skip to main content
10.1145/2425296.2425300acmconferencesArticle/Chapter ViewAbstractPublication PagessiggraphConference Proceedingsconference-collections
research-article

Survey and research direction on online game security

Published: 26 November 2012 Publication History

Abstract

Online game security is a newly emerging research area that is attracting considerable attention with the growth of the online game industry. There is an increasing need for online game service providers to detect and prevent the various threats associated with game bots and gold farmers. These illegal activities have become quite severe, and many online game service providers have fallen prey to them. These threats exist in popular multiplayer games where cyber assets can be monetized. In this study, we survey academic research efforts and industry practices related to these threats. In addition, we examine the actual illegal activities and look at countermeasures being adopted in the field.

References

[1]
A. Jain, A. R., and Prabhakar, S. 2004. An introduction to biometric recognition. In IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, 4--20.
[2]
A. Peacock, X. K., and Wilkerson, M. 2004. Typing patterns: A key to user identification. In IEEE Security and Privacy, vol. 2, 40--47.
[3]
A. R. Kang, J. Woo, J. P., and Kim, H. 2012. Online game bot detection based on party-play log analysis. Computer and Mathematics with Applications, in-press.
[4]
Chen, K., and Hong, L. 2007. User identification based on game-play activity patterns. In Proceedings of the 6th ACM SIGCOMM Workshop on Network and System Support for Games (NetGames '07), 7--12.
[5]
Davis, R. 2009. Welcome to the new gold mines. The Guardian.
[6]
Golle, P., and Ducheneaut, N. 2005. Preventing bots from playing online games. Computers in Entertainment (CIE) 3, 3--3.
[7]
Gunetti, D., and Picardi, C. 2005. Key stroke analysis of free text. ACM Transactions on Information System Security 8, 312--347.
[8]
H. K. Pao, H. Y. Lin, K. C., and Fadlil, J. 2011. Trajectory based behavior analysis for user verification. In Intelligent Data Engineering and Automated Learning (IDEAL 2010), LNCS, 316--323.
[9]
Hu, J., and Zambetta, F. 2008. Security issues in massive online games. Security and Communication Networks 1, 83--92.
[10]
J. Ki, J. C., and Kang, J. 2004. Taxonomy of online game security. The Electronic Library 22, 65--73.
[11]
J. Woo, H. C., and Kim, H. 2012. An automatic and proactive identity theft detection model in mmorpgs. Applied Mathematics and Information Sciences 6, 291S--302S.
[12]
J. J. Yan, H. C. 2002. Security issues in online games. The Electronic Library 20, 125--133.
[13]
K. Woo, H. Kwon, H. K. C. K., and Kim, H. 2011. What can free money tell us on the virtual black market? In Proceedings of the ACM SIGCOMM 2011 Conference, 392--393.
[14]
K. T. Chen, J. W. Jiang, P. H. H. C. C. L., and Chen, W. 2009. Identifying mmorpg bots: A traffic analysis approach. In Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology (ACE '06).
[15]
M. A. Ahmad, B. Keegan, J. S. D. W., and Contractor, N. 2009. Mining for gold farmers: Automatic detection of deviant players in mmogs. In Proceedings of the International Conference on Computational Science and Engineering, 340--345.
[16]
McGraw, G., and Chow, M. 2009. Securing online games: Safeguarding the future of software security. In IEEE Security and Privacy, vol. 7, 11--12.
[17]
Melnikov, N., and Schonwalder, J. 2010. Cybermetrics: User identification through network flow analysis. In Proceedings of the Mechanisms for Autonomous Management of Networks and Services, and 4th International Conference on Autonomous Infrastructure, Management and Security (AIMS'10), 167--170.
[18]
N. Chou, R. Ledesma, Y. T. D. B., and Mitchell, J. 2004. Client-side defense against web-based identity theft. In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS '04).
[19]
NCSoft. 2012. Ncsoft shut down private server with fbi. MMOSITE.COM, http://news.mmosite.com/content/2006-11-20/20061120190829155.shtml.
[20]
O. B. Gaspareto, D. B., and Schneider, A. 2008. Neural networks applied to speed cheating detection in online computer games. In Proceedings of the Fourth International Conference on Natural Computation (ICNC '08), 526--529.
[21]
Prasetya, K., and Wu, Z. 2010. Artificial neural network for bot detection system in mmogs. In Proceedings of the 9th Annual Workshop on Network and Systems Support for Games (NetGames '10).
[22]
R. Thawonmas, M. K., and Chen, K. 2007. Detection of landmarks for clustering of online-game players. International Journal of Virtual Reality 6, 11--16.
[23]
R. Thawonmas, Y. K., and Chen, K. 2008. Detection of mmorpg bots based on behavior analysis. In Proceedings of the 2008 International Conference on Advances in Computer Entertainment Technology (ACE '08), 91--94.
[24]
S. Bono, D. Caselden, G. L., and Miller, C. 2009. Reducing the attack surface in massively multiplayer online role-playing games. In IEEE Security and Privacy, vol. 7, 13--19.
[25]
S. Gianvecchio, Z. Wu, M. X. H. W. 2009. Battle of botcraft: Fighting bots in online games with human observational proofs. In Proceedings of the 16th ACM Conference on Computer and Communications Security, 256--268.
[26]
S. Mitterhofer, C. Platzer, C. K., and Kirda, E. 2009. Server-side bot detection in massively multiplayer online games. In IEEE Security and Privacy, vol. 7, 29--36.
[27]
Webb, S., and Soh, S. 2007. Cheating in networked computer games: A review. DIMEA 07.
[28]
W. J. Wang, Y. Y., and Archer, N. 2006. A contextual framework for combating identity theft. In IEEE Security and Privacy, vol. 4, 30--38.
[29]
Yampolskiy, R., and Govindaraju, V. 2008. Embedded noninteractive continuous bot detection. Computers in Entertainment 5, 1--11.
[30]
Yan, J., and Randell, B. 2009. An investigation of cheating in online games. In IEEE Security and Privacy, vol. 7, 37--44.
[31]
Y. C. Chen, P. S. Chen, J. H. L. K. R. S., and Yee, G. 2005. An analysis of online gaming crime characteristics. Internet Research 15, 246--261.

