ABSTRACT
Account hijacking is considered one of the most serious security problems in online games. A hijacker normally takes away valuable virtual items from the stolen accounts, and trades those items for real money. Even though account hijacking is not uncommon, there is currently no general solutions to determine whether an account has been hijacked. The game company is not aware of a hijack unless it is reported by the victim. However, it is usually too late---usually a hijacker already took away anything valuable when a user finds that his/her account has been stolen.
In this paper, we propose a new biometric for human identification based on users' game-play activities. Our main summary are two-fold: 1) we show that the idle time distribution is a representative feature of game players; 2) we propose the RET scheme, which is based on the KullbackLeibler divergence between idle time distributions, for user identification. Our evaluations shows that the RET scheme achieves higher than 90% accuracy with a 20-minute detection time given a 200-minute history size.
- A. Broemme. A classification of biometric signatures. In IEEE International Conference on Multimedia & Expo, 2003. Google ScholarDigital Library
- K.-T. Chen, P. Huang, and C.-L. Lei. Game traffic analysis: An MMORPG perspective. Computer Networks, 50(16):3002--3023, 2006. Google ScholarDigital Library
- K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen. Identifying MMORPG bots: A traffic analysis approach. In Proceedings of ACM SIGCHI ACE'06, Los Angeles, USA, Jun 2006. Google ScholarDigital Library
- M. D. Griffiths, M. N. Davies, and D. Chappell. Demographic factors and playing variables in online computer gaming. CyberPsychology & Behavior, 7(4):479--487, Aug. 2004.Google Scholar
- D. Guinier. Identification by biometrics. SIGSAC Rev., 8(2):1--11, 1990. Google ScholarDigital Library
- D. Gunetti and C. Picardi. Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur., 8(3):312--347, 2005. Google ScholarDigital Library
- J.-Y. Ho, Y. Matsumoto, and R. Thawonmas. MMOG player identification: A step toward CRM of MMOGs. In Proc. of the Sixth Pacific Rim International Workshop on Multi-Agents, pages 81--92, Nov 2003.Google Scholar
- A. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):4--20, Jan 2004. Google ScholarDigital Library
- R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33(2):168--176, 1990. Google ScholarDigital Library
- D. M. Kienzle and M. C. Elder. Recent worms: a survey and trends. In WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode, pages 1--10. ACM Press, 2003. Google ScholarDigital Library
- S. Kullback and R. A. Leibler. On information and sufficiency. In Annals of Mathematical Statistics, volume 55, pages 79--86, 1951.Google ScholarCross Ref
- H. B. Mann and D. R. Whitney. On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics, 18:50--60, 1947.Google ScholarCross Ref
- A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2(5):40--47, 2004. Google ScholarDigital Library
- M. Pusara and C. E. Brodley. User re-authentication via mouse movements. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 1--8. ACM Press, 2004. Google ScholarDigital Library
- R. Thawonmas, M. Kurashige, K. Iizuka, and M. Kantardzic. Clustering online game users based on their trails using self-organizing map. In Proceedings of ICEC 2006, pages 366--369, Sep 2006. Google ScholarDigital Library
- J. R. Vacca. Identity Theft. Prentice Hall PTR, 1 edition, Sep. 2002. Google ScholarDigital Library
- J. Yan and B. Randell. A systematic classification of cheating in online games. In Proceedings of ACM SIGCOMM 2005 workshops on NetGames '05. ACM Press, 2005. Google ScholarDigital Library
- S. Yeung, J. C. Lui, J. Liu, and J. Yan. Detecting cheaters for multiplayer games: Theory, design and implementation. In Proceedings of IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME'06), Las Vegas, USA, Jan 2006.Google ScholarCross Ref
Index Terms
- User identification based on game-play activity patterns
Recommendations
"My religious aunt asked why i was trying to sell her viagra": experiences with account hijacking
CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsWith so much of our lives digital, online, and not entirely under our control, we risk losing access to our communications, reputation, and data. Recent years have brought a rash of high-profile account compromises, but account hijacking is not limited ...
Sensing game play. Exploring computer game play in a game café and a mass LAN party
CGAMES '11: Proceedings of the 2011 16th International Conference on Computer GamesIn this article we discuss the sensory experiences of playing computer games by exploring the sight, the sound, the taste, smell, and touch of games. We reflect on how senses and the social atmosphere gives meaning to players' experiences of playing ...
Consequences of Connectivity: Characterizing Account Hijacking on Twitter
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecurityIn this study we expose the serious large-scale threat of criminal account hijacking and the resulting damage incurred by users and web services. We develop a system for detecting large-scale attacks on Twitter that identifies 14 million victims of ...
Comments