Browse > Article

The Study of Information Security Technologies for Security Incidents in Online Game Service  

Chang, Hang-Bae (Department of Business Administration, Daejin University)
Kim, Kyung-Kyu (Graduate School of Information, Yonsei University)
Lee, Si-Jin (Department of Computer Engineering, Daejin University)
Publication Information
Information Systems Review / v.9, no.3, 2007 , pp. 83-98 More about this Journal
Abstract
This study focused on online game security, which has been considered relatively insignificant when compared to the online game industry's rapid growth. In this study, the state of security incidents in the Korean game industry and security solutions for such cases were examined. At first the security incidents were classified according to the type of game security infringement. Based upon this classification, this study analyzed the causes that give rise to infringement of online game security, and developed technical solutions for such cases. Finally, this study verified whether or not these technical solutions could be applied to online game sites.
Keywords
Game Security; Auto Program; Speed Hack; System Service Table Hooking;
Citations & Related Records
연도 인용수 순위
  • Reference
1 중소기술정보진흥원, '중소기업 정보화 역기능 실태조사 연구', 2004
2 한국정보보호진흥원, '정보화 역기능 실태조사 연구', 2004
3 Bishop, M., 'A Taxonomy of UNIX System and Network Vulnerabilities', Technical Report CSE-95-10, Purdue University, 1995
4 Howard, J. D., 'An Analysis of Security Incidents on the Internet', Ph. D Thesis, Carnegie Mellon University, 1997
5 한국게임산업진흥원, '2005년 대한민국 게임백서', 2005
6 한국정보보호진흥원, '정보화 역기능 실태조사 연구', 2003
7 Bisbey, II R, Hollingworth D., 'Protection Analysis: Final Report', University of Southern California, 1978
8 Ray, Hunt and Simon, Hansman, 'A Taxonomy of Network and Computer Attacks', Computer & Security, Vol.24, No.1, 2005
9 Bishop, M. and D. Bailey, 'A Critical Analysis of Vulnerability Taxonomies', Technical Report CSE-96-11, Dept. of Computer Science, University of California at Davis, 1996
10 Aslam, T., 'A Taxonomy of Security Faults in the Unix Operating System', Master's Thesis, Purdue University, 1995
11 Brian, Marick, 'A Survey of Software Fault Surveys', Technical Report UIUCDCS-R-90-1651, University of Illinois at Urbana-Champaign, 1990
12 Eugene, H. Spafford, 'Common System Vulnerabilities', Proceedings of the Workshop on Future Directions in Computer Misuse and Anomaly Detection, 1992
13 Abbott, R. P., J. S. Chin, J. E. Donnelley, W. L. Konigsford, S. Tokubo, and D. A. Webb, 'Security Analysis and Enhancements of Computer Operating Systems', Institute for Computer Sciences and Technology, National Bureau of Standards, 1976
14 Rajeev Nagar, 'Windows NT File System Internals: A Developer's Guide', O'Reilly & Associates, 1997
15 Wenliang, Du and Aditya, P. Mathur, 'Categorization of Software Errors that led to Security Breaches', In Proceeding of the 21st National Information Systems Security Conference (NISSC'98), 1998
16 정윤경, 기준백, 천정희, '온라인 게임 아이템의 안전한 전자 거래 시스템', 한국정보보호학회논문지, 제13권, 제3호, 2003
17 Lough, D. L., 'A Taxonomy of Computer Attacks with Applications to Wireless Networks', Ph. D. Thesis, Virginia Polytechnic Institute and State University, 2001
18 Peltier, T., 'Information Security Risk Analysis', Auerbach, 2001
19 Otwell, K. and B. Aldridge, 'The Role of Vulnerability in Risk Management', IEEE Proceedings of the 5th Annual Computer Security Applicant Conference, 1989