[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3131365.3131393acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article
Public Access

Exploring the dynamics of search advertiser fraud

Published: 01 November 2017 Publication History

Abstract

Most search engines generate significant revenue through search advertising, wherein advertisements are served alongside traditional search results. These advertisements are attractive to advertisers because ads can be targeted and prominently presented to users at the exact moment that the user is searching for relevant topics.
Deceptive advertising is harmful to all legitimate actors in the search ad ecosystem: Users are less likely to find what they are looking for and may lose trust in ads or the search engine, advertisers lose potential revenue and face unfair competition from advertisers who are not playing by the rules, and the search engine's ecosystem suffers when both users and advertisers are unhappy.
This paper explores search advertiser fraud on Microsoft's Bing search engine platform. We characterize three areas: the scale of search advertiser fraud, the targeting and bidding behavior of fraudulent advertisers, and how fraudulent advertisers impact other advertisers in the ecosystem.

References

[1]
Bing ads policies change log. https://advertise.bingads.microsoft.com/en-us/resources/policies/bing-ads-policies-change-log.
[2]
S. A. Alrwais, C. W. Dunn, M. Gupta, A. Gerber, O. Spatscheck, and E. Osterweil. Dissecting ghost clicks: Ad fraud via misdirected human clicks. In Proc. Annual Computer Security Applications Conf., Dec. 2012.
[3]
M. Bisson. Bing Ads Auction Explained: How Bid, Cost-per-Click and Quality Score Work Together. https://advertise.bingads.microsoft.com/en-us/blog/post/september-2013/bing-ads-auction-explained-how-bid, - cost-per-click-and-quality-score-work-together.
[4]
N. Daswani and M. Stoppelman. The Anatomy of Clickbot. A. In Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007.
[5]
V. Dave, S. Guha, and Y. Zhang. Measuring and Fingerprinting Click-Spam in Ad Networks. In Proceedings of the ACM SIGCOMM Conference, Aug. 2012.
[6]
V. Dave, S. Guha, and Y. Zhang. ViceROI: Catching Click-Spam in Search Ad Networks. In Proceedings of the ACM Conference on Computer and Communications Security, Berlin, Germany, Nov. 2013.
[7]
S. Ford, M. Cova, C. Kruegel, and G. Vigna. Analyzing and Detecting Malicious Flash Advertisements. In Proc. Annual Computer Security Applications Conf., Dec. 2009.
[8]
Google. Verify your Google Account. https://support.google.com/accounts/answer/63950.
[9]
C. Grier, L. Ballard, J. Caballero, N. Chachra, C. J. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, M. Z. Rafique, M. A. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, and G. M. Voelker. Manufacturing Compromise: The Emergence of Exploit-as-a-Service. In Proceedings of the ACM Conference on Computer and Communications Security, pages 821--832, Raleigh, NC, Oct. 2012.
[10]
H. Haddadi. Fighting Online Click-Fraud Using Bluff Ads. SIGCOMM Comput. Commun. Rev., 40(2):21--25, Apr. 2010.
[11]
L. Heddings. Here's What Happens When You Install the Top 10 Download.com Apps. http://www.howtogeek.com/198622/heres-what-happens-when-you-install- the-top-10--download.com-apps/, Jan. 2015.
[12]
J. Hong. The State of Phishing Attacks. Commun. ACM, 55(1):74--81, Jan. 2012.
[13]
A. Juels, S. Stamm, and M. Jakobsson. Combating click fraud via premium clicks. In Proceedings of 16th USENIX Security Symposium, 2007.
[14]
M. Karami, S. Ghaemi, and D. Mccoy. Folex: An Analysis of an Herbal and Counterfeit Luxury Goods Affiliate Program. In IEEE eCrime Research Summit, San Francisco, CA, Sept. 2013.
[15]
Z. Li, K. Zhang, Y. Xie, F. Yu, and X. Wang. Knowing your enemy: Understanding and detecting malicious web advertising. In Proceedings of the ACM Conference on Computer and Communications Security, Oct. 2012.
[16]
B. Liu, S. Nath, R. Govindan, and J. Liu. DECAF: Detecting and characterizing ad fraud in mobile apps. In Proceedings of the 11th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2014.
