www.imperva.com Open in urlscan Pro
45.60.76.225  Public Scan

URL: https://www.imperva.com/learn/application-security/what-is-captcha/
Submission: On July 15 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form elem-id="" class="marketo-form" data-form-id="3495" data-form-args="form_args_91660960"></form>

Text Content

Under DDoS Attack?
1-866-777-9980
Login
LoginCloud Security ConsoleRASP Console
EN
EnglishENDeutschDEEspañolESFrançaisFRPortuguêsPT-BR日本語日本語한국어KR中文CN
Under DDoS Attack?
1-866-777-9980
Start for FreeContact UsStart for FreeContact Us
 * Why Imperva
 * Products
   Products
    * Application Performance
    * Application Security
    * Data Security
    * Network Security
    * Imperva Plans
   
   Application Performance
   Application Performance Overview
   Optimize content delivery and user experience
    * Content Delivery Network
      Boost website performance with caching and compression
    * Waiting Room
      Virtual queuing to control visitor traffic
   
   THE IMPORTANCE OF A RESILIENT CDN FOR DIGITAL PERFORMANCE
   
   Get featured report
   Application Security
   Application Security Overview
   Industry-leading application and API protection
    * Web Application Firewall
      Instantly secure applications from the latest threats
    * Advanced Bot Protection
      Identify and mitigate the most sophisticated bad bot
    * API Security
      Discover shadow APIs and the sensitive data they handle
    * DDoS Protection
      Secure all assets at the edge with guaranteed uptime
   
    * Client-Side Protection
      Visibility and control over third-party JavaScript code
    * Runtime Protection
      Secure workloads from unknown threats and vulnerabilities
    * Serverless Protection
      Uncover security weaknesses on serverless environments
    * Attack Analytics
      Complete visibility into your latest attacks and threats
   
   IMPERVA NAMED A SECURITY LEADER IN THE SECUREIQLAB CYBERRISK REPORT
   
   Get featured report
   Data Security
   Data Security Overview
   Protect all data and ensure compliance at any scale
    * Data Security Fabric
      Multicloud, hybrid security platform protecting all data types
    * Cloud Data Security
      SaaS-based data posture management and protection
   
   2023 STRATEGIC ROADMAP FOR DATA SECURITY PLATFORM ADOPTION
   
   Get featured report
   Network Security
   Network Security Overview
   Protection and control over your network infrastructure
    * DDoS Protection
      Secure all assets at the edge with guaranteed uptime
   
   GLOBAL DDOS THREAT LANDSCAPE REPORT
   
   Get featured report
   Imperva Plans
 * Solutions
   Solutions
    * By Use Case
    * By Industry
    * Imperva Plans
   
   By Use Case
    * Application Security
    * Stop software supply chain attacks
    * Mitigate account takeover attacks
    * Protect modern web applications
    * Secure API inventories
    * Protect against online fraud
    * Embed security into DevOps
   
    * Data Security
    * Safeguard sensitive and personal data
    * Advance data governance
    * Assure data compliance and privacy
    * Securely move data to the cloud
    * Observe data risk management
    * Monitor user behavior analytics
    * Data encryption and cryptographic solutions
   
    * Network Security
    * Defend DDoS attacks at scale
    * Secure business continuity in the event of an outage
    * Application Performance
    * Ensure consistent application performance
   
   
   By Industry
   Solutions by Industry
   Defense-in-depth security for every industry
    * Government
    * Healthcare
    * Financial Services
   
    * Telecom & ISPs
    * Retail
   
   THE STATE OF SECURITY WITHIN ECOMMERCE 2022
   
   Get free report
   Imperva Plans
 * Support
   Support
   Support
   Support
   Looking for technical support or services, please review our various channels
   below
    * Technical Support
    * Services
    * Imperva University
    * Community
   
    * Support Portal Login
    * Documentation
    * EOL Policy
   
   
 * Partners
   Partners
    * Channel Partners
    * Technology Alliance Partners
   
   Channel Partners
   Channel Partners Program
   Looking for an Imperva partner? Find an approved one with the expertise to
   help you
    * Channel Partners
    * Find a Partner
    * Partner Portal Login
   
   IMPERVA REIMAGINES PARTNER PROGRAM: IMPERVA ACCELERATE
   
   Learn how
   Technology Alliance Partners
   Technology Alliance Partners
   Imperva collaborates with the top technology companies
    * Technology Alliance Partners (TAP)
    * Become a TAP
    * Find a TAP
   
   PROTECT YOUR CLOUDERA DATA WITH IMPERVA
   
   Learn more
 * Customers
   Customers
    * Application Security Customer Stories
    * Data Security Customer Stories
    * See all Customer Stories
   
   Application Security Customer Stories
   Application Security Customer Stories
   Learn how Imperva enables and protects industry leaders
    * Tower ensures website visibility and uninterrupted business operations
    * Smallpdf protects its customers and ensures availability
   
   QUÁLITAS CONTINUES ITS QUALITY SERVICES USING IMPERVA APPLICATION SECURITY
   
   Learn how
   Data Security Customer Stories
   Data Security Customer Stories
   Learn how Imperva enables and protects industry leaders
    * Banco Popular streamlines operations and lowers operational costs
    * Discovery Inc. tackles data compliance in public cloud with Imperva Data
      Security Fabric
   
   DISCOVERY INC. TACKLES DATA COMPLIANCE IN PUBLIC CLOUD
   
   Learn how
   See all Customer Stories
 * Resources
   Resources
    * Resources
    * Threat Research
    * Learning Assets
   
   Resources
   Resources
   Get all the information you need about Imperva products and solutions
    * Resource Library
    * Blog
    * Webinars
    * Case Studies
    * Privacy, Compliance & Trust Center
    * Imperva Certifications
   
   NEW VULNERABILITY IN POPULAR WIDGET SHOWS RISKS OF THIRD-PARTY CODE
   
   Read more
   Threat Research
   Threat Research
   Stay informed on the latest threats and vulnerabilities
    * Cyber Threat Index
    * Cyber Attack Map
    * Free Tools
    * Network Map
   
   CYBER THREAT INDEX
   
   Latest threat analysis
   Learning Assets
   Learning Assets
   Expand and share your knowledge
    * Learning Center
    * Application Security Guide
    * Data Security Guide
    * Imperva Community
    * Documentation Portal
   
   BROWSE THE IMPERVA LEARNING CENTER FOR THE LATEST CYBERSECURITY TOPICS
   
   Explore now
 * Company
   Company
   Company
   Company
   Get to know us, beyond our products and services
    * About Us
    * Events
    * Careers
   
    * Press & Awards
    * Contact Information
   
   2022 SUSTAINABILITY REPORT
   
   Read more



Home > Learning Center > AppSec > CAPTCHA 


ARTICLE'S CONTENT

 * What is CAPTCHA
 * What are CAPTCHAs Used for
 * How Does CAPTCHA Work
 * Drawbacks of Using CAPTCHA
 * CAPTCHA Types: Examples
 * Imperva Bot Detection: CAPTCHA as a Last Line of Defense


CAPTCHA

187.5k views
App SecurityEssentials



WHAT IS CAPTCHA

CAPTCHA stands for the Completely Automated Public Turing test to tell Computers
and Humans Apart. CAPTCHAs are tools you can use to differentiate between real
users and automated users, such as bots. CAPTCHAs provide challenges that are
difficult for computers to perform but relatively easy for humans. For example,
identifying stretched letters or numbers, or clicking in a specific area.


WHAT ARE CAPTCHAS USED FOR

CAPTCHAs are used by any website that wishes to restrict usage by bots. Specific
uses include:

 * Maintaining poll accuracy—CAPTCHAs can prevent poll skewing by ensuring that
   each vote is entered by a human. Although this does not limit the overall
   number of votes that can be made, it makes the time required for each vote
   longer, discouraging multiple votes.
 * Limiting registration for services—services can use CAPTCHAs to prevent bots
   from spamming registration systems to create fake accounts. Restricting
   account creation prevents waste of a service’s resources and reduces
   opportunities for fraud.
 * Preventing ticket inflation—ticketing systems can use CAPTCHA to limit
   scalpers from purchasing large numbers of tickets for resale. It can also be
   used to prevent false registrations to free events.
 * Preventing false comments—CAPTCHAs can prevent bots from spamming message
   boards, contact forms, or review sites. The extra step required by a CAPTCHA
   can also play a role in reducing online harassment through inconvenience.


×
Jul 11 Upcoming Webinar


BAD BOTS: BALANCING PROTECTION AGAINST CUSTOMER EXPERIENCE

Register Now

×




HOW DOES CAPTCHA WORK

CAPTCHAs work by providing information to a user for interpretation. Traditional
CAPTCHAs provided distorted or overlapping letters and numbers that a user then
has to submit via a form field. The distortion of the letters made it difficult
for bots to interpret the text and prevented access until the characters were
verified.

This CAPTCHA type relies on a human’s ability to generalize and recognize novel
patterns based on variable past experience. In contrast, bots can often only
follow set patterns or input randomized characters. This limitation makes it
unlikely that bots will correctly guess the right combination.

Since CAPTCHA was introduced, bots that use machine learning have been
developed. These bots are better able to identify traditional CAPTCHAs with
algorithms trained in pattern recognition. Due to this development, newer
CAPTCHA methods are based on more complex tests. For example, reCAPTCHA requires
clicking in a specific area and waiting until a timer runs out.


