ABSTRACT
This paper describes how a first person shooter (FPS) game engine can be leveraged for monitoring and control of enterprise IP data networks. Network administration can then occur in the following manner: network events (such as port scans or packets hitting a darknet) are translated in real time to various changes in the 3D game world state. Network administrators, logged in as 'players', can then collaboratively detect anomalous network events using the visual and aural cues given by the game. Using the native interaction metaphors from within the game (such as shooting, using or healing) they can then instantiate network administration policy changes (such as network layer firewall rules) directly back onto the running network without the need for interactions with complicated command line interfaces. We explore the possibilities offered by modern 3D game engines to implement this scheme as a server-side 'mod'. Finally, we detail the modifications made to the open source game engine 'Cube' to allow both the visualisation of large amounts of live network data within a virtual environment and support interacting with this data to create network administration events.
- Brutal file manager. http://www.forchheimer.se/bfm/, August 2006.]]Google Scholar
- Cube (game/3d engine). http://cube.sourceforge.net/, August 2006.]]Google Scholar
- Enemy territory. http://games.activision.com/games/wolfenstein/, August 2006.]]Google Scholar
- The expect home page. http://expect.nist.gov/, August 2006.]]Google Scholar
- The freebsd project. http://www.freebsd.org/, August 2006.]]Google Scholar
- Honeyd honeypot project. http://www.honeyd.org/, August 2006.]]Google Scholar
- Hp openview management software. http://www.managementsoftware.hp.com/, August 2006.]]Google Scholar
- id software, doom 1, 2, quake 1, 2 and 3. http://www.idsoftware.com/, August 2006.]]Google Scholar
- Java 3d api. http://java.sun.com/products/java-media/3D/, August 2006.]]Google Scholar
- Mrtg: The multi router traffic grapher. http://people.ee.ethz.ch/oetiker/webtools/mrtg/, August 2006.]]Google Scholar
- Nagios. http://www.nagios.org/, August 2006.]]Google Scholar
- Netflow v9 export format. http://www.cisco.com/en/US/products/ps6601/products_white_paper09186a00801341b2.shtml, August 2006.]]Google Scholar
- Nmap security scanner for network exploration & hacking. http://www.insecure.org/nmap/, August 2006.]]Google Scholar
- opengl. http://www.opengl.org/, August 2006.]]Google Scholar
- Openssh. http://www.openssh.org/, August 2006.]]Google Scholar
- Rrdtool. http://people.ee.ethz.ch/oetiker/webtools/rrdtool/, August 2006.]]Google Scholar
- Serious games initiative. http://seriousgames.org/, August 2006.]]Google Scholar
- The team cymru darknet project. http://www.cymru.com/Darknet/, August 2006.]]Google Scholar
- Valve software. http://half-life2.com/, August 2006.]]Google Scholar
- Visualizing internet topology at a macroscopic scale. http://www.caida.org/analysis/topology/as_core_network/, August 2006.]]Google Scholar
- P. Abel, P. Gros, C. Santos, D. Loisel, and Paris. Automatic construction of dynamic 3d metaphoric worlds: An application to network management. In Visual Data Exploration and Analysis VII, volume 3960, pages 312--323, Jan 2002.]]Google Scholar
- M. Bailey, E. Cooke, T. Battles, and D. McPherson. Tracking global threats with the internet motion sensor. Technical report, October 2004.]]Google Scholar
- M. Bailey, E. Cooke, F. Jahanian, N. Provos, K. Rosaen, and D. Watson. Data reduction for the scalable automated analysis of distributed darknet traffic. In USENIX Internet Measurement Conference, pages 239--252, 2005.]] Google ScholarDigital Library
- P. Biddle, P. England, M. Peinado, and B. Willman. The darknet and the future of content distribution. In In Proceedings of the 2002 ACM Workshop on Digital Rights Management. ACM Press, 2002.]]Google Scholar
- J. Case, M. Fedor, M. Schoffstall, and J. Davin. Simple Network Management Protocol (SNMP). RFC 1157 (Historic), May 1990.]] Google ScholarDigital Library
- D. Chao. Doom as an interface for process management. In CHI '01: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 152--157, New York, NY, USA, 2001. ACM Press.]] Google ScholarDigital Library
- B. Cheswick, H. Burch, and S. Branigan. Mapping and visualizing the internet. In USENIX Annual Technical Conference, General Track, pages 1--12, 2000.]] Google ScholarDigital Library
- B. Claise. Ipfix protocol specification, June 2006.]]Google Scholar
- P. Fröst, M. Johansson, and P. Warrén. A computer game virtual environment for collaboration. In GROUP '01: Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work, pages 1--2, New York, NY, USA, 2001. ACM Press.]] Google ScholarDigital Library
- J. R. Goodall, W. G. Lutters, and A. Komlodi. I know my network: collaboration and expertise in intrusion detection. In CSCW '04: Proceedings of the 2004 ACM conference on Computer supported cooperative work, pages 342--345, New York, NY, USA, 2004. ACM Press.]] Google ScholarDigital Library
- W. Harrop and G. Armitage. Intuitive real-time network monitoring using visually orthogonal 3d metaphors. In Australian Telecommunications Networks & Applications Conference 2004 (ATNAC2004), December 2004.]]Google Scholar
- W. Harrop and G. Armitage. Defining and evaluating greynets (sparse darknets). In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, pages 344--350, Washington, DC, USA, 2005. IEEE Computer Society.]] Google ScholarDigital Library
- W. Harrop and G. Armitage. Greynets: a definition and evaluation of sparsely populated darknets. In MineNet '05: Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data, pages 171--172, New York, NY, USA, 2005. ACM Press.]] Google ScholarDigital Library
- B. Kot, B. Wuensche, J. Grundy, and J. Hosking. Information visualisation utilising 3d computer game engines case study: a source code comprehension tool. In CHINZ '05: Proceedings of the 6th ACM SIGCHI New Zealand chapter's international conference on Computer-human interaction, pages 53--60, New York, NY, USA, 2005. ACM Press.]] Google ScholarDigital Library
- S. Lau. The spinning cube of potential doom. Commun. ACM, 47(6):25--26, 2004.]] Google ScholarDigital Library
- D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Trans. Comput. Syst., 24(2):115--139, 2006.]] Google ScholarDigital Library
- D. Moore, C. Shannon, G. M. Voelkery, and S. Savagey. Network telescopes. CAIDA Technical report, April 2004.]]Google Scholar
- H. Takemura and F. Kishino. Cooperative work environment using virtual workspace. In CSCW '92: Proceedings of the 1992 ACM conference on Computer-supported cooperative work, pages 226--232, New York, NY, USA, 1992. ACM Press.]] Google ScholarDigital Library
- Y. Waern and D. Pargman. Design and use of muds for serious purposes (workshop session)(abstract only). In CSCW '96: Proceedings of the 1996 ACM conference on Computer supported cooperative work, page 2, New York, NY, USA, 1996. ACM Press.]] Google ScholarDigital Library
Index Terms
- Modifying first person shooter games to perform real time network monitoring and control tasks
Recommendations
Distribution of first person shooter online multiplayer games
This paper uses data captured during our online game trials to answer some fundamental questions regarding game distribution for online, first person shooter games. First person shooter games are popular, generate large amounts of traffic and have ...
First-Person Shooter Game for Virtual Reality Headset with Advanced Multi-Agent Intelligent System
MM '16: Proceedings of the 24th ACM international conference on MultimediaWe present a multiplayer first-person shooter (FPS) game with advanced intelligent non-playable characters (NPC) under computer control. The game is specially adapted for playing in VR headset so the simulator sickness symptoms are significantly ...
Optimization of First-Person Shooter Game Control Using Heart Rate Sensor
Entertainment Computing – ICEC 2021AbstractAs first-person shooter (FPS) games become highly competitive game genres, various supports are needed to improve the gaming environment. In the past, players have focused on gaming mouses and displays, which are expensive and challenging to ...
Comments