Font Size: a A A

Research And Design Of Online Game Plug-in Detection Techniques

Posted on:2013-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:F LiFull Text:PDF
GTID:2248330395472352Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the popularity of online games, along with the rapid development of the virtualeconomy, driven by the interests, the illegal activities has increased significantly in the onlinegame environment, showing a variety of patterns. Game plug-in is one of the most prominentrepresentatives, it appears to break the game balance, and damage the interests of developersand players, the online gaming industry in order to ensure that online games in a fairenvironment, security has become an important problem.To the use of plug-in detection and prevention, first to analyze the plug works, this studyaction simulation class plug-in, modify the memory class plug, gear class plug-in, and packetplug these four commonly used plug-in works, and in accordance with packet plug features,the use of the WPE simulation produced a cut-off package of the game plug.Game plug-defense there are several, some significant effect, while others are uselessand a waste of system resources in this article which describes several different plug-inmeans of defense, but the effect is still not efficient enough, the paper that the plug-in meansof defense is the first step should be testing, only to make the correct detection of judgment todetermine whether the use of plug-in. In the large-scale multi-user online role-playing game(MMORPG), the use of plug-in is the most common, it is instead the user to achieve theoperation of the game, or to achieve some capacity, the user role in the game, every operationwill generate a log to record the role of game information, the focus of this paper is to analyzeuser behavior through comprehensive statistics on the normal behavior of players on theserver side, data collection is compared to the normal players log and use the log of the gamethe robot to determine a threshold to detect the use of plug-in.
Keywords/Search Tags:Online games, Game security, Game plug-in, BOTS, User BehaviorAnalysis
PDF Full Text Request
Related items