ISmall-Business.net

Intelligent Business Solutions

  • Home
  • Strategy
    • Small Business Strategy
      • Combining Niches to Maximize Profit Potential
      • High Ticket Versus Volume Niche Selection
      • How to Know When to Cut a Business or Niche Loose
      • Never Put All Your Eggs in One Basket
    • Sales Strategy
      • Facebook Networking Versus Paid Advertising
      • Brainstorming a Successful Sales Funnel
      • Best Practices for Profitable List Building
      • Backend Sales Strategy Tips
      • A Better Way to Use Webinars for Profits
      • Creating a Welcome Email That Makes Money
    • Production Strategy
    • Human resource strategy
  • Management
    • Business action plan
      • 7 Things to Send JVs to Get Them Onboard
      • Don’t Make JV Promises You Can’t Keep
      • How to Host a Challenge and Maximize Profits
    • Small Business Management
      • Putting Profit Tasks First During Time Management
      • How Self Doubt Sabotages Your Financial Success
      • Repurpose Your Content to Save and Make Money
    • Business Management Topics
      • Fighting the Stigma of Failure
      • Figuring Out the Perfect Launch Date and Time
      • Bonus Creation That Catapults You to Leaderboard Domination
      • Do Customers Prefer Video or Text Courses
      • Minimize Your Risk of Refunds with These 5 Tips
      • How Often Should You Email Promo Material
      • Narrow Niche Domination
      • Perfecting the Launch Process for Increased Profits
    • Business Management Blogs
      • Nobody Expects a Perfect Expert
  • Ideas
    • Find business ideas
      • 5 Lucrative Non IM Niches
      • 6 Niches That Are Hot on Social Networks
      • Are PLR Stores a Viable Way to Make Money
      • How to Know If a Membership Site Is Right for You
    • Idea feasibility
      • How to Make Money Off a $7 Product
      • Recurring Income Options
    • 10 top business ideas
      • Could Coaching Bring in More Money Than Products
      • Individual Coaching Versus Group Coaching Profits
      • Building a Reputation as a Powerful Affiliate
      • Pinterest Profit Niches
    • Low cost business ideas
      • Making Money Off eBooks and Reports
  • Valuation
    • Business Valuation
    • Increase business valuation
      • Making Wise Investments in Tools to Further Your Business
    • Business Valuation Methods
    • Understand business valuation
  • About
    • About Me
    • Blog
    • Contact Us
    • Sitemap
    • Privacy Policy
  • Strategy
  • Supply Chain
  • Customer Focus
  • Entrepreneur
  • Biz Opportunities
You are here: Home / Entrepreneur / A New Way to Examine and Tackle Mobile Ad Fraud

A New Way to Examine and Tackle Mobile Ad Fraud

September 22, 2018 by Asif Nazeer Leave a Comment


Anti-fraud solutions will help to advance the entire mobile ad ecosystem.


September
22, 2018

7 min read

Opinions expressed by Entrepreneur contributors are their own.


Fraud might seem like an enigmatic problem, with no obvious remedy to stop it from taking your campaign budgets.

But, in fact, mobile ad fraud is somewhat limited in the operations or, how it can work. Though fraudsters are always developing new exploits to steal an app’s marketing budget, or to circumvent fraud prevention solutions, that doesn’t mean the underlying systems vary. Such a distinction is important when trying to develop a foolproof solution against the biggest challenge in the mobile marketing industry today.

At Adjust, we think about fraud differently. We view exploits, such as SDK Spoofing, as “methods,” or ways in which a fraudster can operate in order to steal. But, at its root cause, mobile ad fraud can only work in one of two established structures, or “types.”

This viewpoint may come across as an unfamiliar mindset, even unnecessary to some. However, we believe the problem of mobile ad fraud, once defined, can be dealt with much more effectively. Instead of arguing over semantics, the industry as a whole can move forward, dealing with fraud in a more cooperative way.

There are ultimately only two types of fraud.

In all types of fraud, a fraudster can spoof one (or both) of two types of ‘signals’ used in attribution. The two types of signals they can spoof are ad engagements (like views or clicks) and app activities (like installs, sessions and events).

