Skip to main content

2021 | OriginalPaper | Buchkapitel

68. Clickedroid: A Methodology Based on Heuristic Approach to Detect Mobile Ad-Click Frauds

verfasst von : Pankaj Kumar Keserwani, Vedant Jha, Mahesh Chandra Govil, Emmanuel S. Pilli

Erschienen in: Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A number of apps are available in app stores for different types of online services and are growing with the use of mobile devices in the public. Advertisements on mobile through apps become a popular trend in online businesses. Ad frauds is a major concern for the advertising industry, and the most affected ones are the advertisers. The advertiser pays revenue to the ad network for each click on his ad. If ghost clicks are not captured as fraud or invalid clicks, then the advertiser has to pay to the ad network for ghost clicks also. Hence, return on investment (ROI) of the advertiser becomes very low and not achieving the goal as expected. Detecting fraud clicks on ads is very important to achieve the expected goal of the advertiser. The proposed methodology follows a heuristic approach to detect mobile ad-click frauds. A click fraud detection algorithm has been developed and implemented on the cloud server. The algorithm is triggered for each entry of the ad click to detect the click belongs to fraud or not fraud. The obtained results have been verified by popular machine learning (ML) algorithms namely as support vector machine (SVM), random forest, and k-nearest neighbors (k-NN) with the accuracies of 91%, 84% and 85%, respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Alrwais SA, Gerber A, Dunn CW, Spatscheck O, Gupta M, Osterweil E (2012) Dissecting ghost clicks: ad fraud via misdirected human clicks. In: Proceedings of the 28th annual computer security applications conference. ACM, pp 21–30 Alrwais SA, Gerber A, Dunn CW, Spatscheck O, Gupta M, Osterweil E (2012) Dissecting ghost clicks: ad fraud via misdirected human clicks. In: Proceedings of the 28th annual computer security applications conference. ACM, pp 21–30
3.
Zurück zum Zitat Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol 14, pp 23–26 Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens C (2014) Drebin: effective and explainable detection of android malware in your pocket. In: Ndss, vol 14, pp 23–26
4.
Zurück zum Zitat Badhe A (2017) Click fraud detection in mobile ads served in programmatic inventory. Neural Netw Mach Learn 1(1):1 Badhe A (2017) Click fraud detection in mobile ads served in programmatic inventory. Neural Netw Mach Learn 1(1):1
5.
Zurück zum Zitat Blizard T, Livic N (2012) Click-fraud monetizing malware: a survey and case study. In: 2012 7th international conference on malicious and unwanted software. IEEE, pp 67–72 Blizard T, Livic N (2012) Click-fraud monetizing malware: a survey and case study. In: 2012 7th international conference on malicious and unwanted software. IEEE, pp 67–72
6.
Zurück zum Zitat Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D, Farrell M (2017) Measuringlower bounds of the financial abuse to online advertisers: a four year case study of the TDSS/TDL4 Botnet. Comput Secur 67:164–180CrossRef Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D, Farrell M (2017) Measuringlower bounds of the financial abuse to online advertisers: a four year case study of the TDSS/TDL4 Botnet. Comput Secur 67:164–180CrossRef
7.
Zurück zum Zitat Crussell J, Stevens R, Chen H (2014) Madfraud: investigating ad fraud in android applications. In: Proceedings of the 12th annual international conference on mobile systems, applications, and services. ACM, pp 123–134 Crussell J, Stevens R, Chen H (2014) Madfraud: investigating ad fraud in android applications. In: Proceedings of the 12th annual international conference on mobile systems, applications, and services. ACM, pp 123–134
8.
Zurück zum Zitat Daswani N, Stoppelman M (2007) The anatomy of Clickbot. A. In: Proceedings of the first conference on first workshop on hot topics in understanding botnets. USENIX Association, p 11 Daswani N, Stoppelman M (2007) The anatomy of Clickbot. A. In: Proceedings of the first conference on first workshop on hot topics in understanding botnets. USENIX Association, p 11
9.
Zurück zum Zitat Dave V, Guha S, Zhang Y (2012) Measuring and fingerprinting click-spam in ad networks. In: Proceedings of the ACM SIGCOMM 2012 conference on applications, technologies, architectures, and protocols for computer communication. ACM, pp 175–186 Dave V, Guha S, Zhang Y (2012) Measuring and fingerprinting click-spam in ad networks. In: Proceedings of the ACM SIGCOMM 2012 conference on applications, technologies, architectures, and protocols for computer communication. ACM, pp 175–186
