帳號:guest(3.236.24.215)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目勘誤回報
作者姓名(中文):陳首宏
作者姓名(英文):Shiou-hung Chen
論文名稱(中文):電腦網路遊戲外掛偵測模式及處理流程機制之研究
論文名稱(外文):Bot Detection Models and Corresponding Game Security Processes in Computer Online Games
指導教授姓名(中文):羅乃維
指導教授姓名(英文):Nai-wei Lo
口試委員姓名(中文):吳宗成
林伯慎
口試委員姓名(英文):Tzong-chen Wu
Bor-shen Lin
學位類別:碩士
校院名稱:國立臺灣科技大學
系所名稱:資訊管理系
學號:M9309010
出版年(民國):95
畢業學年度:94
學期:2
語文別:中文
論文頁數:41
中文關鍵詞:網路遊戲;CAPTCHA;HIPs;BOT
外文關鍵詞:Online GameCAPTCHAHIPsBOT
相關次數:
  • 推薦推薦:0
  • 點閱點閱:16
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:7
  • 收藏收藏:0
本篇論文主要的目的是要解決電腦網路遊戲中的外掛非法程式問題,外掛非法程式問題一直是電腦網路遊戲營運商的一大困擾。所謂的外掛非法程式便是機器人程式(或稱代理人程式),玩家角色可以透過外掛程式來自動的執行遊戲中的行為,玩家不需親自花時間來訓練角色的成長,進而從中獲得比其他玩家較多的不公平利益。外掛程式的氾濫導致玩家對營運商失去信心而離開遊戲,外掛程式所造成玩家的流失對營運商來說是營利及聲譽的雙重損失。
針對外掛程式問題,本篇論文提出一完整流程來解決外掛程式問題:1、「外掛玩家篩檢」,使用資料探勘技術來搜尋可能使用外掛程式的玩家,並將可能為外掛玩家的人數從所有線上玩家濃縮至少數玩家;2、「自動化外掛玩家辨別」,在這裡我們採用CAPTCHA(Completely Automated Public Turing Test to Tell Computers and Humans Apart)機制由系統自動的對可能為外掛程式之玩家進行是否為外掛程式的偵測;3、「外掛玩家追蹤」,透過遊戲管理者的追蹤可以避免系統誤判真實玩家為外掛程式的情況;4、「外掛玩家處罰」,若玩家角色確實為外掛程式在執行其行動則必需接受處罰。
Computer online games are popular and have good prospects of investment profit to on-line game producers in recent years. Since playing on-line games are very competitive and time-consuming, many players try to use illegal software agent (we call it BOT) to play for them. Thus, BOTs can automatically train players’ game roles and get advanced ranks for their game roles.
The goal of our research is to detect the Bots used in games and provide a standard management process to handle BOT-detected situation. The research constructs a complete process which includes historical data mining/analysis, BOT identification, BOT confirmation and player punishment mechanism. In historical data mining/analysis, we use the decision tree method to make our BOT-detection rule that could filter out possible BOT players. In BOT identification stage, we implement CAPTCHA mechanism to inspect whether an online game player is a BOT or not. In BOT confirmation stage, field-side game manager will trace and check the potential Bot player who is identified during the BOT identification stage to prevent false-positive situation. Once a BOT players are confirmed, player punishment mechanism will be activated.
中文摘要.....................................I
Abstract....................................II
誌謝.......................................III
圖索引......................................IV
表索引.......................................V
第1章 動機與目的.............................1
1.1 電腦網路遊戲環境介紹.....................1
1.2 研究動機.................................2
1.3 研究目的.................................4
第2章 背景介紹與相關研究之探討...............5
2.1 背景介紹.................................5
2.2 機器人程式(BOT)..........................6
2.3 CAPTCHA機制..............................8
第3章 研究方法..............................20
3.1 CAPTCHA機制用於網路遊戲的考量...........21
3.2 外掛偵測流程............................22
3.2.1-1 外掛玩家篩檢........................24
3.2.1-2 隨機玩家偵測........................29
3.2.2 自動化外掛玩家辨別....................29
3.2.3 外掛玩家追蹤..........................31
3.2.4外掛玩家處罰...........................32
第4章 系統實作..............................34
4.1 系統環境................................34
4.2 系統展示................................35
第5章 結論與未來研究方向....................38
參考文獻....................................40
[1] 外掛的歷史資訊 http://game.tzinfo.net/news_info.asp?id=10194
[2] Samuel Johnson, BOTKNOWLEDGE http://www.botknowledge.com/
[3] School of Computer Science, Carnegie Mellon, HIPs Project http://www.aladdin.cs.cmu.edu/hips/
[4] A. M. Turing ,”Computing Machinery and Intelligence”. Mind 49: 433-460,1950
[5] School of Computer Science, Carnegie Mellon, CAPTCHA Project http://www.captcha.net/
[6] Eric Wan, Xin Xu and Zhengqian Zhou.”2006 Online Game Report”, Pacific Epoch Red Innovation Report Series.
[7] Pinkas, B. and Sander, T. “Securing passwords against dictionary attacks”. Proceedings of the ACM Computer and Security Conference 2002
[8] Rachna Dhamija and J.D. Tygar. “Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks”. Second International Workshop (HIPs 2005)
[9] Amalia Rusu and Venu Govindaraju. “Handwritten CAPTCHA: Using the difference in the abilities of humans and machines in reading handwritten words”. Proceedings of the 9th Int’l Workshop on Frontiers in Handwriting Recognition (IWFHR-9 2004)
[10] Allison L. Coates, Henry S. Baird and Richard J. Fateman. “Pessimal Print: A Reverse Turing Test”. ICDAR 2001
[11] JOCR Project , Joerg Schulenburg http://jocr.sourceforge.net/download.html
[12] Yong Rui and Zicheg Liu. “ARTiFACIAL: Automated Reverse Turing Test Using FACIAL Features”, Proceedings of ACM Multimedia 2003
[13]Tsz-Yan Chan. “Using a Text-to-Speech Synthesizer to generate a reverse Turing Test”. Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI’03)
[14]Leo Breiman [et al.]. “Classification and Regression Tree”. Wadsworth International Group, 1984.
[15]Philippe Golle and Nicolas Ducheneaut. “Preventing Bots from Playing Online Games”. ACM Computers in Entertainment,Vol.3 No.3 July 2005
[16]Wenfeng Yang and Xing Li.”Chinese Keyword Extraction Based on Max-duplicated Strings of the Documents”.ACM Research and Development in Information Retrieval, 2002.
[17]David Goldberg, Christopher Malon and Marshall Bern. “A Global Approach to Automatic Solution of Jigsaw Puzzles”. ACM Proceedings of the 1st conference on Computing frontiers. April 2004.
[18]Computer Vision and Artificial Intelligence http://www.acm.org/crossroads/xrds3-1/vision.html
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *