skip to main content
10.1145/1230040.1230074acmconferencesArticle/Chapter ViewAbstractPublication PagesnetgamesConference Proceedingsconference-collections
Article

Modifying first person shooter games to perform real time network monitoring and control tasks

Published:30 October 2006Publication History

ABSTRACT

This paper describes how a first person shooter (FPS) game engine can be leveraged for monitoring and control of enterprise IP data networks. Network administration can then occur in the following manner: network events (such as port scans or packets hitting a darknet) are translated in real time to various changes in the 3D game world state. Network administrators, logged in as 'players', can then collaboratively detect anomalous network events using the visual and aural cues given by the game. Using the native interaction metaphors from within the game (such as shooting, using or healing) they can then instantiate network administration policy changes (such as network layer firewall rules) directly back onto the running network without the need for interactions with complicated command line interfaces. We explore the possibilities offered by modern 3D game engines to implement this scheme as a server-side 'mod'. Finally, we detail the modifications made to the open source game engine 'Cube' to allow both the visualisation of large amounts of live network data within a virtual environment and support interacting with this data to create network administration events.

References

  1. Brutal file manager. http://www.forchheimer.se/bfm/, August 2006.]]Google ScholarGoogle Scholar
  2. Cube (game/3d engine). http://cube.sourceforge.net/, August 2006.]]Google ScholarGoogle Scholar
  3. Enemy territory. http://games.activision.com/games/wolfenstein/, August 2006.]]Google ScholarGoogle Scholar
  4. The expect home page. http://expect.nist.gov/, August 2006.]]Google ScholarGoogle Scholar
  5. The freebsd project. http://www.freebsd.org/, August 2006.]]Google ScholarGoogle Scholar
  6. Honeyd honeypot project. http://www.honeyd.org/, August 2006.]]Google ScholarGoogle Scholar
  7. Hp openview management software. http://www.managementsoftware.hp.com/, August 2006.]]Google ScholarGoogle Scholar
  8. id software, doom 1, 2, quake 1, 2 and 3. http://www.idsoftware.com/, August 2006.]]Google ScholarGoogle Scholar
  9. Java 3d api. http://java.sun.com/products/java-media/3D/, August 2006.]]Google ScholarGoogle Scholar
  10. Mrtg: The multi router traffic grapher. http://people.ee.ethz.ch/oetiker/webtools/mrtg/, August 2006.]]Google ScholarGoogle Scholar
  11. Nagios. http://www.nagios.org/, August 2006.]]Google ScholarGoogle Scholar
  12. Netflow v9 export format. http://www.cisco.com/en/US/products/ps6601/products_white_paper09186a00801341b2.shtml, August 2006.]]Google ScholarGoogle Scholar
  13. Nmap security scanner for network exploration & hacking. http://www.insecure.org/nmap/, August 2006.]]Google ScholarGoogle Scholar
  14. opengl. http://www.opengl.org/, August 2006.]]Google ScholarGoogle Scholar
  15. Openssh. http://www.openssh.org/, August 2006.]]Google ScholarGoogle Scholar
  16. Rrdtool. http://people.ee.ethz.ch/oetiker/webtools/rrdtool/, August 2006.]]Google ScholarGoogle Scholar
  17. Serious games initiative. http://seriousgames.org/, August 2006.]]Google ScholarGoogle Scholar
  18. The team cymru darknet project. http://www.cymru.com/Darknet/, August 2006.]]Google ScholarGoogle Scholar
  19. Valve software. http://half-life2.com/, August 2006.]]Google ScholarGoogle Scholar
  20. Visualizing internet topology at a macroscopic scale. http://www.caida.org/analysis/topology/as_core_network/, August 2006.]]Google ScholarGoogle Scholar
  21. P. Abel, P. Gros, C. Santos, D. Loisel, and Paris. Automatic construction of dynamic 3d metaphoric worlds: An application to network management. In Visual Data Exploration and Analysis VII, volume 3960, pages 312--323, Jan 2002.]]Google ScholarGoogle Scholar
  22. M. Bailey, E. Cooke, T. Battles, and D. McPherson. Tracking global threats with the internet motion sensor. Technical report, October 2004.]]Google ScholarGoogle Scholar
  23. M. Bailey, E. Cooke, F. Jahanian, N. Provos, K. Rosaen, and D. Watson. Data reduction for the scalable automated analysis of distributed darknet traffic. In USENIX Internet Measurement Conference, pages 239--252, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. Biddle, P. England, M. Peinado, and B. Willman. The darknet and the future of content distribution. In In Proceedings of the 2002 ACM Workshop on Digital Rights Management. ACM Press, 2002.]]Google ScholarGoogle Scholar
  25. J. Case, M. Fedor, M. Schoffstall, and J. Davin. Simple Network Management Protocol (SNMP). RFC 1157 (Historic), May 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Chao. Doom as an interface for process management. In CHI '01: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 152--157, New York, NY, USA, 2001. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B. Cheswick, H. Burch, and S. Branigan. Mapping and visualizing the internet. In USENIX Annual Technical Conference, General Track, pages 1--12, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. B. Claise. Ipfix protocol specification, June 2006.]]Google ScholarGoogle Scholar
  29. P. Fröst, M. Johansson, and P. Warrén. A computer game virtual environment for collaboration. In GROUP '01: Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work, pages 1--2, New York, NY, USA, 2001. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. R. Goodall, W. G. Lutters, and A. Komlodi. I know my network: collaboration and expertise in intrusion detection. In CSCW '04: Proceedings of the 2004 ACM conference on Computer supported cooperative work, pages 342--345, New York, NY, USA, 2004. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. W. Harrop and G. Armitage. Intuitive real-time network monitoring using visually orthogonal 3d metaphors. In Australian Telecommunications Networks & Applications Conference 2004 (ATNAC2004), December 2004.]]Google ScholarGoogle Scholar
  32. W. Harrop and G. Armitage. Defining and evaluating greynets (sparse darknets). In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, pages 344--350, Washington, DC, USA, 2005. IEEE Computer Society.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. W. Harrop and G. Armitage. Greynets: a definition and evaluation of sparsely populated darknets. In MineNet '05: Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data, pages 171--172, New York, NY, USA, 2005. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. B. Kot, B. Wuensche, J. Grundy, and J. Hosking. Information visualisation utilising 3d computer game engines case study: a source code comprehension tool. In CHINZ '05: Proceedings of the 6th ACM SIGCHI New Zealand chapter's international conference on Computer-human interaction, pages 53--60, New York, NY, USA, 2005. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. S. Lau. The spinning cube of potential doom. Commun. ACM, 47(6):25--26, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage. Inferring internet denial-of-service activity. ACM Trans. Comput. Syst., 24(2):115--139, 2006.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. D. Moore, C. Shannon, G. M. Voelkery, and S. Savagey. Network telescopes. CAIDA Technical report, April 2004.]]Google ScholarGoogle Scholar
  38. H. Takemura and F. Kishino. Cooperative work environment using virtual workspace. In CSCW '92: Proceedings of the 1992 ACM conference on Computer-supported cooperative work, pages 226--232, New York, NY, USA, 1992. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Y. Waern and D. Pargman. Design and use of muds for serious purposes (workshop session)(abstract only). In CSCW '96: Proceedings of the 1996 ACM conference on Computer supported cooperative work, page 2, New York, NY, USA, 1996. ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Modifying first person shooter games to perform real time network monitoring and control tasks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            NetGames '06: Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
            October 2006
            350 pages
            ISBN:1595935894
            DOI:10.1145/1230040

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 October 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader