Deakin University
Browse

File(s) under permanent embargo

A cyber-threat analytic model for autonomous detection of virtual property theft

Version 2 2024-06-03, 22:11
Version 1 2017-04-06, 21:30
journal contribution
posted on 2024-06-03, 22:11 authored by N Patterson, Michael HobbsMichael Hobbs, T Zhu
Purpose The purpose of this study is to provide a framework to detect and prevent virtual property theft in virtual world environments. The issue of virtual property theft is a serious problem which has ramifications in both the real and virtual world. Virtual world users invest a considerable amount of time, effort and often money to collect virtual property, only to have them stolen by thieves. Many virtual property thefts go undetected and often only discovered after the incident has occurred. Design/methodology/approach This paper presents the design of an autonomic detection framework to identify virtual property theft at two key stages: account intrusion and virtual property trades. Account intrusion is an unauthorized user attempting to gain access to an account and unauthorized virtual property trades are trading of items between two users which exhibit theft characteristics. Findings Initial tests of this framework on a synthetic data set show an 80 per cent detection rate. This framework allows virtual world developers to tailor and extend it to suit their specific requirements. It provides an effective way of detecting virtual property theft while being low maintenance, user friendly and cost effective. Originality/value To the author’s knowledge, there is no detection framework, system or tool that works on virtual property theft detection in virtual world environments without access to authentic virtual world data or attack data (because of privacy issues and unwillingness of virtual world environments companies to collaborate). The topic of virtual property theft, lack of existing labelled data sets, user anonymity, size of virtual world environments data sets and privacy issues with virtual world companies and a number of other critical factors distinguish this paper from previous studies.

History

Journal

Information and Computer Security

Volume

25

Pagination

358-381

Location

Bingley, Eng.

ISSN

2056-4961

eISSN

2056-497X

Language

English

Publication classification

C Journal article, C1 Refereed article in a scholarly journal

Copyright notice

2017, Emerald Publishing Limited

Issue

4

Publisher

EMERALD GROUP PUBLISHING LTD