[17]
A. Metwally, D. Agrawal, and A. El Abbadi. DETECTIVES: Detecting coalition hit inflation attacks in advertising networks streams. www, pages 241--250, 2007.
[18]
A. Metwally, F. Emekçi, D. Agrawal, and A. El Abbadi. SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting. PVLDB, 1(2):1217--1228, Aug. 2008.
[19]
Microsoft. Ad policies and guidelines - bing ads. https://advertise.bingads.microsoft.com/en-us/resources/bing-ads-policies.
[20]
Microsoft. Keyword match type options. https://advertise.bingads.microsoft.com/en-us/resources/training/keyword-match-options.
[21]
Microsoft. Recent Changes to Improve Account Security in Bing Ads. http://advertise.bingads.microsoft.com/en-us/blog/27853/recent-changes-to-improve-account-security-in-bing-ads, Sept. 2013.
[22]
Microsoft. 5 Best Practices When Signing in to Bing Ads with a Microsoft Account. http://advertise.bingads.microsoft.com/en-in/blog/28115/5-best-practices-when-signing-in-to-bing-ads-with-a-microsoft-account, Jan. 2014.
[23]
B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson. What's Clicking What? Techniques and Innovations of Today's Clickbots. DIMVA, pages 164--183, 2011.
[24]
P. Pearce, V. Dave, C. Grier, K. Levchenko, S. Guha, D. McCoy, V. Paxson, S. Savage, and G. M. Voelker. Characterizing Large-Scale Click Fraud in ZeroAccess. In Proceedings of the ACM Conference on Computer and Communications Security, Scottsdale, Arizona, Nov. 2014.
[25]
C. Reis, S. D. Gribble, T. Kohno, and N. C. Weaver. Detecting in-flight page changes with web tripwires. In Proceedings of the 5th ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2008.
[26]
F. Research. US Digital Marketing Forecast, 2014 To 2019. https://www.forrester.com/report/US+Digital+Marketing+Forecast+2014+To+2019/-/E-RES116965.
[27]
K. Springborn and P. Barford. Impression fraud in on-line advertising via pay-per-view networks. In Proceedings of the USENIX Security Symposium, Aug. 2013.
[28]
B. Stone-Gross, R. Stevens, A. Zarras, R. Kemmerer, C. Kruegel, and G. Vigna. Understanding fraudulent activities in online ad exchanges. In Proc. Internet Measurement Conf., Nov. 2011.
[29]
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson. Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse. In Proceedings of USENIX Security Symposium, Aug. 2013.
[30]
B. Vattikonda, V. Dave, S. Guha, and A. C. Snoeren. Empirical Analysis of Search Advertising Strategies. In Proceedings of the ACM Internet Measurement Conference, Tokyo, Japan, Oct. 2015.
[31]
B. C. Vattikonda, S. Kodipaka, H. Zhou, V. Dave, S. Guha, and A. C. Snoeren. Interpreting Advertiser Intent in Sponsored Search. In Proceedings of the ACM SIGKDD Conference, Aug. 2015.
[32]
D. Wang, M. Der, M. Karami, L. Saul, D. McCoy, S. Savage, and G. M. Voelker. Search + seizure: The effectiveness of interventions on seo campaigns. In Proceedings of the ACM Internet Measurement Conference, Vancouver, BC, Canada, Nov. 2014.
[33]
D. Wang, S. Savage, and G. M. Voelker. Cloak and Dagger: Dynamics of Web Search Cloaking. In Proceedings of the ACM Conference on Computer and Communications Security, pages 477--490, Chicago, IL, Oct. 2011.
[34]
Y.-M. Wang and M. Ma. Detecting Stealth Web Pages That Use Click-Through Cloaking. Technical Report MSR-TR-2006-178, Microsoft Research, December 2006.
[35]
Squeeze page. https://en.wikipedia.org/wiki/Squeeze_page.
[36]
B. Wu and B. D. Davison. Detecting Semantic Cloaking on the Web. In Proceedings of the 15th International World Wide Web Conference, pages 819--828, May 2006.
[37]
A. Zarras, A. Kapravelos, G. Stringhini, T. Holz, C. Kruegel, and G. Vigna. The dark alleys of Madison Avenue: Understanding malicious advertisements. In Proceedings of the ACM Internet Measurement Conference, Nov. 2014.
[38]
Q. Zhang, T. Ristenpart, S. Savage, and G. M. Voelker. Got Traffic? An Evaluation of Click Traffic Providers. In Proceedings of the WICOM/AlRWeb Workshop on Web Quality (WebQuality), pages 19--26, Hyderabad, India, Mar. 2011.