Thus, we’ve created a distinction between types of fraud that spoof ad engagements or the user’s in-app activity. The former is known as Spoofed Attribution. The latter is called Spoofed Users.

Related: 5 Psychological Reasons ‘Social Proof’ Beats Everything Else in Marketing

Why make this distinction?

Whenever you discover a new method of fraud, it’s best to start an investigation into it by first identifying which type of signal this form of fraud wants to exploit.

For instance, one method of Spoofed Attribution began as ‘Click Spamming.’ As time passes you may discover more advanced methods — ‘Click Injection’ among them. Both methods result in stealing attribution, but they work in different ways. Don’t worry if you don’t know these both types of fraud, we cover that later in more detail.

By understanding that the two work within the same system, it becomes easier to apply solutions that deal with both. Basing the two in a single definition – Spoofed Attribution – it is much simpler to work in terms of fraudsters stealing attribution, while not getting them mixed up with other schemes.

Defining ad fraud – but to what purpose?

Essentially, in the process of trying to stamp out each individual method, certain patterns become identifiable. Instead of asking, “Is this fraud?” you should be asking:

What is the method of this fraud?

How did they get this user activity into our system?

How does Click Spamming really work?

If you begin by stating that there is a problem, and then look at the individual methods applied, you’ll gain a more assured understanding. Follow these proactive steps:

  1. This is that method

  2. This is the countermeasure

  3. This is the yes-no filter

Fraud types

Combining the previously mentioned spoofed signals, here’s a visual matrix:

 

  • Everything in Type I is considered genuine traffic, where real users are driven to interact with an app by an advertisement with which they have actually engaged.

  • Type II describes Spoofed Attribution — where a fraudster spoofs ad engagements for real users, with the aim of stealing credit from a user that either organically interacted with the app or was driven by another legitimate advertisement. This type is also known as ‘stolen attribution’ or “poaching.”

  • Type III and IV defines Spoofed Users: this type of fraud focuses on simulating the behavior of user in-app activity. By spoofing installs and events for non-existent users, fraudsters can steal ad budgets aimed at rewarding app-based conversions. “Botting,” “bots” and fraud related to “fake users” are all associated with this type.

Currently, fraudsters can easily fake ad engagements for any users they’ve fabricated. So, whenever spoofed app activity appears, it’s always coupled with fraudulent engagement data. For the sake of simplicity, types III and IV have been grouped together.

When discussing fraud, it’s useful to think of these “types” (such as Spoofed Attribution) as the “what,” and “methods” (like Click Spam) as the “how.”

Related: How to Be Invisible Online — Without Going Off the Grid (Infographic)

Fraud methods

So, what do these ‘methods’ look like in practice? Splitting them into their respective types, you gain more clarity into what each fraud method does.

Methods of Spoofed Attribution include Click Spam and Click Injection. With Spoofed Users where the activity is faked, there are Simulators, Device Farms and SDK Spoofing. When applying our above matrix, the configuration of fraud looks like this:


 

Let’s cover each type in a little more detail.

Spoofed Attribution

Spoofed ad engagements started out with simple Click Spamming and its variations like “click stacking,” “views as clicks” or “preloading.” These methods function by targeting as many clicks to an attribution company as possible and gaining attribution for users by randomly matching device IDs or fingerprints.

Advanced methods (like Click Injection) create fake clicks during the download of an app, claiming attribution with an impossible to beat “last click.”

Spoofed Users

The first cases of Spoofed Users detected involved simulators on cloud computing services running Android apps that were pretending to be real users. On iOS, device farms exist in southeast Asian countries where real devices and actual humans created non-genuine app activities.

Recently, there’s a much more devious method: SDK Spoofing. This cuts the cost for creating fake user interactions by only faking the requests made from an app to servers of attribution companies and app publishers, instead of actually running the app. Fraudsters have broken encryptions and hashed signatures, which has led to an arms race between fraudsters and researchers.

Simulators, cheap labor and bots can all be used to create fraudulent app activities. They are all different methods used to commit the same type of fraud.

Related: Giving Advertisers a Way to Bypass Facebook Click Fraud

What is fraud prevention?

Finally, it’s important to examine the lack of distinction between fraud solutions, and exactly how you apply a methodology to create a stronger system.

A lot of confusion exists among prevention, detection and rejection – often to the detriment of advertisers who want to run campaigns without interference. The industry often uses detection, prevention and rejection in the same context interchangeably. This creates uncertainty from a lack of expertise, which is advanced maliciously to keep the market in an ongoing state of confusion.

Fraud prevention is the act of rejecting attribution to known methods of fraud.

The chart below illustrates an important flow to follow for detecting a type of fraud, then researching the method used before finally creating a logical filter for its unique characteristics.

 

When applying this prescribed definition of fraud prevention, you’ll find that only attribution companies are in a position to apply filters effectively. Third-party tools can only show detection metrics after the fact, unless an attribution company allows them to interfere with the attribution.

Fraud prevention should not just be a marketing ploy, or a means to muddy the water — it’s a serious responsibility. If done correctly, anti-fraud solutions will help to advance the entire mobile ad ecosystem. If done without the proper attention to detail and the research necessary, it will end up as the snake oil of our industry.



Source link

Filed Under: Entrepreneur

About Asif Nazeer

My current sphere of interest is Internet Marketing - Worked for many years in finance and banking. I now consult for small businesses and starts ups. Also involved in venture capital for new companies.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Sign up for our newsletter and receive a free EBook on how to boost productivity






Find it

Blog By

Small Business Consultant and Accountant helping grow your small business Read More…

Follow us online

  • Email
  • LinkedIn
  • Twitter

Recent Posts

The Benefits of Buying an Apartment in a Gated Community

Featured image from damacproperties.com Especially if you own a home-based … [Read More...]

  • 4 Steps to Take When You Quit Your Job – Careers
  • How to Find the Best Auto Insurance for Your Needs – Business
  • The Key Differences Between a Virtual Mailbox and a PO Box – Business

Archives

  • March 2023 (4)
  • February 2023 (2)
  • January 2023 (5)
  • December 2022 (5)
  • November 2022 (8)
  • October 2022 (7)
  • September 2022 (6)
  • August 2022 (6)
  • July 2022 (13)
  • June 2022 (11)
  • May 2022 (7)
  • April 2022 (8)
  • March 2022 (12)
  • February 2022 (8)
  • January 2022 (11)
  • December 2021 (9)
  • November 2021 (10)
  • October 2021 (11)
  • September 2021 (3)
  • August 2021 (10)
  • July 2021 (12)
  • June 2021 (5)
  • May 2021 (10)
  • April 2021 (17)
  • March 2021 (40)
  • February 2021 (39)
  • January 2021 (58)
  • December 2020 (66)
  • November 2020 (59)
  • October 2020 (34)
  • September 2020 (47)
  • August 2020 (37)
  • July 2020 (2)
  • May 2020 (1)
  • April 2020 (1)
  • March 2020 (33)
  • February 2020 (25)
  • January 2020 (20)
  • December 2019 (27)
  • November 2019 (28)
  • October 2019 (34)
  • September 2019 (38)
  • August 2019 (13)
  • July 2019 (44)
  • June 2019 (40)
  • May 2019 (58)
  • April 2019 (51)
  • March 2019 (43)
  • February 2019 (44)
  • January 2019 (43)
  • December 2018 (47)
  • November 2018 (43)
  • October 2018 (58)
  • September 2018 (44)
  • August 2018 (60)
  • July 2018 (49)
  • June 2018 (58)
  • May 2018 (54)
  • April 2018 (39)
  • March 2018 (46)
  • February 2018 (48)

Biz Opps

Featured image from … [Read More...]

Featured image by Andrea Piacquadio via … [Read More...]

Featured image by Jacob Morch via … [Read More...]

Customer Focus

First published in Exchange, the magazine of the … [Read More...]

Entrepreneurs

Uptown Cheapskate is a resale store for young … [Read More...]

A team of neuroscientists in the United States … [Read More...]

This article was translated from our Spanish … [Read More...]

Strategy

If you buy something through our links, we may … [Read More...]

In helping celebrate Black History Month, Facebook … [Read More...]

ZOHO started its current Email Marketing Basics … [Read More...]

Supply Chain

Although managing inbound shipping can be … [Read More...]

© Copyright 2015 iSmall-Business.net · All Rights Reserved · Powered by ISmall-Business.net · Admin