Virtual World Security Inspection

نویسندگان

  • Nicholas Charles Patterson
  • Michael Hobbs
چکیده

Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers. It is reported that there are over 1 billion registered users of virtual worlds containing virtual property items worth an estimated US$50 billion dollars. The problem of virtual property theft is complex, involving many legal, social and technological issues. The software used to access virtual worlds is of great importance as they form the primary interface to these worlds and as such the primary interface to conduct virtual property theft. The security vulnerabilities of virtual world applications have not, to date, been examined. This study aims to use the process of software inspection to discover security vulnerabilities that may exist within virtual world software – vulnerabilities that enable virtual property theft to occur. Analyzing three well know virtual world applications World of Warcraft, Guild Wars and Entropia Universe, this research utilized security analysis tools and scenario testing with focus on authentication, trading, intruder detection and virtual property recovery. It was discovered that all three examples were susceptible to keylogging, mail and direct trade methods were the most likely method for transferring stolen items, intrusion detection is of critical concern to all VWEs tested, stolen items were unable to be recovered in all cases and lastly occurrences of theft were undetectable in all cases. The results gained in this study present the key problem areas which need to be addressed to improve security and reduce the occurrence of virtual property theft.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Access Node: an FPGA-based Security Architecture for Access Networks

Providing network security is one of the most important tasks in today’s Internet. Unfortunately, many users are not able to protect themselves and their networks. Therefore, we present a novel security concept to protect users by providing security measures at the Internet Service Provider (ISP) level. Already now, ISP are using different security measures, e.g. Virtual Local Area Network tags...

متن کامل

Copyright Protection through Deep Packet Inspection- An Indian Perspective

The beginning of 21 century saw file sharing of copy righted materials emerging as a major threat to the established business models of the content industry. The intellectual property rights in the real world scenario holds true in the virtual world also. This paper tries to understand the various issues of copy right violation in India. It also introduces deep packet inspection, a method to an...

متن کامل

A Simple Semantics and Static Analysis for Stack Inspection

The Java virtual machine and the .NET common language runtime feature an access control mechanism specified operationally in terms of run-time stack inspection. We give a denotational semantics in “eager” form, and show that it is equivalent to the “lazy” semantics using stack inspection. We give a static analysis of safety, i.e., the absence of security errors, that is simpler than previous pr...

متن کامل

Understanding Security Threats in Virtual Worlds

The influx of Fortune 500 companies like IBM, Toyota and Starwood Hotels into the virtual world of Second Life has generated much publicity in 2006 and 2007. The virtual world landscape has changed substantially since. Many early adopters have abandoned virtual worlds, and the number of security-related incidents in virtual worlds has risen substantially. This paper discusses key security threa...

متن کامل

Comparison of Real and Legal Personality with Virtual Personality from a Moral Perspective in Iranian Law

Background: In the legal world, a person is not only referred to as a human being. In fact, in the world of law, a person has a more general concept that includes both human and non-human. The aim of this study was to compare real and legal personality with virtual personality from a moral perspective, as one of the important principles of Iranian law. In this regard, by understanding ethics an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2012