{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:31:11Z","timestamp":1773930671202,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":39,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3178876.3186177","type":"proceedings-article","created":{"date-parts":[[2018,4,13]],"date-time":"2018-04-13T15:53:48Z","timestamp":1523634828000},"page":"1825-1834","source":"Crossref","is-referenced-by-count":20,"title":["No Silk Road for Online Gamers!"],"prefix":"10.1145","author":[{"given":"Eunjo","family":"Lee","sequence":"first","affiliation":[{"name":"NCSOFT, Seongnam, South Korea"}]},{"given":"Jiyoung","family":"Woo","sequence":"additional","affiliation":[{"name":"Soonchunhyang University, Asan, South Korea"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Seoul, South Korea"}]},{"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, South Korea"}]}],"member":"320","reference":[{"key":"key-10.1145\/3178876.3186177-1","unstructured":"R&#233;ka Albert, Hawoong Jeong, and Albert-L&#225;szl&#243; Barab&#225;si . 2000. Error and attack tolerance of complex networks. nature, Vol. 406, 6794 (2000), 378--382."},{"key":"key-10.1145\/3178876.3186177-2","unstructured":"Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre . 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment, Vol. 2008, 10 (2008), P10008."},{"key":"key-10.1145\/3178876.3186177-3","doi-asserted-by":"crossref","unstructured":"Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, and Matei Ripeanu . 2011. The socialbot network: when bots socialize for fame and money Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 93--102.","DOI":"10.1145\/2076732.2076746"},{"key":"key-10.1145\/3178876.3186177-4","doi-asserted-by":"crossref","unstructured":"Edward Castronova . 2001. Virtual worlds: A first-hand account of market and society on the cyberian frontier. (2001).","DOI":"10.2139\/ssrn.294828"},{"key":"key-10.1145\/3178876.3186177-5","unstructured":"Edward Castronova . 2007. Effects of Botting on World of Warcraft. http:\/\/virtuallyblind.com\/files\/mdy\/blizzard_msj_exhibit_7.pdf. (2007)."},{"key":"key-10.1145\/3178876.3186177-6","unstructured":"Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, and Larry Korba . 2005. Online gaming cheating and security issue. In International Conference on Information Technology: Coding and Computing (ITCC'05)-Volume II, Vol. Vol. 1. IEEE, 518--523."},{"key":"key-10.1145\/3178876.3186177-7","doi-asserted-by":"crossref","unstructured":"Taejoong Chung, Jinyoung Han, Daejin Choi, Taekyoung Ted Kwon, Huy Kang Kim, and Yanghee Choi . 2014. Unveiling group characteristics in online social games: a socio-economic analysis Proceedings of the 23rd International Conference on World Wide Web. ACM, 889--900.","DOI":"10.1145\/2566486.2568011"},{"key":"key-10.1145\/3178876.3186177-8","doi-asserted-by":"crossref","unstructured":"Aaron Clauset, Cristopher Moore, and Mark EJ Newman . 2008. Hierarchical structure and the prediction of missing links in networks. Nature, Vol. 453, 7191 (2008), 98--101.","DOI":"10.1038\/nature06830"},{"key":"key-10.1145\/3178876.3186177-9","unstructured":"Aaron Clauset, Mark EJ Newman, and Cristopher Moore . 2004. Finding community structure in very large networks. Physical review E, Vol. 70, 6 (August . 2004), 066111."},{"key":"key-10.1145\/3178876.3186177-10","unstructured":"Engage Digital . 2008. Group Laundered $38M in Virtual Currencies in 18 Months. http:\/\/www.engagedigital.com\/blog\/2008\/10\/27\/group-laundered-38m-in-virtual-currencies-in-18-months\/. (2008)."},{"key":"key-10.1145\/3178876.3186177-11","doi-asserted-by":"crossref","unstructured":"Atsushi Fujita, Hiroshi Itsuki, and Hitoshi Matsubara . 2011. Detecting Real Money Traders in MMORPG by Using Trading Network Proceedings of the Seventh AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment.","DOI":"10.1609\/aiide.v7i1.12427"},{"key":"key-10.1145\/3178876.3186177-12","doi-asserted-by":"crossref","unstructured":"Bin He, Mitesh Patel, Zhen Zhang, and Kevin Chen-Chuan Chang . 2007. Accessing the Deep Web. Commun. ACM Vol. 50, 5 (2007), 94--101.","DOI":"10.1145\/1230819.1241670"},{"key":"key-10.1145\/3178876.3186177-13","doi-asserted-by":"crossref","unstructured":"Richard Heeks . 2008. Current analysis and future research agenda on\" Gold Farming\": Real-world production in developing countries for the virtual economies of online games. Institute for Development Policy and Management, University of Mancester (2008).","DOI":"10.2139\/ssrn.3477387"},{"key":"key-10.1145\/3178876.3186177-14","doi-asserted-by":"crossref","unstructured":"Richard Heeks . 2009. Understanding\" gold farming\" and real-money trading as the intersection of real and virtual economies. Journal For Virtual Worlds Research Vol. 2, 4 (2009).","DOI":"10.4101\/jvwr.v2i4.868"},{"key":"key-10.1145\/3178876.3186177-15","doi-asserted-by":"crossref","unstructured":"Richard Heeks . 2010. Real money from virtual worlds. Scientific American, Vol. 302, 1 (2010), 68--73.","DOI":"10.1038\/scientificamerican0110-68"},{"key":"key-10.1145\/3178876.3186177-16","doi-asserted-by":"crossref","unstructured":"Junsok Huhh . 2008. Simple economics of real-money trading in online games. Available at SSRN 1089307 (2008).","DOI":"10.2139\/ssrn.1089307"},{"key":"key-10.1145\/3178876.3186177-17","unstructured":"Infiniti Research Limited . 2014. Global Online Gaming Market 2014. http:\/\/www.marketwatch.com\/story\/global-online-gaming-market-2014--2014-06--25. (2014). (accessed on 14 October 2016)."},{"key":"key-10.1145\/3178876.3186177-18","unstructured":"Brian Keegan, Muhammad Aurangzeb Ahmed, Dmitri Williams, Jaideep Srivastava, and Noshir Contractor . 2010. Dark gold: Statistical properties of clandestine networks in massively multiplayer online games Proceedings of the 2nd International Conference on Social Computing. IEEE, 201--208."},{"key":"key-10.1145\/3178876.3186177-19","unstructured":"Hana Kim, Seongil Yang, and Huy Kang Kim . 2017. Crime scene re-investigation: a postmortem analysis of game account stealers' behaviors Network and Systems Support for Games (NetGames), 2017 15th Annual Workshop on. IEEE, 1--6."},{"key":"key-10.1145\/3178876.3186177-20","unstructured":"Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, and Huy Kang Kim . 2017. Crime scene reconstruction: Online gold farming network analysis. IEEE Transactions on Information Forensics and Security, Vol. 12, 3 (2017), 544--556."},{"key":"key-10.1145\/3178876.3186177-21","unstructured":"Hyukmin Kwon, Kyungmoon Woo, Hyunchul Kim, Chongkwon Kim, and Huy Kang Kim . 2013. Surgical strike: a novel approach to minimize collateral damage to game bot detection Proceedings of annual workshop on network and systems support for games. IEEE, 1--2."},{"key":"key-10.1145\/3178876.3186177-22","doi-asserted-by":"crossref","unstructured":"Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Aziz Mohaisen, and Huy Kang Kim . 2016. You are a game bot!: uncovering game bots in MMORPGs via self-similarity in the wild. NDSS.","DOI":"10.14722\/ndss.2016.23436"},{"key":"key-10.1145\/3178876.3186177-23","unstructured":"Yeng-Ting Lee and Kuan-Ta Chen . 2010. Is server consolidation beneficial to MMORPG? A case study of World of Warcraft 2010 IEEE 3rd International Conference on Cloud Computing. IEEE, 435--442."},{"key":"key-10.1145\/3178876.3186177-24","unstructured":"Vili Lehdonvirta . 2008. Real-money trade of virtual assets: new strategies for virtual world operators. Virtual Worlds, Ipe, Mary, ed (2008), 113--137."},{"key":"key-10.1145\/3178876.3186177-25","unstructured":"Alan Mislove, Massimiliano Marcon, Krishna P Gummadi, Peter Druschel, and Bobby Bhattacharjee . 2007. Measurement and analysis of online social networks Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. ACM, 29--42."},{"key":"key-10.1145\/3178876.3186177-26","doi-asserted-by":"crossref","unstructured":"Carlo Morselli, Cynthia Gigu&#232;re, and Katia Petit . 2007. The efficiency\/security trade-off in criminal networks. Social Networks, Vol. 29, 1 (2007), 143--153.","DOI":"10.1016\/j.socnet.2006.05.001"},{"key":"key-10.1145\/3178876.3186177-27","doi-asserted-by":"crossref","unstructured":"Carlo Morselli and Katia Petit . 2007. Law-enforcement disruption of a drug importation network. Global Crime, Vol. 8, 2 (2007), 109--130.","DOI":"10.1080\/17440570701362208"},{"key":"key-10.1145\/3178876.3186177-28","unstructured":"Kyle Orland . 2017. World of Warcraft gold can now be used to buy other Blizzard items. https:\/\/arstechnica.com\/gaming\/2017\/02\/world-of-warcraft-gold-can-now-be-used-to-buy-other-blizzard-items\/. (2017)."},{"key":"key-10.1145\/3178876.3186177-29","unstructured":"Pascal Pons and Matthieu Latapy . 2005. Computing communities in large networks using random walks International Symposium on Computer and Information Sciences. Springer, 284--293."},{"key":"key-10.1145\/3178876.3186177-30","doi-asserted-by":"crossref","unstructured":"Usha Nandini Raghavan, R&#233;ka Albert, and Soundar Kumara . 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E, Vol. 76, 3 (2007), 036106.","DOI":"10.1103\/PhysRevE.76.036106"},{"key":"key-10.1145\/3178876.3186177-31","doi-asserted-by":"crossref","unstructured":"Martin Rosvall and Carl T. Bergstrom . 2008. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, Vol. 105, 4 (2008), 1118--1123.","DOI":"10.1073\/pnas.0706851105"},{"key":"key-10.1145\/3178876.3186177-32","unstructured":"Atanu Roy, Muhammad Aurangzeb Ahmad, Chandrima Sarkar, Brian Keegan, and Jaideep Srivastava . 2012. The ones that got away: False negative estimation based approaches for gold farmer detection Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 328--337."},{"key":"key-10.1145\/3178876.3186177-33","doi-asserted-by":"crossref","unstructured":"Seokshin Son, Ahreum Kang, Hyunchul Kim, Taekyoung Kwon, Juyong Park, and Huy Kang Kim . 2012. Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game. PloS one, Vol. 7, 4 (2012), e33918.","DOI":"10.1371\/journal.pone.0033918"},{"key":"key-10.1145\/3178876.3186177-34","unstructured":"Gianluca Stringhini, Pierre Mourlanne, Gregoire Jacob, Manuel Egele, Christopher Kruegel, and Giovanni Vigna . 2015. Evilcohort: detecting communities of malicious accounts on online services. USENIX."},{"key":"key-10.1145\/3178876.3186177-35","unstructured":"Jiyoung Woo, Hwajae Choi, and Huy Kang Kim . 2012. An automatic and proactive identity theft detection model in MMORPGs. Appl. Math, Vol. 6, 1S (2012), 291S--302S."},{"key":"key-10.1145\/3178876.3186177-36","doi-asserted-by":"crossref","unstructured":"Kyungmoon Woo, Hyukmin Kwon, Hyunchul Kim, Chongkwon Kim, and Huy Kang Kim . 2011. What can free money tell us on the virtual black market? ACM SIGCOMM Computer Communication Review Vol. 41, 4 (2011), 392--393.","DOI":"10.1145\/2043164.2018484"},{"key":"key-10.1145\/3178876.3186177-37","doi-asserted-by":"crossref","unstructured":"Jennifer Xu and Hsinchun Chen . 2005. Criminal network analysis and visualization. Commun. ACM Vol. 48, 6 (2005), 100--107.","DOI":"10.1145\/1064830.1064834"},{"key":"key-10.1145\/3178876.3186177-38","doi-asserted-by":"crossref","unstructured":"Chao Yang, Robert Harkreader, Jialong Zhang, Seungwon Shin, and Guofei Gu . 2012. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st International Conference on World Wide Web. ACM, 71--80.","DOI":"10.1145\/2187836.2187847"},{"key":"key-10.1145\/3178876.3186177-39","unstructured":"Yao Zhao, Yinglian Xie, Fang Yu, Qifa Ke, Yuan Yu, Yan Chen, and Eliot Gillum . 2009. BotGraph: Large Scale Spamming Botnet Detection.. NSDI, Vol. Vol. 9. 321--334."}],"event":{"name":"the 2018 World Wide Web Conference","location":"Lyon, France","acronym":"WWW '18","number":"2018","sponsor":["SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web","IW3C2, International World Wide Web Conference Committee"],"start":{"date-parts":[[2018,4,23]]},"end":{"date-parts":[[2018,4,27]]}},"container-title":["Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178876.3186177","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3186177&ftid=1957370&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:17Z","timestamp":1750208897000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3178876.3186177"}},"subtitle":["Using Social Network Analysis to Unveil Black Markets in Online Games"],"proceedings-subject":"World Wide Web","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1145\/3178876.3186177","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}