Cheat-Proof Playout for Centralized and Distributed Online Games IEEE InfoCom’01 Paper by Nathaniel E. Baughman and Brian Neil Levine CPSC 538A Presentation:

Slides:



Advertisements
Similar presentations
Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Akshat Sharma Samarth Shah
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Cheat-Proof Playout for Centralized and Distributed Online Games By Nathaniel Baughman and Brian Levine (danny perry)
Comp763: Modern Computer Games Cheat-Proof Playout for Centralized and Distributed Online Games Nathaniel E. BaughmanBrian Neil Levine Irwin Chiu Hau Computer.
CSE331: Introduction to Networks and Security Lecture 22 Fall 2002.
Cheat-Proofing P2P Online-gaming Albert Lee Spring 2008 Comp 424.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
 Public key (asymmetric) cryptography o Modular exponentiation for encryption/decryption  Efficient algorithms for this o Attacker needs to factor large.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 29 Cryptography and Network.
Homework #4 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Sync-MS: Synchronized Messaging Service for Real-Time Multi-Player Distributed Games By Yow-Jian Lin, Katherine Guo and Sanjoy Paul Presented by Greg Kempe.
Cryptography Basic (cont)
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Applied Cryptography for Network Security
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games Mo-Che Chan, Shun-Yun Hu and Jehn-Ruey Jiang.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
Lecture 11: Strong Passwords
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Chapter 21 Distributed System Security Copyright © 2008.
Chapter 31 Cryptography And Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
Key Mangement Marjan Causevski Sanja Zakovska. Contents Introduction Key Management Improving Key Management End-To-End Scheme Vspace Scheme Conclusion.
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Why Cryptography is Harder Than It Looks
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Software Security Seminar - 1 Chapter 4. Intermediate Protocols 발표자 : 이장원 Applied Cryptography.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Network Security Celia Li Computer Science and Engineering York University.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Homework #4 Solutions Brian A. LaMacchia
KERBEROS.
CDK: Chapter 7 TvS: Chapter 9
Chapter 29 Cryptography and Network Security
Secure Diffie-Hellman Algorithm
Presentation transcript:

Cheat-Proof Playout for Centralized and Distributed Online Games IEEE InfoCom’01 Paper by Nathaniel E. Baughman and Brian Neil Levine CPSC 538A Presentation: Georg Wittenburg

Background of the Paper Authors:  Nathaniel E. Baughman – BS in Ohio Northern University  Brian Neil Levine – Professor at UMass since 1999

What is Cheating? What is fair?  “[…] an online game is fair if state as perceived by every player is consistent with every other player’s expectations, including the server, as defined by the game rules.” Cheats take advantage of a technical weakness to gain an unfair advantage over another player. Cheats are game (genre) dependant and implementation dependant.

Some Background on Security The three major goals of information security are:  Confidentiality – Data is protected against spying.  Integrity – Data is protected against manipulation.  Availability – Data (or services) can be accessed.

Some Background on Security Choices need to be made on how to reach these goals. The most crucial single aspect in this design process is what one knows about potential attacks. Hence we need to model the attacker.

Modelling the Attacker Common characteristics of hackers are:

Modelling the Attacker Common characteristics of hackers are: They are incredibly smart.

Modelling the Attacker Common characteristics of hackers are: They are incredibly smart. They dress in black.

Modelling the Attacker Common characteristics of hackers are: They are incredibly smart. They dress in black. They know Kung-Fu.

Modelling the Attacker Common characteristics of hackers are: They are incredibly smart. They dress in black. They know Kung-Fu. So the typical hackers are:

Modelling the Attacker (2) Attackers are characterized by their capabilities:  read, write, and block messages on parts of the network on the entire network  modify the client  read and write data on the server  deny service (client or server side)

Centralized and Distributed Games

Attacks and Defenses Suppress-Correct Cheat  In a dead reckoning environment, gain advantage by delaying your actions. Lookahead Cheat  For simultaneous actions, gain advantage by being the last player to decide. Verifying Secret Possessions  Verify current claims (e.g. possession) based on previously secret actions. Verifying Hidden Positions  Verify information (e.g. a player’s position) without giving that information away.

Suppress-Correct Cheat Bucket implementation, that assumes disconnect after n lost packets; compensates with dead reckoning. Delay your replies in a way so that you miss only n-1 packets. In your reply you can take other players’ actions into account, thus “seeing into the future.”

Lookahead Cheat In turn-based games, delay your action until you have received the actions of all other players. Proposed Solution: Lockstep Protocol  Instead of sending actions, players send a cryptographic hash of their intended action.  Only after the hashes of all other players have been received, the plain text actions are sent.  This has performance issues as it effectively synchronizes all players.

Lookahead Cheat - Optimization Optimization: Only synchronize with players whose actions can affect you. Model possibility of interaction with “Spheres of Influence”:

Lookahead Cheat – Optimization (2) Based on current position / state, the number of steps is calculated that it takes to reach another player’s sphere of influence. Gameplay proceeds asynchronously until spheres intersect or could intersect during the next turn. Players with intersecting spheres synchronize as before. Additional benefit: Packets may be lost as long as spheres have a safe distance.

Performance Analysis

Verifying Secret Possessions Players need to verify that their current state was reached by legal means, e.g. to have item X, you need to find it in the past. Proposed Solution:  Have a designated entity (“Logger”) store cryptographic hashes of critical parts of a player’s current state.  Make this information available when required in the future.

Verifying Hidden Positions A piece of information (e.g. player’s position) needs to be compared without revealing it. Proposed Solution: Basic Cryptography  Use a commutative cryptosystem.  Exchange random numbers, XOR them, add secret, encrypt, and trade results.  Due to commutative nature of the cryptosystem, repeated encryption with own key will yield a comparable value.

Conclusion Four attacks / problems were discussed. Three solutions were proposed. One solution was evaluated extensively.

Evaluation The process of cheating was not modelled, the definition of fairness is weak. The description of possible attacks is helpful. The proposed solutions have merit, pending evaluation on a wider variety of games. As a side note, I had problems with scope and structure of the paper.

References SySL Reading Group Presentation by Chris OGI “Cheatproof Playout Summary” by Chris UOregon

The End

Discussion