An automatic and proactive identity theft detection model in MMORPGs

نویسندگان

  • Jiyoung Woo
  • Hwa Jae Choi
  • Huy Kang Kim
چکیده

Identity theft happens frequently, especially in popular multiplayer games where cyberassets can be monetized. In this work, we propose an automatic and proactive identity theft detection model in online games. We specify the identity theft process into exploration, monetization, and theft and pose identity theft detection as a multi-class classification problem. We propose an automatic and proactive detection model utilizing rich features, along with appropriate problem-specific domain knowledge regarding the unique properties of identity theft. The proposed model based on process specification and automatic learning will reduce financial losses to game users and game companies through early detection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AN-EUL method for automatic interpretation of potential field data in unexploded ordnances (UXO) detection

We have applied an automatic interpretation method of potential data called AN-EUL in unexploded ordnance (UXO) prospective which is indeed a combination of the analytic signal and the Euler deconvolution approaches. The method can be applied for both magnetic and gravity data as well for gradient surveys based upon the concept of the structural index (SI) of a potential anomaly which is relate...

متن کامل

Detecting Suspicious Card Transactions in unlabeled data of bank Using Outlier Detection Techniqes

With the advancement of technology, the use of ATM and credit cards are increased. Cyber fraud and theft are the kinds of threat which result in using these Technologies. It is therefore inevitable to use fraud detection algorithms to prevent fraudulent use of bank cards. Credit card fraud can be thought of as a form of identity theft that consists of an unauthorized access to another person's ...

متن کامل

An introduction to the examples of scientific plagiarism and its identification soft-wares

Background: Increasing Immorality and Plagiarism in the country's higher education system has become a serious crisis. Hence, the purpose of this study was to analyze the Examples of Plagiarism and the introduction of Plagiarism detection software. Method: The present study is a narrative review study. Articles in Persian and Latin related to the use of scientific theft key words in databases w...

متن کامل

The Consequences of the Identity Theft Fear in the Sport Products Online Shopping From the Perspective of Physical Education Students

Background. Today, online shopping has become one of the most important components of modern marketing that had both positive and negative consequences for customers. Objectives. The purpose of present research was to study the consequences of fear of identity theft in sport products online shopping from the perspective of physical education students. Methods. The present study is a descripti...

متن کامل

Dimensionality Reduction and Improving the Performance of Automatic Modulation Classification using Genetic Programming (RESEARCH NOTE)

This paper shows how we can make advantage of using genetic programming in selection of suitable features for automatic modulation recognition. Automatic modulation recognition is one of the essential components of modern receivers. In this regard, selection of suitable features may significantly affect the performance of the process. Simulations were conducted with 5db and 10db SNRs. Test and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011