skip to main content
10.1145/1517494.1517496acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnetgamesConference Proceedingsconference-collections
research-article

A peer auditing scheme for cheat elimination in MMOGs

Published:21 October 2008Publication History

ABSTRACT

Although much of the research into massively multiplayer online games (MMOGs) focuses on scalability concerns, other issues such as the existence of cheating have an equally large practical impact on game success. Cheat prevention itself is usually addressed through the use of proprietary, ad-hoc or manual methods, combined with a strong centralized authority as found in a straightforward client/server network model. To improve scalability, however, the use of more extensible, yet less secure, peer-to-peer (P2P) models has become an attractive game design option. Here we present the IRS hybrid game model that efficiently incorporates a centralized authority into a P2P setting for purposes of controlling and eliminating game cheaters. Analysis of our design shows that with any reasonable parametrization malicious clients are purged extremely quickly and with minimal impact on non-cheating clients, while still ensuring continued benefit and scalability from distributed computations. Cheating has a serious impact on the viability of multiplayer games, and our results illustrate the possibility of a system in which scalability and security coexist.

References

  1. Blizzard Entertainment, World of Warcraft. http://www.worldofwarcraft.com/index.xml.Google ScholarGoogle Scholar
  2. Mcgill University, Mammoth. http://mammoth.cs.mcgill.ca/.Google ScholarGoogle Scholar
  3. SQUARE ENIX, Final Fantasy XI. http://www.playonline.com/ff11us/index.shtml.Google ScholarGoogle Scholar
  4. B. Ali, W. Villegas, and M. Maheswaran. A trust based approach for protecting user data in social networks. In IBM CASCON 2007, pages 288--293, Richmond Hill, Ontario, Canada, Jan. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. E. Baughman and B. N. Levine. Cheat-proof playout for centralized and distributed online games. In IEEE InfoCom, pages 104--113, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  6. X. bin Shi, L. Fang, D. Ling, C. Xiao-hong, and X. Yuan-sheng. A cheating detection mechanism based on fuzzy reputation management of P2P MMOGs. In SNPD 2007, pages 75--80, Washington, DC, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. R. Cecin, C. F. R. Geyer, S. Rabello, and J. L. V. Barbosa. A peer-to-peer simulation technique for instanced massively multiplayer games. In DS-RT 2006, pages 43--50, Washington, DC, USA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. R. Cecin, R. Real, R. de Oliveira Jannone, C. F. R. Geyer, M. G. Martins, and J. L. V. Barbosa. FreeMMG: a scalable and cheat-resistant distribution model for internet games. In DS-RT 2004, pages 83--90, Washington, DC, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Chambers, W. chang Feng, W. chi Feng, and D. Saha. Mitigating information exposure to cheaters in real-time strategy games. In NOSSDAV 2005, pages 7--12, Washington, USA, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Chan, J. Yong, J. Bai, B. Leong, and R. Tan. Hydra: A massively-multiplayer peer-to-peer architecture for the game developer. In Netgames 2007, pages 37--42, Melbourne, Australia, Sept. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. chang Feng, D. Brandt, and D. Saha. A long-term study of a popular MMORPG. In Netgames 2007, pages 19--24, Melbourne, Australia, Sept. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. D. Chen and M. Maheswaran. A cheat controlled protocol for centralized online multiplayer games. In NetGames 2004, pages 139--143, Portland, OR, USA, Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Cronin, B. Filstrup, and S. Jamin. Cheat-proofing dead reckoning multiplayer games (extended abstract). In Conf. on Appl. and Dev. of Comp. Games, Jan. 2003.Google ScholarGoogle Scholar
  14. E. Cronin, B. Filstrup, A. R. Kurc, and S. Jamin. An efficient synchronization mechanism for mirrored game architectures. In NetGames 2002, pages 67--73, Bruanschweig, Germany, 2002. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Fan, H. Taylor, and P. Trinder. Mediator: a design framework for P2P MMOGs. In Netgames 2007, pages 43--48, Melbourne, Australia, Sept. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. P. Golle and N. Ducheneaut. Preventing bots from playing online games. Computers in Entertainment, 3(3):3--3, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Greenhill. Diablo and multiplayer game's future. http://www.gamesdomain.com/gdreview/zones/shareware/may97.html, May 1997.Google ScholarGoogle Scholar
  18. X. Jiang, F. Safaei, and P. Boustead. An approach to achieve scalability through a structured peer-to-peer network for massively multiplayer online role playing games. Computer Communications, 30(16):3075--3084, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Kabus, W. W. Terpstra, M. Cilia, and A. P. Buchmann. Addressing cheating in distributed MMOGs. In Netgames 2005, pages 1--6, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks. In WWW 2003, pages 640--651, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Knutsson, H. Lu, W. Xu, and B. Hopkins. Peer-to-peer support for massively multiplayer games. In IEEE InfoCom, Mar. 2004.Google ScholarGoogle ScholarCross RefCross Ref
  22. J. Kuecklich. Other playings: cheating in computer games. In Other Players Conf., IT University of Copenhagen, Dec. 2004.Google ScholarGoogle Scholar
  23. P. Laurens, R. F. Paige, P. J. Brooke, and H. Chivers. A novel approach to the detection of cheating in multiplayer online games. In ICECCS 2007, pages 97--106, Washington, DC, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. S. Mogaki, M. Kamada, T. Yonekura, S. Okamoto, Y. Ohtaki, and M. B. I. Reaz. Time-stamp service makes real-time gaming cheat-free. In Netgames 2007, pages 135--138, Melbourne, Australia, Sept. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. T. Schluessler, S. Goglin, and E. Johnson. Is a bot at the controls? detecting input data attacks. In Netgames 2007, pages 1--6, Melbourne, Australia, Sept. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Smed, T. Kaukoranta, and H. Hakonen. A review on networking and multiplayer computer games. Technical Report Tech Report No. 454, University of Turku Centre for Computer Science, 2002.Google ScholarGoogle Scholar
  27. S. D. Webb and S. Soh. Cheating in networked computer games: a review. In DIMEA 2007, pages 105--112, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Yan and B. Randell. A systematic classification of cheating in online games. In Netgames 2005, pages 1--9, Hawthorne, New York, USA, Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A peer auditing scheme for cheat elimination in MMOGs

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              NetGames '08: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
              October 2008
              108 pages
              ISBN:9781605581323
              DOI:10.1145/1517494

              Copyright © 2008 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 21 October 2008

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader