SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Digital Ad Fraud
Countermeasures
Dr. Augustine Fou
http://linkd.in/augustinefou
acfou @mktsci .com
January 2014
-1-

Augustine Fou
“Digital ad fraud is well known and well
documented. However, the magnitude of it may
not yet be well understood. Furthermore,
‘industry constituencies [may be] insufficiently
motivated’ (Source: IAB) to act ferociously to
deter and reduce these fraudulent activities.”
-- Dr. Augustine Fou
-2-

Augustine Fou
Blacklisting Sites
Value
Exclude sites from
serving your ads

-3-

Caveat
For every site
excluded, bad guys put
up more (because they
don‟t have to play by the
rules).

Augustine Fou
Enforcing Viewability
Value

Caveat

Only pay for ads which
are viewable (i.e. above
the-fold)

Bad guys have already
defeated “viewability” by
stuffing ads in hidden
layers, all above-the-fold.

Source: Spider.io May 2, 2013

-4-

Augustine Fou
Bot Detection
Value

Caveat

Good guys use algorithms
to detect unusual
behaviors indicative of
bots (rather than humans)

It’s an arms race between
good and bad; bots are more
sophisticated and can fake
mouse movements and keep
cookies.

Source: Spider.io March 2013
-5-

Augustine Fou
Using CAPTCHAs
Value

Caveat

Captchas deter bots from
filling in forms and stealing
content and cookies.

Some bots can now solve some
captchas, most captchas don’t
protect content pages.

Source: Solve Media Dec 31 2013
-6-

“Startup called Vicarious
automatically solves
CAPTCHAs.” Oct 2013
http://bit.ly/1bFo9lZ
Augustine Fou
“The above countermeasures are all good, and
advertisers should continue using them. But they are not
enough. If the good guys fight the fight individually,
there is little chance they can overcome the entire
ecosystem of the bad guys. The good guys need to band
together into their own ecosystem and put the bad guys
on a „digital ad fraud equivalent to the National Sex
Offenders Registry‟.”
-- Dr. Augustine Fou

-7-

Augustine Fou
Digital Ad Fraud
Backgrounder
-8-

Augustine Fou
Why Now?
“As more ad inventory is bought and sold
programmatically on ad exchanges, bad
guys are finding it far easier to commit
fraud because few agencies and advertisers
actually check in detail the hundreds of
thousands of sites on which the ads are run.
It‟s easier to hide in a far larger haystack.”
-- Dr. Augustine Fou
-9-

Augustine Fou
Waste Due to Fraud
• Display ad fraud is the easiest to commit and bad guys
sell tons of “junk” inventory into ad exchanges; ad buyers
are goaled on number of impressions so that perpetuates
the problem.

30-75%

• Video ad fraud is the new area of focus because video ad
impressions are 10x more lucrative than display; ad
buyers are goaled on “tonnage” of impressions and
therefore perpetuate the problem.

50-80%

• Search ad click fraud is harder to commit and usually
occurs on “search partner network” sites; but high
spending categories like insurance and high CPC
categories like pharma are favorite targets of the bad guys
who can earn $78 per click.

20-40%

- 10 -

Augustine Fou
Types of Ad Fraud
Impressions

Clicks

Leads

Sales

(CPM fraud)

(CPC fraud)

(CPL fraud)

(CPA fraud)

Bot or low
wage workers
fill in lead
forms with real
addresses and
get paid bounty
per lead.

Fake sites set
up to do cookie
stuffing or trick
users to click
on affiliate
links to earn rev
share.

Botnets
generate fake
pageviews
which produce
ad impression
“inventory” that
is sold into ad
exchanges.

- 11 -

Bots type
search queries
to bring up
search ads and
then click on
the ads to earn
share of CPC.

Augustine Fou
How Impression (CPM)
Ad Fraud Works
- 12 -

Augustine Fou
Bad Guys Put Up Sites
site = analyzecanceradvice .com

site = missomoms.com

19 blocked ads on page

- 13 -

Augustine Fou
Load Tons of Ads on Pages

http://modernbab y.com/
http://interiorcom plex.com/

- 14 -

Augustine Fou
Fake their “Viewability”
Ads are above the
fold of the page
But their pixel
opacity can be set
to zero (invisible)
Entire web pages
stuffed into ad
iframe; ads counted
as viewable
Source: Spider.io May 2, 2013
- 15 -

Augustine Fou
Use Bots to Load the Pages
Source: Google

Source: Wired

- 16 -

Augustine Fou
Sell Bulk Impressions
“Modernbaby.com and Interiorcomplex.com
Each of these sites peddles enormous traffic on the
exchanges. For example, on a recent day Modern
Baby was offering 19 million impressions via one
exchange (quite the baby boom) and Interior
Complex 30 million [ad impressions PER DAY] (the
roaring housing market must be back).”
Source:
Adweek – Suspicious Web Domains Cost Online Ad
Business $400m per Year
By Mike Shields
- 17 -

Augustine Fou
How Search (CPC)
Click Fraud Works
- 18 -

Augustine Fou
Bad Guys Choose Expensive Keywords
olay.com

homemadesimple.com

> 100,000 monthly searches
avg position 1 – 10
sort by highest avg CPC
“cosmetic face lift”

“residential home cleaning”

$10.84 CPC

$9.95 CPC

Source: iSpionage Nov 2013
- 19 -

Augustine Fou
Bots Type Search Term
healthsiteproduc tionalways.com

buy eye cream online

- 20 -

Augustine Fou
Bots Click Search Ad

Olay.com ad
in #1 position

- 21 -

Augustine Fou
Pass Fake URL Trackers
http://www.olay.com/skincare-products/OlayProX?utm_source=msn&utm
_medium=cpc&utm_camp
aign=Olay_Search_Deskto
p_Category+Interest+Prod
uct.Phrase&utm_term=eye
%20cream&utm_content=
TZsrSzFz_eye%20cream_
p_2990456911

Click thru URL
passing fake source
- 22 -

Augustine Fou
Related Articles
Digital Ad Fraud Briefing
By: Augustine Fou December 2013

Fake YouTube Videos
By: Augustine Fou, December 2013

Ad Fraud Fighting Techniques
By: Augustine Fou October 2013

Fake Linkedin Profiles
By: Augustine Fou, December 2013

How Display Fraud Works
By: Augustine Fou, May 2013

Fake Facebook Profiles
By: Augustine Fou, Dec 2013

How Click Fraud Works
By: Augustine Fou, November 2013

Fake Twitter Accounts
By: Augustine Fou, August 2013

The Magnitude of Digital Ad Fraud
By: Augustine Fou, November 2013
- 23 -

Augustine Fou
Dr. Augustine Fou – Digital Consigliere
“I advise clients on optimizing
advertising across all channels. One
main area of focus is reducing ad waste
due to fraud – fake impressions, clicks,
leads, and sales – in order to raise ROI.”
FORMER CHIEF DIGITAL OFFICER, HCG (OMNICOM)
MCKINSEY CONSULTANT
CLIENT SIDE / AGENCY SIDE EXPERIENCE
PROFESSOR AND COLUMNIST
ENTREPRENEUR / SMALL BUSINESS OWNER
PHD MATERIALS SCIENCE (MIT '95) AT AGE 23

ClickZ Articles: http://bit.ly/augustine-fou-clickz
Slideshares: http://bit.ly/augustine-fou-slideshares
LinkedIn: http://linkd.in/augustinefou

- 24 -

@acfou

Augustine Fou

Weitere ähnliche Inhalte

Andere mochten auch

Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
polichen
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasures
guestc27cd9
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.
Marko Kovic
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows Threats
Darwish Ahmad
 
Google Hacking for Cryptographic Secrets
Google Hacking for Cryptographic SecretsGoogle Hacking for Cryptographic Secrets
Google Hacking for Cryptographic Secrets
Dr. Emin İslam Tatlı
 
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root CausesOwasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root Causes
Marco Morana
 
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
CODE BLUE
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
Aung Thu Rha Hein
 

Andere mochten auch (18)

VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and CountermeasuresBone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
Bone Loss in Long-Duration Spaceflight: Measurements and Countermeasures
 
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
Table 4: Unit 4 Reactor: Fukushima Daiichi Nuclear Power Plant - 18 May 2011
 
Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Iis Security Programming Countermeasures
Iis Security Programming CountermeasuresIis Security Programming Countermeasures
Iis Security Programming Countermeasures
 
Return oriented programming
Return oriented programmingReturn oriented programming
Return oriented programming
 
Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.Digital Astroturfing: Definition, typology, and countermeasures.
Digital Astroturfing: Definition, typology, and countermeasures.
 
Designing Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows ThreatsDesigning Countermeasures For Tomorrows Threats
Designing Countermeasures For Tomorrows Threats
 
Webinar Gratuito: "Herramientas Graficas en Kali Linux 2.0"
Webinar Gratuito: "Herramientas Graficas en Kali Linux 2.0"Webinar Gratuito: "Herramientas Graficas en Kali Linux 2.0"
Webinar Gratuito: "Herramientas Graficas en Kali Linux 2.0"
 
Google Hacking for Cryptographic Secrets
Google Hacking for Cryptographic SecretsGoogle Hacking for Cryptographic Secrets
Google Hacking for Cryptographic Secrets
 
Irregularity Countermeasures in Massively Parallel BigData Processors
Irregularity Countermeasures in Massively Parallel BigData ProcessorsIrregularity Countermeasures in Massively Parallel BigData Processors
Irregularity Countermeasures in Massively Parallel BigData Processors
 
Owasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root CausesOwasp Top 10 And Security Flaw Root Causes
Owasp Top 10 And Security Flaw Root Causes
 
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
[CB16] Air-Gap security: State-of-the-art Attacks, Analysis, and Mitigation b...
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Root cause analysis apr 2010
Root cause analysis apr 2010Root cause analysis apr 2010
Root cause analysis apr 2010
 
Java ist doch schon sicher?!
Java ist doch schon sicher?!Java ist doch schon sicher?!
Java ist doch schon sicher?!
 

Mehr von Dr. Augustine Fou - Independent Ad Fraud Researcher

Mehr von Dr. Augustine Fou - Independent Ad Fraud Researcher (20)

Forensic Auditing of Digital Media.pdf
Forensic Auditing of Digital Media.pdfForensic Auditing of Digital Media.pdf
Forensic Auditing of Digital Media.pdf
 
Q1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMMQ1 2022 Update on ad fraud for AMM
Q1 2022 Update on ad fraud for AMM
 
Ad blocking benchmarks q4 2021
Ad blocking benchmarks q4 2021Ad blocking benchmarks q4 2021
Ad blocking benchmarks q4 2021
 
Digital ad dollars trickle down chart
Digital ad dollars trickle down chartDigital ad dollars trickle down chart
Digital ad dollars trickle down chart
 
Still nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fouStill nothing but ad fraud 2021 dr augustine fou
Still nothing but ad fraud 2021 dr augustine fou
 
Bad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiencyBad guys optimize ad fraud efficiency
Bad guys optimize ad fraud efficiency
 
Alternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v finalAlternative to ANA's end to end supply chain transparency study v final
Alternative to ANA's end to end supply chain transparency study v final
 
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad RevenueImpact of Loss of 3P Cookies on Publishers' Ad Revenue
Impact of Loss of 3P Cookies on Publishers' Ad Revenue
 
Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018Entire ecosystem supporting ad fraud 2018
Entire ecosystem supporting ad fraud 2018
 
Digital Media Trust Collaborative
Digital Media Trust CollaborativeDigital Media Trust Collaborative
Digital Media Trust Collaborative
 
Programmatic reach analysis 2021
Programmatic reach analysis 2021Programmatic reach analysis 2021
Programmatic reach analysis 2021
 
2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy2021 update on ad fraud brand safety privacy
2021 update on ad fraud brand safety privacy
 
Browser and OS Share Jan 2021
Browser and OS Share Jan 2021Browser and OS Share Jan 2021
Browser and OS Share Jan 2021
 
Checking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analyticsChecking abnormal referrer traffic in google analytics
Checking abnormal referrer traffic in google analytics
 