DRAWBACKS OF USING CAPTCHA

The overwhelming benefit of CAPTCHA is that it is highly effective against all
but the most sophisticated bad bots. However, CAPTCHA mechanisms can negatively
affect the user experience on your website:

 * Disruptive and frustrating for users
 * May be difficult to understand or use for some audiences
 * Some CAPTCHA types do not support all browsers
 * Some CAPTCHA types are not accessible to users who view a website using
   screen readers or assistive devices


CAPTCHA TYPES: EXAMPLES

Modern CAPTCHAs fall into three main categories—text-based, image-based, and
audio.


TEXT-BASED CAPTCHAS

Text-based CAPTCHAs are the original way in which humans were verified. These
CAPTCHAs can use known words or phrases, or random combinations of digits and
letters. Some text-based CAPTCHAs also include variations in capitalization.

The CAPTCHA presents these characters in a way that is alienated and requires
interpretation. Alienation can involve scaling, rotation, distorting characters.
It can also involve overlapping characters with graphic elements such as color,
background noise, lines, arcs, or dots. This alienation provides protection
against bots with insufficient text recognition algorithms but can also be
difficult for humans to interpret.

Text-based CAPTCHA patterns

Techniques for creating text-based CAPTCHAs include:

 * Gimpy—chooses an arbitrary number of words from an 850-word dictionary and
   provides those words in a distorted fashion.
 * EZ-Gimpy—is a variation of Gimpy that uses only one word.
 * Gimpy-r—selects random letters, then distorts and adds background noise to
   characters.
 * Simard’s HIP—selects random letters and numbers, then distorts characters
   with arcs and colors.


CAPTCHA IMAGE

Image-based CAPTCHAs were developed to replace text-based ones. These CAPTCHAs
use recognizable graphical elements, such as photos of animals, shapes, or
scenes. Typically, image-based CAPTCHAs require users to select images matching
a theme or to identify images that don’t fit.

You can see an example of this type of CAPTCHA below. Note that it defines the
theme using an image instead of text.

Example of image-based CAPTCHA

Image-based CAPTCHAs are typically easier for humans to interpret than
text-based. However, these tools present distinct accessibility issues for
visually impaired users. For bots, image-based CAPTCHAs are more difficult than
text to interpret because these tools require both image recognition and
semantic classification.


AUDIO CAPTCHA

Audio CAPTCHAs were developed as an alternative that grants accessibility to
visually impaired users. These CAPTCHAs are often used in combination with text
or image-based CAPTCHAs. Audio CAPTCHAs present an audio recording of a series
of letters or numbers which a user then enters.

These CAPTCHAs rely on bots not being able to distinguish relevant characters
from background noise. Like text-based CAPTCHAs, these tools can be difficult
for humans to interpret as well as for bots.


MATH OR WORD PROBLEMS

Some CAPTCHA mechanisms ask users to solve a simple mathematical problem such as
“3+4” or “18-3”. The assumption is that a bot will find it difficult to identify
the question and devise a response. Another variant is a word problem, asking
the user to type the missing word in a sentence, or complete a sequence of
several related terms. These types of problems are accessible to vision impaired
users, but at the same time they may be easier for bad bots to solve.


SOCIAL MEDIA SIGN IN

A popular alternative to CAPTCHA is requiring users to sign in using a social
profile such as Facebook, Google or LinkedIn. The user’s details will be
automatically filled in using single sign on (SSO) functionality provided by the
social media website.

This is still disruptive, but may actually be easier for the user to complete
than other forms of CAPTCHA. An additional benefit is that it is a convenient
registration mechanism.


NO CAPTCHA RECAPTCHA

This type of CAPTCHA, known for its use by Google, is much easier for users than
most other types. It provides a checkbox saying “I am not a robot” which users
need to select – and that’s all. It works by tracking user movements and
identifying if the click and other user activity on the page resembles human
activity or a bot. If the test fails, reCAPTCHA provides a traditional image
selection CAPTCHA, but in most cases the checkbox test suffices to validate the
user.

See how Advanced Bot Protection can help you with stopping bad bots.

Request demo Learn more


IMPERVA BOT DETECTION: CAPTCHA AS A LAST LINE OF DEFENSE

Imperva provides a bot detection solution that is built for minimal business
disruption. It offers several types of challenges which filter out bad bot
traffic with minimal impact on human users—including device fingerprinting,
cookie challenges and JavaScript challenges.

Imperva provides the option to deploy CAPTCHAs, but uses it as the final line of
defense, if all other bot identification mechanisms fail. This means it will be
used for a very small percentage of user traffic. Imperva does provide the
option to manually enforce CAPTCHA, for websites that need a stricter approach
to advanced bot protection.

