People enjoy playing games for simple pleasure. Recently, since the emergence and advance of the computer technologies, especially in terms of graphic and networking, which enables people to experience virtual world with a computer network they couldn’t ever have imagined (Smed & Hakonen, 2003). In this respect, the popularity of games has roared, which builds up the cultural phenomenon because numerous people are involved in the game forming community.
Key Terms in this Chapter
Collusion: An malicious activity between two or more persons to defraud another game user.
Keylogger: A computer program that captures the keystrokes of a computer user and stores them. Modern keyloggers can store additional information, such as images of the user’s screen. Most malicious keyloggers send this data to a third party remotely (such as via e-mail).
Encryption: A procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.
Anti-Hack Solution: The solution for prevention, detection, and response to the game cheating.
Online Game: Multiple clients connect a host server through the Internet so that they may play network game.
Gamebot: A program for item harvesting automatically.
Anomaly-Based Detection: Anomaly-based detection detects abnormal states, which an attacker provokes.
MMORPG: A massively (or massive) multiplayer online role-playing game or MMORPG is a multiplayer computer role-playing game that enables thousands of players to play in an evolving virtual world at the same time over the Internet.
Signature-Based Detection: Signature-based detection represents a detection method distinguishing the distinctive bit stream from an auxiliary program.