{"id":"https://openalex.org/W2094560935","doi":"https://doi.org/10.1145/1980022.1980086","title":"Mitigating denial of service attack using CAPTCHA mechanism","display_name":"Mitigating denial of service attack using CAPTCHA mechanism","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2094560935","doi":"https://doi.org/10.1145/1980022.1980086","mag":"2094560935"},"language":"en","primary_location":{"id":"doi:10.1145/1980022.1980086","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980086","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111976971","display_name":"M. Mehra","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Mehra","raw_affiliation_strings":["Sardar Patel Institute of Technology, Mumbai, India","[Sardar Patel Institute of Technology, Mumbai, India]"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute of Technology, Mumbai, India","institution_ids":[]},{"raw_affiliation_string":"[Sardar Patel Institute of Technology, Mumbai, India]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076160843","display_name":"Mayank Agarwal","orcid":"https://orcid.org/0000-0002-6374-6737"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M. Agarwal","raw_affiliation_strings":["Sardar Patel Institute of Technology, Mumbai, India","[Sardar Patel Institute of Technology, Mumbai, India]"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute of Technology, Mumbai, India","institution_ids":[]},{"raw_affiliation_string":"[Sardar Patel Institute of Technology, Mumbai, India]","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029367540","display_name":"Renuka Pawar","orcid":"https://orcid.org/0000-0003-2330-0543"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Pawar","raw_affiliation_strings":["Sardar Patel Institute of Technology, Mumbai, India","[Sardar Patel Institute of Technology, Mumbai, India]"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute of Technology, Mumbai, India","institution_ids":[]},{"raw_affiliation_string":"[Sardar Patel Institute of Technology, Mumbai, India]","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067649636","display_name":"D. Shah","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"D. Shah","raw_affiliation_strings":["Sardar Patel Institute of Technology, Mumbai, India","[Sardar Patel Institute of Technology, Mumbai, India]"],"affiliations":[{"raw_affiliation_string":"Sardar Patel Institute of Technology, Mumbai, India","institution_ids":[]},{"raw_affiliation_string":"[Sardar Patel Institute of Technology, Mumbai, India]","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111976971"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.1726,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.95380042,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"284","last_page":"284"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/captcha","display_name":"CAPTCHA","score":0.9755624532699585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8174819946289062},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7191973924636841},{"id":"https://openalex.org/keywords/decipher","display_name":"DECIPHER","score":0.6592706441879272},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6175132989883423},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.5016922950744629},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.48591533303260803},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43908441066741943},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3962153196334839},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3336794078350067}],"concepts":[{"id":"https://openalex.org/C163339463","wikidata":"https://www.wikidata.org/wiki/Q484598","display_name":"CAPTCHA","level":2,"score":0.9755624532699585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8174819946289062},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7191973924636841},{"id":"https://openalex.org/C164614171","wikidata":"https://www.wikidata.org/wiki/Q5204775","display_name":"DECIPHER","level":2,"score":0.6592706441879272},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6175132989883423},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.5016922950744629},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.48591533303260803},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43908441066741943},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3962153196334839},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3336794078350067},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1980022.1980086","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980086","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W112869242","https://openalex.org/W1567048812","https://openalex.org/W1603565383","https://openalex.org/W1974008446","https://openalex.org/W2072410439","https://openalex.org/W2115601549"],"related_works":["https://openalex.org/W3134776999","https://openalex.org/W1975364925","https://openalex.org/W2064097623","https://openalex.org/W2566963304","https://openalex.org/W2028308373","https://openalex.org/W2111502540","https://openalex.org/W4287768690","https://openalex.org/W3036645521","https://openalex.org/W2528876774","https://openalex.org/W2070220341"],"abstract_inverted_index":{"Denial":[0],"of":[1,28,38,103,105,124,143,156,172],"Service":[2],"(DoS":[3],"henceforth)":[4],"attack":[5,22,64],"is":[6,23,81],"performed":[7,25],"solely":[8],"with":[9],"the":[10,14,42,94,121,125,170,177,182,187],"intention":[11],"to":[12,17,41,61,76,96,120,133,150,162,168,180,185],"deny":[13],"legitimate":[15,183],"users":[16,184],"access":[18,77,95,186],"services.":[19],"Since":[20],"DoS":[21,52,63],"usually":[24,140],"by":[26,90],"means":[27],"bots,":[29],"automated":[30],"software.":[31],"These":[32],"bots":[33,139,147,161],"send":[34],"a":[35,130],"large":[36],"number":[37],"fake":[39],"requests":[40],"server":[43,46,178],"which":[44,49,67],"exceeds":[45],"buffer":[47],"capacity":[48],"results":[50],"in":[51,111],"attack.":[53],"In":[54],"this":[55,144],"paper":[56],"we":[57],"propose":[58],"an":[59],"idea":[60],"prevent":[62],"on":[65,83],"web-sites":[66],"ask":[68],"for":[69],"user":[70,91],"credentials":[71,97],"before":[72,92],"it":[73,164],"allows":[74],"them":[75],"resources.":[78],"Our":[79],"approach":[80,145],"based":[82],"CAPTCHA":[84,88,100,158],"verification.":[85],"We":[86],"verify":[87],"submitted":[89],"allowing":[93],"page.":[98],"The":[99,138],"would":[101,108],"consist":[102],"variety":[104],"patterns":[106,159],"that":[107],"be":[109],"distinct":[110,157],"nature":[112],"and":[113,165],"are":[114,148],"randomly":[115],"generated":[116],"during":[117],"each":[118],"visit":[119],"webpage.":[122],"Most":[123],"current":[126],"web":[127],"sites":[128],"use":[129],"common":[131],"methodology":[132],"generate":[134],"all":[135],"its":[136],"CAPTCHAs.":[137,153],"take":[141],"advantage":[142],"since":[146],"able":[149],"decipher":[151,163],"those":[152],"A":[154],"set":[155],"prevents":[160],"consequently":[166],"helps":[167],"reduce":[169],"generation":[171],"illicit":[173],"traffic.":[174],"This":[175],"preserves":[176],"bandwidth":[179],"allow":[181],"site.":[188]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
