requirement of RAM stems from the individual im-
age file size including all RGB channels and the sheer
amount of images we used to train the model.
Lastly, with the goal of further improving our cur-
rent system, we also experimented with the Resnet18
architecture. We trained a new model using the ex-
act same parameters as we did with the Resnet50 ar-
chitecture and evaluated it with the SKLearn Met-
rics module. Our preliminary results suggest that the
model is able to achieve an accuracy of 100%, with
an average precision, recall and F1-score of 100%
across all classes, showing a lot of promise for future
implementations. Since Resnet18 is a significantly
lighter architecture than Resnet50, we will focus on
this model in our future work.
REFERENCES
Aboufadel, E., Olsen, J., and Windle, J. (2005). Break-
ing the holiday inn priority club captcha. The College
Mathematics Journal, 36(2):101–108.
Alqahtani, F. H. and Alsulaiman, F. A. (2020). Is image-
based captcha secure against attacks based on machine
learning? an experimental study. Computers & Secu-
rity, 88:101635.
Baecher, P., Fischlin, M. G. L., Langenberg, R., L
¨
utzow,
M., and Schr
¨
oder, D. (2010). Captchas: The good, the
bad, and the ugly. Sicherheit 2010. Sicherheit, Schutz
und Zuverl
¨
assigkeit.
Bock, K., Patel, D., Hughey, G., and Levin, D. (2017). un-
captcha: a low-resource defeat of recaptcha’s audio
challenge. In 11th {USENIX} Workshop on Offensive
Technologies ({WOOT} 17).
Brodi
´
c, D., Petrovska, S., Jevti
´
c, M., and Milivojevi
´
c, Z. N.
(2016). The influence of the captcha types to its solv-
ing times. In 2016 39th International Convention
on Information and Communication Technology, Elec-
tronics and Microelectronics (MIPRO), pages 1274–
1277.
Bursztein, E. and Bethard, S. (2009). Decaptcha: breaking
75% of ebay audio captchas. In Proceedings of the 3rd
USENIX conference on Offensive technologies, vol-
ume 1, page 8. USENIX Association.
Bursztein, E., Martin, M., and Mitchell, J. (2011). Text-
based captcha strengths and weaknesses. In Proceed-
ings of the 18th ACM conference on Computer and
communications security, pages 125–138.
Chellapilla, K., Larson, K., Simard, P. Y., and Czerwin-
ski, M. (2005). Building segmentation based human-
friendly human interaction proofs (hips). In Interna-
tional Workshop on Human Interactive Proofs, pages
1–26. Springer.
Csuka, K. and Gaastra, D. (2018). Breaking captchas on the
dark web.
Georgoulias, D., Pedersen, J. M., Falch, M., and Vasilo-
manolakis, E. (2021). A qualitative mapping of dark-
web marketplaces. In Symposium on Electronic Crime
Research (eCrime). IEEE.
Guerar, M., Verderame, L., Migliardi, M., Palmieri, F., and
Merlo, A. (2021). Gotta captcha ’em all: A survey
of twenty years of the human-or-computer dilemma.
2021-10-06.
Hossen, M. I. and Hei, X. (2021). A low-cost attack against
the hcaptcha system.
Kingma, D. P. and Ba, J. (2014). Adam: A method for
stochastic optimization. arXiv preprint: 1412.6980.
Martin, J. and Christin, N. (2016). Ethics in cryptomar-
ket research. International Journal of Drug Policy,
35:84–91.
Mittal, S., Kaushik, P., Hashmi, S., and Kumar, K. (2018).
Robust real time breaking of image captchas us-
ing inception v3 model. In 2018 Eleventh Inter-
national Conference on Contemporary Computing
(IC3), pages 1–5.
Noury, Z. and Rezaei, M. (2020). Deep-captcha: a deep
learning based CAPTCHA solver for vulnerability as-
sessment. CoRR, abs/2006.08296.
Shet, V. (2014). Are you a robot? introducing ”no captcha
recaptcha”. https://security.googleblog.com/2014/12/
are-you-robot-introducing-no-captcha.html.
Sivakorn, S., Polakis, J., and Keromytis, A. D. (2016). I’m
not a human : Breaking the google recaptcha.
Smith, R. (2007). An overview of the tesseract ocr engine.
In Ninth International Conference on Document Anal-
ysis and Recognition (ICDAR 2007), volume 2, pages
629–633.
Soska, K. and Christin, N. (2015). Measuring the lon-
gitudinal evolution of the online anonymous market-
place ecosystem. In 24th USENIX security symposium
(USENIX security 15), pages 33–48.
Tang, M., Gao, H., Zhang, Y., Liu, Y., Zhang, P., and
Wang, P. (2018). Research on deep learning tech-
niques in breaking text-based captchas and designing
image-based captcha. IEEE Transactions on Informa-
tion Forensics and Security, 13(10):2522–2537.
Weng, H., Zhao, B., Ji, S., Chen, J., Wang, T., He, Q.,
and Beyah, R. (2019). Towards understanding the
security of modern image captchas and underground
captcha-solving services. Big Data Mining and Ana-
lytics, 2(2):118–144.
Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb
365