Font Size: a A A

Research And Application Of Plug-in And Anti-plug-in Technology For Online Games

Posted on:2020-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:C LiuFull Text:PDF
GTID:2428330578465831Subject:Engineering
Abstract/Summary:PDF Full Text Request
In recent years,network security incidents have occurred frequently,blackmail virus has swept the world,Facebook and Yuantong Express have leaked 1 billion data,which has brought serious disasters to the industry and users.As one of the representatives of the emerging Internet industry,online game industry is suffering from security problems while growing rapidly.This year's popular "Jedi Survival" is a rampant plug-in,which leads to a large loss of users and seriously damages the interests of developers and the healthy development of the industry.The purpose of this research is to find a way to solve the difficulties faced by current game developers,to maintain the healthy and stable development of online games,and to provide a strong guarantee for the development of the industry.The main contents and innovative results of this paper are as follows:(1)Studying and analyzing the current plug-in technology of online games,sorting out and summarizing its technical types,and dividing the plug-in of online games into four categories according to its functions and technologies: analog plug-in,memory modification plug-in,packet plug-in and offline plug-in.(2)To sort out and analyze the current anti-plug-in technology,according to its functional characteristics and design ideas,it can be divided into two categories: one is data encryption,whose design ideas are: encrypting game data and eliminating plug-in as much as possible;the other is data detection,whose design ideas are: to detect the behavior of using plug-in;Let plug-in users expose their behavior as much as possible.(3)Take a perfect world company's competitive online game "Genesis Chariot" as an example,reverse analysis and dynamic analysis are used to reverse the game's weapon quasi-star address,character array address and so on,and simulate the whole process of plug-in producer's cracking game data encryption.(4)A self-aiming algorithm of weapon is designed by using the relevant game addresses which are reversed,so that the mouse pointer,i.e.the weapon target,can automatically and continuously correspond with the position coordinates of the enemy,thus realizing the automatic aiming function.(5)Aiming at the development of automatic targeting class plug-in,based on the anti-plug technology of data detection class,the defense idea and design process of this kind of plug-in are proposed.
Keywords/Search Tags:Network games, Plug-in, Encryption and decryption, Reverse analysis
PDF Full Text Request
Related items