SlideShare una empresa de Scribd logo
1 de 12
Traffic Fraud: Best Practices for
Reducing Risk to Exposure
Released December 5, 2013

© 2013 Interactive Advertising Bureau

1

Traffic Fraud Best Practices Dec 5, 2013
This document was developed by the IAB Traffic of Good Intent Task Force
The IAB Best Practices on Traffic Fraud was developed by a task force of volunteers from 41
IAB member companies and other key contributing companies.
The co-chairs for the TOGI task force are:
•
•

John Batelle, CEO, Federated Media
Tom Phillips, CEO, Dstillery

The following participants are part of the TOGI education subgroup and contributed to the
development of this document:
•
•
•
•
•
•

David Hahn, Senior VP Product Management, Integral Ad Science
Teg Grenager, VP Products, Adap.tv
Russ Schafer, VP Product Marketing, Adap.tv
Walter Knapp, COO, Federated Media
Michael JJ. Tiffany, CEO, White Ops
Preethy Vaidyanathan, Sr. Product Director, AppNexus

The following IAB member companies also contributed to this document:
About, Inc.
Accuen Media
AccuWeather.com
Adap.tv
Advertising.com
AOL & ADTECH
AppNexus, Inc.
Brightroll
Condé Nast
CPX Interactive
Datalogix
DataXu
Digilant
DoubleVerify

Dstillery
Evidon
Federated Media
Publishing
Forbes.com
Google & YouTube
Huddler
Integral Ad Science
Intel
Iponweb
Kelloggs
Krux Digital
Luma Partners
Magnetic

MediaOcean
Microsoft
OpenX
Pubmatic
Radium One
Rocket Fuel Inc.
Rubicon Project
Specific Media
Spider.io
Tremor Video
VivaKi
White Ops
Xaxis
Yahoo!

The IAB lead on this initiative was Steve Sullivan
Contact adtechnology@iab.net to comment on this document. Please be sure to include the
release date found on the bottom right corner on this page. This document is on the IAB
website at: http://iab.net/trafficofgoodintent

ABOUT THE IAB TRAFFIC OF GOOD INTENT TASK FORCE
The Traffic of Good Intent (TOGI) task force’s mission is to identify, understand and raise
awareness of the issue of non-intentional traffic, and to offer insight and recommended
solutions to the digital advertising industry.

© 2013 Interactive Advertising Bureau

2

Traffic Fraud Best Practices Dec 5, 2013
Table of Contents
Executive Summary ....................................................... 4
Overview ...................................................................... 4
How traffic bots infect legitimate systems .................................................................... 4
How traffic bots generate false traffic ......................................................................... 5
How traffic fraudsters get paid .................................................................................... 5
Why you should care .................................................................................................. 5

What You Can Do .......................................................... 6
Best Practices for Buyers ................................................ 6
Set goals ..................................................................................................................... 6
Manage the relationship ............................................................................................. 7
Measure results ........................................................................................................... 7
Address traffic fraud ................................................................................................... 7
Questions to ask publishers ......................................................................................... 7

Best Practices for Publishers ........................................... 9
Questions to ask inventory sources ............................................................................. 9

Best Practices for Networks ..........................................10
Take notice ................................................................................................................ 10
Make a stand ............................................................................................................ 11
Address the bad actors ............................................................................................. 12

Closing .........................................................................12

© 2013 Interactive Advertising Bureau

3

Traffic Fraud Best Practices Dec 5, 2013
Executive Summary
Advertisers expect that all online content is delivered to human audiences. But an alarming
portion of digital advertising is being diverted by nefarious entities that exploit the ecosystem to
deliver fraudulent traffic.
The potential for fraud exists anywhere that media spending is significant and performance
metrics are ambiguous or easily gamed. Online advertising is particularly vulnerable.
Nefarious groups have found ways to profit from infiltrating legitimate systems and generating
false ad views, ad clicks and site visits using robotic programs.
Robotic traffic -- known popularly as “bots” -- is driven by code and not humans. These bots are
often smart enough to mimic human behavior, and they can be difficult to detect. While more
sophisticated bots can simulate conversions such as clicking through to sites, they don’t
generate real conversions by buying goods and services, and they certainly don’t engage with
brands. Activity generated by these bots waters down engagement metrics driven by human
traffic, which dilutes the value of legitimate publisher inventory. Advertisers end up spending
campaign dollars on specious ad impressions never seen by humans.
Traffic fraud takes an organized effort to generate “results” that fool both buyers and sellers.
The fraudsters are not just gaming the system; they are often engaging in other organized
criminal activity. Ignoring traffic fraud enriches those engaged in such activities. Identifying
traffic fraud and destroying the economics that drive this nefarious activity is imperative to
restoring trust in the industry.
This document outlines steps that can be taken by individual businesses in the digital
advertising marketplace to address traffic fraud within their organizations. Both the buy-side
and sell-side need to play a role in defending against traffic fraud and improving the digital
ecosystem.

Overview
Traffic fraud is not always easy to detect. Knowing how the bad actors operate can help
reduce your risk of being victimized by them.

How traffic bots infect legitimate systems
Fraudsters often operate undetected in legitimate systems by masquerading as ordinary
content and tools typically implemented by unwitting consumers.
Some of the ways they infiltrate systems:
•
•
•
•
•

Getting consumers to install toolbars in their browsers.
Simulating applications such as games or video players in an alternate browser.
Bundling hidden applications with consumer downloads.
Inserting code snippets, undetected, on publisher sites.
Using malicious code to exploit operating systems and browser security vulnerabilities
to surreptitiously install fraudulent traffic-generating code.

© 2013 Interactive Advertising Bureau

4

Traffic Fraud Best Practices Dec 5, 2013
•

Using real web pages as fronts for fake businesses so they can join networks and
exchanges.

How traffic bots generate false traffic
After infiltrating legitimate systems, fraudsters can use bot code in different ways to generate
false traffic. They often operate just under the surface or when human users aren’t present to
detect foul play.
Some of the ways bot code generates false traffic:
•
•
•
•

Generating ad views while consumers browse unaware.
Hijacking user controls to generate fake clicks when the computer is dormant.
Running invisible processes behind the scenes to simulate consumer activity.
Compromising cookie data to simulate high-value consumers.

