Raut et al., 2022 - Google Patents
A Robust Captcha Scheme for Web SecurityRaut et al., 2022
- Document ID
- 10837578232238928407
- Author
- Raut Y
- Pote S
- Boricha H
- Gunjgur P
- Publication year
- Publication venue
- 2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA
External Links
Snippet
The internet has grown increasingly important in everyone's everyday lives due to the availability of numerous web services such as email, cloud storage, video streaming, music streaming, and search engines. On the other hand, attacks by computer programmes such …
- 238000000034 method 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guerar et al. | Gotta CAPTCHA’Em all: a survey of 20 Years of the human-or-computer Dilemma | |
Ferreira et al. | An analysis of social engineering principles in effective phishing | |
Dinh et al. | Recent advances of Captcha security analysis: a short literature review | |
Moradi et al. | CAPTCHA and its Alternatives: A Review | |
Wei et al. | GeoCAPTCHA—A novel personalized CAPTCHA using geographic concept to defend against 3 rd Party Human Attack | |
Ogiela et al. | Application of knowledge‐based cognitive CAPTCHA in Cloud of Things security | |
Dinesh et al. | Identification of phishing attacks using machine learning algorithm | |
Kolupaev et al. | Captchas: Humans vs. bots | |
Dinh et al. | Human-artificial intelligence approaches for secure analysis in CAPTCHA codes | |
Algwil | A survey on captcha: Origin, applications and classification | |
Suru et al. | Security and user interface usability of graphical authentication systems–A review | |
Raut et al. | A Robust Captcha Scheme for Web Security | |
Sakhare et al. | Implementation of Captcha Mechanisms using Deep Learning to Prevent Automated Bot Attacks | |
Kanaoka et al. | Enhancing smishing detection in ar environments: Cross-device solutions for seamless reality | |
Lashkari et al. | A survey on usability and security features in graphical user authentication algorithms | |
Kalaichelvi et al. | The detection of phishing attempts in communications systems | |
Abdalla et al. | An evaluation of different types of CAPTCHA: effectiveness, user-friendliness, and limitations | |
Taeb et al. | Seeing the Unseen: A Forecast of Cybersecurity Threats Posed by Vision Language Models | |
Gokul et al. | Analysis of phishing detection using logistic regression and random forest | |
Rajaee et al. | In-Depth study of CAPTCHA | |
Demenongo et al. | Ensemble Model for the Detection of Phishing URLs | |
Khan et al. | Using arabic CAPTCHA for cyber security | |
Magdy et al. | A comprehensive Study for Different Types of CAPTCHA Methods and Various Attacks | |
Kouchay et al. | SECURED ARCHITECTURE STRATEGY FOR FIGHTING AGAINST BOTS. | |
Safder | PASSWORD SECURITY, AN ANALYSIS OF AUTHENTICATION METHODS |