17.08.2015 Views

The Bot Baseline Fraud in Digital Advertising

1NBjsKK

1NBjsKK

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>The</strong> <strong>Bot</strong> <strong>Basel<strong>in</strong>e</strong>:<strong>Fraud</strong> <strong>in</strong> <strong>Digital</strong>Advertis<strong>in</strong>gWhite Ops, Inc.Association of National AdvertisersDECEMBER 2014


TABLE OF CONTENTS05 About the Study10 <strong>The</strong> Impact of <strong>Bot</strong>s on <strong>Digital</strong> Media18 Challeng<strong>in</strong>g Exist<strong>in</strong>g Assumptions: <strong>Bot</strong>s Can End Up on Premium Sites22 <strong>The</strong> Orig<strong>in</strong> of <strong>Bot</strong>s <strong>in</strong> the Media Supply Cha<strong>in</strong>28 How the <strong>Bot</strong>s Blend In: Gett<strong>in</strong>g Targeted, Fak<strong>in</strong>g Metrics33 How <strong>Bot</strong> Suppliers Get Away With It: Evasion37 Sites That Only a <strong>Bot</strong> Could Love41 When Publishers Are Victims Too: Ad Injection44 Elim<strong>in</strong>at<strong>in</strong>g <strong>Bot</strong> <strong>Fraud</strong>: A Call to ActionAppendix A: Glossary of TermsAppendix B: Constra<strong>in</strong>ts and LimitationsAppendix C: External Study ContributorsAppendix D: Illustrative Terms and Conditions02


Special Thanks to the Follow<strong>in</strong>gANA Member Company Participants03


ABOUT WHITE OPSA pioneer <strong>in</strong> the detection of bots and malware on the web, White Ops develops newbot detection technologies to differentiate between bot and human <strong>in</strong>teraction.<strong>Bot</strong> detection makes bot/human decisions <strong>in</strong> onl<strong>in</strong>e advertis<strong>in</strong>g, publish<strong>in</strong>g, enterprisebus<strong>in</strong>ess networks, e-commerce transactions, and f<strong>in</strong>ancial systems. White Opsprotects clients from bot fraud by cutt<strong>in</strong>g off sources of bad traffic to make botand malware fraud unprofitable and unsusta<strong>in</strong>able.ABOUT THE ANA<strong>The</strong> ANA (Association of National Advertisers) provides leadership that advancesmarket<strong>in</strong>g excellence and shapes the future of the <strong>in</strong>dustry. Founded <strong>in</strong> 1910, the ANA’smembership <strong>in</strong>cludes more than 640 companies with 10,000 brands that collectivelyspend over $250 billion <strong>in</strong> market<strong>in</strong>g and advertis<strong>in</strong>g. <strong>The</strong> ANA also <strong>in</strong>cludes theBus<strong>in</strong>ess Market<strong>in</strong>g Association (BMA) and the Brand Activation Association (BAA),which operate as divisions of the ANA. <strong>The</strong> ANA advances the <strong>in</strong>terests of marketersand promotes and protects the well-be<strong>in</strong>g of the market<strong>in</strong>g community.04


ABOUT THE STUDY


EXECUTIVE SUMMARYWe expected to f<strong>in</strong>d bot-focused websites with noth<strong>in</strong>g but a bot audience, but out of nearly three million websites covered <strong>in</strong> thestudy, mere thousands were completely built for bots. Most of the bots visited real websites run by real companies with real humanvisitors. Those bots <strong>in</strong>flated the monetized audiences at those sites by 5 to 50 percent.Global advertisers will lose$6.3 billion to bots <strong>in</strong> 2015At current bot rates, advertisers will lose approximately $6.3 billionglobally to bots <strong>in</strong> 2015 (apply<strong>in</strong>g the bot levels observed across our studyto the estimated $40 billion spent globally on display ads and the estimated$8.3 billion spent globally on video ads).Ad fraud gets home users hacked<strong>Bot</strong> traffic comes from everyday computers that have been hacked. Over67 percent of bot traffic observed <strong>in</strong> the study came from residential IPaddresses. <strong>Bot</strong> traffickers remotely control home computers to generatead fraud profits. <strong>Bot</strong>s hijack browsers to masquerade as real users, blend<strong>in</strong> with human traffic, and generate more revenue.Ad bots defeat user target<strong>in</strong>gAfter <strong>in</strong>filtrat<strong>in</strong>g home computers with malware, cybercrim<strong>in</strong>als make realmoney from their victims by <strong>in</strong>stall<strong>in</strong>g ad bots. By us<strong>in</strong>g the computers of realpeople—people who are logged <strong>in</strong> to Gmail, shar<strong>in</strong>g on Facebook, and buy<strong>in</strong>gon Amazon—the bots do not just blend <strong>in</strong>, they get targeted.<strong>Bot</strong>s coast on the credentials of the real users of the computers they hijack.<strong>Bot</strong>s were observed to click more often (but not improbably more often) thanreal people. Sophisticated bots moved the mouse, mak<strong>in</strong>g sure to move thecursor over ads. <strong>Bot</strong>s put items <strong>in</strong> shopp<strong>in</strong>g carts and visited many sites togenerate histories and cookies to appear more demographically appeal<strong>in</strong>g toadvertisers and publishers.06


BOTS ARE EVERYWHERE...BUT NOT IN EQUAL NUMBERS<strong>The</strong> study <strong>in</strong>cluded a diverse range of brands, across n<strong>in</strong>e vertical categories, with total annual U.S. ad budgets from under$10 million to over $1 billion, as measured by Kantar. <strong>The</strong> magnitude of the participants’ ad spend<strong>in</strong>g had no correlation with thelevel of bots observed.<strong>Bot</strong> percentages <strong>in</strong> our data skewed high:At nightApproximately half the bots caught were not sophisticatedenough to keep daylight hours.In display<strong>Bot</strong>s accounted for 11 percent of all display impressions observed.In video<strong>Bot</strong>s accounted for 23 percent of all video impressions observed.$$In programmatic and retargeted <strong>in</strong>ventory<strong>Bot</strong> traffic <strong>in</strong> programmatic <strong>in</strong>ventory averaged 17 percent. <strong>Bot</strong>s consumed19 percent of retargeted ads.In sourced trafficThird-party traffic sourc<strong>in</strong>g resulted <strong>in</strong> 52 percent bot fraud.In specific doma<strong>in</strong> categoriesF<strong>in</strong>ance, family, and food doma<strong>in</strong>s showed <strong>in</strong>creased bot traffic,rang<strong>in</strong>g from 16 to 22 percent bots.07


GOALS AND METHODOLOGY<strong>Bot</strong>s are software scripts <strong>in</strong> networks of computers that are controlled by a s<strong>in</strong>gle entity as part of a botnet. <strong>The</strong> botnetcontroller can cause the computers <strong>in</strong> its botnet to execute a variety of behaviors and goals, <strong>in</strong>clud<strong>in</strong>g advertis<strong>in</strong>g fraud, onl<strong>in</strong>ebank robbery, identity theft, and distributed denial of service (DDOS) attacks. When execut<strong>in</strong>g ad fraud, the botnet controllercauses the computers <strong>in</strong> its botnet to render or click on ads, requir<strong>in</strong>g advertisers to pay for a click-through or an ad impressionthat was never served to a real human.Historically, huge volumes of ad fraud have been undetectableto advertisers. White Ops and the ANA worked with 36 ANAmember organizations to analyze digital advertis<strong>in</strong>g campaigntraffic over a period of 60 days between August 1 andSeptember 30, 2014.We used newly developed technologies that revealed bots andshowed the true doma<strong>in</strong> source of ad impressions. We studied5.5 billion impressions — the largest public study to date ofbots <strong>in</strong> digital advertis<strong>in</strong>g.White Ops provided guidance to all study participants, butcontributors were permitted to select the type of ad traffic tobe measured dur<strong>in</strong>g the study. <strong>The</strong>re was no uniform po<strong>in</strong>t ofanalysis, type, or percentage of traffic analyzed. Mandatoryrequirements were not placed upon participants. <strong>The</strong> soleunify<strong>in</strong>g aspect of the methodology was the unique approachWhite Ops used to differentiate between a human and bot(mach<strong>in</strong>e-driven) request.White Ops evaluated billions of impressions, discoveredhundreds of millions of bots, and covered video and all types ofdisplay advertis<strong>in</strong>g. Display and video advertis<strong>in</strong>g purchased viadirect, network, and programmatic channels were all evaluated.This study exam<strong>in</strong>ed traffic for 36 ANA participants fromthe follow<strong>in</strong>g <strong>in</strong>dustry verticals: auto, beer/spirits, CPG,f<strong>in</strong>ancial/<strong>in</strong>surance, hospitality, pharma, restaurant, retail,and technology.36 Companies181 Campaigns3 Million Doma<strong>in</strong>s5.5 Billion Impressions60 Days08


HOW WE USED THE DATAThis study is a basel<strong>in</strong>e assessment of fraud <strong>in</strong> digitaladvertis<strong>in</strong>g, a threat that has emerged over the pastdecade.We used new bot detection technology to collect dataon ad fraud attacks. We compared data received fromthe participants to historical evidence from White Opsand external sources Chartbeat, Ghostery, and Grapeshot.We aggregated evidence across different traffic typesand analytic methods for the 36 participat<strong>in</strong>g ANA memberorganizations to m<strong>in</strong>imize the <strong>in</strong>fluence of <strong>in</strong>dividualorganizations <strong>in</strong> each of the samples.<strong>The</strong> publicly announced study assessed premium digitaladvertis<strong>in</strong>g brands dur<strong>in</strong>g a relatively slow portion of theadvertis<strong>in</strong>g year, suggest<strong>in</strong>g that the bot measurementsobserved dur<strong>in</strong>g this study underrepresent the overalllevel of bot fraud <strong>in</strong> the advertis<strong>in</strong>g ecosystem.In this report, we provide recommendations to assistadvertisers, agencies, and publishers <strong>in</strong> develop<strong>in</strong>gdefenses aga<strong>in</strong>st the <strong>in</strong>creas<strong>in</strong>g threat of digital ad fraud.09


