Cheating in online games
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
Cheating in online games is defined as the action of pretending to obey the rules of the game, while secretly subverting them to gain an unfair advantage over an opponent. Depending on the game, different activities constitute cheating and it is either a matter of game policy or consensus opinion as to whether a particular activity is considered to be cheating.
Cheating reportedly exists in most multiplayer online games, but it is difficult to measure. The Internet and darknets can provide players with the methodology necessary to cheat in online games, sometimes in return for a price.
- 1 Bots and software assistance
- 2 Unsporting play
- 3 Implementation of cheats
- 4 Anti-cheating methods and limitations
- 5 Ramifications
- 6 See also
- 7 References
- 8 Further reading
- 9 External links
Bots and software assistance
Aimbots and triggerbots
An aimbot (sometimes called "auto-aim") is a type of computer game bot used in multiplayer first-person shooter games to provide varying levels of automated target acquisition to the player. While most common in first person shooter games, they exist in other game types and are sometimes used along with a TriggerBot, which shoots automatically when an opponent appears within the field-of-view or aiming reticule of the player.
Aimbotting relies on the fact that each player's client computer receives information about all the other players, whether they are visible from the player's position on the playing field or not. Targeting is simply a matter of determining the location of any opponent relative to the player's location and pointing the player's weapon at the target. This targeting works regardless of whether the opponent is behind walls or too far away to be seen directly.
Some servers allow inactive players to spectate, watching the game from the viewpoints of the active players. Recording of gameplay actions is also often possible. If someone was using a targeting aimbot, the bot would be plainly obvious to the spectator as unnatural exact position tracking. Some aimbots and triggerbots attempt to hide from spectators the fact they are being used through a number of methods, such as delaying firing to hide the fact it shoots the instant an opponent is in the cheater's crosshair. Some Triggerbot programs can be easily toggled on and off using the mouse or keyboard.
It is worth noting, however, that some cheat programs are a suite of many different features, incorporating many or all of the above as well as including options for ESP and other cheats such as affecting player movespeed, ammocount, always-on radar or enemies on map, etc., and such a suite can be colloquially called an "aimbot program".
Artificial lag/lag switching
In the peer-to-peer gaming model, lagging is what happens when the stream of data between one or more players gets slowed or interrupted, causing movement to stutter and making opponents appear to behave erratically. By using a lag switch, a player is able to disrupt upload from the client to the server, while their own client queues up the actions performed. The goal is to gain advantage over another player without reciprocation; opponents slow down or stop moving, allowing the lag switch user to easily outmaneuver them. From the opponent's perspective, the player using the device may appear to be teleporting, invisible or invincible, while the opponents suffer delayed animations and fast-forwarded game play, delivered in bursts. Some gaming communities refer to this method as "tapping" which refers to the users "tapping" on and off their internet connection to create the lag.
The term "lag switch" encompasses many methods of disrupting the network communication between a client and its server. One method is by attaching a physical device, called a hardware lag switch, to a standard Ethernet cable. By flipping the switch on and off, the physical connection between the client and the server is disrupted. The designers of video game console hardware have started to introduce built-in protection against lag switches in the form of voltage detectors, which detect a change in voltage when the switch is flipped. Some manufacturers have taken counter measures to bypass or trick this detector. This can also be achieved by simply unplugging the Ethernet cord going to the client, causing a disruption in the player's internet connection. Other methods, called a software or wireless lag switch, involve using a computer program. In this method, the cheater runs an application on a computer connected to the same network as the client. The application hogs the network bandwidth, disrupting the communication between the client and its server. However, one cannot do this for an unlimited amount of time. At some point, if no traffic is being received, most game clients and/or game servers will decide that the connection has been lost and will remove the player from the game.
Look-ahead cheating is a method of cheating within a peer-to-peer multiplayer gaming architecture where the cheating client gains an unfair advantage by delaying his actions to see what other players do before announcing its own action.
