Skip to main content

Advertisement

Log in

On the impacts of human interactions in MMORPG traffic

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Game traffic depends on two main factors, the game protocol and the gamers’ behavior. Based on a few popular real-time multiplayer games this paper investigates the latter factor showing how a set of typical game phases—e.g., player movement, changes in the environment—impacts traffic on different observation levels. The nature of human behavior has such a high impact on traffic characteristics that it influences the traffic both at a macroscopic—e.g., traffic rate—and at a microscopic—payload content—level. First, by understanding the nature of this impact a user behavior detection algorithm is introduced to grab specific events and states from passive traffic measurements. The algorithms focus on the characteristics of the traffic rate, showing what information can be gathered by observing only packet header information. Second, as an application of our method some results, including a detailed analysis of measurements taken from an operational broadband network, are presented. Third, a novel model and an algorithm are introduced to extend the Deep Packet Inspection traffic classification method with the analysis of non-fix byte signatures, which are not considered in current methods. The model captures the variation of the dynamic byte segments and provides parameters for the algorithm. The introduced algorithm exploits the spatial and temporal correlation by examining and extracting the correlation structure of the traffic and constructing signatures based on the observed correlation. The algorithm is evaluated by examining proprietary gaming traffic and also other known non-gaming protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Notes

  1. Practical meaning: the rate of decay of statistical dependence in a time series is slower than an exponential decay. See [5] for details.

  2. The amount of time the player remains in the same state.

  3. It is difficult to add reference to sites collecting these servers as they are always on the move to avoid legal consequences.

References

  1. Abry P, Veitch D (1998) Wavelet analysis of long-range-dependent traffic. IEEE Trans Inf Theory 44(1):2–15

    Article  MATH  MathSciNet  Google Scholar 

  2. Arjona A, Westphal C, Ylä-Jääski A, Kristensson M (2008) Towards high quality VoIP in 3G networks—an empirical study. In: AICT ’08: proceedings of the 2008 fourth advanced international conference on telecommunications. IEEE Computer Society, Washington, DC, pp 143–150

    Chapter  Google Scholar 

  3. Barabási A-L (2005) The origin of bursts and heavy tails in human dynamics. Nature 435:207

    Article  Google Scholar 

  4. Beigbeder T, Coughlan R, Lusher C, Plunkett J, Agu E, Claypool M (2004) The effects of loss and latency on user performance in unreal tournament 2003. In: NetGames ’04: proceedings of 3rd ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 144–151

    Chapter  Google Scholar 

  5. Beran J (1994) Statistics for long-memory processes. Chapman & Hall, London, pp 71–86

    MATH  Google Scholar 

  6. Blizzard Entertainment (2004) World of Warcraft. http://www.worldofwarcraft.com

  7. CCP (2003) Eve online. http://www.eve-online.com/

  8. CDV Software (2001) Cossacks. http://www.cossacks.com/

  9. Chen K, Huang P, Huang C, Lei C (2005) Game traffic analysis: an MMORPG perspective. In: NOSSDAV ’05, New York

  10. Chen K, Jiang J, Huang P, Chu H, Lei C, Chen W (2006) Identifying MMORPG bots: a traffic analysis approach. In: ACM SIGCHI ACE’06, Los Angeles

  11. Claypool M (1995–2009) Mark Claypool’s homepage. http://web.cs.wpi.edu/~claypool/

  12. Claypool M, LaPoint D, Winslow J (2003) Network analysis of Counter-Strike and Starcraft. In: IEEE international performance, computing, and communications conference (IPCCC), April 2003

  13. Cricenti A, Branch P (2007) ARMA(1,1) modeling of quake4 server to client game traffic. In: NetGames ’07: proceedings of the 6th ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 70–74

    Chapter  Google Scholar 

  14. Crovella ME, Bestavros A (1997) Self-similarity in world wide web traffic: evidence and possible causes. IEEE/ACM Trans Netw 5:835–846

    Article  Google Scholar 

  15. Crysys (1993–2008) MMORPG analysis code. http://www.crysys.hu/~szabog/MMORPG/

  16. Daniel DP, GauthierDickey C (2007) A measurement study of virtual populations in massively multiplayer online games. In: NetGames ’07: proceedings of the 6th ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 25–30

    Google Scholar 

  17. Electronic Arts (2003) Command and conquer generals. http://www.ea.com/official/cc/firstdecade/us/generals.jsp

  18. Electronic Arts (2007) Command and conquer 3. http://www.commandandconquer.com/default.aspx

  19. Epic Games (2002) Unreal tournament 2003. http://www.unrealtournament2003.com/

  20. Fernandes S, Antonello R, Moreira J, Kamienski C (2007) Traffic analysis beyond this world: the case of second life. In: NOSSDAV ’07, Urbana, June 2007

  21. Fritsch T, Ritter H, Schiller J (2005) The effect of latency and network limitations on mmorpgs: a field study of everquest2. In: NetGames ’05, New York

  22. Haffner P, Sen S, Spatscheck O, Wang D (2005) ACAS: automated construction of application signatures. In: MineNet ’05, New York

  23. id software (2005) Quake4. http://www.idsoftware.com/games/quake/quake4/

  24. Iliofotou M, Pappu P, Faloutsos M, Mitzenmacher M, Singh S, Varghese G (2007) Network traffic analysis using traffic dispersion graphs (TDGs): techniques and hardware implementation, technical report, 2007. http://www.cs.ucr.edu/~marios/Papers/UCR-CS-2007-05001.pdf

