SlideShare a Scribd company logo
1 of 13
https://commons.wikimedia.org/wiki/File:Thief.png, By JamesDrury creative commons – share alike
Catch your Advertising Money Thieves
• Is someone stealing your advertising money?
• Who or what is producing invalid traffic at your cost?
• You want to get alerted when suspicious traffic kicks in (Fraud)?
• You want a clean and accurate basis for your Marketing Analytics
without fraud traffic?
Best possible Source for DATA = Logs
Best possible Analytics Engine =
Before we start – some “good to know”
• The data we are talking about does not live long (GDPR compliance).
• IP Address processing is necessary for the purposes of the legitimate interests pursued by the
controller - Security and Fraud detection are two legitimate interests.
• You need to understand what can appear as “direct campaign traffic” means.
Learn about it here: https://www.youtube.com/watch?v=8oGlkqq_0Ao
• Be very careful with your analysis and ask a security specialist for a second
opinion before you report your findings.
• Expect Fraud everywhere but also be aware that some users show strange click
flows.
• Read this: https://www.wfanet.org/adfraud
Prerequiste: Get the Logs into New Relic
• Define New Relic the endpoint of your Logs in your CDN or from your servers (in case no CDN is
used)
• Check if logs arrive
(Example for Fastly) (Logs arrived in New Relic)
Make sense of the of the data
Focus for this use case only on traffic coming from your paid campaigns (Paid Search,
Paid Social etc.)
Most thieves hide themselves by using sophisticated scripts run on a variety of servers. Expect to see
one thieve use multiple IP addresses.
A good starting point is to count the calls of UTM Campaign traffic and separate it by IP address.
Select count(client_ip) as 'Requests'
from Log
where request_user_agent not like '%bot%'
and request_query_string like '%utm_campaign%'
and request_referer not like '%yourdomain.%'
facet client_ip
limit 50 since 1 day ago
xxx.xx.xx.xx
xxx.xx.xx.xx
xxx.xx.xx.xx
xxx.xx.xx.xx
Narrow down to get more intelligence
• Ask Questions
What campaigns are affected?
Is this real fraud?
xxx.xx.xx.xx
xxx.xx.xx.xx
xxx.xx.xx.xx
xxx.xx.xx.xx
Click to
filter
Campaigns
Called
Red Flag ’Cost
per Click’
Campaign
Is the specific IP address known as Fraud?
• Various platforms provide databases of known fraud traffic Ips
• Example: https://scamalytics.com/
• Confirms my assumption: Most likely fraud !
Further Analysis
• Check the log entry further for
 Is a referral present?
 Is a gclid present? (you might need it for reporting it to google)
 Is anything else looking suspicious?
A starred as request
language…suspicious
Export gclid
directly from New
Relic
Create an outlier alert to get notified!
Automate Fraud detection
• Implement a script using the NR APIs to get the list of possible fraud
Ips
• Query the https://scamalytics.com/ API and send the results (as
custom events) into New Relic using the ingestion API.
• Now you can query the data easily and get alerted on high fraud
traffic based on public available data
Fraud Scoring in New Relic
Report identified Thieves
• https://support.google.com/googleads/troubleshooter/2557048?rd=1
• Make sure the ALL the data requested by Google. The better you report the faster
Google can react and probably refund you. All requested data should be available
in your logs.

More Related Content

Similar to Catch Advertising Money Thieves with Log Analytics

StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
Digital marketing tools online
Digital marketing tools onlineDigital marketing tools online
Digital marketing tools onlineInês Gomes Pinto
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleShailin Dhar
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
 
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectDEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectFelipe Prado
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
Preventing click fraud
Preventing click fraudPreventing click fraud
Preventing click fraudBenHamminton
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.Jarrod Overson
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analyticsSven Hezel
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseJohn Bambenek
 
How to detect affiliate fraud
How to detect affiliate fraudHow to detect affiliate fraud
How to detect affiliate fraudSven Hezel
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27IABmembership
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 

Similar to Catch Advertising Money Thieves with Log Analytics (20)

StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
Digital marketing tools online
Digital marketing tools onlineDigital marketing tools online
Digital marketing tools online
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification Bubble
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectDEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Preventing click fraud
Preventing click fraudPreventing click fraud
Preventing click fraud
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
ComplianceBrief
ComplianceBriefComplianceBrief
ComplianceBrief
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.The State of Credential Stuffing and the Future of Account Takeovers.
The State of Credential Stuffing and the Future of Account Takeovers.
 
Digital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fouDigital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fou
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analytics
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
 
How to detect affiliate fraud
How to detect affiliate fraudHow to detect affiliate fraud
How to detect affiliate fraud
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 

Recently uploaded

Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!dstvtechnician
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...ChesterYang6
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationtbatkhuu1
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBalmerLawrie
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRSapana Sha
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdftbatkhuu1
 
Publuu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure OnlinePubluu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure OnlinePubluu
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesSearch Engine Journal
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfVWO
 
Aryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxAryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxtegevi9289
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxelizabethella096
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsVWO
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Recently uploaded (20)

Local SEO Domination: Put your business at the forefront of local searches!
Local SEO Domination:  Put your business at the forefront of local searches!Local SEO Domination:  Put your business at the forefront of local searches!
Local SEO Domination: Put your business at the forefront of local searches!
 
