Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.5.1077

A study on hard-core users and bots detection using classification of game character's growth type in online games  

Lee, Jin (Graduate School of Information Security, Korea University)
Kang, Sung Wook (Graduate School of Information Security, Korea University)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Abstract
Security issues such as an illegal acquisition of personal information and identity theft happen due to using game bots in online games. Game bots collect items and money unfairly, so in-game contents are rapidly depleted, and honest users feel deprived. It causes a downturn in the game market. In this paper, we defined the growth types by analyzing the growth processes of users with actual game data. We proposed the framework that classify hard-core users and game bots in the growth patterns. We applied the framework in the actual data. As a result, we classified five growth types and detected game bots from hard-core users with 93% precision. Earlier studies show that hard-core users are also detected as a bot. We clearly separated game bots and hard-core users before full growth.
Keywords
Bot detection; User behavior analysis; Hard-core user; Data mining; MMORPG;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 B. Keegan, M.A. Ahmad, D. Williams, J. Srivastava and N. Contractor, "What can gold farmers teach Us About criminal networks?," XRDS: Crossroads, vol. 17, pp. 11-15, 2011.
2 H. Itsuki, A. Takeuchi, A. Fujita, and H. Matsubara, "Exploiting MMORPG log data toward efficient RMT player detection," International Conference on Advances in Computer Entertainment Technology, pp. 118-119, Nov. 2010.
3 A.R. Kang, J. Woo, J. Park and H.K. Kim, "User Behavior Analysis for Online Game Bot Detection," Journal of The Korea Institute of information Security & Cryptology, vol. 22, no. 2, pp. 225-238, Apr. 2012.
4 A. Fujita, H. Itsuki and H. Matsubara, "Detecting Real Money Traders in MMORPG by Using Trading Network," AIIDE, Oct. 2011.
5 H. Kwon, K. Woo, H. Kim, C.K. Kim, and H.K. Kim, "Surgical strike: A novel approach to minimize collateral damage to game BOT detection," Annual Workshop on Network and Systems Support for Games, pp. 1-2, Dec. 2013.
6 Y. Chung, C.Y. Park, N.R. Kim, H. Cho, T. Yoon, H. Lee and J.H. Lee, "Game Bot Detection Approach Based on Behavior Analysis and Consideration of Various Play Styles," ETRI Journal, vol. 35, no. 6, pp. 1058-1067, Dec. 2013.   DOI
7 R. Thawonmas, Y. Kashifuji, and K.T. Chen, "Detection of MMORPG bots based on behavior analysis," International Conference on Advances in Computer Entertainment Technology, pp. 91-94, Dec. 2008.
8 I.X. Dominguez, A. Goel, D,L. Roberts and R.S Amant, "Detecting abnormal user behavior through pattern-mining input device analytics," the 2015 Symposium and Bootcamp on the Science of Security, p. 11, Apr. 2015.
9 Y. Mishima, K. Fukuda and H. Esaki, "An analysis of players and bots behaviors in MMORPG," Advanced Information Networking and Applications, pp. 870-876, Mar. 2013.
10 J. Lee, J. Lim, W. Cho and H.K. Kim, "I know what the BOTs did yesterday: full action sequence analysis using Naive Bayesian algorithm," Annual Workshop on Network and Systems Support for Games, pp. 1-2, Dec. 2013.
11 J. Lee, J. Lim, W. Cho and H.K. Kim, "In-Game Action Sequence Analysis for Game BOT Detection on the Big Data Analysis Platform," 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, vol. 2, pp. 403-414, Jan. 2015.
12 J. Woo, A.R. Kang and H.K. Kim, "Modeling of bot usage diffusion across social networks in MMORPGs," the Workshop at SIGGRAPH Asia, pp. 13-18, Nov. 2012.
13 S. Mitterhofer, C. Platzer, C. Kruegel and E. Kirda, "Server-side bot detection in massive multiplayer online games," IEEE Security and Privacy, pp.29-36, 2009.
14 R.V. Yampolskiy, and V. Govindaraju, "Embedded noninteractive continuous bot detection," Computers in Entertainment, vol. 5, no. 7, May. 2008.
15 P. Golle, and N. Ducheneaut, "Preventing bots from playing online games," Computers in Entertainment, vol. 3, pp. 3-3, Jul. 2005.
16 K.T. Chen, A. Liao, H.K.K. Pao and H.H. Chu, "Game bot detection based on avatar trajectory," Entertainment Computing-ICEC, vol. 5309, pp. 94-105, 2009.
17 M. van Kesteren, J. Langevoort, and F. Grootjen, "A step in the right direction: Botdetection in MMORPGs using movement analysis," the 21st Belgian-Dutch Conference on Artificial Intelligence, 2009.
18 K.T. Chen, H.K.K. Pao, and H.C. Chang, "Game bot identification based on manifold learning," ACM SIGCOMM Workshop on Network and System Support for Games, pp. 21-26, Oct. 2008.
19 K.T. Chen and L.W. Hong, "User Identification based on Game-Play Activity Patterns," ACM SIGCOMM workshop on Network and system support for games, pp. 7-12, 2007.
20 A.R. Kang, H.K. Kim and J. Woo, "Chatting pattern based game BOT detection: do they talk like us?," KSII Transactions on Internet and Information Systems, vol. 6, no. 11, pp. 2866-2879, Jun. 2013.   DOI
21 K. Woo, H. Kwon, H.C. Kim, C.K. Kim and H.K. Kim, "What can free money tell us on the virtual black market," ACM SIGCOMM, vol. 41, pp. 392-393, Aug. 2011.   DOI
22 M.A. Ahmad, B. Keegan, A. Roy, D. Williams, J. Srivastava and N. Contractor, "Guilt by association? Network based propagation approaches for gold farmer detection," Advances in Social Networks Analysis and Mining, pp.121-126, Aug. 2013.
23 T.K. Ho, "Random decision forests," Document Analysis and Recognition, vol. 1. pp. 278-282, 1995.   DOI
24 Y. Ki, J. Woo and H.K. Kim, "Identifying spreaders of malicious behaviors in online games," the 23rd international conference on World wide web companion, pp. 315-316, Apr. 2014.
25 J. Woo, A.R. Kang and H.K Kim, "The contagion of malicious behaviors in online games," ACM SIGCOMM Computer Communication Review, vol. 43, pp. 543-544, 2013.   DOI