• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö > Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ¸ð¹ÙÀÏ °ÔÀÓÀÇ ³×Æ®¿öÅ© ·Î±×¸¦ ÀÌ¿ëÇÑ VPN ÀÌ¿ëÀÚ Å½Áö
¿µ¹®Á¦¸ñ(English Title) Mining VPN Users from Network Logs of Commercial Games
ÀúÀÚ(Author) ¼ºÈ£ÁØ   ÀÌÁؼö   ±èÁÖ¿ø   ¹Ú¿¬Àç   Á¶¼ºÁ¦   ¹Ú¹Î±Ô   Hojun Seong   Junsu Lee   Juwon Kim   Younjai Park   Seong-je Cho   Minkyu Park   ¿ÁÁö¼ö   Á¤Áö¿Ï   À̱ÙÈ«   ¼­ÀÏȯ   ¹®¼öº¹   Jisu Ok   Jiwan Jeong   Keunhong Lee   Ilhwan Seo   Sue Moon  
¿ø¹®¼ö·Ïó(Citation) VOL 28 NO. 05 PP. 0297 ~ 0307 (2022. 05)
Çѱ۳»¿ë
(Korean Abstract)
¿Â¶óÀÎ ¸ð¹ÙÀÏ °ÔÀÓ ¿î¿µ¿¡ À־ ÀÌ»ó À¯Àú¸¦ ¸ð´ÏÅ͸µÇÏ´Â °ÍÀº °ÇÀüÇÑ °ÔÀÓ »ýÅ°è¿Í À¯ÀúÀÇ °ÔÀÓ ÀÌ¿ë °æÇè Çâ»óÀ» À§ÇØ ¸Å¿ì Áß¿äÇÏ´Ù. ±×·¯³ª ÀÌ»ó À¯Àú ŽÁö¿Í ¸ð´ÏÅ͸µÀº ÀÎÀû ÀÚ¿øÀÇ Á÷Á¢Àû ÅõÀÔÀ» ÇÊ¿ä·Î ÇÏ´Â ÀÛ¾÷À̹ǷÎ, ÀÌ»ó À¯ÀúÀÇ È帱ºÀ» Á¼È÷´Â ±â¹ýÀÌ ÇÊ¿äÇÏ´Ù. º» ¿¬±¸ÁøÀº ¸ð¹ÙÀÏ °ÔÀÓ ·Î±×¸¦ È°¿ëÇØ, ÇÑ ±¹°¡¿¡¼­ ´Ù¸¥ ±¹°¡·Î ªÀº ½Ã°£ ³»¿¡ À̵¿ÇÑ °ÍÀ¸·Î ³ªÅ¸³ª´Â À¯Àú¸¦ ¹ß°ßÇÏ°í ÀÌ·¯ÇÑ Çö»ó¿¡ ´ëÇØ ºÐ¼®ÇÏ¿´´Ù. À¯ÀúÀÇ °©ÀÛ½º·± À̵¿À» ¼³¸íÇÒ ¼ö ÀÖ´Â °¡Àå À¯·ÂÇÑ ½Ã³ª¸®¿À´Â VPNÀÇ »ç¿ëÀÌ´Ù. VPNÀº À¯ÀúÀÇ ½ÇÁ¦ IP ÁÖ¼Ò°¡ ÄÜÅÙÃ÷ Á¦°øÀÚ ¼­¹ö¿Í °°Àº »ó´ë Á¾´Ü Ãø¿¡ µå·¯³ªÁö ¾Ê°Ô ÇØÁÖ¸ç, ±×·¸±â¿¡ ¼­¹ö Ãø¿¡¼­´Â VPN ÀÌ¿ëÀÚ¿Í ±×·¸Áö ¾ÊÀº ÀÌ¿ëÀÚ¸¦ ±¸ºÐÇÒ ¼ö ¾ø´Ù. º» ³í¹®¿¡¼­´Â À¯ÀúÀÇ Á¢±Ù ±â·Ï°ú À§Ä¡ Á¤º¸¸¦ È°¿ëÇÏ¿© ÀÌ»ó À¯ÀúÀÇ È帱º ¹üÀ§¸¦ Á¼È÷´Â ±â¹ýÀ» Á¦½ÃÇϸç, ·Î±× µ¥ÀÌÅÍ ºÐ¼®À» ÅëÇØ ¾à 2.01%ÀÇ À¯Àú°¡ ¸ð¹ÙÀÏ °ÔÀÓ¿¡ VPNÀ» È°¿ëÇÑ °ÍÀ¸·Î Ãß·ÐÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Monitoring deviant users in online mobile games is a critical task in order to safeguard the health of the in-game ecosystem and the livelihood of the user gaming experience. Tracking down such users is a costly effort, mandating human intervention. Thus, narrowing down the candidate list of deviant users is important in service management. Based on the mobile game logs collected in user devices, we have identified users who moved suddenly from one country to another. The most plausible scenario for such sudden moves is the use of VPN. VPN masks the original IP address of a user to the other end, and the other end, typically a content provider, cannot distinguish VPN users from non-users. In this paper, we introduce a detection methodology for deviant users based on their access history and geolocation. We have identified that 2.01% of users have employed VPN in their access to mobile games. We have narrowed down the scope of deviant users, and the list of VPN users will improve the efficiency of service management.
Å°¿öµå(Keyword) Â÷·®¿ë ÀÎÆ÷Å×ÀθÕÆ®(IVI : In-Vehicle Infotainment)   ¾Èµå·ÎÀÌµå ¿ÀÅä   ¾Èµå·ÎÀÌµå ½º¸¶Æ®Æù   AVN(Audio Vedio Navigation)   µðÁöÅÐ Æ÷·»½Ä   in-vehicle infotainment system   android auto   android smartphone   AVN (Audio Video Navigation)   digital forensics   ³×Æ®¿öÅ© ·Î±×   VPN ŽÁö   °ÔÀÓ ·Î±× ºÐ¼®   ÀÌ»ó Çൿ ŽÁö   network log   identifying VPN   game log analysis   abnormal behavior detection  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå