Skip to main content

The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture

  • Conference paper
  • First Online:
Information Security Applications (WISA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10763))

Included in the following conference series:

  • 999 Accesses

Abstract

In general, game players want their own characters that project themselves to have stronger power and honor in a virtual world. Their aspiration is achieved by pulling up character’s level or accumulating wealth in game. Some players, thus, cheat at games in a variety of ways to skip the repetitive and tedious process of gaining experience and wealth that consumes a considerable amount of time and effort. Cheatings are regarded as harmful behaviors toward both game producers and players in good faith, and if the rate of the cheating players exceeds a certain threshold, the game producers will not be able to provide fair and successful services anymore. Therefore, the game producers make various efforts to detect and impose a sanction on the cheaters. In this paper, we propose a method to estimate population size of the cheaters more quickly and accurately, in a relatively shorter time and lower cost than traditional methods, by using the method which is used frequently by ecologists. Among the various ecological estimation methods, Jolly-Seber estimator, based on capture and recapture method, was selected to estimate the characteristics of players in virtual world. Moreover, the video footage recorded for estimation is expected to become a legal evidence for game producers to impose sanctions such as permanent account suspension. Based on the estimated population size, the ratio of the cheaters among ordinary players can be estimated, and this ratio is expected to help the game producers to make swift decisions on the timing of sanctions. In this paper, we estimate the population size of cheating players in Blade & Soul, a popular MMORPG game. The total number of cheating players was estimated to be 274,639 players in four selected areas. In 2012, according to official press release of the game producer (NCSOFT Corporation), Blade & Soul had 230,000 concurrent users at every second. The number of active users is approximately estimated to be 2,300,000. Using the method proposed in this paper, the rate of cheating players in the game is approximately 11.94%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Takahashi, D.: With just 3 games, Supercell made $924M in profits on $2.3B in revenue in 2015 [Internet]. VentureBeat (VB) (2017). https://venturebeat.com/2016/03/09/with-just-3-games-supercell-made-924m-in-profits-on-2-3b-in-revenue-in-2015. Accessed 1 May 2017

  2. Why Riot Games Is Inc.’s 2016 Company of the Year [Internet]. Inc.com (2017). https://www.inc.com/magazine/201612/burt-helm-lindsay-blakely/company-of-the-year-riot-games.html. Accessed 1 May 2017

  3. League Players Reach New Heights in 2014 [Internet]. Riot Games (2017). http://www.riotgames.com/articles/20140711/1322/league-players-reach-new-heights-2014. Accessed 1 May 2017

  4. Keegan, B., et al.: Dark gold: statistical properties of clandestine networks in massively multiplayer online games. In: 2010 IEEE Second International Conference on Social Computing (SocialCom). IEEE (2010)

    Google Scholar 

  5. ID Theft, RMT & Lineage [Internet]. Terra Nova (2017). http://terranova.blogs.com/terra_nova/2006/07/id_theft_rmt_nc.html. Accessed 1 May 2017

  6. Kim, H.K., Woo, J.: Detecting and Preventing Online Game Bots in MMORPGs, pp. 1–8 (2015)

    Google Scholar 

  7. Chen, K.-T., Hong, L.-W.: User identification based on game-play activity patterns. In: Proceedings of the 6th ACM SIGCOMM Workshop on Network and System Support for Games. ACM (2007)

    Google Scholar 

  8. Kang, A.R., Woo, J., Kim, H.K.: Data and text mining of communication patterns for game BOT detection. In: Proceedings of the 3th International Conference on Internet (2011)

    Google Scholar 

  9. Kang, A.R., Kim, H.K., Woo, J.: Chatting pattern based game BOT detection: do they talk like us? KSII Trans. Internet Inf. Syst. 6(11), 2866–2879 (2012)

    Google Scholar 

  10. Kang, A.R., et al.: Online game BOT detection based on party-play log analysis. Comput. Math Appl. 65(9), 1384–1395 (2013)

