@inproceedings{pearce2014characterizing, author = {Pearce, Paul and Dave, Vacha and Grier, Chris and Levchenko, Kirill and Guha, Saikat and McCoy, Damon and Paxson, Vern and Savage, Stefan and Voelker, Geoffrey M.}, title = {Characterizing Large-Scale Click Fraud in ZeroAccess}, booktitle = {Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS)}, year = {2014}, month = {November}, abstract = {Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem’s complex structure to obfuscate the flow of money to its perpetrators. In this work, we illuminate the intricate nature of this activity through the lens of ZeroAccess—one of the largest click fraud botnets in operation. Using a broad range of data sources, including peer-to-peer measurements, command-and-control telemetry, and contemporaneous click data from one of the top ad networks, we construct a view into the scale and complexity of modern click fraud operations. By leveraging the dynamics associated with Microsoft’s attempted takedown of ZeroAccess in December 2013, we employ this coordinated view to identify “ad units” whose traffic (and hence revenue) primarily derived from ZeroAccess. While it proves highly challenging to extrapolate from our direct observations to a truly global view, by anchoring our analysis in the data for these ad units we estimate that the botnet’s fraudulent activities plausibly induced advertising losses on the order of $100,000 per day}, publisher = {ACM - Association for Computing Machinery}, url = {http://approjects.co.za/?big=en-us/research/publication/characterizing-large-scale-click-fraud-in-zeroaccess/}, edition = {Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS)}, }