THE IMPACT OF BOTSON DIGITAL MEDIA10


BOTS WERE IN EVERY KINDOF CAMPAIGN WE STUDIED<strong>Bot</strong>s were not deterred by the technical challenges ofconsum<strong>in</strong>g video <strong>in</strong>ventory. Video CPMs are typically muchhigher than display CPMs, and video <strong>in</strong>ventory conta<strong>in</strong>ed overtwice the percentage of bot fraud.Measurement of bots <strong>in</strong> retarget<strong>in</strong>g campaigns and botengagement metrics <strong>in</strong>dicate that higher CPM <strong>in</strong>ventory mayconcentrate populations of sophisticated bots. <strong>The</strong> most elitebotnet operators appear to customize their bots to capitalizeon the greater dollar opportunity available <strong>in</strong> higher CPM<strong>in</strong>ventory (see <strong>Bot</strong>s Faked All of the Engagement and ViewabilityMetrics That We Measured, page 29).OVERALL STUDY BOT PERCENTAGES23%Video <strong>Bot</strong>s11%Display <strong>Bot</strong>sCASE STUDYParticipant Hit by High <strong>Bot</strong> Levels <strong>in</strong> Premium Display and Video AdsPremiumDisplayVideo SSPNetworkVideo10%bots62%bots11%bots<strong>The</strong> agency for one of the CPG participants ran 12 placements on sites ownedand operated by a major U.S. cable and media concern, which had 10 percentbots. This same CPG participant bought video advertis<strong>in</strong>g on both a publiclytraded video supply-side platform (SSP) and a lead<strong>in</strong>g Internet portal, withbot levels of 62 percent and 11 percent, respectively.11


BOT FRAUD VARIES ACROSSCAMPAIGNS AND PLACEMENTSBecause bot percentages vary unpredictably across campaigns and placements, identify<strong>in</strong>g and compar<strong>in</strong>gthe real cost of the bot fraud problem is complex. One successful strategy is to exam<strong>in</strong>e fraud losses at theplacement level rather than look<strong>in</strong>g at total losses with<strong>in</strong> a brand or company-wide fraud loss.RECOMMENDATIONTroubleshoot placements that lose more ad spend than others.Us<strong>in</strong>g granular <strong>in</strong>formation (e.g., “Placements I, K, L, and M have below-average bots, but we are los<strong>in</strong>g33 percent of impressions on Placement D to bots”), advertisers can quickly diagnose and elim<strong>in</strong>ate largemonetary losses to bots even if the brand’s overall level of bot traffic is low.Cost-per-human (CPH) measures the actual cost of human impressions after account<strong>in</strong>g for loss due tobot fraud. Advertisers can compare CPH values across placements, campaigns, brands, and traffic sourcesto understand and communicate the real cost of reach<strong>in</strong>g a human audience goal.FINDINGBOT PERCENTAGE353025201510509A3315101391011664 43 35B C D E F G H I J K L M N OPLACEMENTS WITHIN ONE PARTICIPANT CAMPAIGNCPHCost perHumanMeasures theactual cost of eachthousand humanimpressions afteraccount<strong>in</strong>g for lossdue to bot trafficFigure 1: Placement <strong>Bot</strong> Percentage Can Vary With<strong>in</strong> a S<strong>in</strong>gle Brand12


BOT FRAUD VARIES OVER TIMENot all bot operations are created equal. Half of bots are not sophisticated enough to keepnormal wak<strong>in</strong>g hours.FINDINGAt night, bot percentages were higher.Total bots observed were higher dur<strong>in</strong>g the day but were a lowerproportion of overall traffic.AVG. HOURLY BOT PERCENTAGEFOR ALL CAMPAIGNS28211470midnight 6 a.m. noon 6 p.m. midnightHOUR OF DAYFigure 2: <strong>Bot</strong> Traffic Time-of-Day Pattern Across Study Time PeriodLocal time determ<strong>in</strong>ation was made us<strong>in</strong>g IP geolocation data provided by Maxm<strong>in</strong>d.RECOMMENDATIONConsider day-part<strong>in</strong>g to reducetime-of-day bot percentage spikes.13


EFFORTS TO INCREASE REACHALSO INCREASE BOTSIn onl<strong>in</strong>e advertis<strong>in</strong>g, reach refers to the number of unique<strong>in</strong>dividuals exposed to an ad. When study participantsattempted to <strong>in</strong>crease their reach with run-of-network (RON)campaigns, those campaigns were exposed to higher thanaverage bot fraud, averag<strong>in</strong>g 16 percent.When advertisers demand more traffic, often at the endof the week, month, and quarter, the differential betweenavailable humans and advertiser demand for traffic canbe made up with bots.<strong>Bot</strong>s can make it look easy to reach high volumes of specificaudiences. A bot can look like a sports fan, someone witha six-figure <strong>in</strong>come, someone <strong>in</strong>terested <strong>in</strong> buy<strong>in</strong>g a car,or a grandparent look<strong>in</strong>g for holiday gifts for grandchildren.White Ops has historically observed that campaigns aroundtime-sensitive releases such as retail sales, movies, and TVshows are unusually vulnerable to bot activity because theyhave very specific delivery w<strong>in</strong>dows that can exacerbate thebot problem.CASE STUDY<strong>Bot</strong>s Spiked Every SaturdayFor one beer/spirits participant,a bot spike occurred at the end ofevery week of a campaign, with botsspik<strong>in</strong>g at noon (PST) on Saturday,uniformly <strong>in</strong>creas<strong>in</strong>g from zero to800 bots per hour before dropp<strong>in</strong>gback to zero bots per hour after thepeak at noon on Saturday.<strong>Bot</strong> levels dropped to nearly zerofor all other days of the week (shown<strong>in</strong> the nearly empty columns of thegraph, at right). <strong>The</strong> bot spikes onSaturdays comprised 95 percent ofall the bot fraud for this campaign.BOTS DETECTED PER HOUR8006004002000AUG. SEPT. OCT.Each dot placed on the y-axis representsthe number of bots detected dur<strong>in</strong>g eachhour of the study.DAILY CAMPAIGN BOT LEVELSFigure 3: <strong>Bot</strong>s Spiked <strong>in</strong> This Campaign Every Saturday at 12 P.M.14


BOT TRAFFIC VARIES BY DOMAIN CATEGORYNo consistent variation <strong>in</strong> bot traffic percentage was evident across participant <strong>in</strong>dustry verticals.However, when we correlated our bot results with doma<strong>in</strong> content analysis from Grapeshot, bottraffic varied notably across doma<strong>in</strong> categories where the ads were served.F<strong>in</strong>ance22%Family18%Food16%Travel11%Health10%Home10%DOMAIN CATEGORYEconomyFashionSocietyEducationEnterta<strong>in</strong>mentBus<strong>in</strong>ess 4%7%7%6%6%9%F<strong>in</strong>ance, family, and food doma<strong>in</strong>shad the highest percentages ofbots, with 16–22 percent bots.Tech, sport, and science had thelowest bot percentages, rang<strong>in</strong>gfrom 3–4 percent bots.Politics4%News4%Tech4%Sport3%Science3%Info2%0 5 10 15 20 25BOT PERCENTAGEFigure 4: F<strong>in</strong>ance, Family, and Food Doma<strong>in</strong>s Had Higher <strong>Bot</strong> PercentagesDoma<strong>in</strong> category data was provided by Grapeshot.15


AD FRAUD TAKES A BIG BITE OUT OFVIDEO CAMPAIGNS<strong>Bot</strong>s accounted for 23 percent of all video impressionsobserved.FINDING<strong>Bot</strong> traffic ranged from 2 percent to 100 percent <strong>in</strong> videoplacements. <strong>Bot</strong> traffic by participant campaign (sometimesconsist<strong>in</strong>g of multiple placements) was as high as 63 percent.Some participants ran multiple video campaigns, with up to90 million video ad impressions from a s<strong>in</strong>gle participant.<strong>The</strong>re was no correlation found between campaign volumeand bot levels.Video ads were vulnerable to non-bot-driven ad fraud <strong>in</strong>addition to bot traffic. Some of the highest impression-volumevideo ad campaigns took huge hits from bot traffic as wellas from video autoplay adware (see Adware: Not All <strong>Fraud</strong> IsRobotic, page 24). Instead of deploy<strong>in</strong>g bots, the video autoplayadware used humans who had m<strong>in</strong>imal or no control of theadware applications to fraudulently consume advertis<strong>in</strong>g<strong>in</strong>ventory.Up to 63%Average <strong>Bot</strong> Traffic <strong>in</strong>Video Ad Campaigns byParticipantRECOMMENDATIONWithout the ad fraud, digital video advertis<strong>in</strong>g holds greatpromise. Agencies and advertisers can capture the immensepotential value of onl<strong>in</strong>e video advertis<strong>in</strong>g campaigns to meetmarket<strong>in</strong>g goals by putt<strong>in</strong>g <strong>in</strong> place quality control mechanisms.<strong>The</strong>se same quality assurance measures will help protectprogrammatic display campaigns from ad fraud.To ensure the <strong>in</strong>tegrity of video andprogrammatic display campaigns:Implement cont<strong>in</strong>uous fraud monitor<strong>in</strong>g.Use bot detection to ensure that sites are not sourc<strong>in</strong>gtraffic.Monitor for all types of ad fraud, <strong>in</strong>clud<strong>in</strong>g adware andbot traffic.16


SOURCING TRAFFIC INCREASESBOT LEVELSPublishers sometimes use traffic sourc<strong>in</strong>g (any method by which publishers acquire more visitors throughthird parties) to improve measured audience levels at their sites.We compared <strong>in</strong>dicators of traffic sourc<strong>in</strong>g to study-wide bot percentages <strong>in</strong> traffic. Indicators of trafficsourc<strong>in</strong>g predicted high bot percentages more frequently than almost any other behavioral factor.<strong>The</strong> high bot percentage of sourced traffic rema<strong>in</strong>ed stable over the length of the study. <strong>Bot</strong> activityon specific sources ranged from fully human (0 percent bots) to 100 percent bots. This range <strong>in</strong>cludeddisclosed <strong>in</strong>centivized traffic.Well-known publishers and premium publishers were not immune to high bot levels <strong>in</strong> sourced traffic.Sourced Traffic Averaged 52% <strong>Bot</strong>s<strong>Bot</strong>HumanDisplay11% <strong>Bot</strong>s89% HumansSourced52% <strong>Bot</strong>s48% Humans0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%AVERAGE BOT PERCENTAGEFigure 5: Traffic Sourc<strong>in</strong>g Generated More <strong>Bot</strong> Traffic Than Human Traffic17


CHALLENGINGEXISTINGASSUMPTIONS:BOTS CANEND UP ONPREMIUM SITES18


BOTS GET INTO PREMIUM BUYSSignificant bot levels affected all tiersand types of publishers. Premium,direct-buy display advertis<strong>in</strong>g campaignsat many well-known doma<strong>in</strong>s showed botpercentages higher than 10 percent.Ad fraud <strong>in</strong> premium publisher trafficcame from bot traffic and ad <strong>in</strong>jection(the unauthorized plac<strong>in</strong>g of ads on siteswhere they do not belong).Advertisers who assume that traffic topremium publishers is free of bots risklos<strong>in</strong>g large amounts to <strong>in</strong>tentional orun<strong>in</strong>tentional bot fraud.Premium PublisherServes Up 19% <strong>Bot</strong>sA CPG participant purchased 230,000impressions from a premium U.S. mediacompany. Traffic from the site averaged19 percent bots.CASE STUDYPremium U.S.Content Site19% <strong>Bot</strong>sPremiumCASE STUDYDirect Buy at Premium PublisherYielded 98% <strong>Bot</strong>s <strong>in</strong> Video Ad CampaignOne premium, well-known publisher <strong>in</strong> the lifestyle <strong>in</strong>dustry verticalemployed a web page layout consist<strong>in</strong>g of a s<strong>in</strong>gle large video playerat the top of the page. Seem<strong>in</strong>gly random selections of contentsurrounded the autoplay<strong>in</strong>g video on the page.PremiumOn this publisher page, video ads for an auto participant <strong>in</strong> the studywere consumed by a 98 percent bot audience. Out of almost 4,000total video impressions from the placement, fewer than 100 wereserved to humans.98% <strong>Bot</strong>s19


THE GAME OF AVERAGES: MIXING CLEANPLACEMENTS WITH BOT-HEAVY PLACEMENTSLOWERS THE OVERALL AVERAGECASE STUDY16 to 64% <strong>Bot</strong> Traffic Hit Direct Buy, Premium CampaignsAn agency for a participant <strong>in</strong> the retail vertical placed a direct buy on sites owned and operatedby a well-known U.S. media company. Sixty placements conta<strong>in</strong>ed an average of 17 percent bots.About half of the placements were very clean; the other half ranged from 16 to 64 percent bots.60 PlacementsClean<strong>Bot</strong>s: 16–64%17% <strong>Bot</strong> Overall Average20


TO REDUCE BOTS IN PREMIUM CAMPAIGNS,ADVERTISERS MUST UPDATE ASSUMPTIONS<strong>The</strong> quality of some premium, well-known publishers may have degraded s<strong>in</strong>ce they established theirreputations <strong>in</strong> the early days of the web. <strong>The</strong> reputation of the publisher is no longer a reliable benchmarkto predict bot traffic levels.RECOMMENDATIONUse technology to validate all assumptions.To avoid pay<strong>in</strong>g for bots <strong>in</strong> premium campaigns, use third-party fraud detection to validate or disproveassumptions about ad buys from all sources, <strong>in</strong>clud<strong>in</strong>g premium or Tier 1 publishers and trusted sources.Avoid mak<strong>in</strong>g assumptions about traffic quality based on a publisher’s premium or tier classification.Premium21


THE ORIGIN OFBOTS IN THE MEDIASUPPLY CHAIN22


BOTS ARE BUILT TO FOOL ALL STAKEHOLDERSIN THE DIGITAL ADVERTISING SUPPLY CHAINSome l<strong>in</strong>ks <strong>in</strong> the bot supply cha<strong>in</strong>are unaware of the bots <strong>in</strong> theirtraffic and do not <strong>in</strong>tend to profitillicitly, while others activelyencourage and concentrate bottraffic to <strong>in</strong>crease profits.<strong>Bot</strong> suppliers fool all stakeholders <strong>in</strong> the digital advertis<strong>in</strong>g cha<strong>in</strong>:Advertiser’s market<strong>in</strong>g teamPublisher’s ad operations teamAgency’s media plann<strong>in</strong>g teamPublisher’s sales organizationAgency’s media buy<strong>in</strong>g teamPublisher’s ad serverAgency’s ad serverThird-party ad verification servicesAgency’s analytics and optimization team Advertiser’s <strong>in</strong>ternal audit controlsEach bot heist occurs <strong>in</strong> a matter of milliseconds and is often undetectable to the victim. <strong>Bot</strong> suppliers repeat these automatedheists at the scale of hundreds of millions of times per day, creat<strong>in</strong>g enormous scope and reach <strong>in</strong> their fraud.SOURCESOF BOTS<strong>Bot</strong> ScriptPHANTOM LAYERPhantom WebsitesSold as clicks,views, video plays,or social media likesSUPPLIERSeller of TrafficProvides whatthe broker requests,often clicksBROKERBroker of TrafficService-orientedmedia companies thatdo campaign managementand audience extensionPUBLISHERBuyer and Reseller ofTraffic and Clicks<strong>Bot</strong>h premium and longtailsites and networksMeasured impressionsADVERTISEROR AGENCYBuyer of MediaPlacementsAnonymiz<strong>in</strong>gnetwork or proxyLarge PPCNetworkImpressionHandlers(platformsand exchanges)PublisherPublisherNetwork and ExchangesAdAdAdAd<strong>Bot</strong>netAnonymiz<strong>in</strong>gSearch Eng<strong>in</strong>eTrafficPhantom LayerTraffic Mixes withLegitimate TrafficNetworksAudienceExtension orOther SupplierNetworkExchangesSecondaryPhantom SiteFigure 6: A Phantom Layer Generates and Launders <strong>Fraud</strong>ulent Web Traffic<strong>Bot</strong> impressions orig<strong>in</strong>ate from malicious bot suppliers and pass through both legitimate and phantom layerelements of the digital advertis<strong>in</strong>g ecosystem. Phantom layer elements are websites operated specifically forthe purposes of launder<strong>in</strong>g ad fraud.23


ADWARE: NOT ALL AD FRAUD IS ROBOTICAdware is software, often automatically<strong>in</strong>stalled on user devices, that servesvisible or hidden ads to users to boostad consumption.For several study participants,a significant amount of adware-enabledactivity that occurred was classifiedas ad fraud, not bot fraud.<strong>The</strong> adware traffickers did not usebots to create the undesirable adimpressions. However, the adwareactivity was unsanctioned, fraudulent,and harmful to everyday computerusers and advertisers. <strong>The</strong> adwarerepresented enormous revenue to thepublishers for impressions that wereundesirable to the advertisers.<strong>The</strong> adware that affected theseparticipants was very similar to bots.<strong>The</strong> ma<strong>in</strong> difference was that the adwarecreated a pop-under w<strong>in</strong>dow visibleto the user until the user closed thepop-under, at which po<strong>in</strong>t the adwarecont<strong>in</strong>ued to operate <strong>in</strong> the backgroundwithout the user’s knowledge.CASE STUDYAdware Preys on Everyday Computer Usersand Consumes <strong>Digital</strong> Media BudgetsOne participant’s video ad campaign was delivered via 10 million adwareimpressions from a s<strong>in</strong>gle adware trafficker with<strong>in</strong> the first week of the study.Of the campaign‘s nearly 90 million impressions, 7 percent were natural humanimpressions, and 93 percent were fraud.29%<strong>Bot</strong>Traffic+64%=AdwareTraffic93%Total<strong>Fraud</strong><strong>The</strong> publisher of the adware provided a video ad-supported service thatrequired the user to download adware software and, <strong>in</strong> some cases, wasseen to pay for the non-consensual <strong>in</strong>stallation of the adware software onunsuspect<strong>in</strong>g users’ computers. <strong>The</strong> adware ran ads cont<strong>in</strong>uously <strong>in</strong> a browser<strong>in</strong> the background of the user’s computer, one video at a time. In most cases,the ads were entirely hidden from the user.<strong>The</strong> adware <strong>in</strong>itially showed a pop-under to the user that played video ads. <strong>The</strong>adware changed the volume for itself to zero while play<strong>in</strong>g audio, leav<strong>in</strong>g volumecontrols for other software untouched. After the user closed the pop-up, theadware cont<strong>in</strong>ued play<strong>in</strong>g ads with silenced audio. After restart and log<strong>in</strong> ofthe user’s computer, the adware software autoplayed video ads regardlessof whether the user reopened the adware site or application. <strong>The</strong> adware’sautoplay functionality was unsanctioned and uncontrollable by the user.24


ADWARE: NOT ALL ATTACKS ARE THE SAMECASE STUDYAdware Attacks Vary <strong>in</strong> SeverityA second adware site autoplayed video ads without sound, but only when theuser could see the ads. This adware did not cont<strong>in</strong>ue play<strong>in</strong>g ads to completionwhen the user closed the ad pop-up, allow<strong>in</strong>g the user more control. In thiscase, of a CPG participant’s seven million impressions, 59 percent were naturalhuman impressions and 41 percent were fraud.24%<strong>Bot</strong> Traffic+17%=AdwareTraffic41%Total<strong>Fraud</strong>TRAFFIC BREAKDOWN FOR ONE PARTICIPANT’S VIDEO CAMPAIGNS25


MOST BOTS COME FROM RESIDENTIAL IPsSome advertisers attempt to reduce the fraud problem us<strong>in</strong>g IP blacklists. Over time, bot suppliers evolve their bots aga<strong>in</strong>st themetrics that were used to create and defeat the blacklist. Doma<strong>in</strong> blacklists, geographic blacklists, and browser or retarget<strong>in</strong>g listswe studied were not effective at stopp<strong>in</strong>g the majority of bot fraud.<strong>Bot</strong> Source by IP TypeResidential 67%Host<strong>in</strong>g 18%Mixed 9%Enterprise 3%Carrier 1%Mobile Networks 1%Unclassified 1%Figure 7: <strong>Bot</strong>net Operators Break Into Everyday Users’ Computers to Remotely Drive <strong>Bot</strong> <strong>Fraud</strong>One of the earliest resources created to address the bot problem was the IAB/ABC International Spiders and <strong>Bot</strong>s List. Thislist was designed to detect non-human traffic and prevent such traffic from be<strong>in</strong>g counted <strong>in</strong> web analytics and is still <strong>in</strong>existence today. It enables filter<strong>in</strong>g of non-human activity that can significantly <strong>in</strong>flate ad impression and site traffic countsand is updated monthly. <strong>The</strong> end result is a more transparent and accurate measurement for ad impressions and site trafficclaims. However, the IAB/ABC International Spiders and <strong>Bot</strong>s List was not designed to track crim<strong>in</strong>al botnets.26