How traffic fraudsters get paid
Fraudster business models vary, but a common theme tends to be their high profit margins.
Even though fraudulent traffic accounts for only a small percentage of real human traffic, that
small percentage generates disproportionate ad inventory and a significant diversion of digital
marketing budgets. Premium publishers are often themselves buyers of traffic. If they buy from
traffic vendors that are bot-riddled, the bots end up on the premium sites, inflating their
impression volume.
Some of the ways fraudsters get paid:
•
•
•
•
•

Selling cheap traffic to publishers wishing to extend their inventory.
Selling their own robotic inventory to buyers through an exchange that is unaware of
the traffic source.
Becoming part of a legitimate network that pools inventory for buyers. The legitimate
network is often unaware of any foul play.
Creating a network by infecting legitimate sites with bot code, known as a “botnet,”
that generates traffic for which they can bill.
Making ad calls that serve ads one behind another (stacked) or into 1x1 pixel frames,
creating hidden ad inventory that generates false impressions from both human and
non-human traffic.

Fraudsters contaminate legitimate businesses. For example, purchasing traffic is a generally
acceptable way for publishers to extend audience and increase inventory. Fraudulent
businesses use business practices like helping publishers boost traffic to pollute their available
inventory and undermine their relationship of trust with advertisers.

Why you should care
Allowing the bad actors in our industry to profit from traffic fraud affects the entire online
community. In addition to diluting inventory value and diverting funds from legitimate
businesses, traffic fraud undermines the integrity of digital media.

© 2013 Interactive Advertising Bureau

5

Traffic Fraud Best Practices Dec 5, 2013
Some of the negative impacts of traffic fraud:
•
•
•
•
•
•

Brands waste money on ad campaigns that are served to invisible inventory.
Digital media is degraded, and brands look elsewhere for their marketing solutions.
Ad performance and website visit data are contaminated, undermining analysis.
Artificial fraudulent inventory floods the market and decreases the value of legitimate
(real human) inventory.
Criminal activity is enabled.
The industry may be subjected to government oversight, negative press and potentially
business-dampening enforcement.

What You Can Do
The solutions to traffic fraud are not always intuitive. For example, the outright blocking of
fraudulent traffic gives information to the fraudsters that helps them blend in better and become
more difficult to identify.
In addition to the following general guidelines, steps specific to buyers, publishers and
networks are outlined in subsequent sections.
The following general guidelines can help any online business get started:
•
•
•

•
•
•

Educate yourself about traffic fraud and the risks that it poses to your business.
Adopt policies and strategies to identify fraud and mitigate its impact.
If you are an advertiser, set clear objectives for your media campaigns that focus on
the measurement of real ROI, which is difficult for fraudsters to falsify. Measures such
as click-through rate, completion rate, and last-touch attribution are easy to game.
Practice safe sourcing and trust only business partners who have earned trust.
Implement technology to detect and prevent fraud.
Filter traffic through vendors who prioritize fraud detection.

Best Practices for Buyers
Buyers in online media have much to lose when it comes to traffic fraud. Taking steps to inspect
the quality of your buys can go a long way toward preventing fraud in the digital marketplace.
The following recommendations should help you achieve quality media buys by identifying
and eliminating traffic fraud.

Set goals
Setting goals before buying media is a generally good practice. Some specific
recommendations for buying digital media:
•
•

List specific objectives for your media campaign. Don’t leave objectives broad and
open to interpretation. Examine whether your goals accommodate fraud.
Be willing to pay the real price for the media you want. For example, pre-roll video
targeted to a specific real human audience with good attention will cost more than
linear video ads placed at random simply to increase views.

© 2013 Interactive Advertising Bureau

6

Traffic Fraud Best Practices Dec 5, 2013
•
•

Document your goals clearly and get the seller to sign off on those goals. Agree to
pay for only results that align with what’s documented.
Don’t optimize for cost alone. Results that seem too good to be true probably are.

Manage the relationship
Trustworthy sellers shouldn’t have any trouble backing up their claims for quality media. Keep
in mind the following points to help you manage the relationship with your sellers:
•
•

Filter media sellers before you buy. Even after the campaign is running, ensure that
your sellers are following through.
Despite the best efforts of sellers, some fraud cannot be eliminated. Determine the risk
you are willing to accept and use that model to discount your media.

Measure results
Since bots can’t engage the way humans can, consider measuring campaign results using
more sophisticated metrics that ensure humans are interacting with your ads.
The following measures indicate human interaction:
•
•
•
•
•

Purchases
Subscriptions
Verifiable brand survey results
Validated panels
Other verifiable engagements

Measures that are easy for bots to fake:
•
•
•
•
•

Ad views
Clicks
Click-through rate
Video completes
Cookie attribution

Address traffic fraud
Your internal operations can only go so far to filter out traffic fraud. Look to vendors who
specialize in detecting and reducing the more sophisticated cases of traffic fraud.
•

License technology explicitly to discern traffic sources. Brand safety, viewability and
placement quality are all fine measures of inventory quality, but none captures the
presence of non-human traffic.

Questions to ask publishers
As you filter for publishers that offer quality traffic, asking questions about how they manage
quality control can help you find a good fit for your campaign. The following questions and
preferred responses can help you get started finding quality sellers:

© 2013 Interactive Advertising Bureau

7

Traffic Fraud Best Practices Dec 5, 2013
Do you have your audience measured by verifiable 3rd party
systems?
The publisher should have their audience measured by independent vendors so that
you can measure the traffic generated for your ads against an independent benchmark,
making anomalies easier to spot. Note, however, that some audience measurement
vendors’ techniques can be easily fooled by fraudulent traffic. Review vendor
methodologies when shopping for a vendor you can trust.
Do you have a clean record with third-party brand safety reports?
Bad site quality is not necessarily correlated with traffic fraud, and high quality sites
are not immune to traffic fraud. So screening sites for brand safety is an extra measure
that helps ensure sites are involved in efforts to reduce fraud. Along with first-party
data, sites should be screened against third-party reports to remove fraudulent and
inappropriate environments. There are many different types of brand safety detection
and prevention. Investigating third-party methodologies can help you make an
informed decision.
How do you determine which impressions are exposed to real
humans?
Advertisers want to engage with viewers who are engaged with content, not with users
who may have left a web page open accidentally. Each site should have a policy and
technical methodology to determine which traffic is generated by real humans. The site
methodology should cover how they determine suspect fraudulent traffic, and then flag,
investigate and remove it.
How do you assure that ads are served as reported, and that URLs
are visible to the advertiser?
Ad opportunities on publisher sites should correspond with the site URL that is reported
by first- and/or third party campaign performance analytics.
How do you determine whether ads are auto-initiated or userinitiated?
In video, auto-initiated ads are more susceptible to fraud. Publishers may increase their
fulfillment numbers by using autoplay ads when an advertiser specifies they want only
user-initiated ads. Publishers need to match the ad interaction requested with the ad
interaction fulfilled, and report anomalies.
Do you provide protection from malware?
Websites should provide a safe environment for advertisers and consumers by actively
screening for malware. Each publisher should be able to provide information on
established approaches.
Are impressions generated by malware redirecting to a site?
Unusually large volumes of traffic and poorly performing placements should be
investigated for malicious virus activity. Sites should monitor traffic patterns in real time
to recognize anomalies resulting from malware.

