Visualization of Granblue Fantasy Game Traffic Pattern Using Deep Packet Inspection Method
Abstract views: 173

Visualization of Granblue Fantasy Game Traffic Pattern Using Deep Packet Inspection Method

Deris Stiawan, Christian Prabowo, Ahmad Heryanto, Nurul Afifah, Agus Eko Minarno, Rahmat Budiarto


Granblue Fantasy is one of Role Playing Games (RPG). It’s a video role-playing game developed by Cygames. This research to observes the Granblue Fantasy Game. The purpose is to analyze the traffic data of the Granblue Fantasy to find the pattern using Deep Packet Inspection (DPI), Capturing the Data Traffic, Feature Extraction Process and Visualize the Pattern. The Pattern are Gacha, Solo Raid, Casino and Multiraid. This research demonstrate that Multiraid battle has more data than other pattern with TTL 237.


Granblue Fantasy, RPG, Cygames Deep Packet Inspection, Data Traffic Feature Extraction, Gacha, Solo Raid Casino, Multiraid, TTL

Full Text:



[1] App Annie, “Top Grossing Apps and Download Statistics Google Play | App Annie.”

[2] J. Svoboda, “Network Traffic Analysis with Deep Packet Inspection Method,” Fac. Informatics Masaryk Univ., no. Master’s Thesis, 2014.

[3] Y. Afek, A. Bremler-barr, and Y. Koral, “Space Efficient Deep Packet Inspection of Compressed Web Traffic,” No. 259085, Pp. 1–14, 2012.

[4] X. Che and B. Ip, “Packet-level traffic analysis of online games from the genre characteristics perspective,” J. Netw. Comput. Appl., Vol. 35, No. 1, Pp. 240–252, 2012.

[5] J. Kim, J. Choi, D. Chang, T. Kwon, Y. Choi, and E. Yuk, “Traffic characteristics of a massively multi-player online role-playing game,” Pp. 1, 2006.

[6] D. Aryandi, “Pengenalan Pola Behavior Game Dragon Nest Menggunakan Metode Bloom Filter,” 2017.

[7] E. A. Winanto, A. Heryanto, and D. Stiawan, “Visualisasi Serangan Remote to Local (R2L) Dengan Clustering K-Means,” Annu. Res. Semin. 2016, Vol. 2, No. 1, Pp. 359–362, 2016.

[8] T. Sasut, A. Valianta, and D. Stiawan, “Klasifikasi Trafik Terenkripsi Menggunakan Metode Deep Packet Inspection (Dpi),” Vol. 2, No. 1, Pp. 424–429, 2016.

[9] C. Carter, A. El Rhalibi, M. Merabti, and M. Price, “Homura and net-homura: The creation and web-based deployment of cross-platform 3D games,” 2009 Int. Conf. Ultra Mod. Telecommun. Work., 2009.

[10] Cisco, “Traffic Classification,” WAN Appl. Optim. Solut. Guid., Pp. 1–12, 2008.

[11] M. Finsterbusch, C. Richter, E. Rocha, J. A. Müller, and K. Hänßgen, “A survey of payload-based traffic classification approaches,” IEEE Commun. Surv. Tutorials, Vol. 16, No. 2, Pp. 1135–1156, 2014.

[12] T. T. T. Nguyen and G. Armitage, “A Survey of Techniques for Internet Traffic Classification using ML,” IEEE Comst, Vol. 10, No. 4, Pp. 56–76, 2008.

[13] Z. Cao, G. Xiong, Y. Zhao, Z. Li, and L. Guo, “A Survey on Encrypted Traffic Classification,” in Applications and Techniques in Information Security, 2014, Pp. 73–81.

[14] V. A. Badrinarayanan, J. J. Sierra, and K. M. Martin, “A dual identification framework of online multiplayer video games: The case of massively multiplayer online role-playing games (MMORPGs),” Journal of Business Research, Vol. 68, No. 5, Pp. 1045–1052, 2015.

[15] W. Hong-You and Z. San-Ping, “The Predigest Project of TCP/IP Protocol Communication System Based on DSP Technology and Ethernet,” Physics. Procedia, Vol. 25, Pp. 1253–1257, 2012.

[16] R. M. Daniel, E. B. Rajsingh, and S. Silas, “Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role-Playing Games,” Procedia Computer Science, Vol. 93, No. 9, Pp. 839–846, 2016.

[17], “TCP (Transmission Control Protocol),” 2001.

[18] S. Abdulla, A.S. Al Hashmi, “iSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10, No. 1, Pp. 116-124, 2018.


  • There are currently no refbacks.

Indexed by: 


Referencing Software:

Checked by:

Supervised by:


View My Stats

Creative Commons License Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control by is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.