BOTNET CONTROLLERS HIJACK EVERYDAYUSERS’ IDENTITIES AND MACHINES<strong>Bot</strong> traffic could be com<strong>in</strong>g from the computer you are us<strong>in</strong>g right now. Over 67 percentof the bot traffic observed <strong>in</strong> the study came from residential IP addresses.Figure 8: Residential IP Address Sources of <strong>Bot</strong> <strong>Fraud</strong> Are Distributed Throughout the U.S.<strong>Bot</strong> traffickers hack U.S. home computers to get access to U.S. IP addresses andcookies. A small percentage of highly compromised computers create the bulk ofthe bot traffic.27


HOW THE BOTSBLEND IN:GETTINGTARGETED,FAKING METRICS28


BOTS FAKED ALL OF THE ENGAGEMENT ANDVIEWABILITY METRICS THAT WE MEASUREDIn partnership with Chartbeat, White Ops compared engagement metrics between bots and humans.High-bot sites had more abundant, less engaged bots;bots were more engaged than humans on low-bot sites<strong>Bot</strong>s on low-bot sites were sparse but highly engaged. On these sites, bots stayed engaged on the page 5 percent longer thanhumans and scrolled down <strong>in</strong> the page 12 percent less than humans. On high-bot sites, bots rema<strong>in</strong>ed engaged on a page only 14percent as long as the average human.<strong>Bot</strong> Average<strong>Bot</strong>HumanHuman32<strong>Bot</strong> Average34CATEGORY OF USER<strong>Bot</strong> Type A<strong>Bot</strong> Type B<strong>Bot</strong> Type C<strong>Bot</strong> Type D26313650<strong>Bot</strong> Type E440 10 20 30 40 50TIME ENGAGED WITH THE PAGE ON LOW-BOT SITES (SECONDS)Figure 9: <strong>Bot</strong>s Are Often More Engaged Than HumansEngagement measurements were provided by Chartbeat.29


VIEWABILITY DOES NOT ENSURE HUMANITY<strong>Bot</strong>s are built to run a web browser. When the bot and browser consume media,the browser reports that it is viewable even when it is not actually be<strong>in</strong>g renderedto the screen. This <strong>in</strong>nate characteristic of bots means that bots show highviewability by default.<strong>The</strong> five most common bot typesconsumed more ads than humansWork<strong>in</strong>g with Chartbeat, we compared bot and humanviewability at 87 high-humanity sites.<strong>Bot</strong>HumanHumanCATEGORY OF USER<strong>Bot</strong> Type A<strong>Bot</strong> Type B<strong>Bot</strong> Type C<strong>Bot</strong> Type D<strong>Bot</strong> Type E0%54% 58% 61% 65% 68%PERCENTAGE OF ADS THAT REPORTED VIEWABILITYFigure 10: <strong>Bot</strong>s Show High Viewability by DefaultViewability measurements were provided by Chartbeat.30


BOTS ARE GETTING TARGETED AND RETARGETEDA bot typically visits more websites and consumes more ads than a human. When bots overshoot or miss themark on engagement metrics, they get caught. When bots match the advertiser’s targeted human engagementmetrics, they can avoid detection and <strong>in</strong>crease revenue.<strong>Bot</strong>s consumed 19 percent of retargetedads <strong>in</strong> the study. Retarget<strong>in</strong>g is the processof deliver<strong>in</strong>g ads to particular users based ontheir previous onl<strong>in</strong>e activity.Web browsers encode track<strong>in</strong>g data calledcookies that allow advertisers and publishersto track and remember their onl<strong>in</strong>e visitors.<strong>Bot</strong> browsers generate their own cookies orbuild cookie profiles designed to make themlook more human and more tempt<strong>in</strong>g toadvertisers. <strong>Bot</strong>s emulat<strong>in</strong>g engaged humanbehavior have high-value cookies and gettargeted by advertisers, amplify<strong>in</strong>g botnetrevenue potential.<strong>Bot</strong>s can get re-cookied without even try<strong>in</strong>g.In certa<strong>in</strong> advanced botnets, bots accessand use browser cookies generated by thecomputer’s actual human user, mak<strong>in</strong>g iteven easier for the bot to get picked upby a retarget<strong>in</strong>g campaign.In many cases, re-cookied bots are addedto granular consumer segmentation lists,creat<strong>in</strong>g a cycle of bak<strong>in</strong>g bots <strong>in</strong>to manyad-tech platform audience models.CASE STUDYRetarget<strong>in</strong>g <strong>Bot</strong> PrevalenceWas Much Higher Than Overall<strong>Bot</strong> PercentageOverall campaign traffic for one participant conta<strong>in</strong>ed17 percent bots. In contrast, the participant’s retargetedcampaigns were composed of 55 percent bots.17%<strong>Bot</strong>sParticipant’sOverallTraffic19%<strong>Bot</strong>sParticipant’sOverallTraffic55%<strong>Bot</strong>sParticipant’sRetargetedCampaignsSimilarly, campaign traffic for another participant conta<strong>in</strong>ed19 percent bots. This participant’s retargeted campaignswere composed of 27 percent bots.27%<strong>Bot</strong>sParticipant’sRetargetedCampaigns31


PROGRAMMATIC INVENTORY IS VULNERABLETO BOT TRAFFIC EVEN WHEN OBTAINED FROMTRUSTED SOURCESFINDING<strong>Bot</strong> percentage varied widely whenserved from known programmatic adserver doma<strong>in</strong>s, with no identifiablepredictor of bot traffic levels. For18 of the 36 study participants,three well-known programmatic adexchanges supplied programmatictraffic with over 90 percent bots(see case study at right).<strong>The</strong> study average bot percentagefor programmatic placements was17 percent.Average programmatic bot trafficfor participants ranged from3 percent to 31 percent.RECOMMENDATIONA bot site used the opacity of programmatic display traffic sourc<strong>in</strong>g throughdemand side platforms (DSPs) to systematically defraud advertisers.Agencies for 18 of the 36 studyparticipants bought <strong>in</strong>ventory throughthree well-known, trusted DSPs, witheach agency target<strong>in</strong>g differentconsumer profiles and segments.Ads from all 18 of these participantsran on a common publisher and showedconsistent bot percentages greaterthan 90 percent.CASE STUDYOne Publisher Funneled Over 90% <strong>Bot</strong> TrafficThrough DSPs to Half of Study ParticipantsWhere’s the Content?$$Programmatic ExchangeAds at this site yielded payments to the publisher but were not consumed byhumans. <strong>The</strong> bot supplier designed this site to efficiently capture advertiserdollars, plac<strong>in</strong>g ads <strong>in</strong> rows down the length of the web page, with no actualcontent on the page.Reputation and trust levels cannotpredict the percentage of bottraffic a supplier will have. Buyerscan take action to protectprogrammatic buys:Cont<strong>in</strong>uously monitor and troubleshoot programmatic buys.Monitor all ad <strong>in</strong>ventory, even from trusted sources.Require sources to monitor traffic they provide.<strong>The</strong> site was designed to maximize fraudulent ga<strong>in</strong>s while m<strong>in</strong>imiz<strong>in</strong>g botnetresource requirements.Pause or troubleshoot campaigns that do not meet percent-humanity targets.32


HOW BOTSUPPLIERS GETAWAY WITH IT:EVASION33


BOT SUPPLIERS EVADE STUDYWhite Ops believes the overall bot levels identified <strong>in</strong> this studywere depressed due to the public announcement of the studyand general <strong>in</strong>dustry awareness preced<strong>in</strong>g it.Entities throughout the bot supply cha<strong>in</strong> can react whenalerted to traffic audit<strong>in</strong>g and monitor<strong>in</strong>g. <strong>The</strong> good news isthat just the act of monitor<strong>in</strong>g campaigns can suppress somebot activity.<strong>Bot</strong> Traffic Dodges Public StudyCASE STUDYWith participants’ acknowledgment, we cont<strong>in</strong>ued bot detection through the month of September <strong>in</strong> a covert study phase.For one participant, the overall bot percentage was 41 percent on August 2, the second day of the publicly announced studyperiod. This number dropped dramatically two days later, to 4 percent on August 4. <strong>The</strong> participant’s bot percentagerema<strong>in</strong>ed low until the end of August, the publicly announced end of the study.<strong>The</strong> study cont<strong>in</strong>ued covertly throughout the month of September. By September 9, the participant’s bot percentageclimbed back to 38 percent and rema<strong>in</strong>ed far higher than the study average bot percentage through the end of the month.High <strong>Bot</strong> Percentage <strong>in</strong> Covert Phase I45Steep Drop <strong>in</strong> First Daysof Public StudyLow <strong>Bot</strong> PercentageDur<strong>in</strong>g Public Study<strong>Bot</strong>s Return <strong>in</strong> Covert Phase II40BOT PERCENTAGE353025201510508/1/14 8/6/14 8/11/14 8/16/14 8/21/14 8/26/14 8/31/14 9/5/14 9/10/14Figure 11: <strong>Bot</strong> Traffic Supply for This Participant Dodged Our Study34


