Crime Scene Reconstruction: Online Gold Farming Network Analysis
- Authors
- Kwon, Hyukmin; Mohaisen, Aziz; Woo, Jiyoung; Kim, Yongdae; Lee, Eunjo; Kim, Huy Kang
- Issue Date
- 3월-2017
- Publisher
- IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
- Keywords
- Online games; game bot; gold farming group; MMORPG
- Citation
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.12, no.3, pp.544 - 556
- Indexed
- SCIE
SCOPUS
- Journal Title
- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
- Volume
- 12
- Number
- 3
- Start Page
- 544
- End Page
- 556
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/84348
- DOI
- 10.1109/TIFS.2016.2623586
- ISSN
- 1556-6013
- Abstract
- Many online games have their own ecosystems, where players can purchase in-game assets using game money. Players can obtain game money through active participation or "real money trading" through official channels: converting real money into game money. The unofficial market for real money trading gave rise to gold farming groups (GFGs), a phenomenon with serious impact in the cyber and real worlds. GFGs in massively multiplayer online role-playing games (MMORPGs) are some of the most interesting underground cyber economies because of the massive nature of the game. To detect GFGs, there have been various studies using behavioral traits. However, they can only detect gold farmers, not entire GFGs with internal hierarchies. Even worse, GFGs continuously develop techniques to hide, such as forming front organizations, concealing cyber-money, and changing trade patterns when online game service providers ban GFGs. In this paper, we analyze the characteristics of the ecosystem of a large-scale MMORPG, and devise a method for detecting GFGs. We build a graph that characterizes virtual economy transactions, and trace abnormal trades and activities. We derive features from the trading graph and physical networks used by GFGs to identify them in their entirety. Using their structure, we provide recommendations to defend effectively against GFGs while not affecting the existing virtual ecosystem.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - School of Cyber Security > Department of Information Security > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.