期刊文献+

基于用户数据分析的网页游戏反外挂方法 被引量:3

An Anti-Plug Method of Web Game Based on User Data Analysis
下载PDF
导出
摘要 基于用户自身的数据,包括基础数据和行为数据,采用合适的分析和建模方法,并结合前端安全组件和白名单,提出了基于用户数据分析的网页游戏安全反外挂方法,并通过在部分游戏中的实践,验证了该方案的有效性和可行性。 Based on user data, including fundamental data and behavioral data, and combining with the security components located in the front part as well as white list, an anti-plug method based on the analysis of the user data is pro with reasonable analysis and modeling methods. Then, by applying the anti-plug method to several web games, the validity and feasibility of the method are proved.
出处 《电子产品可靠性与环境试验》 2015年第4期25-31,共7页 Electronic Product Reliability and Environmental Testing
关键词 网络游戏 游戏安全 用户数据 反外挂 web game game security user data anti-plug
  • 相关文献

参考文献8

  • 1兰晓,尹杰.中国网络游戏外挂问题现状分析[J].软件,2010,31(10):71-77. 被引量:7
  • 2] LAN Xiao, ZHANG Yichun, XU Pin. An overview on game cheating and its counter-measures [C] //Proceedings of 2009 International Symposium on Computer Science and Computational Technology (ISCSCT 2009) . Huang-Shan China, 2009: 195-200.
  • 3余艳玮,周学海,许华杰.网游自动反外挂系统的设计与实现[J].通信技术,2012,45(6):17-20. 被引量:3
  • 4高翊,张旸旸.游戏软件反外挂技术方案的设计和实现方法[J].广西科学院学报,2009,25(4):327-329. 被引量:2
  • 5ATI'ALLAH M J, BRYANT E D, STYTZ M R. A surveyof anti-tamper technologies [J] . Journey of Defense Soft- ware Engineering, 2004, 17 (11) : 12-16.
  • 6GREG Hoglund, GARY McGraw. Exploiting online games: cheating massively distributed systems [ M] Addison- Wesley Professional, 2007: 14-25, 30-40.
  • 7MONCH C, GRIMENT G, MIDTST R. Protecting online games against cheating [C] //Proceedings of 5th ACM SIG- COMM workshop on Network and system support for games. New York, USA, ACM, 2006: 20-30.
  • 8GOLLE P, DUCHENEAUT N. Preventing bots from playing online games [J] . Computers in Entertainment, 2005, 3 (3) : 3-12.

二级参考文献31

  • 1周立国,熊小兵,孙洁.基于自封闭代码块的软件保护技术[J].计算机应用,2009,29(3):817-822. 被引量:4
  • 2寿步,黄毅峰,朱凌,杨威.网络游戏外挂程序法律政策问题研究系列之二 外挂程序的定义特征和分类[J].电子知识产权,2005(8):14-17. 被引量:20
  • 3胡晓荷.Juniper涉足在线游戏安全[J].信息安全与通信保密,2006(2):26-26. 被引量:1
  • 4Eric Cronin,Burton Filstrup,Anthony R,et al. An efficient synchronization mechanism for mirrored game architectures: proceedings of the 1st workshop on Network and system support for games[C]. 2002.
  • 5Kris Kaspersky.黑客反汇编揭密[M].北京:电子工业出版社,2004.
  • 6Eldad Eilam. Secrets of reverse engineering[C]. Wiley Publishing Inc, 2005.
  • 7Peter Szor. The art of cinoyter virus research and defense[C]. Addison Wesley Professional,2005.
  • 8John Viega,Gary McGraw.构建安全的软件--避免产生软件安全问题的正确方法[M].北京:清华大学出版社,2003.
  • 9Dr Mikhail J Atallah,Eric D Bryant,Dr Martin R Stytz. A survey of anti-tamper technologies[C]. Arxan Technologies Inc, 2004.
  • 10Michael E Whitman,Herbert J Mattord.信息安全原理[M]//徐焱,译.北京:清华大学出版社,2004.

共引文献9

同被引文献9

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部