You are on page 1of 4

International Journal of Computer Techniques - Volume 3 Issue 4, July - Aug 2016

RESEARCH ARTICLE

Mobile APP Recommendation and Discovery of


Ranking in Multivariate Time Series

OPEN ACCESS

S.Baskaran, V.Anita Shyni

Asst.professor, Head.Dept.of.Computer Science, Tamil University, Thanjavur-613010.


2Research Scholar, Dept.of.Computer Science, Tamil University, Thanjavur-613010.

----------------------------------*******************------------------------

Abstract:

The Mobile App is a very popular and well known concept due to the rapid
advancement in the mobile technology. Due to the large number of mobile Apps, ranking
fraud is the key challenge in front of the mobile App market. Ranking fraud refers to
fraudulent or vulnerable activities which have a purpose of bumping up the Apps in the
popularity list. While the significance of avoiding such invalid fraud ranking has been
generally perceived, there is constrained comprehension and examination here. We validate
service integrity by analyzing result consistency information with graph analysis. We
design attestation graph analysis algorithm to pinpoint malicious service providers and
recognize colluding attack patterns. Our scheme can achieve runtime integrity attestation
for cloud dataflow processing services using a small number of attestation data. Thus, our
approach does not require trusted hardware or secure kernel co-existed with third-party
service providers in the cloud.

Keywords: - Mobile Apps, Ranking Fraud Detection, Cloud computing,


Secured Data Processing.

----------------------------------*******************------------------------

I. INTRODUCTION

The number of mobile Apps has


grown up at a panoramic rate over the
past few years. for instance, as of the top
of Apr 2013, there ar quite 1.6 million
Apps at Apples App store and Google
Play. To stimulate the event of mobile
Apps, several App stores launched daily
App leader boards that demonstrate the
chart rankings of preferred Apps.
Indeed, the App leader board is one in all
the foremost necessary ways that for
promoting mobile Apps. A better rank on
the leader board typically results in an
enormous variety of downloads and
million bucks in revenue. Therefore, App
developers tend to explore varied ways
that like advertising campaigns to push
their Apps so as to own their Apps
hierarchal as high as potential in such
App leader boards.
On the other hand, as a late pattern,
rather than depending on customary
promoting arrangements, shady App

ISSN :2394-2231

engineers resort to some deceitful intends


to purposely support their Apps and in
the long run control the diagram rankings
on an App store. This is typically
executed by utilizing supposed "bot
ranches" or "human water armed forces"
to swell the App downloads, appraisals
and surveys in a brief timeframe. For
instance, an article from Venture Beat
reported that, when an App was advanced
with the assistance of positioning control,
it could be moved from number 1,800 to
the main 25 in Apple's sans top pioneer
board and more than 50,000-100,000 new
clients could be gained inside of a few
days. Truth be told, such positioning
extortion raises awesome worries to the
versatile App industry. For instance,
Apple has cautioned of taking action
against App designers who submit
positioning misrepresentation in the
Apple's App store. But now rather than
depending on customers reviews and
comments arrangements, App designer
engineers resort to some fake ranks and
comments to intentionally help their
Apps and in the end results the diagram

http://www.ijctjournal.org

Page 26

International Journal of Computer Techniques - Volume 3 Issue 4, July - Aug 2016

rankings on an App store. This is


typically results by utilizing purported
human water armed forces to increase the
App downloads, evaluations and surveys
in a brief while. An App which has
higher rating may attract more users to
download and can also be ranked higher
in the leader board. Thus, rating
manipulation is also an important
perspective of ranking fraud. In Review
Based Evidences, besides ratings, most of
the App stores also allow users to write
some textual comments as App reviews.
Especially, this paper proposes a simple
and effective algorithm to recognize the
leading sessions of each mobile App
based on its historical ranking records.
This is
one of the fraud evidence. Also, rating
and review history, which gives some
anomaly patterns from apps historical
rating and reviews records.
II. METHODOLOGY
Web ranking or positioning fraud or
spam recognition online survey spam
detection and portable App awareness the
issue of distinguishing positioning
misrepresentation for mobile Apps is still
under process of investigated. Because of
this reason in this paper, we propose to
develop a ranking misrepresentation
discovery framework for the portable
Apps. Along this line, we got a few new
difficulties. To begin with this
positioning or ranking misrepresentation
does not generally happen in the entire
part of life cycle of an App in the market,
so we have to recognize the time when
extortion happens. Such test can be
viewed as recognizing the neighborhood
irregularity rather than global irregularity
of mobile Apps. Second, because of the
huge number of portable Apps, it is hard
to physically mark positioning misuse for
each App, so it is mandatory to have an
adaptable approach to subsequently
recognize positioning distortion without
utilizing any standard data. At long last,
because of the dynamic way of
framework rankings, it is difficult to
differentiate and affirm the verifications
connected
to
positioning
misrepresentation, which rouses us to
find
some
supportable
extortion

ISSN :2394-2231

examples of portable Apps as proofs.


