TY - GEN
T1 - Characterizing large-scale click fraud in zeroaccess
AU - Pearce, Paul
AU - Dave, Vacha
AU - Grier, Chris
AU - Levchenko, Kirill
AU - Guha, Saikat
AU - McCoy, Damon
AU - Paxson, Vern
AU - Savage, Stefan
AU - Voelker, Geoffrey M.
PY - 2014/11/3
Y1 - 2014/11/3
N2 - Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this work, we illuminate the intricate nature of this activity through the lens of ZeroAccess-one of the largest click fraud botnets in operation. Using a broad range of data sources, including peer-to-peer measurements, command-and-control telemetry, and contemporaneous click data from one of the top ad networks, we construct a view into the scale and complexity of modern click fraud operations. By leveraging the dynamics associated with Microsoft's attempted takedown of ZeroAccess in December 2013, we employ this coordinated view to identify "ad units" whose traffic (and hence revenue) primarily derived from ZeroAccess. While it proves highly challenging to extrapolate from our direct observations to a truly global view, by anchoring our analysis in the data for these ad units we estimate that the botnet's fraudulent activities plausibly induced advertising losses on the order of $100,000 per day. Copyright is held by the owner/author(s).
AB - Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this work, we illuminate the intricate nature of this activity through the lens of ZeroAccess-one of the largest click fraud botnets in operation. Using a broad range of data sources, including peer-to-peer measurements, command-and-control telemetry, and contemporaneous click data from one of the top ad networks, we construct a view into the scale and complexity of modern click fraud operations. By leveraging the dynamics associated with Microsoft's attempted takedown of ZeroAccess in December 2013, we employ this coordinated view to identify "ad units" whose traffic (and hence revenue) primarily derived from ZeroAccess. While it proves highly challenging to extrapolate from our direct observations to a truly global view, by anchoring our analysis in the data for these ad units we estimate that the botnet's fraudulent activities plausibly induced advertising losses on the order of $100,000 per day. Copyright is held by the owner/author(s).
KW - Click fraud
KW - Cybercrime
KW - Malware
KW - Measurement
KW - ZeroAccess
UR - http://www.scopus.com/inward/record.url?scp=84910676499&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84910676499&partnerID=8YFLogxK
U2 - 10.1145/2660267.2660369
DO - 10.1145/2660267.2660369
M3 - Conference contribution
AN - SCOPUS:84910676499
SN - 9781450329576
SN - 9781450329576
SN - 9781450331470
SN - 9781450331500
SN - 9781450331517
SN - 9781450331524
SN - 9781450331531
SN - 9781450331548
SN - 9781450331555
SN - 9781450332392
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 141
EP - 152
BT - Proceedings of the ACM Conference on Computer and Communications Security
PB - Association for Computing Machinery
T2 - 21st ACM Conference on Computer and Communications Security, CCS 2014
Y2 - 3 November 2014 through 7 November 2014
ER -