In recent years, online gaming has become one of the most popular Internet activities, but cheating activity, such as the use of game bots, has increased as a consequence. Generally, the gaming community disagrees with the use of game bots, as bot users obtain unreasonable rewards without corresponding efforts. However, bots are hard to detect because they are designed to simulate human game playing behavior and they follow game rules exactly. Existing detection approaches either interrupt the players' gaming experience, or they assume game bots are run as standalone clients or assigned a specific goal, such as aim bots in FPS games.
In this paper, we propose a trajectory-based approach to detect game bots. It is a general technique that can be applied to any game in which the avatar's movement is controlled directly by the players. Through real-life data traces, we show that the trajectories of human players and those of game bots are very different. In addition, although game bots may endeavor to simulate players' decisions, certain human behavior patterns are difficult to mimic because they are AI-hard. Taking Quake 2 as a case study, we evaluate our scheme's performance based on real-life traces. The results show that the scheme can achieve a detection accuracy of 95% or higher given a trace of 200 seconds or longer.
[1]
Laila Refiana Said,et al.
Comparing the Effect of Habit in the Online Game Play of Australian and Indonesian Gamers
,
2003
.
[2]
D. Hoffman,et al.
The Influence of Goal-Directed and Experiential Activities on Online Flow Experiences
,
2003
.
[3]
Philippe Golle,et al.
Preventing bots from playing online games
,
2005,
CIE.
[4]
Chin-Laung Lei,et al.
Identifying MMORPG Bots: A Traffic Analysis Approach
,
2009,
EURASIP J. Adv. Signal Process..
[5]
Chun-Ying Huang,et al.
Game traffic analysis: an MMORPG perspective
,
2005,
NOSSDAV '05.
[6]
John Langford,et al.
CAPTCHA: Using Hard AI Problems for Security
,
2003,
EUROCRYPT.
[7]
Jiangchuan Liu,et al.
Detecting cheaters for multiplayer games: theory, design and implementation[1]
,
2006,
CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..