Rahul Joshi (2008) Cheating and Virtual Crime in Massively Multiplayer Online Games.
Full text access: Open
Massively Multiplayer Online Games (MMOG) have become extremely popular since the birth of the Internet, with many millions of players playing games such as Poker and World of Warcraft. However, they do not seem to be well understood, and academic research into them has been limited. This project explains the nature of MMOG, and the relationship between MMOG and information security. This project discusses the problem of cheating in MMOG and it explains what cheating is, how it occurs, and how information security can be used to prevent it. The nature of virtual economies in MMOG is discussed, and the virtual crimes that have affected MMOG along with preventative measures are examined.
This is a Published version This version's date is: 15/01/2008 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/a48ee857-9e6c-12b9-4542-7331d229aa38/1/
Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010
[AP06] Associated Press: 3 Chinese tried for counterfeiting weapons in online game, May2006,http://newsinfo.inquirer.net/breakingnews/infotech/view_article.php?article_id=19103
[Bl07] Blizzard Entertainment: World of Warcraft passes 8 million subscribers, January2007, http://www.blizzard.com/press/070111.shtml
[Ca02] Castronova, E.: On Virtual Economies, CESifo Working Paper Series No. 752, July2002.
[CJ06] Chen, K-T, Jiang, J-W, Huang, P, Chu,HH, Lei,C-L, Chen,W-C.: IdentifyingMMORPG bots, Proceedings of the 2006 ACM SIGCHI international conference on Advancesin computer entertainment technology, Hollywood, California, 2006.
[Co98] Collberg, C, Thomborson, C, Low, D.: A taxonomy of obfuscatingtransformations, Technical Report 148, Department of Computer Sciences, The University ofAuckland, July 1997.
[CS04] Chen, YC, Chen, P, Song, R, Korba, L.: Online Gaming and Security Issue – Casesand Countermeasures from Taiwan, Proceedings of the 2nd Annual Conference on Privacy,Security and Trust, Fredericton, New Brunswick, Canada, October 2004.
[DL05] Daum, M, Lucks, S.: Attacking Hash Functions by Poisoned Messages "The Storyof Alice and her Boss", June 2005, http://www.cits.rub.de/MD5Collisions/
[Ev06] EvenBalance: PunkBuster for players, June 2006,http://evenbalance.com/publications/wr-pl/index.htm
[FC05] Feng, W, Chang, F, Feng, W, Walpole, J.: A Traffic Characterization of PopularOn-line Games, IEEE/ACM Transactions on Networking Volume 13, Issue 3, June 2005.
[Fe07] Feng, W.: Got Mips? The need for speed in online games, June 2007,http://www.thefengs.com/wuchang/work/cstrike/GotMIPS.pdf
[HN06] Harris, J, Nardi, B.: Strangers and Friends: Collaborative Play in World ofWarcraft, CSCW 2006 Proceedings of the 2006 20th anniversary conference on ComputerSupported Cooperative Work, Banff, Alberta, Canada, November 2006.
[Ho05] Hoglund, G.: 4.5 Million copies of EULA-compliant spyware, October 2005,www.rootkit.com/blog.php?newsid=358
[Hu05] Hunter, D.: Virtual world phishing, September 2005,http://terranova.blogs.com/terra_nova/2005/09/virtual_world_p.html
[La07] Lavish Software: A guided tour of InnerSpace, June 2007,http://www.lavishsoft.com/innerspace/index.php?page=1
[MH07] McGraw, G, Hoglund, G.: Exploiting Online Games: Cheating MassivelyDistributed Systems, Addison Wesley, 2007.
[Mm07] Glider: An introduction, June 2007, http://www.mmoglider.com/
[Pl06] PlayNoEvil Game Security News & Analysis: Virtual item theft ring busted,December 2006, http://playnoevil.com/serendipity/index.php?/archives/1051-Virtual-Item-Theft-Ring-Busted.html#extended
[Sc05] Schneier, B.: Schneier on Security, August 2005,http://www.schneier.com/blog/archives/2005/08/stealing_imagin.html
[Si06] Silkroad Tavern: Info on Bots, October 2006,http://www.silkroadtavern.com/forums/index.php?s=ee3d925859b58e5fffdc34cdabe1de02&showtopic=24101
[So05] Sophos: Suspected gang who stole from online game players arrested in Korea,July 2005,http://www.sophos.com/pressoffice/news/articles/2005/07/va_krarrests.html
[So07] Sony Online Entertainment: Station Exchange FAQ, July 2007,http://stationexchange.station.sony.com/faq.vm
[Wa07] Blizzard Entertainment: World of Warcraft game guide, June 2007, www.woweurope.com/en/info/basics/guide.html
[We07] Webopedia: Phishing definition, July 2007,http://www.webopedia.com/TERM/p/phishing.html
[Wh04] D. Wheeler, IBM Secure programmer: Prevent race conditions, October 2004,http://www.ibm.com/developerworks/linux/library/l-sprace.html
[Wo07] World of Warcraft Community site: In-Game support, tips to prevent accountcompromise, July 2007, http://www.blizzard.com/support/wowgm/?id=agm01889p
[Ya02] Yan, J, Choi, HJ. : Security Issues in Online Games, The Electronic Library, Vol. 20,No. 2, 2002, pp. 125-133.
[Ya05] Yan, J, Randell, B.: Security in Computer Games: from Pong to Online Poker,Technical Report Series CS-TR-889, School of Computing Science, Newcastle University, UK,February 2005.
[YB00] Yan, J, Blackwell, A, Anderson, R, Grant, A.: The memorability and security ofpasswords – some empirical results. Technical Report UCAM-CL-TR-500, CambridgeUniversity, 2000.