Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27710
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor黃寶儀(Polly Huang)
dc.contributor.authorCheng-Chun Louen
dc.contributor.author羅成俊zh_TW
dc.date.accessioned2021-06-12T18:16:41Z-
dc.date.available2007-09-03
dc.date.copyright2007-09-03
dc.date.issued2007
dc.date.submitted2007-08-30
dc.identifier.citation[1] J. J. Yan and H.-J. Choi, “Security issues in online games,' The Electronic
Library, vol. 20, no. 2, pp. 125{133(9), 2002.
[2] J. Yan and B. Randell, “A systematic classification of cheating in online games,'
in Proceedings of 4th ACM SIGCOMM workshop on Network and system sup-
port for games (NetGames'05), 2005.
[3] K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen,
“Identifying mmorpg bots: A traffic analysis approach,' in Proceedings of ACM
SIGCHI ACE, 2006.
[4] N. E. Baughman and B. N. Levine, “Cheat-proof playout for centralized and
distributed online games,' in INFOCOM, 2001, pp. 104{113.
[5] C. GauthierDickey, D. Zappala, V. Lo, and J. Marr, “Low latency and cheat-
proof event ordering protocol for peer-to-peer games,' in Proceedings of ACM
NOSSDAV, 2004.
[6] J. Brun, F. Safaei, and P. Boustead, “Fairness and playability in online mul-
tiplayer games,' in Proceedings of the 2nd IEEE International Workshop on
Networking Issues in Multimedia Entertainment (NIME'06), Jan 2006.
[7] S. F. Yeung, J. C. S. Lui, J. Liu, and J. Yan, “Detecting cheaters for multiplayer
games: Theory, design and implementation,' in Proceedings of IEEE Consumer
Communications and Networking Conference (CCNC'06), 2006.
[8] P. Kabus, W. W. Terpstra, M. Cilia, and A. P. Buchmann, “Addressing cheating
in distributed mmogs,' in Proceedings of 4th ACM SIGCOMM workshop on
NetGames, Oct 2005.
[9] I. MacInnes and L. Hu, “Business models and operational issues in the chinese
online game industry,' Telematics and Informatics, vol. 24, no. 2, pp. 130{144,
2007.
[10] Blizzard Entertainment - WarCraft iii. [Online]. Available:
http://www.blizzard.com/war3/
[11] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust al-
gorithm for reputation management in p2p networks,' in Proceedings of the
Twelfth International World Wide Web Conference, 2003.
[12] K. Walsh and E. G. Sirer, “Experience with a distributed object reputation
system for peer-to-peer file sharing,' in Proceedings of the 3rd Symposium on
Networked Systems Design and Implementation (NSDI06), May 2006.
[13] L. Mui, M. Mohtashemi, and A. Halberstadt, “Notions of reputation in multi-
agents systems: a review,' in Proceedings of First International Joint Confer-
ence on Autonomous Agents and Multiagent Systems, 2002, pp. 280{287.
[14] M. Schillo, P. Funk, and M. Rovatsos, “Using trust for detecting deceitful agents
in artificial societies,' Applied Artificial Intelligence, vol. 14, no. 8, pp. 825{848,
2000.
[15] D. Houser and J. Wooders, “Reputation in auctions: Theory and evidence from
ebay,' Economics & Management Strategy, vol. 15, pp. 353{369, 2006.
[16] C. Dellarocas, “Mechanisms for coping with unfair ratings and discriminatory
behavior in online reputation reporting systems,' in ICIS, 2000, pp. 520{525.
[17] R. Bhattacharjee and A. Goel, “Avoiding ballot stuffing in ebay-like reputation
systems,' in Proceeding of the ACM SIGCOMM workshop on Economics of
peer-to-peer systems (P2PECON'05), 2005, pp. 133{137.
[18] eBay. [Online]. Available: http://www.ebay.com/
[19] Q. Lian, Z. Zhang, B. Y. Zhao, Y. Dai, and X. Li, “An empirical study of col-
lusion behavior in the maze p2p ‾le-sharing system,' in Proceedings of the 27th
IEEE International Conference on Distributed Computing Systems (ICDCS
2007), 2007.
[20] C. Dellarocas, “Building trust on-line: The design of reliable reputation re-
porting mechanisms for online trading communities,' Center for EBusiness
Working Paper 101, MIT Sloan School of Management, 2001.
