SlideShare a Scribd company logo
1 of 20
Download to read offline
Digital Fraud
What’s all the fuss about?
1
Fraudulent Impressions:
Source: Integral Ad Science based on ~80 bn impressions/month
Total Advertising: 14%
In 2013 over $6 billion dollars were pocketed by fraudsters!
An Advertising Industry Epidemic:
Everyone is affected
Exchanges: 13% Networks: 15%
Publisher Direct: 2%
Fraud: Why Does It Take Place?
Simple economics: Supply and Demand
3
3
1.  Supply and Demand
2. Poorly defined success
metrics:
Eyeballs (CPM)
Action taken (CPC, CPA)
3. Because it’s cheap and
easy for hackers
4
4
Back To The Basics
Digital Fraud Dictionary
Click fraud noun ˈklik frȯd imitation of legitimate click-through events
on advertisements with no interest in link target
Impression fraud noun ˈim-ˈpre-shəәn frȯd 1. imitation of legitimate
impression views with no interest in ad content. 2. Solicitation of
impressions with no opportunity to be viewed by a human
Bots noun ˈbäts a device or piece of software that can execute
commands, reply to messages, or perform routine tasks, or perform
routine tasks with minimum human intervention
Illegal bots noun (ˌ)i(l)-ˈlē-gəәlˈbäts computers that are compromised
and whose security defenses have been breached and control
conceded to a third party
Botnet: noun ˈbät net a collection of bots communicating with
command centers in order to perform tasks
Pixel stuffing: noun ˈpik-səәl ˈstəә-fiŋ stuffing an entire ad-supported
site into a 1x1 pixel
Ad stacking: noun ˈad ˈsta-kiŋ placing multiple ads on top of each
other in a single ad placement
What fraud is not:
•  Web crawlers
•  Poor viewability;
below the fold
•  Collisions
•  In-banner, auto-
play, muted video
Hacker:
Sex: Male
Age:18-35
Location: Eastern
Europe, Asia
Background: Good
computer skills
5
5
Who Are The Participants?
Profile
Botnet Operator:
Sex: Male
Age: 34+
Location: Eastern Europe
Characteristics: Disregard
of the law, confident, driven
by money
Typical Infected
Computer Owner:
Technologically challenged
Owns a dated computer
and software
Suburban, rural,
household without kids
Unlikely to own a smart
phone/tablet
6
6
How Does It Work?
Follow the bot
Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe
didn’t even know about it!
7
7
How Does It Work?
Follow the bot
Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
communicating with a botnet center.
At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe
didn’t even know about it!
8
8
How Does It Work?
Follow the bot
Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
Later that day, unbeknown to Joe, the bot engine started
communicating with a botnet center.
At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe
didn’t even know about it!
9
9
How Does It Work?
Follow the bot
Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
Later that day, unbeknown to Joe, the bot engine started
Joe’s bot was instructed on which sites to visit, in
which sequence and at what frequency.
communicating with a botnet center.
At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe
didn’t even know about it!
1
0
10
How Does It Work?
Follow the bot
Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
Later that day, unbeknown to Joe, the bot engine started
Joe’s bot was instructed on which sites to visit, in
which sequence and at what frequency.
performed the script assigned by the botnet center through visiting high value audience sites
to profile Joe as an ideal candidate for advertisers.
According to instruction, Joe’s bot activated and
communicating with a botnet center.
At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe
didn’t even know about it!
1
1
11
How Does It Work?
Follow the bot
Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
Later that day, unbeknown to Joe, the bot engine started
Joe’s bot was instructed on which sites to visit, in
which sequence and at what frequency.
performed the script assigned by the botnet center through visiting high value audience sites
to profile Joe as an ideal candidate for advertisers.
According to instruction, Joe’s bot activated and
The bot was also instructed to go to sites that sell
bot traffic that generate millions of fraudulent ads.
communicating with a botnet center.
At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe
didn’t even know about it!
1
2
12
How Does It Work?
Follow the bot
Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
Later that day, unbeknown to Joe, the bot engine started
Joe’s bot was instructed on which sites to visit, in
which sequence and at what frequency.
performed the script assigned by the botnet center through visiting high value audience sites
to profile Joe as an ideal candidate for advertisers.
According to instruction, Joe’s bot activated and
The bot was also instructed to go to sites that sell
Meanwhile, the botnet operator sat back and
counted his money, and Joe…well he didn’t read this story. And they all lived happily ever after.
bot traffic that generate millions of fraudulent ads.
1
3
13
Heat Map
See the action
Live Demonstration
What does it look like?
14
1
5
15
So What Can We Do About It?
Fighting Back
Policing – FBI or private companies
Pros: Bringing the criminals to justice
Cons: Inefficient and ineffective – every botnet that is shut down is soon replaced by a new one
Technology – The only way to cut the flow of cash
Black lists – When fraud is detected a site is added to a blacklist
Pros: Reactively shuts down supply to fraudsters
Cons: Lists are not updated frequently
Impression level detection and prevention
Pros: Proactively shuts down supply to fraudsters;
Detection at the impression level allows for scale
Dynamic
1
6
16
How Is Fraud Detected?
First we look at behavioral patterns
We flag the following non-human signals:
Cookies that are deleted at the end of activity cycle
Intense activity
Reoccurring activities patterns/levels
At this point: some bots are detected, others are
able to go undetected
Next – we look at each impression
•  Signals that are atypical for a human
•  Density of page loads
•  Density of page visits
•  Atypical distribution of browsers
•  Browser spoofing
•  Conflicting measurement results
•  Was the impression traded in a suspicious way
Cross-validate all of the above and
determine validity of signals and patterns
Behavioral Pattern
Bot
…or not
1
7
17
So Who Is To Blame?
Innocent bystanders:
Legitimate advertisers
and publishers
Guilty:
Botnet operators
Those who knowingly
buy/sell bot traffic
1
8
18
How Is The Industry Dealing With Fraud?
Proactive
Passive
Pretend the problem
doesn’t exist
Knowingly or unknowingly buy and sell bot traffic
Able to eliminate
some of the bot traffic
Eliminate all bot trafficAre serious about fraud:
•  Use cutting edge technology to
vet 100% of inventory
Partially address the problem:
•  Use a subpar solution
•  Run the technology only on part of
the inventory
1
9
19
The Integral Ad Science Solution
Proactively Block Fraud
Benefits:
–  Proactively block fraud before the ad is served
–  Dynamic data used to cross reference fraud signals
–  Not relying on outdated, rarely updated black lists
–  Pre-bid fraud solution prevents bidding on fraudulent inventory
20