© 2013 Interactive Advertising Bureau

8

Traffic Fraud Best Practices Dec 5, 2013
Best Practices for Publishers
Buying traffic increases the risk profile for a premium publisher. If you want to minimize your
risk, don’t buy traffic from non-organic sources. Even without buying traffic from non-organic
sources, you may have some non-human traffic on your media properties, sent there without
your control. For example, consumers who install browser tools or applications may
inadvertently open the gate to robotic traffic. In addition, bots may be programmed to browse
legitimate sites to build up their targeting cookie pool while avoiding detection.
Despite your best efforts, you may find the need to extend your audience and increase your
inventory. For example, if you’ve committed to delivering more ad impressions than are
currently available on your media properties, your choice is to either under-deliver for your
advertiser or supplement your inventory with purchased traffic.
Our recommendation is to avoid purchasing traffic, which puts your long-term success at risk
for short-term profits. But if you must increase inventory, the following guidelines can help
mitigate your risk:
•
•
•
•
•

As a premium publisher purchasing traffic, pay the higher price to buy quality.
Look for a natural affinity between your content and the purchased audience.
Use technology to detect non-human traffic on all of the traffic you are buying.
Don’t lower your standards when performance slips below your goals.
Know your consultants, and where they are sourcing traffic.

Questions to ask inventory sources
When you purchase traffic, you put yourself in the buyers’ shoes. The following questions are
nearly identical to the questions that buyers should ask of publishers. Use the following
questions to filter traffic sources that promise to help you increase inventory:
Do you have your audience measured by verifiable 3rd party
systems?
The publisher should have their audience measured by independent vendors so that
you can measure the traffic generated for your ads against an independent benchmark,
making anomalies easier to spot. Note, however, that some audience measurement
vendors’ techniques can be easily fooled by fraudulent traffic. Review vendor
methodologies when shopping for a vendor you can trust.
Do you have a clean record with third-party brand safety reports?
In video, auto-initiated video ads are more susceptible to fraud. Publishers may
increase their fulfillment numbers by using autoplay ads when an advertiser specifies
they only want user-initiated ads. Publishers need to match the ad interaction requested
with the ad interaction fulfilled and report anomalies.

© 2013 Interactive Advertising Bureau

9

Traffic Fraud Best Practices Dec 5, 2013
How do you determine which impressions are exposed to real
humans?
Advertisers want to engage with viewers who are engaged with content, not with users
who may have left a web page open accidentally. Each site should have a policy and
technical methodology to determine which traffic is generated by real humans. The site
methodology should cover how they determine suspect fraudulent traffic, and then flag,
investigate and remove it.
How do you assure that ads are served as reported, and that URLs
are visible to the advertiser?
Ad opportunities on traffic-sourced sites should correspond with the site URL that is
reported by first- and/or third party campaign performance analytics.
How do you determine whether ads are auto-initiated or userinitiated?
Autoplay ads are more susceptible to traffic fraud and may be used despite specific
requests for only user-initiated ads. Sourced traffic should match the ad interaction
requested with the ad interaction fulfilled, and report any anomalies.
Do you provide protection from malware?
Websites should provide a safe environment for advertisers and consumers by actively
screening for malware. Each traffic source should be able to provide information on
their approach.
Are impressions generated by malware redirecting to a site?
Unusually large volumes of traffic and poorly performing placements should be
investigated for malicious virus activity. Sites should monitor traffic patterns in real time
to recognize anomalies recognize anomalies resulting from malware.

Best Practices for Networks
Networks can engage in some key efforts to combat non-human traffic. Differentiate yourself in
the marketplace by embracing the practices listed here.

Take notice
Botnet operators work hard to function under the radar. Malicious players shy away from the
light. Your best defense is to look for the telltale characteristics of bad actors.

© 2013 Interactive Advertising Bureau

10

Traffic Fraud Best Practices Dec 5, 2013
General red flags:
1. Publisher has no prior history of substantial traffic
When a publisher comes to you with traffic built overnight, you can bet it didn't come
from hard work and legitimate content.
2. High audience overlap between disparate websites
A handful of common visitors to sports sites and sites on the joys of growing flowers is
certainly plausible. However, when a large proportion of the audience for either of
these sites visits the other site, you don't have to worry if it's something in the water.
There's just something fishy going on.
3. Browser stats that are inconsistent with known industry usage stats
Any publisher touting a billion unique visitors probably does NOT have the attention of
one-seventh of the world’s population.
4. Publisher seeks out representation
Publishers who have earned their traffic get noticed and don't need to ask for
representation.
5. More than four tags on a page
The more ad tags on a page, the lower the quality of the page. While low quality may
mean more traffic fraud, keep in mind that more sophisticated fraudsters will flock to
higher quality pages to remain undetected.
Red flags in RTB environments:
1. "No Bid" reason flag and other automated indicators
The no bid reason flag in OpenRTB 2.2 is an optional flag a bidder can use to tell the
exchange that they are not bidding on the inventory because they believe it to be nonintentional. Both exchanges and bidders are encouraged to create and implement nonintentional traffic detection algorithms.
2. Negatively target traffic fraud
Consider using anti-fraud tools in RTB to exclude any bid requests with a high
probability for fraud.

Make a stand
Bad actors will take the road of least resistance. Building collaborative relationships in the
industry builds a wall of resistance that turns bad actors away.
1. Partnerships for rapid and free information sharing
Collaborative relationships with other supply chain partners, such as exchanges and
DSPs, will enable an open channel of communication about bad traffic. Sharing
information openly and quickly builds a defense against bad actors.
2. Vendors that offer fraud and malware detection
Your internal efforts to fight unintentional traffic are the right start. But the more
successful you are, the more you'll need help to address sophisticated botnet operators.
Certain companies have made fighting fraud and malware the core of their business.
Integration with one of these companies sets up a security gate through which you can
run all new traffic before selling it.

