Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference 2011
DOI: 10.1145/2068816.2068843
|View full text |Cite
|
Sign up to set email alerts
|

Understanding fraudulent activities in online ad exchanges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0
2

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
3

Relationship

1
9

Authors

Journals

citations
Cited by 93 publications
(62 citation statements)
references
References 12 publications
0
60
0
2
Order By: Relevance
“…In particular, research has focused on the evolution of botnets towards ad related clickfraud monetization [1], [25] and the impact of botnet interventions on abusive ad traffic [6], [26]. Other forms of abuse include the failures of current ad exchanges to detect distributed clickfraud [33], the ability for compromised routers and opportunistic ISPs to inject ads into users' traffic [29], [34], and the market for impression fraud via ads hidden underneath other content or served in invisible windows [32]. In response, researchers have proposed an array of solutions that attempt to detect fraudulent ad traffic via bluff ads or anomaly detection [9], [10], [15], [17].…”
Section: Related Workmentioning
confidence: 99%
“…In particular, research has focused on the evolution of botnets towards ad related clickfraud monetization [1], [25] and the impact of botnet interventions on abusive ad traffic [6], [26]. Other forms of abuse include the failures of current ad exchanges to detect distributed clickfraud [33], the ability for compromised routers and opportunistic ISPs to inject ads into users' traffic [29], [34], and the market for impression fraud via ads hidden underneath other content or served in invisible windows [32]. In response, researchers have proposed an array of solutions that attempt to detect fraudulent ad traffic via bluff ads or anomaly detection [9], [10], [15], [17].…”
Section: Related Workmentioning
confidence: 99%
“…For these reasons, attackers are using advertisements to perform their attacks, and researchers have developed techniques to detect and block such malicious advertisements [17,29].…”
Section: Drive-by Download Advertisementsmentioning
confidence: 99%
“…Obviously, some criteria are required to detect these websites. One of the most common criterion is keywords such as "advertisement", "buy", "shop", "free", "join", "click", "now" (Wang et al , 2011 ;Li et al ,2012 ;Krammer ,2008 ;Stone-Gross .et al , 2011) .…”
Section: Disturbing or Useful Online Advertisementmentioning
confidence: 99%