Cited By

View all
  • (2024)Reviewing Cheating and Detection Techniques in Massively Multiplayer Online Role-Playing Games: A Systematic Analysis2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT)10.1109/IConSCEPT61884.2024.10627799(1-6)Online publication date: 4-Jul-2024
  • (2024)Toxic Behaviors in Online GamingEncyclopedia of Computer Graphics and Games10.1007/978-3-031-23161-2_241(1887-1892)Online publication date: 5-Jan-2024
  • (2024)Detecting and Preventing Online Game Bots in MMORPGsEncyclopedia of Computer Graphics and Games10.1007/978-3-031-23161-2_13(577-584)Online publication date: 5-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WASA '12: Proceedings of the Workshop at SIGGRAPH Asia
November 2012
178 pages
ISBN:9781450318358
DOI:10.1145/2425296
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. countermeasure
  2. game bot
  3. gold farming
  4. massive multi-user online role playing game (MMORPG)
  5. online game security

Qualifiers

  • Research-article

Conference

SA '12
Sponsor:
SA '12: SIGGRAPH Asia 2012
November 26 - 27, 2012
Singapore, Singapore

Acceptance Rates

Overall Acceptance Rate 4 of 5 submissions, 80%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)42
  • Downloads (Last 6 weeks)5
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Reviewing Cheating and Detection Techniques in Massively Multiplayer Online Role-Playing Games: A Systematic Analysis2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT)10.1109/IConSCEPT61884.2024.10627799(1-6)Online publication date: 4-Jul-2024
  • (2024)Toxic Behaviors in Online GamingEncyclopedia of Computer Graphics and Games10.1007/978-3-031-23161-2_241(1887-1892)Online publication date: 5-Jan-2024
  • (2024)Detecting and Preventing Online Game Bots in MMORPGsEncyclopedia of Computer Graphics and Games10.1007/978-3-031-23161-2_13(577-584)Online publication date: 5-Jan-2024
  • (2023)Privacy Is the Price: Player Views and Technical Evaluation of Data Practices in Online GamesProceedings of the ACM on Human-Computer Interaction10.1145/36110647:CHI PLAY(1136-1178)Online publication date: 29-Sep-2023
  • (2023)Extracting Threat Intelligence From Cheat Binaries For Anti-CheatingProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607211(17-31)Online publication date: 16-Oct-2023
  • (2023)Deep learning applications in games: a survey from a data perspectiveApplied Intelligence10.1007/s10489-023-05094-253:24(31129-31164)Online publication date: 4-Dec-2023
  • (2023)Toxic Behaviors in Online GamingEncyclopedia of Computer Graphics and Games10.1007/978-3-319-08234-9_241-1(1-6)Online publication date: 4-Jul-2023
  • (2022)Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House SystemIEEE Transactions on Games10.1109/TG.2021.309405414:3(423-434)Online publication date: Sep-2022
  • (2022)Cheating and Detection Method in Massively Multiplayer Online Role-Playing Game: Systematic Literature ReviewIEEE Access10.1109/ACCESS.2022.317211010(49050-49063)Online publication date: 2022
  • (2021)Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and SchemeSensors10.3390/s2106197621:6(1976)Online publication date: 11-Mar-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media