Using keystroke and mouse dynamics for user identification in the online collaborative game League of Legends

DA SILVA BESERRA, I., CAMARA, L. and DA COSTA ABREU, Marjory (2016). Using keystroke and mouse dynamics for user identification in the online collaborative game League of Legends. In: 7th International Conference on Imaging for Crime Detection and Prevention (ICDP 2016). Institution of Engineering and Technology.

[img] PDF
Game-Biometrics.pdf - Published Version
Restricted to Repository staff only
All rights reserved.

Download (128kB)
[img]
Preview
PDF
Abreu_UsingKeystrokesMouse(AM).pdf - Accepted Version
All rights reserved.

Download (128kB) | Preview
Official URL: https://ieeexplore.ieee.org/document/8267316
Link to published version:: https://doi.org/10.1049/ic.2016.0076
Related URLs:

    Abstract

    © 2016 Institution of Engineering and Technology. All rights reserved. The popularity of computer games has grown exponentially in the last few years. It is not uncommon to find players of online games who can dedicate their whole lives in order to became the best in their favourite game. The best players normally become celebrities and can even get sponsored to compete in game tourneys. It is accepted that each player should follow the his/her own path to increase level, so the experience reflected in the gamer's level is how proficient he/she is in the game. However, this increased popularity has also created a desire on some players to cheat (by paying others more experienced players to play for them) for the progress in the game and thus to improve their status. The companies that develop such games have very strict punishment for such breaking of the rules, but, it can be very difficult to identify when this "account sharing" happens. This paper focus on the collection and analysis of a new online game database for continuous mouse dynamics and keystroke dynamics authentication in order to identify whether who is playing is really the account holder. Our very first results point to very interesting possibilities for security biometric-based applications in this new game analysis area.

    Item Type: Book Section
    Additional Information: © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
    Identification Number: https://doi.org/10.1049/ic.2016.0076
    SWORD Depositor: Symplectic Elements
    Depositing User: Symplectic Elements
    Date Deposited: 19 Aug 2020 15:25
    Last Modified: 20 Aug 2020 11:00
    URI: http://shura.shu.ac.uk/id/eprint/25384

    Actions (login required)

    View Item View Item

    Downloads

    Downloads per month over past year

    View more statistics