Characterizing Large-Scale Click Fraud in ZeroAccess
- Paul Pearce ,
- Vacha Dave ,
- Chris Grier ,
- Kirill Levchenko ,
- Saikat Guha ,
- Damon McCoy ,
- Vern Paxson ,
- Stefan Savage ,
- Geoffrey M. Voelker
Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS) |
Published by ACM - Association for Computing Machinery
Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem’s complex structure to obfuscate the flow of money to its perpetrators. In this work, we illuminate the intricate nature of this activity through the lens of ZeroAccess—one of the largest click fraud botnets in operation. Using a broad range of data sources, including peer-to-peer measurements, command-and-control telemetry, and contemporaneous click data from one of the top ad networks, we construct a view into the scale and complexity of modern click fraud operations. By leveraging the dynamics associated with Microsoft’s attempted takedown of ZeroAccess in December 2013, we employ this coordinated view to identify “ad units” whose traffic (and hence revenue) primarily derived from ZeroAccess. While it proves highly challenging to extrapolate from our direct observations to a truly global view, by anchoring our analysis in the data for these ad units we estimate that the botnet’s fraudulent activities plausibly induced advertising losses on the order of $100,000 per day
© ACM. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version can be found at http://dl.acm.org.
Characterizing Large-Scale Click Fraud in ZeroAccess
Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem’s complex structure to obfuscate the flow of money to its perpetrators. The intricate nature of this activity could be well understood through the lens of ZeroAccess—one of the largest click fraud botnets in operation. Using a broad range of data sources, including peer-to-peer measurements, command-and-control telemetry, and contemporaneous click data from one of the top ad networks, we construct a view into the scale and complexity of modern click fraud operations. While it proves highly challenging to extrapolate from our direct observations to a truly global view, by anchoring our analysis in the data for these ad units we estimate…