請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27710
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 黃寶儀(Polly Huang) | |
dc.contributor.author | Cheng-Chun Lou | en |
dc.contributor.author | 羅成俊 | zh_TW |
dc.date.accessioned | 2021-06-12T18:16:41Z | - |
dc.date.available | 2007-09-03 | |
dc.date.copyright | 2007-09-03 | |
dc.date.issued | 2007 | |
dc.date.submitted | 2007-08-30 | |
dc.identifier.citation | [1] J. J. Yan and H.-J. Choi, “Security issues in online games,' The Electronic
Library, vol. 20, no. 2, pp. 125{133(9), 2002. [2] J. Yan and B. Randell, “A systematic classification of cheating in online games,' in Proceedings of 4th ACM SIGCOMM workshop on Network and system sup- port for games (NetGames'05), 2005. [3] K.-T. Chen, J.-W. Jiang, P. Huang, H.-H. Chu, C.-L. Lei, and W.-C. Chen, “Identifying mmorpg bots: A traffic analysis approach,' in Proceedings of ACM SIGCHI ACE, 2006. [4] N. E. Baughman and B. N. Levine, “Cheat-proof playout for centralized and distributed online games,' in INFOCOM, 2001, pp. 104{113. [5] C. GauthierDickey, D. Zappala, V. Lo, and J. Marr, “Low latency and cheat- proof event ordering protocol for peer-to-peer games,' in Proceedings of ACM NOSSDAV, 2004. [6] J. Brun, F. Safaei, and P. Boustead, “Fairness and playability in online mul- tiplayer games,' in Proceedings of the 2nd IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME'06), Jan 2006. [7] S. F. Yeung, J. C. S. Lui, J. Liu, and J. Yan, “Detecting cheaters for multiplayer games: Theory, design and implementation,' in Proceedings of IEEE Consumer Communications and Networking Conference (CCNC'06), 2006. [8] P. Kabus, W. W. Terpstra, M. Cilia, and A. P. Buchmann, “Addressing cheating in distributed mmogs,' in Proceedings of 4th ACM SIGCOMM workshop on NetGames, Oct 2005. [9] I. MacInnes and L. Hu, “Business models and operational issues in the chinese online game industry,' Telematics and Informatics, vol. 24, no. 2, pp. 130{144, 2007. [10] Blizzard Entertainment - WarCraft iii. [Online]. Available: http://www.blizzard.com/war3/ [11] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigentrust al- gorithm for reputation management in p2p networks,' in Proceedings of the Twelfth International World Wide Web Conference, 2003. [12] K. Walsh and E. G. Sirer, “Experience with a distributed object reputation system for peer-to-peer file sharing,' in Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI06), May 2006. [13] L. Mui, M. Mohtashemi, and A. Halberstadt, “Notions of reputation in multi- agents systems: a review,' in Proceedings of First International Joint Confer- ence on Autonomous Agents and Multiagent Systems, 2002, pp. 280{287. [14] M. Schillo, P. Funk, and M. Rovatsos, “Using trust for detecting deceitful agents in artificial societies,' Applied Artificial Intelligence, vol. 14, no. 8, pp. 825{848, 2000. [15] D. Houser and J. Wooders, “Reputation in auctions: Theory and evidence from ebay,' Economics & Management Strategy, vol. 15, pp. 353{369, 2006. [16] C. Dellarocas, “Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems,' in ICIS, 2000, pp. 520{525. [17] R. Bhattacharjee and A. Goel, “Avoiding ballot stuffing in ebay-like reputation systems,' in Proceeding of the ACM SIGCOMM workshop on Economics of peer-to-peer systems (P2PECON'05), 2005, pp. 133{137. [18] eBay. [Online]. Available: http://www.ebay.com/ [19] Q. Lian, Z. Zhang, B. Y. Zhao, Y. Dai, and X. Li, “An empirical study of col- lusion behavior in the maze p2p ‾le-sharing system,' in Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007. [20] C. Dellarocas, “Building trust on-line: The design of reliable reputation re- porting mechanisms for