2011 IEEE Symposium on Computers and Communications (ISCC) 2011
DOI: 10.1109/iscc.2011.5983854
|View full text |Cite
|
Sign up to set email alerts
|

Exposing click-fraud using a burst detection algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…There are various techniques that can be employed in order to detect click fraud, which are mainly based on the application of data mining and machine learning techniques in order to provide detailed evidence of possible click fraud patterns. The work of (Antoniou et al, 2011) is the most resembling to ours in the problem. In this paper, an approach for click fraud detection was proposed, that analyzed the number of visits during a certain time interval, depending on the kind of the investigated click fraud and on the application at hand (e.g.…”
Section: Related Workmentioning
confidence: 66%
See 1 more Smart Citation
“…There are various techniques that can be employed in order to detect click fraud, which are mainly based on the application of data mining and machine learning techniques in order to provide detailed evidence of possible click fraud patterns. The work of (Antoniou et al, 2011) is the most resembling to ours in the problem. In this paper, an approach for click fraud detection was proposed, that analyzed the number of visits during a certain time interval, depending on the kind of the investigated click fraud and on the application at hand (e.g.…”
Section: Related Workmentioning
confidence: 66%
“…We should mention that in the algorithm described in (Antoniou et al, 2011) a splay tree was used in order to store Web pages and a stack of timestamps for each node of the splay tree. In our present approach, we simplify the employed data structures and we save time and space, since we have replaced the splay tree with a simple two dimensional array, while additionally by using the two dimensional array we are no longer in need of the stacks storing the timestamps of the various users' accesses.…”
Section: Description Of the Algorithmmentioning
confidence: 99%
“…In [11], they used Social Network Analysis to ind top three ad networks that were being used to spread the fraud click malware. In [1], they use Splay trees to store the IPs via which fraud clicks occur based on a burst. In [22], they irst ind the eigenvalues of displayed ad images, if the ad is shown it is attested, based on if the eigenvalues of the image match those stored in their server, the user is certiied as honest, if not then it is analysed.…”
Section: Related Workmentioning
confidence: 99%
“…is CAP model may incentivize malicious mobile content publishers (typically app owners) to generate fraudulent actions on advertisements to get more financial returns [1][2][3]. Some traditional methods and techniques have been used for detecting and stopping click fraud, such as threshold-based method [4], CAPTCHA [5], splay tree [6], TrustZone [7], power spectral density analysis [8], and social network analysis [9].…”
Section: Introductionmentioning
confidence: 99%