| NEUROCOMPUTING | 卷:433 |
| End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network | |
| Article | |
| Li, Chunhui1  Chen, Xingshu1,2  Wang, Haizhou1  Wang, Peiming3  Zhang, Yu4  Wang, Wenxian1,2  | |
| [1] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Peoples R China | |
| [2] Sichuan Univ, Cybersecur Res Inst, Chengdu 610065, Peoples R China | |
| [3] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Peoples R China | |
| [4] Sichuan Univ, Coll Art, Chengdu 610065, Peoples R China | |
| 关键词: CAPTCHAs; CRNN; Cycle-GAN; Active transfer learning; | |
| DOI : 10.1016/j.neucom.2020.11.057 | |
| 来源: Elsevier | |
PDF
|
|
【 摘 要 】
As a widely deployed security scheme, text-based completely automated public Turing tests to tell computers and humans apart (CAPTCHAs) have become increasingly unable to resist machine learning-based attacks. So far, many researchers have conducted studies on approaches for attacking text-based CAPTCHAs deployed by different companies, such as Microsoft, Amazon, and Apple, and achieved specific results. However, most of these attacks have shortcomings, such as the poor portability of attack methods, which require a series of data preprocessing steps and rely on large amounts of labeled CAPTCHAs. In this study, we propose an efficient and simple end-to-end attack method based on cycle-consistent generative adversarial networks (Cycle-GANs). Compared to previous studies, our approach significantly reduces the cost of data labeling. Additionally, this method has high portability. It can attack ordinary text-based CAPTCHA schemes only by modifying a few configuration parameters, which makes the attack easier to execute. First, we train CAPTCHA synthesizers based on the Cycle-GAN to generate some fake samples. Basic recognizers based on a convolutional recurrent neural network are trained using the fake data. Subsequently, an active transfer learning method is employed to optimize the basic recognizer utilizing tiny amounts of labeled real-world CAPTCHA samples. Our approach efficiently cracked the CAPTCHA schemes deployed by 10 popular websites, indicating that our attack method may be universal. Additionally, we analyzed the current most popular anti-recognition mechanisms. The results show that the combination of more anti-recognition mechanisms can improve the security of CAPTCHAs. However, the improvement is limited. Conversely, generating more complex CAPTCHAs may cost more resources and reduce the usability of CAPTCHAs. (c) 2020 Published by Elsevier B.V.
【 授权许可】
Free
【 预 览 】
| Files | Size | Format | View |
|---|---|---|---|
| 10_1016_j_neucom_2020_11_057.pdf | 777KB |
PDF