Change search
ReferencesLink to record
Permanent link

Direct link
How malicious bots interact with an online contest with gamification: A study in methods for identifying and protecting against bots
KTH, School of Computer Science and Communication (CSC).
KTH, School of Computer Science and Communication (CSC).
2016 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Setting up online contests with gamification is an effective marketing method, but which brings security complications. By having rewards with high value, cheaters are attracted to participate with the use of malicious bots. To distinguish bots from humans different methods are used which are divided into Human Interactive Proof (HIP) and Human Observational Proof (HOP). This report aims to look at the effectiveness of the most popular HIPs and HOPs and how an attacker is able to bypass them. From the results, parameters that are of interest when implementing a framework to detect and prevent malicious bots, are presented. Data was collected from five honeypot systems. It is concluded that CAPTCHAs should be used as much as possible, together with HMAC and an Intrusion Detection System (IDS) based on click diversity and submissions per IP-address.

Place, publisher, year, edition, pages
National Category
Computer Science
URN: urn:nbn:se:kth:diva-186445OAI: diva2:927322
Available from: 2016-05-18 Created: 2016-05-11 Last updated: 2016-05-18Bibliographically approved

Open Access in DiVA

fulltext(776 kB)33 downloads
File information
File name FULLTEXT01.pdfFile size 776 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
School of Computer Science and Communication (CSC)
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 33 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 460 hits
ReferencesLink to record
Permanent link

Direct link