10.
Zurück zum Zitat Dave V, Guha S, Zhang Y (2013) Viceroi: catching click-spam in search ad networks. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security. ACM, pp 765–776 Dave V, Guha S, Zhang Y (2013) Viceroi: catching click-spam in search ad networks. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security. ACM, pp 765–776
11.
Zurück zum Zitat Dong F, Wang H, Li L, Guo Y, Bissyand’e TF, Liu T, Xu G, Klein J (2018) Frauddroid: automated ad fraud detection for android apps. In: Proceedings of the 2018 26th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering. ACM, pp 257–268 Dong F, Wang H, Li L, Guo Y, Bissyand’e TF, Liu T, Xu G, Klein J (2018) Frauddroid: automated ad fraud detection for android apps. In: Proceedings of the 2018 26th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering. ACM, pp 257–268
12.
13.
Zurück zum Zitat Haider CMR, Iqbal A, Rahman AH, Rahman MS (2018) An ensemble learning based approach for impression fraud detection in mobile advertising. J Netw Comput Appl 112:126–141CrossRef Haider CMR, Iqbal A, Rahman AH, Rahman MS (2018) An ensemble learning based approach for impression fraud detection in mobile advertising. J Netw Comput Appl 112:126–141CrossRef
14.
Zurück zum Zitat He B, Xu H, Jin L, GuoG, Chen Y, Weng G (2018) An investigation into android in-app ad practice: implications for app developers. In: IEEE INFOCOM 2018 conference on computer communications. IEEE, pp 2465–2473 He B, Xu H, Jin L, GuoG, Chen Y, Weng G (2018) An investigation into android in-app ad practice: implications for app developers. In: IEEE INFOCOM 2018 conference on computer communications. IEEE, pp 2465–2473
15.
Zurück zum Zitat Iqbal MS, Zulkernine M, Jaafar F, Gu Y (2016) Fcfraud: fighting click-fraud from the user side. In: 2016 IEEE 17th international symposium on high assurance systems engineering (HASE). IEEE, pp 157–164 Iqbal MS, Zulkernine M, Jaafar F, Gu Y (2016) Fcfraud: fighting click-fraud from the user side. In: 2016 IEEE 17th international symposium on high assurance systems engineering (HASE). IEEE, pp 157–164
16.
Zurück zum Zitat Jacob G, Kirda E, Kruegel C, Vigna G (2012) {PUBCRAWL}: protecting users and businesses from crawlers. In: Presented as part of the 21st {USENIX} security symposium ({USENIX} security 12), pp 507–522 Jacob G, Kirda E, Kruegel C, Vigna G (2012) {PUBCRAWL}: protecting users and businesses from crawlers. In: Presented as part of the 21st {USENIX} security symposium ({USENIX} security 12), pp 507–522
17.
Zurück zum Zitat Khanchi S, Zincir-Heywood N, Heywood M (2018) Streaming botnet traffic analysis using bio-inspired active learning. In: NOMS 2018—2018 IEEE/IFIP network operations and management symposium. IEEE, pp 1–6 Khanchi S, Zincir-Heywood N, Heywood M (2018) Streaming botnet traffic analysis using bio-inspired active learning. In: NOMS 2018—2018 IEEE/IFIP network operations and management symposium. IEEE, pp 1–6
18.
Zurück zum Zitat Lashkari AH, Kadir AFA, Gonzalez H, Mbah KF, Ghorbani AA (2017) Towards a network-based framework for android malware detection and characterization. In: 2017 15th annual conference on privacy, security and trust (PST). IEEE, pp 233–239 Lashkari AH, Kadir AFA, Gonzalez H, Mbah KF, Ghorbani AA (2017) Towards a network-based framework for android malware detection and characterization. In: 2017 15th annual conference on privacy, security and trust (PST). IEEE, pp 233–239
19.
Zurück zum Zitat Li Z, Zhang K, Xie Y, Yu F, Wang X (2012) Knowing your enemy: understanding and detecting malicious web advertising. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 674–686 Li Z, Zhang K, Xie Y, Yu F, Wang X (2012) Knowing your enemy: understanding and detecting malicious web advertising. In: Proceedings of the 2012 ACM conference on computer and communications security. ACM, pp 674–686
20.
Zurück zum Zitat Liu B, Nath S, Govindan R, Liu J (2014) {DECAF}: detecting and characterizing ad fraud in mobile apps. In: 11th {USENIX} symposium on networked systems design and implementation ({NSDI} 14), pp 57–70 Liu B, Nath S, Govindan R, Liu J (2014) {DECAF}: detecting and characterizing ad fraud in mobile apps. In: 11th {USENIX} symposium on networked systems design and implementation ({NSDI} 14), pp 57–70
21.
Zurück zum Zitat Metwally A, Agrawal D, El Abbad A, Zheng Q (2007) On hit inflation techniques and detection in streams of web advertising networks. In: 27th international conference on distributed computing systems (ICDCS’07). IEEE, p 52 Metwally A, Agrawal D, El Abbad A, Zheng Q (2007) On hit inflation techniques and detection in streams of web advertising networks. In: 27th international conference on distributed computing systems (ICDCS’07). IEEE, p 52
22.
