGYTECHNOLOGY
 CAPTCHACAPTCHA (Completely Automated Public Turing
Test to Tell Computers and Humans Apart)
i. Standard security mechanism.
ii. Prevent attack of automatic scripts.
 iCAPTCHA (Interactive Completely Automated
Public Turing Test to Tell Computers and Humans
Apart)
1. next generation of CAPTCHA
2. against 3rd party human attacks( legitimate user or not).
Welcome to the CAPTCHA worldWelcome to the CAPTCHA world
CAPTCHACAPTCHA
 Simple test , easy for humans . But difficult forSimple test , easy for humans . But difficult for
computers to solve.computers to solve.
 Protect resource from attack by the use ofProtect resource from attack by the use of
timing values.timing values.
 Unable to distinguish between human attackerUnable to distinguish between human attacker
and a legitimate user.and a legitimate user.
 ApplicationsApplications
face-book ,e-mail services.face-book ,e-mail services.
IMCA( Instant MessengerIMCA( Instant Messenger
CAPTCHA Attack )CAPTCHA Attack ) System used in CAPTCHA.System used in CAPTCHA.
 Instant Messenger (IM) network .Instant Messenger (IM) network .
 IM allow communication between two or moreIM allow communication between two or more
participants over a network .participants over a network .
 Data exchange .Data exchange .
 IMCA ComponentsIMCA Components
 Attack script : custom made to attackAttack script : custom made to attack
 IM connector : send and receive instantIM connector : send and receive instant
messagesmessages
EXAMPLE FOR CAPTCHAEXAMPLE FOR CAPTCHA
iCAPTCHA ( InteractiveiCAPTCHA ( Interactive
CAPTCHACAPTCHA))
 Reliable technique.Reliable technique.
 Concept and implementationConcept and implementation
a)a) use sequence of mouse clicks.use sequence of mouse clicks.
b)b) first click -CAPTCHA image creating.first click -CAPTCHA image creating.
c)c) mouse click- iCAPTCHA input.mouse click- iCAPTCHA input.
d)d) correct – perform functions.correct – perform functions.
iCAPTCHA MechanismiCAPTCHA Mechanism
interactioninteraction
Legitimate
Web Server
User
1..Download CAPTCHA
Challenge
2.. Response to
CAPTCHA
Fig. Legitimate user’s interaction with iCAPTCHA
CAPTCHA in different searchCAPTCHA in different search
engineengine
Security FeaturesSecurity Features
• CAPTCHA - time out value measuring .CAPTCHA - time out value measuring .
( not detect legitimate user or not .)( not detect legitimate user or not .)
• iCAPTCHA - time out value measuring periCAPTCHA - time out value measuring per
character.character.
( detect legitimate user or not .)( detect legitimate user or not .)
Attack Detection AlgorithmsAttack Detection Algorithms
Algorithms:Algorithms:
1.1. single slow response detection algorithmsingle slow response detection algorithm
2.2. two consecutive slow response algorithmtwo consecutive slow response algorithm
3.3. dynamic detection threshold algorithmdynamic detection threshold algorithm
LIMITATIONSLIMITATIONS
 users with impaired vision or motor skills.users with impaired vision or motor skills.
 iCAPTCHA performance against characteriCAPTCHA performance against character
recognition based attacks.recognition based attacks.
CONCLUSIONCONCLUSION
 protecting resources from attacks.protecting resources from attacks.
 provide statistical timing for evaluating theprovide statistical timing for evaluating the
mechanism.mechanism.
 attack detection based on detection algorithms.attack detection based on detection algorithms.
 we hope iCAPTCHA encourage researches andwe hope iCAPTCHA encourage researches and
develop more secure and reliable CAPTCHA.develop more secure and reliable CAPTCHA.
THANK YOU...THANK YOU...

Mais conteúdo relacionado

Semelhante a iCAPTCHA

From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...Shujun Li
 
Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Fatima Qayyum
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologiesMonika Keerthi
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the RyeImperva
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithmtheijes
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captchakunalkiit
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical PasswordIRJET Journal
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET Journal
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...IRJET Journal
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET Journal
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPIRJET Journal
 
Geo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographicGeo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographicMeghanaNS
 

Semelhante a iCAPTCHA (20)

Captcha
CaptchaCaptcha
Captcha
 
From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...From Captchas to Captchæckers: Can we automate usability and security evalua...
From Captchas to Captchæckers: Can we automate usability and security evalua...
 
Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs Gamification of Internet Security by Next Generation CAPTCHAs
Gamification of Internet Security by Next Generation CAPTCHAs
 
Evaluation of captcha technologies
Evaluation of captcha technologiesEvaluation of captcha technologies
Evaluation of captcha technologies
 
Captcha
CaptchaCaptcha
Captcha
 
A CAPTCHA in the Rye
A CAPTCHA in the RyeA CAPTCHA in the Rye
A CAPTCHA in the Rye
 
Captcha ppt
Captcha pptCaptcha ppt
Captcha ppt
 
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF AlgorithmEnhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithm
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
Video Captcha as a Graphical Password
Video Captcha as a Graphical PasswordVideo Captcha as a Graphical Password
Video Captcha as a Graphical Password
 
IRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation AutomationIRJET-PLC and SCADA based Distribution and Substation Automation
IRJET-PLC and SCADA based Distribution and Substation Automation
 
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
A Survey of Comparative Analysis of Secure Passwords using CaRP by Different ...
 
Captcha
CaptchaCaptcha
Captcha
 
Captcha1
Captcha1Captcha1
Captcha1
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
 
A countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGPA countermeasure for security intensification in cloud using CaPGP
A countermeasure for security intensification in cloud using CaPGP
 
Captcha
CaptchaCaptcha
Captcha
 
Geo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographicGeo captcha - a novel personalized captcha using geographic
Geo captcha - a novel personalized captcha using geographic
 
CAPTCHA
CAPTCHACAPTCHA
CAPTCHA
 
Captcha
CaptchaCaptcha
Captcha
 

Último

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

iCAPTCHA

  • 2.
  • 3. CAPTCHA AND iCAPTCHACAPTCHA AND iCAPTCHA TECHNOLOGYTECHNOLOGY  CAPTCHACAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) i. Standard security mechanism. ii. Prevent attack of automatic scripts.  iCAPTCHA (Interactive Completely Automated Public Turing Test to Tell Computers and Humans Apart) 1. next generation of CAPTCHA 2. against 3rd party human attacks( legitimate user or not).
  • 4. Welcome to the CAPTCHA worldWelcome to the CAPTCHA world
  • 5. CAPTCHACAPTCHA  Simple test , easy for humans . But difficult forSimple test , easy for humans . But difficult for computers to solve.computers to solve.  Protect resource from attack by the use ofProtect resource from attack by the use of timing values.timing values.  Unable to distinguish between human attackerUnable to distinguish between human attacker and a legitimate user.and a legitimate user.  ApplicationsApplications face-book ,e-mail services.face-book ,e-mail services.
  • 6. IMCA( Instant MessengerIMCA( Instant Messenger CAPTCHA Attack )CAPTCHA Attack ) System used in CAPTCHA.System used in CAPTCHA.  Instant Messenger (IM) network .Instant Messenger (IM) network .  IM allow communication between two or moreIM allow communication between two or more participants over a network .participants over a network .  Data exchange .Data exchange .  IMCA ComponentsIMCA Components  Attack script : custom made to attackAttack script : custom made to attack  IM connector : send and receive instantIM connector : send and receive instant messagesmessages
  • 8. iCAPTCHA ( InteractiveiCAPTCHA ( Interactive CAPTCHACAPTCHA))  Reliable technique.Reliable technique.  Concept and implementationConcept and implementation a)a) use sequence of mouse clicks.use sequence of mouse clicks. b)b) first click -CAPTCHA image creating.first click -CAPTCHA image creating. c)c) mouse click- iCAPTCHA input.mouse click- iCAPTCHA input. d)d) correct – perform functions.correct – perform functions.
  • 10. interactioninteraction Legitimate Web Server User 1..Download CAPTCHA Challenge 2.. Response to CAPTCHA Fig. Legitimate user’s interaction with iCAPTCHA
  • 11. CAPTCHA in different searchCAPTCHA in different search engineengine
  • 12. Security FeaturesSecurity Features • CAPTCHA - time out value measuring .CAPTCHA - time out value measuring . ( not detect legitimate user or not .)( not detect legitimate user or not .) • iCAPTCHA - time out value measuring periCAPTCHA - time out value measuring per character.character. ( detect legitimate user or not .)( detect legitimate user or not .)
  • 13. Attack Detection AlgorithmsAttack Detection Algorithms Algorithms:Algorithms: 1.1. single slow response detection algorithmsingle slow response detection algorithm 2.2. two consecutive slow response algorithmtwo consecutive slow response algorithm 3.3. dynamic detection threshold algorithmdynamic detection threshold algorithm
  • 14. LIMITATIONSLIMITATIONS  users with impaired vision or motor skills.users with impaired vision or motor skills.  iCAPTCHA performance against characteriCAPTCHA performance against character recognition based attacks.recognition based attacks.
  • 15. CONCLUSIONCONCLUSION  protecting resources from attacks.protecting resources from attacks.  provide statistical timing for evaluating theprovide statistical timing for evaluating the mechanism.mechanism.  attack detection based on detection algorithms.attack detection based on detection algorithms.  we hope iCAPTCHA encourage researches andwe hope iCAPTCHA encourage researches and develop more secure and reliable CAPTCHA.develop more secure and reliable CAPTCHA.