A client can cheat using this method by acting as if it is suffering from high latency; the outgoing packet is forged by attaching a time-stamp that is prior to the actual moment the packet is sent, thereby fooling other clients into thinking that the action was sent at the correct time, but was delayed in arrival. A partial solution is the lockstep protocol.
A common aspect of real-time strategy games is the player's partial limitation or complete inability to see beyond the visibility range of individual game objects that are under their ownership (typically units and structures); this concept is controlled by a mechanism known as the fog of war. World-hacking usually enables the user to bypass this mechanism, either by removing it entirely and/or by rendering objects through the fog that would not normally be visible. In multiplayer modes, this allows for a distinct advantage against the other players who are subject to the intended settings. The advantage gained can be substantial, especially for the average real-time strategy games that rely on the rock-paper-scissors dynamic to balance out individual objects' varying strengths and weaknesses.
World-hacking may also allow a player to see through solid or opaque objects and/or manipulate or remove textures, to know in advance when an opponent is about to come into targeting range from an occluded area. This can be done by making wall textures transparent, or modifying the game maps to insert polygonal holes into otherwise solid walls. This variation is commonly known as a "wallhack" since it basically allows to the player to see enemies through walls.
World-hacking relies on the fact that an FPS server usually sends raw positional information for all players in the game, and leaves it up to the client's 3D renderer to hide opponents behind walls, in plant foliage, or in dark shadows. If the game map rendering could be turned off completely, all players could be seen moving around in what appears to be empty space. Complete map hiding offers no advantage to a cheater as they would be unable to navigate the invisible map pathways and obstacles. However, if only certain surfaces are made transparent or removed, this leaves just enough of an outline of the world to allow the cheater still to navigate it easily.
ASUS released wireframe display drivers in 2001 that enabled players to use wallhacks, announcing the settings as "special weapons" that users could employ in multiplayer games. In a poll by the Online Gamers Association, 90% of its members were against the release of the drivers.
Extrasensory perception in video games displays contextual information such as the health, name, equipment, position, and/or orientation of other participants as navigational/directional markers, which would normally be hidden from game players. This may be performed by reading the program's memory with an external program, or intercepting and decoding packets as they travel between the client and the server, or by reading the memory arrays containing player positions. The advantage of such a cheat is that it allows the user extensive information about their opponents, allowing for selection or avoidance of less or more dangerous opponents. This is extremely difficult to detect and prove, but is usually considered cheating.
Removal of game elements
Removals allow the cheater to remove a game's inhibitors or annoyances. These include gun recoil, bullet spread, and obfuscating visual effects. Such removals can significantly decrease a user's skill requirement levels.
Players will set up multiple accounts and play one against the other. The primary account will get an easy win due to a deliberate lack of resistance from the second account. The major problem with this method is its high cost because the boosting player requires at least two instances of the program usually through different PCs, IP addresses, and copies of the game. Additionally, some games allow the replays of matches to be uploaded and viewed by others. If the boosting player accidentally allows this, their boosting match can be seen by others.
Even without matches being seen, players who boost can usually be easily identified, since they will have an unnaturally high number of points in relation to the number of matches played.
In games where wins and losses are recorded on a player's account, a player may disconnect when he or she is about to lose, in order to prevent that loss from being recorded. This is usually done by activating known in-game glitches and through third-party sources via "IP booting" (a feature of firewall software). Some players do this if they feel their opponent is being unfair. Some games implement a disconnection penalty, usually by recording the disconnect as a loss, or a deduction of experience points. Certain games also have a 'disconnect delay' period before the player can disconnect, usually 10–30 seconds. This prevents a player from instantly disconnecting if they are about to die or lose.
Rapid Fire Modifications
In many games the weapons featured can be fired in burst fire or single shot fire modes. Modifying a controller or keyboard/mouse to gain the advantage of having a faster firing weapon than the standard player can be considered a method of cheating.
