{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:23:19Z","timestamp":1769300599003,"version":"3.49.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031948541","type":"print"},{"value":"9783031948558","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94855-8_11","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:50:59Z","timestamp":1749793859000},"page":"166-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Framework to Enable Cheating Detection in Multiplayer Online Games"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3513-4807","authenticated-orcid":false,"given":"Salman","family":"Shaikh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8869-7210","authenticated-orcid":false,"given":"Hugo","family":"Bertin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3206-2030","authenticated-orcid":false,"given":"Marc","family":"Dacier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3812-3546","authenticated-orcid":false,"given":"Y\u00e9rom-David","family":"Bromberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"11_CR1","unstructured":"Andy: Lyra starter game (2022). https:\/\/dev.epicgames.com\/community\/learning\/paths\/Z4\/lyra-starter-game. Accessed 13 Jan 2025"},{"key":"11_CR2","doi-asserted-by":"publisher","unstructured":"Benhabbour, I., Bromberg, Y., Dacier, M., Dietrich, S., Rodrigues, R., Esteves-Verissimo, P.: Attacks on tomorrow\u2019s virtual world. In: 2023 53rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S), pp. 105\u2013110. IEEE Computer Society (2023). https:\/\/doi.org\/10.1109\/DSN-S58398.2023.00033","DOI":"10.1109\/DSN-S58398.2023.00033"},{"key":"11_CR3","unstructured":"Bertin, H., Benhabbour, I., Dacier, M., Bromberg, Y.D.: Disconnecting games with a single packet: an unreal untold story. https:\/\/www.youtube.com\/watch?v=ZpMHGBULZgU. hack.lu 2024. Accessed 12 Mar 2025"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Chen, B.D., Maheswaran, M.: A cheat controlled protocol for centralized online multiplayer games. In: Proceedings of 3rd ACM SIGCOMM Workshop on Network and System Support for Games, pp. 139\u2013143 (2004). https:\/\/doi.org\/10.1145\/1016540.1016554","DOI":"10.1145\/1016540.1016554"},{"key":"11_CR5","unstructured":"Choi, M., Ko, G., Cha, S.K.: BotScreen: trust everybody, but cut the aimbots yourself. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 481\u2013498 (2023). https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/choi. Accessed 28 Mar 2025"},{"key":"11_CR6","unstructured":"Clement, J.: Global video game industry revenue 2029 (2024). https:\/\/www.statista.com\/forecasts\/1344668\/revenue-video-game-worldwide. Accessed 12Mar 2025"},{"key":"11_CR7","unstructured":"Games, E.: Unreal\u00ae Engine End User License Agreement. https:\/\/www.unrealengine.com\/en-US\/eula\/unreal. Accessed 12 Mar 2025"},{"key":"11_CR8","doi-asserted-by":"publisher","unstructured":"GauthierDickey, C., Zappala, D., Lo, V., Marr, J.: Low latency and cheat-proof event ordering for peer-to-peer games. In: Proceedings of the 14th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 134\u2013139 (2004). https:\/\/doi.org\/10.1145\/1005847.1005877","DOI":"10.1145\/1005847.1005877"},{"key":"11_CR9","unstructured":"Granados, N.: Report: Cheating is becoming a big problem in online gaming (2018). https:\/\/www.forbes.com\/sites\/nelsongranados\/2018\/04\/30\/report-cheating-is-becoming-a-big-problem-in-online-gaming\/. Accessed 12 Mar 2025"},{"key":"11_CR10","unstructured":"GTAFORUMS: Cheats: You know someone is using a lag switch.... https:\/\/gtaforums.com\/topic\/359863-cheats-you-know-someone-is-using-a-lag-switch\/. Accessed 27 Mar 2025"},{"key":"11_CR11","series-title":"Proceedings in Adaptation, Learning and Optimization","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-319-13356-0_38","volume-title":"Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems - Volume 2","author":"ML Han","year":"2015","unstructured":"Han, M.L., Park, J.K., Kim, H.K.: Online game bot detection in FPS game. In: Handa, H., Ishibuchi, H., Ong, Y.-S., Tan, K.-C. (eds.) Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems - Volume 2. PALO, vol. 2, pp. 479\u2013491. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-13356-0_38"},{"key":"11_CR12","doi-asserted-by":"publisher","unstructured":"Hao, J., Cai, W.: Measuring information exposure attacks on interest management. In: 2012 ACM\/IEEE\/SCS 26th Workshop on Principles of Advanced and Distributed Simulation, pp. 133\u2013144. IEEE (2012). https:\/\/doi.org\/10.1109\/PADS.2012.24","DOI":"10.1109\/PADS.2012.24"},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Kabus, P., Terpstra, W.W., Cilia, M., Buchmann, A.P.: Addressing cheating in distributed MMOGs. In: 4th ACM SIGCOMM Workshop on Network and System Support for Games, NetGames \u201905, pp. 1\u20136. ACM (2005). https:\/\/doi.org\/10.1145\/1103599.1103607","DOI":"10.1145\/1103599.1103607"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Khan, A.M., Arsov, I., Preda, M., Chabridon, S., Beugnard, A.: Adaptable client-server architecture for mobile multiplayer games. In: Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, pp.