SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 6
Ranking Fraud Detection System and Recommendation
System for Mobile Apps
Jana Patil1
MIT Academy of Engineering ,Department of Computer , University of Pune, Alandi(D) , Pune
Introduction
Now a days the mobile Apps has
developed at an increasingly high rate . The
development of Apps were increased by several
millions of times at different App Store . For
developing mobile Apps the different App Stores
launches App Leader boards daily. The App
Leader boards does the chart ranking of most
popular Apps . Also the other important role of
the App Leader board is promoting mobile Apps
and the way for earning . The App which is
having rank on the top of the App Leader board
is going to download by many number of user .
But now a day , some App developers are going
to develop the fraud App and intentionally
upload their Apps on App leader board , and tries
to maintain the chart ranking on an App Stores .
Therefore the main aim is to detect ranking fraud
of mobile Apps . Actually fraud occurs within
the leading sessions .Therefore we have to
identify fraud occurred within leading sessions.
For that purpose we propose an algorithm to
identify the leading sessions of each App based
on its history of ranking records and the analysis
of its ranking behaviours . Therefore some fraud
evidences are characterized from Apps history of
ranking records. Then three functions are
developed to extract such ranking based fraud
evidences. Therefore, further four types of fraud
evidences are proposed based on Apps rating and
review history, recommendation and app fraud
history which reect some anomaly patterns from
Apps historical rating and review records. In
addition, to integrate these types of evidences, an
unsupervised evidence aggregation method is
developed which is used for evaluating the
credibility of leading sessions from mobile Apps.
Review of literature
A. Klementiev, D. Roth, K. Small, and I.
Titov uses the method for the learning the setting
of aggregation of the full rankings and
aggregation of the top-k lists . And also
demonstrated a signicant improvement over a
domain agnostic baseline in both cases . E.-P.
Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W.
Lauw shows the degree of spam is measured by
the scoring methods for each reviewer and then it
apply for the Amazon review dataset. After
measuring degree of spam select a subset of
highly visited reviewres for next inspection by
our user calculator . It can be done with the help
Abstract:
Ranking fraud in the mobile Apps is nothing but the false or fake activities which are going to be done in Apps
popularity list for bumping up the fraud App . It is very easy for the App developer to use the fake App and fake rating
for commiting the ranking fraud . The research in ranking fraud of the mobile App is limited . For that purpose a
ranking fraud detection system and the App recommendation system is proposed . There are mainly three types of
evidences , Ranking based evidences , Rating based evidences , and Review based evidences . These evidences can be
obtained from Apps ranking , rating and review history .Then proposed an optimization based aggregation method for
integrating all these evidences for the fraud detection .In this way more effectiveness and regularity of the ranking
fraud detection system is obtained and the original App is recommended to the user.
RESEARCH ARTICLE OPEN ACCESS
International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 7
of a web based spammer evaluation software .
Y.-T. Liu, T.-Y. Liu, T. Qin,
Z.M. Ma, and H. Li. explain the main focus is
on the Markove Chain based rank aggregation
.Here the optimization is not a convex
optimization problem because of that it
becomes hard to solve , thats why the
supervised rank aggregation method is evolved
from unsupervised rank aggregation method .
N. Spirin and J. Han Web spam detection
techniques are discussed in systematic way on
the basis of algorithms and underlying
principles . Here algorithms are categorized
into different ways on the basis of different
things .
Proposed System
The main target is to detect ranking
fraud for the mobile App.Mainly fraud
happens in leading sessions.Thats why rst
propose the effective algorithm for
identifying leading sessions of App which
is truly based on the ranking history . after
that Apps ranking behaviours is analyzed
for nding the fake App . Because the fake
Apps have different ranking records as
compared with the normal App . Therefore
from Apps history of ranking records we
have to characterize some fraud evidences
and then develop different functions for
extracting ranking based fraud evidences
.There are two types in fraud evidences
which based on Apps rating and the review
history .
In ranking based evidences there is a specic
ranking pattern which is going to satisfy by
the history of the Apps ranking behaviours
in a leading event . There are mainly three
different ranking phases rising phase ,
maintaining phase , and recession phase .
In rating based evidences , when App were
published it can be rated by the downloaded user
after downloading the App . Rating of the user is
one of the most important way for Apps
advertisement . The App having higher rating
attracts more user for downloading the app and it
ranks high on the leader board . Therefore rating
plays important role for ranking fraud .
In review based evidences as like of the rating
some App Stores allows users to write their
comments as App review . With the help of
review user gives their experience of the
particular mobile App . Therefore review also
plays important role in ranking fraud . After
that the evidence based aggregation method
used for integrating all these evidences . then
nd the fraud App from the App Store and
Recommend the original App from the App
store .
System Architecture
Figure 1: Block Diagram of Proposed
System (System Architecture)
The system architechure describe the
overall function of the system . As the number
of mo-bile Apps increases for that to detect the
fraud App this paper proposes a simple and
effective system . The above fig. shows the
overall structure of ranking fraud of mobile
App .
The architecture is divided into four
module :
Module 1 : Leading events
It observed that mobile Apps are not
ranked high in the leader board , that
International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 8
ranked only in some leading events which
form the different leading sessions on the
basis of analysis of ranking history .
Module 2 : Leading sessions
Leading sessions of mobile App gives the
period of popularity . Thats why leading
session plays important role in ranking
manipulation . Ranking fraud is detected
by extracting leading sessions from its
ranking history .
Module 3 : Identifying the leading sessions
for mobile Apps
For mining leading sessions there are two
different steps . In first step , identify
leading events on the basis of ranking
history of the Apps . In second step , for
constructing leading sessions merging of
the adjacent leading event is done . For
that purpose the algorithm is demonstrated
.
Module 4 : Identifying evidences for
ranking fraud detection
1 Ranking based evidences :
For finding the fraud evidences and for
getting the ranking history of the Apps
anal-ysis of the leading events is done .
Apps ranking behavior observed in leading
event is satisfied by specific ranking
pattern .
2 Rating based evidences :
Ranking based evidences are not sufficient for
detecting fraud of mobile Apps . If user
downloaded the App , the rating has been done
after downloading that App . If the rating of the
App found at higher level on leader board then
that mobile App is mostly attracted by the people
. Therefore these history of rating is used for
developing the rating based evidences
which is then used for fraud detection .
3 Review based evidences :
As like of rating , the textual comments to
the App is nothing but the review of that
App . User gives comments to the App after
downloading that App . These reviews of the
App are referred by the most of user before
downloading that App . On the basis of these
review it becomes easy to find the fraud App
.
Conclusion
The work proposed the novel approach
for the development of a ranking fraud
detection system for mobile Apps. Firstly,
identication of rating based evidences is done.
Secondly, identication of review based
evidences then by mining leading sessions
ranking fraud evidences is col-lected. And
nally system performs the aggregation of all
three evidences to detect fraud Apps.
Experimental results showed the potency of
the proposed approach. Our proposed system
will denitely oer substantial benets and
provides an opportunity to prevent fraudulent
Apps being used in market and recommend the
fraud free App .
References
1) H. Zhu, H. Xiong, Y. Ge, E. Chen.
Discovery of Ranking Fraud for the Mobile
Apps , IEEE Transaction on Knowledge and
Data Engineering , Volume:27 , Jan 2015.
2) A. Klementiev, D. Roth, and K. Small.
Unsupervised rank aggregation with
distance-based models In Proceedings of
the 25th International conference on
Machine Learning, 2008.
3) E.-P. Lim, V.-A. Nguyen, N. Jindal, B.
Liu, and H. W. Lauw. Detecting product
review spammers using rating behaviors.
In Proceedings of the 19th ACM
International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017
ISSN: 2395-1303 http://www.ijetjournal.org Page 9
international conference on Information
and knowledge management, 2010.
4)Yu-Ting Liu, Tie-Yan Liu, Tao Qin, Zhi-
Ming Ma, and Hang Li. Supervised Rank
Aggrega-tion.International World Wide Web
Conference on Search Quality and precision ,
2007
5) A. Mukherjee, A. Kumar, B. Liu, J.
Wang, M. Hsu, M. Castellanos, R. Ghosh.
Spotting opinion spammers using
behavioral for emerging data intensive
applications. In Proceedings of the 19th
ACM SIGKDD international conference
on knowledge discovery and data mining ,
2015
6)N. Spirin and J. Han. Survey on web
spam detection: principles and algorithms.
SIGKDD Explor. Newsl., 13(2):5064, May
2012
7)H. Zhu, E. Chen, K. Yu, H. Cao, H.
Xiong, and J. Tian. Mining personal
context-aware pref-erences for mobile
users. In Data Mining (ICDM), 2012 IEEE
12th International Conference on, pages
12121217, 2012.
8) H. Zhu, H. Xiong, Y. Ge, and E. Chen.
Ranking fraud detection for mobile apps:
A holistic view. In Proceedings of the
22nd ACM international conference on
Information and knowledge management,
CIKM 13, 2015.
9)B. Zhou, J. Pei, and Z. Tang. A spamicity
approach to web spam detection. In
Proceedings of the 2008 SIAM International
Conference on Data Mining, SDM08, pages
277288, 2008. 10) H. Zhu, H. Cao, E. Chen, H.
Xiong, and J. Tian. Exploiting enriched
contextual informa-tion for mobile app
classication. In Proceedings of the 21st ACM
international conference on Information and
knowledge management, CIKM 12, pages
16171621, 2012.

More Related Content

What's hot

An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security SurveyIOSRjournaljce
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET Journal
 
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFACE
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET Journal
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detectionsujeeshkumarj
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsFACE
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREIJNSA Journal
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREIJNSA Journal
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security SurveyBee_Ware
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...IJNSA Journal
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system forIJNSA Journal
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET Journal
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News SummarizationIRJET Journal
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Akash Karwande
 

What's hot (20)

An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationFaces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 
Zero day malware detection
Zero day malware detectionZero day malware detection
Zero day malware detection
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
 
AndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative MarketsAndRadar: Fast Discovery of Android Applications in Alternative Markets
AndRadar: Fast Discovery of Android Applications in Alternative Markets
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Mom phd
Mom phdMom phd
Mom phd
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
2013 Mobile Application Security Survey
2013 Mobile Application Security Survey2013 Mobile Application Security Survey
2013 Mobile Application Security Survey
 
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
SYSTEM CALL DEPENDENCE GRAPH BASED BEHAVIOR DECOMPOSITION OF ANDROID APPLICAT...
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
 
IRJET- Twitter Spammer Detection
IRJET- Twitter Spammer DetectionIRJET- Twitter Spammer Detection
IRJET- Twitter Spammer Detection
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 

Similar to IJET-V3I1P2

IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET Journal
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsPvrtechnologies Nellore
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsBoopathi Kumar
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile ApplicationsIRJET Journal
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps1crore projects
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps1crore projects
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSnexgentechnology
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...Nexgen Technology
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsnexgentech15
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsNexgen Technology
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationseSAT Journals
 
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MININGA DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MININGIRJET Journal
 
identifying malevolent facebook requests
identifying malevolent facebook requestsidentifying malevolent facebook requests
identifying malevolent facebook requestsINFOGAIN PUBLICATION
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...Nexgen Technology
 
Detecting malicious facebook applicationsi
Detecting malicious facebook applicationsiDetecting malicious facebook applicationsi
Detecting malicious facebook applicationsinexgentechnology
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applicationsnexgentech15
 

Similar to IJET-V3I1P2 (20)

IRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile AppsIRJET - Discovery of Ranking Fraud for Mobile Apps
IRJET - Discovery of Ranking Fraud for Mobile Apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
IRJET- Detection of Ranking Fraud in Mobile Applications
IRJET-  	  Detection of Ranking Fraud in Mobile ApplicationsIRJET-  	  Detection of Ranking Fraud in Mobile Applications
IRJET- Detection of Ranking Fraud in Mobile Applications
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
 
Discovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile AppsDiscovery of Ranking Fraud for Mobile Apps
Discovery of Ranking Fraud for Mobile Apps
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPSDISCOVERY OF RANKING FRAUD FOR MOBILE APPS
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS
 
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
DISCOVERY OF RANKING FRAUD FOR MOBILE APPS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
A survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applicationsA survey on identification of ranking fraud for mobile applications
A survey on identification of ranking fraud for mobile applications
 
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MININGA DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
A DATA MINING FRAMEWORK FOR PREVENTION OF FAKE APPLICATIONS USING OPINION MINING
 
identifying malevolent facebook requests
identifying malevolent facebook requestsidentifying malevolent facebook requests
identifying malevolent facebook requests
 
Crm updated report
Crm updated reportCrm updated report
Crm updated report
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...DETECTING MALICIOUS FACEBOOK APPLICATIONS  - IEEE PROJECTS IN PONDICHERRY,BUL...
DETECTING MALICIOUS FACEBOOK APPLICATIONS - IEEE PROJECTS IN PONDICHERRY,BUL...
 
Detecting malicious facebook applicationsi
Detecting malicious facebook applicationsiDetecting malicious facebook applicationsi
Detecting malicious facebook applicationsi
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 

More from IJET - International Journal of Engineering and Techniques

More from IJET - International Journal of Engineering and Techniques (20)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
Ijet v5 i6p18
Ijet v5 i6p18Ijet v5 i6p18
Ijet v5 i6p18
 
Ijet v5 i6p17
Ijet v5 i6p17Ijet v5 i6p17
Ijet v5 i6p17
 
Ijet v5 i6p16
Ijet v5 i6p16Ijet v5 i6p16
Ijet v5 i6p16
 
Ijet v5 i6p15
Ijet v5 i6p15Ijet v5 i6p15
Ijet v5 i6p15
 
Ijet v5 i6p14
Ijet v5 i6p14Ijet v5 i6p14
Ijet v5 i6p14
 
Ijet v5 i6p13
Ijet v5 i6p13Ijet v5 i6p13
Ijet v5 i6p13
 
Ijet v5 i6p12
Ijet v5 i6p12Ijet v5 i6p12
Ijet v5 i6p12
 
Ijet v5 i6p11
Ijet v5 i6p11Ijet v5 i6p11
Ijet v5 i6p11
 
Ijet v5 i6p10
Ijet v5 i6p10Ijet v5 i6p10
Ijet v5 i6p10
 
Ijet v5 i6p2
Ijet v5 i6p2Ijet v5 i6p2
Ijet v5 i6p2
 
IJET-V3I2P24
IJET-V3I2P24IJET-V3I2P24
IJET-V3I2P24
 
IJET-V3I2P23
IJET-V3I2P23IJET-V3I2P23
IJET-V3I2P23
 
IJET-V3I2P22
IJET-V3I2P22IJET-V3I2P22
IJET-V3I2P22
 
IJET-V3I2P21
IJET-V3I2P21IJET-V3I2P21
IJET-V3I2P21
 
IJET-V3I2P20
IJET-V3I2P20IJET-V3I2P20
IJET-V3I2P20
 
IJET-V3I2P19
IJET-V3I2P19IJET-V3I2P19
IJET-V3I2P19
 
IJET-V3I2P18
IJET-V3I2P18IJET-V3I2P18
IJET-V3I2P18
 
IJET-V3I2P17
IJET-V3I2P17IJET-V3I2P17
IJET-V3I2P17
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 

IJET-V3I1P2

  • 1. International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 6 Ranking Fraud Detection System and Recommendation System for Mobile Apps Jana Patil1 MIT Academy of Engineering ,Department of Computer , University of Pune, Alandi(D) , Pune Introduction Now a days the mobile Apps has developed at an increasingly high rate . The development of Apps were increased by several millions of times at different App Store . For developing mobile Apps the different App Stores launches App Leader boards daily. The App Leader boards does the chart ranking of most popular Apps . Also the other important role of the App Leader board is promoting mobile Apps and the way for earning . The App which is having rank on the top of the App Leader board is going to download by many number of user . But now a day , some App developers are going to develop the fraud App and intentionally upload their Apps on App leader board , and tries to maintain the chart ranking on an App Stores . Therefore the main aim is to detect ranking fraud of mobile Apps . Actually fraud occurs within the leading sessions .Therefore we have to identify fraud occurred within leading sessions. For that purpose we propose an algorithm to identify the leading sessions of each App based on its history of ranking records and the analysis of its ranking behaviours . Therefore some fraud evidences are characterized from Apps history of ranking records. Then three functions are developed to extract such ranking based fraud evidences. Therefore, further four types of fraud evidences are proposed based on Apps rating and review history, recommendation and app fraud history which reect some anomaly patterns from Apps historical rating and review records. In addition, to integrate these types of evidences, an unsupervised evidence aggregation method is developed which is used for evaluating the credibility of leading sessions from mobile Apps. Review of literature A. Klementiev, D. Roth, K. Small, and I. Titov uses the method for the learning the setting of aggregation of the full rankings and aggregation of the top-k lists . And also demonstrated a signicant improvement over a domain agnostic baseline in both cases . E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw shows the degree of spam is measured by the scoring methods for each reviewer and then it apply for the Amazon review dataset. After measuring degree of spam select a subset of highly visited reviewres for next inspection by our user calculator . It can be done with the help Abstract: Ranking fraud in the mobile Apps is nothing but the false or fake activities which are going to be done in Apps popularity list for bumping up the fraud App . It is very easy for the App developer to use the fake App and fake rating for commiting the ranking fraud . The research in ranking fraud of the mobile App is limited . For that purpose a ranking fraud detection system and the App recommendation system is proposed . There are mainly three types of evidences , Ranking based evidences , Rating based evidences , and Review based evidences . These evidences can be obtained from Apps ranking , rating and review history .Then proposed an optimization based aggregation method for integrating all these evidences for the fraud detection .In this way more effectiveness and regularity of the ranking fraud detection system is obtained and the original App is recommended to the user. RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 7 of a web based spammer evaluation software . Y.-T. Liu, T.-Y. Liu, T. Qin, Z.M. Ma, and H. Li. explain the main focus is on the Markove Chain based rank aggregation .Here the optimization is not a convex optimization problem because of that it becomes hard to solve , thats why the supervised rank aggregation method is evolved from unsupervised rank aggregation method . N. Spirin and J. Han Web spam detection techniques are discussed in systematic way on the basis of algorithms and underlying principles . Here algorithms are categorized into different ways on the basis of different things . Proposed System The main target is to detect ranking fraud for the mobile App.Mainly fraud happens in leading sessions.Thats why rst propose the effective algorithm for identifying leading sessions of App which is truly based on the ranking history . after that Apps ranking behaviours is analyzed for nding the fake App . Because the fake Apps have different ranking records as compared with the normal App . Therefore from Apps history of ranking records we have to characterize some fraud evidences and then develop different functions for extracting ranking based fraud evidences .There are two types in fraud evidences which based on Apps rating and the review history . In ranking based evidences there is a specic ranking pattern which is going to satisfy by the history of the Apps ranking behaviours in a leading event . There are mainly three different ranking phases rising phase , maintaining phase , and recession phase . In rating based evidences , when App were published it can be rated by the downloaded user after downloading the App . Rating of the user is one of the most important way for Apps advertisement . The App having higher rating attracts more user for downloading the app and it ranks high on the leader board . Therefore rating plays important role for ranking fraud . In review based evidences as like