Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.3.627

A study on the identity theft detection model in MMORPGs  

Kim, Hana (Graduate School of Information Security, Korea University)
Kwak, Byung Il (Graduate School of Information Security, Korea University)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Abstract
As game item trading becomes more popular with the rapid growth of online game market, the market for trading game items by cash has increased up to KRW 1.6 trillion. Thanks to this active market, it has been easy to turn these items and game money into real money. As a result, some malicious users have often attempted to steal other players' rare and valuable game items by using their account. Therefore, this study proposes a detection model through analysis on these account thieves' behavior in the Massive Multiuser Online Role Playing Game(MMORPG). In case of online game identity theft, the thieves engage in economic activities only with a goal of stealing game items and game money. In this pattern are found particular sequences such as item production, item sales and acquisition of game money. Based on this pattern, this study proposes a detection model. This detection model-based classification revealed 86 percent of accuracy. In addition, trading patterns when online game identity was stolen were analyzed in this study.
Keywords
Identity theft; Online game security; User behavior analysis; MMORPG;
Citations & Related Records
연도 인용수 순위
  • Reference
1 KISA, http://isis.kisa.or.kr/sub07/?pageId=070500#
2 This is game, http://www.thisisgame.com/webzine//nboard/4/?outkey=zkcaebvn6rxg3m4ur1382qdqd9zmwy9fq8s438tf&page=312&n=25415, Jul. 2011
3 Police Science Instituete, Police Science Institute Review no.39, Feb. 2014
4 Boannews, http://www.boannews.com/media/view.asp?idx=42022&kind=1, Jul. 2014
5 Sisaon, http://blog.sisaon.co.kr/130184176950, Jan. 2014
6 IT Today, http://www.ittoday.co.kr/news/articleView.html?idxno=58787, Mar, 2015
7 Hankyoreh, http://www.hani.co.kr/arti/economy/economy_general/105153.html, Feb, 2006
8 Asia Economy Daily, http://www.asiae.co.kr/news/view.htm?idxno=2013030613360916782, Mar. 2013
9 KOCCA, 2014 Korea, Japan Gamers Survey Report, May. 2014
10 Daniele Gunetti and Claudia Picardi, "Keystroke analysis of free text," ACM Transactions on Information and System Security, vol. 8, no. 3, pp. 312-347, Aug. 2005   DOI
11 Hojin Seo and Huy Kang Kim, "User input pattern-based authentication method to prevent mobile e-Financial incidents," Parallel and Distributed Processing with Applications Workshops, pp. 382-387, May. 2011
12 Chen Kuan-Ta and Li-Wen Hong, "User identification based on game-play activity patterns," Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games, pp. 7-12, Sept. 2007
13 Jehwan Oh, Zoheb Hassan Borbora, and Jaideep Srivastava, "Automatic detection of compromised accounts in mmorpgs," Social Informatics, pp. 222-227, Dec. 2012
14 Hwa Jae Choi, Jiyoung Woo, and Huy Kang Kim, "Online game identity theft detection model based on hacker's behavior," Journal of Korea Society, Vol. 11 No.6. pp. 81-94, Dec. 2011
15 Jiyoung Woo, Hwa Jae Choi, and Huy Kang Kim, "An automatic and proactive identity theft detection model in MMORPGs," Applied Mathematics & Information Sciences, Vol. 6, No. 1, pp. 291-302, Jan. 2012
16 Paul Madsen, Yuzo Koga, and Kenji Takahashi, "Federated identity management for protecting users from ID theft," Proceedings of the 2005 workshop on Digital identity management, pp. 77-83, Nov. 2005
17 Neil Chou, Robert Ledesma, Yuka Teraguchi, and John C. Mitchell, "Client-Side defense against web-based identity theft," 11th Annual network and Distributed System Security Symposium, Feb. 2004
18 ClustalX2, ftp://ftp-igbmc.u-strasbg.fr/pub/ClustalX/
19 Alexander Tsoutsanis, "Tackling twitter and facebook fakes: ID theft in social media," World Communications Regulation Report, Vol. 7, No. 4, pp. 1-3, Mar. 2012
20 Youngjoon Ki, Eunjin Kim, and Huy Kang Kim, "A novel approach to detect malware based on API call sequence analysis," International Journal of Distributed Sensor Networks, 501, 659101, Apr. 2015.
21 Hyukmin Kwon, Kyungmoon Woo, Hyun-chul Kim, Chong-kwon Kim, and Huy Kang Kim. "Surgical strike: A novel approach to minimize collateral damage to game BOT detection," Proceedings of Annual Workshop on Network and Systems Support for Games, IEEE Press, pp. 1-2, Dec. 2013