Abstract
Security in online gaming is a growing target for hackers due to the amount of money involved in online gaming. Components are used in the security measures implemented for these games, but no single security component is 100% effective. Our research aims to investigate methods of game security and the components used in them, as well as the hacks used to exploit and circumvent online gaming security mechanisms. As a result, our study arrives to some interesting points, and outlines a number of recommendations and potential research directions. This, in turn, can pave the way for facilitating and empowering future research in this domain to assist game engineers and testers in security management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ESA. (2017). Two-Thirds of American Households Regularly Play Video Games. Retrieved from http://www.theesa.com/article/two-thirds-american-households-regularly-play-video-games/
Kiwia, D., Dehghantanha, A., Choo, K.-K. R., & Slaughter, J. (2017). A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. Journal of Computational Science. https://doi.org/10.1016/j.jocs.2017.10.020
Maguluri, N. S. N. (2017). Multi-Class Classification of Textual Data: Detection and Mitigation of Cheating in Massively Multiplayer Online Role Playing Games. (Thesis), Wright State University, Browse all Theses and Dissertations.
Summeren, R. v. (2011). Security in Online Gaming. (Thesis), Radboud University Nijmegen.
Chang, H., Park, J. H., & Kang, H. (2008). The Security System Design in Online Game for u Entertainment. Paper presented at the 22nd International Conference on Advanced Information Networking and Applications
Xiang Zuo, Gandy, C., Skvoretz, J., & Iamnitchi, A. (2016). Bad Apples Spoil the Fun: Quantifying Cheating in Online Gaming. Paper presented at the Tenth International AAAI Conference on Web and Social Media
Liu, D., Gao, X., Zhang, M., Wang, H., & Stavrou, A. (2017). Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. Paper presented at the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
Mohr, S., & Rahman, S. S. (2011). IT Security Issues Within The Video Game Industry. International Journal of Computer Science & Information Technology, 3(5).
Seybold, P. (2011). Press Release: Some PlayStation Network and Qriocity Services to be Available This Week. Retrieved from https://blog.us.playstation.com/2011/04/30/press-release-some-playstation-network-and-qriocity-services-to-be-available-this-week/
Kyodo. (2013). Customer data exposed in huge breach of Nintendo member website. Retrieved from https://www.japantimes.co.jp/news/2013/07/06/business/corporate-business/japan-customer-data-exposed-in-massive-breach-of-nintendo-member-website/
Steinman, G. (2013). Security update for all Ubisoft account holders. Retrieved from http://blog.ubi.com/en-GB/security-update-for-all-ubisoft-account-holders/
Kiss, J. (2014). Xbox live and Playstation attack: Christmas ruined for millions of gamers. Retrieved from https://www.theguardian.com/technology/2014/dec/26/xbox-live-and-psn-attack-christmas-ruined-for-millions-of-gamers
Hurlock-Jones, I. (2015). Multi-state Notification Letter. Retrieved from https://oag.ca.gov/system/files/BFG%20-%20MULTI-STATE%20NOTIFICATION%20LETTER_Proof_1.pdf
Paganini, P. (2016). Attacking Gaming Systems: A Dangerous Trend. Retrieved from http://resources.infosecinstitute.com/attacking-gaming-systems-a-dangerous-trend/
IBM. (2014). The basic elements of a cryptographic system. Retrieved from https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1.csfb500/csfb5za206.htm
Gorder, P. F. (2004). Balancing video-game piracy issues. IEEE Security & Privacy, 2(1), 17.
Mendez, J. (2017). How Steam Employs DRM & What That Means For Your Game. Retrieved from https://blackshellmedia.com/2017/06/28/steam-employs-drm-means-game/
STEAM. (2017). Account Security Recommendations. Retrieved from https://support.steampowered.com/kb_article.php?ref=1266-OAFV-8478
Baignères, T., Finiasz, M., & Lepoint, T. (2013). White-Box Cryptography Retrieved from https://www.cryptoexperts.com/technologies/white-box/
Ghosh, A. K., & McGraw, G. (1998). An Approach for Certifying Security in Software Components. Paper presented at the 21st National Information Systems Security Conference.
Arif, F. (2014). Denuvo: SSD Rumors are Wrong – No System is Infallible, Striving to Beat Pirates By Being One Step Ahead. Retrieved from https://wccftech.com/denuvo-ssd-rumors-wrong-system-infallible-striving-beat-pirates-step/
Crnkovic, I. (2003). Component-based software engineering - new challenges in software development. Paper presented at the 25th International Conference on Information Technology Interfaces, 2003. ITI 2003.
Vitharana, P. (2003). Risks and challenges of component-based software development. Communications of the ACM, 46(8), 67-72.
Parizi, R. M., Ghani, A. A. A., Lee, S. P., & Khan, S. U. R. (2017). RAMBUTANS: automatic AOP-specific test generation tool. International Journal on Software Tools for Technology Transfer, 19(6), 743-761.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Parizi, R.M., Dehghantanha, A., Choo, KK.R., Hammoudeh, M., Epiphaniou, G. (2019). Security in Online Games: Current Implementations and Challenges. In: Dehghantanha, A., Choo, KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-030-10543-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-10542-6
Online ISBN: 978-3-030-10543-3
eBook Packages: Computer ScienceComputer Science (R0)