{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T05:36:16Z","timestamp":1773207376716,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["833673,830943,778229"],"award-info":[{"award-number":["833673,830943,778229"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3538994","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Web Bot Detection Evasion Using Deep Reinforcement Learning"],"prefix":"10.1145","author":[{"given":"Christos","family":"Iliou","sequence":"first","affiliation":[{"name":"Information Technologies Institute, CERTH, Greece and BU-CERT, Bournemouth University, United Kingdom"}]},{"given":"Theodoros","family":"Kostoulas","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Systems Engineering, University of the Aegean, Greece"}]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH, Greece"}]},{"given":"Vasilios","family":"Katos","sequence":"additional","affiliation":[{"name":"BU-CERT, Bournemouth University, United Kingdom"}]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH, Greece"}]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, CERTH, Greece"}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alejandro Acien Aythami Morales Julian Fi\u00e9rrez Rub\u00e9n Vera-Rodr\u00edguez and Oscar Delgado-Mohatar. 2020. BeCAPTCHA: Bot Detection in Smartphone Interaction using Touchscreen Biometrics and Mobile Sensors. CoRR abs\/2005.13655(2020). arxiv:2005.13655https:\/\/arxiv.org\/abs\/2005.13655"},{"key":"e_1_3_2_1_2_1","unstructured":"Akamai. 2021. Akamai\u2019s Bot Manager - Advanced strategies to flexibly manage the long-term business and IT impact of bots. https:\/\/www.akamai.com\/us\/en\/multimedia\/documents\/product-brief\/bot-manager-product-brief.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"Ismail Akrout Amal Feriani and Mohamed Akrout. 2019. Hacking Google reCAPTCHA v3 using Reinforcement Learning. CoRR abs\/1903.01003(2019). arxiv:1903.01003http:\/\/arxiv.org\/abs\/1903.01003"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2014.6900644"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2467696.2467722"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52683-2_7"},{"key":"e_1_3_2_1_7_1","volume-title":"Audio Challenge. In 11th USENIX Workshop on Offensive Technologies, WOOT 2017","author":"Bock Kevin","year":"2017","unstructured":"Kevin Bock, Daven Patel, George Hughey, and Dave Levin. 2017. unCaptcha: A Low-Resource Defeat of reCaptcha\u2019s Audio Challenge. In 11th USENIX Workshop on Offensive Technologies, WOOT 2017, Vancouver, BC, Canada, August 14-15, 2017. USENIX Association. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/bock"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00055"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1155\/2017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04834-1_21"},{"key":"e_1_3_2_1_12_1","unstructured":"Cloudflare. 2021. Cloudflare Bot Management. https:\/\/www.cloudflare.com\/en-gb\/products\/bot-management\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22741"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2476-4"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447815"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527915"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339267"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 1st International Workshop on Cyber Deviance Detection co-located with the Tenth International Conference on Web Search and Data Mining (CyberDD @ WSDM 2017","author":"Iliou Christos","year":"2017","unstructured":"Christos Iliou, Theodora Tsikrika, Stefanos Vrochidis, and Yiannis Kompatsiaris. 2017. Evasive Focused Crawling by Exploiting Human Browsing Behaviour: a Study on Terrorism-Related Content. In Proceedings of the 1st International Workshop on Cyber Deviance Detection co-located with the Tenth International Conference on Web Search and Data Mining (CyberDD @ WSDM 2017), Cambridge, UK, February, 10, 2017."},{"key":"e_1_3_2_1_19_1","unstructured":"Imperva. 2021. Bad Bot Report 2021: The Pandemic of the Internet. https:\/\/www.imperva.com\/blog\/bad-bot-report-2021-the-pandemic-of-the-internet\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Imperva. 2021. Data User Behavior Analytics. https:\/\/www.imperva.com\/products\/data-user-behavior-analytics\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01754-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386040"},{"key":"e_1_3_2_1_23_1","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Alex Graves Ioannis Antonoglou Daan Wierstra and Martin\u00a0A. Riedmiller. 2013. Playing Atari with Deep Reinforcement Learning. CoRR abs\/1312.5602(2013). arXiv:1312.5602http:\/\/arxiv.org\/abs\/1312.5602"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95095-2_19"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102577"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.53"},{"key":"e_1_3_2_1_27_1","volume-title":"JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Schwarz Michael","year":"2019","unstructured":"Michael Schwarz, Florian Lackner, and Daniel Gruss. 2019. JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"David Silver Aja Huang Chris\u00a0J. Maddison Arthur Guez Laurent Sifre George van\u00a0den Driessche Julian Schrittwieser Ioannis Antonoglou Vedavyas Panneershelvam Marc Lanctot Sander Dieleman Dominik Grewe John Nham Nal Kalchbrenner Ilya Sutskever Timothy\u00a0P. Lillicrap Madeleine Leach Koray Kavukcuoglu Thore Graepel and Demis Hassabis. 2016. Mastering the game of Go with deep neural networks and tree search. Nat. 529 7587 (2016) 484\u2013489. https:\/\/doi.org\/10.1038\/nature16961","DOI":"10.1038\/nature16961"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.4236\/jdaip.2015.31001"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.37"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.01.210"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.08.028"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2015.7175961"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2020.23010"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31456-9_43"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCKE.2014.6993362"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.06.004"}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3538994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3538994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:40Z","timestamp":1750183780000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3538994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":38,"alternative-id":["10.1145\/3538969.3538994","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3538994","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}