91 research outputs found

    Crime Scene Re-investigation: A Postmortem Analysis of Game Account Stealers' Behaviors

    Full text link
    As item trading becomes more popular, users can change their game items or money into real money more easily. At the same time, hackers turn their eyes on stealing other users game items or money because it is much easier to earn money than traditional gold-farming by running game bots. Game companies provide various security measures to block account- theft attempts, but many security measures on the user-side are disregarded by users because of lack of usability. In this study, we propose a server-side account theft detection system base on action sequence analysis to protect game users from malicious hackers. We tested this system in the real Massively Multiplayer Online Role Playing Game (MMORPG). By analyzing users full game play log, our system can find the particular action sequences of hackers with high accuracy. Also, we can trace where the victim accounts stolen money goes.Comment: 7 pages, 8 figures, In Proceedings of the 15th Annual Workshop on Network and Systems Support for Games (NetGames 2017

    ActiBot: A Botnet to Evade Active Detection

    Get PDF
    In recent years, botnets have emerged as a serious threat on the Internet. Botnets are commonly used for exploits such as distributed denial of service (DDoS) attacks, identity theft, spam, and click fraud. The immense size of botnets, some consisting of hundreds of thousands of compromised computers, increases the speed and severity of attacks. Unlike passive behavior anomaly detection techniques, active botnet detection aims to collect evidence actively, in order to reduce detection time and increase accuracy. In this project, we develop and analyze a botnet that we call ActiBot, which can evade some types of active detection mechanisms. Future research will focus on using ActiBot to strengthen existing detection techniques

    Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study

    Get PDF
    Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research, there is a simulated scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine (acting as the MMOG server) and Windows client devices running Minecraft. Server and client devices are then examined to reveal the type and extent of evidential artefacts that can be extracted

    Demystifying Social Bots: On the Intelligence of Automated Social Media Actors

    Get PDF
    Recently, social bots, (semi-) automatized accounts in social media, gained global attention in the context of public opinion manipulation. Dystopian scenarios like the malicious amplification of topics, the spreading of disinformation, and the manipulation of elections through “opinion machines” created headlines around the globe. As a consequence, much research effort has been put into the classification and detection of social bots. Yet, it is still unclear how easy an average online media user can purchase social bots, which platforms they target, where they originate from, and how sophisticated these bots are. This work provides a much needed new perspective on these questions. By providing insights into the markets of social bots in the clearnet and darknet as well as an exhaustive analysis of freely available software tools for automation during the last decade, we shed light on the availability and capabilities of automated profiles in social media platforms. Our results confirm the increasing importance of social bot technology but also uncover an as yet unknown discrepancy of theoretical and practically achieved artificial intelligence in social bots: while literature reports on a high degree of intelligence for chat bots and assumes the same for social bots, the observed degree of intelligence in social bot implementations is limited. In fact, the overwhelming majority of available services and software are of supportive nature and merely provide modules of automation instead of fully fledged “intelligent” social bots

    Opportunities and Risks in Online Gaming Environments

    Get PDF
    Massively Multiplayer Online Role Playing Games (MMORPGs) have evolved from traditional video games in that they embrace both the technology of the Internet and video games. The massive “exodus” from the physical offline world to online gaming communities brings with it not only a number of unique and exciting opportunities, but also a number of emerging and serious risks. This research set out to examine the unique opportunities and risks to vulnerable individuals, namely, young adults, teenagers and young children; all of whom are considered by many to be priority groups in the protection from harm. The purpose was to examine the reality of vulnerable individuals encountering these opportunities and risks. This research combined a number of methodologies supported by underpinning qualitative and quantitative theories. Questionnaires, semi-structured interviews and focus groups gathered information from teenagers, adults and children in order to critically examine the unique opportunities and risks encountered in Massively Multiplayer Online Role Playing Games. The findings from these interactions identified specific examples of opportunities and risk posed to vulnerable individuals. The findings demonstrated that there was a need for a support and protection mechanism that promoted the identification and awareness of the potential risk among vulnerable individuals. Emerging from these findings was a set of concepts that provided the evidence base for a Novel Taxonomy of Opportunities and Risks in Massively Multiplayer Online Role Playing Game environments that was designed to assist in the assessment of risk. Validation of the proposed taxonomy was achieved by means of an ethnographic study of (World of Warcraft) online gamers’ behaviour and social interactions through unobtrusive video capture of gaming sessions. The Novel Taxonomy of Opportunities and Risks provided a basis for the development of a proof-of-concept Decision Support System; the purpose of which was to assist both social work practitioners and individuals to identify and reduce risks. Representatives from both user groups were consulted for evaluation of the acceptability of such an approach. Favourable responses from participants demonstrated acceptability of the aforementioned approach. The evaluation process also demonstrated how the prototype would serve as a useful tool to make individual users aware of potential dangers. This research presents three novel facets: (1) it advances understanding of the unique opportunities and risks within MMORPG environments; (2) provides a framework for the assessment of risks in MMORPGs through the Novel Taxonomy and (3) demonstrates a novel Decision Support System to assist in the identification and reduction of risk through a proof-of-concept prototype

    Preventing Computer Identity theft

    Get PDF
    The arrival of the information age has created new challenges to the ability of individuals to protect the security and privacy of their personal information. One such challenge is that of identity theft, which has caused a number of hardships upon its victims. Perpetrators of this fraud may use identities of others to obtain loans, steal money, and violate the law. This paper will discuss the characteristics of the offenders and victims of identity theft. A systematic approach for preventing identity theft will also be presented with the hopes of curtailing this epidemic

    Cheat detection and security in video games

    Get PDF
    corecore