Multimedia Tools and Applications

, Volume 45, Issue 1–3, pp 133–161 | Cite as

On the impacts of human interactions in MMORPG traffic

  • Géza SzabóEmail author
  • András Veres
  • Sándor Molnár


Game traffic depends on two main factors, the game protocol and the gamers’ behavior. Based on a few popular real-time multiplayer games this paper investigates the latter factor showing how a set of typical game phases—e.g., player movement, changes in the environment—impacts traffic on different observation levels. The nature of human behavior has such a high impact on traffic characteristics that it influences the traffic both at a macroscopic—e.g., traffic rate—and at a microscopic—payload content—level. First, by understanding the nature of this impact a user behavior detection algorithm is introduced to grab specific events and states from passive traffic measurements. The algorithms focus on the characteristics of the traffic rate, showing what information can be gathered by observing only packet header information. Second, as an application of our method some results, including a detailed analysis of measurements taken from an operational broadband network, are presented. Third, a novel model and an algorithm are introduced to extend the Deep Packet Inspection traffic classification method with the analysis of non-fix byte signatures, which are not considered in current methods. The model captures the variation of the dynamic byte segments and provides parameters for the algorithm. The introduced algorithm exploits the spatial and temporal correlation by examining and extracting the correlation structure of the traffic and constructing signatures based on the observed correlation. The algorithm is evaluated by examining proprietary gaming traffic and also other known non-gaming protocols.


