DC ElementWertSprache
dc.contributor.advisorFischer, Mathias-
dc.contributor.advisorEgelman, Serge-
dc.contributor.authorSee, Richard August-
dc.date.accessioned2025-07-24T12:31:46Z-
dc.date.available2025-07-24T12:31:46Z-
dc.date.issued2025-03-25-
dc.identifier.urihttps://ediss.sub.uni-hamburg.de/handle/ediss/11820-
dc.description.abstractInternet services increasingly suffer from unwanted automation through bots, which pose significant challenges including financial losses, security breaches, and diminished user trust. The ability of bots to convincingly emulate human interactions complicates detection efforts, particularly as advancements in machine learning enable increasingly sophisticated automated agents. Bots are used to carry out a wide range of attacks, including credential stuffing, web scraping, and distributed denial-of-service attacks. Traditional countermeasures, such as CAPTCHAs, have become increasingly ineffective due to advances in artificial intelligence, highlighting the need for alternative detection approaches. This cumulative dissertation addresses key challenges in bot detection, analysis, and prevention, with the goal of mitigating bot-related risks through novel, non-intrusive, and scalable solutions. For bot detection, approaches are introduced that leverage the interaction behaviors of humans with web-based services, such as mouse movements, typing patterns, and website navigation. Unlike traditional methods that rely on static identifiers (e.g., IP addresses) or explicit user challenges (e.g., CAPTCHAs), these methods passively distinguish humans from bots by analyzing user interaction patterns using machine learning based detection models trained on behavioral data. Evaluations of synthetic and human behavior demonstrate the effectiveness of these approaches. Effective bot defense also requires the analysis of bot software to uncover operational strategies and vulnerabilities. A method is presented to accelerate the reverse engineering of closed-source applications, a critical yet resource-intensive task. Specifically, dynamic binary instrumentation is employed to systematically identify and prioritize critical code segments (Points-of-Interest) related to sensitive data, as specified by the analyst (Items-of-Interest). Empirical validation on complex malware, including ransomware and peer to peer botnets, demonstrates substantial efficiency improvements and reliable identification of key functionalities. To address the scalability challenge posed by automated bots, a preventive strategy is proposed that targets API-based automation. Existing obfuscation techniques primarily hinder the initial creation of bots but fail to prevent subsequent large-scale deployments. The proposed method obfuscates client-server communication protocols by assigning distinct protocols to each client. Consequently, attackers are required to reverse engineer each instance individually, significantly increasing the cost and complexity of large-scale bot operations without disrupting legitimate user interactions. This thesis presents methods to enhance bot defenses across detection, analysis, and prevention. While it advances all three areas, challenges remain. As defenses improve, a shift toward UI-based bots that circumvent APIs is expected. Moreover, ongoing progress in AI will further blur the distinction between human users and automated agents, undermining current detection techniques. A promising direction lies in strong, yet privacy-preserving authentication mechanisms that robustly bind virtual identities to human identities.en
dc.language.isoende_DE
dc.publisherStaats- und Universitätsbibliothek Hamburg Carl von Ossietzkyde
dc.relation.haspartdoi:10.1007/978-3-031-56326-3_6de_DE
dc.relation.haspartdoi:10.1145/3627106.3627139de_DE
dc.relation.haspartdoi:10.1007/978-3-031-65175-5_30de_DE
dc.relation.haspartdoi:10.1145/3678890.3678918de_DE
dc.relation.haspartdoi:10.1007/978-3-031-82362-6_4de_DE
dc.relation.haspartdoi:10.1007/978-3-031-17143-7_6de_DE
dc.rightshttp://purl.org/coar/access_right/c_abf2de_DE
dc.subjectObfuscationen
dc.subjectWeb Botsen
dc.subject.ddc004: Informatikde_DE
dc.titleEmerging Threats to Online Security: Securing Systems Against Unauthorized Automation and Web Botsen
dc.typedoctoralThesisen
dcterms.dateAccepted2025-06-02-
dc.rights.cchttps://creativecommons.org/licenses/by/4.0/de_DE
dc.rights.rshttp://rightsstatements.org/vocab/InC/1.0/-
dc.subject.bcl54.38: Computersicherheitde_DE
dc.subject.gndSocial Botsde_DE
dc.subject.gndComputersicherheitde_DE
dc.subject.gndMalwarede_DE
dc.subject.gndTippverhaltende_DE
dc.subject.gndReverse Engineeringde_DE
dc.type.casraiDissertation-
dc.type.dinidoctoralThesis-
dc.type.driverdoctoralThesis-
dc.type.statusinfo:eu-repo/semantics/publishedVersionde_DE
dc.type.thesisdoctoralThesisde_DE
tuhh.type.opusDissertation-
thesis.grantor.departmentInformatikde_DE
thesis.grantor.placeHamburg-
thesis.grantor.universityOrInstitutionUniversität Hamburgde_DE
dcterms.DCMITypeText-
dc.identifier.urnurn:nbn:de:gbv:18-ediss-130048-
item.languageiso639-1other-
item.advisorGNDFischer, Mathias-
item.advisorGNDEgelman, Serge-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.creatorGNDSee, Richard August-
item.creatorOrcidSee, Richard August-
Enthalten in den Sammlungen:Elektronische Dissertationen und Habilitationen
Dateien zu dieser Ressource:
Datei Prüfsumme GrößeFormat  
see_diss_published.pdfbba178a9f8928a562c45481ac3c3531e3.34 MBAdobe PDFÖffnen/Anzeigen
Zur Kurzanzeige

Info

Seitenansichten

Letzte Woche
Letzten Monat
geprüft am null

Download(s)

Letzte Woche
Letzten Monat
geprüft am null
Werkzeuge

Google ScholarTM

Prüfe