of the rating some App Stores allows users to write their comments as App review . With the help of review user gives their experience of the particular mobile App . Therefore review also plays important role in ranking fraud . After that the evidence based aggregation method used for integrating all these evidences . then nd the fraud App from the App Store and Recommend the original App from the App store . System Architecture Figure 1: Block Diagram of Proposed System (System Architecture) The system architechure describe the overall function of the system . As the number of mo-bile Apps increases for that to detect the fraud App this paper proposes a simple and effective system . The above fig. shows the overall structure of ranking fraud of mobile App . The architecture is divided into four module : Module 1 : Leading events It observed that mobile Apps are not ranked high in the leader board , that
  • 3. International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 8 ranked only in some leading events which form the different leading sessions on the basis of analysis of ranking history . Module 2 : Leading sessions Leading sessions of mobile App gives the period of popularity . Thats why leading session plays important role in ranking manipulation . Ranking fraud is detected by extracting leading sessions from its ranking history . Module 3 : Identifying the leading sessions for mobile Apps For mining leading sessions there are two different steps . In first step , identify leading events on the basis of ranking history of the Apps . In second step , for constructing leading sessions merging of the adjacent leading event is done . For that purpose the algorithm is demonstrated . Module 4 : Identifying evidences for ranking fraud detection 1 Ranking based evidences : For finding the fraud evidences and for getting the ranking history of the Apps anal-ysis of the leading events is done . Apps ranking behavior observed in leading event is satisfied by specific ranking pattern . 2 Rating based evidences : Ranking based evidences are not sufficient for detecting fraud of mobile Apps . If user downloaded the App , the rating has been done after downloading that App . If the rating of the App found at higher level on leader board then that mobile App is mostly attracted by the people . Therefore these history of rating is used for developing the rating based evidences which is then used for fraud detection . 3 Review based evidences : As like of rating , the textual comments to the App is nothing but the review of that App . User gives comments to the App after downloading that App . These reviews of the App are referred by the most of user before downloading that App . On the basis of these review it becomes easy to find the fraud App . Conclusion The work proposed the novel approach for the development of a ranking fraud detection system for mobile Apps. Firstly, identication of rating based evidences is done. Secondly, identication of review based evidences then by mining leading sessions ranking fraud evidences is col-lected. And nally system performs the aggregation of all three evidences to detect fraud Apps. Experimental results showed the potency of the proposed approach. Our proposed system will denitely oer substantial benets and provides an opportunity to prevent fraudulent Apps being used in market and recommend the fraud free App . References 1) H. Zhu, H. Xiong, Y. Ge, E. Chen. Discovery of Ranking Fraud for the Mobile Apps , IEEE Transaction on Knowledge and Data Engineering , Volume:27 , Jan 2015. 2) A. Klementiev, D. Roth, and K. Small. Unsupervised rank aggregation with distance-based models In Proceedings of the 25th International conference on Machine Learning, 2008. 3) E.-P. Lim, V.-A. Nguyen, N. Jindal, B. Liu, and H. W. Lauw. Detecting product review spammers using rating behaviors. In Proceedings of the 19th ACM
  • 4. International Journal of Engineering and Techniques - Volume 3 Issue 1, Jan – Feb 2017 ISSN: 2395-1303 http://www.ijetjournal.org Page 9 international conference on Information and knowledge management, 2010. 4)Yu-Ting Liu, Tie-Yan Liu, Tao Qin, Zhi- Ming Ma, and Hang Li. Supervised Rank Aggrega-tion.International World Wide Web Conference on Search Quality and precision , 2007 5) A. Mukherjee, A. Kumar, B. Liu, J. Wang, M. Hsu, M. Castellanos, R. Ghosh. Spotting opinion spammers using behavioral for emerging data intensive applications. In Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining , 2015 6)N. Spirin and J. Han. Survey on web spam detection: principles and algorithms. SIGKDD Explor. Newsl., 13(2):5064, May 2012 7)H. Zhu, E. Chen, K. Yu, H. Cao, H. Xiong, and J. Tian. Mining personal context-aware pref-erences for mobile users. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 12121217, 2012. 8) H. Zhu, H. Xiong, Y. Ge, and E. Chen. Ranking fraud detection for mobile apps: A holistic view. In Proceedings of the 22nd ACM international conference on Information and knowledge management, CIKM 13, 2015. 9)B. Zhou, J. Pei, and Z. Tang. A spamicity approach to web spam detection. In Proceedings of the 2008 SIAM International Conference on Data Mining, SDM08, pages 277288, 2008. 10) H. Zhu, H. Cao, E. Chen, H. Xiong, and J. Tian. Exploiting enriched contextual informa-tion for mobile app classication. In Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM 12, pages 16171621, 2012.