Cited By

View all
  • (2022)Who Moves My App Promotion Investment? A Systematic Study About App Distribution FraudIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.306820919:4(2648-2664)Online publication date: 1-Jul-2022
  • (2022)InformationskompetenzKompetenzmodelle für den Digitalen Wandel10.1007/978-3-662-63673-2_4(67-98)Online publication date: 25-Mar-2022
  • (2021)Ads and Fraud: A Comprehensive Survey of Fraud in Online AdvertisingJournal of Cybersecurity and Privacy10.3390/jcp10400391:4(804-832)Online publication date: 16-Dec-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IMC '17: Proceedings of the 2017 Internet Measurement Conference
November 2017
509 pages
ISBN:9781450351188
DOI:10.1145/3131365
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

  • USENIX Assoc: USENIX Assoc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fraud
  2. phishing
  3. search advertising
  4. spam
  5. trademark infringement

Qualifiers

  • Research-article

Funding Sources

Conference

IMC '17
IMC '17: Internet Measurement Conference
November 1 - 3, 2017
London, United Kingdom

Acceptance Rates

Overall Acceptance Rate 277 of 1,083 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)410
  • Downloads (Last 6 weeks)18
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Who Moves My App Promotion Investment? A Systematic Study About App Distribution FraudIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.306820919:4(2648-2664)Online publication date: 1-Jul-2022
  • (2022)InformationskompetenzKompetenzmodelle für den Digitalen Wandel10.1007/978-3-662-63673-2_4(67-98)Online publication date: 25-Mar-2022
  • (2021)Ads and Fraud: A Comprehensive Survey of Fraud in Online AdvertisingJournal of Cybersecurity and Privacy10.3390/jcp10400391:4(804-832)Online publication date: 16-Dec-2021
  • (2021)RacketStoreProceedings of the 21st ACM Internet Measurement Conference10.1145/3487552.3487837(639-657)Online publication date: 2-Nov-2021
  • (2021)Exploiting the Community Structure of Fraudulent Keywords for Fraud Detection in Web SearchJournal of Computer Science and Technology10.1007/s11390-021-0218-236:5(1167-1183)Online publication date: 30-Sep-2021
  • (2021)A Study of the Partnership Between Advertisers and PublishersPassive and Active Measurement10.1007/978-3-030-72582-2_33(564-580)Online publication date: 30-Mar-2021
  • (2020)A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW51379.2020.00072(494-499)Online publication date: Sep-2020
  • (2019)TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis2019 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2019.00047(560-575)Online publication date: Jun-2019
  • (2018)Exposing Search and Advertisement Abuse Tactics and Infrastructure of Technical Support ScammersProceedings of the 2018 World Wide Web Conference10.1145/3178876.3186098(319-328)Online publication date: 10-Apr-2018

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media