DOI QR코드

DOI QR Code

A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain

온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구

  • 유동영 (힌국인터넷진흥원) ;
  • 서동남 (고려대학교 정보보호대학원) ;
  • 김휘강 (고려대학교 정보보호대학원) ;
  • 최진영 (고려대학교 컴퓨터.전파통신공학과)
  • Received : 2011.01.21
  • Accepted : 2011.04.18
  • Published : 2011.06.30

Abstract

The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.

Keywords

References

  1. 2010 대한민국 게임 백서, 한국 컨텐츠 진흥원, 2010.
  2. 신동훈, "정보보호 사전진단 방법론을 활용한 u-City 보안 모델 연구", 박사학위논문, 단국대학교, 2010.
  3. 신동훈, "서비스 개발단계에서의 정보보호", 한국IT서비스 학술대회논문집, 제1권(2010), pp. 384-391.
  4. 신동훈, 김국태, 이강신, "신규 IT서비스의 정보보호 사전평가 모델:RFID 서비스 적용 중심", 한국정보처리학회, 제25회 춘계학술발표대회, 2006.
  5. 동아일보, "中서 불법생산 온라인 게임머니 현금바꿔 420억 밀반출", http://www.donga.com/fbin/output?n = 200810220106.
  6. 안철수연구소, 2010년 3월 신종악성코드 감염보고 top 20, http://www.ahnlab.com/kr/site/securitycenter/asec/asecView.do?groupCode= VNI001&webNewsInfoUnionVo.seq =15952.
  7. 중앙일보, "리니지 명의도용 피해신고 22만건 넘어", http://article.joinsmsn.com/news/article/article.asp?ctg = 16&Total_ID = 2208595.
  8. 김휘강, Online game security, Codegate, 2009.
  9. 김휘강, Online game security-new approaches for the endless battlefront, Korea Security Seminar (KSS), 2010.
  10. Ahmad, M. A., B. Keegan, J. Srivastava, D. Williams, and N. Contractor, "Mining for Gold Farmers:Automatic Detection of Deviant Players in MMOGS", International Conference on Computational Science and Engineering, 2009.
  11. Chen, K. T. and L. W. Hong, "User Identification based on Game-Play Activity Patterns", The International Journal of Virtual Reality, 2007.
  12. Chen, K. T., J. W. Jiang, P. Huang, H. H. Chu, C. L. Lei, and W. C. Chen, "Identifying MMORPG Bots:A Traffic Analysis Approach", EURASIP Journal on Advances in Signal Processing archive, Vol.2009(2009).
  13. Golle, P. and N. Ducheneaut, "Preventing Bots from Playing Online Games", Computers in Entertainment (CIE), 2005.
  14. Hilaire, S., H. C. Kim, and C. K. Kim, "How to deal with bot scum in MMORPGs", IEEE Communications Quality and Reliability (CQR) Workshop, Vancouver, Canada, 2010.
  15. Kesteren, M. V., J. Langevoort, and F. Grootjen, "A step in the right direction:Bot detection in MMORPGs using movement analysis", The 21th Benelux Conference on Artificial Intelligence(BNAIC), 2009.
  16. Kim, H. G., S. W. Hong, and J. T. Kim, "Detection of Auto Programs for MMOR PGs", The 18th Australian Joint Conference on Artificial Intelligence, Lecture Notes in Computer Science, 2005.
  17. Lee, I. S., K. H. Hong, G. S. Lee, and J. I. Lee, "Preliminary Diagnosis Model for a New IT Service:Improving the Information Security of u-Services with Zigbee", World Academy of Science, Engineering and Technology, 2007.
  18. Mitterhofer, S., Kruegel, C., Kirda, E., Platzer, C., "Server-Side Bot Detection in Massively Multiplayer Online Games", IEEE Security and Society, 2009.
  19. Shin, D. H., Y. M. Nah, H. S. Kim, G. S. Lee, and J. I. Lee, "Study of Measures to Secure Video Phone Service Safety through a Preminary Evaluation of the Information Security of the New IT Service", World Academy of Science, Engineering and Technology, 2007.
  20. Thawonmas, R., Y. Kashifuji, and K. T. Chen, "Detection of MMORPG Bots Based on Behavior Analysis", The International Conference on Advances in Computer Entertainment Technology, 2008.
  21. Varvello, M. and G. M. Voelker, "Second Life :a Social Network of Humans and Bots", The 20th international workshop on Network and operating systems support for digital audio and video, 2010.
  22. Wikipedia, "Private Server", http://en.wikipedia.org/wiki/Private_server.

Cited by

  1. A Study of Cheater Detection in FPS Game by using User Log Analysis vol.15, pp.3, 2015, https://doi.org/10.7583/JKGS.2015.15.3.177