370 likes | 491 Views
Peter Laurens, Richard F. Paige, Phillip J. Brooke, and Howard Chivers Department of Computer Science, University of York, UK School of Computing, University of Teesside, Middlesbrough, UK Cranfield University, Shrivenham, UK.
E N D
Peter Laurens, Richard F. Paige, Phillip J. Brooke, and Howard Chivers Department of Computer Science, University of York, UK School of Computing, University of Teesside, Middlesbrough, UK Cranfield University, Shrivenham, UK A Novel Approach to the Detection of Cheating in Multiplayer Online Games
Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results
Introduction • This paper is focus on the game “Counter-Strike” • Types of cheats: • Virtual doping • Extra-sensory abilities • Information exposure • Cheats cause legitimate users angry
Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results
Common Techniques • Hard-coded Hacks • External Hacks • Environment Hacks • Hook Hacks • Packet Tampering
Hard-coded • Rudimentary • Implemented by replacing code • Easy to detect
External Hacks • Separate process
Environment Hacks • Altering the computing environment
Hook Hacks • In Chinese, 外掛 • Run the game from inside a launch harness process.
Packet Tampering • Entirely separate machine, like proxy. • Very difficult to detect, but difficult to implement
Common Cheat Implementation • Wall-hacking • See through walls. • Aim-bots • Auto aim enemy. • ESP • Extra-Sensory Perception, like MAP.
Common Cheat Implementation • Bang-hacking • Anti blinding grenades. • Cross-hair • Reinstate the cross-hair. • Content-based Cheats • Modifying the game content.
Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results
Commercial Tools • VAC • Valve Software • PunkBuster • Even Balance Inc • Cheating-Death • United Admin • HLGuard
Common Mechanisms • Memory-scanning • For known cheat-hooks. • Authorization-servers • Indicate trustworthy users. • Content-hashing • For hard-coded cheat. • Screenshotting • Visually confirm suspicions.
Common Mechanisms • API/Driver scans • Monitor driver and API-based exploits. • Delayed bans • In order to caught more cheaters. • Anti-wallhack • Not draw opponents behind walls. • Anti-crosshair • Check program running above the game.
Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results
Current Methods’ Disadvantages • Reactive • Expensive • Update distribution time • New flaws in patches • Delayed banned cause damage
Novel Method Advantages • Relies on traces, not cheat. • Future exploits offer no advantage • Refrain from using advantage from cheat. • Less pressure • Entirely on server side • Portable
Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results
Trace • Record what player “looking” at • Two types filters used in this paper • World filter • Entity filter • Illegal traces • Entity traces passes through opaque.
Noticeable Differences • Frequency of illegal traces • Higher for cheaters. • Distance to world material • Smaller for cheaters. • Distance to illegal traces • Smaller for cheaters. • Consecutivity of illegal traces • Higher for cheaters.
Score Algorithm • Use “cheat-score” to detect. • Fundamental parameters. • X = the set of all traces. • I = the set of all illegal traces. • Xplayer= the set of all traces for the player analyzed. • Iplayer = the set of all illegal traces for the player analyzed.
Score Algorithm • Algorithm
Outline • Introduction • Current Methods of Cheating • Current Methods of Counter-Cheating • Advantages of Behavioral-Monitoring Approach • Approach Implementation • Preliminary Results
Conclusion • The results are good, the novel method works! • It is highly portable. • Future work • Assessment and tuning of the metrics used. • Development and assessment of new metrics.
End • Thank you!