On the impacts of human interactions in MMORPG traffic
Game traffic depends on two main factors, the game protocol and the gamers’ behavior. Based on a few popular real-time multiplayer games this paper investigates the latter factor showing how a set of typical game phases—e.g., player movement, changes in the environment—impacts traffic on different o...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2009-10, Vol.45 (1-3), p.133-161 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Game traffic depends on two main factors, the game protocol and the gamers’ behavior. Based on a few popular real-time multiplayer games this paper investigates the latter factor showing how a set of typical game phases—e.g., player movement, changes in the environment—impacts traffic on different observation levels. The nature of human behavior has such a high impact on traffic characteristics that it influences the traffic both at a macroscopic—e.g., traffic rate—and at a microscopic—payload content—level. First, by understanding the nature of this impact a
user behavior detection algorithm
is introduced to grab specific events and states from passive traffic measurements. The algorithms focus on the characteristics of the traffic rate, showing what information can be gathered by observing only packet header information. Second, as an application of our method
some results
, including a detailed analysis of measurements taken from an operational broadband network, are presented. Third,
a novel model and an algorithm
are introduced to extend the Deep Packet Inspection traffic classification method with the analysis of non-fix byte signatures, which are not considered in current methods. The model captures the variation of the dynamic byte segments and provides parameters for the algorithm. The introduced algorithm exploits the spatial and temporal correlation by examining and extracting the correlation structure of the traffic and constructing signatures based on the observed correlation. The algorithm is evaluated by examining proprietary gaming traffic and also other known non-gaming protocols. |
---|---|
ISSN: | 1380-7501 1573-7721 |
DOI: | 10.1007/s11042-009-0298-4 |