These modifications can create an imbalance within the game. In addition to modifying a console or its controller, it is possible to achieve a similar effect on the PC by binding the firing button to the scroll wheel of a mouse or using a macro setting that will simulate rapid key presses automatically. However, most games limit the rate at which weapons can be fired regardless of how fast a player presses the button, in order to limit this form of cheating.
Exploiting is the application of an unintended feature or bug that gives the player an advantage. Exploiting is not seen as cheating universally, some view it as a form of skill because certain exploits take a significant amount of time to find, or dexterity and timing to use.[further explanation needed]
Farming and stat-padding
In games where achievements and rewards are unlocked by defeating human enemies, especially in unorthodox ways, players may arrange to win or lose against one another in order to obtain the achievements without having to play the game linearly. This is also known as stat-padding, swapping, or boosting
The term farming also refers to the practice of garnering achievements or virtual property for the purpose of real-money-trading. With rare exception, this has no direct effect on the gaming experience of other players; instead, it is a violation of most EULAs and could devalue the virtual property being farmed.
Sharing is when multiple people take turns playing as a single character — mainly in MMORPGs — to gain an advantage by spending more time per day on leveling or farming than an average player would, and consequently having higher stats or better equipment.
Twinking is the act of transferring gear intended for higher level characters to lower level characters that would be incapable of obtaining the gear on their own. Twinked characters have a huge advantage over untwinked characters, as well as the rest of the game world. This is usually used by players who wish to create a new character, either to help them level more rapidly or to gain an unfair advantage in PVP. Most MMORPGs tolerate it, provided that the twinked character is not used in player versus player combat against non-twinked characters. Often limits on twinking are placed into the game, usually through strict level or stat requirements to equip the item. Circumventing these level requirements would then be further cheating.
Most games allow other participants to observe the game as it is played from a variety of perspectives; depending on the game, perspectives allow an observer a map overview or attach a "camera" to the movement of a specific player. In doing so, the observer can communicate with an accomplice using a secondary communication methodology (in-game private message, third party communication, or even off-line) to inform friendly players of traps or the position of opponents. An observer can be an active player, using a separate computer, connection and account.
Some systems prevent inactive players from observing the game if they are on the same IP address as an active player, on the grounds that they are probably in close physical proximity; when all players from a single IP address are no longer active participants, they are all allowed to observe. However, this restriction can be easily evaded if there are multiple IP addresses available at one location (a common feature of broadband subscriptions), or if the observer installs remote desktop software on their computer, thus enabling their computer screen to be viewed by select other players in real time.
Similar to ghosting in some respects, if two or more players to engage secret, co-operative play while all are active (especially in MMORPGs) it is considered cheating in many games, in particular when players engage in secondary communication. Using remote desktop software to observe the screens of secret "allies" while one is playing could confer considerable tactical and/or strategic advantages for all players in the "alliance", and would be considered cheating. In some RTS games, this is made difficult by replacing all player names with "unknown". This makes players unable to know who they are private messaging.
Stacking involves altering game settings or team lineups to give one or more teams an unfair advantage over others. One example includes arranging a team composed of skilled or professional players against a team with members of lesser skill. Although this may be a valid and accepted practice in real-life sports, in online games stacking upsets less-skilled players who feel that they aren't being given a fair chance. Less ethical rigging involves weighting the game by providing a player or team with an advantage by outfitting them with better (or more familiar) weapons or equipment, or creating a play field that caters to a certain player, team or playing style. This also may involve creating team-size inequalities, for example a 5 vs 10 match. Many games prevent this by preventing players from joining a team with more players than the opposing side, forcing newcomers to balance the teams.
