{"title":"索尼Playstation 3的流量和安全分析","authors":"Michael Perelman, Ping Ji, Weifeng Chen","doi":"10.1109/ISI.2009.5137325","DOIUrl":null,"url":null,"abstract":"Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.","PeriodicalId":210911,"journal":{"name":"2009 IEEE International Conference on Intelligence and Security Informatics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Traffic and security analysis on Sony Playstation 3\",\"authors\":\"Michael Perelman, Ping Ji, Weifeng Chen\",\"doi\":\"10.1109/ISI.2009.5137325\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.\",\"PeriodicalId\":210911,\"journal\":{\"name\":\"2009 IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2009.5137325\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2009.5137325","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Traffic and security analysis on Sony Playstation 3
Online games are clearly growing as a significant component of the current and future Internet. As a major online game console, the Sony PlayStation 3 (PS3) produces more and more network traffic. People also begin to use PS3 for emails and web surfing besides playing games due to its enhanced web capabilities. Recognizing the traffic patterns of PS3 is important to network administrators whereas understanding its security is essential for users. However, traffic and security analysis of PS3 has been either done or unpublished. In this paper, we present our initial efforts on game traffic analysis for PS3 and explore the vulnerabilities of PS3 by testing a few attacking schemes on a PS3 console. The research will benefit both network administrators and PS3 users to understand the PS3 systems better.