© 2013 Interactive Advertising Bureau

11

Traffic Fraud Best Practices Dec 5, 2013
Address the bad actors
Taking steps to identify and defend against bad actors goes a long way to improving the value
of your network. However, their persistence and changing tactics are designed to poke holes
in your efforts. Some ways to combat the bad actors once identified are:
1. Sales disincentive
Your sales teams have the best intentions, but they can unwittingly bring in bad traffic
sources. Build in a sales disincentive when that happens, so that sales can focus on
finding the higher-grade human traffic.
2. Block suspicious ads
All known traffic fraud should be blocked as soon as it’s detected. Suspicious traffic
should be monitored, and blocked as soon as it is confirmed to be from a fraudulent
source. Many advertisers insist that fraudulent traffic be blocked and refuse to pay for
any known traffic fraud.
3. Block payment for fraud
Blocking known traffic fraud subsequently blocks payment to bad actors. When
suspicious traffic isn’t immediately blocked, fraudsters may demand payment for the
impressions that were served. Resist their demands, as fraudsters most likely will back
down if asked to prove that their traffic is valid.

Closing
For all the well-intentioned industry members who read this guide and adopt its practices, there
are fraudsters out there who are also reading this document to discover ways to work around
your efforts to thwart them. We have purposely avoided describing detailed strategies here
that can help the perpetrators achieve their nefarious ends.
Whatever practices you adopt, you must remain diligent and continue to seek out the expertise
to defeat the bad actors that are intent on hijacking the system and robbing legitimate
businesses.

© 2013 Interactive Advertising Bureau

12

Traffic Fraud Best Practices Dec 5, 2013

Más contenido relacionado

La actualidad más candente

2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANAWhite Ops
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityDistil Networks
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS Newsboorishvictim1493
 
Revenue sources-for-copyright-infringing-sites-in-eu-march-2015
Revenue sources-for-copyright-infringing-sites-in-eu-march-2015Revenue sources-for-copyright-infringing-sites-in-eu-march-2015
Revenue sources-for-copyright-infringing-sites-in-eu-march-2015Raffaella Natale
 
comScore MIXX 3MS_OWest May15
comScore MIXX 3MS_OWest May15comScore MIXX 3MS_OWest May15
comScore MIXX 3MS_OWest May15Owen West
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks
 
Price taf of_anonymous_buyer
Price taf of_anonymous_buyerPrice taf of_anonymous_buyer
Price taf of_anonymous_buyerkhibinite
 

La actualidad más candente (20)

Q1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMMQ1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMM
 
2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
 
Digital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fouDigital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fou
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS News
 
Digital ad fraud impact on class action notice industry
Digital ad fraud impact on class action notice industryDigital ad fraud impact on class action notice industry
Digital ad fraud impact on class action notice industry
 
Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...
Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...
Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...
 
4As Digital Ad Fraud Webinar October 2014
4As Digital Ad Fraud Webinar October 20144As Digital Ad Fraud Webinar October 2014
4As Digital Ad Fraud Webinar October 2014
 
FouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked inFouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked in
 
History and Impact of Digital Ad Fraud
History and Impact of Digital Ad FraudHistory and Impact of Digital Ad Fraud
History and Impact of Digital Ad Fraud
 
Still nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fouStill nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fou
 
How to Use FouAnalytics For Marketers
How to Use FouAnalytics   For MarketersHow to Use FouAnalytics   For Marketers
How to Use FouAnalytics For Marketers
 
Revenue sources-for-copyright-infringing-sites-in-eu-march-2015
Revenue sources-for-copyright-infringing-sites-in-eu-march-2015Revenue sources-for-copyright-infringing-sites-in-eu-march-2015
Revenue sources-for-copyright-infringing-sites-in-eu-march-2015
 
comScore MIXX 3MS_OWest May15
comScore MIXX 3MS_OWest May15comScore MIXX 3MS_OWest May15
comScore MIXX 3MS_OWest May15
 
Botnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacksBotnets used for ad fraud spam ddos attacks
Botnets used for ad fraud spam ddos attacks
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
What CFEs can do about digital ad fraud
What CFEs can do about digital ad fraudWhat CFEs can do about digital ad fraud
What CFEs can do about digital ad fraud
 
Price taf of_anonymous_buyer
Price taf of_anonymous_buyerPrice taf of_anonymous_buyer
Price taf of_anonymous_buyer
 
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad RevenueImpact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
 
Not dirty LITTLE secret but Elephant in the Room
Not dirty LITTLE secret but Elephant in the RoomNot dirty LITTLE secret but Elephant in the Room
Not dirty LITTLE secret but Elephant in the Room
 

Destacado (7)

Iab internet advertising_revenue_report_fy_2013
Iab internet advertising_revenue_report_fy_2013Iab internet advertising_revenue_report_fy_2013
Iab internet advertising_revenue_report_fy_2013
 
MIT PhD Thesis Molecular Self-Assembly of Thin Films of Organic LEDs
MIT PhD Thesis Molecular Self-Assembly of Thin Films of Organic LEDsMIT PhD Thesis Molecular Self-Assembly of Thin Films of Organic LEDs
MIT PhD Thesis Molecular Self-Assembly of Thin Films of Organic LEDs
 
Iab internet advertising revenue report hy2013
Iab internet advertising revenue report hy2013Iab internet advertising revenue report hy2013
Iab internet advertising revenue report hy2013
 
Low-Cost, No-Tech Ways to Fight Fraud vMiMA
Low-Cost, No-Tech Ways to Fight Fraud vMiMALow-Cost, No-Tech Ways to Fight Fraud vMiMA
Low-Cost, No-Tech Ways to Fight Fraud vMiMA
 
Piracy Sites' Ad Fraud Double Whammy by Augustine Fou
Piracy Sites' Ad Fraud Double Whammy by Augustine FouPiracy Sites' Ad Fraud Double Whammy by Augustine Fou
Piracy Sites' Ad Fraud Double Whammy by Augustine Fou
 
Mobile CPI Fraud
Mobile CPI FraudMobile CPI Fraud
Mobile CPI Fraud
 
State of Ad Fraud #RampUp17
State of Ad Fraud #RampUp17State of Ad Fraud #RampUp17
State of Ad Fraud #RampUp17
 

Similar a IAB Best Practices Traffic Fraud Final

Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleShailin Dhar
 
Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015Romain Fonnier
 
A radical solution for broken digital advertising
A radical solution for broken digital advertisingA radical solution for broken digital advertising
A radical solution for broken digital advertisingMando Liussi
 
Tackling ad fraud in 2016
Tackling ad fraud in   2016Tackling ad fraud in   2016
Tackling ad fraud in 20169Media Online
 
How can blockchain increase the trust for digital advertising
How can blockchain increase the trust for digital advertising How can blockchain increase the trust for digital advertising
How can blockchain increase the trust for digital advertising Blockchain Council
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03IABmembership
 
Digital marketing tools online
Digital marketing tools onlineDigital marketing tools online
Digital marketing tools onlineInês Gomes Pinto
 