[21] M. Rennhard and B. Plattner, “Introducing morphmix: peer-to-peer based
anonymous internet usage with collusion detection,' in Proceedings of the 2002
ACM workshop on Privacy in the Electronic Society (WPES'02). New York,
NY, USA: ACM Press, 2002, pp. 91{102.
[22] V. P. Janeja, V. Atluri, J. Vaidya, and N. R. Adam, “Collusion set detection
through outlier discovery,' in Proceedings of IEEE Intelligence and Security
Informatics, 2005.
[23] C. Dellarocas, “Immunizing online reputation reporting system against unfair
ratings and discriminatory behavior,' in Proceedings of the 2nd ACM conference
on Electronic Commerce, 2000, pp. 150{157.
[24] A. Withby, A. Joang, and J. Indulska, “Filtering out unfair ratings in bayesian
reputation systems,' in Proceedings of the 7th Int. Workshop on Trust in Agent
Societies (AAMAS'04), 2004.
[25] M. Chen and J. P. Singh, “Computing and using reputations for internet rat-
ings,' in Proceedings of the 3th ACM Conference on Electronic Commerce
(EC'01), Oct 2001.
[26] S. Buchegger and J.-Y. L. Boudec, “A robust reputation system for mobile
ad-hoc networks,' in Proceedings of the 2th Workshop on Economics of Peer-
to-Peer Systems, 2004.
[27] B. A. Huberman and F. Wu, “The dynamics of reputations,' Statistical Me-
chanics: Theory and Experiment, 2004.
[28] A. K. Jain, R. P. Duin, and J. Mao, “Statistical pattern recognition: A review,'
IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 1,
pp. 4{37, 2000.
[29] A. K. Jain, M. N. Murty, and P. J. Flynn, “Data clustering: A review,' ACM
Computing Surveys (C SUR), vol. 31, no. 3, pp. 264{323, September 1999.
[30] G. K. Palshikar and M. M. Apte, “Collusion set detection using graph cluster-
ing,' in Proceedings of the 11th International Conference on Management of
Data (COMAD'05), 2005.
[31] R. A. Hannemann. Introduction to social network methods. [Online]. Available:
http://wizard.ucr.edu/rhannema/networks/text/textindex.html
[32] M. T. Schlosser, T. E. Condie, and S. D. Kamvar, “Simulating a File-sharing
p2p network,' in Proceedings of the 1st Workshop on Semantics in P2P and
Grid Computing, 2003.
[33] iResearch inc. [Online]. Available:
http://www.iresearch.com.cn/html/online game/detail views id 25996.html
[34] World of Warcraft. [Online]. Available:
http://www.worldofwarcraft.com/index.xml
[35] Jaccard similarity coefficient. [Online]. Available: http://en.wikipedia.org/wiki/Jaccard index
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27710-
dc.description.abstract近來「大型多人線上角色扮演遊戲」十分受歡迎,然而傳統線上遊戲所面臨之玩家作弊行為一樣存在於此類遊戲,並且持續地增加當中,其中最常見的作弊方式即是遊戲自動程式的使用。要讓遊戲本身能自動偵測遊戲自動程式十分困難,因此一些遊戲公司嘗試使用投票機制來防範作弊,玩家可於遊戲中藉由投票的方式直接檢舉行為可疑的玩家。使用這樣的投票系統,隨之而來的是一個十分重要且待解決的議題---惡意共謀毀謗。惡意玩家在共謀後蓄意的投票檢舉毀謗其他合法玩家,使得投票機制無法公平正確地運作。
在此論文中,我們提出基於投票歷史紀錄(包括投票者與被投票者之間的關係)的兩種偵測機制,用來找出毀謗合法玩家的單個或多個惡意玩家群。機制一是從投票者的角度出發,直接地偵測出惡意玩家群;機制二則是從被投票者的角度找出受害的正當玩家群,再間接地找到惡意玩家群。我們經由模擬來顯現這兩種機制的偵測能力,實驗顯示當惡意玩家群的毀謗次數達到三次與五次時,本文所提之機制其偵測正確率分別可以超過83%與97%。最後,經由一系列於不同遊戲環境之實驗顯示,我們所提之判斷機制皆能適應並且仍然保有良好的偵測效能。
zh_TW
dc.description.abstractIn recent years, MMORPGs have become extremely popular; however, the cheating seen in traditional online games has also been increasing in MMORPG. One of the most common forms of cheating in MMORPG is the increased use of game bots, i.e., auto-playing game clients. Because of the difficulty of automatically detecting a game bot, some game companies have begun to use voting schemes, in which each player can vote that another suspicious player is a game bot. However, in a voting-based system, collusion, e.g., unfairly low ratings ('bad-mouthing'), is a critical concern to be resolved.