Social Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdfSocial Samosa Guidebook for SAMMIES 2024.pdf
Social Samosa Guidebook for SAMMIES 2024.pdf
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
 
The Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison KaltmanThe Future of Brands on LinkedIn - Alison Kaltman
The Future of Brands on LinkedIn - Alison Kaltman
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 128 Noida Escorts >༒8448380779 Escort Service
 
Kraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentationKraft Mac and Cheese campaign presentation
Kraft Mac and Cheese campaign presentation
 
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly BulletinBLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
BLOOM_April2024. Balmer Lawrie Online Monthly Bulletin
 
Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCR
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
Publuu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure OnlinePubluu Demo Presentation Brochure Online
Publuu Demo Presentation Brochure Online
 
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best StrategiesGoogle 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
Google 3rd-Party Cookie Deprecation [Update] + 5 Best Strategies
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting GroupSEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAILBUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
BUY GMAIL ACCOUNTS PVA USA IP INDIAN IP GMAIL
 
The Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdfThe Science of Landing Page Messaging.pdf
The Science of Landing Page Messaging.pdf
 
Aryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptxAryabhata I, II of mathematics of both.pptx
Aryabhata I, II of mathematics of both.pptx
 
Unraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptxUnraveling the Mystery of The Circleville Letters.pptx
Unraveling the Mystery of The Circleville Letters.pptx
 
Uncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 ReportsUncover Insightful User Journey Secrets Using GA4 Reports
Uncover Insightful User Journey Secrets Using GA4 Reports
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 

Catch Advertising Money Thieves with Log Analytics

  • 2. Catch your Advertising Money Thieves • Is someone stealing your advertising money? • Who or what is producing invalid traffic at your cost? • You want to get alerted when suspicious traffic kicks in (Fraud)? • You want a clean and accurate basis for your Marketing Analytics without fraud traffic?
  • 3. Best possible Source for DATA = Logs Best possible Analytics Engine =
  • 4. Before we start – some “good to know” • The data we are talking about does not live long (GDPR compliance). • IP Address processing is necessary for the purposes of the legitimate interests pursued by the controller - Security and Fraud detection are two legitimate interests. • You need to understand what can appear as “direct campaign traffic” means. Learn about it here: https://www.youtube.com/watch?v=8oGlkqq_0Ao • Be very careful with your analysis and ask a security specialist for a second opinion before you report your findings. • Expect Fraud everywhere but also be aware that some users show strange click flows. • Read this: https://www.wfanet.org/adfraud
  • 5. Prerequiste: Get the Logs into New Relic • Define New Relic the endpoint of your Logs in your CDN or from your servers (in case no CDN is used) • Check if logs arrive (Example for Fastly) (Logs arrived in New Relic)
  • 6. Make sense of the of the data Focus for this use case only on traffic coming from your paid campaigns (Paid Search, Paid Social etc.) Most thieves hide themselves by using sophisticated scripts run on a variety of servers. Expect to see one thieve use multiple IP addresses. A good starting point is to count the calls of UTM Campaign traffic and separate it by IP address. Select count(client_ip) as 'Requests' from Log where request_user_agent not like '%bot%' and request_query_string like '%utm_campaign%' and request_referer not like '%yourdomain.%' facet client_ip limit 50 since 1 day ago xxx.xx.xx.xx xxx.xx.xx.xx xxx.xx.xx.xx xxx.xx.xx.xx
  • 7. Narrow down to get more intelligence • Ask Questions What campaigns are affected? Is this real fraud? xxx.xx.xx.xx xxx.xx.xx.xx xxx.xx.xx.xx xxx.xx.xx.xx Click to filter Campaigns Called Red Flag ’Cost per Click’ Campaign
  • 8. Is the specific IP address known as Fraud? • Various platforms provide databases of known fraud traffic Ips • Example: https://scamalytics.com/ • Confirms my assumption: Most likely fraud !
  • 9. Further Analysis • Check the log entry further for  Is a referral present?  Is a gclid present? (you might need it for reporting it to google)  Is anything else looking suspicious? A starred as request language…suspicious Export gclid directly from New Relic
  • 10. Create an outlier alert to get notified!
  • 11. Automate Fraud detection • Implement a script using the NR APIs to get the list of possible fraud Ips • Query the https://scamalytics.com/ API and send the results (as custom events) into New Relic using the ingestion API. • Now you can query the data easily and get alerted on high fraud traffic based on public available data
  • 12. Fraud Scoring in New Relic
  • 13. Report identified Thieves • https://support.google.com/googleads/troubleshooter/2557048?rd=1 • Make sure the ALL the data requested by Google. The better you report the faster Google can react and probably refund you. All requested data should be available in your logs.