Game Bot Detection Based on Avatar Trajectory

  • Kuan-Ta Chen
  • Andrew Liao
  • Hsing-Kuo Kenneth Pao
  • Hao-Hua Chu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5309)


In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generally, the gaming community disagrees with the use of game bots, as bot users obtain unreasonable rewards without corresponding efforts. However, bots are hard to detect because they are designed to simulate human game playing behavior and they follow game rules exactly. Existing detection approaches either interrupt the players’ gaming experience, or they assume game bots are run as standalone clients or assigned a specific goal, such as aim bots in FPS games.

In this paper, we propose a trajectory-based approach to detect game bots. It is a general technique that can be applied to any game in which the avatar’s movement is controlled directly by the players. Through real-life data traces, we show that the trajectories of human players and those of game bots are very different. In addition, although game bots may endeavor to simulate players’ decisions, certain human behavior patterns are difficult to mimic because they are AI-hard. Taking Quake 2 as a case study, we evaluate our scheme’s performance based on real-life traces. The results show that the scheme can achieve a detection accuracy of 95% or higher given a trace of 200 seconds or longer.


Cheating Detection Online Games Quake Security Supervised Classification User Behavior 


  1. 1.
    Golle, P., Ducheneaut, N.: Preventing bots from playing online games. Computers in Entertainment 3(3), 3 (2005)CrossRefGoogle Scholar
  2. 2.
    von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Proceedings of Eurocrypt, pp. 294–311 (2003)Google Scholar
  3. 3.
    Novak, T.P., Hoffman, D.L., Duhachek, A.: The influence of goal-directed and experiential activities on online flow experiences. Journal of Consumer Psychology 13(1), 3–16 (2003)CrossRefGoogle Scholar
  4. 4.
    Ila, S., Mizerski, D., Lam, D.: Comparing the effect of habit in the online game play of australian and indonesian gamers. In: Proceedings of the Australia and New Zealand Marketing Association Conference (2003)Google Scholar
  5. 5.
    Chen, K.T., Jiang, J.W., Huang, P., Chu, H.H., Lei, C.L., Chen, W.C.: Identifying MMORPG bots: A traffic analysis approach. In: Proceedings of ACM SIGCHI ACE 2006, Los Angeles, USA (June 2006)Google Scholar
  6. 6.
    Chen, K.T., Huang, P., Lei, C.L.: Game traffic analysis: An MMORPG perspective. Computer Networks 50(16), 3002–3023 (2006)CrossRefGoogle Scholar
  7. 7.
    Yeung, S., Lui, J., Liu, J., Yan, J.: Detecting cheaters for multiplayer games: theory, design and implementation. Proc IEEE CCNC 6, 1178–1182Google Scholar
  8. 8.
    Malakhov, M.: CR Bot 1.15 (May 2000),
  9. 9.
    Feltrin, R.R.: Eraser Bot 1.01 (May 2000),
  10. 10.
    jibe: ICE Bot 1.0 (1998),

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Kuan-Ta Chen
    • 1
  • Andrew Liao
    • 2
  • Hsing-Kuo Kenneth Pao
    • 3
  • Hao-Hua Chu
    • 2
  1. 1.Institute of Information ScienceAcademia SinicaTaiwan
  2. 2.Dept. of Computer Science & Information EngineeringNational Taiwan UniversityTaiwan
  3. 3.Dept. of Computer Science & Information EngineeringNational Taiwan Univ. of Science & TechnologyTaiwan

Personalised recommendations