TY - GEN
T1 - Toward detecting collusive ranking manipulation attackers in mobile app markets
AU - Chen, Hao
AU - He, Daojing
AU - Zhu, Sencun
AU - Yang, Jingshun
N1 - Publisher Copyright:
© 2017 ACM.
PY - 2017/4/2
Y1 - 2017/4/2
N2 - Incentivized by monetary gain, some app developers launch fraudulent campaigns to boost their apps' rankings in the mobile app stores. They pay some service providers for boost services, which then organize large groups of collusive attackers to take fraudulent actions such as posting high app ratings or inflating apps' downloads. If not addressed timely, such attacks will increasingly damage the healthiness of app ecosystems. In this work, we propose a novel approach to identify attackers of collusive promotion groups in an app store. Our approach exploits the unusual ranking change patterns of apps to identify promoted apps, measures their pairwise similarity, forms targeted app clusters (TACs), and finally identifies the collusive group members. Our evalu-ation based on a dataset of Apple's China App store has demonstrated that our approach is able and scalable to re- port highly suspicious apps and reviewers. App stores may use our techniques to narrow down the suspicious lists for further investigation.
AB - Incentivized by monetary gain, some app developers launch fraudulent campaigns to boost their apps' rankings in the mobile app stores. They pay some service providers for boost services, which then organize large groups of collusive attackers to take fraudulent actions such as posting high app ratings or inflating apps' downloads. If not addressed timely, such attacks will increasingly damage the healthiness of app ecosystems. In this work, we propose a novel approach to identify attackers of collusive promotion groups in an app store. Our approach exploits the unusual ranking change patterns of apps to identify promoted apps, measures their pairwise similarity, forms targeted app clusters (TACs), and finally identifies the collusive group members. Our evalu-ation based on a dataset of Apple's China App store has demonstrated that our approach is able and scalable to re- port highly suspicious apps and reviewers. App stores may use our techniques to narrow down the suspicious lists for further investigation.
UR - http://www.scopus.com/inward/record.url?scp=85021960193&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85021960193&partnerID=8YFLogxK
U2 - 10.1145/3052973.3053022
DO - 10.1145/3052973.3053022
M3 - Conference contribution
AN - SCOPUS:85021960193
T3 - ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
SP - 58
EP - 70
BT - ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
PB - Association for Computing Machinery, Inc
T2 - 2017 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2017
Y2 - 2 April 2017 through 6 April 2017
ER -