Visualization of Grandblue Fantasy Game Traffic Pattern Using Deep Packet Inspection Method
Abstract views: 29

Visualization of Grandblue Fantasy Game Traffic Pattern Using Deep Packet Inspection Method

Deris Stiawan, Christian Prabowo, Ahmad Heryanto, Nurul Afifah, Agus Eko Minarno, Rahmat Budiarto

Abstract

Grandblue Fantasy is one of Role Playing Games (RPG). It’s a video role-playing game developed by Cygames. This research to observes the Gandblue Fantasy Game. The purpose is to analyze the traffic data of the Grandblue Fantasy to find the pattern using Deep Packet Inspection (DPI), Capturing the Data Traffic, Feature Extraction Process and Visualize the Pattern. The Pattern are Gacha, Solo Raid, Casino and Multiraid. This research demonstrate that Multiraid battle has more data than other pattern with TTL 237.

Keywords

DPI, Behavior, traffic classification

References

[1] App Annie, “Top grossing apps and download statistics google play | app annie.” [Online]. Available: https://www.appannie.com/en/apps/google-play/top/japan/game/. [Last Accessed: 05-Apr-2019].

[2] J. Svoboda, “Network traffic analysis with deep packet inspection method,” Fac. Informatics Masaryk Univ., no. Master’s Thesis, 2014.

[3] Y. Afek, A. Bremler-barr, and Y. Koral, “Space efficient deep packet inspection of compressed web traffic,” no. 259085, pp. 1–14, 2012. https://doi.org/ 10.1016/j.comcom.2012.01.017

[4] X. Che and B. Ip, “Packet-level traffic analysis of online games from the genre characteristics perspective,” J. Netw. Comput. Appl., vol. 35, no. 1, pp. 240–252, 2012. https://doi.org/10.1016/j.jnca.2011.08.005

[5] J. Kim, J. Choi, D. Chang, T. Kwon, Y. Choi, and E. Yuk, “Traffic characteristics of a massively multi-player online role playing game,” p. 1, 2006. https://doi.org/10.1145/1103599.1103619

[6] D. Stiawan et al., "Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method," International Journal of Communication Networks and Information Security, vol. 11, no. 1, pp. 128-133, 2019.

[7] T. Sasut, A. Valianta, and D. Stiawan, “Klasifikasi Trafik Terenkripsi Menggunakan Metode Deep Packet Inspection (Dpi),” vol. 2, no. 1, pp. 424–429, 2016.

[8] S. Kim, J. Kim, and B. B. Kang, "Malicious URL protection based on attackers' habitual behavioral analysis," Computers & Security, vol. 77, pp. 790-806, 2018/08/01/ 2018.

[9] E. A. Winanto, A. Heryanto, and D. Stiawan, “Visualisasi serangan Remote to Local ( R2L ) dengan clustering K-Means,” Annu. Res. Semin. 2016, vol. 2, no. 1, pp. 359–362, 2016.

[10] C. Carter, A. El Rhalibi, M. Merabti, and M. Price, “Homura and net-homura: The creation and web-based deployment of cross-platform 3D games,” 2009 Int. Conf. Ultra Mod. Telecommun. Work., 2009. https://doi.org/10.1109/ICUMT.2009.5345337.

[11] Cisco, “Traffic Classification,” WAN Appl. Optim. Solut. Guid., pp. 1–12, 2008.

[12] M. Finsterbusch, C. Richter, E. Rocha, J. A. Müller, and K. Hänßgen, “A survey of payload-based traffic classification approaches,” IEEE Commun. Surv. Tutorials, vol. 16, no. 2, pp. 1135–1156, 2014. https://doi.org/10.1109/SURV.2013.100613.00161

[13] T. T. T. Nguyen and G. Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Comst, vol. 10, no. 4, pp. 56–76, 2008. https://doi.org/10.1109/SURV.2008.080406

[14] Z. Cao, G. Xiong, Y. Zhao, Z. Li, and L. Guo, “A survey on encrypted traffic classification,” in Applications and Techniques in Information Security, 2014, pp. 73–81. https://doi.org/10.1007/978-3-662-45670-5_8

[15] V. A. Badrinarayanan, J. J. Sierra, and K. M. Martin, “A dual identification framework of online multiplayer video games: The case of massively multiplayer online role-playing games (MMORPGs),” Journal of Business Research , Vol. 68, No. 5, pp. 1045–1052, 2015. https://doi.org/10.1016/j.jbusres.2014.10.006

[16] W. Hong-You and Z. San-Ping, “The predigest project of TCP/IP protocol communication system based on DSP technology and ethernet,” Physics. Procedia, Vol. 25, pp. 1253–1257, 2012. https://doi.org/10.1016/j.phpro.2012.03.229

[17] R. M. Daniel, E. B. Rajsingh, and S. Silas, “Deriving practical applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role-Playing Games,” Procedia Computer Science, Vol. 93, No. 9, pp. 839–846, 2016. https://doi.org/10.1016/j.procs.2016.07.250

[18] Linktionary.com, “TCP (Transmission Control Protocol),” 2001.http://www.linktionary.com/t/tcp.html. [Last Accessed: 12-Dec-2016].

[19] S. Abdulla, A.S. Al Hashmi, “iSEFE: time series evolving Fuzzy engine for network traffic classification”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10, No. 1, pp. 116-124, 2018.

[20] Shi, Lei et al, “Scalable network traffic visualization using compressed graphs” 2013 IEEE International Conference on Big Data, Big Data 2013. https://doi.org/10.1109/BigData.2013.6691629.

Refbacks

  • There are currently no refbacks.

Indexed by: 

    

Referencing Software:

Checked by:

Supervised by:

Statistic:

View My Stats


Creative Commons License Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control by http://kinetik.umm.ac.id is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.