Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.4.849

A study of RMT buyer detection for the collapse of GFG in MMORPG  

Kang, Sung Wook (Graduate School of Information Security, Korea University)
Lee, Jin (Graduate School of Information Security, Korea University)
Lee, Jaehyuk (Graduate School of Information Security, Korea University)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Abstract
As the rise in popularity of online games, the users start exchanging rare items for real money. As RMT (Real Money Trade) is prevalent, GFG (Gold Farming Group) who abuse RMT shows up. GFG causes social problems such as identity theft, privacy leaks. Because they needs many bot characters to gather game items. In addition, GFG induce RMT that makes in-game problems such as a destroying game economy, account hacking. Therefore, It is very important work to collapse GFG at the perspective of social and in-game. In this paper, we proposed a fundamental method for detecting RMT buyers for the collapse of GFG at the perspective of buyer by Law of Demand and Supply. We found two type of RMT by analyzing actual game data and detected RMT buyers with high recall ratio of 98% by ruled-based detection.
Keywords
Buyer detection; GFG (Gold Farming Group); Online Game Bot; RMT (Real Money Trade); RMT buyer;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 G. Lastowka, "ID theft, RMT, & Lineage," TerraNova, http://terranova.blogs.com/terra_nova/2006/07/id_theft_rmt_nc.html%20/, Jul. 2006.
2 A.S. Irwin, and J. Slay, "Detecting Money Laundering and Terrorism Financing Activity in Second Life and World of Warcraft," 2010 INTERNATIONAL CYBER RESILIENCE CONFERENCE, pp. 41, 2010.
3 S. Gianvecchio, Z. Wu, M. Xie, and H. Wang, "Battle of botcraft: fighting bots in online games with human observational proofs," ACM conference on Computer and communications security, pp. 256-268, Nov. 2009.
4 K.T. Chen, A. Liao, H.K.K. Pao and H.H. Chu, "Game bot detection based on avatar trajectory," Entertainment Computing-ICEC, vol. 5309, pp. 94-105, Sep. 2008.
5 Y. Mishima, K. Fukuda and H. Esaki, "An analysis of players and bots behaviors in MMORPG," Advanced Information Networking and Applications, pp. 870-876, Mar. 2013.
6 A.R. Kang, H.K. Kim and J. Woo, "Chatting pattern based game BOT detection: do they talk like us?," KSII Transactions on Internet and Information Systems, vol. 6 no. 11, pp. 2866-2879, Jun. 2013.   DOI
7 A.R. Kang, J. Woo, J. Park and H.K. Kim, "Online game bot detection based on party-play log analysis," Computers & Mathematics with Applications, vol. 65, no. 9, pp.1384-1395, May. 2013.   DOI   ScienceOn
8 R.V. Yampolskiy, and V. Govindaraju, "Embedded noninteractive continuous bot detection," Computers in Entertainment, vol. 5, no. 2, pp. 7, May. 2008.   DOI
9 A. Fujita, H. Itsuki and H. Matsubara, "Detecting Real Money Traders in MMORPG by Using Trading Network", AIIDE, Oct. 2011.
10 B. Keegan, M.A. Ahmed, D. Williams, J. Srivastava and N. Contractor, "Dark gold: Statistical properties of clandestine networks in massively multiplayer online games", Social Computing, pp. 201-208, Aug. 2010.
11 H. Kwon, K. Woo, H. Kim, C.K. Kim, and H.K. Kim, "Surgical strike: A novel approach to minimize collateral damage to game BOT detection," Annual Workshop on Network and Systems Support for Games, pp. 1-2, Dec. 2013.
12 I. Constantiou, M.F. Legarth and K.B. Olsen, "What are users' intentions towards real money trading in massively multiplayer online games?," Electronic Markets, vol. 22, no. 2, pp. 105-115, Jun. 2012.   DOI
13 S. Mitterhofer, C. Platzer, C. Kruegel and E. Kirda, "Server-side bot detection in massive multiplayer online games," IEEE Security and Privacy, pp.29-36, 2009.
14 M. Ahmad, B. Keegan, J. Srivastava, D. Williams and N. Contractor, "Mining for gold farmers: Automatic detection of deviant players in mmogs," Computational Science and Engineering, vol. 4, pp. 340-345, Aug. 2009.
15 M.A. Ahmad, B. Keegan, A. Roy, D. Williams, J. Srivastava and N. Contractor, "Guilt by association? Network based propagation approaches for gold farmer detection," Advances in Social Networks Analysis and Mining, pp.121-126, Aug. 2013.
16 B. Keegan, M.A. Ahmad, D. Williams, J. Srivastava and N. Contractor, "What can gold farmers teach Us About criminal networks?," XRDS: Crossroads, vol. 17, no. 3, pp. 11-15, 2011.   DOI
17 Q.H. Wang, V. Mayer-Schonberger and X. Yang, "The determinants of monetary value of virtual goods: An empirical study for a cross-section of MMORPGs," Information Systems Frontiers, vol. 15, no. 3, pp.481-495, 2013.   DOI
18 J. Lee, J. Lim, W. Cho and H.K. Kim, "I know what the BOTs did yesterday: full action sequence analysis using Naive Bayesian algorithm," Annual Workshop on Network and Systems Support for Games, pp. 1-2, Dec. 2013.
19 J. Lee, J. Lim, W. Cho and H.K. Kim, "In-Game Action Sequence Analysis for Game BOT Detection on the Big Data Analysis Platform," 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, pp. 403-414, Jan. 2015.
20 Y. Wang and S.D. Mainwaring, "Human-Currency Interaction : Learning from Virtual Currency Use in China," SIGCHI Conference on Human Factors in Computing Systems, pp. 25-28, Apr. 2008.
21 E. Castronova, D. Williams, C. Shen, R. Ratan, L. Xiong, Y. Huang, and B. Keegan, "As real as real? Macroeconomic behavior in a large-scale virtual world," New Media & Society, vol. 11, no. 5, pp. 685-707, Nov. 2009.   DOI
22 R. Thawonmas, Y. Kashifuji and K.T. Chen, "Detection of MMORPG Bots Based on Behavior Analysis," International Conference on Advances in Computer Entertainment Technology, pp. 91-94, Dec. 2008.
23 K. Woo, H. Kwon, H.C. Kim, C.K. Kim and H.K. Kim, "What can free money tell us on the virtual black market," ACM SIGCOMM, vol. 41, no. 5, pp. 392-393, Aug. 2011.
24 J. Woo and H.K. Kim, "Survey and Research Direction on Online Game Security," Workshop at SIGGRAPH Asia, pp. 19-25, Nov. 2012.
25 G. Ekberg, "The Swedish Law that Prohibits the Purchase of Sexual Services Best Practices for Prevention of Prostitution and Trafficking in Human Beings," iolence against women, vol. 10, no. 10, pp. 1187-1218, Oct. 2004.   DOI
26 K.T. Chen and L.W. Hong, "User Identification based on Game-Play Activity Patterns," ACM SIGCOMM workshop on Network and system support for games, pp. 7-12, Set. 2007.