CAPTCHA CAPTCHA is a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart“. A CAPTCHA is a chal- lenge-response.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
CAPTCHA: Using Hard AI Problems for Security 12 Jun 2007 Ohad Barak (a.k.a. jo) Luis Von Ahn, EuroCrypt 2003.
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
A Low-cost Attack on a Microsoft CAPTCHA Yan Qiang,
Sean Powers Florida Institute of Technology ECE 5525 Final: Dr. Veton Kepuska Date: 07 December 2010 Controlling your household appliances through conversation.
CAPTCHA Presented by: Sari Louis SPAM Group: Marc Gagnon, Sari Louis, Steve White University of Illinois Spring 2006.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
AN IMPROVED AUDIO Jenn Tam Computer Science Dept. Carnegie Mellon University SOAPS 2008, Pittsburgh, PA.
Chapter 1 – Introduction
Chapter 19: Network Management Business Data Communications, 4e.
CAPTCHA Presented By Sayani Chandra (Roll )
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Jeff Yan School of Computing Science Newcastle University, UK (Joint work with Ahmad Salah El Ahmad) Usability of CAPTCHAs Or “usability issues in CAPTCHA.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Did You Know? Number of spam s sent each day? 100 billion.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
CAPTCHA Prabhakar Verma “08MC30”.
1 CAPTCHA Challenges for Massively Multiplayer Online Games 2010 International Conference on Cyberworlds Authors: Yang-Wai Chow, Willy Susilo, Hua-Yu Zhou.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Human Computation CSC4170 Web Intelligence and Social Computing Tutorial 7 Tutor: Tom Chao Zhou
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Knowledge Base approach for spoken digit recognition Vijetha Periyavaram.
CAPTCHA CAPTCHA is a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart“. A CAPTCHA challenge is a test.
intelligence study and design of intelligent agentsis the intelligence of machines and the branch of computer science that aims to create it. AI textbooks.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Introduction (Based on Lecture slides by J. H. Wang)
Case Base Maintenance(CBM) Fabiana Prabhakar CSE 435 November 6, 2006.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Exploration Seminar 3 Human Computation Roy McElmurry.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Appendix A UM in Microsoft® Exchange Server 2010.
CAPTCHA solving Tianhui Cai Period 3. CAPTCHAs Completely Automated Public Turing tests to tell Computers and Humans Apart Determines whether a user is.
IMAGINATION: A Robust Image-based CAPTCHA Generation System Ritendra Datta, Jia Li, and James Z. Wang The Pennsylvania State University – University Park.
2004 APPA Community Broadband Conference Emerging Technologies: Voice Over IP October 11, 2004 Tim Hoolihan V.P. Marketing and Product Management (949)
10/10/2012ISC239 Isabelle Bichindaritz1 Physical Database Design.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Presented By: Abirami Poonkundran Authors: Jeff Yan, Ahmad El Ahmad.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
Introduction to IT Lecture – 01.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Group member: Kai Hu Weili Yin Xingyu Wu Yinhao Nie Xiaoxue Liu Date:2015/10/
Designing Human Friendly Human Interaction Proofs (HIPs) Kumar Chellapilla, Kevin Larson, Patrice Simard and Mary Czerwinski Microsoft Research Presented.
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
Performance Comparison of Speaker and Emotion Recognition
Detection and Mitigation of Spam in IP Telephony Networks using Signaling Protocol Analysis MacIntosh, R Vinokurov, D Advances in Wired and Wireless Communication,
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Application Layer Attack. DDoS DDoS – Distributed Denial of Service Why would any one want to do this? In some cases, for bringing down service of competitors,
Wikispam, Wikispam, Wikispam PmWiki Patrick R. Michaud, Ph.D. March 4, 2005.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Communication Methods
CAP Malware and Software Vulnerability Analysis Term Project Proposal - Spring 2009 Professor: Dr. Zou Team members: Andrew Mantel & Peter Matthews.
By: Steven Baker.  What is a CAPTCHA?  History of CAPTCHA  Applications of CAPTCHAs  Accessibility  Examples of CAPTCHAs  reCAPTCHA  Vulnerabilities.
Usability of CAPTCHAs Or usability issues in CAPTCHA design Authors: Jeff Yan and Ahmad Salah El Ahmad Presented By: Kim Giglia CSC /19/2008.
Decision Support and Business Intelligence Systems (9 th Ed., Prentice Hall) Chapter 12: Artificial Intelligence and Expert Systems.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
SUBMITTED TO:-SUBMITTED BY:- Ms.Kavita KhannaShruty Ahuja H.O.D(CSE DEPARTMENT)02/MT/10 PDM,BAHADURGARHCE(2 ND SEM)
Billy Vivian Dr. Oblitey COSC  What is CAPTCHA?  History  Uses  Artificial Intelligence Relationship  reCAPTCHA  Works Cited.
