{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T08:34:14Z","timestamp":1758962054888,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T00:00:00Z","timestamp":1581033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Directorate-General for the Fight against Counterfeiting?Italian Patent and Trademark Office"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>Brand search results are poisoned by fake ecommerce websites that infringe on the trademark rights of legitimate holders. In this article, we study how to tackle and measure this problem automatically. We present a pipeline with two machine learning stages that can detect the ecommerce websites present in the list of brand search results and distinguish between legitimate and fake ecommerce websites. For each classification task, we identify and extract suitable learning features and study their relative importance. Through a prototype system termed RI.SI.CO., we show that this approach is feasible, fast, and more accurate than both existing systems for trustworthiness assessment and non-expert humans. We next introduce two complementary metrics for evaluating the counterfeit incidence in brand search results: namely, a chart-based and a single-value measure. They allow us to analyze and compare counterfeit at various levels, including single brands within a specific sector as well as whole sectors. Experimenting with two luxury goods sectors, we report a number of interesting findings about how the main search parameters (e.g., search engine, query type, number of search results seen) affect counterfeiting and how this activity changes with time. On the whole, our research offers new insights and some very practical and useful means of analyzing and measuring counterfeit in brand search results, thus increasing awareness of and knowledge about this phenomenon and enabling targeted anti-counterfeiting actions.<\/jats:p>","DOI":"10.1145\/3378443","type":"journal-article","created":{"date-parts":[[2020,4,4]],"date-time":"2020-04-04T01:01:06Z","timestamp":1585962066000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["An Experimental Study of Automatic Detection and Measurement of Counterfeit in Brand Search Results"],"prefix":"10.1145","volume":"14","author":[{"given":"Claudio","family":"Carpineto","sequence":"first","affiliation":[{"name":"Fondazione Ugo Bordoni, Rome, Italy"}]},{"given":"Giovanni","family":"Romano","sequence":"additional","affiliation":[{"name":"Fondazione Ugo Bordoni, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"volume-title":"MarkMonitor Online Shopping Barometer","year":"2017","key":"e_1_2_1_1_1","unstructured":"Clarivate. 2017. MarkMonitor Online Shopping Barometer 2017 . Retrieved from https:\/\/www.markmonitor.com\/brand-protection-domain-management-resources\/anticounterfeiting-whitepapers-datasheets\/g\/consumer-goods-global-online-survey-barometer-2017. Clarivate. 2017. MarkMonitor Online Shopping Barometer 2017. Retrieved from https:\/\/www.markmonitor.com\/brand-protection-domain-management-resources\/anticounterfeiting-whitepapers-datasheets\/g\/consumer-goods-global-online-survey-barometer-2017."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51963-0_32"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046686"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508434"},{"volume-title":"Proceedings of the 20th International Conference on World Wide Web (WWW\u201911)","author":"Canali D.","key":"e_1_2_1_5_1","unstructured":"D. Canali , M. Cova , G. Vigna , and C. Kruegel . 2011. Prophiler: A fast filter for the large-scale detection of malicious web pages . In Proceedings of the 20th International Conference on World Wide Web (WWW\u201911) . 197--206. D. Canali, M. Cova, G. Vigna, and C. Kruegel. 2011. Prophiler: A fast filter for the large-scale detection of malicious web pages. In Proceedings of the 20th International Conference on World Wide Web (WWW\u201911). 197--206."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994622"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 8th Italian Information Retrieval Workshop (IIR\u201917)","author":"Carpineto Claudio","year":"2017","unstructured":"Claudio Carpineto , Davide Lo Re , and Giovanni Romano . 2017 . Using information retrieval to evaluate trustworthiness assessment of eshops . In Proceedings of the 8th Italian Information Retrieval Workshop (IIR\u201917) . 1--8. Claudio Carpineto, Davide Lo Re, and Giovanni Romano. 2017. Using information retrieval to evaluate trustworthiness assessment of eshops. In Proceedings of the 8th Italian Information Retrieval Workshop (IIR\u201917). 1--8."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106441"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CYBConf.2015.7175954"},{"volume-title":"Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201914)","author":"Der M.","key":"e_1_2_1_10_1","unstructured":"M. Der , L. Saul , S. Savage , and G. M. Voelker . 2014. Knock it off: Profiling the online storefronts of counterfeit merchandise . In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201914) . ACM Press, 1759--1768. M. Der, L. Saul, S. Savage, and G. M. Voelker. 2014. Knock it off: Profiling the online storefronts of counterfeit merchandise. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD\u201914). ACM Press, 1759--1768."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2016.10.002"},{"key":"e_1_2_1_12_1","first-page":"1","article-title":"Optimized combined clustering methods for finding replicated criminal websites","volume":"14","author":"Drew Jake","year":"2014","unstructured":"Jake Drew and Tyler Moore . 2014 . Optimized combined clustering methods for finding replicated criminal websites . EURASIP J. Inf. Sec. 14 , 1 (2014), 1 -- 13 . Jake Drew and Tyler Moore. 2014. Optimized combined clustering methods for finding replicated criminal websites. EURASIP J. Inf. Sec. 14, 1 (2014), 1--13.","journal-title":"EURASIP J. Inf. Sec."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the Security and Privacy in Communication Networks Conference (SecureComm\u201912)","author":"Eshete Birhanu","year":"2012","unstructured":"Birhanu Eshete , Adolfo Villafiorita , and Komminist Weldemariam . 2012 . BINSPECT: Holistic analysis and detection of malicious web pages . In Proceedings of the Security and Privacy in Communication Networks Conference (SecureComm\u201912) . 149--166. Birhanu Eshete, Adolfo Villafiorita, and Komminist Weldemariam. 2012. BINSPECT: Holistic analysis and detection of malicious web pages. In Proceedings of the Security and Privacy in Communication Networks Conference (SecureComm\u201912). 149--166."},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the International Conference on Web Information Systems and Technologies (WEBIST\u201915)","author":"Horch Andrea","year":"2015","unstructured":"Andrea Horch , Holger Kette , and Anette Weisbecker . 2015 . Extracting product offers from e-shop websites . In Proceedings of the International Conference on Web Information Systems and Technologies (WEBIST\u201915) . Springer, 232--251. Andrea Horch, Holger Kette, and Anette Weisbecker. 2015. Extracting product offers from e-shop websites. In Proceedings of the International Conference on Web Information Systems and Technologies (WEBIST\u201915). Springer, 232--251."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 20th USENIX Conference on Security (SEC\u201911)","author":"John John P.","year":"2011","unstructured":"John P. John , Fang Yu , Yinglian Xie , Arvind Krishnamurthy , and Martin Abadi . 2011 . deSEO: Combating search-result poisoning . In Proceedings of the 20th USENIX Conference on Security (SEC\u201911) . 20--20. John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, and Martin Abadi. 2011. deSEO: Combating search-result poisoning. In Proceedings of the 20th USENIX Conference on Security (SEC\u201911). 20--20."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.08.046"},{"volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201914)","author":"Leontiadis N.","key":"e_1_2_1_18_1","unstructured":"N. Leontiadis , T. Moore , and N. Christin . 2014. A nearly four-year longitudinal study of search-engine poisoning . In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201914) . 930--941. N. Leontiadis, T. Moore, and N. Christin. 2014. A nearly four-year longitudinal study of search-engine poisoning. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201914). 930--941."},{"volume-title":"Proceedings of the USENIX Security Conference.","author":"Leontiadis N.","key":"e_1_2_1_19_1","unstructured":"N. Leontiadis , T. Moore , and N. Christin . 2011. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade . In Proceedings of the USENIX Security Conference. N. Leontiadis, T. Moore, and N. Christin. 2011. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In Proceedings of the USENIX Security Conference."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883008"},{"volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1245--1254","author":"Ma Justin","key":"e_1_2_1_21_1","unstructured":"Justin Ma , Lawrence K. Saul , Stefan Savage , and Geoffrey M. Voelker . 2009. Beyond blacklists: Learning to detect malicious web sites from suspicious URLs . In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1245--1254 . Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. 2009. Beyond blacklists: Learning to detect malicious web sites from suspicious URLs. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1245--1254."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/14740338.2017.1313227"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"C. D. Manning P. Raghavan and H. Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press.  C. D. Manning P. Raghavan and H. Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_2_1_25_1","unstructured":"NetNames. 2016. The Risks of the Online Counterfeit Economy. A Netname Report.  NetNames. 2016. The Risks of the Online Counterfeit Economy. A Netname Report."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135794"},{"volume-title":"Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact","author":"EUIPO.","key":"e_1_2_1_27_1","unstructured":"OECD\/ EUIPO. 2016. Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact . OECD Publishing , Paris . OECD\/EUIPO. 2016. Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact. OECD Publishing, Paris."},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots\u201907)","author":"Provos Niels","year":"2007","unstructured":"Niels Provos , Dean McNamee , Panayiotis Mavrommatis , Ke Wang , and Nagendra Modadugu . 2007 . The ghost in the browser: Analysis of web-based malware . In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots\u201907) . Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, and Nagendra Modadugu. 2007. The ghost in the browser: Analysis of web-based malware. In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots\u201907)."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1459352.1459357"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2016.0061"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2410795"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2011.03.008"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326561.1326564"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695818"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741658"},{"volume-title":"Tracking How Cybercriminals Compromise Websites to Sell Counterfeit Goods. Master\u2019s thesis. Bobby B. Lyle School of Engineering: Department of Computer Science","author":"Wadleigh John R.","key":"e_1_2_1_36_1","unstructured":"John R. Wadleigh . 2015. Tracking How Cybercriminals Compromise Websites to Sell Counterfeit Goods. Master\u2019s thesis. Bobby B. Lyle School of Engineering: Department of Computer Science , Southern Methodist University , Texas. John R. Wadleigh. 2015. Tracking How Cybercriminals Compromise Websites to Sell Counterfeit Goods. Master\u2019s thesis. Bobby B. Lyle School of Engineering: Department of Computer Science, Southern Methodist University, Texas."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the International Conference on Security and Cryptography (SECRYPT\u201910)","author":"Wang A.","year":"2010","unstructured":"A. Wang . 2010 . Don\u2019t follow me: Spam detection in Twitter . In Proceedings of the International Conference on Security and Cryptography (SECRYPT\u201910) . IEEE, 1--10. A. Wang. 2010. Don\u2019t follow me: Spam detection in Twitter. In Proceedings of the International Conference on Security and Cryptography (SECRYPT\u201910). IEEE, 1--10."},{"volume-title":"Proceedings of the Conference on Internet Measurement. ACM Press, 359--372","author":"Wang D. Y.","key":"e_1_2_1_38_1","unstructured":"D. Y. Wang , M. Der , M. Karami , L. Saul , D. McCoy , S. Savage , and G. M. Voelker . 2014. Search + seizure: The effectiveness of interventions on SEO campaigns . In Proceedings of the Conference on Internet Measurement. ACM Press, 359--372 . D. Y. Wang, M. Der, M. Karami, L. Saul, D. McCoy, S. Savage, and G. M. Voelker. 2014. Search + seizure: The effectiveness of interventions on SEO campaigns. In Proceedings of the Conference on Internet Measurement. ACM Press, 359--372."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1441"},{"key":"e_1_2_1_40_1","unstructured":"Chih-Wei Hsu Chih-Chung Chang and Chih-Jen Lin. 2010. A practical guide to support vector classification.  Chih-Wei Hsu Chih-Chung Chang and Chih-Jen Lin. 2010. A practical guide to support vector classification."},{"volume-title":"Proceedings of the Special Interest Tracks and Posters of the 14th International Conference on World Wide Web (WWW\u201905)","author":"Wu Baoning","key":"e_1_2_1_41_1","unstructured":"Baoning Wu and Brian D. Davison . 2005. Identifying link farm spam pages . In Proceedings of the Special Interest Tracks and Posters of the 14th International Conference on World Wide Web (WWW\u201905) . ACM Press, 820--829. Baoning Wu and Brian D. Davison. 2005. Identifying link farm spam pages. In Proceedings of the Special Interest Tracks and Posters of the 14th International Conference on World Wide Web (WWW\u201905). ACM Press, 820--829."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,7]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5,31]]}},"alternative-id":["10.1145\/3378443"],"URL":"https:\/\/doi.org\/10.1145\/3378443","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2020,2,7]]},"assertion":[{"value":"2018-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}