Surely, our watchful observation
uncovers that mobile Apps are not
generally placed high in the leaderboard,
but rather just in some driving occasions,
which shape distinguishing driving
sessions. As such, positioning extortion
more often happens than not happens in
these driving sessions. In this way,
distinguishing positioning distortion of
mobile Apps is really to detect
positioning extortion inside of driving
sessions of portable Apps.
To identify the leading sessions of each App

based on its historical ranking records. Then,


with the analysis of Apps ranking behaviors,
we find that the fraudulent Apps often have
different ranking patterns in each leading
session compared with normal Apps. Thus,
we characterize some fraud evidences from
Apps historical ranking records, and develop
three functions to extract such ranking based
fraud evidences. Nonetheless, the ranking
based evidences can be affected by some
legitimate marketing campaigns, such as
limited-time discount. As a result, it is not
sufficient to only use ranking based
evidences. Therefore, we further propose two
functions to discover rating based evidences,
which reflect some anomaly patterns from
Apps historical rating records. In addition,
we develop an unsupervised evidence
aggregation method to integrate these two
types of evidences for evaluating the
credibility of leading sessions from mobile
Apps. Figure 1 shows the framework of our
ranking fraud detection system for mobile
Apps.
2.1.Ranking Based Evidences
By analyzing the Apps historical
ranking records, we observe that Apps
ranking behaviors in a leading event always
satisfy a specific ranking pattern, which
consists of three different ranking phases,
namely, rising phase, maintaining phase and

http://www.ijctjournal.org

Page 27

International Journal of Computer Techniques - Volume 3 Issue 4, July - Aug 2016

recession phase. Specifically, in each leading


event, an Apps ranking first increases to a
peak position in the leaderboard, then keeps
such peak position for a period, and finally
decreases till the end of the event.
2.2.Evidence Aggregation
After extracting three types of fraud
evidences, the next challenge is how to
combine them for ranking fraud detection.
Indeed, there are many ranking and evidence
aggregation methods in the literature, such as
permutation based models, score based mode
and Dempster-Shafer rules. However, some
of these methods focus on learning a global
ranking for all candidates. This is not proper
for detecting ranking fraud for new Apps.

First give a general system for directing


Supervised
Rank
Aggregation.
We
demonstrate that we can characterize directed
learning techniques relating to the current
unsupervised strategies, for example, Board
Count and Markov Chain based routines by
abusing the system. At that point we
predominantly research the administered
forms of Markov Chain based techniques in
this paper, in light of the fact that past work
demonstrates that their unsupervised partners
are unrivaled. Things being what they are
turns out, on the other hand, that the
streamlining issues for the Markov Chain
based routines are hard, in light of the fact
that they are not curved improvement issues.
We have the capacity to add to a system the
enhancement of one Markov Chain based
technique,
called
Supervised
MC2.Specifically, we demonstrate that we
can change the advancement issue into that of
Semi positive Programming.
III.IMPLEMENTATION
3.1 Identifying Leading Sessions Ranking
fraud usually happens in leading sessions.
Therefore, detecting ranking fraud of mobile

