CAPTCHAs: Differentiating between Human and Bots

CAPTCHAs: Differentiating between Human and Bots

Deapesh Misra
ISBN13: 9781605660363|ISBN10: 1605660361|ISBN13 Softcover: 9781616925017|EISBN13: 9781605660370
DOI: 10.4018/978-1-60566-036-3.ch013
Cite Chapter Cite Chapter

MLA

Misra, Deapesh. "CAPTCHAs: Differentiating between Human and Bots." Social and Human Elements of Information Security: Emerging Trends and Countermeasures, edited by Manish Gupta and Raj Sharman, IGI Global, 2009, pp. 220-246. https://doi.org/10.4018/978-1-60566-036-3.ch013

APA

Misra, D. (2009). CAPTCHAs: Differentiating between Human and Bots. In M. Gupta & R. Sharman (Eds.), Social and Human Elements of Information Security: Emerging Trends and Countermeasures (pp. 220-246). IGI Global. https://doi.org/10.4018/978-1-60566-036-3.ch013

Chicago

Misra, Deapesh. "CAPTCHAs: Differentiating between Human and Bots." In Social and Human Elements of Information Security: Emerging Trends and Countermeasures, edited by Manish Gupta and Raj Sharman, 220-246. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-036-3.ch013

Export Reference

Mendeley
Favorite

Abstract

The Internet has established firm deep roots in our day to day life. It has brought many revolutionary changes in the way we do things. One important consequence has been the way it has replaced human to human contact. This has also presented us with a new issue which is the requirement for differentiating between real humans and automated programs on the Internet. Such automated programs are usually written with a malicious intent. CAPTCHAs play an important role in solving this problem by presenting users with tests which only humans can solve. This chapter looks into the need, the history, and the different kinds of CAPTCHAs that researchers have come up with to deal with the security implications of automated bots pretending to be humans. Various schemes are compared and contrasted with each other, the impact of CAPTCHAs on Internet users is discussed, and to conclude, the various possible attacks are discussed. The author hopes that the chapter will not only introduce this interesting field to the reader in its entirety, but also simulate thought on new schemes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.