Detection of Ranking Fraud and Avoidance Frauds in Mobile Applications

Authors

  • S. DastagiriBasha  MCA , Student,Department of MCA, Sree Vidyanikethan Institute of Management, Sri Venkateswara University, Tirupati, Andhra Pradesh, India
  • V. Rahamathulla  Assistant Professor,Department of MCA, Sree Vidyanikethan Institute of Management, Tirupati, Andhra Pradesh, India

Keywords:

Ranking, Review, Aggregation, Rating based evidences, Pattern Analysis, Semantic based analysis.

Abstract

As we as a whole know each individual on the planet are portable users in certainty advanced mobile phone users with android applications [1]. In this way, Due to this prominence and surely understood idea there will be a quick development in mobile innovation we have seen. And in addition in information mining idea mining the required information from a specific application is extremely troublesome and vital errand. Blending these two ideas of rank fakes in android market and mining required information is gone exceptionally extreme for us and this is testing circumstance. We are utilizing this idea in entire paper. As we realize that the portable Apps has developed at tremendous speed in a few years; with respect to walk 2017, there are adjacent 2.8 million Apps at Google play and 2.2 Apps at Apple Apps store. Furthermore, there are more than 400,000 free application engineers all battling for the consideration of similar potential users [2]. The Apple App Store saw 128,000 new business applications alone in 2014 and the mobile gaming classification alone has rivalry to the tune of very nearly 300,000 applications. Here the fundamental need to influence fraud to look in Apps is via looking through the high positioned applications up to 30-40 which might be positioned high in some days or the applications which are in those high positioned records ought to be confirmed however this isn't connected when we work for a large number of uses included every day. In this way, we go for expansive view by applying some strategy to each application to judge its rank. In this paper of our task revelation of rank fraud for mobile applications, we build up a need to make a faultless, extortion less and result that shows revised application appropriately give rank; where we really get it going via seeking fraud of uses. They make fraud of App by positioned high the App by techniques utilizing, for example, human water armed forces and bot ranches; where they make extortion by downloading application through different gadgets and give counterfeit appraisals and audits. Along these lines, as we said above here we have to mine urgent information relating specific application, for example, audit which we said remarks and furthermore such huge numbers of other data we have to mine and place calculation to recognize phoniness in application rank [3].

References

  1. Hengshu Zhu, Hui Xiong, Senior Member, IEEE, Yong Ge, and Enhong Chen, Senior Member, IEEE Discovery of Ranking Fraud for Mobile Apps‖ IEEE Transactions On Knowledge And Data Engineering, Vol. 27, No. 1, January 2015.
  2. Pranjali Deshmukh, Pankaj Agarkar -Mobile Application For Malware Detection‖ International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 02 | May-2015
  3. Anuja A. Kadam ,Pushpanjali M. Chouragade -A Review Paper on: Malicious Application Detection in Android System‖ International Journal of Computer Applications (0975 - 8887) National Conference on Recent Trends in Computer Science & Engineering (MEDHA 2015).
  4. Jakub Zilincan ,MichalGregus "Improving Rank of a Website in Search Resuts - a Experimental Approach"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet.
  5. App Analytic: A Study on Correlation Analysis of App Ranking Data Sun-Young Ihm; Woong-KeeLoh; Young-Ho Park Cloud and Green Computing (CGC), 2013 Third International Conference on Year: 2013 Pages: 561 563, DOI: 10.1109/CGC.2013.95 IEEE Conference Publications
  6. Ranjitha.R, Mathumitha.K, Meena.S, S.Hariharan, "Discovery of Ranking of Fraud for Mobile Apps", International Journal of Innovative Research in Engineering & Management (IJIREM) ISSN: 23500557, Volume-3, Issue-3, May-2016.
  7. SabbineniPoojitha, Balineni Venkata Sai Mrudula and VemuriSindhura, "A Novel Method To Identify False Apps Through Data Mining", International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 23 Issue 5 -SEPTEMBER 2016.
  8. Jakub Zilincan, MichalGregus "Improving Rank of a Website in Search Resuts - a Experimental Approach"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing978-1-4673-9473-4 /15 $31.00 © 2015 IEEE
  9. L. Azzopardi, M. Girolami, and K. V. Risjbergen, "Investigating the relationship between language model perplexity and ir precision-recall measures," in Proc. 26th Int. Conf. Res. Develop. Inform. Retrieval, 2003, pp. 369-370.
  10. D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent Dirichlet allocation," J. Mach. Learn. Res., pp. 993- 1022, 2003.
  11. Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou, "A taxi leading fraud detection system," in Proc. IEEE 11th Int. Conf. Data Mining, 2011, pp. 181-190.
  12. D. F. Gleich and L.-h. Lim, "Rank aggregation via nuclear norm minimization," in Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2011, pp. 60-68.
  13. T. L. Griffiths and M. Steyvers, "Finding scientific topics," Proc. Nat. Acad. Sci. USA, vol. 101, pp. 5228-5235, 2004.
  14. G. Heinrich, Parameter estimation for text analysis, "Univ. Leipzig, Leipzig, Germany, Tech. Rep., http://faculty. cs.byu. edu/~ringger/CS601R/papers/Hei nrich-GibbsLDA.pdf, 2008.
  15. N. Jindal and B. Liu, "Opinion spam and analysis," in Proc. Int. Conf. Web Search Data Mining, 2008, pp. 219-230.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
S. DastagiriBasha, V. Rahamathulla, " Detection of Ranking Fraud and Avoidance Frauds in Mobile Applications , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.139-146, March-April-2018.