By Topic

A variety of automated turing tests for network security: Using AI-hard problems in perception and cognition to ensure secure collaborations

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
John P. McIntire ; Air Force Research Laboratory, 711th Human Performance Wing / RHCV, USA ; Lindsey K. McIntire ; Paul R. Havig

There are a multitude of collaborative and network applications that are vulnerable to interference, infiltration, or attack by automated computer programs. Malicious programs can spam or otherwise disrupt email systems, blogs, and file sharing networks. They can cheat at online gaming, skew the results of online polls, or conduct denial-of-service attacks. And sophisticated AI ldquochat-botsrdquo can pose as humans in order to gather intelligence from unsuspecting targets. Thus, a recurring problem in collaborative systems is how to verify that a user is a human and not a computer. Following the work of Coates et al., von Ahn et al., and others, we propose several AI-hard problems in perception and cognition that can serve as ldquoCAPTCHAs,rdquo or tests capable of distinguishing between human-level intelligence and artificial intelligence, ensuring that all collaborators interfacing a particular system are humans and not nefarious computer programs.

Published in:

Collaborative Technologies and Systems, 2009. CTS '09. International Symposium on

Date of Conference:

18-22 May 2009