Advertisement

Security in Online Games: Current Implementations and Challenges

  • Reza M. Parizi
  • Ali DehghantanhaEmail author
  • Kim-Kwang Raymond Choo
  • Mohammad Hammoudeh
  • Gregory Epiphaniou
Chapter

Abstract

Security in online gaming is a growing target for hackers due to the amount of money involved in online gaming. Components are used in the security measures implemented for these games, but no single security component is 100% effective. Our research aims to investigate methods of game security and the components used in them, as well as the hacks used to exploit and circumvent online gaming security mechanisms. As a result, our study arrives to some interesting points, and outlines a number of recommendations and potential research directions. This, in turn, can pave the way for facilitating and empowering future research in this domain to assist game engineers and testers in security management.

Keywords

Online game Security Game data Data privacy Hacking 

References

  1. 1.
    ESA. (2017). Two-Thirds of American Households Regularly Play Video Games. Retrieved from http://www.theesa.com/article/two-thirds-american-households-regularly-play-video-games/
  2. 2.
    Kiwia, D., Dehghantanha, A., Choo, K.-K. R., & Slaughter, J. (2017). A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. Journal of Computational Science. https://doi.org/10.1016/j.jocs.2017.10.020
  3. 3.
    Maguluri, N. S. N. (2017). Multi-Class Classification of Textual Data: Detection and Mitigation of Cheating in Massively Multiplayer Online Role Playing Games. (Thesis), Wright State University, Browse all Theses and Dissertations.Google Scholar
  4. 4.
    Summeren, R. v. (2011). Security in Online Gaming. (Thesis), Radboud University Nijmegen.Google Scholar
  5. 5.
    Chang, H., Park, J. H., & Kang, H. (2008). The Security System Design in Online Game for u Entertainment. Paper presented at the 22nd International Conference on Advanced Information Networking and ApplicationsGoogle Scholar
  6. 6.
    Xiang Zuo, Gandy, C., Skvoretz, J., & Iamnitchi, A. (2016). Bad Apples Spoil the Fun: Quantifying Cheating in Online Gaming. Paper presented at the Tenth International AAAI Conference on Web and Social MediaGoogle Scholar
  7. 7.
    Liu, D., Gao, X., Zhang, M., Wang, H., & Stavrou, A. (2017). Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. Paper presented at the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).Google Scholar
  8. 8.
    Mohr, S., & Rahman, S. S. (2011). IT Security Issues Within The Video Game Industry. International Journal of Computer Science & Information Technology, 3(5).Google Scholar
  9. 9.
    Seybold, P. (2011). Press Release: Some PlayStation Network and Qriocity Services to be Available This Week. Retrieved from https://blog.us.playstation.com/2011/04/30/press-release-some-playstation-network-and-qriocity-services-to-be-available-this-week/
  10. 10.
  11. 11.
    Steinman, G. (2013). Security update for all Ubisoft account holders. Retrieved from http://blog.ubi.com/en-GB/security-update-for-all-ubisoft-account-holders/
  12. 12.
    Kiss, J. (2014). Xbox live and Playstation attack: Christmas ruined for millions of gamers. Retrieved from https://www.theguardian.com/technology/2014/dec/26/xbox-live-and-psn-attack-christmas-ruined-for-millions-of-gamers
  13. 13.
    Hurlock-Jones, I. (2015). Multi-state Notification Letter. Retrieved from https://oag.ca.gov/system/files/BFG%20-%20MULTI-STATE%20NOTIFICATION%20LETTER_Proof_1.pdf
  14. 14.
    Paganini, P. (2016). Attacking Gaming Systems: A Dangerous Trend. Retrieved from http://resources.infosecinstitute.com/attacking-gaming-systems-a-dangerous-trend/
  15. 15.
    IBM. (2014). The basic elements of a cryptographic system. Retrieved from https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1.csfb500/csfb5za206.htm
  16. 16.
    Gorder, P. F. (2004). Balancing video-game piracy issues. IEEE Security & Privacy, 2(1), 17.Google Scholar
  17. 17.
    Mendez, J. (2017). How Steam Employs DRM & What That Means For Your Game. Retrieved from https://blackshellmedia.com/2017/06/28/steam-employs-drm-means-game/
  18. 18.
    STEAM. (2017). Account Security Recommendations. Retrieved from https://support.steampowered.com/kb_article.php?ref=1266-OAFV-8478
  19. 19.
    Baignères, T., Finiasz, M., & Lepoint, T. (2013). White-Box Cryptography Retrieved from https://www.cryptoexperts.com/technologies/white-box/
  20. 20.
    Ghosh, A. K., & McGraw, G. (1998). An Approach for Certifying Security in Software Components. Paper presented at the 21st National Information Systems Security Conference.Google Scholar
  21. 21.
    Arif, F. (2014). Denuvo: SSD Rumors are Wrong – No System is Infallible, Striving to Beat Pirates By Being One Step Ahead. Retrieved from https://wccftech.com/denuvo-ssd-rumors-wrong-system-infallible-striving-beat-pirates-step/
  22. 22.
    Crnkovic, I. (2003). Component-based software engineering - new challenges in software development. Paper presented at the 25th International Conference on Information Technology Interfaces, 2003. ITI 2003.Google Scholar
  23. 23.
    Vitharana, P. (2003). Risks and challenges of component-based software development. Communications of the ACM, 46(8), 67-72.Google Scholar
  24. 24.
    Parizi, R. M., Ghani, A. A. A., Lee, S. P., & Khan, S. U. R. (2017). RAMBUTANS: automatic AOP-specific test generation tool. International Journal on Software Tools for Technology Transfer, 19(6), 743-761.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Reza M. Parizi
    • 1
  • Ali Dehghantanha
    • 2
    Email author
  • Kim-Kwang Raymond Choo
    • 3
  • Mohammad Hammoudeh
    • 4
  • Gregory Epiphaniou
    • 5
  1. 1.Department of Software Engineering and Game DevelopmentKennesaw State UniversityMariettaUSA
  2. 2.Cyber Science Lab, School of Computer ScienceUniversity of GuelphGuelphCanada
  3. 3.Department of Information Systems and Cyber SecurityThe University of Texas at San AntonioSan AntonioUSA
  4. 4.School of Computing, Mathematics and Digital Technology, Manchester Metropolitan UniversityManchesterUK
  5. 5.Wolverhampton Cyber Research Institute (WCRI), School of Mathematics and Computer Science, University of WolverhamptonWolverhamptonUK

Personalised recommendations