Identity authentication based on keystroke latencies
Communications of the ACM
The recurrent cascade-correlation architecture
NIPS-3 Proceedings of the 1990 conference on Advances in neural information processing systems 3
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Self-similarity and heavy tails: structural modeling of network traffic
A practical guide to heavy tails
User authentication through keystroke dynamics
ACM Transactions on Information and System Security (TISSEC)
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
Low latency and cheat-proof event ordering for peer-to-peer games
NOSSDAV '04 Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video
A cheat controlled protocol for centralized online multiplayer games
Proceedings of 3rd ACM SIGCOMM workshop on Network and system support for games
Typing Patterns: A Key to User Identification
IEEE Security and Privacy
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Preventing bots from playing online games
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
A systematic classification of cheating in online games
NetGames '05 Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games
Identifying MMORPG bots: a traffic analysis approach
Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology
A semantics-based approach to malware detection
Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Protecting online games against cheating
NetGames '06 Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
Behavior-based spyware detection
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Cheating in networked computer games: a review
Proceedings of the 2nd international conference on Digital interactive media in entertainment and arts
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
Embedded noninteractive continuous bot detection
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Is a bot at the controls?: Detecting input data attacks
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
Exploiting online games: cheating massively distributed systems
Exploiting online games: cheating massively distributed systems
SS'08 Proceedings of the 17th conference on Security symposium
Measurement and classification of humans and bots in internet chat
SS'08 Proceedings of the 17th conference on Security symposium
Detection of MMORPG bots based on behavior analysis
ACE '08 Proceedings of the 2008 International Conference on Advances in Computer Entertainment Technology
Game bot identification based on manifold learning
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
Server-Side Bot Detection in Massively Multiplayer Online Games
IEEE Security and Privacy
Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the 26th Annual Computer Security Applications Conference
Artificial neural network for bot detection system in MMOGs
Proceedings of the 9th Annual Workshop on Network and Systems Support for Games
What can free money tell us on the virtual black market?
Proceedings of the ACM SIGCOMM 2011 conference
Bot detection in rhythm games: a physiological approach
Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology
Development of embedded CAPTCHA elements for bot prevention in fischer random chess
International Journal of Computer Games Technology
Trajectory analysis for user verification and recognition
Knowledge-Based Systems
Survey and research direction on online game security
Proceedings of the Workshop at SIGGRAPH Asia
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
Blog or block: Detecting blog bots through behavioral biometrics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The abuse of online games by automated programs, known as game bots, for gaining unfair advantages has plagued millions of participating players with escalating severity in recent years. The current methods for distinguishing bots and humans are based on human interactive proofs (HIPs), such as CAPTCHAs. However, HIP-based approaches have inherent drawbacks. In particular, they are too obtrusive to be tolerated by human players in a gaming context. In this paper, we propose a non-interactive approach based on human observational proofs (HOPs) for continuous game bot detection. HOPs differentiate bots from human players by passively monitoring input actions that are difficult for current bots to perform in a human-like manner. We collect a series of user-input traces in one of the most popular online games, World of Warcraft. Based on the traces, we characterize the game playing behaviors of bots and humans. Then, we develop a HOP-based game bot defense system that analyzes user-input actions with a cascade-correlation neural network to distinguish bots from humans. The HOP system is effective in capturing current game bots, which raises the bar against game exploits and forces a determined adversary to build more complicated game bots for detection evasion in the future.