Abstract
The rapidly growing popularity of Massively Multiplayer Online Games (MMOGs) has given rise to an increase in the number of players world wide. MMOGs enable many players interact together through a shared sense of presence created by the game. The Peer-to-Peer (P2P) network topology overcomes communication bottleneck problems associated with centralized client/server systems. However, many architectures are proposed in an ad hoc manner and enhancing the security of such systems is an elusive research problem. In this paper, we address this important issue by making the following contributions. Firstly, we formalize the notion of P2P-based MMOGs and demonstrate that existing P2P-based MMOG architectures can be unified using our model. To our knowledge, this is the first time that this has been done in the literature. Secondly, we use our model to develop a real-time cheating detection mechanism to identify cheating players, which can be used to expose several MMOG cheating strategies. Finally, we propose a new reputation based system for P2P-based MMOGs to enhance the cheating detection process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chang Feng, W. (ed.): Proceedings of the 3rd Workshop on Network and System Support for Games, NETGAMES 2004, Portland, Oregon, USA, 2004, August 30. ACM (2004)
Curtis, N., Safavi-Naini, R., Susilo, W.: X2Rep: Enhanced Trust Semantics for the XRep Protocol. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 205–219. Springer, Heidelberg (2004)
Fan, L., Taylor, H., Trinder, P.: Mediator: A design framework for p2p mmogs. In: Netgames 2007 (2007)
Fan, L., Trinder, P., Taylor, H.: Design issues for peer-to-peer massively multiplayer online games (2009)
GauthierDickey, C., Lo, V.M., Zappala, D.: Using n-trees for scalable event ordering in peer-to-peer games. In: Chi Feng, W., Mayer-Patel, K. (eds.) NOSSDAV, pp. 87–92. ACM (2005)
GauthierDickey, C., Zappala, D., Lo, V.M.: A fully distributed architecture for massively multiplayer online games. In: Chang Feng [1], p. 171
Hampel, T., Bopp, T., Hinn, R.: A peer-to-peer architecture for massive multiplayer online games. In: Netgames 2006 (2006)
Harwood, A., Kulkani, S.: Delay sensitive identity protection in peer-to-peer online gaming environments. In: Proceedings of the 13th International Conference on Parallel and Distributed Systems, vol. 2, pp. 1–6. IEEE Computer Society, Washington, DC, USA (2007)
Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1:1–1:31 (2009)
Hu, S.-Y., Chang, S.-C., Jiang, J.-R.: Voronoi state management for peer-to-peer massively multiplayer online games. In: New Interfaces for Musical Expression (2008)
Hu, S.Y., Liao, G.M.: Scalable peer-to-peer networked virtual environment. In: Network and System Support for Games, pp. 129–133 (2004)
Huang, G.-Y., Hu, S.-Y., Jiang, J.-R.: Scalable reputation management for p2p mmogs. In: Proceedings First International Workshop on Massively Multiuser Virtual Environments, pp. 4–8 (2008)
Iimura, T., Hazeyama, H., Kadobayashi, Y.: Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games. In: Chang Feng [1], pp. 116–120
Kabus, P., Buchmann, A.P.: Design of a cheat-resistant p2p online gaming system. In: Proc. of the 2nd Intl Conf. on Digital Interactive Media in Entertainment and Arts, DIMEA 2007, pp. 113–120 (2007)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW, pp. 640–651 (2003)
Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-peer support for massively multiplayer games. In: Infocom (2004)
Krause, S.: A case for mutual notification: A survey of p2p protocols for massively multiplayer online games. In: Netgames 2008 (2008)
Laurens, P., Paige, R.F., Brooke, P., Chivers, H.: A novel approach to the detection of cheating in multiplayer online games. In: 12th IEEE International Conference on Engineering Complex Computer Systems 2007, pp. 97–106 (July 2007)
Merabti, M., Rhalibi, A.E.: Peer-to-peer architecture and protocol for a massively multiplayer online game. In: Globecom 2004 Workshops (2004)
Macedonia, M.R., Zyda, M.J., Pratt, D.R., Brutzman, D.P., Barham, P.T.: Exploiting reality with multicast groups. IEEE Computer Graphics and Applications 15, 38–45 (1995)
Shi, X., Liu, F., Du, L., Chen, X., Xing, Y.: A cheating detection mechanism based on fuzzy reputation management of p2p mmogs
Vik, K.-H.: Game state and event distribution using proxy technology and application layer multicast. In: Zhang, H., Chua, T.-S., Steinmetz, R., Kankanhalli, M.S., Wilcox, L. (eds.) ACM Multimedia, pp. 1041–1042. ACM (2005)
Walsh, K., Sirer, E.G.: Fighting peer-to-peer spam and decoys with object reputation. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-peer Systems, P2PECON 2005, pp. 138–143 (2005)
Yamamoto, S., Murata, Y., Yasumoto, K., Ito, M.: A distributed event delivery method with load balancing for mmorpg. In: NETGAMES, pp. 1–8. ACM (2005)
Yan, J., Randell, B.: A systematic classification of cheating in online games. In: Proceedings of 4th ACM SIGCOMM Workshop on Network and System Support for Games, NetGames 2005, pp. 1–9. ACM, New York (2005)
Yu, L., Susilo, W., Safavi-Naini, R.: X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. In: Pointcheval, D., Mu, Y., Chen, K. (eds.) CANS 2006. LNCS, vol. 4301, pp. 364–380. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Susilo, W., Chow, YW., Wiangsripanawan, R. (2012). Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)