Taxonomy of online game security

نویسندگان

  • Junbaek Ki
  • Jung Hee Cheon
  • Jeong-Uk Kang
  • Dogyun Kim
چکیده

We present classification of known attacks in online games and provide security solutions against them. While previous works just presented attacks and solutions in case by case, we newly classify attacks by objectives and methods. Moreover, we present attacks in each of four layers: client, server, network, and environment. Through this systematic classification, solutions can be provided more efficiently against even unknown future attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in Computer Games: from Pong to Online Poker

Security can mean different things in a different application context. For decades, gaming has been a major computer application with its own distinct characteristics, and in fact, online gaming is now one of the most popular applications on the Internet. However, there are few systematic treatments of security concerns in gaming. In this paper, we briefly trace the history of computer games. T...

متن کامل

Securing Online Games

MAY/JUNE 2009 ■ 1540-7993/09/$25.00 © 2009 IEEE ■ COPUblIshEd bY thE IEEE COMPUtEr ANd rElIAbIlItY sOCIEtIEs 37 Jeff Yan and Brian randell Newcastle University, UK O nline games are one of the most popular Internet applications, but cheating has emerged as a notable phenomenon in current gameplay on the Internet. However, such cheating isn’t as well understood as we might expect. To address thi...

متن کامل

هنجاریابی و بررسی وی‍‍ژگی‌های روانسنجی نسخه فارسی پرسشنامه اعتیاد به بازی‌های آنلاین

Objectives: The aim of the current study was to assess the psychometric properties of Online Game Addiction Inventory in under graduate students of Shahid Chamran University of Ahwaz. Method: Of all under graduate students in Shahid Chamran University of Ahwaz during 2014-15 academic year, 300 under graduate students from Shahid Chamran University were selected using multistage random sampling ...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Security issues in massive online games

In this paper, an investigation is conducted on the security issues in massive multiplayer games. A taxonomy framework for online cheating is provided. Under this proposed framework, online cheating is classified and state of the art counter-cheating techniques are analysed with emphasis on attacks that pose a considerable challenge to the security of massive multiplayer online games. Copyright...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • The Electronic Library

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2004