Title: Protecting peer-to-peer-based massively multiplayer online games

Authors: Willy Susilo; Yang-Wai Chow; Rungrat Wiangsripanawan

Addresses: Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Northfields Avenue, NSW 2522, Australia ' Advanced Multimedia Research Laboratory, School of Computer Science and Software Engineering, University of Wollongong, Northfields Avenue, NSW 2522, Australia ' Department of Computer Science, Faculty of Science, King Mongkut's Institute of Technology Ladkrabang, Lat Krabang, Bangkok 10520, Thailand

Abstract: The rapidly growing popularity of massively multiplayer online games (MMOGs) has given rise to an increase in the number of players worldwide. MMOGs enable many players to interact together through a shared sense of presence created by the game environment. The peer-to-peer (P2P) network topology overcomes communication bottleneck problems associated with centralised client/server systems. However, many architectures are proposed in an ad hoc manner and enhancing the security of such systems is an elusive research problem. In this paper, we address this important issue by making the following contributions. Firstly, we formalise the notion of P2P-based MMOGs and demonstrate that existing P2P-based MMOG architectures can be unified using our model. To our knowledge, this is the first time that this has been done in the literature. Secondly, we use our model to develop a real-time cheating detection mechanism to identify cheating players, which can be used to expose several MMOG cheating strategies. In addition, we propose a new reputation-based system as well as a blacklisting system for P2P-based MMOGs to enhance the cheating detection process. Finally, we discuss the concept of protecting MMOGs against cheating using automated programmes.

Keywords: massively multiplayer online games; P2P MMOGs; peer-to-peer networks; real-time cheating detection; game cheats; reputation based systems; blacklisting systems; MMOG security; network security.

DOI: 10.1504/IJCSE.2015.068837

International Journal of Computational Science and Engineering, 2015 Vol.10 No.3, pp.293 - 305

Received: 30 Nov 2012
Accepted: 06 Dec 2012

Published online: 15 Apr 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article