Scripting is the use of a program or game feature to automate certain actions or behaviors. The use of scripts may or may not be considered cheating, depending on the behavior involved, and whether said behavior is replicable without the use of such script. A script may give the user unusually fast firing rate, unobtainable otherwise, or may perform seemingly trivial tasks such as reloading. Some scripts can also tamper with other players systems by spoofing commands.
||This article appears to contain unverifiable speculation and unjustified claims. Information must be verifiable and based on reliable published sources. (January 2017) (Learn how and when to remove this template message)|
Implementation of cheats
In the client–server model, the server is responsible for information security and enforcing game rules. (See "Anti-cheating methods and limitations" below for drawbacks.) In the peer-to-peer gaming model, clients run equal code but are still subject to most of the same type of cheats found in the client–server multiplayer model; however, the peer-to-peer multiplayer model has deprecated in favor of the client–server model with the wider adoption of high-speed networks.[better source needed]
"Never trust the client" is a maxim among game developers (as well as other 'types' of developers) that summarizes the model of client–server game design. It means that no information sent from a client should be accepted by a server if it breaks the game rules or the basic mechanics of the game, and that no information should be sent to a client unless it is "need-to-know." For example, a server with no rule enforcement or data integrity checking will synchronize all of the clients with all of the information about all of the other clients. The server will be very fast, but any wallhack program will reveal where all the players in the game are, what team they are on, and what state they're in — health, weapon, ammo etc. At the same time, altered and erroneous data from a client will allow a player to break the game rules, manipulate the server, and even manipulate other clients.
Game code modification
Many cheats are implemented by modifying game software, despite EULAs which forbid modification. While game software distributed in binary-only versions makes it harder to modify code, reverse engineering is possible. Also game data files can be edited separately from the main program and thereby circumvent protections implemented in software.
System software modification
Rather than modifying the game code (which the game itself or a 3rd-party protection system may detect), some cheats modify underlying system components. An example of this is graphics driver modifications that ignore depth checking and draw all objects on the screen—a primitive wallhack. System or driver modification is harder to detect, as there are a large number of system drivers that differ from user to user.
Packet interception, tampering & manipulation
The security of game software can be circumvented by intercepting and/or manipulating data in real-time while in transit from the client to the server or vice versa (i.e. a man-in-the-middle attack). Interception can be passive or result in active manipulation; either methodology can be performed on the client machine itself or via an external communication proxy; some aimbots incorporate this methodology.
Anti-cheating methods and limitations
There are many facets of cheating in online games which make the creation of a system to stop cheating very difficult; however, game developers and third party software developers have created or are developing technologies that attempt to prevent cheating. Such countermeasures are commonly used in popular games with notable anti-cheat software including GameGuard, PunkBuster, and Valve Anti-Cheat.
Exploits of bugs are usually resolved/removed via a patch to the game; however, not all companies force the patches/updates on users, leaving the actual resolution to individual users.
Authoritative and mirrored server design
Generally, the better the server is at enforcing the rules, the less of a problem cheating will be in the game. In this approach all client functionality either runs purely on the game server or alternatively the game server mirrors the client gameplay and continuously validates the game state. In for example many mobile games it is a common practice to run the client game sessions synchronously on the server, using exactly the same user input. The client session is reset when the game sessions become unsynced, thereby preventing cheating.
Server-side game code makes a trade-off between calculating and sending results for display on a just-in-time basis or trusting the client to calculate and display the results in appropriate sequence as a player progresses. It can do this by sending the parts of the world state needed for immediate display, which can result in client lag under bandwidth constraints, or sending the player the entire world state, which results in faster display for the player under the same bandwidth constraints, but exposes that data to interception or manipulation—a trade-off between security and efficiency.
When game servers were restricted by limited available resources such as storage, memory, internal bandwidth, and computational capacity due to the technologies available and the cost of the hardware, coupled with internet connections that were slow, it was believed to be necessary to compromise on security for optimization to minimize the impact on the end-user. Today however, with the increased speed and power of multi-core computers, lower priced hardware, and the increased availability of broadband internet, this has become less of an issue.
Additionally to storing data in non-standard formats, some games also utilize runtime protection through software protectors. The key target is to keep attackers from directly inspecting or modifying compiled software. Protectors utilize either of three methods to protect software.
