Stateless Puzzles for Real Time Online Fraud Preemption

Preprint English OPEN
Rahman, Mizanur; Recabarren, Ruben; Carbunar, Bogdan; Lee, Dongwon;
(2017)
  • Related identifiers: doi: 10.1145/3091478.3091507
  • Subject: Computer Science - Social and Information Networks | Computer Science - Cryptography and Security

The profitability of fraud in online systems such as app markets and social networks marks the failure of existing defense mechanisms. In this paper, we propose FraudSys, a real-time fraud preemption approach that imposes Bitcoin-inspired computational puzzles on the de... View more
  • References (26)
    26 references, page 1 of 3

    25000 50−60 3 4 www.youtube.com/watch?v=5Od2SuL2igA, 2013.

    [2] L. Akoglu, H. Tong, and D. Koutra. Graph based anomaly detection and description: a survey. Data Mining and Knowledge Discovery, 29(3):626-688, 2015.

    [3] M. Anderson and J. Magruder. Learning from the crowd: Regression discontinuity estimates of the e ects of an online review database. Economic Journal, 122(563), 2012.

    [4] AppReviews. http://www.app-reviews.org, 2016.

    [5] AppSuch. http://www.appsuch.com, 2016.

    [6] AppsViral. http://www.appsviral.com/, 2016.

    [7] Apptamin. Optimize Your Google Play Store App Details Page. http://www.apptamin.com/blog/optimize-play-store-app/, 2016.

    [8] P. R. Badri Satya, K. Lee, D. Lee, T. Tran, and J. J. Zhang. Uncovering fake likers in online social networks. In Proceedings of the ACM CIKM, 2016.

    [9] M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proceedings of CRYPTO, 1996.

    [10] D. J. Bernstein. Syn cookies, 1996.

  • Metrics
    No metrics available