In addition to providing bad bot mitigation, Imperva provides multi-layered
protection to make sure websites and applications are available, easily
accessible and safe. The Imperva application security solution includes:

 * DDoS Protection—maintain uptime in all situations. Prevent any type of DDoS
   attack, of any size, from preventing access to your website and network
   infrastructure.
 * CDN—enhance website performance and reduce bandwidth costs with a CDN
   designed for developers. Cache static resources at the edge while
   accelerating APIs and dynamic websites.
 * Cloud WAF—permit legitimate traffic and prevent bad traffic. Safeguard your
   applications at the edge with an enterprise‑class cloud WAF.
 * Gateway WAF—keep applications and APIs inside your network safe with Imperva
   Gateway WAF.
 * RASP—keep your applications safe from within against known and zero‑day
   attacks. Fast and accurate protection with no signature or learning mode.


LATEST BLOGS

Application Security
...
 * Imperva

Understanding and Mitigating the MOVEit Incidents

Kunal Anand

Jun 19, 2023 2 min read

Imperva
...
 * Application Security

Anonymous Sudan, MOVEit, and Cl0p

Kunal Anand

Jun 15, 2023 2 min read

Application Security
How Ticket Scalping Impacts Asia’s Live Entertainment Industry

Erez Hasson

Jun 14, 2023 5 min read

Application Security
Preventing Bot Attacks and Online Fraud on APIs

Erez Hasson

May 17, 2023 6 min read

Application Security
What We Learned from the 2023 Imperva Bad Bot Report

Erez Hasson

May 10, 2023 3 min read

Application Security
Imperva Continues to Innovate With New Features for Online Fraud Prevention

Erez Hasson

May 1, 2023 5 min read

Application Security
Imperva Unveils Latest API Security Enhancements

Lebin Cheng

Apr 25, 2023 3 min read

Application Security
Imperva and Kong Partner to Bring API Security to the Gateway for Enhanced
API[…]

Lebin Cheng

Apr 19, 2023 3 min read




LATEST ARTICLES

App Security
...
 * Essentials
 * Protocols

OSI Model

922.7k Views

App Security
...
 * Essentials

Penetration Testing

573.2k Views

Network Security
...
 * DDoS
 * Essentials

DDoS Attacks

381k Views

App Security
...
 * Essentials
 * Threats

Buffer Overflow Attack

217.1k Views

Network Security
...
 * DDoS
 * Essentials

Distributed Denial of Service (DDoS)

213.7k Views

App Security
...
 * Attack Tools
 * Essentials
 * Threats

Bots

157k Views

Network Security
...
 * Connection Optimization
 * Essentials

Sticky Session

153.4k Views

Data Security
...
 * Essentials

Data Loss Prevention (DLP)

143.6k Views


+1 866 926 4678
Partners
 * Imperva Partner Ecosystem
 * Channel Partners
 * Technology Alliances
 * Find a Partner
 * Partner Portal Login

Resources
 * Imperva Blog
 * Resource Library
 * Case Studies
 * Learning Center

About Us
 * Why Imperva
 * Who We Are
 * Events
 * Careers
 * Press & Awards
 * Contact Information

Network
 * Network Map
 * System Status

Support
 * Emergency DDoS Protection
 * Support Portal
 * Imperva Community
 * Documentation Portal
 * API Integration
 * Trust Center

Cookies Settings Trust Center Modern Slavery Statement Privacy Legal

English
EnglishDeutschEspañolFrançaisPortuguês日本語中文
+1 866 926 4678
English
EnglishDeutschEspañolFrançaisPortuguês日本語中文
 * 
 * 
 * 
 * 
 * 
 * 
 * 

Cookies Settings Trust Center Modern Slavery Statement Privacy Legal

Copyright © 2023 Imperva. All rights reserved

×


THE 10TH ANNUAL BAD BOT REPORT

The evolution of malicious automation over the last decade

Download Now
×


PREVOTY IS NOW PART OF THE IMPERVA RUNTIME PROTECTION

 * Protection against zero-day attacks

 * No tuning, highly-accurate out-of-the-box

 * Effective against OWASP top 10 vulnerabilities

Learn more here
× Want to see Imperva in action? Fill out the form and our experts will be in
touch shortly to book your personal demo.



THANK YOU!



An Imperva security specialist will contact you shortly.

×
“Imperva prevented 10,000 attacks in the first 4 hours of Black Friday weekend
with no latency to our online customers.”

Top 3 US Retailer

Imperva uses cookies to improve your experience, deliver personalized content
and analyze our traffic. You may modify your cookies settings at any time, as
explained in our Cookie Notice

Cookies Settings Reject All Accept All