Detection of Fraud in the ranking of Mobile Apps

Authors

  • Nalluri Sunny  Computer Science and Engineering Department, V R Siddhartha Engineering College, Vijayawada, Andhra Pradesh, India
  • Kodali Eswar  Computer Science and Engineering Department, V R Siddhartha Engineering College, Vijayawada, Andhra Pradesh, India
  • Mastan MD Meera Durga  Computer Science and Engineering Department, V R Siddhartha Engineering College, Vijayawada, Andhra Pradesh, India

Keywords:

Rate based, Ranking based evidences, Mining leading sessions

Abstract

The ranking fraud in the mobile Apps market leads to misleading and illusive activities which is used in keeping more and more Apps in the popularity list. Many of the misguiding means were used by the developers such as posting unauthentic App ratings, for the purpose of ranking. In this paper a comprehensive view of ranking fraud and a detection system for the mobile apps is given. The proposed method is based on the leading sessions of the mobile Apps and locating the ranking fraud by the active periods in them. Those leading sessions were used for detecting the global and local App rankings. Evidences like ranking based evidences, rating based evidences and review based evidences through statistical hypotheses tests were used. Finally, we evaluated the proposed system with real-world App data collected from the iOS App Store for a long time period. In the experiments, we also validated the effectiveness of the proposed system, and the scalability of the detection algorithm as well as some regularity of ranking fraud activities.

References

  1. L Azzopardi, M Girolami, et al. Investigating the relationship between language model perplexity and IR precision-recall measures, in Proc. 26th Int. Conf. Res. Develop. Inform. Retrieval, 2016; 369–370.
  2. Rahman, S Huang, HV.Faloutsos. Detecting malicious Facebook applications. IEEE transactions on networking volume, 2015.
  3. Z Hengshu, X Hui Xiong, et al. Discovery of ranking fraud for mobile apps. IEEE Transactions on knowledge and data engineering, 2014.
  4. Exploiting enriched contextual information for mobile app classification, H. Zhu, H. Cao, E. Chen, H. Xiong, and J. Tian. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM ’12, pages 1617–1621, 2015.
  5. N. Spirin and J. Han, "Survey on web spam detection: Principles and algorithms," SIGKDD Explor. Newslett., vol. 13, no. 2, pp. 50–64, May 2016.
  6. E.-P. Lim,V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw, "Detecting product review spammers use rating behaviors," in Proc.19thACMInt. Conf. Inform. Knowl. Manage., 2014, pp. 939–948.
  7. K. Shi and K. Ali. Getjar mobile application recommendations with very sparse datasets. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD ’12, pages 204–212, 2016.
  8. A. Ntoulas, M. Najork, M. Manasse, and D. Fetterly, "Detecting spam web pages through content analysis," in Proc. 15th Int. Conf. World Wide Web, 2014, pp. 83–92
  9. B. Yan and G. Chen. Appjoy: personalized mobile application discovery. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys ’11, pages 113–126, 2015.
  10. B. Zhou, J. Pei, and Z. Tang, "A spamicity a pproach to web spam detection," in Proc. SIAM Int. Conf. Data Mining, 2016. 66
  11. A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD ’13, 2016.
  12. H. Zhu, H. Xiong, Y. Ge, and E. Chen. Ranking fraud detection for mobile apps: A holistic view. In Proceedings of the 22nd ACM international conference on Information and knowledge management, CIKM ’13, 2016.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Nalluri Sunny, Kodali Eswar, Mastan MD Meera Durga, " Detection of Fraud in the ranking of Mobile Apps, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.1065-1069, May-June-2018.