Zurück zum Zitat Metwally A, Agrawal D, El Abbadi A: Detectives: detecting coalition hit inflation attacks in advertising networks streams. In: Proceedings of the 16th international conference on world wide web. ACM, pp 241–250 (2007) Metwally A, Agrawal D, El Abbadi A: Detectives: detecting coalition hit inflation attacks in advertising networks streams. In: Proceedings of the 16th international conference on world wide web. ACM, pp 241–250 (2007)
23.
Zurück zum Zitat Metwally A, Emekçi F, Agrawal D, El Abbadi A (2008) Sleuth: single-publisher attack detection using correlation hunting. Proc VLDB Endow 1(2):1217–1228 Metwally A, Emekçi F, Agrawal D, El Abbadi A (2008) Sleuth: single-publisher attack detection using correlation hunting. Proc VLDB Endow 1(2):1217–1228
24.
Zurück zum Zitat Miller B, Pearce P, Grier C, Kreibich C, Paxson V (2011) (2011) What’s clicking what? Techniques and innovations of today’s clickbots. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 164–183 Miller B, Pearce P, Grier C, Kreibich C, Paxson V (2011) (2011) What’s clicking what? Techniques and innovations of today’s clickbots. In: International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 164–183
25.
Zurück zum Zitat Mouawi R, Awad M, Chehab A, El Hajj IH, Kayssi A (2018) Towards a machine-learning approach for detecting click fraud in mobile advertizing. In: 2018 international conference on innovations in information technology (IIT). IEEE, pp 88–92 Mouawi R, Awad M, Chehab A, El Hajj IH, Kayssi A (2018) Towards a machine-learning approach for detecting click fraud in mobile advertizing. In: 2018 international conference on innovations in information technology (IIT). IEEE, pp 88–92
27.
Zurück zum Zitat Pearce P, Dave V, Grier C, Levchenko K, Guha S, McCoy D, Paxson V, Savage S, Voelker GM (2014) Characterizing large-scale click fraud in zeroaccess. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, pp 141–152 Pearce P, Dave V, Grier C, Levchenko K, Guha S, McCoy D, Paxson V, Savage S, Voelker GM (2014) Characterizing large-scale click fraud in zeroaccess. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, pp 141–152
28.
Zurück zum Zitat Stone-Gross B, Stevens R, Zarras A, Kemmerer R, Kruegel C, Vigna G (2011) Understanding fraudulent activities in online and exchanges. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. ACM, pp 279–294 Stone-Gross B, Stevens R, Zarras A, Kemmerer R, Kruegel C, Vigna G (2011) Understanding fraudulent activities in online and exchanges. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference. ACM, pp 279–294
29.
Zurück zum Zitat Tuzhilin A (2006) The lanes gifts v. google report. Official Google Blog: findings on invalid clicks, posted, pp 1–47 Tuzhilin A (2006) The lanes gifts v. google report. Official Google Blog: findings on invalid clicks, posted, pp 1–47
30.
Zurück zum Zitat Xu H, Liu D, Koehl A, Wang H, Stavrou A (2014) Click fraud detection on the advertiser side. In: European symposium on research in computer security. Springer, pp 419–438 Xu H, Liu D, Koehl A, Wang H, Stavrou A (2014) Click fraud detection on the advertiser side. In: European symposium on research in computer security. Springer, pp 419–438
31.
Zurück zum Zitat Yu F, Xie Y, Ke Q (2010) Sbotminer: large scale search bot detection. In: Proceedings of the third ACM international conference on web search and data mining. ACM, pp 421–430 Yu F, Xie Y, Ke Q (2010) Sbotminer: large scale search bot detection. In: Proceedings of the third ACM international conference on web search and data mining. ACM, pp 421–430
32.
Zurück zum Zitat Zarras A, Kapravelos A, Stringhini G, Holz T, Kruegel C, Vigna G (2014) The dark alleys of Madison avenue: understanding malicious advertisements. In: Proceedings of the 2014 conference on internet measurement conference. ACM, pp 373–380 Zarras A, Kapravelos A, Stringhini G, Holz T, Kruegel C, Vigna G (2014) The dark alleys of Madison avenue: understanding malicious advertisements. In: Proceedings of the 2014 conference on internet measurement conference. ACM, pp 373–380
33.
Zurück zum Zitat Zhang L, Guan Y (2008) Detecting click fraud in pay-per-click streams of online advertising networks. In: The 28th international conference on distributed computing systems. IEEE, pp 77–84 Zhang L, Guan Y (2008) Detecting click fraud in pay-per-click streams of online advertising networks. In: The 28th international conference on distributed computing systems. IEEE, pp 77–84
Metadaten
Titel
Clickedroid: A Methodology Based on Heuristic Approach to Detect Mobile Ad-Click Frauds
verfasst von
Pankaj Kumar Keserwani
Vedant Jha
Mahesh Chandra Govil
Emmanuel S. Pilli
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-7533-4_68

Neuer Inhalt