Normal CTIT (Legitimate Traffic)
Sharp peak within the first 10-60 minutes, followed by natural exponential decay. Most installs within 24 hours. Represents genuine user interest and real download behaviour.
Fraud Type Guide
CTIT analysis is one of the most powerful tools for detecting mobile attribution fraud. Learn how click-to-install time patterns expose click injection, click spam, and other manipulation.
CTIT (click-to-install time) is the elapsed time between when a user clicks on a mobile ad and when the corresponding app install is registered by the attribution platform. This seemingly simple metric is one of the most powerful fraud detection signals available to mobile marketers because different types of ad fraud produce distinctly abnormal CTIT patterns.
Legitimate mobile ad traffic produces a characteristic CTIT distribution: a sharp peak in the first few minutes (users who click and immediately install), followed by a natural exponential decay over the next several hours. Most genuine installs occur within the first hour, with a long tail extending to 24-48 hours. This pattern reflects real human decision-making and the time required to download and install an app.
Fraudulent traffic, by contrast, produces CTIT distributions that deviate dramatically from this natural pattern. Click injection creates an unnaturally tight cluster of installs within seconds of the click. Click spam produces a flat, random distribution with no decay curve. Understanding these patterns enables marketers to identify and exclude fraudulent sources with high confidence.
Different fraud techniques produce characteristic CTIT signatures that can be identified through distribution analysis.
Sharp peak within the first 10-60 minutes, followed by natural exponential decay. Most installs within 24 hours. Represents genuine user interest and real download behaviour.
Massive spike of installs within 0-15 seconds of the click. The click was fired after the download started, so completion happens almost immediately. A clear fraud signal.
Installs are distributed evenly across the entire attribution window with no decay pattern. The clicks were random and unrelated to install decisions, producing uniform timing.
Two distinct peaks — one normal and one anomalous — indicate a source mixing legitimate traffic with fraudulent activity to dilute detection signals.
CTIT analysis provides objective, data-driven evidence of fraud that goes beyond simple rule-based detection.
CTIT distributions are based on measurable timing data, not subjective assessments. Statistical analysis of these patterns provides high-confidence fraud identification.
Different fraud types produce different CTIT signatures, enabling you to identify not just that fraud is occurring but exactly what type — informing the right response.
CTIT analysis can be applied at the network, sub-publisher, campaign, and creative level, pinpointing exactly which sources are delivering fraudulent traffic.
By identifying and excluding sources with anomalous CTIT patterns, you redirect budget to legitimate sources that deliver genuine app users.
Opticks builds CTIT distributions for every traffic source in real time, comparing patterns against legitimate baselines and flagging anomalies as they emerge.
CTIT data is combined with 30+ additional fraud signals — device fingerprinting, behavioural analysis, IP reputation — for comprehensive fraud detection that minimises false positives.
Visual CTIT distribution charts and automated alerts make it easy to identify problematic sources and take action before significant budget is wasted.
Keep Exploring
See how Opticks uses CTIT analysis and 30+ fraud signals to protect your mobile campaigns in real time. No code changes required — install via Google Tag Manager in under five minutes.