Online Games and Security Cause and Effects of Cheating
Jason Tang 20224466 July 6, 2011
Contents
Gaming Industry Cheating/Exploits Examples with Detection
Game Play Exploits Modifying Game data
Unfair Advantage Motivation Prevention Application
Gaming Industry
Playing Games PC vs Console Distribution Examples Constraints Variables
Exploits
Game Play Modifying Game Data
Cheating
An action that a player takes to achieve an objective that he/she should not have been able to and gives him/her an unfair advantage
Game Play Exploits
How? Why? Lagging Binding Stacking Program Bugs Farming
Modifying Game Data
How? Why? Speed Hacking Using Bots
Aiming Farming
Auto-programming Account Hacking
Unfair Advantage?
Advantageous but not Unfair
Unfair Advantage?
Unfair Advantage?
Image from: [Link]
Unfair Advantage?
Image from: [Link]
Motivation
EVE Online
170 million ISK $170,000 USD
StarCraft II
$100,000 USD Grand Prize
World of WarCraft
1000 gold $12.50 USD
Prevention
Detecting Patching Monitoring
Application
Online game security is similar to internal controls in that problems must first be identified, then modified and monitored The gaming industry is becoming more mainstream and by staying informed one may be able to capitalize on its growth.
References
Parrish, Kevin. Blizzard: Buying Online Gold is Dangerous Toms Hardware. April 14, 2009. [Link] Parrish, Kevin. Hackers Attack World of Warcraft Gamers Toms Hardware. August 25, 2009. [Link] Adkins, Cecil. Internet Security and MMORPGs Examiner. September 30, 2010. [Link] [Link]. 2011 [Link] Yan, Jianxin J. & Choi, Hyuin-jin. Security Issues in online Games CiteSeer Vol 20, pp. 2002-2015 (2003). [Link] Chang, Hangbae., Park, Jong H., & Kang, Hongsuk. The Security System Design in Online Game for u Entertainment Advanced Information and Networking and Applications 2008 p. 1529. March 25-28, 2008. Robles, John R., Yeo, Sang-Soo, Moon, Young-Deuk, Park, Gilcheol, & Kim, Seoksoo. Online Games and Security Issues 2008 Second International Conference on Future Generation Communication and Networking Vol. 2 p. 145. December 13-15, 2008 Pollack, Peter. Online Banker Runs Off With Cash, Avatars Cry Foul ARS Technica 2007. [Link] Hruska, Joel. Safeguarding Your Virtual Goods: MMORPG Security a Mixed Bag ARS Technica 2009. [Link] Vincent, Danny. China Used Prisoners in Lucrative Internet Gaming Work [Link] May 25, 2011. [Link] Mitterhofer, Stefan., Platzer, Christian., Kruegel, Christopher., & Kirda, Engin. Server-Side Bot Detection in Massively Multiplayer Online Games Security & Privacy, IEEE. Vol 7, Issue 3. Pp. 29-36. (2009) McGraw, Gary & Chow, Ming. Securing Online Games Secuirty & Privacy, IEEE. Vol 7, Issue 3. Pp. 11. (2009) McGraw, Gary & Hoglund, Greg. Online Games and Security Security & Privacy, IEEE Vol 5, Issue 5. Pp. 76. (2007) Ong, Adrian (Director). Documentary: Beyond the Game National Geographic, 2006 Gretech Corp. GSL Broadcasts [Link] (Accessed June 20th, 2011) Claburn, Thomas. China Limits Use of Virtual Currency InformationWeek (2009) [Link] (Accessed, June 20th, 2011) Cannon, Tony. [Link]. [Link] (Accessed June 26, 2011)