1 / 37

A Novel Approach to the Detection of Cheating in Multiplayer Online Games

Peter Laurens, Richard F. Paige, Phillip J. Brooke, and Howard Chivers Department of Computer Science, University of York, UK School of Computing, University of Teesside, Middlesbrough, UK Cranfield University, Shrivenham, UK.

qamra
Télécharger la présentation

A Novel Approach to the Detection of Cheating in Multiplayer Online Games

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Peter Laurens, Richard F. Paige, Phillip J. Brooke, and Howard Chivers Department of Computer Science, University of York, UK School of Computing, University of Teesside, Middlesbrough, UK Cranfield University, Shrivenham, UK A Novel Approach to the Detection of Cheating in Multiplayer Online Games

  2. Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results

  3. Introduction • This paper is focus on the game “Counter-Strike” • Types of cheats: • Virtual doping • Extra-sensory abilities • Information exposure • Cheats cause legitimate users angry

  4. Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results

  5. Common Techniques • Hard-coded Hacks • External Hacks • Environment Hacks • Hook Hacks • Packet Tampering

  6. Hard-coded • Rudimentary • Implemented by replacing code • Easy to detect

  7. External Hacks • Separate process

  8. Environment Hacks • Altering the computing environment

  9. Hook Hacks • In Chinese, 外掛 • Run the game from inside a launch harness process.

  10. Packet Tampering • Entirely separate machine, like proxy. • Very difficult to detect, but difficult to implement

  11. Common Cheat Implementation • Wall-hacking • See through walls. • Aim-bots • Auto aim enemy. • ESP • Extra-Sensory Perception, like MAP.

  12. Common Cheat Implementation • Bang-hacking • Anti blinding grenades. • Cross-hair • Reinstate the cross-hair. • Content-based Cheats • Modifying the game content.

  13. Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results

  14. Commercial Tools • VAC • Valve Software • PunkBuster • Even Balance Inc • Cheating-Death • United Admin • HLGuard

  15. Common Mechanisms • Memory-scanning • For known cheat-hooks. • Authorization-servers • Indicate trustworthy users. • Content-hashing • For hard-coded cheat. • Screenshotting • Visually confirm suspicions.

  16. Common Mechanisms • API/Driver scans • Monitor driver and API-based exploits. • Delayed bans • In order to caught more cheaters. • Anti-wallhack • Not draw opponents behind walls. • Anti-crosshair • Check program running above the game.

  17. Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results

  18. Traditional Lifecycle

  19. Current Methods’ Disadvantages • Reactive • Expensive • Update distribution time • New flaws in patches • Delayed banned cause damage

  20. Novel Method Advantages • Relies on traces, not cheat. • Future exploits offer no advantage • Refrain from using advantage from cheat. • Less pressure • Entirely on server side • Portable

  21. Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results

  22. Architecture

  23. Trace • Record what player “looking” at • Two types filters used in this paper • World filter • Entity filter • Illegal traces • Entity traces passes through opaque.

  24. Noticeable Differences • Frequency of illegal traces • Higher for cheaters. • Distance to world material • Smaller for cheaters. • Distance to illegal traces • Smaller for cheaters. • Consecutivity of illegal traces • Higher for cheaters.

  25. Frequency for Illegal Traces

  26. Distance to World Material

  27. Distance to World Material

  28. Distance to Illegal Traces

  29. Consecutivity of Illegal Traces

  30. Score Algorithm • Use “cheat-score” to detect. • Fundamental parameters. • X = the set of all traces. • I = the set of all illegal traces. • Xplayer= the set of all traces for the player analyzed. • Iplayer = the set of all illegal traces for the player analyzed.

  31. Score Algorithm • Algorithm

  32. Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results

  33. Results

  34. Results

  35. Results

  36. Conclusion • The results are good, the novel method works! • It is highly portable. • Future work • Assessment and tuning of the metrics used. • Development and assessment of new metrics.

  37. End • Thank you!

More Related