Uncovering Download Fraud Activities in Mobile App Markets

作者: Jiebo Luo , Philip S. Yu , Zhenhua Dong , Yingtong Dou , Weijian Li

DOI: 10.1145/3341161.3345306

关键词:

摘要: Download fraud is a prevalent threat in mobile App markets, where fraudsters manipulate the number of downloads Apps via various cheating approaches. Purchased fake can mislead recommendation and search algorithms further lead to bad user experience markets. In this paper, we investigate download problem based on company's Market, which one most popular Android We release honeypot Market purchase from fraudster agents track activities wild. Based our interaction with fraudsters, categorize into three types according their intentions: boosting front end downloads, optimizing ranking, enhancing acquisition&retention rate. For aimed at select, evaluate, validate several features identifying billions data. To get comprehensive understanding fraud, gather stances marketers, agencies, market operators fraud. The followed analysis suggestions shed light ways mitigate markets other social platforms. best knowledge, first work that investigates

参考文章(29)
Heqing Huang, Yeonjoon Lee, Kai Chen, Peng Liu, Peng Wang, Nan Zhang, Wei Zou, XiaoFeng Wang, Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale usenix security symposium. pp. 659- 674 ,(2015)
Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kaafar, Anirban Mahanti, Prasant Mohapatra, Early Detection of Spam Mobile Apps the web conference. pp. 949- 959 ,(2015) , 10.1145/2736277.2741084
Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq, Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots internet measurement conference. pp. 129- 136 ,(2014) , 10.1145/2663716.2663729
Kyumin Lee, James Caverlee, Steve Webb, Uncovering social spammers: social honeypots + machine learning international acm sigir conference on research and development in information retrieval. pp. 435- 442 ,(2010) , 10.1145/1835449.1835522
Kyumin Lee, Steve Webb, Hancheng Ge, Characterizing and automatically detecting crowdturfing in Fiverr and Twitter Social Network Analysis and Mining. ,vol. 5, pp. 1- 16 ,(2015) , 10.1007/S13278-014-0241-1
Hengshu Zhu, Hui Xiong, Yong Ge, Enhong Chen, Discovery of Ranking Fraud for Mobile Apps IEEE Transactions on Knowledge and Data Engineering. ,vol. 27, pp. 74- 87 ,(2015) , 10.1109/TKDE.2014.2320733
Zhen Xie, Sencun Zhu, AppWatcher: unveiling the underground market of trading mobile app reviews wireless network security. pp. 10- ,(2015) , 10.1145/2766498.2766510
James Caverlee, Cheng Cao, Behavioral detection of spam URL sharing: posting patterns versus click patterns advances in social networks analysis and mining. pp. 138- 141 ,(2014) , 10.5555/3191835.3191862
Pierre Geurts, Damien Ernst, Louis Wehenkel, Extremely randomized trees Machine Learning. ,vol. 63, pp. 3- 42 ,(2006) , 10.1007/S10994-006-6226-1
Shebuti Rayana, Leman Akoglu, Collective Opinion Spam Detection: Bridging Review Networks and Metadata knowledge discovery and data mining. pp. 985- 994 ,(2015) , 10.1145/2783258.2783370