{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:13:59Z","timestamp":1751688839128,"version":"3.41.0"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319936406"},{"type":"electronic","value":"9783319936413"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93641-3_6","type":"book-chapter","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T02:48:32Z","timestamp":1528339712000},"page":"114-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Machine Learning Approach for Game Bot Detection Through Behavioural Features"],"prefix":"10.1007","author":[{"given":"Mario Luca","family":"Bernardi","sequence":"first","affiliation":[]},{"given":"Marta","family":"Cimitile","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,8]]},"reference":[{"key":"6_CR1","unstructured":"Adams, E.: Fundamentals of Game Design (2014)"},{"key":"6_CR2","doi-asserted-by":"crossref","DOI":"10.4324\/9780203627488","volume-title":"Multiplayer: The Social Aspects of Digital Gaming","author":"T Quandt","year":"2013","unstructured":"Quandt, T., Kr\u00f6ger, S.: Multiplayer: The Social Aspects of Digital Gaming, vol. 3. Routledge, Abingdon (2013)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Seay, A.F., Jerome, W.J., Lee, K.S., Kraut, R.E.: Project massive: a study of online gaming communities. In: CHI 2004 Extended Abstracts on Human Factors in Computing Systems, pp. 1421\u20131424. ACM (2004)","DOI":"10.1145\/985921.986080"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Yee, N.: Maps of digital desires: exploring the topography of gender and play in online games. In: Beyond Barbie and Mortal Kombat: New Perspectives on Gender and Gaming, pp. 83\u201389 (2008)","DOI":"10.7551\/mitpress\/7477.003.0010"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.adolescence.2003.10.007","volume":"27","author":"MD Griffiths","year":"2004","unstructured":"Griffiths, M.D., Davies, M.N., Chappell, D.: Online computer gaming: a comparison of adolescent and adult gamers. J. Adolesc. 27, 87\u201396 (2004)","journal-title":"J. Adolesc."},{"key":"6_CR6","unstructured":"Chen, Y.C., Chen, P.S., Song, R., Korba, L.: Online gaming crime and security issue-cases and countermeasures from Taiwan. In: PST, pp. 131\u2013136 (2004)"},{"key":"6_CR7","first-page":"52","volume":"7","author":"RA Paulson","year":"2006","unstructured":"Paulson, R.A., Weber, J.E.: Cyberextortion: an overview of distributed denial of service attacks against online gaming companies. Issues Inf. Syst. 7, 52\u201356 (2006)","journal-title":"Issues Inf. Syst."},{"key":"6_CR8","first-page":"7","volume":"5","author":"RV Yampolskiy","year":"2008","unstructured":"Yampolskiy, R.V., Govindaraju, V.: Embedded noninteractive continuous bot detection. Comput. Entertain. (CIE) 5, 7 (2008)","journal-title":"Comput. Entertain. (CIE)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1186\/s40064-016-2122-8","volume":"5","author":"AR Kang","year":"2016","unstructured":"Kang, A.R., Jeong, S.H., Mohaisen, A., Kim, H.K.: Multimodal game bot detection using user behavioral characteristics. SpringerPlus 5, 523 (2016)","journal-title":"SpringerPlus"},{"key":"6_CR10","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62569-0","volume-title":"Software Technologies","year":"2017","unstructured":"Cabello, E., Cardoso, J., Ludwig, A., Maciaszek, L.A., van Sinderen, M. (eds.): ICSOFT 2016. CCIS, vol. 743. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-62569-0"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Bernardi, M.L., Cimitile, M., Mercaldo, F.: A time series classification approach to game bot detection. In: Proceeding of the 7th ACM International Conference on Web Intelligence, Mining and Semantics, pp. 512\u2013519 (2017)","DOI":"10.1145\/3102254.3102263"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Varvello, M., Voelker, G.M.: Second life: a social network of humans and bots. In: Proceedings of the 20th International Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV 2010, pp. 9\u201314. ACM, New York (2010)","DOI":"10.1145\/1806565.1806570"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Oh, J., Borbora, Z.H., Sharma, D., Srivastava, J.: Bot detection based on social interactions in MMORPGs. In: 2013 International Conference on Social Computing (SocialCom), pp. 536\u2013543. IEEE (2013)","DOI":"10.1109\/SocialCom.2013.81"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1016\/j.camwa.2012.01.034","volume":"65","author":"AR Kang","year":"2013","unstructured":"Kang, A.R., Woo, J., Park, J., Kim, H.K.: Online game bot detection based on party-play log analysis. Comput. Math. Appl. 65, 1384\u20131395 (2013)","journal-title":"Comput. Math. Appl."},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/11589990_187","volume-title":"AI 2005: Advances in Artificial Intelligence","author":"H Kim","year":"2005","unstructured":"Kim, H., Hong, S., Kim, J.: Detection of auto programs for MMORPGs. In: Zhang, S., Jarvis, R. (eds.) AI 2005. LNCS (LNAI), vol. 3809, pp. 1281\u20131284. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11589990_187"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Chen, K.T., Pao, H.K.K., Chang, H.C.: Game bot identification based on manifold learning. In: Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games, pp. 21\u201326. ACM (2008)","DOI":"10.1145\/1517494.1517498"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-540-89222-9_11","volume-title":"Entertainment Computing - ICEC 2008","author":"K-T Chen","year":"2008","unstructured":"Chen, K.-T., Liao, A., Pao, H.-K.K., Chu, H.-H.: Game bot detection based on avatar trajectory. In: Stevens, S.M., Saldamarco, S.J. (eds.) ICEC 2008. LNCS, vol. 5309, pp. 94\u2013105. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89222-9_11"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Chen, K.T., Jiang, J.W., Huang, P., Chu, H.H., Lei, C.L., Chen, W.C.: Identifying MMORPG bots: a traffic analysis approach. In: Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, ACE 2006. ACM, New York (2006)","DOI":"10.1145\/1178823.1178829"},{"key":"6_CR19","first-page":"544","volume":"12","author":"H Kwon","year":"2017","unstructured":"Kwon, H., Mohaisen, A., Woo, J., Kim, Y., Lee, E., Kim, H.K.: Crime scene reconstruction: online gold farming network analysis. IEEE Trans. Inf. Forensics Secur. 12, 544\u2013556 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Kim, H., Yang, S., Kim, H.K.: Crime scene re-investigation: a postmortem analysis of game account stealers\u2019 behaviors. CoRR abs\/1705.00242 (2017)","DOI":"10.1109\/NetGames.2017.7991540"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Thawonmas, R., Kashifuji, Y., Chen, K.T.: Detection of MMORPG bots based on behavior analysis. In: Proceedings of the 2008 International Conference on Advances in Computer Entertainment Technology, pp. 91\u201394. ACM (2008)","DOI":"10.1145\/1501750.1501770"},{"key":"6_CR22","unstructured":"Kashifuji, Y.: Detection of MMORPG bots based on behavior analysis. In: ACE 2008 (2008)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Hilaire, S., Kim, H., Kim, C.: How to deal with bot scum in MMORPGs? In: 2010 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/CQR.2010.5619911"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Mishima, Y., Fukuda, K., Esaki, H.: An analysis of players and bots behaviors in MMORPG. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 870\u2013876. IEEE (2013)","DOI":"10.1109\/AINA.2013.108"},{"key":"6_CR25","unstructured":"Chung, Y., Park, C.Y., Kim, N., Cho, H., Yoon, T.B., Lee, H., Lee, J.: A behavior analysis-based game bot detection approach considering various play styles. CoRR abs\/1509.02458 (2015)"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/319382.319388","volume":"42","author":"TM Mitchell","year":"1999","unstructured":"Mitchell, T.M.: Machine learning and data mining. Commun. ACM 42, 30\u201336 (1999)","journal-title":"Commun. ACM"},{"key":"6_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-12405-5","volume-title":"Machine Learning: An Artificial Intelligence Approach","author":"RS Michalski","year":"2013","unstructured":"Michalski, R.S., Carbonell, J.G., Mitchell, T.M.: Machine Learning: An Artificial Intelligence Approach. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-662-12405-5"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1177\/1357633X15621847","volume":"23","author":"M Estai","year":"2017","unstructured":"Estai, M., Kanagasingam, Y., Xiao, D., Vignarajan, J., Bunt, S., Kruger, E., Tennant, M.: End-user acceptance of a cloud-based teledentistry system and Android phone app for remote screening for oral diseases. J. Telemed. Telecare 23, 44\u201352 (2017)","journal-title":"J. Telemed. Telecare"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Canfora, G., De Lorenzo, A., Medvet, E., Mercaldo, F., Visaggio, C.A.: Effectiveness of opcode ngrams for detection of multi family Android malware. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 333\u2013340. IEEE (2015)","DOI":"10.1109\/ARES.2015.57"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Canfora, G., Mercaldo, F., Visaggio, C.A.: A classifier of malicious Android applications. In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 607\u2013614. IEEE (2013)","DOI":"10.1109\/ARES.2013.80"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Ling, C.X., Yang, Q., Wang, J., Zhang, S.: Decision trees with minimal costs. In: Proceedings of the Twenty-First International Conference on Machine learning, p. 69. ACM (2004)","DOI":"10.1145\/1015330.1015369"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Jin, C., De-Lin, L., Fen-Xiang, M.: An improved ID3 decision tree algorithm. In: 4th International Conference on Computer Science and Education, ICCSE 2009, pp. 127\u2013130. IEEE (2009)","DOI":"10.1109\/ICCSE.2009.5228509"},{"key":"6_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-88693-8_40","volume-title":"Computer Vision \u2013 ECCV 2008","author":"J Pang","year":"2008","unstructured":"Pang, J., Huang, Q., Jiang, S.: Multiple instance boost using graph embedding based decision stump for pedestrian detection. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008. LNCS, vol. 5305, pp. 541\u2013552. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88693-8_40"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Hang, Y., Fong, S.: Investigating the impact of bursty traffic on Hoeffding Tree Algorithm in stream mining over internet. In: 2010 Second International Conference on Evolving Internet (INTERNET), pp. 147\u2013152. IEEE (2010)","DOI":"10.1109\/INTERNET.2010.33"},{"key":"6_CR35","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw, A., Wiener, M., et al.: Classification and regression by randomForest. R News 2, 18\u201322 (2002)","journal-title":"R News"},{"key":"6_CR36","first-page":"490","volume":"33","author":"A Cutler","year":"2001","unstructured":"Cutler, A., Zhao, G.: Pert-perfect random tree ensembles. Comput. Sci. Stat. 33, 490\u2013497 (2001)","journal-title":"Comput. Sci. Stat."},{"key":"6_CR37","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1016\/j.asr.2007.07.020","volume":"41","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Zhang, Y.: Comparison of decision tree methods for finding active objects. Adv. Space Res. 41, 1955\u20131959 (2008)","journal-title":"Adv. Space Res."},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Kanungo, T., Mount, D.M., Netanyahu, N.S., Piatko, C., Silverman, R., Wu, A.Y.: The analysis of a simple k-means clustering algorithm. In: Proceedings of the Sixteenth Annual Symposium on Computational Geometry, pp. 100\u2013109. ACM (2000)","DOI":"10.1145\/336154.336189"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Kumar, M., et al.: An optimized farthest first clustering algorithm. In: 2013 Nirma University International Conference on Engineering (NUiCONE), pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/NUiCONE.2013.6780187"},{"key":"6_CR40","first-page":"1","volume":"2","author":"M Panda","year":"2009","unstructured":"Panda, M., Patra, M.: A novel classification via clustering method for anomaly based network intrusion detection system. Int. J. Recent Trends Eng. 2, 1\u20136 (2009)","journal-title":"Int. J. Recent Trends Eng."},{"key":"6_CR41","first-page":"16","volume":"14","author":"AK Pandey","year":"2013","unstructured":"Pandey, A.K., Pandey, P., Jaiswal, K., Sen, A.K.: Datamining clustering techniques in the prediction of heart disease using attribute selection method. Heart Dis. 14, 16\u201317 (2013)","journal-title":"Heart Dis."},{"key":"6_CR42","first-page":"139","volume":"2","author":"DH Fisher","year":"1987","unstructured":"Fisher, D.H.: Knowledge acquisition via incremental conceptual clustering. Mach. Learn. 2, 139\u2013172 (1987)","journal-title":"Mach. Learn."},{"key":"6_CR43","doi-asserted-by":"crossref","DOI":"10.1201\/b10867","volume-title":"Data Mining and Machine Learning in Cybersecurity","author":"S Dua","year":"2016","unstructured":"Dua, S., Du, X.: Data Mining and Machine Learning in Cybersecurity. CRC Press, Boca Raton (2016)"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Bernardi, M.L., Cimitile, M., Distante, D., Mercaldo, F.: Game bot detection in online role player game through behavioural features. In: Proceeding of the 12th International Conference on Software Technologies (2017)","DOI":"10.5220\/0006417000500060"},{"key":"6_CR45","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.is.2016.06.002","volume":"62","author":"ML Bernardi","year":"2016","unstructured":"Bernardi, M.L., Cimitile, M., Di Francescomarino, C., Maggi, F.M.: Do activity lifecycles affect the validity of a business rule in a business process? Inf. Syst. 62, 42\u201359 (2016)","journal-title":"Inf. Syst."},{"key":"6_CR46","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s10270-014-0416-2","volume":"15","author":"ND Francesco","year":"2016","unstructured":"Francesco, N.D., Lettieri, G., Santone, A., Vaglini, G.: Heuristic search for equivalence checking. Softw. Syst. Model. 15, 513\u2013530 (2016)","journal-title":"Softw. Syst. Model."}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93641-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T00:47:29Z","timestamp":1751676449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93641-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319936406","9783319936413"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93641-3_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}