WTF is Ad Fraud?
 WTF is Ad Fraud? WTF is Ad Fraud?
WTF is Ad Fraud?Digiday
 
Anatomy of a Fraudster
Anatomy of a FraudsterAnatomy of a Fraudster
Anatomy of a Fraudstercbourguignon
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27IABmembership
 
Programmatic Ad Fraud
Programmatic Ad FraudProgrammatic Ad Fraud
Programmatic Ad FraudTed Politidis
 
What is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itWhat is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itAlan King
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats- Mark - Fullbright
 
Ad fraud & Programmatic
Ad fraud & ProgrammaticAd fraud & Programmatic
Ad fraud & ProgrammaticNeeraj Mishra
 
The_Ultimate_Guide_to_Mobile-Programmatic
The_Ultimate_Guide_to_Mobile-ProgrammaticThe_Ultimate_Guide_to_Mobile-Programmatic
The_Ultimate_Guide_to_Mobile-ProgrammaticJongwoo Hwang
 
Evolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on PrivacyEvolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on Privacyijtsrd
 

Similar a IAB Best Practices Traffic Fraud Final (20)

Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification Bubble
 
Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015
 
Independent Objective Reviews of Anti-Fraud Companies by Augustine Fou
Independent Objective Reviews of Anti-Fraud Companies by Augustine FouIndependent Objective Reviews of Anti-Fraud Companies by Augustine Fou
Independent Objective Reviews of Anti-Fraud Companies by Augustine Fou
 
A radical solution for broken digital advertising
A radical solution for broken digital advertisingA radical solution for broken digital advertising
A radical solution for broken digital advertising
 
Tackling ad fraud in 2016
Tackling ad fraud in   2016Tackling ad fraud in   2016
Tackling ad fraud in 2016
 
How can blockchain increase the trust for digital advertising
How can blockchain increase the trust for digital advertising How can blockchain increase the trust for digital advertising
How can blockchain increase the trust for digital advertising
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03
 
Digital marketing tools online
Digital marketing tools onlineDigital marketing tools online
Digital marketing tools online
 
WTF is Ad Fraud?
 WTF is Ad Fraud? WTF is Ad Fraud?
WTF is Ad Fraud?
 
State of Ad Fraud Ad Blocking Q1 2016 Update Augustine Fou
State of Ad Fraud Ad Blocking Q1 2016 Update Augustine FouState of Ad Fraud Ad Blocking Q1 2016 Update Augustine Fou
State of Ad Fraud Ad Blocking Q1 2016 Update Augustine Fou
 
Anatomy of a Fraudster
Anatomy of a FraudsterAnatomy of a Fraudster
Anatomy of a Fraudster
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27
 
Programmatic Ad Fraud
Programmatic Ad FraudProgrammatic Ad Fraud
Programmatic Ad Fraud
 
What is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itWhat is online ad fraud and what does um do about it
What is online ad fraud and what does um do about it
 
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-ThreatsThe Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
The Murky Waters of the Internet: Anatomy of Malvertising and Other e-Threats
 
Ad fraud & Programmatic
Ad fraud & ProgrammaticAd fraud & Programmatic
Ad fraud & Programmatic
 
The_Ultimate_Guide_to_Mobile-Programmatic
The_Ultimate_Guide_to_Mobile-ProgrammaticThe_Ultimate_Guide_to_Mobile-Programmatic
The_Ultimate_Guide_to_Mobile-Programmatic
 
LPA Report_April 20[1]
LPA Report_April 20[1]LPA Report_April 20[1]
LPA Report_April 20[1]
 
Evolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on PrivacyEvolution of Digital Marketing and its Impact on Privacy
Evolution of Digital Marketing and its Impact on Privacy
 
Ad Fraud Blocking Analytics Webinar
Ad Fraud Blocking Analytics WebinarAd Fraud Blocking Analytics Webinar
Ad Fraud Blocking Analytics Webinar
 

Más de Dr. Augustine Fou - Independent Ad Fraud Researcher

Más de Dr. Augustine Fou - Independent Ad Fraud Researcher (20)

Forensic Auditing of Digital Media.pdf
Forensic Auditing of Digital Media.pdfForensic Auditing of Digital Media.pdf
Forensic Auditing of Digital Media.pdf
 
Ad blocking benchmarks q4 2021
Ad blocking benchmarks q4 2021Ad blocking benchmarks q4 2021
Ad blocking benchmarks q4 2021
 
Digital ad dollars trickle down chart
Digital ad dollars trickle down chartDigital ad dollars trickle down chart
Digital ad dollars trickle down chart
 
Bad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiencyBad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiency
 
Alternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v finalAlternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v final
 
Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018
 
Digital Media Trust Collaborative
Digital Media Trust CollaborativeDigital Media Trust Collaborative
Digital Media Trust Collaborative
 
Programmatic reach analysis 2021
Programmatic reach analysis 2021Programmatic reach analysis 2021
Programmatic reach analysis 2021
 
2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy
 
Browser and OS Share Jan 2021
Browser and OS Share Jan 2021Browser and OS Share Jan 2021
Browser and OS Share Jan 2021
 
Checking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analyticsChecking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analytics
 
Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020
 
Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020
 
Investigating digital ad fraud spi virtual meeting
Investigating digital ad fraud   spi virtual meetingInvestigating digital ad fraud   spi virtual meeting
Investigating digital ad fraud spi virtual meeting
 
Fraud by Browser Study
Fraud by Browser StudyFraud by Browser Study
Fraud by Browser Study
 
Digital Ad Fraud FAQ Question 1
Digital Ad Fraud FAQ Question 1Digital Ad Fraud FAQ Question 1
Digital Ad Fraud FAQ Question 1
 
Digital ad dollars trickle down chart
Digital ad dollars trickle down chartDigital ad dollars trickle down chart
Digital ad dollars trickle down chart
 
Marketer Outcomes Study
Marketer Outcomes StudyMarketer Outcomes Study
Marketer Outcomes Study
 
Ad fraud update for publishers Feb 2020
Ad fraud update for publishers Feb 2020Ad fraud update for publishers Feb 2020
Ad fraud update for publishers Feb 2020
 
Ad fraud is cash out for hacking
Ad fraud is cash out for hackingAd fraud is cash out for hacking
Ad fraud is cash out for hacking
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