BOT SUPPLIERS ACTIVELY DISGUISE BOTTRAFFIC DURING CAMPAIGN MONITORING<strong>The</strong> <strong>in</strong>centivized human type of ad impression does not usually represent a majorloss of advertis<strong>in</strong>g dollars by itself because it does not scale as cheaply or as readilyas bot traffic. However, <strong>in</strong> one case, a supplier leveraged this source of counterfeitimpressions <strong>in</strong> an attempt to conceal bot traffic levels dur<strong>in</strong>g a brand’s audit.CASE STUDY<strong>Bot</strong>-Cloak<strong>in</strong>g MechanicsBrand starts to receive low-bot<strong>in</strong>centivized traffic90% of traffic froma publisher is botsBrand compla<strong>in</strong>sabout traffic qualityAll brands that did not compla<strong>in</strong>cont<strong>in</strong>ue to receive 90% bot trafficFigure 12: <strong>Bot</strong> Trafficker Actively Evaded Advertiser’s AuditEvasive maneuver<strong>in</strong>g by bot suppliers also occurred dur<strong>in</strong>g a campaign audit <strong>in</strong>dependent of this study. After <strong>in</strong>itiat<strong>in</strong>gcampaign monitor<strong>in</strong>g, a brand <strong>in</strong>formed its traffic supplier that it was aware of bot percentages above 90 percent <strong>in</strong>the supplier’s traffic. Subsequently, the supplier’s traffic to that s<strong>in</strong>gle brand dropped to just 4 percent bots.<strong>The</strong> bot supplier’s traffic rema<strong>in</strong>ed higher than 90 percent bots for other buyers, <strong>in</strong>clud<strong>in</strong>g traffic forone study participant that was concurrently runn<strong>in</strong>g a campaign (bought by its ad agency on a well-knownvideo SSP) us<strong>in</strong>g traffic sourced from the same bot supplier.<strong>Fraud</strong> percentage <strong>in</strong> the supplier’s traffic to the brand did not actually decrease to 4 percent. <strong>The</strong> supplier routed<strong>in</strong>centivized traffic (human traffic that is paid to view or click on ads) to the brand that had raised awarenessof the orig<strong>in</strong>al bot activity.After be<strong>in</strong>g <strong>in</strong>formed of the high bot traffic levels, the bot supplier executed a complex series of audit-defeat<strong>in</strong>gmeasures to make its traffic appear to be legitimate:Switch<strong>in</strong>g arbitrarily between real human traffic and botsRespond<strong>in</strong>g to compla<strong>in</strong>ts about traffic bot levelsMa<strong>in</strong>ta<strong>in</strong><strong>in</strong>g similar traffic volumes for both bot and <strong>in</strong>centivized human traffic35


TO DETER AND DETECT AD FRAUD,ADVERTISERS MUST BOTH CONSPICUOUSLYAND COVERTLY MONITOR FOR FRAUD<strong>Bot</strong> traffic percentages sometimes drop when bot suppliers become aware of scrut<strong>in</strong>y. Advertisers can potentially partiallyreduce the size of the bot problem simply by becom<strong>in</strong>g aware of and active <strong>in</strong> elim<strong>in</strong>at<strong>in</strong>g fraud <strong>in</strong> their buys.Conversely, bots and bot fraud traffic patterns evolve and evade <strong>in</strong> response to scrut<strong>in</strong>y. <strong>Bot</strong> traffickers use every available tacticto hide bots among real users, mak<strong>in</strong>g bot or human determ<strong>in</strong>ation impossible without the use of bot detection technology.Other market sectors, such as f<strong>in</strong>ancial services and retail, have learned through failure and significant losses that periodicaudits and certifications are no substitute for cont<strong>in</strong>uous and advanced security measures.To both deter bot traffickers and defend aga<strong>in</strong>st disguised bots, advertisers must deploy a dual-monitor<strong>in</strong>g strategy: Monitorconspicuously to deter bot traffickers, and also monitor covertly to detect disguised bot traffic.RECOMMENDATIONTo successfully combat bot fraud,advertisers must ma<strong>in</strong>ta<strong>in</strong> apublic-fac<strong>in</strong>g anti-fraud stanceand a highly confidential, cont<strong>in</strong>uousmonitor<strong>in</strong>g program.Monitor ConspicuouslyPublicly announce your anti-fraud policy to all external partnersto temporarily deter certa<strong>in</strong> crim<strong>in</strong>als and fraudsters.Announce the <strong>in</strong>tent to conduct audits of all supply-cha<strong>in</strong> partners.Also Monitor CovertlyUse bot detection to reveal <strong>in</strong>centivized human traffic,bot traffic, sourced traffic, and adware <strong>in</strong> media buys.Respond to detected fraud by paus<strong>in</strong>g and troubleshoot<strong>in</strong>gcampaigns, discuss<strong>in</strong>g fraud levels with suppliers, andprioritiz<strong>in</strong>g traffic from suppliers that actively suppressand elim<strong>in</strong>ate fraud.36


SITES THAT ONLYA BOT COULDLOVE37


BOT-TRAFFICSITES SHOWLITTLE OR NOORIGINALITYWhite Ops visited the study’s worst bot-trafficsites. Of the worst 50 sites observed, 30 percentdisplayed unique content, 22 percent displayedcontent duplicated with<strong>in</strong> the site, and 51 percentdisplayed common content (not identical, buthighly similar content across pages).<strong>Bot</strong> sites copy and paste content.Of the 50 worst bot-traffic sites:30%Had UniqueContent22%DuplicatedContent51%Had CommonContent<strong>Bot</strong>-traffic sites host six or moreof the follow<strong>in</strong>g types of ads:Video AutoplayBOT-TRAFFICSITES DISPLAYMORE ADSOn average, bot-traffic sites hosted six adsper page as opposed to two on comparabletop-ranked Alexa sites. Many conta<strong>in</strong>ed one ormore video autoplay, audio autoplay, pop-up, andpop-under elements, which were categoricallyabsent from Alexa’s top 50 sites that serve ads.Audio Autoplay! ! !! ! !Pop-up/Pop-under38


BOT SUPPLIERS ARE WATCHING YOU<strong>Bot</strong> traffickers take careful measurements of traffic to maximize moneteziation of their botnets and bot sites. White Ops comparedthe prevalence of third-party trackers, such as tags, pixels, and beacons, on the worst bot-traffic sites to how often thosetrackers appeared on Alexa’s top 50 sites that serve ads.<strong>The</strong> worst bot traffic sites use four times as many trackers<strong>Bot</strong> SiteLegitimate, Popular Site0 10 20 3040AVERAGE NUMBER OF THIRD-PARTY TRACKERSFigure 13: <strong>Bot</strong> Sites Measure Traffic to Increase MonetizationTracker measurements were provided by Ghostery.39


OLD-SCHOOL BROWSERS HAVE MORE BOTS<strong>Bot</strong> percentages soar <strong>in</strong> older browsers. Development efforts to supportolder browsers may no longer be cost-effective.To attack us<strong>in</strong>g any new browser, bot traffickers must re-deploy,recompile, and test for each new release. <strong>The</strong> <strong>in</strong>dustry can ga<strong>in</strong> atime advantage <strong>in</strong> bot defense by optimiz<strong>in</strong>g media for the newestbrowsers while reduc<strong>in</strong>g impressions from obsolete browsers.Firefox Safari Chrome Internet ExplorerPERCENTAGE OF BOT PREVALENCE0 20 40 60 80 10002 4 6 8 10BROWSER AGE IN YEARS12FINDINGOver half of the impressions (58%)com<strong>in</strong>g from IE6 browsers andalmost half of those (46%) fromIE7 browsers are bots.Figure 14: <strong>Bot</strong>s are Still Us<strong>in</strong>g IE6 and IE7RECOMMENDATION<strong>Bot</strong> browsers do not typicallyauto-upgrade the way popular browsersauto-upgrade for human users. Target<strong>in</strong>gmedia buys to newer browsers can<strong>in</strong>crease bot downtime and cost whileenabl<strong>in</strong>g the <strong>in</strong>dustry to get ahead <strong>in</strong> thebot-defense timel<strong>in</strong>e.Support Newer Browsers.Prefer newer releases to older ones.Know which browser versions are more bot than human.Save on development costs by reduc<strong>in</strong>g support for obsoletebrowsers that do not deliver significant human audiences.40


WHEN PUBLISHERSARE VICTIMS TOO:AD INJECTION41


AD INJECTION ATTACKS USERS, HARMSPUBLISHERS, AND DEFRAUDS ADVERTISERSAd <strong>in</strong>jection attackers use the same mechanisms that cybercrim<strong>in</strong>als use to rob onl<strong>in</strong>e banks. Payment and impression data for<strong>in</strong>jected ad <strong>in</strong>ventory flow to third parties which have no affiliation with the sites on which the ads are displayed. <strong>Bot</strong>net controllerswho <strong>in</strong>ject ads are able to generate enormous revenues us<strong>in</strong>g content and brands they did not build or ma<strong>in</strong>ta<strong>in</strong>.Ad InjectionA man-<strong>in</strong>-the-browser attack onpublishers, advertisers, and users <strong>in</strong>which ads are forced onto a website,often displac<strong>in</strong>g the <strong>in</strong>itial web pagecontent or overlay<strong>in</strong>g on top of exist<strong>in</strong>gcontent or adsTrue Doma<strong>in</strong>Technology that identifies the actualdoma<strong>in</strong> on which an ad displays ratherthan the doma<strong>in</strong> reported by thead server which can be falsifiedWe did not set out to detect ad <strong>in</strong>jection <strong>in</strong> this study. However, us<strong>in</strong>g White Ops’ truedoma<strong>in</strong> detection technology, we found significant evidence of ads runn<strong>in</strong>g on siteswhich are well known as user-funded or subscription-based sites that do not permitads. <strong>The</strong>se <strong>in</strong>jected ads were unsanctioned by the publishers. <strong>The</strong> ads were displayedus<strong>in</strong>g malware illicitly <strong>in</strong>stalled on residential computers.Victims of malware-driven ad <strong>in</strong>jection <strong>in</strong>advertently expose private <strong>in</strong>formation.Malware-driven ad <strong>in</strong>jection software on the victim’s computer allows potentiallymalicious, unknown actors to ga<strong>in</strong> access to personally identifiable <strong>in</strong>formation (PII),<strong>in</strong>clud<strong>in</strong>g brows<strong>in</strong>g history, <strong>in</strong>terests, and f<strong>in</strong>ancial <strong>in</strong>formation.Over 500,000 Ads Were Injected Dailyat One Publisher500,000Per DayCASE STUDYPost-study analysis showed that a s<strong>in</strong>gle publisher was the victim of am<strong>in</strong>imum of 500,000 <strong>in</strong>jected ads per day through the duration of the study.42


AD INJECTIONDEGRADES THEQUALITY OFTHE INTERNET<strong>The</strong> degradation of the user’sbrows<strong>in</strong>g experience due toad <strong>in</strong>jection <strong>in</strong>cludes:Websites with <strong>in</strong>jected ads load more slowly.Too many ads on the page can overwhelmthe user.Injected ads are often highly <strong>in</strong>trusive anddistract<strong>in</strong>g and may break the <strong>in</strong>tendedfunctionality of the displayed website.Advertisers and publishers do not choose to <strong>in</strong>jectads <strong>in</strong>to a site. <strong>The</strong> owner of the ad <strong>in</strong>jection malwareaccepts payment for unsanctioned media that couldpotentially damage both the advertiser’s andpublisher’s reputation and deplete the advertiser’sdigital ad <strong>in</strong>ventory budget.Ad <strong>in</strong>jection also devalues all authentic advertis<strong>in</strong>grunn<strong>in</strong>g on the site.AD INJECTIONDESTROYSLEGITIMATEAD INVENTORYAdvertisers and publishers can help preventad <strong>in</strong>jection by limit<strong>in</strong>g the use of sourced traffic,cont<strong>in</strong>uously monitor<strong>in</strong>g sourced traffic, and requir<strong>in</strong>gsuppliers (<strong>in</strong>clud<strong>in</strong>g DSPs) to demonstrate that theirtraffic does not <strong>in</strong>clude <strong>in</strong>jected ads.43


ELIMINATING BOTFRAUD: A CALLTO ACTION44


BOTNET OPERATORS ARE ALREADYDEFEATING SOME COUNTERMEASURESSeveral tactics that agencies and ad-tech platforms may currently regard as effective <strong>in</strong>prevent<strong>in</strong>g bots were mostly <strong>in</strong>effective:Technical measures of viewability do not ensure humanity. S<strong>in</strong>ce so many botoperators have upgraded their bots to fake viewability, viewable impressionsactually skewed slightly higher <strong>in</strong> bot <strong>in</strong>cidence than non-viewable impressions.Blacklists require near real-time updat<strong>in</strong>g and often block significant volumesof real human audience as well as bots. <strong>Fraud</strong>sters adapt quickly.Optimiz<strong>in</strong>g campaigns with even the most sophisticated engagement metricsand attribution models did not elim<strong>in</strong>ate bot traffic, because bots clone realpeople (gett<strong>in</strong>g bots credited for purchases made by real people), and botsfake engagement.Due to the pervasiveness of traffic sourc<strong>in</strong>g, buy<strong>in</strong>g strictly from premiumpublishers did not elim<strong>in</strong>ate bot traffic.Cui Bono: Who Benefits?<strong>Bot</strong> impressions distort the entire market by mak<strong>in</strong>g it look as though there are morepeople view<strong>in</strong>g ads than there really are. <strong>The</strong> illusion of an unlimited, diverse supply ofad <strong>in</strong>ventory drives the price of real human impressions down. It puts honest playersat a huge competitive disadvantage, pressur<strong>in</strong>g them to source traffic, too.<strong>The</strong> motivations and temptations of various parts of the ecosystem differ significantly:<strong>Bot</strong>net operators extract their payments through cash-out po<strong>in</strong>ts, the f<strong>in</strong>alstop <strong>in</strong> the fraud supply cha<strong>in</strong>.Aggregators and middlemen ga<strong>in</strong> reach, ensur<strong>in</strong>g they never lack <strong>in</strong>ventoryto sell, and a diversity of bot profiles that match any conceivable audiencesegment.Publishers <strong>in</strong>flate their apparent audience size and pocket the differencebetween their traffic acquisition cost and the revenue received fromadvertisers.45


FEAR IS THE UNSPOKEN OBSTACLE<strong>The</strong> ecosystem described <strong>in</strong> this report is complex. <strong>The</strong>re are w<strong>in</strong>ners and losers <strong>in</strong>advertis<strong>in</strong>g fraud today, and the scoreboard clearly is tilted <strong>in</strong> the wrong direction.On one side, the w<strong>in</strong>ners are rak<strong>in</strong>g <strong>in</strong> billions of dollars, much of which fundscybercrim<strong>in</strong>al activities by bot suppliers who have no <strong>in</strong>centive to change theirbehavior. Far beh<strong>in</strong>d <strong>in</strong> the digital advertis<strong>in</strong>g game are advertisers who want to offergreat products to the right customers, agencies who want their media plans to reachthe appropriate targets, publishers who want to support the content on their sitesthrough pert<strong>in</strong>ent advertis<strong>in</strong>g, and the advertis<strong>in</strong>g technology community who wantto provide an <strong>in</strong>novative <strong>in</strong>frastructure and marketplace for onl<strong>in</strong>e advertis<strong>in</strong>g.Also los<strong>in</strong>g big are consumers, who are the real reason the digital ad <strong>in</strong>dustry existsand who have been turned <strong>in</strong>to unwitt<strong>in</strong>g accomplices <strong>in</strong> vast networks of botnets.<strong>The</strong> common reaction to the entire issue of fraud is fear. Fear leads to avoidance,which is just what the bad guys want. No one wants to look unaware, unscrupulous,or negligent enough to “allow” this k<strong>in</strong>d of activity to take place.<strong>The</strong> truth is: fraud is everywhere. No one is immune. Only by emancipat<strong>in</strong>g your peopleand partners from that fear can we get the cooperation needed to address this issueeffectively.<strong>Bot</strong> fraud is a new type of attack. Advertisers, agencies, and publishers must learnand use new concepts to understand the bot fraud threat that has emerged over thepast few years. Advertisers, and all <strong>in</strong>dustry participants, can and must take action.Some actions can be taken unilaterally; others must be done <strong>in</strong> partnership with afraud detection partner. <strong>The</strong> follow<strong>in</strong>g pages provide an action plan for thestakeholders <strong>in</strong> the <strong>in</strong>dustry to combat fraud <strong>in</strong> digital advertis<strong>in</strong>g.46


Action Plan for All StakeholdersCreate allies, not adversaries, <strong>in</strong> the fightaga<strong>in</strong>st bot fraud<strong>Bot</strong> fraud affects many suppliers <strong>in</strong> the digital advertis<strong>in</strong>g supply cha<strong>in</strong> beforeit reaches the advertiser. Advertisers, agencies, and suppliers must all workcooperatively to reduce and elim<strong>in</strong>ate bot fraud <strong>in</strong> the supply cha<strong>in</strong>. Our call toaction is for the key <strong>in</strong>dustry players to work both collaboratively and <strong>in</strong>dividuallyto substantially reduce bot fraud.Manage the emotions of ad fraud discussionsDo not assume that bot fraud <strong>in</strong> your campaigns <strong>in</strong>dicates an agency or publisheris deficient or bad. Remember, it’s likely that your media seller is a victim of thebotnet operators, not the cause.Authorize and approve third-party trafficvalidation technologyThis study was not deployed across all participants’ placements, partly due toagency and publisher policies. Some agencies and publishers did not permit themonitor<strong>in</strong>g software <strong>in</strong> certa<strong>in</strong> placements (see Appendix B: Constra<strong>in</strong>ts andLimitations, page 55).While Tak<strong>in</strong>g ActionsAga<strong>in</strong>st <strong>Bot</strong> Traffic,Communicate About<strong>Bot</strong>s Effectively:With<strong>in</strong> your organization, use languagethat accurately communicates the botfraud problem.Add bot-fraud discussion time to allmedia buy conversations <strong>in</strong>ternallyand externally.Adopt and use terms that correctlyidentify threats and real adversarieswhile preserv<strong>in</strong>g allies and build<strong>in</strong>g analliance aga<strong>in</strong>st fraud.To effectively combat bots <strong>in</strong> their media buys, advertisers must be able to deploymonitor<strong>in</strong>g tools. Publishers and agencies must enable the deployment of thesemonitor<strong>in</strong>g tools. Set policy and procedures to enable advertisers to deploy botdetection and doma<strong>in</strong> detection software to their ad buys.Support the Trustworthy Accountability Group<strong>The</strong> IAB, 4A’s, and the ANA announced <strong>in</strong> early November the creation of theTrustworthy Accountability Group (TAG), a jo<strong>in</strong>t market<strong>in</strong>g-media <strong>in</strong>dustryprogram designed to eradicate digital advertis<strong>in</strong>g fraud, malware, ad-supportedpiracy, and other deficiencies <strong>in</strong> the digital communications supply cha<strong>in</strong>. Allvendors should comply with TAG’s quality assurance guidel<strong>in</strong>es.47


Action Plan for BuyersBe aware and <strong>in</strong>volvedAdvertisers must be aware of digital advertis<strong>in</strong>g fraud and take an active and vocal position <strong>in</strong> address<strong>in</strong>gthe problem. <strong>Fraud</strong> hurts everyone <strong>in</strong> the digital communications supply cha<strong>in</strong>, especially advertisers.Advertisers must therefore play an active role <strong>in</strong> effect<strong>in</strong>g positive change.Request transparency for sourced trafficTraffic sourc<strong>in</strong>g correlates strongly to high bot percentages. It’s recommended that buyers requesttransparency from publishers around traffic sourc<strong>in</strong>g and build language <strong>in</strong> RFPs and IOs that requirespublishers to identify all third-party sources of traffic. Furthermore, buyers should have the optionof reject<strong>in</strong>g sourced traffic and runn<strong>in</strong>g their advertis<strong>in</strong>g only on a publisher’s organic site traffic.Include language on non-human traffic <strong>in</strong> terms andconditionsConsider add<strong>in</strong>g specific language to your terms and conditions to address the issues discussed <strong>in</strong> thisstudy. An illustration of one approach to the def<strong>in</strong>ition of fraudulent traffic and the safeguards that might benegotiated between advertisers and media companies is provided <strong>in</strong> the appendix (developed by Reed Smith,ANA’s outside legal counsel). You should consult with your own counsel to develop specific provisions thatbest serve your company’s <strong>in</strong>dividual <strong>in</strong>terests (see Appendix D: Illustrative Terms and Conditions, page 57).Use third-party monitor<strong>in</strong>gMonitor all traffic with a consistent tool. Comparability is essential. Selective monitor<strong>in</strong>g, such as once amonth, once a quarter, or only on certa<strong>in</strong> channels, encourages evasive maneuvers by bot suppliers. Thirdpartymonitor<strong>in</strong>g can validate or disprove assumptions about the quality of a publisher or ad tech company’straffic. We recommend relentless monitor<strong>in</strong>g to get the best value out of your ad <strong>in</strong>vestment.Use monitor<strong>in</strong>g and bot detection to reveal the bots <strong>in</strong> retarget<strong>in</strong>g campaigns and audience metrics. Thiswill prevent the purchase of additional media targeted at those bots and will improve campaign metrics.48


