CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions

07/16/2023
by   N. Tariq, et al.
0

The proliferation of the Internet and mobile devices has resulted in malicious bots access to genuine resources and data. Bots may instigate phishing, unauthorized access, denial-of-service, and spoofing attacks to mention a few. Authentication and testing mechanisms to verify the end-users and prohibit malicious programs from infiltrating the services and data are strong defense systems against malicious bots. Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is an authentication process to confirm that the user is a human hence, access is granted. This paper provides an in-depth survey on CAPTCHAs and focuses on two main things: (1) a detailed discussion on various CAPTCHA types along with their advantages, disadvantages, and design recommendations, and (2) an in-depth analysis of different CAPTCHA breaking techniques. The survey is based on over two hundred studies on the subject matter conducted since 2003 to date. The analysis reinforces the need to design more attack-resistant CAPTCHAs while keeping their usability intact. The paper also highlights the design challenges and open issues related to CAPTCHAs. Furthermore, it also provides useful recommendations for breaking CAPTCHAs.

READ FULL TEXT

page 7

page 11

page 14

page 15

page 17

page 24

page 30

page 33

research
03/02/2021

Gotta CAPTCHA 'Em All: A Survey of Twenty years of the Human-or-Computer Dilemma

A recent study has found that malicious bots generated nearly a quarter ...
research
08/09/2020

A Survey on Human-centric Communications in Non-cooperative Wireless Relay Networks

The performance of data delivery in wireless relay networks (WRNs), such...
research
07/24/2023

Malware Resistant Data Protection in Hyper-connected Networks: A survey

Data protection is the process of securing sensitive information from be...
research
05/26/2021

Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions

In this work we present definitive evidence, analysis, and (where needed...
research
06/28/2018

Malicious User Experience Design Research for Cybersecurity

This paper explores the factors and theory behind the user-centered rese...
research
11/16/2018

Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues

Over the last few years, a rapidly increasing number of Internet-of-Thin...
research
04/10/2021

A Low-Cost Attack against the hCaptcha System

CAPTCHAs are a defense mechanism to prevent malicious bot programs from ...

Please sign up or login with your details

Forgot password? Click here to reset