IAB Best Practices Traffic Fraud Final

  • 1. Traffic Fraud: Best Practices for Reducing Risk to Exposure Released December 5, 2013 © 2013 Interactive Advertising Bureau 1 Traffic Fraud Best Practices Dec 5, 2013
  • 2. This document was developed by the IAB Traffic of Good Intent Task Force The IAB Best Practices on Traffic Fraud was developed by a task force of volunteers from 41 IAB member companies and other key contributing companies. The co-chairs for the TOGI task force are: • • John Batelle, CEO, Federated Media Tom Phillips, CEO, Dstillery The following participants are part of the TOGI education subgroup and contributed to the development of this document: • • • • • • David Hahn, Senior VP Product Management, Integral Ad Science Teg Grenager, VP Products, Adap.tv Russ Schafer, VP Product Marketing, Adap.tv Walter Knapp, COO, Federated Media Michael JJ. Tiffany, CEO, White Ops Preethy Vaidyanathan, Sr. Product Director, AppNexus The following IAB member companies also contributed to this document: About, Inc. Accuen Media AccuWeather.com Adap.tv Advertising.com AOL & ADTECH AppNexus, Inc. Brightroll Condé Nast CPX Interactive Datalogix DataXu Digilant DoubleVerify Dstillery Evidon Federated Media Publishing Forbes.com Google & YouTube Huddler Integral Ad Science Intel Iponweb Kelloggs Krux Digital Luma Partners Magnetic MediaOcean Microsoft OpenX Pubmatic Radium One Rocket Fuel Inc. Rubicon Project Specific Media Spider.io Tremor Video VivaKi White Ops Xaxis Yahoo! The IAB lead on this initiative was Steve Sullivan Contact adtechnology@iab.net to comment on this document. Please be sure to include the release date found on the bottom right corner on this page. This document is on the IAB website at: http://iab.net/trafficofgoodintent ABOUT THE IAB TRAFFIC OF GOOD INTENT TASK FORCE The Traffic of Good Intent (TOGI) task force’s mission is to identify, understand and raise awareness of the issue of non-intentional traffic, and to offer insight and recommended solutions to the digital advertising industry. © 2013 Interactive Advertising Bureau 2 Traffic Fraud Best Practices Dec 5, 2013
  • 3. Table of Contents Executive Summary ....................................................... 4 Overview ...................................................................... 4 How traffic bots infect legitimate systems .................................................................... 4 How traffic bots generate false traffic ......................................................................... 5 How traffic fraudsters get paid .................................................................................... 5 Why you should care .................................................................................................. 5 What You Can Do .......................................................... 6 Best Practices for Buyers ................................................ 6 Set goals ..................................................................................................................... 6 Manage the relationship ............................................................................................. 7 Measure results ........................................................................................................... 7 Address traffic fraud ................................................................................................... 7 Questions to ask publishers ......................................................................................... 7 Best Practices for Publishers ........................................... 9 Questions to ask inventory sources ............................................................................. 9 Best Practices for Networks ..........................................10 Take notice ................................................................................................................ 10 Make a stand ............................................................................................................ 11 Address the bad actors ............................................................................................. 12 Closing .........................................................................12 © 2013 Interactive Advertising Bureau 3 Traffic Fraud Best Practices Dec 5, 2013
  • 4. Executive Summary Advertisers expect that all online content is delivered to human audiences. But an alarming portion of digital advertising is being diverted by nefarious entities that exploit the ecosystem to deliver fraudulent traffic. The potential for fraud exists anywhere that media spending is significant and performance metrics are ambiguous or easily gamed. Online advertising is particularly vulnerable. Nefarious groups have found ways to profit from infiltrating legitimate systems and generating false ad views, ad clicks and site visits using robotic programs. Robotic traffic -- known popularly as “bots” -- is driven by code and not humans. These bots are often smart enough to mimic human behavior, and they can be difficult to detect. While more sophisticated bots can simulate conversions such as clicking through to sites, they don’t generate real conversions by buying goods and services, and they certainly don’t engage with brands. Activity generated by these bots waters down engagement metrics driven by human traffic, which dilutes the value of legitimate publisher inventory. Advertisers end up spending campaign dollars on specious ad impressions never seen by humans. Traffic fraud takes an organized effort to generate “results” that fool both buyers and sellers. The fraudsters are not just gaming the system; they are often engaging in other organized criminal activity. Ignoring traffic fraud enriches those engaged in such activities. Identifying traffic fraud and destroying the economics that drive this nefarious activity is imperative to restoring trust in the industry. This document outlines steps that can be taken by individual businesses in the digital advertising marketplace to address traffic fraud within their organizations. Both the buy-side and sell-side need to play a role in defending against traffic fraud and improving the digital ecosystem. Overview Traffic fraud is not always easy to detect. Knowing how the bad actors operate can help reduce your risk of being victimized by them. How traffic bots infect legitimate systems Fraudsters often operate undetected in legitimate systems by masquerading as ordinary content and tools typically implemented by unwitting consumers. Some of the ways they infiltrate systems: • • • • • Getting consumers to install toolbars in their browsers. Simulating applications such as games or video players in an alternate browser. Bundling hidden applications with consumer downloads. Inserting code snippets, undetected, on publisher sites. Using malicious code to exploit operating systems and browser security vulnerabilities to surreptitiously install fraudulent traffic-generating code. © 2013 Interactive Advertising Bureau 4 Traffic Fraud Best Practices Dec 5, 2013
  • 5. • Using real web pages as fronts for fake businesses so they can join networks and exchanges. How traffic bots generate false traffic After infiltrating legitimate systems, fraudsters can use bot code in different ways to generate false traffic. They often operate just under the surface or when human users aren’t present to detect foul play. Some of the ways bot code generates false traffic: • • • • Generating ad views while consumers browse unaware. Hijacking user controls to generate fake clicks when the computer is dormant. Running invisible processes behind the scenes to simulate consumer activity. Compromising cookie data to simulate high-value consumers. How traffic fraudsters get paid Fraudster business models vary, but a common theme tends to be their high profit margins. Even though fraudulent traffic accounts for only a small percentage of real human traffic, that small percentage generates disproportionate ad inventory and a significant diversion of digital marketing budgets. Premium publishers are often themselves buyers of traffic. If they buy from traffic vendors that are bot-riddled, the bots end up on the premium sites, inflating their impression volume. Some of the ways fraudsters get paid: • • • • • Selling cheap traffic to publishers wishing to extend their inventory. Selling their own robotic inventory to buyers through an exchange that is unaware of the traffic source. Becoming part of a legitimate network that pools inventory for buyers. The legitimate network is often unaware of any foul play. Creating a network by infecting legitimate sites with bot code, known as a “botnet,” that generates traffic for which they can bill. Making ad calls that serve ads one behind another (stacked) or into 1x1 pixel frames, creating hidden ad inventory that generates false impressions from both human and non-human traffic. Fraudsters contaminate legitimate businesses. For example, purchasing traffic is a generally acceptable way for publishers to extend audience and increase inventory. Fraudulent businesses use business practices like helping publishers boost traffic to pollute their available inventory and undermine their relationship of trust with advertisers. Why you should care Allowing the bad actors in our industry to profit from traffic fraud affects the entire online community. In addition to diluting inventory value and diverting funds from legitimate businesses, traffic fraud undermines the integrity of digital media. © 2013 Interactive Advertising Bureau 5 Traffic Fraud Best Practices Dec 5, 2013