\u00a01\u20137 (2010). https:\/\/doi.org\/10.4108\/ICST.SIMUTOOLS2010.8704","DOI":"10.4108\/ICST.SIMUTOOLS2010.8704"},{"key":"11_CR15","unstructured":"Knight, J.: Eternal crusade: Resurrection. https:\/\/eternal-crusade.com (2023). Accessed 13 Jan 2025"},{"key":"11_CR16","unstructured":"Kumar, N.: Esports viewership: 2025 (2024). https:\/\/www.demandsage.com\/esports-statistics\/. Accessed 12 Mar 2025"},{"key":"11_CR17","unstructured":"game-sec lab: Fd, ls and ddos attacks on fortnite (2024). https:\/\/www.dropbox.com\/scl\/fo\/k1gjem9akbc1io7vw8ysk\/AM_Uza91qNa9DTlHV_noCy0?rlkey=blaa5db9mcmjg816r0q9l0yhg&st=jdusdade &dl=0. dropbox folder. Accessed 12 Mar 2025"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Laurens, P., Paige, R.F., Brooke, P.J., Chivers, H.: A novel approach to the detection of cheating in multiplayer online games. In: 12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007), pp. 97\u2013106. IEEE (2007). https:\/\/doi.org\/10.1109\/ICECCS.2007.11","DOI":"10.1109\/ICECCS.2007.11"},{"key":"11_CR19","unstructured":"Lehtonen, S., et\u00a0al.: Comparative study of anti-cheat methods in video games. University of Helsinki, Faculty of Science (2020). https:\/\/helda.helsinki.fi\/items\/b1141406-eb65-48a5-8922-d1b23d4cfe51. Accessed 28 Mar 2025"},{"issue":"11s","key":"11_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3519023","volume":"54","author":"S Liu","year":"2022","unstructured":"Liu, S., Xu, X., Claypool, M.: A survey and taxonomy of latency compensation techniques for network computer games. ACM Comput. Surv. (CSUR) 54(11s), 1\u201334 (2022). https:\/\/doi.org\/10.1145\/3519023","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Maario, A., Shukla, V.K., Ambikapathy, A., Sharma, P.: Redefining the risks of kernel-level anti-cheat in online gaming. In: 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN), pp. 676\u2013680. IEEE (2021). https:\/\/doi.org\/10.1109\/SPIN52536.2021.9566108","DOI":"10.1109\/SPIN52536.2021.9566108"},{"key":"11_CR22","unstructured":"Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P.: Internet denial of service: attack and defense mechanisms (Radia Perlman Computer Networking and Security). Prentice Hall PTR (2004)"},{"key":"11_CR23","unstructured":"Moosa, S.: Overwatch 2 cheaters are crashing servers to avoid losing games (2024). https:\/\/www.ginx.tv\/en\/overwatch-2\/cheaters-are-crashing-servers-to-avoid-losing-games. Accessed 12 Mar 2025"},{"key":"11_CR24","unstructured":"Phil: What is a game engine: An essential overview for beginners - draw & code (2024). https:\/\/drawandcode.com\/learning-zone\/what-is-a-game-engine\/. Accessed 12 Mar 2025"},{"key":"11_CR25","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446 (2018). https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"11_CR26","unstructured":"Shaikh, S.: Network Flow Disruption in Multiplayer Online Games. Master\u2019s thesis, King Abdullah University of Science and Technology (2024). http:\/\/hdl.handle.net\/10754\/701288. Accessed 28 Mar 2025"},{"key":"11_CR27","unstructured":"Tandon, V., Devore, J.: Detecting lag switch cheating in game (2017). uS Patent 9,636,589"},{"key":"11_CR28","unstructured":"TARKOV: Lag switch hack is ruining the game. https:\/\/forum.escapefromtarkov.com\/topic\/116665-lag-switch-hack-is-ruining-the-game\/. Accessed 12 Mar 2025"},{"key":"11_CR29","unstructured":"V\u00e9ron, M.: Scalable services for massively multiplayer online games. Ph.D. thesis, Universit\u00e9 Pierre et Marie Curie - Paris VI (2015). https:\/\/theses.hal.science\/tel-01230852\/. Accessed 28 Mar 2025"},{"key":"11_CR30","unstructured":"Weatherbed, J.: Apex Legends devs confirm esports hacking incident (2024). https:\/\/www.theverge.com\/2024\/3\/18\/24104666\/apex-legends-postpones-algs-competition-hack-concerns. Accessed 27 Mar 2025"},{"key":"11_CR31","unstructured":"Webb, S., Soh, S., Lau, W.: Racs: a referee anti-cheat scheme for p2p gaming. In: Proceedings of the 17th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 34\u201342. Association for Computing Machinery (ACM) (2007). https:\/\/espace.curtin.edu.au\/handle\/20.500.11937\/32304. Accessed 27 Mar 2025"},{"key":"11_CR32","doi-asserted-by":"publisher","unstructured":"Webb, S.D., Soh, S.: Cheating in networked computer games: a review. In: 2nd International Conference on Digital Interactive Media in Entertainment and Arts, pp. 105\u2013112 (2007). https:\/\/doi.org\/10.1145\/1306813.1306839","DOI":"10.1145\/1306813.1306839"},{"issue":"1","key":"11_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2522968.2522977","volume":"46","author":"A Yahyavi","year":"2013","unstructured":"Yahyavi, A., Kemme, B.: Peer-to-peer architectures for massively multiplayer online games: a survey. ACM Comput. Surv. (CSUR) 46(1), 1\u201351 (2013). https:\/\/doi.org\/10.1145\/2522968.2522977","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"11_CR34","unstructured":"Zenou, T.: A novel predicted the metaverse (and hyperinflation) 30 years ago (2022). https:\/\/www.washingtonpost.com\/history\/2022\/06\/30\/snow-crash-neal-stephenson-metaverse\/. Accessed 12 Mar 2025"}],"container-title":["Communications in Computer and Information Science","Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94855-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:13:51Z","timestamp":1765196031000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94855-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031948541","9783031948558"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94855-8_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Interdisciplinary Cybersecurity Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rennes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eicc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fvv.um.si\/eicc2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}