CAPTCHA Presented by: Md.R ahim 08B21A Agenda Definition Background Motivation Applications Types of CAPTCHAs Breaking CAPTCHAs Proposed Approach.
SANDEEP MEHTA (ECE, IV Year). CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Invented at CMU by Luis von Ahn, Manuel.
An assessment framework for Intrusion Prevention System (IPS)
3.6 Fundamentals of cyber security
A novel probabilistic language-based CAPTCHA system
Dynamic Authentication of Typing Patterns
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems NDSS 2019 Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick.
Presentation transcript:

CAPTCHA CAPTCHA is a contrived acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart“. A CAPTCHA is a chal- lenge-response test, or else a “human-or-bot” authentication means, based on open A.I. problems that most humans should be able to pass easily but current computer programs should be very hard to solve. Thus, any correct solution to a CAPTCHA challenge is presumed to be from a human. There are three main CAPTCHA categories: (a) Visual, (b) Logical, and c) Audio CAPTCHA. A “human-or-bot” authentication means for VoIP systems in the AmI context The idea of the poster is based on Y. Soupionis on-going Ph.D. research at AUEB, being performed under the supervision of Prof. D. Gritzalis. Alexios Mylonas receives founding from the Propondis Foundation. Figure 2: SIP message exchange for CAPTCHA Design methodology In order to develop an effective audio CAPTCHA that will achieve the optimal performance (high human success rate and very low bot success rate), we decided upon a number of audio CAPTCHA attributes/characteristics, which were selected via an incremental testing procedure consisting of five stages. In each stage of this procedure, we measured the CAPTCHA efficiency, namely the success rate of the bot and the success rate of humans. User and bot success – Frequency and energy detection A “human-or-bot” authentication means for VoIP systems in the AmI context Nikos Virvilis, Alexios Mylonas, Yannis Soupionis, Dimitris Gritzalis {nvir, amylonas, jsoup, Information Security and Critical Infrastructure Protection Research Group Dept. of Informatics, Athens University of Economics & Business (AUEB), Greece Athens University of Economics & Business Dept. of Informatics References 1.von Ahn L., Blum M., Langford J., “Telling Humans & Computer Apart Automatically”, Com. of the ACM, Vol. 47, No. 2, pp , von Ahn L., Blum M, Hopper N., Langford J, “CAPTCHA: Using hard AI problems for security”, in Proc. of the International Conference on Theory and Applications of Cryptographic Techniques (EUROCRYPT 03), E. Biham (Ed.), pp , Springer (LNCS 2656), Poland, Soupionis Y., Tountas G., Gritzalis D., "Audio CAPTCHA for SIP-based VoIP", in Proc. of the 24 th International Information Security Confe- rence (SEC-2009), pp , Gritzalis D., Lopez J. (Eds.), Springer (IFIP AICT 297), Cyprus, SPHINX: The CMU Sphinx Group Open Source Speech Recognition Engines ( (retrieved August 2009). 5.van der Vorm J., Defeating Audio (Voice) CAPTCHA ( (retrieved August 2009). 6. Tam J., Simsa J., Huggins-Daines D., von Ahn L., Blum M., “Improving Audio CAPTCHAs”, in Proc. of the Symposium on Usable Privacy and Security (SOUPS 2008), USA, Visual CAPTCHA (Text or image based) Logical CAPTCHA (Simple questions) Which day, from Thursday, Wednesday, Sunday, or Tuesday, is part of the weekend? Audio CAPTCHA (Spoken character based) Regardless of the CAPTCHA category, each one of them must be: (a) Easy for humans to pass, (b) Easy for a tester machine to generate and grad, and (c) Hard for a software bot to solve. Audio CAPTCHA as an effective defense against SPIT attacks Audio CAPTCHAs were initially created to satisfy visual impaired users which wanted to register or make use of a service which demanded the answer of a visual CAPTCHA. However, audio CAPTCHAs can be a very effective defense against the SPIT problem in a VoIP infrastructure. VoIP popularity and the SPIT issue VoIP is an emerging technology which utilizes traditional data networks to provide in- expensive voice communications worldwide as a promising alternative to the traditional PSTN telephony. Due to this fact, VoIP solutions have gained wide-spread popularity from home users to enterprises. Unfortunately, its popularity makes VoIP particularly interesting to attackers, which can target and exploit its features for their benefit. One potential source of user annoyance in VoIP environments is the problem of SPam over Internet Telephony (SPIT). VoIP Spammers, namely “spitters”, are exploiting VoIP to call individuals and produce audio advertisements through the use of bots. USA VoIP statistics Residential Subscribers, Million Dollars Residential Subscribers, Million Dollars Vonage Subscribers, Q2' Million Dollars Revenues, 2005 $1.1 Billion Dollars Mobile VoIP Revenues, 2012 $18.6 Billion Dollars Fixed VoIP Revenues, 2012 $11.9 Billion Dollars SMB Spend, 2005 $2.1 Billion Dollars SMB Spend, 2010 $8.9 Billion Dollars Spend on Equipment, 2008 $5.8 Billion Dollars Subs Growth per Month Dollars Figure 1: Audio CAPTCHA attributes/characteristics VoIP Integration In order to test the bots in a VoIP environment we decided that the implementation procedure should consist of three stages: Stage 0: When the callee’s domain receives a SIP INVITE message, there are three possible distinct outcomes: (a) forward the message to the caller, (b) reject the message, and (c) send a CAPTCHA to the caller. Stage 1: An audio CAPTCHA is sent (in the form of an 182 message) to the caller. In the proposed implementation, the caller is replaced by a bot. The bot must record the audio CAPTCHA, reform it to an appropriate audio format, and identify the announced digits. Stage 2: When the bot has generated an answer, it forms a SIP message that includes the DTMF answer. The answer is sent, as a reply to the CAPTCHA puzzle. If the caller does not receive a 200 OK message, then a new CAPTCHA is sent and the bot starts recording again. The above procedure should be completed in a specific time frame. This time frame begins when the whole audio file (CAPTCHA) has been received by the caller, and expires when the allowed timeout for user input (the answer) is exceeded. The duration of the CAPTCHA play- back does not affect the time frame because the waiting time for an answer starts when the playback is complete. If there is no answer before the timeout, then the bot is allowed for another try. We propose an indicative timeout of six (6) seconds for the answer and a total number of three (3) attempts. This will give adequate time to humans to answer the CAPTCHA, as well as limit the effectiveness of a potential automated brute-force attack against the CAPTCHA. Automated bot and audio analysis – Speech recognition The second bot, which was used against the proposed CAPTCHA was a widely used, state-of-the-art and open- source speech recognition system, namely SPHINX. Figure 5: Sphinx-4 Architecture Bot success – Speech recognition SPHINX performance was really poor against the proposed CAPTCHA, achieving a low 27% success rate only in stage 1. In stages 2 and 4 the success rate was %, whereas in stages 4 and 5 it was practically zero (~ 0,003%). The main issue for the above results is that such speech recognition tools are effective only in “controlled” conditions, such as with only one speaker, without any noise. Moreover, these methods are demanding in hardware and time resour- ces, because they use combinations of speech recognition methods. Additionally, they do not focus on how quick they reach a result, but rather on how correct the result is. Automated bot and audio analysis – Frequency and energy detection One of the bots that was used to test the propo- sed CAPTCHA efficiency is developed by J. van der Vorm. It employs frequency and energy peak detection methods. The selection of this bot was due to its high success rate against known audio CAPTCHA (Google >30%), as well as to the limited time it requires to generate the result. Selected attributes The attributes that were selected for the production of our CAPTCHA are the following: 1. Vocabulary: 1) A data field (pool of characters) consisting of ten one-digit numbers (0-9) is used, allowing the users to respond to the CAPTCHA using the DTMF method. 2) A variable number of characters is also used in order to harden automated analysis, and 3) Since the mother tongue of the users is playing a major role in achieving high human success rate, our CAPTCHA can be easily adjusted to the mother tongue of the users. 2. Noise : 1) Noise has been added to each and every digit of the audio CAPTCHA as well as between the digits, creating high-energy peaks, resulting the bots being unable to segment the audio file correctly. 2) Use of sound distortion techniques is also implemented, preventing bots from isolating the spoken characters from the voice message correctly. 3. Duration: The proposed CAPTCHA avoids using fixed time intervals in order to harden the automated analysis. 4. Audio production: 1) The generation of the audio CAPTCHA files is done periodically to avoid real-time overhead as the production is a resource intensive process and 2) Avoid producing the generation of identical snapshots for extended periods of time. Moreover, different announcers are used, having the announcer of each and every digit selected randomly. The digits of the CAPTCHA are distributed randomly in the available space. Conclusions The proposed CAPTCHA, which aimed to address the SPIT problem in VoIP environments, has achieved a considerable human success rate, as well as a low success rate against two widely known bots. For future research, we envisage to compare the proposed CAPTCHA with additional audio CAPTCHA implementations [5] and aim at optimizing further its success rate, mainly against frequency and energy detection bots. Figure 6: SPHINX success rate vs. proposed CAPTCHA Source: the_numbers_subscribers_revenues_top_servi.html Figure 3: Frequency and energy analysis Figure 4: User and bot success rates