Action Plan for Buyers(Cont<strong>in</strong>ued)Apply day-part<strong>in</strong>g when you can<strong>Bot</strong> fraud represents a higher proportion of traffic between midnight and 7 a.m. Buyers can reduce botsby concentrat<strong>in</strong>g advertis<strong>in</strong>g dur<strong>in</strong>g audience wak<strong>in</strong>g hours.Update blacklists frequently and narrowlyBe careful how you block. For blacklists to be effective, they need to be updated at least daily, must be veryspecific (micro-blacklist<strong>in</strong>g), and must accompany other defenses.Control for ad <strong>in</strong>jectionAd <strong>in</strong>jection (the unauthorized plac<strong>in</strong>g of ads on sites where they do not belong) is a tactic that causesprogrammatic buys to conta<strong>in</strong> higher levels of fraud. Discuss with your DSP or tech platform how to controlad <strong>in</strong>jection.Consider reduc<strong>in</strong>g buys for older browsers<strong>The</strong>re are more bots claim<strong>in</strong>g to be IE6 (2001 orig<strong>in</strong>al release date) or IE7 (2007 orig<strong>in</strong>al release date) thanthere are real humans still us<strong>in</strong>g those browsers. Consider reduc<strong>in</strong>g older browser impressions <strong>in</strong> buys.Announce your anti-fraud policy to all external partnersIn comb<strong>in</strong>ation with covert, cont<strong>in</strong>uous monitor<strong>in</strong>g practices, the watchdog effect will change behavior,reduce fraud, and encourage others to jo<strong>in</strong> the fight.Budget for securityAcross many <strong>in</strong>dustries, the typical cost of security amounts to an overhead of 1 to 3 percent. In the creditcard ecosystem, that security spend<strong>in</strong>g has lowered the losses due to fraud to just $0.08 cents per hundreddollars. Lower<strong>in</strong>g bot fraud <strong>in</strong> advertis<strong>in</strong>g to those levels could potentially return many multiples of thesecurity spend<strong>in</strong>g needed to achieve it.49


Action Plan for PublishersCont<strong>in</strong>uously monitor sourced trafficAlways monitor sourced traffic. Know your sources and ma<strong>in</strong>ta<strong>in</strong> transparency about traffic sourc<strong>in</strong>g.Elim<strong>in</strong>ate sources of traffic that are shown to have high bot percentages. Monitor all vendors, all the time.Protect yourself from content theft and ad <strong>in</strong>jectionUse a service such as doma<strong>in</strong> detection or bot detection to monitor for content-scrap<strong>in</strong>g (present<strong>in</strong>ganother site’s content <strong>in</strong> a separate website and monetiz<strong>in</strong>g the scraped content with ads) and evidenceof ad <strong>in</strong>jection. A bot detection service can measure actual numbers of bots <strong>in</strong> high-bot traffic, allow<strong>in</strong>gpayment for the human audience while elim<strong>in</strong>at<strong>in</strong>g bots from the bill<strong>in</strong>g process.Consider allow<strong>in</strong>g third-party traffic assessment toolsPublishers can enable advertisers to improve the granularity of their traffic performance by authoriz<strong>in</strong>gthird-party monitor<strong>in</strong>g (for characteristics such as viewability, engagement, and bot detection) andthird-party tracker measurement.50


Who is your real audience:BOB SMITHorBOT SMITH?Thank you and congratulations on becom<strong>in</strong>gpart of the fraud elim<strong>in</strong>ation movement.We encourage you to provide “protectedtransparency” to all your digital media partners <strong>in</strong>order to encourage collaborative honesty on behalfof your brands and the <strong>in</strong>dustry.51


Appendix AGlossary of TermsAdAn onl<strong>in</strong>e advertisement of any sortAd <strong>Fraud</strong><strong>The</strong> <strong>in</strong>clusion <strong>in</strong> reports, bills, or other analytics ofanyth<strong>in</strong>g other than natural persons consum<strong>in</strong>g ads<strong>in</strong> the normal course of us<strong>in</strong>g any deviceAd Injection<strong>The</strong> visible or hidden <strong>in</strong>sertion of ads <strong>in</strong>to an app, webpage, or other onl<strong>in</strong>e resource without the consent of thepublisher or operator of that resourceAdvertiserA company, brand, or <strong>in</strong>dividual who pays a third partyto display or act as agent for the display of adsAdwareSoftware, often automatically <strong>in</strong>stalled on user devices,that displays visible or hidden ads to users to boost adconsumptionAutoplay<strong>The</strong> play<strong>in</strong>g of a sound, video, or any other type of media,generally as part of an ad, without any user <strong>in</strong>teraction,often upon the user’s load<strong>in</strong>g of a web page or otherresource<strong>Bot</strong>(s)(a/k/a Non-Human Traffic or NHT) Automated entitiescapable of consum<strong>in</strong>g any digital content, <strong>in</strong>clud<strong>in</strong>g text,video, images, audio, and other data. <strong>The</strong>se agents may<strong>in</strong>tentionally or un<strong>in</strong>tentionally view ads, watch videos,listen to radio spots, fake viewability, and click on ads<strong>Bot</strong> Percentage<strong>The</strong> percentage of a given portion of onl<strong>in</strong>e advertis<strong>in</strong>gtraffic consumed by bots<strong>Bot</strong> Detection<strong>The</strong> detection and differentiation of bot traffic and botimpressions from human traffic and human impressions<strong>Bot</strong> <strong>Fraud</strong>Ad fraud specifically perpetrated by bots<strong>Bot</strong> ImpressionAn impression consumed by a bot<strong>Bot</strong> TrafficAutomated website or other onl<strong>in</strong>e traffic and/orad consumption driven by or result<strong>in</strong>g from bots<strong>Bot</strong>netA group of <strong>in</strong>fected computers that generate automatedweb events. <strong>The</strong> <strong>in</strong>frastructure used to create many typesof bots<strong>Bot</strong>pr<strong>in</strong>tsA unique comb<strong>in</strong>ation of directly observed properties <strong>in</strong> agiven impression, page view, or other onl<strong>in</strong>e event whichcollectively identifies that event as bot-driven by a specifictype of botBrokerThird-party arbitragers that buy traffic from suppliersand sell to publishers; often media agencies, retarget<strong>in</strong>gplatforms, or traffic extension platformsCampaignA series of ads on behalf of an advertiser that sharea s<strong>in</strong>gle idea and theme, and which may be made up ofdifferent types of ads, and which may be run on multiplepublishers, sites, or other channels and <strong>in</strong> multipleformatsCampaign Monitor<strong>in</strong>gMonitor<strong>in</strong>g the various types of ads and their formats, andthe publishers, sites, and channels on or <strong>in</strong> which they aredisplayed, for the purpose of detect<strong>in</strong>g differ<strong>in</strong>g levels ofad fraud, allow<strong>in</strong>g for the optimization of spend<strong>in</strong>g toreduce ad fraudCash-Out SiteA website, app, or other resource that is capable ofdeliver<strong>in</strong>g ads, and is operated by perpetrators of ad fraudfor the purpose of exfiltrat<strong>in</strong>g money from the onl<strong>in</strong>eadvertis<strong>in</strong>g ecosystem52


Appendix AGlossary of Terms (Cont<strong>in</strong>ued)Click FarmA type of ad fraud, <strong>in</strong> which a large group of humanworkers (<strong>in</strong> one or multiple locations) is m<strong>in</strong>imally paidor otherwise <strong>in</strong>centivized to view and/or click on adson behalf of a third party that economically benefitsfrom those human workers’ illegitimate consumptionof those adsDecision<strong>The</strong> determ<strong>in</strong>istic, evidence-based identification of aparticular impression, page view, or other type of onl<strong>in</strong>eevent, either legitimate or the result of ad fraudDoma<strong>in</strong>A unique name that identifies and can be used to accessan Internet resource such as a websiteDoma<strong>in</strong> Blacklist<strong>in</strong>gUs<strong>in</strong>g lists of known bad doma<strong>in</strong>s to prevent the serv<strong>in</strong>gof ads to those doma<strong>in</strong>sDoma<strong>in</strong> DetectionDeterm<strong>in</strong><strong>in</strong>g the doma<strong>in</strong> on which an ad was actuallydisplayed, as opposed to the doma<strong>in</strong> which an ad servermay reportDSP (Demand-Side Platform)A platform that allows advertisers or their agencies tomanage multiple exchange accounts and bid across thoseaccountsEngagementA metric (often def<strong>in</strong>ed with great specificity) thatprovides a qualitative evaluation of a user’s <strong>in</strong>teractionwith a given ad or web pageExchangeA technology platform that facilitates the buy<strong>in</strong>g andsell<strong>in</strong>g of ads and related data from multiple sources suchas publishers and networks of publishersHREF Doma<strong>in</strong><strong>The</strong> full doma<strong>in</strong> path represent<strong>in</strong>g the location where aparticular impression, page view, or other onl<strong>in</strong>e eventoccurred; often forms part of ad serv<strong>in</strong>g reportsHuman ImpressionAn impression legitimately served to a real human not<strong>in</strong>tentionally or un<strong>in</strong>tentionally engaged <strong>in</strong> any form ofad fraudHuman TrafficLegitimate website or other onl<strong>in</strong>e traffic and/or adconsumption driven by real humansImpressionA particular <strong>in</strong>stance of the delivery of a particular onl<strong>in</strong>ead. <strong>The</strong> basic economic unit of onl<strong>in</strong>e advertis<strong>in</strong>g, generallyas recorded by ad servers for the purposes of bill<strong>in</strong>gadvertisers or their agenciesIncentivized Human ImpressionAn impression served to a human who is paid or otherwise<strong>in</strong>centivizedIP (IP Address)A unique numerical address correspond<strong>in</strong>g to a particulardevice or set of devices connected to the InternetIP GeolocationDeterm<strong>in</strong><strong>in</strong>g the approximate physical location of a deviceconnected to the Internet at a given po<strong>in</strong>t <strong>in</strong> time by us<strong>in</strong>g<strong>in</strong>formation associated with or deduced from that device’sIP addressIP Blacklist<strong>in</strong>gUs<strong>in</strong>g lists of known bad IPs to prevent the serv<strong>in</strong>g of adsto those IPsLong TailWebsites with relatively low traffic that may offer valueto advertisers due to their appeal to specific or nicheaudiences of usersMake-GoodCredit given to an advertiser or their agency (or the use ofthat credit) to compensate for an error <strong>in</strong> the composition,placement, or delivery of an ad53


Appendix AGlossary of Terms (Cont<strong>in</strong>ued)Man-<strong>in</strong>-the-Browser AttackAn Internet attack that <strong>in</strong>fects a user’s onl<strong>in</strong>e <strong>in</strong>teractionsby tak<strong>in</strong>g advantage of vulnerabilities <strong>in</strong> browser or appsecurity to modify ads, web pages, or transaction contentor to <strong>in</strong>sert additional ads, content, or transactions,without the knowledge or consent of the user or theresource(s) with which the user <strong>in</strong>tended to <strong>in</strong>teractMicro-BlacklistA blacklist that is updated and expires frequently, toenhance its effectiveness aga<strong>in</strong>st advanced and adaptivethreatsPage ViewA s<strong>in</strong>gle request to load a s<strong>in</strong>gle page of a websitePhantom LayerWebsites operated specifically for the purpose oflaunder<strong>in</strong>g ad fraud by obscur<strong>in</strong>g the source of <strong>in</strong>ventoryand impressions enter<strong>in</strong>g the onl<strong>in</strong>e advertis<strong>in</strong>g ecosystemPop-UnderW<strong>in</strong>dows that appear or open under the user’s currentbrowser w<strong>in</strong>dow so that they become visible when thatw<strong>in</strong>dow is closedPop-upW<strong>in</strong>dows that appear or open above or on top of the user’scurrent browser w<strong>in</strong>dowPublisher<strong>The</strong> operator of a website or network of websites, andthe producer or curator of content for those sites. A sellerof onl<strong>in</strong>e advertis<strong>in</strong>g space and impressions, and oftena buyer of third-party trafficRON (Run-of-Network)An ad or campaign displayed on a large collection ofwebsites without the ability to choose target-specificsites, placements, or doma<strong>in</strong>sSite or WebsiteA set of related web pages, often served from a s<strong>in</strong>gledoma<strong>in</strong>SSP (Supply-Side Platform)A technology platform that enables publishers to managetheir ad <strong>in</strong>ventory and maximize revenue from onl<strong>in</strong>eadvertis<strong>in</strong>g, usually by <strong>in</strong>terfac<strong>in</strong>g with ad exchanges, andmak<strong>in</strong>g their ad placement <strong>in</strong>ventory available <strong>in</strong> an automatedfashion to a wide number of potential purchasersSupplierA seller of traffic to publishers and sitesTrafficVisits to a particular site, page, or other onl<strong>in</strong>e resource;impressions related to a particular adTraffic Sourc<strong>in</strong>g or Sourced TrafficAny method by which publishers acquire more visitorsthrough third partiesTrue Doma<strong>in</strong><strong>The</strong> doma<strong>in</strong> on which an ad actually ran, as determ<strong>in</strong>ed bydoma<strong>in</strong> detectionUserA person who uses a computer or other device or networkservice. In the context of onl<strong>in</strong>e advertis<strong>in</strong>g, a visitor to apublisher’s site, and a consumer of an advertiser’s adsReach<strong>The</strong> total number of different users exposed, at least once,to an ad or campaign dur<strong>in</strong>g a given period of timeRetarget<strong>in</strong>g (Behavioral Retarget<strong>in</strong>g)<strong>The</strong> process of deliver<strong>in</strong>g ads to particular users basedon their previous onl<strong>in</strong>e activity54


Appendix BConstra<strong>in</strong>ts and LimitationsComplexity of StudyStudy participants jo<strong>in</strong>ed the <strong>in</strong>itiative for differentperiods of time with vary<strong>in</strong>g platform configurations,target audiences, <strong>in</strong>dustry verticals, and ad agencies.Because of these differences, not all data from thestudy can be compared directly between participants.Web Framework Limitations<strong>The</strong> study software could only be deployed to systemsthat were JavaScript-enabled.Public Study AwarenessBecause many participants experienced adm<strong>in</strong>istrativeand technical deployment delays dur<strong>in</strong>g the publicstudy phase, and because bot numbers may have beenartificially decreased dur<strong>in</strong>g the public study phase,bot numbers detected dur<strong>in</strong>g the covert study phasemay be more representative of the numbers occurr<strong>in</strong>g<strong>in</strong> normal ad campaigns outside of the <strong>in</strong>itiativeframework. Because the study was announcedand widely known, it is assumed that bot numbersfor the month of the public study were artificially lowerthan numbers we might otherwise observe.Coord<strong>in</strong>at<strong>in</strong>g With AgenciesSome study participants were not able to deploy thestudy software uniformly throughout their campaignsdue to adm<strong>in</strong>istrative elements <strong>in</strong>clud<strong>in</strong>g legalagreements, site policies, and organizational complexity.In some cases, the study participants were not awarethat study software had not been deployed throughtheir ad agencies. When these issues became apparentdur<strong>in</strong>g the monitor<strong>in</strong>g and data collection phases, WhiteOps worked with the study participants and their adagencies to attempt to correct the problem.Seasonal Time FrameWhite Ops expects bot numbers to be at their lowest<strong>in</strong> the late summer months and at their highest whendemand for advertis<strong>in</strong>g is highest near the end of thecalendar year. This seasonal snapshot from the monthsof August and September cannot predict the numberof bots <strong>in</strong> a typical month or dur<strong>in</strong>g peak months whenadvertis<strong>in</strong>g volume is higher.55


Appendix CExternal Study ContributorsWhite Ops worked with several study contributorsto provide additional <strong>in</strong>sight <strong>in</strong>to the study results.ChartbeatChartbeat, a betaworks company that providesreal-time analytics to websites and blogs, provideddata for comparison of bot and human engagementand viewability metrics. Chartbeat matched 120 millionimpressions with White Ops data on 87 publishers.GhosteryGhostery ® is a global technology company thatprovides solutions for onl<strong>in</strong>e transparency and controlto <strong>in</strong>dividuals and bus<strong>in</strong>esses. Ghostery provided <strong>in</strong>sight<strong>in</strong>to trackers runn<strong>in</strong>g on the study’s top 10,000 doma<strong>in</strong>sby traffic volume, the study’s worst bot sites, and topAlexa sites.GrapeshotGrapeshot is a software technology company us<strong>in</strong>gadvanced Information Retrieval techniques pioneeredat Cambridge University. For the study, Grapeshotprovided doma<strong>in</strong> characteristics data for 13,000doma<strong>in</strong>s. White Ops used this data to identify bottrends by doma<strong>in</strong> category.56


Appendix DIllustrative Terms and ConditionsConsider add<strong>in</strong>g specific language to your terms and conditions to address the issuesdiscussed <strong>in</strong> this study. An illustration of one approach to the def<strong>in</strong>ition of fraudulenttraffic and the safeguards that might be negotiated between advertisers and mediacompanies appears below (developed by Reed Smith, ANA’s outside legal counsel). Youshould consult with your own counsel to develop specific provisions that best serveyour company’s <strong>in</strong>dividual <strong>in</strong>terests.T & C<strong>Fraud</strong>ulent Traffic(a) “<strong>Fraud</strong>ulent Traffic” means the <strong>in</strong>clusion <strong>in</strong> reports, bills or other <strong>in</strong>formation and materials associatedwith this Agreement, of data that counts or uses <strong>in</strong> calculations, anyth<strong>in</strong>g other than natural persons view<strong>in</strong>gactually displayed Ads <strong>in</strong> the normal course of us<strong>in</strong>g any device, <strong>in</strong>clud<strong>in</strong>g, without limitation, brows<strong>in</strong>gthrough onl<strong>in</strong>e, mobile or any other technology or platform. For the avoidance of ambiguity, <strong>Fraud</strong>ulentTraffic <strong>in</strong>cludes, without limitation, the <strong>in</strong>clusion or count<strong>in</strong>g of views: (i) by a natural person who has beenengaged for the purpose of view<strong>in</strong>g such Ads, whether exclusively or <strong>in</strong> conjunction with any other activitiesof that person; (ii) by non-human visitors; (iii) comb<strong>in</strong>ations of displays directed or redirected by anycomb<strong>in</strong>ation of (i) and/or (ii); and (iv) that are not actually visible to the human eye, discernible to humansenses or perceived by a human be<strong>in</strong>g.(b) Media Company will establish, implement and use all commercially reasonable technology andmethodologies to: (i) prevent <strong>Fraud</strong>ulent Traffic; (ii) detect <strong>Fraud</strong>ulent Traffic should it occur; and (iii)promptly take steps to prevent cont<strong>in</strong>uation and/or recurrence of occurrences thereof. Media Company willensure, by agreement, <strong>in</strong>struction or any other legally enforceable means, that all third parties to which Adsare delivered, displayed or made available have adopted and implemented technology and methodologies(and agreed <strong>in</strong> writ<strong>in</strong>g thereto) to ensure Media Company is <strong>in</strong> compliance with the forego<strong>in</strong>g obligations.Media Company agrees that Advertiser shall have no obligation hereunder, for compensation, liability orotherwise <strong>in</strong> respect of <strong>Fraud</strong>ulent Traffic and shall not be billed or required to pay for <strong>Fraud</strong>ulent Traffic.To the extent any payment attributable to <strong>Fraud</strong>ulent Traffic is or may be paid by Advertiser, Media Companyshall, with<strong>in</strong> five (5) days, reimburse and refund such payment to Advertiser, together with reasonablyadequate documentation to substantiate the accuracy of any such reimbursement or refund. Unlessotherwise <strong>in</strong>cluded <strong>in</strong> another audit provision hereunder, Advertiser or its designated auditors shall beentitled to audit the books and records of Media Company for the purpose of determ<strong>in</strong><strong>in</strong>g compliance withthe provisions of this Agreement.57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!