期刊文献+

验证码技术的攻防对策研究 被引量:19

Research on attach and strategy of CAPTCHA technology
在线阅读 下载PDF
导出
摘要 针对验证码的本质特征、形式化定义、今后发展方向和研究重点等问题,通过深入、细致地分析和研究现有大量验证码,给出了验证码的本质特征描述及形式化定义,并从信息类型分类(共五种)、识别方式分类(共两种)和交互性分类(共两种)三个维度给出了验证码的20个种类;分析了20种验证码类型的技术特点,研究了其攻防对策,给出了各类验证码今后的研究重点、难点及其研究方向。重点探讨了动态验证码和隐性验证码(包括语义验证码),特别针对验证码通用攻击的攻防对策,提出了验证码领域的一些新思路和新研究方法。 About the problem of essential characteristics, formal definition, new direction and research key of CAPTCHA, through a lots of analysis of the known CAPTCHA, this paper discussed the essential characterize and form^tl definition of CAP- TCHA. It proposed the 20 varieties of CAPTCHA by three dimensions of information classification (5 varieties), recognized method classification (2 varieties), and interaction type classification (2 varieties), and gave technical characteristics analy- sis, attach and strategy research, keys and directions of the 20 varieties. Then it discussed the dynamic CAPTCHA and im- plicit CAPTCHA( including semantic CAF^CHA) , specially proposed about the general CAFFCHA attach, some new idea and new method of CAPTCHA.
出处 《计算机应用研究》 CSCD 北大核心 2013年第9期2776-2779,共4页 Application Research of Computers
基金 公安部应用创新项目(2011YYCXGADX126)
关键词 身份鉴别 验证码 动态验证码 隐性验证码 验证码分类 验证码设计 authentication CAPTCHA dynamic CAPTCHA implicit CAFFCHA CAPTCHA classification CAPTCHA de- sign
  • 相关文献

参考文献12

  • 1王斌君,景乾元等.信息安全体系[M].北京:高等教育出版社,2008.
  • 2TURING A M. Computing machinery and intelligence [ J ]. Mind, 1950,236( 1 ) :433-460.
  • 3AHN L V, BLUM M, LANGFORD J. Telling humans and computer apart automatically [ J ]. Communications of the ACM, 2004,47 (2) :57-60.
  • 4CHELLAPILLA K, LARSON K, SIMARD P, et al. Building seg- mentation based humanfriendly human interaction proofs [ C ]//Proc of the 2nd International Workshop on Human Interactive Proofs. Berlin: Springer-Verlag, 2005 : 1 - 26.
  • 5TAM J, SIMSA J, HYDE S, et al. Breaking audio CAPTCHAs[ C]// Advances in Neural Information Processing Systems. Cambridge : MIT Press ,2008 : 1625-1632.
  • 6TAM J, S1MSA J, HUGGINS-DAINES D, et al. Improving audio CAPTCHAS[ C ]//Proe of the 4th Symposium on Usability, Privacy and Security. 2008.
  • 7BONGARD M M. Pattern recognition [ M ]. New Jersey: Spartan Books, 1951.
  • 8ROSS A, HALDERMAN A, FINKELSTEIN A. Sketcha: a CAP- TCHA based on line drawings of 3 D models [ C ]//Proc of the 19th In- ternational Conference on World Wide Web. New ork:ACM Press, 2010:821- 830.
  • 9杜凯选,王斌君.一种行为特征验证码研究分析[J].信息网络安全,2012(1):32-35. 被引量:4
  • 10BANDAY M T, SHAH N A. A study of CAPTCHAs for securing Web services[ J]. International doumal of Secure Digital Information Age,2009,1 (2) :66-74.

二级参考文献10

  • 1吉治钢.基于验证码破解的HTTP攻击原理与防范[J].计算机工程,2006,32(20):170-172. 被引量:20
  • 2Banday M. Tariq and N. A. Shah. A Study of CAPTCHAs for Securing Web Services[J].IJSDIA International Journal of Secure Digital Information Age, Vol. 1. No.2, December 2009.
  • 3G Mori and J Malik. Recognizing objects in adversarial clutter: breaking a visual CAPTCHA[C].IEEE Conference on Computer Vision & Pattern Recognition (CVPR), 2003.
  • 4Yan J and A Salah E1 Ahmad. Low-cost automated attacks on Yahoo CAPTCHAs[R]. TECHNICAL REPORT SERIES No. CS-TR- 1127,November, 2008.
  • 5Yan J and A S, E1 Ahmad. A Low-Cost Attack on a Microsoft CAPTCHA[C].Proc. 15th ACM Con~ Computer and Communications Security (CCS 08), ACM Press, 543-554,2008.
  • 6K Chellapilla and K Larson, P Simard and M Czerwinski. Building Segmentation Based Humanfriendly Human Interaction Proofs[C] .2nd Int' 1 Workshop on Human Interaction Proofs, Springer-Verlag, LNCS 3517, 2005.
  • 7Athanasopoulos E and S. Antonatos. Enhanced captchas: Using animation to tell humans and computers apart[C]. In Proceedings of the 10th IFIP Open Conference on Communications and Multimedia Security, October 2006.
  • 8Egele M., L. Bilge, E. Kirda, and C. Kmegel, CAPTCHA Smuggling: Hijacking Web Browsing Sessions to Create CAPTCHA Farms[C]. In The 25th Symposium On Applied Computing (SAC), pages 1865-1870. ACM, March 2010.
  • 9Mithal Anant Kartik , Sarah A. Douglas. Differences in movement microstructure of the mouse and the finger-controlled isometric joystick[C], Proceedings of the SIGCHI conference on Human factors in computing systems: common ground, p.300-307, April 13-18, 1996.
  • 10Plamondon tk, Feng C, Woch A. kinematic theory of rapid human movement[M]. Biological cybemetics~, 2003, 89(2): 126-138.

共引文献13

同被引文献111

引证文献19

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部