CATCH: A detecting algorithm for coalition attacks of hit inflation in internet advertising

被引:7
|
作者
Kim, Chulyun [2 ]
Miao, Hui [1 ]
Shim, Kyuseok [1 ]
机构
[1] Seoul Natl Univ, Sch Elect Engn & Comp Sci, Seoul 151742, South Korea
[2] Kyungwon Univ, Dept Software Design & Management, Songnam 461701, Gyeonggi Do, South Korea
基金
新加坡国家研究基金会;
关键词
Click fraud; Hit inflation; Coalition attack; Internet advertising; Graph mining; Data mining;
D O I
10.1016/j.is.2011.04.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet flourishes, online advertising becomes essential for marketing campaigns for business applications. To perform a marketing campaign, advertisers provide their advertisements to Internet publishers and commissions are paid to the publishers of the advertisements based on the clicks made for the posted advertisements or the purchases of the products of which advertisements posted. Since the payment given to a publisher is proportional to the amount of clicks received for the advertisements posted by the publisher, dishonest publishers are motivated to inflate the number of clicks on the advertisements hosted on their web sites. Since the click frauds are critical for online advertising to be reliable, the online advertisers make the efforts to prevent them effectively. However, the methods used for click frauds are also becoming more complex and sophisticated. In this paper, we study the problem of detecting coalition attacks of click frauds. The coalition attacks of click fraud is one of the latest sophisticated techniques utilized for click frauds because the fraudsters can obtain not only more gain but also less probability of being detected by joining a coalition. We introduce new definitions for the coalition and propose the novel algorithm called CATCH to find such coalitions. Extensive experiments with synthetic and real-life data sets confirm that our notion of coalition allows us to detect coalitions much more effectively than that of previous work. (C) 2011 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:1105 / 1123
页数:19
相关论文
共 50 条
  • [1] Viterbi Algorithm for Detecting DDoS Attacks
    Bongiovanni, Wilson
    Guelfi, Adilson E.
    Pontes, Elvis
    Silva, A. A. A.
    Zhou, Fen
    Kofuji, Sergio Takeo
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 209 - 212
  • [2] A Novel Algorithm for Detecting GSMem Attacks
    Zhu, Weijun
    Nie, Kai
    Ban, Shaohuan
    Fan, Yongwen
    Wang, Jianwei
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 855 - 858
  • [3] Detecting Internet of Things attacks using distributed deep learning
    Parra, Gonzalo De La Torre
    Rad, Paul
    Choo, Kim-Kwang Raymond
    Beebe, Nicole
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 163 (163)
  • [4] An Adaptive Algorithm for Detecting and Preventing Attacks in Telecommunication Networks
    Yevdokymenko, Maryna
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 175 - 177
  • [5] An unsupervised algorithm for detecting shilling attacks on recommender systems
    Li C.
    Luo Z.-G.
    Shi J.-L.
    Zidonghua Xuebao/Acta Automatica Sinica, 2011, 37 (02): : 160 - 167
  • [6] Detecting DDoS Attacks using Decision Tree Algorithm
    Lakshminarasimman, S.
    Ruswin, S.
    Sundarakantham, K.
    2017 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2017,
  • [7] Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
    Zegzhda, P. D.
    Lavrova, D. S.
    Shtyrkina, A. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 936 - 944
  • [8] Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks
    Sharma, Tarun
    Patni, Khushi
    Li, Zhida
    Trajkovic, Ljiljana
    2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [9] Anomaly detection algorithm for detecting attacks in wireless sensor networks
    Van Phuong, Tran
    Hung, Le Xuan
    Cho, Seon Jin
    Lee, Young-Koo
    Lee, Sungyoung
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 735 - 736
  • [10] Detecting and Preventing of Attacks in Cloud Computing Using Hybrid Algorithm
    Aashmi, R. S.
    Jaya, T.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (01): : 79 - 95