Detecting lag switch cheating in a gaming network is disclosed. Data packets are received from a client. The data packets have tracking data including at least one of a sequence number and a time stamp. The tracking data is monitored to determine that a cheat-detection event has occurred.
대표청구항▼
1. A method for detecting cheating in a gaming network, the method comprising: generating a first set of rules, wherein the first set of rules define acceptable user activity in a gaming network, and wherein the generated rules are defined based on observations of a performance of the gaming network
1. A method for detecting cheating in a gaming network, the method comprising: generating a first set of rules, wherein the first set of rules define acceptable user activity in a gaming network, and wherein the generated rules are defined based on observations of a performance of the gaming network;receiving data packets from a client in the gaming network, wherein the data packets are received at a network interface communicatively coupled to the gaming network and have tracking data that includes at least one of a sequence number or a time stamp indicating the progression of a game character through a game environment in the gaming network, and wherein the received data packets correspond to user activity for the client in the gaming network;monitoring the user activity for clients that may violate the generated first set of rules, wherein the user activity is monitored in response to execution of a monitoring module by a processor, and wherein the monitoring module is stored in memory; anddetermining that a client violated the generated first set of rules thereby identifying the client as a deviant client, wherein the determination that the client violated the generated first set of rules includes: identifying one or more pre-defined thresholds corresponding to indicia for changes in deltas between tracking data of data packets associated with the client and tracking data of data packets associated with different clients;determining that there are changes in deltas between tracking data of data packets associated with the client and tracking data of data packets associated with different clients;detecting that the determined delta changes between the different clients in view of the delta changes with the client exceeds one or more of the pre-defined thresholds used to identify cheating; andidentifying that the detected delta changes between the different clients and the gaming network indicate cheating based on the one or more identified pre-defined thresholds, wherein the evaluation and the pre-defined thresholds are based on parameters associated with the performance of the gaming network identified as acceptable user activity. 2. The method of claim 1, further comprising identifying at least one user associated with the client sending the monitored data packets that include indicia exceeding the predefined threshold. 3. The method of claim 2, further comprising sending information over the gaming network indicating that the client sending the monitored data packets is suspected of cheating, the information sent by way of a network interface communicatively coupled to the gaming network. 4. The method of claim 1, further comprising penalizing the at least one user associated with the client sending the monitored data packets that include indicia exceeding the predefined threshold. 5. The method of claim 1, wherein the sequence number is encrypted. 6. The method of claim 1, wherein the change in deltas of the sequence number of the client is indicative of the existence of packet loss. 7. The method of claim 1, wherein the time stamp is encrypted. 8. The method of claim 1, wherein the change in deltas of the time stamps of the client is indicative of the existence of a change in latency. 9. The method of claim 1, wherein the monitoring is performed at a host server in the gaming network. 10. The method of claim 1, wherein the monitoring is performed at a peer client in the gaming network. 11. A system for detecting cheating in a gaming network, the system comprising: a rules library that includes a generated first set of rules defining acceptable user activity in a gaming network, wherein the generated first set of rules are defined based on observations of a performance of the gaming network;a network interface that receives data packets from a client in the gaming network, wherein the data packets have tracking data that includes at least one of a sequence number or a time stamp indicating the progression of a game character through a game environment in the gaming network, and wherein the received data packets correspond to user activity for the client in the gaming network;a monitoring module stored in memory and executable by a processor to monitor the user activity for clients that may violate the generated first set of rules; andan analysis engine stored in memory and executable by a processor to determine that a client violated the generated first set of rules thereby identifying the client as a deviant client, wherein the determination that the client violated the generated first set of rules includes: identifying one or more pre-defined thresholds corresponding to indicia for changes in deltas between tracking data of data packets associated with the client and tracking data of data packets associated with different clients;determining that there are changes in deltas between tracking data of data packets associated with the client and tracking data of data packets associated with different clients,detecting that the determined delta changes between the different clients in view of the delta changes with the client exceeds one or more of the pre-defined thresholds used to identify cheating, andidentifying that the detected delta changes between the different clients and the gaming network indicate cheating based on the one or more identified pre-defined thresholds, wherein the evaluation and the pre-defined thresholds are based on parameters associated with the performance of the gaming network identified as acceptable user activity. 12. The system of claim 11, wherein execution of the analysis engine by the processor further identifies at least one user suspected of cheating. 13. The system of claim 12, wherein the network interface also sends information over the gaming network indicating that the at least one user is suspected of cheating. 14. The system of claim 11, further comprising penalizing the at least one user associated with the client sending the monitored data packets that include indicia exceeding the predefined threshold. 15. The system of claim 11, wherein the sequence number is encrypted. 16. The system of claim 11, wherein the change in deltas of the sequence number of the client is indicative of packet loss. 17. The system of claim 11, wherein the time stamp is encrypted. 18. The system of claim 11, wherein the change in deltas of the time stamps of the client is indicative of the existence of a change in latency. 19. The system of claim 11, wherein the monitoring module is located at a host server in the gaming network. 20. The system of claim 11, wherein the monitoring module is located at a peer client in the gaming network. 21. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for detecting cheating in a gaming network, the method comprising: generating a first set of rules, wherein the first set of rules define acceptable user activity in a gaming network, and wherein the generated rules are defined based on observations of a performance of the gaming network;receiving data packets from a client in the gaming network, wherein the data packets have having tracking data that includes at least one of a sequence number or a time stamp indicating the progression of a game character through a game environment in the gaming network, and wherein the received data packets correspond to user activity for the client in the gaming network;monitoring the user activity for clients that may violate the generated first set of rules, wherein the user activity is monitored in response to execution of a monitoring module by a processor, and wherein the monitoring module is stored in memory; anddetermining that a client violated the generated first set of rules thereby identifying the client as a deviant client, wherein the determination that the client violated the generated first set of rules includes: identifying one or more pre-defined thresholds corresponding to indicia for changes in deltas between tracking data of data packets associated with the client and tracking data of data packets associated with different clients;determining that there are changes in deltas between tracking data of data packets associated with the client and tracking data of data packets associated with different clients;detecting that the determined delta changes between the different clients in view of the delta changes with the client exceeds one or more of the pre-defined thresholds used to identify cheating; andidentifying that the detected delta changes between the different clients and the gaming network indicate cheating based on the one or more identified pre-defined thresholds, wherein the evaluation and the pre-defined thresholds are based on parameters associated with the performance of the gaming network identified as acceptable user activity.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (56)
Harris,Adam P.; Schneider,Steve C., Active validation of network devices.
Zintel, William Michael, Auto-configuring of peripheral on host/peripheral computing platform with peer networking-to-host/peripheral adapter for peer networking connectivity.
Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L.; Wheeler, Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
Sirer, Emin Gun; Bershad, Brian N., Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties.
Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.