Encryption solutions will encrypt the code instructions and typically use a multi–layered defense mechanism against any reversing or tampering attempts that target the decryption code directly. Most protection systems in this category encrypt the code and then decrypt it at the application’s startup or during runtime. This is the moment at which an attacker will breakpoint, reverse, and inject custom code. Runtime decryption may also add significant processing overhead and lower the game's framerate. Alternatively, some solutions focus on obfuscating the code by inserting jump statements and seemingly random instruction paths. The final and strongest alternative is virtualization. In this approach the encrypted code runs on a virtual CPU that can be markedly different from generic x86 and x64 CPUs as the command set can be unique for each protected file.
The shared weakness of protectors and virtualizers is that they impact performance, either by requiring decryption or by introducing unnecessary CPU instructions. To reduce the overhead code virtualizers are often only used to secure the critical parts of the code base, such as those interfacing with the gamestate and rendering.
Spectator functionality can allow server administrators to monitor individual players and thereby determine whether or not a cheat is in place. One risk of the spectator mode is that in competitive matches the spectator could abuse the mode for spying on specific players and communicating player positions and tactics to the opposing team. Some games get around this limitation by not allowing spectator mode at all, or by delaying the video feed.
Some games have systemized player supervision by allowing the community to review reports of disruptive behavior, determine whether those reports are valid, and apply temporary bans if appropriate. Reports can include data such as screenshots, videos, and chatlogs.
Anomalies in player behavior can be detected by statistically analyzing game events sent by the client to the server. The great benefit is that this anti–cheat method is that a pure implementation is non–intrusive to the player's privacy and guaranteed to work on all end–user system configurations. The restriction of this method is that it cannot always be clear whether or not a player is cheating. Highly skilled players can for example develop such a map sense that they may end up being flagged for the use of a wallhack and/or aimbot. On the other hand, players may also cheat in a way that is under the detection thresholds and remain uncaught.
To reduce the amount of false positives, statistical detection systems are often combined with a supervision system that either is community driven or managed by a professional administrator team. In such implementations unusual player behavior can trigger a clientside component to create and upload reports for review.
Pattern detection systems scan the player's hard drives and system memory for known cheat code or programs. Compared to statistical detection the key advantage is that also the subtle cheaters are detected. Other than this, a pure pattern detection approach generally has few advantages. Experience has shown that keeping detection based systems up to date is relatively slow and labor-intensive as one needs to constantly track down cheats and update detection patterns. End–users may also be concerned with privacy issues, such as has been the case with VAC accessing browsing history.
Sandboxing a software process can protect against potentially malicious actions such as code injection and memory modifications that would otherwise tamper with the game. One of the key benefits of sandboxing is that it can effectively prevent the underlying cheat mechanisms from working, and thereby can avoid the need for banning game community members as cheats simply don't work. Additionally, strong prevention mechanisms can stop many game hackers from targeting the game because of elevated skill requirements. Compared to pattern detection systems, sandboxing is generally not privacy invasive as the approach requires no data to be uploaded to foreign back-end systems.
Game publishers can implement a wide array of consequences for cheating players.
Some companies and leagues ban suspected cheaters by blacklisting specific installation or serial keys, or user accounts, meaning that the player is effectively prevented from playing the game online.
Some game publishers may decide to try and permanently ban players who are persistent in cheating and ruining the game community. Such bans are typically placed based on hardware ID or IP address. Consequently, cheaters may develop ways of getting around these bans, by either playing through proxy or VPN servers, or spoofing or changing their hardware configuration.
While game publishers are known to ban players employing cheats, the actual number of players banned is usually not revealed. Exceptions to this include Blizzard Entertainment, Nexon, and CipSoft, known for banning cheaters in batches, and publicising the number of banned accounts, presumably in order to discourage others from cheating.
In some cases a ban may not be permanent and expire after a certain period of time. This approach is commonly used as a ramification for the abuse of game glitches, harassing players, or benefiting from hackers. Temporary bans may also be utilized in case a violation cannot be fully proven, as is common with anti-cheating methods based on supervision or statistical detection.