In this work, we propose two mechanisms based on the vote history of the voter and the votee to detect a collusion cluster whether it be a single cluster or multiple clusters: 1) voter-based collusion cluster detection, and 2) votee-voter-based collusion cluster detection. Detection accuracy can exceed 83% and 97% when the collusion cluster bad-mouths three times and five times, respectively. In addition, we evaluate our schemes under different environments, and high quality performance is maintained.
en
dc.description.provenanceMade available in DSpace on 2021-06-12T18:16:41Z (GMT). No. of bitstreams: 1
ntu-96-R94921042-1.pdf: 802944 bytes, checksum: 7ea7cb0b6d02ecfd27ed789e0fe2f24e (MD5)
Previous issue date: 2007
en
dc.description.tableofcontents1 Introduction 1
2 Related Work 4
2.1 Reputation System and Collusion . . . . . . . . . . . . . . . . . . . . 4
2.2 Collusion Detection and Prevention . . . . . . . . . . . . . . . . . . . 5
2.3 Classi‾cation and Clustering . . . . . . . . . . . . . . . . . . . . . . . 6
3 Collusion Cluster Detection Mechanism 7
3.1 System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Collusion Cluster Detection Algorithm . . . . . . . . . . . . . . . . . 8
3.2.1 Voter-Based Collusion Cluster Detection . . . . . . . . . . . . 8
3.2.2 Votee-Voter-Based Collusion Cluster Detection . . . . . . . . . 12
4 Simulation Setup 20
5 Experiment Results and Discussions 24
5.1 Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
5.1.1 Voter-Based Collusion Cluster Detection . . . . . . . . . . . . 24
5.1.2 Voter-Votee-Based Collusion Cluster Detection . . . . . . . . . 25
5.2 The Sensitivity of Accuracy to the Number of Attacks . . . . . . . . . 27
5.3 The Sensitivity of Accuracy to the Number of Players in a Collusion
Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.4 Vote Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.4.1 Attack Probability of Collusive Players . . . . . . . . . . . . . 30
5.4.2 Vote Count . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
5.5 Unrelated Experimental Factors . . . . . . . . . . . . . . . . . . . . . 34
5.5.1 Number of Players . . . . . . . . . . . . . . . . . . . . . . . . 34
5.5.2 Legitimate Player Ratio . . . . . . . . . . . . . . . . . . . . . 34
5.5.3 Erroneous Vote Ratio . . . . . . . . . . . . . . . . . . . . . . . 34
6 Conclusion 37
Bibliography 38
dc.language.isoen
dc.subject遊戲自動程式zh_TW
dc.subject共謀偵測zh_TW
dc.subject社會網路zh_TW
dc.subject名譽系統zh_TW
dc.subject大型多人線上角色扮演遊戲zh_TW
dc.subjectcollusion detectionen
dc.subjectMMORPGen
dc.subjectgame boten
dc.subjectsocial networken
dc.subjectreputation systemen
dc.title偵測線上遊戲作弊檢舉系統中的毀謗行為zh_TW
dc.titleDetecting Bad Mouthing Attacks in Bot Voting Systems for Online Gamesen
dc.typeThesis
dc.date.schoolyear95-2
dc.description.degree碩士
dc.contributor.coadvisor陳存暘(Chun-Yang Chen)
dc.contributor.oralexamcommittee朱浩華,陳伶志
dc.subject.keyword大型多人線上角色扮演遊戲,遊戲自動程式,名譽系統,共謀偵測,社會網路,zh_TW
dc.subject.keywordMMORPG,game bot,reputation system,collusion detection,social network,en
dc.relation.page42
dc.rights.note有償授權
dc.date.accepted2007-08-30
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-96-1.pdf
  未授權公開取用
784.12 kBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved