scispace - formally typeset
Proceedings ArticleDOI

User identification based on game-play activity patterns

Kuan-Ta Chen, +1 more
- pp 7-12
Reads0
Chats0
TLDR
This paper proposes a new biometric for human identification based on users' game-play activities, and proposes the RET scheme, which is based on the KullbackLeibler divergence between idle time distributions, for user identification.
Abstract
Account hijacking is considered one of the most serious security problems in online games A hijacker normally takes away valuable virtual items from the stolen accounts, and trades those items for real money Even though account hijacking is not uncommon, there is currently no general solutions to determine whether an account has been hijacked The game company is not aware of a hijack unless it is reported by the victim However, it is usually too late---usually a hijacker already took away anything valuable when a user finds that his/her account has been stolenIn this paper, we propose a new biometric for human identification based on users' game-play activities Our main summary are two-fold: 1) we show that the idle time distribution is a representative feature of game players; 2) we propose the RET scheme, which is based on the KullbackLeibler divergence between idle time distributions, for user identification Our evaluations shows that the RET scheme achieves higher than 90% accuracy with a 20-minute detection time given a 200-minute history size

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Identity Theft

Scott Lobdell
TL;DR: This paper explains some of the methods used by ID thieves and focuses on Phishing, a web-based social engineering method of extracting personal information for the purpose of assuming the identity of the unsuspecting.
Proceedings ArticleDOI

An Army of Me: Sockpuppets in Online Discussion Communities

TL;DR: In this article, a taxonomy of deceptive behavior in online discussion communities is presented, and a data-driven view of deception is presented for the automatic detection of sockpuppets, i.e., whether they pretend to be different users or their supportiveness.
Journal ArticleDOI

Visualization-based analysis of gameplay data – A review of literature

TL;DR: This article reviews literature on visualization-based analysis of game metric data in order to give an overview of the current state of this emerging field of research and proposes a broad categorization of visualization techniques.
Journal ArticleDOI

Online game bot detection based on party-play log analysis

TL;DR: A framework for user behavior analysis for bot detection in online games focuses on party play which reflects the social activities among gamers and builds a knowledge base of detection rules, which are generic.
Proceedings ArticleDOI

A new design for a Turing Test for Bots

TL;DR: A new design is described for a game bot programming competition, the BotPrize, which will make it simpler to run, and, it is hoped, open up new opportunities for innovative use of the testing platform.
References
More filters
Journal ArticleDOI

On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other

TL;DR: In this paper, the authors show that the limit distribution is normal if n, n$ go to infinity in any arbitrary manner, where n = m = 8 and n = n = 8.
Posted Content

On Information and Sufficiency

TL;DR: The information deviation between any two finite measures cannot be increased by any statistical operations (Markov morphisms) and is invarient if and only if the morphism is sufficient for these two measures as mentioned in this paper.
Journal ArticleDOI

An introduction to biometric recognition

TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Journal ArticleDOI

Identity authentication based on keystroke latencies

TL;DR: A method of verifying the identity of a user based on a stream of latency periods between keystrokes, and results from trial usage of the system are reported.
Related Papers (5)