  • 6. Some of the negative impacts of traffic fraud: • • • • • • Brands waste money on ad campaigns that are served to invisible inventory. Digital media is degraded, and brands look elsewhere for their marketing solutions. Ad performance and website visit data are contaminated, undermining analysis. Artificial fraudulent inventory floods the market and decreases the value of legitimate (real human) inventory. Criminal activity is enabled. The industry may be subjected to government oversight, negative press and potentially business-dampening enforcement. What You Can Do The solutions to traffic fraud are not always intuitive. For example, the outright blocking of fraudulent traffic gives information to the fraudsters that helps them blend in better and become more difficult to identify. In addition to the following general guidelines, steps specific to buyers, publishers and networks are outlined in subsequent sections. The following general guidelines can help any online business get started: • • • • • • Educate yourself about traffic fraud and the risks that it poses to your business. Adopt policies and strategies to identify fraud and mitigate its impact. If you are an advertiser, set clear objectives for your media campaigns that focus on the measurement of real ROI, which is difficult for fraudsters to falsify. Measures such as click-through rate, completion rate, and last-touch attribution are easy to game. Practice safe sourcing and trust only business partners who have earned trust. Implement technology to detect and prevent fraud. Filter traffic through vendors who prioritize fraud detection. Best Practices for Buyers Buyers in online media have much to lose when it comes to traffic fraud. Taking steps to inspect the quality of your buys can go a long way toward preventing fraud in the digital marketplace. The following recommendations should help you achieve quality media buys by identifying and eliminating traffic fraud. Set goals Setting goals before buying media is a generally good practice. Some specific recommendations for buying digital media: • • List specific objectives for your media campaign. Don’t leave objectives broad and open to interpretation. Examine whether your goals accommodate fraud. Be willing to pay the real price for the media you want. For example, pre-roll video targeted to a specific real human audience with good attention will cost more than linear video ads placed at random simply to increase views. © 2013 Interactive Advertising Bureau 6 Traffic Fraud Best Practices Dec 5, 2013
  • 7. • • Document your goals clearly and get the seller to sign off on those goals. Agree to pay for only results that align with what’s documented. Don’t optimize for cost alone. Results that seem too good to be true probably are. Manage the relationship Trustworthy sellers shouldn’t have any trouble backing up their claims for quality media. Keep in mind the following points to help you manage the relationship with your sellers: • • Filter media sellers before you buy. Even after the campaign is running, ensure that your sellers are following through. Despite the best efforts of sellers, some fraud cannot be eliminated. Determine the risk you are willing to accept and use that model to discount your media. Measure results Since bots can’t engage the way humans can, consider measuring campaign results using more sophisticated metrics that ensure humans are interacting with your ads. The following measures indicate human interaction: • • • • • Purchases Subscriptions Verifiable brand survey results Validated panels Other verifiable engagements Measures that are easy for bots to fake: • • • • • Ad views Clicks Click-through rate Video completes Cookie attribution Address traffic fraud Your internal operations can only go so far to filter out traffic fraud. Look to vendors who specialize in detecting and reducing the more sophisticated cases of traffic fraud. • License technology explicitly to discern traffic sources. Brand safety, viewability and placement quality are all fine measures of inventory quality, but none captures the presence of non-human traffic. Questions to ask publishers As you filter for publishers that offer quality traffic, asking questions about how they manage quality control can help you find a good fit for your campaign. The following questions and preferred responses can help you get started finding quality sellers: © 2013 Interactive Advertising Bureau 7 Traffic Fraud Best Practices Dec 5, 2013
  • 8. Do you have your audience measured by verifiable 3rd party systems? The publisher should have their audience measured by independent vendors so that you can measure the traffic generated for your ads against an independent benchmark, making anomalies easier to spot. Note, however, that some audience measurement vendors’ techniques can be easily fooled by fraudulent traffic. Review vendor methodologies when shopping for a vendor you can trust. Do you have a clean record with third-party brand safety reports? Bad site quality is not necessarily correlated with traffic fraud, and high quality sites are not immune to traffic fraud. So screening sites for brand safety is an extra measure that helps ensure sites are involved in efforts to reduce fraud. Along with first-party data, sites should be screened against third-party reports to remove fraudulent and inappropriate environments. There are many different types of brand safety detection and prevention. Investigating third-party methodologies can help you make an informed decision. How do you determine which impressions are exposed to real humans? Advertisers want to engage with viewers who are engaged with content, not with users who may have left a web page open accidentally. Each site should have a policy and technical methodology to determine which traffic is generated by real humans. The site methodology should cover how they determine suspect fraudulent traffic, and then flag, investigate and remove it. How do you assure that ads are served as reported, and that URLs are visible to the advertiser? Ad opportunities on publisher sites should correspond with the site URL that is reported by first- and/or third party campaign performance analytics. How do you determine whether ads are auto-initiated or userinitiated? In video, auto-initiated ads are more susceptible to fraud. Publishers may increase their fulfillment numbers by using autoplay ads when an advertiser specifies they want only user-initiated ads. Publishers need to match the ad interaction requested with the ad interaction fulfilled, and report anomalies. Do you provide protection from malware? Websites should provide a safe environment for advertisers and consumers by actively screening for malware. Each publisher should be able to provide information on established approaches. Are impressions generated by malware redirecting to a site? Unusually large volumes of traffic and poorly performing placements should be investigated for malicious virus activity. Sites should monitor traffic patterns in real time to recognize anomalies resulting from malware. © 2013 Interactive Advertising Bureau 8 Traffic Fraud Best Practices Dec 5, 2013
