Understanding and Detecting Mobile Ad Fraud through the Lens of Invalid Traffic

dc.contributor.authorSun, S.
dc.contributor.authorYu, L.
dc.contributor.authorZhang, X.
dc.contributor.authorXue, M.
dc.contributor.authorZhou, R.
dc.contributor.authorZhu, H.
dc.contributor.authorHao, S.
dc.contributor.authorLin, X.
dc.contributor.conferenceACM SIGSAC Conference on Computer and Communications Security (CCS) (15 Nov 2021 - 19 Nov 2021 : virtual online)
dc.date.issued2021
dc.descriptionSession 1D: Authentication and Click Fraud
dc.description.abstractAlong with gaining popularity of Real-Time Bidding (RTB) based programmatic advertising, the click farm based invalid traffic, which leverages massive real smartphones to carry out large-scale ad fraud campaigns, is becoming one of the major threats against online advertisement. In this study, we take an initial step towards the detection and large-scale measurement of the click farm based invalid traffic. Our study begins with a measurement on the device's features using a real-world labeled dataset, which reveals a series of features distinguishing the fraudulent devices from the benign ones. Based on these features, we develop EvilHunter, a system for detecting fraudulent devices through ad bid request logs with a focus on clustering fraudulent devices. EvilHunter functions by 1) building a classifier to distinguish fraudulent and benign devices; 2) clustering devices based on app usage patterns; and 3) relabeling devices in clusters through majority voting. EvilHunter demonstrates 97% precision and 95% recall on a real-world labeled dataset. By investigating a super click farm, we reveal several cheating strategies that are commonly adopted by fraudulent clusters. We further reduce the overhead of EvilHunter and discuss how to deploy the optimized EvilHunter in a real-world system. We are in partnership with a leading ad verification company to integrate EvilHunter into their industrial platform.
dc.description.statementofresponsibilitySuibin Sun, Le Yu, Xiaokuan Zhang, Minhui Xue, Ren Zhou, Haojin Zhu, Shuang Hao, Xiaodong Lin
dc.identifier.citationProceedings of the ACM Conference on Computer and Communications Security, 2021, pp.287-303
dc.identifier.doi10.1145/3460120.3484547
dc.identifier.isbn9781450384544
dc.identifier.issn1543-7221
dc.identifier.orcidXue, M. [0000-0001-5411-5039] [0000-0002-9172-4252]
dc.identifier.urihttps://hdl.handle.net/2440/135346
dc.language.isoen
dc.publisherAssociation for Computing Machinery
dc.relation.granthttp://purl.org/au-research/grants/arc/DP210102670
dc.rights© 2021 Association for Computing Machinery.
dc.source.urihttps://dl.acm.org/doi/proceedings/10.1145/3460120
dc.subjectInvalid traffic
dc.subjectAd fraud
dc.subjectClick farm
dc.titleUnderstanding and Detecting Mobile Ad Fraud through the Lens of Invalid Traffic
dc.typeConference paper
pubs.publication-statusPublished

Files