Tagging Click-Spamming Suspicious Installs in Mobile Advertising Through Time Delta Distributions

Fraud in the mobile advertising world is a topic gaining momentum recently. Different reports agree that invalid traffc is generating losses in the order of billions of dollars and that there is a signi cant amount of fraud with ongoing efforts against it. Here at Jampp1 we use an automated fraud...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: Monasterio, Juan de
Formato: Objeto de conferencia
Lenguaje:Inglés
Publicado: 2017
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/63175
http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/AGRANDA/AGRANDA-07.pdf
Aporte de:
id I19-R120-10915-63175
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
Fraude
publicidad
Teléfono Celular
spellingShingle Ciencias Informáticas
Fraude
publicidad
Teléfono Celular
Monasterio, Juan de
Tagging Click-Spamming Suspicious Installs in Mobile Advertising Through Time Delta Distributions
topic_facet Ciencias Informáticas
Fraude
publicidad
Teléfono Celular
description Fraud in the mobile advertising world is a topic gaining momentum recently. Different reports agree that invalid traffc is generating losses in the order of billions of dollars and that there is a signi cant amount of fraud with ongoing efforts against it. Here at Jampp1 we use an automated fraud detection algorithm for a recent type of mobile advertising fraud, which can be referred to as click-spamming, click-injection or mobile-hijacking. We propose a metric to measure suspicious installs, and use a heuristic to compare the ts of theoretical distributions to this metric. This allows us to derive a threshold for suspicious installs. Our metric is based on the time-delta distributions, which amounts to the time it takes from a click in an ad to be converted into an install. The model is currently in use with satisfactory results. To the best of our knowledge, this is the rst algorithm in production used to tackle this speci c kind of fraud.
format Objeto de conferencia
Objeto de conferencia
author Monasterio, Juan de
author_facet Monasterio, Juan de
author_sort Monasterio, Juan de
title Tagging Click-Spamming Suspicious Installs in Mobile Advertising Through Time Delta Distributions
title_short Tagging Click-Spamming Suspicious Installs in Mobile Advertising Through Time Delta Distributions
title_full Tagging Click-Spamming Suspicious Installs in Mobile Advertising Through Time Delta Distributions
title_fullStr Tagging Click-Spamming Suspicious Installs in Mobile Advertising Through Time Delta Distributions
title_full_unstemmed Tagging Click-Spamming Suspicious Installs in Mobile Advertising Through Time Delta Distributions
title_sort tagging click-spamming suspicious installs in mobile advertising through time delta distributions
publishDate 2017
url http://sedici.unlp.edu.ar/handle/10915/63175
http://www.clei2017-46jaiio.sadio.org.ar/sites/default/files/Mem/AGRANDA/AGRANDA-07.pdf
work_keys_str_mv AT monasteriojuande taggingclickspammingsuspiciousinstallsinmobileadvertisingthroughtimedeltadistributions
bdutipo_str Repositorios
_version_ 1764820480539230209