Skip to main content

Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games

  • Conference paper
Network and System Security (NSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Included in the following conference series:

  • 1285 Accesses

Abstract

The rapidly growing popularity of Massively Multiplayer Online Games (MMOGs) has given rise to an increase in the number of players world wide. MMOGs enable many players interact together through a shared sense of presence created by the game. The Peer-to-Peer (P2P) network topology overcomes communication bottleneck problems associated with centralized client/server systems. However, many architectures are proposed in an ad hoc manner and enhancing the security of such systems is an elusive research problem. In this paper, we address this important issue by making the following contributions. Firstly, we formalize the notion of P2P-based MMOGs and demonstrate that existing P2P-based MMOG architectures can be unified using our model. To our knowledge, this is the first time that this has been done in the literature. Secondly, we use our model to develop a real-time cheating detection mechanism to identify cheating players, which can be used to expose several MMOG cheating strategies. Finally, we propose a new reputation based system for P2P-based MMOGs to enhance the cheating detection process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chang Feng, W. (ed.): Proceedings of the 3rd Workshop on Network and System Support for Games, NETGAMES 2004, Portland, Oregon, USA, 2004, August 30. ACM (2004)

    Google Scholar 

  2. Curtis, N., Safavi-Naini, R., Susilo, W.: X2Rep: Enhanced Trust Semantics for the XRep Protocol. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 205–219. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Fan, L., Taylor, H., Trinder, P.: Mediator: A design framework for p2p mmogs. In: Netgames 2007 (2007)

    Google Scholar 

  4. Fan, L., Trinder, P., Taylor, H.: Design issues for peer-to-peer massively multiplayer online games (2009)

    Google Scholar 

  5. GauthierDickey, C., Lo, V.M., Zappala, D.: Using n-trees for scalable event ordering in peer-to-peer games. In: Chi Feng, W., Mayer-Patel, K. (eds.) NOSSDAV, pp. 87–92. ACM (2005)

    Google Scholar 

  6. GauthierDickey, C., Zappala, D., Lo, V.M.: A fully distributed architecture for massively multiplayer online games. In: Chang Feng [1], p. 171

    Google Scholar 

  7. Hampel, T., Bopp, T., Hinn, R.: A peer-to-peer architecture for massive multiplayer online games. In: Netgames 2006 (2006)

    Google Scholar 

  8. Harwood, A., Kulkani, S.: Delay sensitive identity protection in peer-to-peer online gaming environments. In: Proceedings of the 13th International Conference on Parallel and Distributed Systems, vol. 2, pp. 1–6. IEEE Computer Society, Washington, DC, USA (2007)

    Google Scholar 

  9. Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1:1–1:31 (2009)

    Article  Google Scholar 

  10. Hu, S.-Y., Chang, S.-C., Jiang, J.-R.: Voronoi state management for peer-to-peer massively multiplayer online games. In: New Interfaces for Musical Expression (2008)

    Google Scholar 

  11. Hu, S.Y., Liao, G.M.: Scalable peer-to-peer networked virtual environment. In: Network and System Support for Games, pp. 129–133 (2004)

    Google Scholar 

  12. Huang, G.-Y., Hu, S.-Y., Jiang, J.-R.: Scalable reputation management for p2p mmogs. In: Proceedings First International Workshop on Massively Multiuser Virtual Environments, pp. 4–8 (2008)

    Google Scholar 

  13. Iimura, T., Hazeyama, H., Kadobayashi, Y.: Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games. In: Chang Feng [1], pp. 116–120

    Google Scholar 

  14. Kabus, P., Buchmann, A.P.: Design of a cheat-resistant p2p online gaming system. In: Proc. of the 2nd Intl Conf. on Digital Interactive Media in Entertainment and Arts, DIMEA 2007, pp. 113–120 (2007)

    Google Scholar 

  15. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW, pp. 640–651 (2003)

    Google Scholar 

  16. Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-peer support for massively multiplayer games. In: Infocom (2004)

    Google Scholar 

  17. Krause, S.: A case for mutual notification: A survey of p2p protocols for massively multiplayer online games. In: Netgames 2008 (2008)

    Google Scholar 

  18. Laurens, P., Paige, R.F., Brooke, P., Chivers, H.: A novel approach to the detection of cheating in multiplayer online games. In: 12th IEEE International Conference on Engineering Complex Computer Systems 2007, pp. 97–106 (July 2007)

    Google Scholar 

  19. Merabti, M., Rhalibi, A.E.: Peer-to-peer architecture and protocol for a massively multiplayer online game. In: Globecom 2004 Workshops (2004)

    Google Scholar 

  20. Macedonia, M.R., Zyda, M.J., Pratt, D.R., Brutzman, D.P., Barham, P.T.: Exploiting reality with multicast groups. IEEE Computer Graphics and Applications 15, 38–45 (1995)

    Article  Google Scholar 

  21. Shi, X., Liu, F., Du, L., Chen, X., Xing, Y.: A cheating detection mechanism based on fuzzy reputation management of p2p mmogs

    Google Scholar 

  22. Vik, K.-H.: Game state and event distribution using proxy technology and application layer multicast. In: Zhang, H., Chua, T.-S., Steinmetz, R., Kankanhalli, M.S., Wilcox, L. (eds.) ACM Multimedia, pp. 1041–1042. ACM (2005)

    Google Scholar 

  23. Walsh, K., Sirer, E.G.: Fighting peer-to-peer spam and decoys with object reputation. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-peer Systems, P2PECON 2005, pp. 138–143 (2005)

    Google Scholar 

  24. Yamamoto, S., Murata, Y., Yasumoto, K., Ito, M.: A distributed event delivery method with load balancing for mmorpg. In: NETGAMES, pp. 1–8. ACM (2005)

    Google Scholar 

  25. Yan, J., Randell, B.: A systematic classification of cheating in online games. In: Proceedings of 4th ACM SIGCOMM Workshop on Network and System Support for Games, NetGames 2005, pp. 1–9. ACM, New York (2005)

    Chapter  Google Scholar 

  26. Yu, L., Susilo, W., Safavi-Naini, R.: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 364–380. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Susilo, W., Chow, YW., Wiangsripanawan, R. (2012). Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics