As the popularity of e-commerce continues to rise, so does the level of fraud risk for financial institutions and their customers, elevating concerns over fraud risk to the C-suite. As a result, executives and boards must think beyond fraud protection to fraud prevention, which requires a working knowledge of the possible threats and solutions.
By real-time data you mean a so-called online algorithm, where data points are received time after time. The significance of a peak might be determined by values in the future. It would be nice to extend the algorithm to become online by modifying the past results without sacrificing the time complexity too much. Huber Oct 9 '19 at 12:54. Cheating in online games comes with many consequences for both players and companies. Therefore, cheating detection and prevention is an important part of developing a commercial online game.
- Baughman, N.E, Levine, B.N., Cheat-proof Playout for Centralized and Distributed Online Games, in Proc. of INFOCOM 2001, Anchorage (USA), IEEE, April 2001, 104–113.Google Scholar
- Baughman, N. E., Liberatore, M., and Levine, B. N. 2007. Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15, 1 (Feb. 2007), 1–13.Google Scholar
- Borella, M.S., Source models for network game traffic, Computer Communications, 23(4):403–410, February 2000.CrossRefGoogle Scholar
- Cecin, F.R., Real, R., de Oliveira Jannone, R., Resin Geyer, C.F., Martins, M.G., Victoria Barbosa, J.L., FreeMMG: A Scalable and Cheat-Resistant Distribution Model for Internet Games, in Proc. of International Symposium on Distributed Simulation and Real-Time Applications, Budapest (Hungary), IEEE, October 2004, 83–90.Google Scholar
- Chambers, C., Feng, W., Feng, W., and Saha, D. 2005. Mitigating information exposure to cheaters in real-time strategy games. In Proceedings of the international Workshop on Network and Operating Systems Support For Digital Audio and Video (Stevenson, Washington, USA, June 13 - 14, 2005). NOSSDAV ’05. ACM, New York, NY, 7–12.Google Scholar
- Cristian, F., Probabilistic clock synchronization, Distributed Computing, 3(3):146–158, 1989.zbMATHCrossRefGoogle Scholar
- Cristian, F., Fetzer, C., The Timed Asynchronous Distributed System Model, IEEE Transactions on Parallel and Distributed Systems, 10(6):642–657, 1999.CrossRefGoogle Scholar
- Cronin, E., Filstrup, B., Jamin, S., Kurc, A.R., An efficient synchronization mechanism for mirrored game architectures, Multimedia Tools and Applications, 23(1):7–30, May 2004.CrossRefGoogle Scholar
- Cronin, E., Filstrup, B., Jamin, S., Cheat-proofing dead reckoned multiplayer games, in Proc. of 2nd International Conference on Application and Development of Computer Games, January 2003.Google Scholar
- Drummond, R., Babaoglu, O., Low-cost clock synchronization, Distributed Computing, 6(3):193–203, 1993.zbMATHCrossRefGoogle Scholar
- GauthierDickey, C., Zappala, D., Lo, V., and Marr, J. 2004. Low latency and cheat-proof event ordering for peer-to-peer games. In Proceedings of the 14th international Workshop on Network and Operating Systems Support For Digital Audio and Video (Cork, Ireland, June 16 - 18, 2004). NOSSDAV ’04. ACM, New York, NY, 134–139.Google Scholar
- Gusella, R., Zatti, S., The accuracy of clock synchronization achieved by tempo in Berkeley Unix 4.3BSD, IEEE Transactions of Software Engineering, 15(7):47–53, July 1989.CrossRefGoogle Scholar
- Farber, J., Network game traffic modeling, in Proc. of the 1st Workshop on Network and system support for games, Braunschweig (Germany), ACM, April 2002, 53–57.Google Scholar
- Ferretti, S., Interactivity Maintenance for Event Synchronization in Massive Multiplayer Online Games, Ph.D. Thesis, Tech. Rep. UBLCS-2005–05, University of Bologna (Italy), March 2005.Google Scholar
- Ferretti, S., A Synchronization Protocol For Supporting Peer-to-Peer Multiplayer Online Games in Overlay Networks, in Proceedings of the 2nd International Conference on Distributed Event-Based Systems (DEBS’08), ACM Press, Rome (Italy), July 2008.Google Scholar
- Ferretti, S., Cheating Detection Through Game Time Modeling: A Better Way to Avoid Time Cheats in P2P MOGs?, Multimedia Tools and Applications, Springer, Volume 37, Number 3, May 2008, 339–363.Google Scholar
- Ferretti, S., Roccetti, M., AC/DC: an Algorithm for Cheating Detection by Cheating, in Proceedings of the ACM International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2006), Newport, Rhode Island (USA), ACM Press, May 2006, 136–141.Google Scholar
- Ferretti, S., Roccetti, M., Game Time Modelling for Cheating Detection in P2P MOGs: a Case Study with a Fast Rate Cheat, in Proceedings of the 5th ACM SIGCOMM Workshop on Network & System Support for Games 2006 (NETGAMES 2006), Singapore, ACM Press, October 2006.Google Scholar
- Ferretti, S., Roccetti, M., Palazzi, C.E., An Optimistic Obsolescence-Based Approach To Event Synchronization For Massive Multiplayer Online Games, International Journal of Computers and Applications, ACTA Press, Vol. 29, No. 1, February 2007, 33–43.Google Scholar
- Fiedler, U., Bernhard Plattner: Using Latency Quantiles to Engineer QoS Guarantees forWeb Services, in Proc. of the 11th International Workshop on Quality of Service, (IWQoS 2003), LNCS 2707, Springer, Berkeley, CA, USA, June 2003, 345–362.Google Scholar
- Fujimoto, R., Parallel and Distribution Simulation Systems, John Wiley and Sons, Inc., 1999.Google Scholar
- Gibbon, J.F., Little, T.D.C., The Use of Network Delay Estimation for Multimedia Data Retrieval, IEEE Journal on Selected Areas in Communications, IEEE, 14(7):1376–1387.Google Scholar
- Henderson, T., Bhatti, S., Modeling user behaviour in networked games, in Proc. of the 9th ACM International Conference on Multimedia (ACM Multimedia), Ottawa (Canada), October 2001, 212–220.Google Scholar
- Lee, H., Kozlowski, E., Lenker, S., Jamin, S., Synchronization and Cheat-Proofing Protocol for Real-Time Multiplayer Games, in Proc. of the International Workshop on Entertainment Computing, Makuari (Japan), May 2002.Google Scholar
- Liang, Y.J., Farber, N., Girod, B., Adaptive Playout Scheduling and Loss Concealment for Voice Communication over IP Networks, IEEE Transactions on Multimedia, IEEE Signal Processing Society Press, 5(4):532- 543, April 2001.Google Scholar
- Mauve, M., Vogel, J., Hilt, V., Effelsberg, W., Local-lag and timewarp: Providing consistency for replicated continuous applications, IEEE Transactions on Multimedia, 6(1):47–57, February 2004.CrossRefGoogle Scholar
- Mills, D.L., Internet time synchronization: the Network Time Protocol, IEEE Transactions on Communications, 39(10):1482–1493, October 1991.CrossRefGoogle Scholar
- Palazzi, C.E., Ferretti, S., Cacciaguerra, S., Roccetti, M., Interactivity-Loss Avoidance in Event Delivery Synchronization for Mirrored Game Architectures, IEEE Transactions on Multimedia, IEEE Signal Processing Society, Vol. 8, No. 4, August 2006, 874–879.Google Scholar
Client-side cheat detection in games using machine learning
Detection Analysis And Counter Measure Of Online Game Cheats Age Of Empires 2
Detection Analysis And Counter Measure Of Online Game Cheats Free
Supervisor(s): | Bojan KolosnjajiFatih Kilic |
Status: | finished |
Topic: | Machine Learning Methods |
Author: | Mai Ton Nu Cam |
Submission: | 2015-11-15 |
Type of Thesis: | Bachelorthesis |
Proof of Concept | No |
Astract:Statistics show that over the last years the popularity and the market share of online games has been increasing [Sta15c]. Playing with thousands of other players worldwide there is always the risk of people cheating to gain an advantage over others. This leads to an unbalance in a game and therefore unsatisfied customers from the game developers’ point of view. The goal of the gaming industry is to prevent that and to reveal as many cheats as possible to be able to consequently punish cheating players. There are many solutions for cheat detection, but the biggest problem with them is that they often rely on signatures to recognize cheats and therefore are unable to automatically adapt to new ones. Our goal is to reach a solution, in which the cheat detection program can learn to adapt to new situations without manual input. To fulfill these requirements machine learning presents itself as a suitable concept. Using Hidden Markov Models we will train the models to represent normal behavior and comparing test data to those models will yield whether a cheat has been used or not. Our assumption is that using cheats will result in deviations from the described normal behavior. With regular training the models can adapt themselves to code changes of a game and are able to even detect newly created cheats since they do not depend on prior knowledge of a cheat. |