Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(automated attack). Showing records 1 – 2 of 2 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Wollongong

1. Nguyen, Duc Vu. Contributions to Text-based CAPTCHA Security.

Degree: PhD, 2014, University of Wollongong

A CAPTCHA is a type of challenge-response test used in computing to determine whether or not the user is human. It is a standard defence mechanism against bots, or automated programs, that attempt to use web-based services meant for human users. While there are many different types of CAPTCHA schemes that have emerged over the years, to date, the most widely used type is text-based CAPTCHAs in the form of a single 2D image of distorted text. Unfortunately, a large number of text-based CAPTCHA schemes have been successfully broken. Thus, animated, 3D or 4D text-based CAPTCHAs are seen as alternative paradigms which have been explored by a number of CAPTCHA designers. These new types of CAPTCHAs are meant to overcome the limitations of traditional CAPTCHAs and are supposed to be more robust and secure against automated attacks. However, while there is a growing number of design proposals for animated, 3D and 4D text-based CAPTCHAs, very little research has been devoted to examining the robustness of these alternative types. The primary goal of this research was to systematically investigate the security of existing text-based CAPTCHAs, focusing on animated, 3D and 4D types. First, we analyse the security of alternative designing paradigms by developing a toolbox with a set of novel algorithms and attacks. Our successful attacks on a large number of existing real-world schemes give rise to the conclusion that they are no more secure than their static 2D counterparts. Next, we explain why those schemes failed to withstand the attacks by highlighting design aws and give recommendations which should be used or avoided in future CAPTCHA designs. We also show that segmentation-resistance, a widely accepted principle in designing traditional text-based CAPTCHAs, is still one of the necessary design principles that apply to animated, 3D and 4D CAPTCHAs. Then we propose a segmentation-resistant CAPTCHA scheme based on the concept of identifying character locations, rather than merely recognising characters. We show that this scheme is robust against current attack techniques. Our approach helps enhance the segmentation-resistant principle and broadens the scope for designing secure and usable CAPTCHAs.

Subjects/Keywords: CAPTCHA; character extraction; optical character recognition; automated attack; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nguyen, D. V. (2014). Contributions to Text-based CAPTCHA Security. (Doctoral Dissertation). University of Wollongong. Retrieved from ; https://ro.uow.edu.au/theses/4223

Chicago Manual of Style (16th Edition):

Nguyen, Duc Vu. “Contributions to Text-based CAPTCHA Security.” 2014. Doctoral Dissertation, University of Wollongong. Accessed November 20, 2019. ; https://ro.uow.edu.au/theses/4223.

MLA Handbook (7th Edition):

Nguyen, Duc Vu. “Contributions to Text-based CAPTCHA Security.” 2014. Web. 20 Nov 2019.

Vancouver:

Nguyen DV. Contributions to Text-based CAPTCHA Security. [Internet] [Doctoral dissertation]. University of Wollongong; 2014. [cited 2019 Nov 20]. Available from: ; https://ro.uow.edu.au/theses/4223.

Council of Science Editors:

Nguyen DV. Contributions to Text-based CAPTCHA Security. [Doctoral Dissertation]. University of Wollongong; 2014. Available from: ; https://ro.uow.edu.au/theses/4223


Brno University of Technology

2. Galetka, Josef. Analýza síťových útoků pomocí honeypotů .

Degree: 2010, Brno University of Technology

Práce se zabývá bezpečností počítačových sítí za využití technologie honeypotů, jakožto nástroje účelných nástrah pro útočníky. Blíže popisuje základní myšlenky a výhody a nevýhody tohoto konceptu. Zaměřuje se na honeypot s nízkou interakce Honeyd, jeho funkčnost a možná rozšíření. V rámci praktické části je zde popsán princip implementace rozšiřujících servisních skriptů Honeyd v podobě simulace chování červa Conficker. Dále se zabývá vytvořením automatizovaného skriptu analýzy, zpracování útoků a vyhodnocení dat, získaných v průběhu skutečného nasazení honeypotu v síti Internet.; This text deals with computer network security using honeypot technology, as a tool of intentional trap for attackers. It closely describes basic thoughts, together with advantages and disadvantages of this concept. The main aim is a low interaction honeypot Honeyd, its functionality and possible extensional features. As a practical part of the text there is a description of principles of implementation Honeyd service scripts, which are represented as a simulation of behavior of computer worm Conficker. Further it describes creation of automated script used for analysis and processing of gathered data, captured during actual deployment of Honeyd in Internet network. Advisors/Committee Members: Drozd, Michal (advisor).

Subjects/Keywords: Honeypot; Honeyd; síťová bezpečnost; analýza útoků; malware; servisní skript; Conficker; automatizované zpracování; Honeypot; Honeyd; network security; attack analysis; malware; service script; Conficker; automated process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Galetka, J. (2010). Analýza síťových útoků pomocí honeypotů . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/54266

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Galetka, Josef. “Analýza síťových útoků pomocí honeypotů .” 2010. Thesis, Brno University of Technology. Accessed November 20, 2019. http://hdl.handle.net/11012/54266.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Galetka, Josef. “Analýza síťových útoků pomocí honeypotů .” 2010. Web. 20 Nov 2019.

Vancouver:

Galetka J. Analýza síťových útoků pomocí honeypotů . [Internet] [Thesis]. Brno University of Technology; 2010. [cited 2019 Nov 20]. Available from: http://hdl.handle.net/11012/54266.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Galetka J. Analýza síťových útoků pomocí honeypotů . [Thesis]. Brno University of Technology; 2010. Available from: http://hdl.handle.net/11012/54266

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.