The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2009 vol.7)
pp: 37-44
Jeff Yan , Newcastle University
Brian Randell , Newcastle University
Cheating is rampant in current gameplay on the Internet. However, it isn't as well understood as we might expect. The authors summarize the various known methods of cheating and define a taxonomy of online game cheating with respect to the underlying vulnerability, consequence, and cheating principal. This taxonomy provides a systematic introduction to the characteristics of cheats in online games and how they can arise. Although cheating in online games is largely due to various security failures, the four traditional aspects of security—confidentiality, integrity, availability, and authenticity—are insufficient to explain it. Instead, fairness becomes a vital additional aspect, and its enforcement provides a convincing perspective for understanding security techniques' role in developing and operating online games.
online computer games, security, cheating, taxonomy, securing online games
Jeff Yan, Brian Randell, "An Investigation of Cheating in Online Games", IEEE Security & Privacy, vol.7, no. 3, pp. 37-44, May/June 2009, doi:10.1109/MSP.2009.60
1. J. Yan and B. Randell, "A Systematic Classification of Cheating in Online Games," Proc. 4th ACM SIGCOMM Workshop on Network and System Support for Games (NetGames 05), ACM Press, 2005. pp. 1–9.
2. J. Yan and H.J. Choi, "Security Issues in Online Games," The Electronic Library, vol. 20, no. 2, 2002, pp. 125–133.
3. D. Sheff, Game Over, Hodder &Stoughton, 1993.
4. M. Pritchard, "How to Hurt the Hackers: The Scoop on Internet Cheating and How You Can Combat It," Information Security Bulletin, Feb. 2001, pp. 33–41.
5. J. Yan, "Security Design in Online Games," Proc. 19th Ann. Computer Security Applications Conf., IEEE CS Press, 2003, pp. 286–297.
6. G. Hoglund and G. McGraw, Exploiting Online Games, Addison-Wesley, 2007.
7. N. Baughman and B. Levine, "Cheat-Proof Playout for Centralized and Distributed Online Games," Proc. IEEE INFOCOM Conf. Computer Communications, IEEE Communications Soc., 2001, pp. 104–113.
8. C. Morningstar and F.R. Farmer, "The Lessons of Lucasfilm's Habitat," Cyberspace: First Steps, M. Benedikt ed., MIT Press, 1990, pp. 273–302.
9. J.C. Laprie ed., , Dependability: Basic Concepts and Terminology, Springer, 1992.
10. A. Avizienis et al., "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, vol. 1, no. 1, 2004, pp. 11–33.
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool