Browse > Article
http://dx.doi.org/10.7583/JKGS.2011.11.6.081

Online Game Identity Theft Detection Model based on Hacker's Behavior Analysis  

Choi, Hwa-Jae (Graduate School of Information Security, Korea University)
Woo, Ji-Young (Graduate School of Information Security, Korea University)
Kim, Huy-Kang (Graduate School of Information Security, Korea University)
Abstract
Identity theft happens frequently in popular MMORPG(Massively Multi-player Online Role Playing Games) where profits can be gained easily. In spite of the importance of security about identity theft in MMORPG, few methods to prevent and detect identity theft in online games have been proposed. In this study, we investigate real identity theft cases of an online game and define the representative patterns of identity theft as the speedy type, cautious type, and bold type. We then propose the automatic identity theft detection model based on the multi-class classification. We verify the system with one of the leading online games in Korea. The multi-class detection model outperforms the existing binary-class one(hacked or not).
Keywords
Online Game Security; Identity Theft Detection; MMORPG; Neural Network; Behavior Analysis;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 2010 대한민국 게임백서 제1부 산업계 동향 http://www.kocca.kr/center/download_new.jsp ?typecd=ics&file=/knowledge/report/kocca/__ic sFiles/afieldfile/2011/10/10/3pULQq9k2mr5.pdf
2 J. Ki, J. Cheon, and J. Kang, "Taxonomy of online game security", The Electronic Library, 22, pp. 65-73, 2004   DOI   ScienceOn
3 H. K. Kim, "Online game security", Codegate 2009 conference, http://www.hksecurity.net/home/pds/codegate2 -1(huykang.kim).pdf, 2009.
4 최성락, "온라인게임 아이템거래 발생 원인 분석", 한국게임학회, 7권, 4호, pp. 125-134, 2007
5 K. T. Chen, and L. W. Hong, "User identification based on game-play activity patterns", NetGames'07, Melbourne, Australia, 2007.
6 한창희, 김정민, 박채희, 홍유진, 김민관, "게임아이템 현금거래의 가치사슬 변화와 동향분석",한국게임학회, 11권, 2호, pp. 45-56, 2011
7 S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, "Data mining for credit card fraud: A comparative study", Decision Support Systems, 50, pp. 602-613, 2011   DOI   ScienceOn
8 S. Bono, D. Caselden, G. Landau, and C. Miller, "Reducing the attack surface in massively multiplayer online role-playing games", IEEE Security and Privacy, 7, pp. 13-19, 2009   DOI
9 Y. C. Chen, P. S. Chen, J. J. Hwang, L. Korba, R. Song, and G. Yee, "An analysis of online gaming crime characteristics", Internet Research, 15, pp. 246-261, 2005
10 D. Gunetti and C. Picardi, "Key stroke analysis of free text", ACM Transaction on Information System Security, 8, pp. 312-347, 2005
11 J. Hu and F. Zambetta, "Security issues in massive online games", Security and Communication Networks, 1, pp. 83-92, 2008   DOI
12 J. V. Hulse, T. M. Khoshgoftaar, A. Napolitano, "Experimental perspectives on learning from imbalanced data", The 24th International Conference on Machine Learning, Corvallis, Oregon, 2007.
13 Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition", IEEE Transactions on Circuits and Systems for Video Technology, 14, pp. 4-20, 2004
14 J. Yan and B. Randell, "An investigation of cheating in online games", IEEE Security and Privacy, 7, pp. 37-44, 2009   DOI
15 G. McGraw, and M. Chow, "Securing online games - Safeguarding the future of software security". IEEE Security and Privacy, 7, pp. 11-12, 2009
16 X. Peacock, Ke and M. Wilkerson, "Typing patterns: A key to user identification", IEEE Security and Privacy, 2, pp. 40-47, 2004