More Related Content

What's hot

Programmatic Advertising 101
Programmatic Advertising 101Programmatic Advertising 101
Programmatic Advertising 101Rubicon Project
 
Digital Marketing Strategy & Plan Template
Digital Marketing Strategy & Plan TemplateDigital Marketing Strategy & Plan Template
Digital Marketing Strategy & Plan TemplateBidur Acharya
 
Off-Page SEO Tactics
Off-Page SEO TacticsOff-Page SEO Tactics
Off-Page SEO TacticsRebecca Gill
 
Social Media Marketing Presentation.pdf
Social Media Marketing Presentation.pdfSocial Media Marketing Presentation.pdf
Social Media Marketing Presentation.pdfVanakkamDigital
 
SEO-off page optimization technique
SEO-off page optimization technique SEO-off page optimization technique
SEO-off page optimization technique shrikant87
 
Digital Marketing Overview
Digital Marketing Overview Digital Marketing Overview
Digital Marketing Overview Darshan Torane
 
Online Reputation Management - Bachelor
Online Reputation Management - Bachelor Online Reputation Management - Bachelor
Online Reputation Management - Bachelor Rune Haugestad
 
Leveraging Digital Marketing For Real Estate Agents
Leveraging Digital Marketing For Real Estate AgentsLeveraging Digital Marketing For Real Estate Agents
Leveraging Digital Marketing For Real Estate Agentsrichardnoromor
 
Programmatic Advertising For Dummies
Programmatic Advertising For DummiesProgrammatic Advertising For Dummies
Programmatic Advertising For DummiesDecisive
 
PPC Google AdWords Proposal Sample for Client Pitching
PPC Google AdWords Proposal Sample for Client PitchingPPC Google AdWords Proposal Sample for Client Pitching
PPC Google AdWords Proposal Sample for Client PitchingeMarket Education
 
Affiliate marketing
Affiliate marketingAffiliate marketing
Affiliate marketingtrootrac24
 
What is Marketing Funnel Explained with An Example
What is Marketing Funnel Explained with An ExampleWhat is Marketing Funnel Explained with An Example
What is Marketing Funnel Explained with An ExampleNikhil Arora
 
Digital Marketing Proposal - Understanding Digital Marketing
Digital Marketing Proposal - Understanding Digital MarketingDigital Marketing Proposal - Understanding Digital Marketing
Digital Marketing Proposal - Understanding Digital MarketingInfidirect
 

What's hot (20)

Social Media Proposal for Real Estate - Digital Marketing
Social Media Proposal for Real Estate - Digital Marketing Social Media Proposal for Real Estate - Digital Marketing
Social Media Proposal for Real Estate - Digital Marketing
 
Tiktok Advertising Marketing Media Kit
Tiktok Advertising Marketing Media KitTiktok Advertising Marketing Media Kit
Tiktok Advertising Marketing Media Kit
 
Programmatic Advertising 101
Programmatic Advertising 101Programmatic Advertising 101
Programmatic Advertising 101
 
Digital Marketing Strategy & Plan Template
Digital Marketing Strategy & Plan TemplateDigital Marketing Strategy & Plan Template
Digital Marketing Strategy & Plan Template
 
Off-Page SEO Tactics
Off-Page SEO TacticsOff-Page SEO Tactics
Off-Page SEO Tactics
 
Social Media Marketing Presentation.pdf
Social Media Marketing Presentation.pdfSocial Media Marketing Presentation.pdf
Social Media Marketing Presentation.pdf
 
Seo Marketing Plan Ppt
Seo Marketing Plan PptSeo Marketing Plan Ppt
Seo Marketing Plan Ppt
 
SEO-off page optimization technique
SEO-off page optimization technique SEO-off page optimization technique
SEO-off page optimization technique
 
Technical SEO.pdf
Technical SEO.pdfTechnical SEO.pdf
Technical SEO.pdf
 
Digital Marketing Overview
Digital Marketing Overview Digital Marketing Overview
Digital Marketing Overview
 
Online Reputation Management - Bachelor
Online Reputation Management - Bachelor Online Reputation Management - Bachelor
Online Reputation Management - Bachelor
 
Leveraging Digital Marketing For Real Estate Agents
Leveraging Digital Marketing For Real Estate AgentsLeveraging Digital Marketing For Real Estate Agents
Leveraging Digital Marketing For Real Estate Agents
 
Programmatic Advertising For Dummies
Programmatic Advertising For DummiesProgrammatic Advertising For Dummies
Programmatic Advertising For Dummies
 
PPC Google AdWords Proposal Sample for Client Pitching
PPC Google AdWords Proposal Sample for Client PitchingPPC Google AdWords Proposal Sample for Client Pitching
PPC Google AdWords Proposal Sample for Client Pitching
 
Affiliate marketing
Affiliate marketingAffiliate marketing
Affiliate marketing
 
What is Marketing Funnel Explained with An Example
What is Marketing Funnel Explained with An ExampleWhat is Marketing Funnel Explained with An Example
What is Marketing Funnel Explained with An Example
 
Digital Marketing Proposal - Understanding Digital Marketing
Digital Marketing Proposal - Understanding Digital MarketingDigital Marketing Proposal - Understanding Digital Marketing
Digital Marketing Proposal - Understanding Digital Marketing
 
Seo strategy
Seo strategySeo strategy
Seo strategy
 
SEO proposal
SEO proposal SEO proposal
SEO proposal
 
Digital marketing
Digital marketingDigital marketing
Digital marketing
 

Similar to Integral Ad Science Digital Ad Fraud Presentation

Bot detection deck 042514 final
Bot detection deck 042514 finalBot detection deck 042514 final
Bot detection deck 042514 finalVindicoGroup
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsTom Eston
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03IABmembership
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27IABmembership
 
White Ops & Videology Whitepaper
White Ops & Videology WhitepaperWhite Ops & Videology Whitepaper
White Ops & Videology WhitepaperWhite Ops
 
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectDEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectFelipe Prado
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and FameThe Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and FameAbhinav Mishra
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
Fraudulent Internet Yellow Pages Traffic
Fraudulent Internet Yellow Pages TrafficFraudulent Internet Yellow Pages Traffic
Fraudulent Internet Yellow Pages TrafficRamon Cartwright
 
The Many Faces of Ad Fraud
The Many Faces of Ad FraudThe Many Faces of Ad Fraud
The Many Faces of Ad FraudWhite Ops
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Wossname
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
The Emergence Of Social Bots In Social Media- WiDS Talk
The Emergence Of Social Bots In Social Media- WiDS TalkThe Emergence Of Social Bots In Social Media- WiDS Talk
The Emergence Of Social Bots In Social Media- WiDS TalkAseel Addawood
 

Similar to Integral Ad Science Digital Ad Fraud Presentation (20)

Bot detection deck 042514 final
Bot detection deck 042514 finalBot detection deck 042514 final
Bot detection deck 042514 final
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27
 
Digital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fouDigital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fou
 
Botman Profile Deck
Botman Profile DeckBotman Profile Deck
Botman Profile Deck
 
White Ops & Videology Whitepaper
White Ops & Videology WhitepaperWhite Ops & Videology Whitepaper
White Ops & Videology Whitepaper
 
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectDEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
 
Urhotspot pitch deck
Urhotspot pitch deckUrhotspot pitch deck
Urhotspot pitch deck
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and FameThe Game of Bug Bounty Hunting - Money, Drama, Action and Fame
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
Fraudulent Internet Yellow Pages Traffic
Fraudulent Internet Yellow Pages TrafficFraudulent Internet Yellow Pages Traffic
Fraudulent Internet Yellow Pages Traffic
 
The Many Faces of Ad Fraud
The Many Faces of Ad FraudThe Many Faces of Ad Fraud
The Many Faces of Ad Fraud
 
ComplianceBrief
ComplianceBriefComplianceBrief
ComplianceBrief
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
The Emergence Of Social Bots In Social Media- WiDS Talk
The Emergence Of Social Bots In Social Media- WiDS TalkThe Emergence Of Social Bots In Social Media- WiDS Talk
The Emergence Of Social Bots In Social Media- WiDS Talk
 
Mobile CPI Fraud
Mobile CPI FraudMobile CPI Fraud
Mobile CPI Fraud
 

More from Integral Ad Science

More from Integral Ad Science (7)

2015 Q4 Media Quality Report
2015 Q4 Media Quality Report2015 Q4 Media Quality Report
2015 Q4 Media Quality Report
 
2015 Q3 Media Quality Report
2015 Q3 Media Quality Report2015 Q3 Media Quality Report
2015 Q3 Media Quality Report
 
Year-end Survey Results
Year-end Survey ResultsYear-end Survey Results
Year-end Survey Results
 
Natural Experiments at Scale
Natural Experiments at ScaleNatural Experiments at Scale
Natural Experiments at Scale
 
2015 Q2 Media Quality Report
2015 Q2 Media Quality Report2015 Q2 Media Quality Report
2015 Q2 Media Quality Report
 
2015 Q1 Media Quality Report
2015 Q1 Media Quality Report2015 Q1 Media Quality Report
2015 Q1 Media Quality Report
 
2014 Q4 Media Quality Report
2014 Q4 Media Quality Report2014 Q4 Media Quality Report
2014 Q4 Media Quality Report
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Integral Ad Science Digital Ad Fraud Presentation

