Visualization of Granblue Fantasy Game Traffic Pattern Using Deep Packet Inspection Method
Corresponding Author(s) : Deris Stiawan
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 5, No. 3, August 2020
Abstract
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- App Annie, “Top Grossing Apps and Download Statistics Google Play | App Annie.”
- J. Svoboda, “Network Traffic Analysis with Deep Packet Inspection Method,” Fac. Informatics Masaryk Univ., no. Master’s Thesis, 2014.
- Y. Afek, A. Bremler-barr, and Y. Koral, “Space Efficient Deep Packet Inspection of Compressed Web Traffic,” No. 259085, Pp. 1–14, 2012.
- X. Che and B. Ip, “Packet-level traffic analysis of online games from the genre characteristics perspective,” J. Netw. Comput. Appl., Vol. 35, No. 1, Pp. 240–252, 2012. https://doi.org/10.1016/j.jnca.2011.08.005
- J. Kim, J. Choi, D. Chang, T. Kwon, Y. Choi, and E. Yuk, “Traffic characteristics of a massively multi-player online role-playing game,” Pp. 1, 2006. https://doi.org/10.1145/1103599.1103619
- D. Aryandi, “Pengenalan Pola Behavior Game Dragon Nest Menggunakan Metode Bloom Filter,” 2017.
- E. A. Winanto, A. Heryanto, and D. Stiawan, “Visualisasi Serangan Remote to Local (R2L) Dengan Clustering K-Means,” Annu. Res. Semin. 2016, Vol. 2, No. 1, Pp. 359–362, 2016.
- T. Sasut, A. Valianta, and D. Stiawan, “Klasifikasi Trafik Terenkripsi Menggunakan Metode Deep Packet Inspection (Dpi),” Vol. 2, No. 1, Pp. 424–429, 2016.
- C. Carter, A. El Rhalibi, M. Merabti, and M. Price, “Homura and net-homura: The creation and web-based deployment of cross-platform 3D games,” 2009 Int. Conf. Ultra Mod. Telecommun. Work., 2009. https://doi.org/10.1109/ICUMT.2009.5345337
- Cisco, “Traffic Classification,” WAN Appl. Optim. Solut. Guid., Pp. 1–12, 2008.
- M. Finsterbusch, C. Richter, E. Rocha, J. A. Müller, and K. Hänßgen, “A survey of payload-based traffic classification approaches,” IEEE Commun. Surv. Tutorials, Vol. 16, No. 2, Pp. 1135–1156, 2014. https://doi.org/10.1109/SURV.2013.100613.00161
- T. T. T. Nguyen and G. Armitage, “A Survey of Techniques for Internet Traffic Classification using ML,” IEEE Comst, Vol. 10, No. 4, Pp. 56–76, 2008. https://doi.org/10.1109/SURV.2008.080406
- Z. Cao, G. Xiong, Y. Zhao, Z. Li, and L. Guo, “A Survey on Encrypted Traffic Classification,” in Applications and Techniques in Information Security, 2014, Pp. 73–81. https://doi.org/10.1007/978-3-662-45670-5_8
- V. A. Badrinarayanan, J. J. Sierra, and K. M. Martin, “A dual identification framework of online multiplayer video games: The case of massively multiplayer online role-playing games (MMORPGs),” Journal of Business Research, Vol. 68, No. 5, Pp. 1045–1052, 2015. https://doi.org/10.1016/j.jbusres.2014.10.006
- W. Hong-You and Z. San-Ping, “The Predigest Project of TCP/IP Protocol Communication System Based on DSP Technology and Ethernet,” Physics. Procedia, Vol. 25, Pp. 1253–1257, 2012. https://doi.org/10.1016/j.phpro.2012.03.229
- R. M. Daniel, E. B. Rajsingh, and S. Silas, “Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role-Playing Games,” Procedia Computer Science, Vol. 93, No. 9, Pp. 839–846, 2016. https://doi.org/10.1016/j.procs.2016.07.250
- Linktionary.com, “TCP (Transmission Control Protocol),” 2001.
- S. Abdulla, A.S. Al Hashmi, “iSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10, No. 1, Pp. 116-124, 2018.