ISSN :2394-2231

Apps is actually to detect ranking fraud


within leading sessions of mobile Apps.
Specifically, we first propose a simple yet
effective algorithm to identify the leading
sessions of each App based on its historical
ranking records. Then, with the analysis of
Apps ranking behaviors, we find that the
fraudulent Apps often have different ranking
patterns in each leading session compared
with normal Apps.
3.1.1.Mining Leading Sessions: There are
two main steps for mining leading sessions.
First, we need to discover leading events
from the Apps historical, ranking records.
Second, we need to merge adjacent leading
events for constructing leading sessions.
3.2 Ranking Based Evidences
A leading session is composed of several
leading events. Therefore, we should first
analyze the basic characteristics of leading
events for extracting fraud evidences. By
analyzing the Apps historical ranking
records, we observe that Apps ranking
behaviors in a leading event always satisfy a
specific ranking pattern, which consists of
three different ranking phases, namely, rising
phase, maintaining phase and recession
phase. Specifically, in each leading event, an
Apps ranking first increases to a peak
position in the leader board, then keeps such
peak position for a period, and finally
decreases till the end of the event.
To begin with this positioning or ranking
misrepresentation does not generally happen in
the entire part of life cycle of an App in the
market, so we have to recognize the time when
extortion happens. Such test can be viewed as
recognizing the neighborhood irregularity rather
than global irregularity of mobile Apps. Second,
because of the huge number of portable Apps, it
is hard to physically mark positioning misuse
for each App, so it is mandatory to have an
adaptable approach to subsequently recognize
positioning distortion without utilizing any
standard data. At long last, because of the
dynamic way of framework rankings, it is
difficult to differentiate and affirm the
verifications
connected
to
positioning
misrepresentation, which rouses us to find some
supportable extortion examples of portable
Apps as proofs. Surely, our watchful
observation uncovers that mobile Apps are not
generally placed high in the leaderboard, but
rather just in some driving occasions, which
shape distinguishing driving sessions. As such,
positioning extortion more often happens than
not happens in these driving sessions.

IV. CONCLUSIONS

http://www.ijctjournal.org

Page 28

International Journal of Computer Techniques - Volume 3 Issue 4, July - Aug 2016

We developed a ranking fraud detection


system for mobile Apps. Specifically, we first
showed that ranking fraud happened in
leading sessions and provided a method for
mining leading sessions for each App from its
historical ranking records. This paper
introduces more effective fraud evidences
and analyze the latent relationship among
rating, review and rankings. We extended our
ranking fraud detection approach with other
mobile app related services, such as mobile
app recommendation for enhancing user
experience. Later on, we plan to focus more
viable misrepresentation confirms and
separate the idle link among rating, survey
and rankings. In addition, we will strengthen
our positioning misrepresentation location
approach with other portable App related
administrations, for example, mobile Apps
idea, for enlightening client experience.
V. REFERENCES
[1] Discovery of Ranking fraud for mobile
apps. Hengshu Zhu,Hui Xiong,Senior
members,IEEE,Yong
Ge,and
Enhong
Chen,Senior member,IEEE,IEEE transactions
on knowledge and data engineering,vol
.27,No.1,January 2015.

[8]. A. Klementiev, D. Roth, and K.


Small.An unsupervised learning algorithm for
rank aggregation. In Proceedings of the 18th
European conference on Machine Learning,
ECML '07, pages 616{623, 2007.
[9] A. Klementiev, D. Roth, and K.
Small.Unsupervised rank aggregation with
distance-based models. In Proceedings of the
25th international conference on Machine
learning, ICML '08, pages 472{479, 2008.

[10]. E.-P. Lim, V.-A.Nguyen, N. Jindal, B.


Liu, and H. W. Lauw.Detecting product
review spammers using rating behaviors. In
Proceedings of the 19th ACM international
conference on Information and knowledge
management, CIKM '10, pages 939{948,
2010.
[11]. A. Ntoulas, M. Najork, M. Manasse,
and D. Fetterly.Detecting spam web pages
through content analysis. In Proceedings of
the 15th international conference on World
Wide Web, WWW '06, pages 83,92, 2006.

[2] Detecting product review spammers using


rating behaviors. E.-P. Lim, V.-A. Nguyen,
N. Jindal, B. Liu, and H. W. Lauw. In
Proceedings of the 19th ACM international
conference on Information and knowledge
management.
[3] Y. Ge, H. Xiong, C. Liu, and Z.-H. Zhou,
A taxi driving fraud detection system, in
Proc. IEEE 11th Int. Conf. Data Mining,
2011, pp. 181190.
[4] D. F. Gleich and L.-h. Lim, Rank
aggregation via nuclear norm minimization,
in Proc. 17th ACM SIGKDD Int. Conf.
Knowl. Discovery Data Mining, 2011, pp.
6068.
[5] T. L. Griffiths and M. Steyvers, Finding
scientific topics, Proc. Nat. Acad. Sci. USA,
vol. 101, pp. 52285235, 2004.
[6] D. F. Gleich and L.-h. Lim. Rank
aggregation via nuclear norm minimization.
In Proceedings of the 17th ACM SIGKDD
international conference on Knowledge
discovery and data mining, KDD '11, pages
60{68, 2011.
[7]. J. Kivinen and M. K. Warmuth.Additive
versus exponentiated gradient updates for
linear prediction. In Proceedings of the
twenty-seventh annual ACM symposium on
Theory of computing, STOC '95, pages
209{218, 1995.

ISSN :2394-2231

http://www.ijctjournal.org

Page 29

You might also like