  • 1. Digital Fraud What’s all the fuss about? 1
  • 2. Fraudulent Impressions: Source: Integral Ad Science based on ~80 bn impressions/month Total Advertising: 14% In 2013 over $6 billion dollars were pocketed by fraudsters! An Advertising Industry Epidemic: Everyone is affected Exchanges: 13% Networks: 15% Publisher Direct: 2%
  • 3. Fraud: Why Does It Take Place? Simple economics: Supply and Demand 3 3 1.  Supply and Demand 2. Poorly defined success metrics: Eyeballs (CPM) Action taken (CPC, CPA) 3. Because it’s cheap and easy for hackers
  • 4. 4 4 Back To The Basics Digital Fraud Dictionary Click fraud noun ˈklik frȯd imitation of legitimate click-through events on advertisements with no interest in link target Impression fraud noun ˈim-ˈpre-shəәn frȯd 1. imitation of legitimate impression views with no interest in ad content. 2. Solicitation of impressions with no opportunity to be viewed by a human Bots noun ˈbäts a device or piece of software that can execute commands, reply to messages, or perform routine tasks, or perform routine tasks with minimum human intervention Illegal bots noun (ˌ)i(l)-ˈlē-gəәlˈbäts computers that are compromised and whose security defenses have been breached and control conceded to a third party Botnet: noun ˈbät net a collection of bots communicating with command centers in order to perform tasks Pixel stuffing: noun ˈpik-səәl ˈstəә-fiŋ stuffing an entire ad-supported site into a 1x1 pixel Ad stacking: noun ˈad ˈsta-kiŋ placing multiple ads on top of each other in a single ad placement What fraud is not: •  Web crawlers •  Poor viewability; below the fold •  Collisions •  In-banner, auto- play, muted video
  • 5. Hacker: Sex: Male Age:18-35 Location: Eastern Europe, Asia Background: Good computer skills 5 5 Who Are The Participants? Profile Botnet Operator: Sex: Male Age: 34+ Location: Eastern Europe Characteristics: Disregard of the law, confident, driven by money Typical Infected Computer Owner: Technologically challenged Owns a dated computer and software Suburban, rural, household without kids Unlikely to own a smart phone/tablet
  • 6. 6 6 How Does It Work? Follow the bot Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
  • 7. At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe didn’t even know about it! 7 7 How Does It Work? Follow the bot Once upon a time Joe Schmo turned on his computer and installed a cleanup software.
  • 8. communicating with a botnet center. At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe didn’t even know about it! 8 8 How Does It Work? Follow the bot Once upon a time Joe Schmo turned on his computer and installed a cleanup software. Later that day, unbeknown to Joe, the bot engine started
  • 9. communicating with a botnet center. At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe didn’t even know about it! 9 9 How Does It Work? Follow the bot Once upon a time Joe Schmo turned on his computer and installed a cleanup software. Later that day, unbeknown to Joe, the bot engine started Joe’s bot was instructed on which sites to visit, in which sequence and at what frequency.
  • 10. communicating with a botnet center. At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe didn’t even know about it! 1 0 10 How Does It Work? Follow the bot Once upon a time Joe Schmo turned on his computer and installed a cleanup software. Later that day, unbeknown to Joe, the bot engine started Joe’s bot was instructed on which sites to visit, in which sequence and at what frequency. performed the script assigned by the botnet center through visiting high value audience sites to profile Joe as an ideal candidate for advertisers. According to instruction, Joe’s bot activated and
  • 11. communicating with a botnet center. At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe didn’t even know about it! 1 1 11 How Does It Work? Follow the bot Once upon a time Joe Schmo turned on his computer and installed a cleanup software. Later that day, unbeknown to Joe, the bot engine started Joe’s bot was instructed on which sites to visit, in which sequence and at what frequency. performed the script assigned by the botnet center through visiting high value audience sites to profile Joe as an ideal candidate for advertisers. According to instruction, Joe’s bot activated and The bot was also instructed to go to sites that sell bot traffic that generate millions of fraudulent ads.
  • 12. communicating with a botnet center. At that very moment a Trojan downloaded and installed a bot engine on Joe’s computer, and Joe didn’t even know about it! 1 2 12 How Does It Work? Follow the bot Once upon a time Joe Schmo turned on his computer and installed a cleanup software. Later that day, unbeknown to Joe, the bot engine started Joe’s bot was instructed on which sites to visit, in which sequence and at what frequency. performed the script assigned by the botnet center through visiting high value audience sites to profile Joe as an ideal candidate for advertisers. According to instruction, Joe’s bot activated and The bot was also instructed to go to sites that sell Meanwhile, the botnet operator sat back and counted his money, and Joe…well he didn’t read this story. And they all lived happily ever after. bot traffic that generate millions of fraudulent ads.
  • 14. Live Demonstration What does it look like? 14
  • 15. 1 5 15 So What Can We Do About It? Fighting Back Policing – FBI or private companies Pros: Bringing the criminals to justice Cons: Inefficient and ineffective – every botnet that is shut down is soon replaced by a new one Technology – The only way to cut the flow of cash Black lists – When fraud is detected a site is added to a blacklist Pros: Reactively shuts down supply to fraudsters Cons: Lists are not updated frequently Impression level detection and prevention Pros: Proactively shuts down supply to fraudsters; Detection at the impression level allows for scale Dynamic
  • 16. 1 6 16 How Is Fraud Detected? First we look at behavioral patterns We flag the following non-human signals: Cookies that are deleted at the end of activity cycle Intense activity Reoccurring activities patterns/levels At this point: some bots are detected, others are able to go undetected Next – we look at each impression •  Signals that are atypical for a human •  Density of page loads •  Density of page visits •  Atypical distribution of browsers •  Browser spoofing •  Conflicting measurement results •  Was the impression traded in a suspicious way Cross-validate all of the above and determine validity of signals and patterns Behavioral Pattern Bot …or not
  • 17. 1 7 17 So Who Is To Blame? Innocent bystanders: Legitimate advertisers and publishers Guilty: Botnet operators Those who knowingly buy/sell bot traffic
  • 18. 1 8 18 How Is The Industry Dealing With Fraud? Proactive Passive Pretend the problem doesn’t exist Knowingly or unknowingly buy and sell bot traffic Able to eliminate some of the bot traffic Eliminate all bot trafficAre serious about fraud: •  Use cutting edge technology to vet 100% of inventory Partially address the problem: •  Use a subpar solution •  Run the technology only on part of the inventory
  • 19. 1 9 19 The Integral Ad Science Solution Proactively Block Fraud Benefits: –  Proactively block fraud before the ad is served –  Dynamic data used to cross reference fraud signals –  Not relying on outdated, rarely updated black lists –  Pre-bid fraud solution prevents bidding on fraudulent inventory
  • 20. 20