  25. JOYMAX (2005) Silkroad online. http://www.silkroadonline.net/

  26. Karagiannis T, Papagiannaki K, Faloutsos M (2005) BLINC: multilevel traffic classification in the dark. In: Proc ACM SIGCOMM, Philadelphia

  27. Kim H, Karp B (2004) Autograph: toward automated, distributed worm signature detection. In: SSYM’04, Berkeley

  28. Kim J, Choi J, Chang D, Kwon T, Choi Y, Yuk E (2005) Traffic characteristics of a massively multi-player online role playing game. In: NetGames ’05, New York

  29. Lakhina A, Crovella M, Diot C (2005) Mining anomalies using traffic feature distributions. In: Proc ACM SIGCOMM, Philadelphia

  30. Li Z, Sanghi M, Chen Y, Kao M, Chavez B (2006) Hamsa: fast signature generation for zero-day PolymorphicWorms with provable attack resilience. In: SP 2006, Washington, DC

  31. Liang H, Tay I, Neo MF, Ooi WT, Motani M (2008) Avatar mobility in networked virtual environments: measurements, analysis, and implications. CoRR abs/0807.2328 (informal publication)

  32. Linden Research (2003) Second life. http://secondlife.com/

  33. Lua (1993–2008) Lua programming language. http://www.lua.org/

  34. LucasArts (2003) Star wars galaXies. http://starwarsgalaxies.station.sony.com/

  35. Ma J, Levchenko K, Kreibich C, Savage S, Voelker GM (2006) Unexpected means of protocol inference. In: IMC ’06: proceedings of the 6th ACM SIGCOMM conference on internet measurement. ACM, New York, pp 313–326

    Google Scholar 

  36. Mallat S (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Pattern Anal Machine Intell 11(7):674–693

    Article  MATH  Google Scholar 

  37. Mathworks (1983–2009) Matlab. http://www.mathworks.com/

  38. Microsoft (1999–2009) MSN Messenger. http://join.msn.com/messenger/overview2000

  39. Microsoft (2002) Age of mythology. http://www.microsoft.com/games/ageofmythology/

  40. Moore AW, Papagiannaki K (2005) Toward the accurate identification of network applications. In: Proc PAM, Boston

  41. NCsoft (2005) Guild Wars. http://www.guildwars.com/

  42. Netlab (2005) Measuring online game application in GPRS and UMTS. http://www.netlab.hut.fi/opetus/s38310/04-05/Kalvot_04-05/H%E4m%E4l%E4i%nen_070605.ppt

  43. Nullsoft (2000–2009) Gnutella. http://www.gnutella.com

  44. Park B, Won YJ, Kim M, Hong JW (2008) Towards automated application signature generation for traffic identification. In: NOMS, pp 160–167

  45. Svoboda P, Rupp M (2005) Online gaming models for wireless networks. In: Internet and multimedia systems and applications (IASTED)

  46. Szabo G, Orincsay D, Gero BP, Gyori S, Borsos T (2007) Traffic analysis of mobile broadband networks. In: WICON ’07: proceedings of the 3rd international conference on wireless internet. ICST (Institute for computer sciences, social-informatics and telecommunications engineering). ICST, Brussels, pp 1–5

    Google Scholar 

  47. Szabó G, Szabó I, Orincsay D (2007) Accurate traffic classification. In: Proc IEEE WOWMoM, Helsinki

  48. Tan SA, Lau W, Loh A (2005) Networked game mobility model for first-person-shooter games. In: NetGames ’05: proceedings of 4th ACM SIGCOMM workshop on network and system support for games. ACM, New York, pp 1–9

    Chapter  Google Scholar 

  49. Yee N (2003–2009) The Daedalus Project. http://www.nickyee.com/daedalus/archives/001586.php

  50. Veres A, Kenesi Z, Molnár S, Vattay G (2000) On the propagation of long-range dependence in the internet. In: ACM SIGCOMM, Stockholm

  51. Willinger W, Taqqu M, Erramilli A (1996) A bibliographical guide to self-similar traffic and performance modeling for modern high-speed network

  52. Willinger W, Taqqu MS, Sherman R, Wilson DV (1997) Self-similarity through high-variability: statistical analysis of ethernet LAN traffic at the source level. IEEE/ACM Trans Netw 5:71–86

    Article  Google Scholar 

  53. Xu K, Zhang Z, Bhattacharyya S (2005) Profiling internet backbone traffic: behavior models and applications. In: Proc ACM SIGCOMM, Philadelphia

  54. Zander S, Nguyen T, Armitage G (2005) Automated traffic classification and application identification using machine learning. In: Proc IEEE LCN, Sydney

  55. Zuev D, Moore AW (2005) Traffic classification using a statistical approach. In: Proc PAM, Boston

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Géza Szabó.

Appendix

Appendix

Rights and permissions

Reprints and permissions

About this article

Cite this article

Szabó, G., Veres, A. & Molnár, S. On the impacts of human interactions in MMORPG traffic. Multimed Tools Appl 45, 133–161 (2009). https://doi.org/10.1007/s11042-009-0298-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-009-0298-4

Keywords

Navigation