In general kicking is perceived as a mild ramification, serving as a warning rather than a punishment for the player in question. Some anti-cheat systems may decide to kick players out of a game server when the system integrity cannot be enforced nor be determined with certainty. Other anti-cheat methods may also utilize kicks as an instant punishment for presumably unfair game play behavior.
Some games may also provide the community with the option of voting for particular players to be kicked. Such system provides the power to self regulate and effectively get rid of abusive players without depending on supervision or other anti-cheat methods. Even though vote kicking brings many benefits, it may also serve as a tool for trolling or griefing by allowing for legit players to be removed out of the game through the voting process.
When a violation is the result of farming or stat-padding, it may be too severe of a punishment to suspend or ban players. Some games therefore implement a system of demotion in which the offender is moved to a lower rank, the polar opposite of a promotion.
- Clive Thompson (2007-04-23). "What Type of Game Cheater Are You?". Wired.com. Retrieved 2009-09-15.
- "How to Hurt the Hackers: "The Scoop on Internet Cheating and How You Can Combat It"". Gamasutra.com. 2000-07-24. Retrieved 2009-09-15.
- Bradley Mitchell. "What Is a Lag Switch?". About.com. Retrieved 2012-12-15.
- "What Our Competitors Won't Tell You". Premium Lag. September 3, 2009. Retrieved 2012-12-15.
- Jouni Smed and Harri Hakonen (2006). Algorithms and Networking for Computer Games. Wiley. ISBN 0470029749.
- "ASUS releases games cheat drivers". The Register. May 10, 2013. Retrieved 2013-06-06.
- Dibbell, Julian (2008-11-24). "Wired Magazine: 16.12, The Decline and Fall of an Ultra Rich Online Gaming Empire". Wired.com. Retrieved 2015-01-05.
- "Twinking Is Just Another Form Of Cheating | We Fly Spitfires - MMORPG Blog". Blog.weflyspitfires.com. 2009-09-17. Retrieved 2010-07-28.
- "Gartner Says 17 Countries to Surpass 60 Percent Broadband Penetration into the Home by 2012". Gartner.com. Retrieved 2009-09-15.
- Wily Ferret (June 22, 2007). "Intel plays tattle-tale". The Inquirer. Retrieved 2012-12-15.
- Charlie Demerjian (June 24, 2007). "More on Intel anti-cheat technology revealed". the Inquirer. Retrieved 2012-12-15.
- Tim Sweeney. "The Server is the Man". Retrieved 2015-07-06.
- Oreans Technologies (2015-06-22). "Themida technology introduction". Retrieved 2015-07-06.
- Eddie Makuch (2014-12-15). "Halo spectator mode". Retrieved 2015-07-06.
- "Valve Anti-Cheat rumours". 2014-02-19. Retrieved 2015-07-06.
- "RoboShield description". 2014-11-05. Retrieved 2015-07-06.
- "Nexon hardware bans". 2015-01-16. Retrieved 2015-07-08.
- "Mapplestory banlist". 2015-04-21. Retrieved 2015-07-08.
- "EasyAntiCheats and Test Signing boot configuration". 2014-10-30. Retrieved 2015-07-08.
- "FairFight kick for Phantom hunt". 2014-11-22. Retrieved 2015-07-08.
- "Voting in Team Fortress 2". 2011-04-14. Retrieved 2015-07-08.
- "Griefing and voting in Competitive CSGO". 2013-02-24. Retrieved 2015-07-08.
- Exploiting Online Games, Hoglund, Greg, 2008, Pearson Education, ISBN 978-0-13-227191-2
- Cheating: Gaining Advantage in Videogames, Consalvo, Mia, 2007, MIT Press, ISBN 978-0-262-03365-7
- Aspects of Networking in Multiplayer Computer Games by J.Smed et al., The Electronic Library, volume 20, number 2, pages 87–97, 2002.
- Fair Online Gaming Information on Intel's anti-cheat research initiative and technology.
- Cheat online Computer Games
- Cheats and tricks for android/ios game