Menu
Online ad industry tries to stamp out click fraud

Online ad industry tries to stamp out click fraud

A new blacklist will try to spot bad ad traffic coming from datacentres

The online advertising industry is marshaling a fresh effort to fight click fraud, which steals money from advertisers and undermines faith in online campaigns.

The latest effort is focused on automated traffic caused by bots from within data centers that is intended to trigger ad impressions, according to the Trustworthy Accountability Group (TAG), an industry body.

TAG is going to initially use a blacklist maintained by Google that lists suspicious IP addresses of computers in data centers that may be trying to replicate human clicks on advertisements. Ad-focused technology companies, including Facebook and Yahoo, will also contribute.

A study from the National Association of Advertisers last December estimated marketers would lose US$6.3 billion this year to click fraud out of a total of $48 billion in spending on video and display ads.

A long running effort has been under way to detect and block fraudulent clicks in order to keep online advertising rates from falling and stem doubts about its effectiveness. But fraudsters continue to innovate new ways to cheat the industry.

Some unscrupulous publishers have been harnessing the power of virtual machines in data centers, wrote Vegard Johnsen, a Google product manager for Ad Traffic Quality, on a company blog post.

Click fraudsters have been using a program called UrlSpirit to generate fake clicks on ads. URLs are submitted to the application, which then uses Internet Explorer to visit the list of websites. Many copies of the program may run in a data center, generating large numbers of fake clicks.

"In aggregate, the data-center installations of UrlSpirit were generating a monthly rate of at least half a billion ad requests -- an average of 2,500 fraudulent ad requests per installation per day," he wrote.

Another fake click program is called HitLeap. Instead of Internet Explorer, it uses the Chromium Embedded Framework to visit Web pages for a certain amount of time specified by a publishers, Johnsen wrote.

HitLeap requires its users to earn "browsing" minutes, which are collected by running the application on their computer. Browsing minutes can also be purchased for $9 for 10,000 minutes.

"For example, 10 browsing minutes will get a publisher five visits if the publisher requests two-minute visit durations," he wrote.

About 16 percent of HitLeap's total network was installed on virtual machines within data centers as of mid-June. Many of the websites visited by HitLeap were entirely constructed in order to carry out click fraud.

"For example, of the top ten webpages visited by HitLeap bots in June, nine of these included hidden ad slots -- meaning that not only was the traffic fake, but the ads couldn't have been seen even if they had been legitimate human visitors," he wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags advertisingYahooGooglesecurityTrustworthy Accountability GroupinternetfraudFacebook

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Show Comments