skip to main content
10.1145/1326257.1326259acmconferencesArticle/Chapter ViewAbstractPublication PagesnetgamesConference Proceedingsconference-collections
research-article

User identification based on game-play activity patterns

Published:19 September 2007Publication History

ABSTRACT

Account hijacking is considered one of the most serious security problems in online games. A hijacker normally takes away valuable virtual items from the stolen accounts, and trades those items for real money. Even though account hijacking is not uncommon, there is currently no general solutions to determine whether an account has been hijacked. The game company is not aware of a hijack unless it is reported by the victim. However, it is usually too late---usually a hijacker already took away anything valuable when a user finds that his/her account has been stolen.

In this paper, we propose a new biometric for human identification based on users' game-play activities. Our main summary are two-fold: 1) we show that the idle time distribution is a representative feature of game players; 2) we propose the RET scheme, which is based on the KullbackLeibler divergence between idle time distributions, for user identification. Our evaluations shows that the RET scheme achieves higher than 90% accuracy with a 20-minute detection time given a 200-minute history size.

References

  1. A. Broemme. A classification of biometric signatures. In IEEE International Conference on Multimedia & Expo, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K.-T. Chen, P. Huang, and C.-L. Lei. Game traffic analysis: An MMORPG perspective. Computer Networks, 50(16):3002--3023, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen. Identifying MMORPG bots: A traffic analysis approach. In Proceedings of ACM SIGCHI ACE'06, Los Angeles, USA, Jun 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. D. Griffiths, M. N. Davies, and D. Chappell. Demographic factors and playing variables in online computer gaming. CyberPsychology & Behavior, 7(4):479--487, Aug. 2004.Google ScholarGoogle Scholar
  5. D. Guinier. Identification by biometrics. SIGSAC Rev., 8(2):1--11, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Gunetti and C. Picardi. Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur., 8(3):312--347, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J.-Y. Ho, Y. Matsumoto, and R. Thawonmas. MMOG player identification: A step toward CRM of MMOGs. In Proc. of the Sixth Pacific Rim International Workshop on Multi-Agents, pages 81--92, Nov 2003.Google ScholarGoogle Scholar
  8. A. Jain, A. Ross, and S. Prabhakar. An introduction to biometric recognition. IEEE Transactions on Circuits and Systems for Video Technology, 14(1):4--20, Jan 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Joyce and G. Gupta. Identity authentication based on keystroke latencies. Commun. ACM, 33(2):168--176, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. M. Kienzle and M. C. Elder. Recent worms: a survey and trends. In WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode, pages 1--10. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Kullback and R. A. Leibler. On information and sufficiency. In Annals of Mathematical Statistics, volume 55, pages 79--86, 1951.Google ScholarGoogle ScholarCross RefCross Ref
  12. H. B. Mann and D. R. Whitney. On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics, 18:50--60, 1947.Google ScholarGoogle ScholarCross RefCross Ref
  13. A. Peacock, X. Ke, and M. Wilkerson. Typing patterns: A key to user identification. IEEE Security and Privacy, 2(5):40--47, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Pusara and C. E. Brodley. User re-authentication via mouse movements. In VizSEC/DMSEC '04: Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages 1--8. ACM Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Thawonmas, M. Kurashige, K. Iizuka, and M. Kantardzic. Clustering online game users based on their trails using self-organizing map. In Proceedings of ICEC 2006, pages 366--369, Sep 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. R. Vacca. Identity Theft. Prentice Hall PTR, 1 edition, Sep. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Yan and B. Randell. A systematic classification of cheating in online games. In Proceedings of ACM SIGCOMM 2005 workshops on NetGames '05. ACM Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Yeung, J. C. Lui, J. Liu, and J. Yan. Detecting cheaters for multiplayer games: Theory, design and implementation. In Proceedings of IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME'06), Las Vegas, USA, Jan 2006.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. User identification based on game-play activity patterns

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            NetGames '07: Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
            September 2007
            138 pages
            ISBN:9780980446005
            DOI:10.1145/1326257

            Copyright © 2007 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 19 September 2007

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader