Skip to main content

Security in Online Games: Current Implementations and Challenges


Security in online gaming is a growing target for hackers due to the amount of money involved in online gaming. Components are used in the security measures implemented for these games, but no single security component is 100% effective. Our research aims to investigate methods of game security and the components used in them, as well as the hacks used to exploit and circumvent online gaming security mechanisms. As a result, our study arrives to some interesting points, and outlines a number of recommendations and potential research directions. This, in turn, can pave the way for facilitating and empowering future research in this domain to assist game engineers and testers in security management.


  • Online game
  • Security
  • Game data
  • Data privacy
  • Hacking

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-10543-3_16
  • Chapter length: 18 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
USD   169.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-10543-3
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Hardcover Book
USD   219.99
Price excludes VAT (USA)


  1. ESA. (2017). Two-Thirds of American Households Regularly Play Video Games. Retrieved from

  2. Kiwia, D., Dehghantanha, A., Choo, K.-K. R., & Slaughter, J. (2017). A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. Journal of Computational Science.

  3. Maguluri, N. S. N. (2017). Multi-Class Classification of Textual Data: Detection and Mitigation of Cheating in Massively Multiplayer Online Role Playing Games. (Thesis), Wright State University, Browse all Theses and Dissertations.

    Google Scholar 

  4. Summeren, R. v. (2011). Security in Online Gaming. (Thesis), Radboud University Nijmegen.

    Google Scholar 

  5. Chang, H., Park, J. H., & Kang, H. (2008). The Security System Design in Online Game for u Entertainment. Paper presented at the 22nd International Conference on Advanced Information Networking and Applications

    Google Scholar 

  6. Xiang Zuo, Gandy, C., Skvoretz, J., & Iamnitchi, A. (2016). Bad Apples Spoil the Fun: Quantifying Cheating in Online Gaming. Paper presented at the Tenth International AAAI Conference on Web and Social Media

    Google Scholar 

  7. Liu, D., Gao, X., Zhang, M., Wang, H., & Stavrou, A. (2017). Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. Paper presented at the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

    Google Scholar 

  8. Mohr, S., & Rahman, S. S. (2011). IT Security Issues Within The Video Game Industry. International Journal of Computer Science & Information Technology, 3(5).

    Google Scholar 

  9. Seybold, P. (2011). Press Release: Some PlayStation Network and Qriocity Services to be Available This Week. Retrieved from

  10. Kyodo. (2013). Customer data exposed in huge breach of Nintendo member website. Retrieved from

  11. Steinman, G. (2013). Security update for all Ubisoft account holders. Retrieved from

  12. Kiss, J. (2014). Xbox live and Playstation attack: Christmas ruined for millions of gamers. Retrieved from

  13. Hurlock-Jones, I. (2015). Multi-state Notification Letter. Retrieved from

  14. Paganini, P. (2016). Attacking Gaming Systems: A Dangerous Trend. Retrieved from

  15. IBM. (2014). The basic elements of a cryptographic system. Retrieved from

  16. Gorder, P. F. (2004). Balancing video-game piracy issues. IEEE Security & Privacy, 2(1), 17.

    Google Scholar 

  17. Mendez, J. (2017). How Steam Employs DRM & What That Means For Your Game. Retrieved from

  18. STEAM. (2017). Account Security Recommendations. Retrieved from

  19. Baignères, T., Finiasz, M., & Lepoint, T. (2013). White-Box Cryptography Retrieved from

  20. Ghosh, A. K., & McGraw, G. (1998). An Approach for Certifying Security in Software Components. Paper presented at the 21st National Information Systems Security Conference.

    Google Scholar 

  21. Arif, F. (2014). Denuvo: SSD Rumors are Wrong – No System is Infallible, Striving to Beat Pirates By Being One Step Ahead. Retrieved from

  22. Crnkovic, I. (2003). Component-based software engineering - new challenges in software development. Paper presented at the 25th International Conference on Information Technology Interfaces, 2003. ITI 2003.

    Google Scholar 

  23. Vitharana, P. (2003). Risks and challenges of component-based software development. Communications of the ACM, 46(8), 67-72.

    Google Scholar 

  24. Parizi, R. M., Ghani, A. A. A., Lee, S. P., & Khan, S. U. R. (2017). RAMBUTANS: automatic AOP-specific test generation tool. International Journal on Software Tools for Technology Transfer, 19(6), 743-761.

    Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Ali Dehghantanha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Verify currency and authenticity via CrossMark

Cite this chapter

Parizi, R.M., Dehghantanha, A., Choo, KK.R., Hammoudeh, M., Epiphaniou, G. (2019). Security in Online Games: Current Implementations and Challenges. In: Dehghantanha, A., Choo, KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-10542-6

  • Online ISBN: 978-3-030-10543-3

  • eBook Packages: Computer ScienceComputer Science (R0)