A method for preventing online games hacking using memory monitoring
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Chang Seon | - |
dc.contributor.author | Kim, Huy Kang | - |
dc.contributor.author | Won, Hey Rin | - |
dc.contributor.author | Kim, Kyounggon | - |
dc.date.accessioned | 2021-08-30T03:57:27Z | - |
dc.date.available | 2021-08-30T03:57:27Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2021-02 | - |
dc.identifier.issn | 1225-6463 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/50042 | - |
dc.description.abstract | Several methods exist for detecting hacking programs operating within online games. However, a significant amount of computational power is required to detect the illegal access of a hacking program in game clients. In this study, we propose a novel detection method that analyzes the protected memory area and the hacking program's process in real time. Our proposed method is composed of a three-step process: the collection of information from each PC, separation of the collected information according to OS and version, and analysis of the separated memory information. As a result, we successfully detect malicious injected dynamic link libraries in the normal memory space. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY | - |
dc.title | A method for preventing online games hacking using memory monitoring | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Huy Kang | - |
dc.identifier.doi | 10.4218/etrij.2019-0427 | - |
dc.identifier.scopusid | 2-s2.0-85097281746 | - |
dc.identifier.wosid | 000596489700001 | - |
dc.identifier.bibliographicCitation | ETRI JOURNAL, v.43, no.1, pp.141 - 151 | - |
dc.relation.isPartOf | ETRI JOURNAL | - |
dc.citation.title | ETRI JOURNAL | - |
dc.citation.volume | 43 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 141 | - |
dc.citation.endPage | 151 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART002683580 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | abuse monitoring | - |
dc.subject.keywordAuthor | game abuse | - |
dc.subject.keywordAuthor | injection detection | - |
dc.subject.keywordAuthor | malware detection and damage recovery | - |
dc.subject.keywordAuthor | memory map | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.