A Comprehensive Study for Different Types of CAPTCHA Methods and Various Attacks

JETIR June 2021, Volume 8, Issue 6

11 Pages Posted: 14 Jul 2021

See all articles by Menna Magdy

Menna Magdy

Menoufia University - Department of Computer Science

Medhat A. Tawfeek

Menoufia University

Hamdy M. Mousa

Menoufia University

Date Written: 2021

Abstract

Due to the growth of the internet in our life and its importance in all our everyday activities , including occupational and educational ones .We should also keep in mind that it harbors a negative aspect , as it brings security problems. Hence CAPTCHAs are used for making systems more secure. The major role of CAPTCHA is to prevent robotic bot (spam) form surrender or prove user personality. Using a pattern-matching algorithm is necessary for the user for comparison by receiving signs founded in similar matches. This method makes it difficult to get a forbidden access to data, since malicious bot is to spy out signs in the image. This mechanism implements actions on the attitude of user gesticulation which makes it distinguishable and secure. Human-Computer Interaction i.e. interaction between computer and individual is made to make it easy in understand human language .On other words, Human-computer Interaction focuses on the study of interfaces between computer and human. This paper presents a comprehensive study of various different types of CAPTCHA, the ones good in securing webpages. It also discusses the strengths and weaknesses of each one. Moreover, its importance in discerning the user’s individuality, the behavior of humans, and bots and the paper will illustrate some CAPTCHAs mechaniits and impairments which allows hackers to break .In addition, is necessary to take into consideration the approaches of building a good CAPTCHA.

Keywords: CAPTCHA, Bot Programs, Hackers, Spammer, Scrapers, Online Social Network

Suggested Citation

Magdy, Menna and Tawfeek, Medhat A. and Mousa, Hamdy M., A Comprehensive Study for Different Types of CAPTCHA Methods and Various Attacks (2021). JETIR June 2021, Volume 8, Issue 6, Available at SSRN: https://ssrn.com/abstract=3873233

Menna Magdy (Contact Author)

Menoufia University - Department of Computer Science ( email )

Egypt

Medhat A. Tawfeek

Menoufia University

Gamal Abd El-Nasir,
Shebeen El-Kom, Menofia Governorate
Egypt

Hamdy M. Mousa

Menoufia University

Gamal Abd El-Nasir,
Shebeen El-Kom, Menofia Governorate
Egypt

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
69
Abstract Views
188
rank
451,466
PlumX Metrics