    Article  Google Scholar 

  11. Lee, J., et al.: I know what the BOTs did yesterday: full action sequence analysis using Naïve Bayesian algorithm. In: Proceedings of Annual Workshop on Network and Systems Support for Games. IEEE Press (2013)

    Google Scholar 

  12. Lee, E., et al.: You are a game BOT!: uncovering game bots in MMORPGs via self-similarity in the wild. In: Proceedings of Network and Distributed System Security Symposium (NDSS) (2016)

    Google Scholar 

  13. Kwon, H., et al.: Surgical strike: a novel approach to minimize collateral damage to game BOT detection. In: Proceedings of Annual Workshop on Network and Systems Support for Games. IEEE Press (2013)

    Google Scholar 

  14. Woo, K., et al.: What can free money tell us on the virtual black market? ACM SIGCOMM Comput. Commun. Rev. 41(4), 392–393 (2011)

    Article  Google Scholar 

  15. Kwon, H., et al.: Crime scene reconstruction: online gold farming network analysis. IEEE Trans. Inf. Forensics Secur. 12(3), 544–556 (2017)

    Google Scholar 

  16. Woo, J., Kang, A.R., Kim, H.K.: Modeling of BOT usage diffusion across social networks in MMORPGs. In: Proceedings of the Workshop at SIGGRAPH Asia. ACM (2012)

    Google Scholar 

  17. Woo, J., Kang, A.R. Kim, H.K.: The contagion of malicious behaviors in online games. In: ACM SIGCOMM Computer Communication Review. ACM (2013)

    Article  Google Scholar 

  18. Ki, Y., Woo, J., Kim, H.K.: Identifying spreaders of malicious behaviors in online games. In: Proceedings of the 23rd International Conference on World Wide Web. ACM (2014)

    Google Scholar 

  19. Roy, A., et al.: The ones that got away: false negative estimation based approaches for gold farmer detection. In: 2012 International Conference on and 2012 International Conference on Social Computing (SocialCom), Privacy, Security, Risk and Trust (PASSAT). IEEE (2012)

    Google Scholar 

  20. Krebs, J.R., Davies, N.B.: Behavioural ecology: an evolutionary approach. John Wiley & Sons, Hoboken (2009)

    Google Scholar 

  21. McClintock, B.T., et al.: Seeking a second opinion: uncertainty in disease ecology. Ecol. Lett. 13(6), 659–674 (2010)

    Article  Google Scholar 

  22. Smith, T., Smith, R.: Elements of Ecology, 1st edn. Pearson, Boston (2015)

    Google Scholar 

  23. Choi, S.-Y., Rho, P.: Population size estimation of the Kaloula borealis in the Daemyung retarding basin. Korean J. Environ. Ecol. 30(4), 684–693 (2016)

    Article  Google Scholar 

  24. Bae, D.-Y., et al.: Applying the Jolly-Seber model to estimate population size of Miho Spine roach (Cobitis choii) in the Backgok stream, Korea. Korean J. Ecol. Environ. 45(3), 322–328 (2012)

    Google Scholar 

  25. Krebs, C.: Ecological Methodology, 2nd edn. Addison Wesley Longman, Menlo Park (1999)

    Google Scholar 

Download references

Acknowledgement

This research was supported by the MSIP (Ministry of Science, ICT & Future Planning), Korea, under the “Employment Contract based Master’s Degree Program for Information Security” supervised by the KISA (Korea Internet & Security Agency) (H2101-17-1001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to In Seok Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hwang, D.M., Kim, I.S. (2018). The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture. In: Kang, B., Kim, T. (eds) Information Security Applications. WISA 2017. Lecture Notes in Computer Science(), vol 10763. Springer, Cham. https://doi.org/10.1007/978-3-319-93563-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93563-8_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93562-1

  • Online ISBN: 978-3-319-93563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics