12.07.2015 Views

Online Advertising Survival: Combating Click Fraud - University of ...

Online Advertising Survival: Combating Click Fraud - University of ...

Online Advertising Survival: Combating Click Fraud - University of ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12.4 User LocationIn general terms, user location is an attempt to identify the actual physical location <strong>of</strong>internet users.The common method is to take someone’s IP address and perform asearch at Whois information at ARIN (the American Registry for Internet Numbers).The primary purpose <strong>of</strong> the ARIN Whois database is to maintain information aboutnetworks allocated by ARIN, as well as to maintain information about how thosenetworks have been partitioned by ISP’s 58 . ARIN uses this information to keep track <strong>of</strong>who owns which network on the internet. If you cannot locate the IP address on ARIN,the IP address may be assigned outside the Americas, in which case RIPE NetworkCoordination Center for all Russian, European, and Middle Eastern registries, or the AsiaPacific Network Information Center may be helpful.The simplest application <strong>of</strong> user location is for preventing credit card fraud through amatching <strong>of</strong> the IP address <strong>of</strong> the online user to the physical owner address <strong>of</strong> thecardholder. However, it has relevance to click fraud as well. For the purposes <strong>of</strong> clickfraud detection, user location is used to filter out invalid clicks or fraudulent clicks onproducts or services only available in one country but clicks coming from another wherethe product or service is not available. This is most <strong>of</strong>ten associated with the low costworkers or click farms as described in 7.2.The problem with user location technology is the issue <strong>of</strong> error rates involved in theability to pinpoint web users. The example quoted most <strong>of</strong>ten involves a large internet58 Whois Databases, http://www.yourdictionary.com/whois-databases, Retrieved June 2, 200849

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!