Advertisement Click Fraud Detection
DOI:
https://doi.org/10.32628/CSEIT217375Keywords:
Fraudulent clicks, click fraud, advertising website, crowd-source-based system, ad network, users.Abstract
Mobile ads are tormented with deceitful clicks that may be an important test for the advertising network. Albeit documented promotion systems utilize various methods to acknowledge click fraud, they don’t shield the client from conceivable intrigue among distributors and advertisement systems. What’s additional, promotion systems can’t screen the client’s action for click fraud location once they're entertained to the advertising web content following clicking the ad, i.e., in a web site there will be focuses or some specific spots after we click on the actual spot it'll be entertained to the advertising web site. We propose another publically support-based mostly framework referred to as Click Fraud Crowdsourcing (CFC) that works in conjunction with the two promoters and advertisement organizes therefore as to defend the two gatherings from any conceivable click dishonorable acts. The framework profits by each a worldwide view, wherever it accumulates various promotion demands examining to various advertising organize distributer publicist blends, and a nearby read, wherever it will follow the clients’ commitment in every advertising website.
References
- Asdemir, Kursad; Yurtseven, O¨ zden; Yahya, Mon (2008).”An Economic Model of Click Fraud in Publisher Networks”.
- Schonfeld, Erick (October 8, 2009; The Evolution Of Click Fraud: Massive Chinese Operation DormRing1 Uncovered”. TechCrunch. [3] Badhe, Anup (April 2016). ”Click Fraud Detection in mobile ads served in programmatic exchanges” (PDF). International Journal of Scientific Technology Research. 05: 1.
- Majumdar, Saugat; Kulkarni, Dhananjay; Ravishankar, Chinya (2007). ”Addressing Click Fraud in Content Delivery Systems” (PDF). Infocom. IEEE.
- Google click fraud, http://www.law.com/jsp/article.jsp?id=1153213525 657.
- N. Kshetri. The economics of click fraud. IEEE Security & Privacy,8(3):45–53, May 2010
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.