Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Survey on Fraud Ranking Detection in Mobile App Store

Print
PDF
IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing
© 2016 by IJCA Journal
ICINC 2016 - Number 3
Year of Publication: 2016
Authors:
M. Aadil Khan
T. H. Gurav

Aadil M Khan and T h Gurav. Article: Survey on Fraud Ranking Detection in Mobile App Store. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(3):9-12, July 2016. Full text available. BibTeX

@article{key:article,
	author = {M. Aadil Khan and T.h. Gurav},
	title = {Article: Survey on Fraud Ranking Detection in Mobile App Store},
	journal = {IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing},
	year = {2016},
	volume = {ICINC 2016},
	number = {3},
	pages = {9-12},
	month = {July},
	note = {Full text available}
}

Abstract

From last few years, mobile technology has been received much more attention since it is most popular and basic need of today's world. Due to the popularity, mobiles are major target for malicious applications. Key challenge is to detect and remove malicious apps from mobiles. Numerous amounts of mobile apps are generated daily so ranking fraud is the one of the major aspects in front of the mobile App market. Ranking fraud refers to fraudulent or vulnerable activities. Main aim of the fraudulent is to knock the fraud mobile apps in the popularity list. Most App developer generates the ranking fraud apps by tricky means like enhancing the apps sales or by simply rating fake apps. Thus, there is need to have novel system to effectively analyze fraud apps. This paper provides a survey on various existing techniques with the novelties highlighting the need of novel technique to detect fraud mobile apps. This paper is motivated by arising need to detect fraud apps with less time. In proposed system, we add recommendation based on the modified ranking.

References

  • Hengshu Zhu, Hui Xiong, Senior Member, IEEE, Yong Ge, and Enhong Chen, Senior Member, IEEE,"Discovery of Ranking Fraud for Mobile Apps", IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 27, NO. 1, January 2015. Learn. Res. 3 (Mar. 2003), 1289-1305.
  • D. F. Gleich and L. -h. Lim. Rank aggregation via nuclear norm minimization. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pages 60–68, 2011. Y. T. Yu, M. F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  • A. Klementiev, D. Roth, and K. Small. An unsupervised learning algorithm for rank aggregation. In Proceedings of the 18th European conference on Machine Learning, ECML '07, pages 616–623, 2007.
  • A. Klementiev, D. Roth, and K. Small. Unsupervised rank aggregation with distance-based models. In Proceedings of the 25th international conference on Machine learning, ICML '08, pages 472– 479, 2008.
  • E. -P. Lim, V. -A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pages 939–948, 2010.
  • A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, and R. Ghosh. Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, 2013.
  • Z. Wu, J. Wu, J. Cao, and D. Tao. Hysad: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pages 985–993, 2012. S
  • B. Zhou, J. Pei, and Z. Tang. A spamicity approach to web spam detection. In Proceedings of the 2008 SIAM International Conference on Data Mining, SDM'08, pages 277–288, 2008.
  • H. Zhu, H. Cao, E. Chen, H. Xiong, and J. Tian. Exploiting enriched contextual information for mobile app classification. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM '12, pages 1617–1621, 2012.
  • H. Zhu, E. Chen, K. Yu, H. Cao, H. Xiong, and J. Tian. Mining personal context-aware preferences for mobile users. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 1212–1217, 2012.