Cheating and Virtual Crime in Massively Multiplayer Online Games

Rahul Joshi

(2008)

Rahul Joshi (2008) Cheating and Virtual Crime in Massively Multiplayer Online Games.

Our Full Text Deposits

Full text access: Open

Full Text - 748.21 KB

Links to Copies of this Item Held Elsewhere


Abstract

Massively Multiplayer Online Games (MMOG) have become extremely popular since the birth of the Internet, with many millions of players playing games such as Poker and World of Warcraft. However, they do not seem to be well understood, and academic research into them has been limited. This project explains the nature of MMOG, and the relationship between MMOG and information security. This project discusses the problem of cheating in MMOG and it explains what cheating is, how it occurs, and how information security can be used to prevent it. The nature of virtual economies in MMOG is discussed, and the virtual crimes that have affected MMOG along with preventative measures are examined.

Information about this Version

This is a Published version
This version's date is: 15/01/2008
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/a48ee857-9e6c-12b9-4542-7331d229aa38/1/

Item TypeMonograph (Technical Report)
TitleCheating and Virtual Crime in Massively Multiplayer Online Games
AuthorsJoshi, Rahul
DepartmentsFaculty of Science\Mathematics

Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010

Notes

References

[AP06] Associated Press: 3 Chinese tried for counterfeiting weapons in online game, May
2006,
http://newsinfo.inquirer.net/breakingnews/infotech/view_article.php?article_id=1910
3

[Bl07] Blizzard Entertainment: World of Warcraft passes 8 million subscribers, January
2007, http://www.blizzard.com/press/070111.shtml

[Ca02] Castronova, E.: On Virtual Economies, CESifo Working Paper Series No. 752, July
2002.

[CJ06] Chen, K-T, Jiang, J-W, Huang, P, Chu,HH, Lei,C-L, Chen,W-C.: Identifying
MMORPG bots, Proceedings of the 2006 ACM SIGCHI international conference on Advances
in computer entertainment technology, Hollywood, California, 2006.

[Co98] Collberg, C, Thomborson, C, Low, D.: A taxonomy of obfuscating
transformations, Technical Report 148, Department of Computer Sciences, The University of
Auckland, July 1997.

[CS04] Chen, YC, Chen, P, Song, R, Korba, L.: Online Gaming and Security Issue – Cases
and Countermeasures from Taiwan, Proceedings of the 2nd Annual Conference on Privacy,
Security and Trust, Fredericton, New Brunswick, Canada, October 2004.

[DL05] Daum, M, Lucks, S.: Attacking Hash Functions by Poisoned Messages "The Story
of Alice and her Boss", June 2005, http://www.cits.rub.de/MD5Collisions/

[Ev06] EvenBalance: PunkBuster for players, June 2006,
http://evenbalance.com/publications/wr-pl/index.htm

[FC05] Feng, W, Chang, F, Feng, W, Walpole, J.: A Traffic Characterization of Popular
On-line Games, IEEE/ACM Transactions on Networking Volume 13, Issue 3, June 2005.

[Fe07] Feng, W.: Got Mips? The need for speed in online games, June 2007,
http://www.thefengs.com/wuchang/work/cstrike/GotMIPS.pdf

[HN06] Harris, J, Nardi, B.: Strangers and Friends: Collaborative Play in World of
Warcraft, CSCW 2006 Proceedings of the 2006 20th anniversary conference on Computer
Supported Cooperative Work, Banff, Alberta, Canada, November 2006.

[Ho05] Hoglund, G.: 4.5 Million copies of EULA-compliant spyware, October 2005,
www.rootkit.com/blog.php?newsid=358

[Hu05] Hunter, D.: Virtual world phishing, September 2005,
http://terranova.blogs.com/terra_nova/2005/09/virtual_world_p.html

[La07] Lavish Software: A guided tour of InnerSpace, June 2007,
http://www.lavishsoft.com/innerspace/index.php?page=1

[MH07] McGraw, G, Hoglund, G.: Exploiting Online Games: Cheating Massively
Distributed Systems, Addison Wesley, 2007.

[Mm07] Glider: An introduction, June 2007, http://www.mmoglider.com/

[Pl06] PlayNoEvil Game Security News & Analysis: Virtual item theft ring busted,
December 2006, http://playnoevil.com/serendipity/index.php?/archives/1051-Virtual-
Item-Theft-Ring-Busted.html#extended

[Sc05] Schneier, B.: Schneier on Security, August 2005,
http://www.schneier.com/blog/archives/2005/08/stealing_imagin.html

[Si06] Silkroad Tavern: Info on Bots, October 2006,
http://www.silkroadtavern.com/forums/index.php?s=ee3d925859b58e5fffdc34cdabe1
de02&showtopic=24101

[So05] Sophos: Suspected gang who stole from online game players arrested in Korea,
July 2005,
http://www.sophos.com/pressoffice/news/articles/2005/07/va_krarrests.html

[So07] Sony Online Entertainment: Station Exchange FAQ, July 2007,
http://stationexchange.station.sony.com/faq.vm

[Wa07] Blizzard Entertainment: World of Warcraft game guide, June 2007, www.woweurope.
com/en/info/basics/guide.html

[We07] Webopedia: Phishing definition, July 2007,
http://www.webopedia.com/TERM/p/phishing.html

[Wh04] D. Wheeler, IBM Secure programmer: Prevent race conditions, October 2004,
http://www.ibm.com/developerworks/linux/library/l-sprace.html

[Wo07] World of Warcraft Community site: In-Game support, tips to prevent account
compromise, July 2007, http://www.blizzard.com/support/wowgm/?id=agm01889p

[Ya02] Yan, J, Choi, HJ. : Security Issues in Online Games, The Electronic Library, Vol. 20,
No. 2, 2002, pp. 125-133.

[Ya05] Yan, J, Randell, B.: Security in Computer Games: from Pong to Online Poker,
Technical Report Series CS-TR-889, School of Computing Science, Newcastle University, UK,
February 2005.

[YB00] Yan, J, Blackwell, A, Anderson, R, Grant, A.: The memorability and security of
passwords – some empirical results. Technical Report UCAM-CL-TR-500, Cambridge
University, 2000.


Details