online trading communities,' Center for EBusiness Working Paper 101, MIT Sloan School of Management, 2001. [21] M. Rennhard and B. Plattner, “Introducing morphmix: peer-to-peer based anonymous internet usage with collusion detection,' in Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society (WPES'02). New York, NY, USA: ACM Press, 2002, pp. 91{102. [22] V. P. Janeja, V. Atluri, J. Vaidya, and N. R. Adam, “Collusion set detection through outlier discovery,' in Proceedings of IEEE Intelligence and Security Informatics, 2005. [23] C. Dellarocas, “Immunizing online reputation reporting system against unfair ratings and discriminatory behavior,' in Proceedings of the 2nd ACM conference on Electronic Commerce, 2000, pp. 150{157. [24] A. Withby, A. Joang, and J. Indulska, “Filtering out unfair ratings in bayesian reputation systems,' in Proceedings of the 7th Int. Workshop on Trust in Agent Societies (AAMAS'04), 2004. [25] M. Chen and J. P. Singh, “Computing and using reputations for internet rat- ings,' in Proceedings of the 3th ACM Conference on Electronic Commerce (EC'01), Oct 2001. [26] S. Buchegger and J.-Y. L. Boudec, “A robust reputation system for mobile ad-hoc networks,' in Proceedings of the 2th Workshop on Economics of Peer- to-Peer Systems, 2004. [27] B. A. Huberman and F. Wu, “The dynamics of reputations,' Statistical Me- chanics: Theory and Experiment, 2004. [28] A. K. Jain, R. P. Duin, and J. Mao, “Statistical pattern recognition: A review,' IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 1, pp. 4{37, 2000. [29] A. K. Jain, M. N. Murty, and P. J. Flynn, “Data clustering: A review,' ACM Computing Surveys (C SUR), vol. 31, no. 3, pp. 264{323, September 1999. [30] G. K. Palshikar and M. M. Apte, “Collusion set detection using graph cluster- ing,' in Proceedings of the 11th International Conference on Management of Data (COMAD'05), 2005. [31] R. A. Hannemann. Introduction to social network methods. [Online]. Available: http://wizard.ucr.edu/rhannema/networks/text/textindex.html [32] M. T. Schlosser, T. E. Condie, and S. D. Kamvar, “Simulating a File-sharing p2p network,' in Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing, 2003. [33] iResearch inc. [Online]. Available: http://www.iresearch.com.cn/html/online game/detail views id 25996.html [34] World of Warcraft. [Online]. Available: http://www.worldofwarcraft.com/index.xml [35] Jaccard similarity coefficient. [Online]. Available: http://en.wikipedia.org/wiki/Jaccard index | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/27710 | - |
dc.description.abstract | 近來「大型多人線上角色扮演遊戲」十分受歡迎,然而傳統線上遊戲所面臨之玩家作弊行為一樣存在於此類遊戲,並且持續地增加當中,其中最常見的作弊方式即是遊戲自動程式的使用。要讓遊戲本身能自動偵測遊戲自動程式十分困難,因此一些遊戲公司嘗試使用投票機制來防範作弊,玩家可於遊戲中藉由投票的方式直接檢舉行為可疑的玩家。使用這樣的投票系統,隨之而來的是一個十分重要且待解決的議題---惡意共謀毀謗。惡意玩家在共謀後蓄意的投票檢舉毀謗其他合法玩家,使得投票機制無法公平正確地運作。
在此論文中,我們提出基於投票歷史紀錄(包括投票者與被投票者之間的關係)的兩種偵測機制,用來找出毀謗合法玩家的單個或多個惡意玩家群。機制一是從投票者的角度出發,直接地偵測出惡意玩家群;機制二則是從被投票者的角度找出受害的正當玩家群,再間接地找到惡意玩家群。我們經由模擬來顯現這兩種機制的偵測能力,實驗顯示當惡意玩家群的毀謗次數達到三次與五次時,本文所提之機制其偵測正確率分別可以超過83%與97%。最後,經由一系列於不同遊戲環境之實驗顯示,我們所提之判斷機制皆能適應並且仍然保有良好的偵測效能。 | zh_TW |
dc.description.abstract | In recent years, MMORPGs have become extremely popular; however, the cheating seen in traditional online games has also been increasing in MMORPG. One of the most common forms of cheating in MMORPG is the increased use of game bots, i.e., auto-playing game clients. Because of the difficulty of automatically detecting a game bot, some game companies have begun to use voting schemes, in which each player can vote that another suspicious player is a game bot. However, in a voting-based system, collusion, e.g., unfairly low ratings ('bad-mouthing'), is a critical concern to be resolved.
In this work, we propose two mechanisms based on the vote history of the voter and the votee to detect a collusion cluster whether it be a single cluster or multiple clusters: 1) voter-based collusion cluster detection, and 2) votee-voter-based collusion cluster detection. Detection accuracy can exceed 83% and 97% when the collusion cluster bad-mouths three times and five times, respectively. In addition, we evaluate our schemes under different environments, and high quality performance is maintained. | en |
dc.description.provenance | Made available in DSpace on 2021-06-12T18:16:41Z (GMT). No. of bitstreams: 1 ntu-96-R94921042-1.pdf: 802944 bytes, checksum: 7ea7cb0b6d02ecfd27ed789e0fe2f24e (MD5) Previous issue date: 2007 | en |
dc.description.tableofcontents | 1 Introduction 1
2 Related Work 4 2.1 Reputation System and Collusion . . . . . . . . . . . . . . . . . . . . 4 2.2 Collusion Detection and Prevention . . . . . . . . . . . . . . . . . . . 5 2.3 Classi‾cation and Clustering . . . . . . . . . . . . . . . . . . . . . . . 6 3 Collusion Cluster Detection Mechanism 7 3.1 System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 3.2 Collusion Cluster Detection Algorithm . . . . . . . . . . . . . . . . . 8 3.2.1 Voter-Based Collusion Cluster Detection . . . . . . . . . . . . 8 3.2.2 Votee-Voter-Based Collusion Cluster Detection . . . . . . . . . 12 4 Simulation Setup 20 5 Experiment Results and Discussions 24 5.1 Threshold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.1.1 Voter-Based Collusion Cluster Detection . . . . . . . . . . . . 24 5.1.2 Voter-Votee-Based Collusion Cluster Detection . . . . . . . . . 25 5.2 The Sensitivity of Accuracy to the Number of Attacks . . . . . . . . . 27 5.3 The Sensitivity of Accuracy to the Number of Players in a Collusion Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 5.4 Vote Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 5.4.1 Attack Probability of Collusive Players . . . . . . . . . . . . . 30 5.4.2 Vote Count . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 5.5 Unrelated Experimental Factors . . . . . . . . . . . . . . . . . . . . . 34 5.5.1 Number of Players . . . . . . . . . . . . . . . . . . . . . . . . 34 5.5.2 Legitimate Player Ratio . . . . . . . . . . . . . . . . . . . . . 34 5.5.3 Erroneous Vote Ratio . . . . . . . . . . . . . . . . . . . . . . . 34 6 Conclusion 37 Bibliography 38 | |
dc.language.iso | en | |
dc.title | 偵測線上遊戲作弊檢舉系統中的毀謗行為 | zh_TW |
dc.title | Detecting Bad Mouthing Attacks in Bot Voting Systems for Online Games | en |
dc.type | Thesis | |
dc.date.schoolyear | 95-2 | |
dc.description.degree | 碩士 | |
dc.contributor.coadvisor | 陳存暘(Chun-Yang Chen) | |
dc.contributor.oralexamcommittee | 朱浩華,陳伶志 | |
dc.subject.keyword | 大型多人線上角色扮演遊戲,遊戲自動程式,名譽系統,共謀偵測,社會網路, | zh_TW |
dc.subject.keyword | MMORPG,game bot,reputation system,collusion detection,social network, | en |
dc.relation.page | 42 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2007-08-30 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-96-1.pdf 目前未授權公開取用 | 784.12 kB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。