References
App Annie, “Top Grossing Apps and Download Statistics Google Play | App Annie.”
J. Svoboda, “Network Traffic Analysis with Deep Packet Inspection Method,” Fac. Informatics Masaryk Univ., no. Master’s Thesis, 2014.
Y. Afek, A. Bremler-barr, and Y. Koral, “Space Efficient Deep Packet Inspection of Compressed Web Traffic,” No. 259085, Pp. 1–14, 2012.
X. Che and B. Ip, “Packet-level traffic analysis of online games from the genre characteristics perspective,” J. Netw. Comput. Appl., Vol. 35, No. 1, Pp. 240–252, 2012. https://doi.org/10.1016/j.jnca.2011.08.005
J. Kim, J. Choi, D. Chang, T. Kwon, Y. Choi, and E. Yuk, “Traffic characteristics of a massively multi-player online role-playing game,” Pp. 1, 2006. https://doi.org/10.1145/1103599.1103619
D. Aryandi, “Pengenalan Pola Behavior Game Dragon Nest Menggunakan Metode Bloom Filter,” 2017.
E. A. Winanto, A. Heryanto, and D. Stiawan, “Visualisasi Serangan Remote to Local (R2L) Dengan Clustering K-Means,” Annu. Res. Semin. 2016, Vol. 2, No. 1, Pp. 359–362, 2016.
T. Sasut, A. Valianta, and D. Stiawan, “Klasifikasi Trafik Terenkripsi Menggunakan Metode Deep Packet Inspection (Dpi),” Vol. 2, No. 1, Pp. 424–429, 2016.
C. Carter, A. El Rhalibi, M. Merabti, and M. Price, “Homura and net-homura: The creation and web-based deployment of cross-platform 3D games,” 2009 Int. Conf. Ultra Mod. Telecommun. Work., 2009. https://doi.org/10.1109/ICUMT.2009.5345337
Cisco, “Traffic Classification,” WAN Appl. Optim. Solut. Guid., Pp. 1–12, 2008.
M. Finsterbusch, C. Richter, E. Rocha, J. A. Müller, and K. Hänßgen, “A survey of payload-based traffic classification approaches,” IEEE Commun. Surv. Tutorials, Vol. 16, No. 2, Pp. 1135–1156, 2014. https://doi.org/10.1109/SURV.2013.100613.00161
T. T. T. Nguyen and G. Armitage, “A Survey of Techniques for Internet Traffic Classification using ML,” IEEE Comst, Vol. 10, No. 4, Pp. 56–76, 2008. https://doi.org/10.1109/SURV.2008.080406
Z. Cao, G. Xiong, Y. Zhao, Z. Li, and L. Guo, “A Survey on Encrypted Traffic Classification,” in Applications and Techniques in Information Security, 2014, Pp. 73–81. https://doi.org/10.1007/978-3-662-45670-5_8
V. A. Badrinarayanan, J. J. Sierra, and K. M. Martin, “A dual identification framework of online multiplayer video games: The case of massively multiplayer online role-playing games (MMORPGs),” Journal of Business Research, Vol. 68, No. 5, Pp. 1045–1052, 2015. https://doi.org/10.1016/j.jbusres.2014.10.006
W. Hong-You and Z. San-Ping, “The Predigest Project of TCP/IP Protocol Communication System Based on DSP Technology and Ethernet,” Physics. Procedia, Vol. 25, Pp. 1253–1257, 2012. https://doi.org/10.1016/j.phpro.2012.03.229
R. M. Daniel, E. B. Rajsingh, and S. Silas, “Deriving Practical Applicability of Hierarchical Identity Based Encryption in Massively Multiplayer Online Role-Playing Games,” Procedia Computer Science, Vol. 93, No. 9, Pp. 839–846, 2016. https://doi.org/10.1016/j.procs.2016.07.250
Linktionary.com, “TCP (Transmission Control Protocol),” 2001.
S. Abdulla, A.S. Al Hashmi, “iSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification”, International Journal of Communication Networks and Information Security (IJCNIS) Vol. 10, No. 1, Pp. 116-124, 2018.