MMORPG Effects of human behavior Traffic characteristics DPI 


  1. 1.
    Abry P, Veitch D (1998) Wavelet analysis of long-range-dependent traffic. IEEE Trans Inf Theory 44(1):2–15zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    Arjona A, Westphal C, Ylä-Jääski A, Kristensson M (2008) Towards high quality VoIP in 3G networks—an empirical study. In: AICT ’08: proceedings of the 2008 fourth advanced international conference on telecommunications. IEEE Computer Society, Washington, DC, pp 143–150CrossRefGoogle Scholar
  3. 3.
    Barabási A-L (2005) The origin of bursts and heavy tails in human dynamics. Nature 435:207CrossRefGoogle Scholar
  4. 4.
    Beigbeder T, Coughlan R, Lusher C, Plunkett J, Agu E, Claypool M (2004) The effects of loss and latency on user performance in unreal tournament 2003. In: NetGames ’04: proceedings of 3rd ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 144–151CrossRefGoogle Scholar
  5. 5.
    Beran J (1994) Statistics for long-memory processes. Chapman & Hall, London, pp 71–86zbMATHGoogle Scholar
  6. 6.
    Blizzard Entertainment (2004) World of Warcraft.
  7. 7.
    CCP (2003) Eve online.
  8. 8.
    CDV Software (2001) Cossacks.
  9. 9.
    Chen K, Huang P, Huang C, Lei C (2005) Game traffic analysis: an MMORPG perspective. In: NOSSDAV ’05, New YorkGoogle Scholar
  10. 10.
    Chen K, Jiang J, Huang P, Chu H, Lei C, Chen W (2006) Identifying MMORPG bots: a traffic analysis approach. In: ACM SIGCHI ACE’06, Los AngelesGoogle Scholar
  11. 11.
    Claypool M (1995–2009) Mark Claypool’s homepage.
  12. 12.
    Claypool M, LaPoint D, Winslow J (2003) Network analysis of Counter-Strike and Starcraft. In: IEEE international performance, computing, and communications conference (IPCCC), April 2003Google Scholar
  13. 13.
    Cricenti A, Branch P (2007) ARMA(1,1) modeling of quake4 server to client game traffic. In: NetGames ’07: proceedings of the 6th ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 70–74CrossRefGoogle Scholar
  14. 14.
    Crovella ME, Bestavros A (1997) Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans Netw 5:835–846CrossRefGoogle Scholar
  15. 15.
    Crysys (1993–2008) MMORPG analysis code.
  16. 16.
    Daniel DP, GauthierDickey C (2007) A measurement study of virtual populations in massively multiplayer online games. In: NetGames ’07: proceedings of the 6th ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 25–30Google Scholar
  17. 17.
    Electronic Arts (2003) Command and conquer generals.
  18. 18.
    Electronic Arts (2007) Command and conquer 3.
  19. 19.
    Epic Games (2002) Unreal tournament 2003.
  20. 20.
    Fernandes S, Antonello R, Moreira J, Kamienski C (2007) Traffic analysis beyond this world: the case of second life. In: NOSSDAV ’07, Urbana, June 2007Google Scholar
  21. 21.
    Fritsch T, Ritter H, Schiller J (2005) The effect of latency and network limitations on mmorpgs: a field study of everquest2. In: NetGames ’05, New YorkGoogle Scholar
  22. 22.
    Haffner P, Sen S, Spatscheck O, Wang D (2005) ACAS: automated construction of application signatures. In: MineNet ’05, New YorkGoogle Scholar
  23. 23.
  24. 24.
    Iliofotou M, Pappu P, Faloutsos M, Mitzenmacher M, Singh S, Varghese G (2007) Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation, technical report, 2007.
  25. 25.
    JOYMAX (2005) Silkroad online.
  26. 26.
    Karagiannis T, Papagiannaki K, Faloutsos M (2005) BLINC: multilevel traffic classification in the dark. In: Proc ACM SIGCOMM, PhiladelphiaGoogle Scholar
  27. 27.
    Kim H, Karp B (2004) Autograph: toward automated, distributed worm signature detection. In: SSYM’04, BerkeleyGoogle Scholar
  28. 28.
    Kim J, Choi J, Chang D, Kwon T, Choi Y, Yuk E (2005) Traffic characteristics of a massively multi-player online role playing game. In: NetGames ’05, New YorkGoogle Scholar
  29. 29.
    Lakhina A, Crovella M, Diot C (2005) Mining anomalies using traffic feature distributions. In: Proc ACM SIGCOMM, PhiladelphiaGoogle Scholar
  30. 30.
    Li Z, Sanghi M, Chen Y, Kao M, Chavez B (2006) Hamsa: fast signature generation for zero-day PolymorphicWorms with provable attack resilience. In: SP 2006, Washington, DCGoogle Scholar
  31. 31.
    Liang H, Tay I, Neo MF, Ooi WT, Motani M (2008) Avatar mobility in networked virtual environments: measurements, analysis, and implications. CoRR abs/0807.2328 (informal publication)Google Scholar
  32. 32.
    Linden Research (2003) Second life.
  33. 33.
    Lua (1993–2008) Lua programming language.
  34. 34.
    LucasArts (2003) Star wars galaXies.
  35. 35.
    Ma J, Levchenko K, Kreibich C, Savage S, Voelker GM (2006) Unexpected means of protocol inference. In: IMC ’06: proceedings of the 6th ACM SIGCOMM conference on internet measurement. ACM, New York, pp 313–326Google Scholar
  36. 36.
    Mallat S (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Pattern Anal Machine Intell 11(7):674–693zbMATHCrossRefGoogle Scholar
  37. 37.
    Mathworks (1983–2009) Matlab.
  38. 38.
    Microsoft (1999–2009) MSN Messenger.
  39. 39.
    Microsoft (2002) Age of mythology.
  40. 40.
    Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: Proc PAM, BostonGoogle Scholar
  41. 41.
    NCsoft (2005) Guild Wars.
  42. 42.
    Netlab (2005) Measuring online game application in GPRS and UMTS.
  43. 43.
    Nullsoft (2000–2009) Gnutella.
  44. 44.
    Park B, Won YJ, Kim M, Hong JW (2008) Towards automated application signature generation for traffic identification. In: NOMS, pp 160–167Google Scholar
  45. 45.
    Svoboda P, Rupp M (2005) Online gaming models for wireless networks. In: Internet and multimedia systems and applications (IASTED)Google Scholar
  46. 46.
    Szabo G, Orincsay D, Gero BP, Gyori S, Borsos T (2007) Traffic analysis of mobile broadband networks. In: WICON ’07: proceedings of the 3rd international conference on wireless internet. ICST (Institute for computer sciences, social-informatics and telecommunications engineering). ICST, Brussels, pp 1–5Google Scholar
  47. 47.
    Szabó G, Szabó I, Orincsay D (2007) Accurate traffic classification. In: Proc IEEE WOWMoM, HelsinkiGoogle Scholar
  48. 48.
    Tan SA, Lau W, Loh A (2005) Networked game mobility model for first-person-shooter games. In: NetGames ’05: proceedings of 4th ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 1–9CrossRefGoogle Scholar
  49. 49.
    Yee N (2003–2009) The Daedalus Project.
  50. 50.
    Veres A, Kenesi Z, Molnár S, Vattay G (2000) On the propagation of long-range dependence in the internet. In: ACM SIGCOMM, StockholmGoogle Scholar
  51. 51.
    Willinger W, Taqqu M, Erramilli A (1996) A bibliographical guide to self-similar traffic and performance modeling for modern high-speed networkGoogle Scholar
  52. 52.
    Willinger W, Taqqu MS, Sherman R, Wilson DV (1997) Self-similarity through high-variability: statistical analysis of ethernet LAN traffic at the source level. IEEE/ACM Trans Netw 5:71–86CrossRefGoogle Scholar
  53. 53.
    Xu K, Zhang Z, Bhattacharyya S (2005) Profiling internet backbone traffic: behavior models and applications. In: Proc ACM SIGCOMM, PhiladelphiaGoogle Scholar
  54. 54.
    Zander S, Nguyen T, Armitage G (2005) Automated traffic classification and application identification using machine learning. In: Proc IEEE LCN, SydneyGoogle Scholar
  55. 55.
    Zuev D, Moore AW (2005) Traffic classification using a statistical approach. In: Proc PAM, BostonGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.TrafficLab, Ericsson ResearchEricsson Hungary Ltd.BudapestHungary
  2. 2.Highs Speed Networks Laboratory, Department of Telecommunications and Media InformaticsBudapest University of Technology and EconomicsBudapestHungary

Personalised recommendations