History and Impact of Digital Ad Fraud
History and Impact of Digital Ad FraudHistory and Impact of Digital Ad Fraud
History and Impact of Digital Ad Fraud
 
Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020Digital Fraud Viewability Benchmarks Q4 2020
Digital Fraud Viewability Benchmarks Q4 2020
 
What CFEs can do about digital ad fraud
What CFEs can do about digital ad fraudWhat CFEs can do about digital ad fraud
What CFEs can do about digital ad fraud
 
Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020Four types of digital ad spend updated august 2020
Four types of digital ad spend updated august 2020
 
How to Use FouAnalytics For Marketers
How to Use FouAnalytics   For MarketersHow to Use FouAnalytics   For Marketers
How to Use FouAnalytics For Marketers
 
FouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked inFouAnalytics DIY site media analytics fraud detection baked in
FouAnalytics DIY site media analytics fraud detection baked in
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Digital Ad Fraud Countermeasures by Augustine Fou

  • 1. Digital Ad Fraud Countermeasures Dr. Augustine Fou http://linkd.in/augustinefou acfou @mktsci .com January 2014 -1- Augustine Fou
  • 2. “Digital ad fraud is well known and well documented. However, the magnitude of it may not yet be well understood. Furthermore, ‘industry constituencies [may be] insufficiently motivated’ (Source: IAB) to act ferociously to deter and reduce these fraudulent activities.” -- Dr. Augustine Fou -2- Augustine Fou
  • 3. Blacklisting Sites Value Exclude sites from serving your ads -3- Caveat For every site excluded, bad guys put up more (because they don‟t have to play by the rules). Augustine Fou
  • 4. Enforcing Viewability Value Caveat Only pay for ads which are viewable (i.e. above the-fold) Bad guys have already defeated “viewability” by stuffing ads in hidden layers, all above-the-fold. Source: Spider.io May 2, 2013 -4- Augustine Fou
  • 5. Bot Detection Value Caveat Good guys use algorithms to detect unusual behaviors indicative of bots (rather than humans) It’s an arms race between good and bad; bots are more sophisticated and can fake mouse movements and keep cookies. Source: Spider.io March 2013 -5- Augustine Fou
  • 6. Using CAPTCHAs Value Caveat Captchas deter bots from filling in forms and stealing content and cookies. Some bots can now solve some captchas, most captchas don’t protect content pages. Source: Solve Media Dec 31 2013 -6- “Startup called Vicarious automatically solves CAPTCHAs.” Oct 2013 http://bit.ly/1bFo9lZ Augustine Fou
  • 7. “The above countermeasures are all good, and advertisers should continue using them. But they are not enough. If the good guys fight the fight individually, there is little chance they can overcome the entire ecosystem of the bad guys. The good guys need to band together into their own ecosystem and put the bad guys on a „digital ad fraud equivalent to the National Sex Offenders Registry‟.” -- Dr. Augustine Fou -7- Augustine Fou
  • 9. Why Now? “As more ad inventory is bought and sold programmatically on ad exchanges, bad guys are finding it far easier to commit fraud because few agencies and advertisers actually check in detail the hundreds of thousands of sites on which the ads are run. It‟s easier to hide in a far larger haystack.” -- Dr. Augustine Fou -9- Augustine Fou
  • 10. Waste Due to Fraud • Display ad fraud is the easiest to commit and bad guys sell tons of “junk” inventory into ad exchanges; ad buyers are goaled on number of impressions so that perpetuates the problem. 30-75% • Video ad fraud is the new area of focus because video ad impressions are 10x more lucrative than display; ad buyers are goaled on “tonnage” of impressions and therefore perpetuate the problem. 50-80% • Search ad click fraud is harder to commit and usually occurs on “search partner network” sites; but high spending categories like insurance and high CPC categories like pharma are favorite targets of the bad guys who can earn $78 per click. 20-40% - 10 - Augustine Fou
  • 11. Types of Ad Fraud Impressions Clicks Leads Sales (CPM fraud) (CPC fraud) (CPL fraud) (CPA fraud) Bot or low wage workers fill in lead forms with real addresses and get paid bounty per lead. Fake sites set up to do cookie stuffing or trick users to click on affiliate links to earn rev share. Botnets generate fake pageviews which produce ad impression “inventory” that is sold into ad exchanges. - 11 - Bots type search queries to bring up search ads and then click on the ads to earn share of CPC. Augustine Fou
  • 12. How Impression (CPM) Ad Fraud Works - 12 - Augustine Fou
  • 13. Bad Guys Put Up Sites site = analyzecanceradvice .com site = missomoms.com 19 blocked ads on page - 13 - Augustine Fou
  • 14. Load Tons of Ads on Pages http://modernbab y.com/ http://interiorcom plex.com/ - 14 - Augustine Fou
  • 15. Fake their “Viewability” Ads are above the fold of the page But their pixel opacity can be set to zero (invisible) Entire web pages stuffed into ad iframe; ads counted as viewable Source: Spider.io May 2, 2013 - 15 - Augustine Fou
  • 16. Use Bots to Load the Pages Source: Google Source: Wired - 16 - Augustine Fou
  • 17. Sell Bulk Impressions “Modernbaby.com and Interiorcomplex.com Each of these sites peddles enormous traffic on the exchanges. For example, on a recent day Modern Baby was offering 19 million impressions via one exchange (quite the baby boom) and Interior Complex 30 million [ad impressions PER DAY] (the roaring housing market must be back).” Source: Adweek – Suspicious Web Domains Cost Online Ad Business $400m per Year By Mike Shields - 17 - Augustine Fou
  • 18. How Search (CPC) Click Fraud Works - 18 - Augustine Fou
  • 19. Bad Guys Choose Expensive Keywords olay.com homemadesimple.com > 100,000 monthly searches avg position 1 – 10 sort by highest avg CPC “cosmetic face lift” “residential home cleaning” $10.84 CPC $9.95 CPC Source: iSpionage Nov 2013 - 19 - Augustine Fou
  • 20. Bots Type Search Term healthsiteproduc tionalways.com buy eye cream online - 20 - Augustine Fou
  • 21. Bots Click Search Ad Olay.com ad in #1 position - 21 - Augustine Fou
  • 22. Pass Fake URL Trackers http://www.olay.com/skincare-products/OlayProX?utm_source=msn&utm _medium=cpc&utm_camp aign=Olay_Search_Deskto p_Category+Interest+Prod uct.Phrase&utm_term=eye %20cream&utm_content= TZsrSzFz_eye%20cream_ p_2990456911 Click thru URL passing fake source - 22 - Augustine Fou
  • 23. Related Articles Digital Ad Fraud Briefing By: Augustine Fou December 2013 Fake YouTube Videos By: Augustine Fou, December 2013 Ad Fraud Fighting Techniques By: Augustine Fou October 2013 Fake Linkedin Profiles By: Augustine Fou, December 2013 How Display Fraud Works By: Augustine Fou, May 2013 Fake Facebook Profiles By: Augustine Fou, Dec 2013 How Click Fraud Works By: Augustine Fou, November 2013 Fake Twitter Accounts By: Augustine Fou, August 2013 The Magnitude of Digital Ad Fraud By: Augustine Fou, November 2013 - 23 - Augustine Fou
  • 24. Dr. Augustine Fou – Digital Consigliere “I advise clients on optimizing advertising across all channels. One main area of focus is reducing ad waste due to fraud – fake impressions, clicks, leads, and sales – in order to raise ROI.” FORMER CHIEF DIGITAL OFFICER, HCG (OMNICOM) MCKINSEY CONSULTANT CLIENT SIDE / AGENCY SIDE EXPERIENCE PROFESSOR AND COLUMNIST ENTREPRENEUR / SMALL BUSINESS OWNER PHD MATERIALS SCIENCE (MIT '95) AT AGE 23 ClickZ Articles: http://bit.ly/augustine-fou-clickz Slideshares: http://bit.ly/augustine-fou-slideshares LinkedIn: http://linkd.in/augustinefou - 24 - @acfou Augustine Fou