Trading Behind-the-Scene: Analysis of Online Gold Farming Network in the Auction House System
- Authors
- Noh, Yuseung; Jeong, Seonghoon; Kim, Huy Kang
- Issue Date
- 9월-2022
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Companies; Currencies; Economics; Game bot; Games; Gold; Land mobile radio; Terminology; gold farming group (GFG); mobile game; real money trading
- Citation
- IEEE TRANSACTIONS ON GAMES, v.14, no.3, pp.423 - 434
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE TRANSACTIONS ON GAMES
- Volume
- 14
- Number
- 3
- Start Page
- 423
- End Page
- 434
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/144088
- DOI
- 10.1109/TG.2021.3094054
- ISSN
- 2475-1502
- Abstract
- Owing to the widespread use of smartphones, various online games based on mobile platforms are being launched. Although mobile games have the advantage of better accessibility compared to PC games, there is a limitation in that it is difficult to input specific actions. To overcome this limitation, game companies apply autoplay systems to support users. Autoplay (with macro or game bot programs) without human interaction was previously regarded as a cheating play. To provide a more comfortable and easy gaming experience to users, most mobile games currently provide autoplay functionality. Such introduction means that along with gold farming groups (GFGs), all users can use a game bot. Therefore, game companies prevent profit-producing activities of GFGs by introducing an in-game economic system in which a real money trading (RMT) is impossible. However, GFGs still operate by abusing an auction house. Our study uses the three-month transaction logs of a mobile game that introduces an auction house as an in-game economic system. We observe the abuse that makes RMTs possible through the auction house and propose a method of identifying abuse solely through a transaction log. We analyzed the GFGs using the identified abuse and confirmed that the GFG consists of a single role.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.