Online Games and SecurityCause and Effects of CheatingJason Tang20224466July 6, 2011
ContentsGaming IndustryCheating/ExploitsExamples with DetectionGame Play ExploitsModifying Game dataUnfair AdvantageMotivationPreventionApplication
Gaming IndustryPlaying Games – PC vs ConsoleDistributionExamplesConstraintsVariables
ExploitsGame PlayModifying Game DataCheatingAn action that a player takes to achieve an objective that he/she should not have been able to and gives him/her an unfair advantage
Game Play ExploitsHow?  Why?LaggingBindingStackingProgram BugsFarming
Modifying Game DataHow?  Why?Speed HackingUsing BotsAimingFarmingAuto-programmingAccount Hacking
Unfair Advantage?Advantageous but not Unfair
Unfair Advantage?
Unfair Advantage?Image from: http://www.morearnings.com/wp-content/uploads/2007/05/wow-horde-level-59-1.jpg
Unfair Advantage?Image from: http://www.morearnings.com/wp-content/uploads/2007/05/wow-horde-level-59-1.jpg
MotivationEVE Online170 million ISK  $170,000 USDStarCraft II$100,000 USD Grand PrizeWorld of WarCraft1000 gold  $12.50 USD
PreventionDetectingPatchingMonitoring
ApplicationOnline game security is similar to internal controls in that problems must first be identified, then modified and monitoredThe gaming industry is becoming more mainstream and by staying informed one may be able to capitalize on its growth.
ReferencesParrish, Kevin. “Blizzard: Buying Online Gold is Dangerous” Tom’s Hardware. April 14, 2009. http://www.tomshardware.com/news/Blizzard-MMORPG-World-Warcraft,7542.htmlParrish, Kevin. “Hackers Attack World of Warcraft Gamers” Tom’s Hardware. August 25, 2009. http://www.tomshardware.com/news/blizzard-warcraft-hack,8536.htmlAdkins, Cecil. “Internet Security and MMORPGs” Examiner. September 30, 2010. http://www.examiner.com/mmorpg-in-charleston/internet-security-mmorpgsGainCoin.com. 2011 http://www.gaincoin.comYan, Jianxin J. & Choi, Hyuin-jin. “Security Issues in online Games” CiteSeerVol 20, pp. 2002-2015 (2003). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.8270&rep=rep1&type=pdfChang, Hangbae., Park, Jong H., & Kang, Hongsuk. “The Security System Design in Online Game for u Entertainment” Advanced Information and Networking and Applications 2008 p. 1529. March 25-28, 2008. Robles, John R., Yeo, Sang-Soo, Moon, Young-Deuk, Park, Gilcheol, & Kim, Seoksoo. “Online Games and Security Issues” 2008 Second International Conference on Future Generation Communication and Networking Vol. 2 p. 145. December 13-15, 2008Pollack, Peter. “Online ‘Banker’ Runs Off With Cash, Avatars Cry Foul” ARS Technica 2007. http://arstechnica.com/old/content/2006/08/7605.arsHruska, Joel. “Safeguarding Your Virtual Goods: MMORPG Security a Mixed Bag” ARS Technica 2009. http://arstechnica.com/security/news/2008/08/safeguarding-your-virtual-goods-mmorpg-security-a-mixed-bag.arsVincent, Danny. “China Used Prisoners in Lucrative Internet Gaming Work” Guardian.co.uk May 25, 2011. http://www.guardian.co.uk/world/2011/may/25/china-prisoners-internet-gaming-scamMitterhofer, Stefan., Platzer, Christian., Kruegel, Christopher., & Kirda, Engin. “Server-Side Bot Detection in Massively Multiplayer Online Games” Security & Privacy, IEEE. Vol 7, Issue 3.  Pp. 29-36. (2009)McGraw, Gary & Chow, Ming. “Securing Online Games” Secuirty & Privacy, IEEE.Vol 7, Issue 3. Pp. 11. (2009)McGraw, Gary & Hoglund, Greg. “Online Games and Security” Security & Privacy, IEEEVol 5, Issue 5. Pp. 76. (2007)Ong, Adrian (Director). “Documentary: Beyond the Game” National Geographic, 2006Gretech Corp. “GSL Broadcasts” http://www.gomtv.net/league/index.gom (Accessed June 20th, 2011)Claburn, Thomas. “China Limits Use of Virtual Currency” InformationWeek (2009) http://www.informationweek.com/news/internet/ebusiness/218101859 (Accessed, June 20th, 2011)Cannon, Tony. GGPO.net. http://ggpo.net/ (Accessed June 26, 2011)

It ppt

  • 1.
    Online Games andSecurityCause and Effects of CheatingJason Tang20224466July 6, 2011
  • 2.
    ContentsGaming IndustryCheating/ExploitsExamples withDetectionGame Play ExploitsModifying Game dataUnfair AdvantageMotivationPreventionApplication
  • 3.
    Gaming IndustryPlaying Games– PC vs ConsoleDistributionExamplesConstraintsVariables
  • 4.
    ExploitsGame PlayModifying GameDataCheatingAn action that a player takes to achieve an objective that he/she should not have been able to and gives him/her an unfair advantage
  • 5.
    Game Play ExploitsHow? Why?LaggingBindingStackingProgram BugsFarming
  • 6.
    Modifying Game DataHow? Why?Speed HackingUsing BotsAimingFarmingAuto-programmingAccount Hacking
  • 7.
  • 8.
  • 9.
    Unfair Advantage?Image from:http://www.morearnings.com/wp-content/uploads/2007/05/wow-horde-level-59-1.jpg
  • 10.
    Unfair Advantage?Image from:http://www.morearnings.com/wp-content/uploads/2007/05/wow-horde-level-59-1.jpg
  • 11.
    MotivationEVE Online170 millionISK  $170,000 USDStarCraft II$100,000 USD Grand PrizeWorld of WarCraft1000 gold  $12.50 USD
  • 12.
  • 13.
    ApplicationOnline game securityis similar to internal controls in that problems must first be identified, then modified and monitoredThe gaming industry is becoming more mainstream and by staying informed one may be able to capitalize on its growth.
  • 14.
    ReferencesParrish, Kevin. “Blizzard:Buying Online Gold is Dangerous” Tom’s Hardware. April 14, 2009. http://www.tomshardware.com/news/Blizzard-MMORPG-World-Warcraft,7542.htmlParrish, Kevin. “Hackers Attack World of Warcraft Gamers” Tom’s Hardware. August 25, 2009. http://www.tomshardware.com/news/blizzard-warcraft-hack,8536.htmlAdkins, Cecil. “Internet Security and MMORPGs” Examiner. September 30, 2010. http://www.examiner.com/mmorpg-in-charleston/internet-security-mmorpgsGainCoin.com. 2011 http://www.gaincoin.comYan, Jianxin J. & Choi, Hyuin-jin. “Security Issues in online Games” CiteSeerVol 20, pp. 2002-2015 (2003). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.99.8270&rep=rep1&type=pdfChang, Hangbae., Park, Jong H., & Kang, Hongsuk. “The Security System Design in Online Game for u Entertainment” Advanced Information and Networking and Applications 2008 p. 1529. March 25-28, 2008. Robles, John R., Yeo, Sang-Soo, Moon, Young-Deuk, Park, Gilcheol, & Kim, Seoksoo. “Online Games and Security Issues” 2008 Second International Conference on Future Generation Communication and Networking Vol. 2 p. 145. December 13-15, 2008Pollack, Peter. “Online ‘Banker’ Runs Off With Cash, Avatars Cry Foul” ARS Technica 2007. http://arstechnica.com/old/content/2006/08/7605.arsHruska, Joel. “Safeguarding Your Virtual Goods: MMORPG Security a Mixed Bag” ARS Technica 2009. http://arstechnica.com/security/news/2008/08/safeguarding-your-virtual-goods-mmorpg-security-a-mixed-bag.arsVincent, Danny. “China Used Prisoners in Lucrative Internet Gaming Work” Guardian.co.uk May 25, 2011. http://www.guardian.co.uk/world/2011/may/25/china-prisoners-internet-gaming-scamMitterhofer, Stefan., Platzer, Christian., Kruegel, Christopher., & Kirda, Engin. “Server-Side Bot Detection in Massively Multiplayer Online Games” Security & Privacy, IEEE. Vol 7, Issue 3. Pp. 29-36. (2009)McGraw, Gary & Chow, Ming. “Securing Online Games” Secuirty & Privacy, IEEE.Vol 7, Issue 3. Pp. 11. (2009)McGraw, Gary & Hoglund, Greg. “Online Games and Security” Security & Privacy, IEEEVol 5, Issue 5. Pp. 76. (2007)Ong, Adrian (Director). “Documentary: Beyond the Game” National Geographic, 2006Gretech Corp. “GSL Broadcasts” http://www.gomtv.net/league/index.gom (Accessed June 20th, 2011)Claburn, Thomas. “China Limits Use of Virtual Currency” InformationWeek (2009) http://www.informationweek.com/news/internet/ebusiness/218101859 (Accessed, June 20th, 2011)Cannon, Tony. GGPO.net. http://ggpo.net/ (Accessed June 26, 2011)