  • 9. Best Practices for Publishers Buying traffic increases the risk profile for a premium publisher. If you want to minimize your risk, don’t buy traffic from non-organic sources. Even without buying traffic from non-organic sources, you may have some non-human traffic on your media properties, sent there without your control. For example, consumers who install browser tools or applications may inadvertently open the gate to robotic traffic. In addition, bots may be programmed to browse legitimate sites to build up their targeting cookie pool while avoiding detection. Despite your best efforts, you may find the need to extend your audience and increase your inventory. For example, if you’ve committed to delivering more ad impressions than are currently available on your media properties, your choice is to either under-deliver for your advertiser or supplement your inventory with purchased traffic. Our recommendation is to avoid purchasing traffic, which puts your long-term success at risk for short-term profits. But if you must increase inventory, the following guidelines can help mitigate your risk: • • • • • As a premium publisher purchasing traffic, pay the higher price to buy quality. Look for a natural affinity between your content and the purchased audience. Use technology to detect non-human traffic on all of the traffic you are buying. Don’t lower your standards when performance slips below your goals. Know your consultants, and where they are sourcing traffic. Questions to ask inventory sources When you purchase traffic, you put yourself in the buyers’ shoes. The following questions are nearly identical to the questions that buyers should ask of publishers. Use the following questions to filter traffic sources that promise to help you increase inventory: Do you have your audience measured by verifiable 3rd party systems? The publisher should have their audience measured by independent vendors so that you can measure the traffic generated for your ads against an independent benchmark, making anomalies easier to spot. Note, however, that some audience measurement vendors’ techniques can be easily fooled by fraudulent traffic. Review vendor methodologies when shopping for a vendor you can trust. Do you have a clean record with third-party brand safety reports? In video, auto-initiated video ads are more susceptible to fraud. Publishers may increase their fulfillment numbers by using autoplay ads when an advertiser specifies they only want user-initiated ads. Publishers need to match the ad interaction requested with the ad interaction fulfilled and report anomalies. © 2013 Interactive Advertising Bureau 9 Traffic Fraud Best Practices Dec 5, 2013
  • 10. How do you determine which impressions are exposed to real humans? Advertisers want to engage with viewers who are engaged with content, not with users who may have left a web page open accidentally. Each site should have a policy and technical methodology to determine which traffic is generated by real humans. The site methodology should cover how they determine suspect fraudulent traffic, and then flag, investigate and remove it. How do you assure that ads are served as reported, and that URLs are visible to the advertiser? Ad opportunities on traffic-sourced sites should correspond with the site URL that is reported by first- and/or third party campaign performance analytics. How do you determine whether ads are auto-initiated or userinitiated? Autoplay ads are more susceptible to traffic fraud and may be used despite specific requests for only user-initiated ads. Sourced traffic should match the ad interaction requested with the ad interaction fulfilled, and report any anomalies. Do you provide protection from malware? Websites should provide a safe environment for advertisers and consumers by actively screening for malware. Each traffic source should be able to provide information on their approach. Are impressions generated by malware redirecting to a site? Unusually large volumes of traffic and poorly performing placements should be investigated for malicious virus activity. Sites should monitor traffic patterns in real time to recognize anomalies recognize anomalies resulting from malware. Best Practices for Networks Networks can engage in some key efforts to combat non-human traffic. Differentiate yourself in the marketplace by embracing the practices listed here. Take notice Botnet operators work hard to function under the radar. Malicious players shy away from the light. Your best defense is to look for the telltale characteristics of bad actors. © 2013 Interactive Advertising Bureau 10 Traffic Fraud Best Practices Dec 5, 2013
  • 11. General red flags: 1. Publisher has no prior history of substantial traffic When a publisher comes to you with traffic built overnight, you can bet it didn't come from hard work and legitimate content. 2. High audience overlap between disparate websites A handful of common visitors to sports sites and sites on the joys of growing flowers is certainly plausible. However, when a large proportion of the audience for either of these sites visits the other site, you don't have to worry if it's something in the water. There's just something fishy going on. 3. Browser stats that are inconsistent with known industry usage stats Any publisher touting a billion unique visitors probably does NOT have the attention of one-seventh of the world’s population. 4. Publisher seeks out representation Publishers who have earned their traffic get noticed and don't need to ask for representation. 5. More than four tags on a page The more ad tags on a page, the lower the quality of the page. While low quality may mean more traffic fraud, keep in mind that more sophisticated fraudsters will flock to higher quality pages to remain undetected. Red flags in RTB environments: 1. "No Bid" reason flag and other automated indicators The no bid reason flag in OpenRTB 2.2 is an optional flag a bidder can use to tell the exchange that they are not bidding on the inventory because they believe it to be nonintentional. Both exchanges and bidders are encouraged to create and implement nonintentional traffic detection algorithms. 2. Negatively target traffic fraud Consider using anti-fraud tools in RTB to exclude any bid requests with a high probability for fraud. Make a stand Bad actors will take the road of least resistance. Building collaborative relationships in the industry builds a wall of resistance that turns bad actors away. 1. Partnerships for rapid and free information sharing Collaborative relationships with other supply chain partners, such as exchanges and DSPs, will enable an open channel of communication about bad traffic. Sharing information openly and quickly builds a defense against bad actors. 2. Vendors that offer fraud and malware detection Your internal efforts to fight unintentional traffic are the right start. But the more successful you are, the more you'll need help to address sophisticated botnet operators. Certain companies have made fighting fraud and malware the core of their business. Integration with one of these companies sets up a security gate through which you can run all new traffic before selling it. © 2013 Interactive Advertising Bureau 11 Traffic Fraud Best Practices Dec 5, 2013
  • 12. Address the bad actors Taking steps to identify and defend against bad actors goes a long way to improving the value of your network. However, their persistence and changing tactics are designed to poke holes in your efforts. Some ways to combat the bad actors once identified are: 1. Sales disincentive Your sales teams have the best intentions, but they can unwittingly bring in bad traffic sources. Build in a sales disincentive when that happens, so that sales can focus on finding the higher-grade human traffic. 2. Block suspicious ads All known traffic fraud should be blocked as soon as it’s detected. Suspicious traffic should be monitored, and blocked as soon as it is confirmed to be from a fraudulent source. Many advertisers insist that fraudulent traffic be blocked and refuse to pay for any known traffic fraud. 3. Block payment for fraud Blocking known traffic fraud subsequently blocks payment to bad actors. When suspicious traffic isn’t immediately blocked, fraudsters may demand payment for the impressions that were served. Resist their demands, as fraudsters most likely will back down if asked to prove that their traffic is valid. Closing For all the well-intentioned industry members who read this guide and adopt its practices, there are fraudsters out there who are also reading this document to discover ways to work around your efforts to thwart them. We have purposely avoided describing detailed strategies here that can help the perpetrators achieve their nefarious ends. Whatever practices you adopt, you must remain diligent and continue to seek out the expertise to defeat the bad actors that are intent on hijacking the system and robbing legitimate businesses. © 2013 Interactive Advertising Bureau 12 Traffic Fraud Best Practices Dec 5, 2013