Skip to main content

Security in Online Games: Current Implementations and Challenges

  • Chapter
  • First Online:
Handbook of Big Data and IoT Security

Abstract

Security in online gaming is a growing target for hackers due to the amount of money involved in online gaming. Components are used in the security measures implemented for these games, but no single security component is 100% effective. Our research aims to investigate methods of game security and the components used in them, as well as the hacks used to exploit and circumvent online gaming security mechanisms. As a result, our study arrives to some interesting points, and outlines a number of recommendations and potential research directions. This, in turn, can pave the way for facilitating and empowering future research in this domain to assist game engineers and testers in security management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ESA. (2017). Two-Thirds of American Households Regularly Play Video Games. Retrieved from http://www.theesa.com/article/two-thirds-american-households-regularly-play-video-games/

  2. Kiwia, D., Dehghantanha, A., Choo, K.-K. R., & Slaughter, J. (2017). A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence. Journal of Computational Science. https://doi.org/10.1016/j.jocs.2017.10.020

  3. Maguluri, N. S. N. (2017). Multi-Class Classification of Textual Data: Detection and Mitigation of Cheating in Massively Multiplayer Online Role Playing Games. (Thesis), Wright State University, Browse all Theses and Dissertations.

    Google Scholar 

  4. Summeren, R. v. (2011). Security in Online Gaming. (Thesis), Radboud University Nijmegen.

    Google Scholar 

  5. Chang, H., Park, J. H., & Kang, H. (2008). The Security System Design in Online Game for u Entertainment. Paper presented at the 22nd International Conference on Advanced Information Networking and Applications

    Google Scholar 

  6. Xiang Zuo, Gandy, C., Skvoretz, J., & Iamnitchi, A. (2016). Bad Apples Spoil the Fun: Quantifying Cheating in Online Gaming. Paper presented at the Tenth International AAAI Conference on Web and Social Media

    Google Scholar 

  7. Liu, D., Gao, X., Zhang, M., Wang, H., & Stavrou, A. (2017). Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency. Paper presented at the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

    Google Scholar 

  8. Mohr, S., & Rahman, S. S. (2011). IT Security Issues Within The Video Game Industry. International Journal of Computer Science & Information Technology, 3(5).

    Google Scholar 

  9. Seybold, P. (2011). Press Release: Some PlayStation Network and Qriocity Services to be Available This Week. Retrieved from https://blog.us.playstation.com/2011/04/30/press-release-some-playstation-network-and-qriocity-services-to-be-available-this-week/

  10. Kyodo. (2013). Customer data exposed in huge breach of Nintendo member website. Retrieved from https://www.japantimes.co.jp/news/2013/07/06/business/corporate-business/japan-customer-data-exposed-in-massive-breach-of-nintendo-member-website/

  11. Steinman, G. (2013). Security update for all Ubisoft account holders. Retrieved from http://blog.ubi.com/en-GB/security-update-for-all-ubisoft-account-holders/

  12. Kiss, J. (2014). Xbox live and Playstation attack: Christmas ruined for millions of gamers. Retrieved from https://www.theguardian.com/technology/2014/dec/26/xbox-live-and-psn-attack-christmas-ruined-for-millions-of-gamers

  13. Hurlock-Jones, I. (2015). Multi-state Notification Letter. Retrieved from https://oag.ca.gov/system/files/BFG%20-%20MULTI-STATE%20NOTIFICATION%20LETTER_Proof_1.pdf

  14. Paganini, P. (2016). Attacking Gaming Systems: A Dangerous Trend. Retrieved from http://resources.infosecinstitute.com/attacking-gaming-systems-a-dangerous-trend/

  15. IBM. (2014). The basic elements of a cryptographic system. Retrieved from https://www.ibm.com/support/knowledgecenter/en/SSLTBW_2.1.0/com.ibm.zos.v2r1.csfb500/csfb5za206.htm

  16. Gorder, P. F. (2004). Balancing video-game piracy issues. IEEE Security & Privacy, 2(1), 17.

    Google Scholar 

  17. Mendez, J. (2017). How Steam Employs DRM & What That Means For Your Game. Retrieved from https://blackshellmedia.com/2017/06/28/steam-employs-drm-means-game/

  18. STEAM. (2017). Account Security Recommendations. Retrieved from https://support.steampowered.com/kb_article.php?ref=1266-OAFV-8478

  19. Baignères, T., Finiasz, M., & Lepoint, T. (2013). White-Box Cryptography Retrieved from https://www.cryptoexperts.com/technologies/white-box/

  20. Ghosh, A. K., & McGraw, G. (1998). An Approach for Certifying Security in Software Components. Paper presented at the 21st National Information Systems Security Conference.

    Google Scholar 

  21. Arif, F. (2014). Denuvo: SSD Rumors are Wrong – No System is Infallible, Striving to Beat Pirates By Being One Step Ahead. Retrieved from https://wccftech.com/denuvo-ssd-rumors-wrong-system-infallible-striving-beat-pirates-step/

  22. Crnkovic, I. (2003). Component-based software engineering - new challenges in software development. Paper presented at the 25th International Conference on Information Technology Interfaces, 2003. ITI 2003.

    Google Scholar 

  23. Vitharana, P. (2003). Risks and challenges of component-based software development. Communications of the ACM, 46(8), 67-72.

    Google Scholar 

  24. Parizi, R. M., Ghani, A. A. A., Lee, S. P., & Khan, S. U. R. (2017). RAMBUTANS: automatic AOP-specific test generation tool. International Journal on Software Tools for Technology Transfer, 19(6), 743-761.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Dehghantanha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Parizi, R.M., Dehghantanha, A., Choo, KK.R., Hammoudeh, M., Epiphaniou, G. (2019). Security in Online Games: Current Implementations and Challenges. In: Dehghantanha, A., Choo, KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-10543-3_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-10542-6

  • Online ISBN: 978-3-030-10543-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics