Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.6.1431

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games  

Yim, Ha-bin (Center for Information Security Technologies(CIST), Korea University)
Kim, Huy-kang (Center for Information Security Technologies(CIST), Korea University)
Kim, Seung-joo (Center for Information Security Technologies(CIST), Korea University)
Abstract
In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.
Keywords
Log Analysis; Visualization; Online Game Data Mining; Churn Prediction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Woo, Jiyoung, and Huy Kang Kim. "Survey and research direction on online game security." Proceedings of the Workshop at SIGGRAPH Asia. ACM, 2012.
2 Nataraj, Lakshmanan, et al. "Malware images: visualization and automatic classification." Proceedings of the 8th international symposium on visualization for cyber security. ACM, 2011.
3 Trinius, Philipp, et al. "Visual analysis of malware behavior using treemaps and thread graphs." Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. IEEE, 2009.
4 Quist, Daniel A., and Lorie M. Liebrock. "Visualizing compiled executables for malware analysis." Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on. IEEE, 2009.
5 Shaid, Syed Zainudeen Mohd, and Mohd Aizaini Maarof. "Malware behavior image for malware variant identification." Biometrics and Security Technologies (ISBAST), 2014 International Symposium on. IEEE, 2014.
6 Ponemon Institute - Measuring Trust In Privacy And Security. https://www.ponemon.org/
7 Wei, Chih-Ping, and I-Tang Chiu. "Turning telecommunications call details to churn prediction: a data mining approach." Expert systems with applications 23.2 pp. 103-112. 2002.   DOI
8 Borbora, Zoheb H., and Jaideep Srivastava. "User behavior modelling approach for churn prediction in online games." Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 2012.
9 Coussement, Kristof, and Dirk Van den Poel. "Churn pre-diction in subscription services: An application of support vector machines while comparing two parameter-selection techniques." Expert systems with applications 34.1 pp. 313-327. 2008   DOI
10 Khan, Afaq Alam, Sanjay Jamwal, and M. M. Sepehri. "Applying data mining to customer churn prediction in an internet service provider." International Journal of Computer Applications 9.7 pp. 8-14. 2010.   DOI
11 Runge, Julian, et al. "Churn prediction for high-value play-ers in casual social games." Computational Intelligence and Games (CIG), 2014 IEEE Conference on. IEEE, 2014.
12 Bauckhage, Christian, et al. "How players lose interest in playing a game: An empirical study based on distributions of total playing times." Computational Intelligence and Games (CIG), 2012 IEEE conference on. IEEE, 2012.
13 bin2png. https://github.com/ESultanik/bin2png
14 Fatma, Shaikh Nikhat. "Image mining method and frameworks." International Journal of Computational Engineering Research (Ijceronline. Com) pp. 135-145. 2012
15 PNG (Portable Network Graphics) Specification, Version 1.1 http://www.libpng.org/pub/png/spec/1.1/PNG-Rationale.html#R.PNG-file-signature
16 CIG 2017. Game Data Mining Competition. https://cilab.sejong.ac.kr/gdmc2017/
17 Joachims, Thorsten. "Text categorization with support vector machines: Learning with many relevant features." Machine learning: ECML-98 pp. 137-142. 1998.
18 Cristianini, Nello, John Shawe-Taylor, and Huma Lodhi. "Latent semantic kernels." Journal of Intelligent Information Systems 18.2 pp. 127-152. 2002.   DOI
19 Visual Object Detection, Recognition & Tracking (without Deep Learning) https//www.slideshare.net/yuhuang/visual-object-detection-recognition-tracking-without-deep-learning
20 Powers. David M. W, "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation," Journal of Machine Learning Technologies, No.2, pp. 37-63. 2011.
21 Debeauvais, Thomas, et al. "Retention and progression: Seven months in World of Warcraft." FDG. 2014.
22 Bertens, Paul, Anna Guitart, and Africa Perianez. "Games and Big Data: A Scalable Multi-Dimensional Churn Prediction Model." arXiv preprint arXiv:1710.02262. 2017.
23 G. O. Young, "Synthetic structure of industrial plastics," in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill. pp. 15-64. 1964.
24 Lodhi, Huma, et al. "Text classification using string kernels." Journal of Machine Learning Research. pp. 419-444. Feb. 2002