Abstract
Online gaming generated $178 billion globally in 2020, with the popular shooter, action-adventure, role-playing, and sporting titles commanding hundreds of millions of players worldwide. Most online games require only a few hundred kbps of bandwidth, but are very sensitive to latency. Internet Service Providers (ISPs) keen to reduce “lag” by tuning their peering relationships and routing paths to game servers are hamstrung by lack of visibility on: (a) gaming patterns, which can change day-to-day as games rise and fall in popularity; and (b) locations of gaming servers, which can change from hour-to-hour across countries and cloud providers depending on player locations and matchmaking. In this paper, we develop methods that give ISPs visibility into online gaming activity and associated server latency. As our first contribution, we analyze packet traces of ten popular games and develop a method to automatically generate signatures and accurately detect game sessions by extracting key attributes from network traffic. Field deployment in a university campus identifies 31 k game sessions representing 9,000 gaming hours over a month. As our second contribution, we perform BGP route and Geolocation lookups, coupled with active ICMP and TCP latency measurements, to map the AS-path and latency to the 4,500+ game servers identified. We show that the game servers span 31 Autonomous Systems, distributed across 14 countries and 165 routing prefixes, and routing decisions can significantly impact latencies for gamers in the same city. Our study gives ISPs much-needed visibility so they can optimize their peering relationships and routing paths to better serve their gaming customers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Dataset available on request from the corresponding author.
- 2.
Ethics clearance (HC16712) obtained from UNSW Human Research Ethics Advisory Panel
- 3.
- 4.
“\(d\_0\_len\)”: first letter denotes the direction (“d” for downstream and “u” for upstream), second letter (“0”) denotes the packet index, and third letter (“len”) denotes the packet size.
- 5.
“\(u\_0\_b\_9\)”: the letters “u” and “0” are same as above while third letter (“b”) denotes byte, and fourth letter (“9”) denotes the byte index.
References
Exitlag (October 2021). https://www.exitlag.com/en/
Global Games Market to Generate \$175.8 Billion in 2021 (2021). https://newzoo.com/insights/articles/global-games-market-to-generate-175-8-billion-in-2021-despite-a-slight-decline-the-market-is-on-track-to-surpass-200-billion-in-2023/
Here’s how many people play Fortnite (2021). https://www.gamesradar.com/au/how-many-people-play-fortnite/
Oneqode: The gaming infrastructure company (October 2021). https://www.oneqode.com/
Subspace: Dedicated network for real-time applications (October 2021). https://subspace.com/
Wtfast (October 2021). https://www.wtfast.com/en/
Beigbeder, T., Coughlan, R., Lusher, C., Plunkett, J., Agu, E., Claypool, M.: The effects of loss and latency on user performance in unreal tournament 2003. In: Proceedings of the ACM SIGCOMM NetGames, pp. 144–151. Portland, Oregon, US (2004)
Bredel, M., Fidler, M.: A measurement study regarding quality of service and its impact on multiplayer online games. In: Proceedings of the IEEE NETGAMES Workshop, pp. 1–6. IEEE, Taipei, Taiwan (2010)
Claypool, M., Claypool, K.: Latency can kill: precision and deadline in online games. In: Proceedings of the ACM MMSys, pp. 215–222. Phoenix, Arizona, USA (February 2010)
Dick, M., Wellnitz, O., Wolf, L.: Analysis of factors affecting players’ performance and perception in multiplayer games. In: Proceedings of the ACM SIGCOMM NetGames, pp. 1–7. Hawthorne, NY, USA (2005)
Dowling, B.: The trusted source for ip address data (2021). https://ipinfo.io/
Habibi Gharakheili, H., Lyu, M., Wang, Y., Kumar, H., Sivaraman, V.: iTeleScope: softwarized network middle-box for real-time video telemetry and classification. IEEE Trans. Netw. Serv. Manag. 16(3), 1071–1085 (2019)
Hubballi, N., Swarnkar, M.: BitCoding: network traffic classification through encoded bit level signatures. IEEE/ACM Trans. Netw. 26(5), 2334–2346 (2018)
Intel: Data plane development kit (dpdk) (2021). https://www.dpdk.org/
Jiang, C., Kundu, A., Liu, S., Salay, R., Xu, X., Claypool, M.: A survey of player opinions of network latency in online games (2020). https://ftp.cs.wpi.edu/pub/techreports/pdf/20-02.pdf
Kaur, S., Singh, M.: Automatic attack signature generation systems: a review. IEEE Secur. Priv. 11(6), 54–61 (2013)
Quwaider, M., Alabed, A., Duwairi, R.: The impact of video games on the players behaviors: a survey. In: Proceedings of the 10th International Conference ANT, vol. 151, pp. 575–582 (2019)
Sanfilippo, S.: Active network security tool (2021). http://www.hping.org/
Schweikert, D.: fping homepage. https://fping.org/
Spjut, J., et al.: Latency of 30 Ms benefits first person targeting tasks more than refresh rate above 60 Hz. In: Proceedings of the ACM SIGGRAPH Asia 2019 Technical Briefs, pp. 110–113. Brisbane, QLD, Australia (2019)
Trimananda, R., Varmarken, J., Markopoulou, A., Demsky, B.: Packet-level signatures for smart home devices. In: Proceedings of the NDSS. San Diego, California (2020)
Wang, Y., Xiang, Y., Zhou, W., Yu, S.: Generating regular expression signatures for network traffic classification in trusted network management. J. Netw. Comput. Appl. 35(3), 992–1000 (2012)
Acknowledgements
We thank our reviewers and specifically our shephard, Anubhavnidhi Abhashkumar, for providing valuable feedback to improve our paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Fortnite Services
B Fortnite Game Signature Generation
As shown in Fig. 8 above, each row corresponds to attributes extracted from the first few packets of Fortnite gaming flows from our dataset. The attributes include protocol, transport layer port numbers, packet sizes and payload bytes. In one flow (identified by the standard five-tuple), protocol and server port remain the same but the packet sizes and content vary as more packets arrive. For this illustration, the table shows 5 packet sizes in each direction and (stripped) payload content of the first packet.
Some attribute values (shown in red) are fixed/constant across all the flows (called static signatures) and other (shown in green) fall within a close range of values (called dynamic signatures). These signatures are same across the flows implying that they can detect a Fortnite game session. Using the static and dynamic signatures, a signature JSON is built as shown in the next section which is then used as an input to the game classifier algorithmic model.
C Example Game Signatures
Figure 9 shows example signatures generated from our dataset. We can see that while all attributes have a key and a value, only ports has a range since it is a dynamic signature. We note that the complexity of signatures varies: some are primarily based on packet size (Rocket League) while others require payload bytes too (Fortnite and Call of Duty MW); some are based on attributes of first two packets (Fortnite and Rocket League) while others require more data (Call of Duty MW). These signatures need to be combined to predict the actual game being played as they may have some common attributes for e.g., both Fortnite and Call of Duty MW have the first upload packet length as 29 and thus require further inspection to classify the game. The classifier model takes into account all attributes and looks at the minimum number of packets to rapidly detect the game.
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Madanapalli, S.C., Gharakheili, H.H., Sivaraman, V. (2022). Know Thy Lag: In-Network Game Detection and Latency Measurement. In: Hohlfeld, O., Moura, G., Pelsser, C. (eds) Passive and Active Measurement. PAM 2022. Lecture Notes in Computer Science, vol 13210. Springer, Cham. https://doi.org/10.1007/978-3-030-98785-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-98785-5_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-98784-8
Online ISBN: 978-3-030-98785-5
eBook Packages: Computer ScienceComputer Science (R0)