Abstract
The Automated Turing test (ATT) is almost a standard security technique for addressing the threat of undesirable or malicious bot programs. In this paper, we motivate an interesting adversary model, cyborgs, which are either humans assisted by bots or bots assisted by humans. Since there is always a human behind these bots, or a human can always be available on demand, ATT fails to differentiate such cyborgs from humans. The notion of “telling humans and cyborgs apart” is novel, and it can be of practical relevance in network security. Although it is a challenging task, we have had some success in telling cyborgs and humans apart automatically.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Turing, A.M.: Computer machinery and intelligence. Mind 59(236), 433–460 (1950)
von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart Automatically. Communications of the ACM 47(2) (February 2004)
Yan, J.: Security Design in Online Games. In: Proc. of the 19th Annual Computer Security Applications Conference (ACSAC 2003), Las Vegas, U.S.A, December 2003. IEEE Computer Society, Los Alamitos (2003)
Yan, J., Randell, B.: A Systematic Classification of Cheating in Online Games. In: Proc. of the 4th ACM SIGCOMM Workshop on Network & System Support for Games (NetGames 2005), October 10-11. ACM Press, New York (2005)
Fung, Y.S., Lui, J., Liu, J., Yan, J.: Detecting Cheaters for Multiplayer Games: Theory, Design and Implementation. In: The second IEEE International Workshop on Networking Issues in Multimedia Entertainment, Las Vegas, USA (January 2006)
Clayton, R.: Automating responses to email challenges (February 2006), http://www.cl.cam.ac.uk/~rnc1/cr/index.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yan, J. (2009). Bot, Cyborg and Automated Turing Test. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2006. Lecture Notes in Computer Science, vol 5087. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04904-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-04904-0_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04903-3
Online ISBN: 978-3-642-04904-0
eBook Packages: Computer ScienceComputer Science (R0)