“…-Performing through the game log analysis of user behavior -Control a restriction time and scale -Bypass of detection by leak of detection rule -"User identification based on game-play activity patterns" [9] Network side [43][44][45] -Guarantee of game performance -Increasing computation power of encryption and decryption in traffic data -"Identifying MMORPG bots: A traffic analysis approach" [43] Client side [46][47][48] -Collecting of detection information in PC -Falling of game usability, and easy bypass of detection [7][8], [12][13], [18][19][20][21][22][23][24][25][26], [27][28][29], [32][33][34], [36][37], [42], [44][45][46] -High accuracy of anomaly detection -Limitation of application in real-time and client side because of using much time of data analysis -"Aimbot detection in online fps games using a heuristic method based on distribution comparison matrix" [23] Statistics [6], [9], [10], [14][15][16], [24], [30][31],…”