首页> 外文期刊>Neurocomputing >End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network
【24h】

End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network

机译:基于循环一致的生成对抗网络的基于文本的CAPTCHA的端到端攻击

获取原文
获取原文并翻译 | 示例
           

摘要

As a widely deployed security scheme, text-based completely automated public Turing tests to tell computers and humans apart (CAPTCHAs) have become increasingly unable to resist machine learning-based attacks. So far, many researchers have conducted studies on approaches for attacking text-based CAPTCHAs deployed by different companies, such as Microsoft, Amazon, and Apple, and achieved specific results. However, most of these attacks have shortcomings, such as the poor portability of attack methods, which require a series of data preprocessing steps and rely on large amounts of labeled CAPTCHAs. In this study, we propose an efficient and simple end-to-end attack method based on cycle-consistent generative adversarial networks (Cycle-GANs). Compared to previous studies, our approach significantly reduces the cost of data labeling. Additionally, this method has high portability. It can attack ordinary text-based CAPTCHA schemes only by modifying a few configuration parameters, which makes the attack easier to execute. First, we train CAPTCHA synthesizers based on the Cycle-GAN to generate some fake samples. Basic recognizers based on a convolutional recurrent neural network are trained using the fake data. Subsequently, an active transfer learning method is employed to optimize the basic recognizer utilizing tiny amounts of labeled real-world CAPTCHA samples. Our approach efficiently cracked the CAPTCHA schemes deployed by 10 popular websites, indicating that our attack method may be universal. Additionally, we analyzed the current most popular anti-recognition mechanisms. The results show that the combination of more anti-recognition mechanisms can improve the security of CAPTCHAs. However, the improvement is limited. Conversely, generating more complex CAPTCHAs may cost more resources and reduce the usability of CAPTCHAs.(c) 2020 Published by Elsevier B.V.
机译:作为一项广泛部署的安全方案,基于文本的完全自动化的公共图灵测试,以告诉计算机和人类(CAPTCHA)越来越越来越无法抵制基于机器的基于机器的攻击。到目前为止,许多研究人员对攻击基于文本的CAPTCHA的方法进行了研究,这些CAPTCHA部署的不同公司(如Microsoft,Amazon和Apple)和实现了特定的结果。然而,大多数这些攻击都具有缺点,例如攻击方法的可移植性差,这需要一系列数据预处理步骤并依赖大量标记的CAPTCHA。在这项研究中,我们提出了一种基于循环一致的生成对抗网络(周期 - GANS)的高效和简单的端到端攻击方法。与之前的研究相比,我们的方法显着降低了数据标签的成本。此外,该方法具有高便携性。它只能通过修改一些配置参数来攻击普通文本的CAPTCHA方案,这使得攻击更容易执行。首先,我们根据循环GaN训练CAPTCHA合成器,以产生一些假样本。基于卷积经常性神经网络的基本识别员使用假数据训练。随后,采用主动转移学习方法来优化利用微小数量标记的现实世界CAPTCHA样本来优化基本识别器。我们的方法有效地破解了10个流行的网站部署的CAPTCHA方案,表明我们的攻击方法可能是普遍的。此外,我们分析了目前最受欢迎的反识别机制。结果表明,更多的反识别机制的组合可以改善CAPTCHA的安全性。但是,改善是有限的。相反,生成更复杂的CAPTCHA可能会花费更多的资源,并降低CAPTCHA的可用性。(c)由elestvier b.v发布的2020。

著录项

  • 来源
    《Neurocomputing》 |2021年第14期|223-236|共14页
  • 作者单位

    Sichuan Univ Coll Cybersecur Chengdu 610065 Peoples R China;

    Sichuan Univ Coll Cybersecur Chengdu 610065 Peoples R China|Sichuan Univ Cybersecur Res Inst Chengdu 610065 Peoples R China;

    Sichuan Univ Coll Cybersecur Chengdu 610065 Peoples R China;

    Sichuan Univ Coll Comp Sci Chengdu 610065 Peoples R China;

    Sichuan Univ Coll Art Chengdu 610065 Peoples R China;

    Sichuan Univ Coll Cybersecur Chengdu 610065 Peoples R China|Sichuan Univ Cybersecur Res Inst Chengdu 610065 Peoples R China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    CAPTCHAs; CRNN; Cycle-GAN; Active transfer learning;

    机译:CAPTCHAS;CRNN;CYCLE-GAN;主动转移学习;
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号