The Devil is in the Details: Analyzing the Lucrative Ad Fraud Patterns of the Online Ad Ecosystem
- URL: http://arxiv.org/abs/2306.08418v2
- Date: Fri, 18 Oct 2024 11:58:06 GMT
- Title: The Devil is in the Details: Analyzing the Lucrative Ad Fraud Patterns of the Online Ad Ecosystem
- Authors: Emmanouil Papadogiannakis, Nicolas Kourtellis, Panagiotis Papadopoulos, Evangelos P. Markatos,
- Abstract summary: Bad actors have found ways to circumvent restrictions, and generate substantial revenue that can support websites with objectionable or even illegal content.
We show how identifier pooling can redirect ad revenues from reputable domains to notorious domains serving objectionable content.
We publish a Web monitoring service that enhances the transparency of supply chains and business relationships between publishers and ad networks.
- Score: 2.1456348289599134
- License:
- Abstract: The online advertising market has recently reached the 500 billion dollar mark. To accommodate the need to match a user with the highest bidder at a fraction of a second, it has moved towards a complex, automated and often opaque model that involves numerous agents and intermediaries. Stimulated by the lack of transparency, but also the enormous potential profits, bad actors have found ways to circumvent restrictions, and generate substantial revenue that can support websites with objectionable or even illegal content. In this work, we evaluate transparency Web standards and show how shady actors take advantage of gaps in these standards to absorb ad revenues while putting the brand safety of advertisers in danger. We collect and study a large corpus of hundreds of thousands of websites and show how ad transparency standards can be abused by bad actors to obscure ad revenue flows. We show how identifier pooling can redirect ad revenues from reputable domains to notorious domains serving objectionable content and that the phenomenon is underestimated by previous studies by a factor of 15. Finally, we publish a Web monitoring service that enhances the transparency of supply chains and business relationships between publishers and ad networks.
Related papers
- Accessibility Issues in Ad-Driven Web Applications [3.9531869396416344]
Third-party advertisements (ads) are a vital revenue source for free web services, but they introduce significant accessibility challenges.
We conduct the first large-scale investigation of 430K website elements, including nearly 100K ad elements, to understand the accessibility of ads on websites.
arXiv Detail & Related papers (2024-09-27T09:50:06Z) - Online Advertising is a Regrettable Necessity: On the Dangers of Pay-Walling the Web [0.0]
We show that 135 countries with a total population estimate of 6.56 billion people cannot afford a scenario of a fully paywalled web.
We call for further research and policy initiatives to keep the web open and more inclusive with a sustainable business model.
arXiv Detail & Related papers (2024-08-17T03:23:08Z) - Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain [12.425164873579574]
We investigate the effectiveness of vulnerability notification campaigns aimed at mitigating dark pooling.
Our nine-month long multi-stakeholder notification study shows that notifications are an effective method for reducing dark pooling vulnerabilities.
In addition to being the first notification study targeting the online advertising ecosystem, we are also the first to study multi-stakeholder context in vulnerability notifications.
arXiv Detail & Related papers (2024-06-11T05:31:29Z) - Discrimination through Image Selection by Job Advertisers on Facebook [79.21648699199648]
We propose and investigate the prevalence of a new means for discrimination in job advertising.
It combines both targeting and delivery -- through the disproportionate representation or exclusion of people of certain demographics in job ad images.
We use the Facebook Ad Library to demonstrate the prevalence of this practice.
arXiv Detail & Related papers (2023-06-13T03:43:58Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - The Inventory is Dark and Full of Misinformation: Understanding the
Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain [1.0573120858963332]
Ad-tech enables publishers to sell their ad inventory to millions of demand partners through a complex supply chain.
We investigate for the first time how ad-tech sites subvert transparency standards and pool their ad inventory with unrelated sites to circumvent brand safety protections.
arXiv Detail & Related papers (2022-10-13T01:24:19Z) - Online Advertising Revenue Forecasting: An Interpretable Deep Learning
Approach [0.0]
We propose a novel attention-based architecture to predict publishers' advertising revenues.
Our results outperform several benchmark deep-learning time-series forecast models over multiple time horizons.
arXiv Detail & Related papers (2021-11-16T23:55:02Z) - Learning to Infer User Hidden States for Online Sequential Advertising [52.169666997331724]
We propose our Deep Intents Sequential Advertising (DISA) method to address these issues.
The key part of interpretability is to understand a consumer's purchase intent which is, however, unobservable (called hidden states)
arXiv Detail & Related papers (2020-09-03T05:12:26Z) - Do Interruptions Pay Off? Effects of Interruptive Ads on Consumers
Willingness to Pay [79.9312329825761]
We present the results of a study designed to measure the impact of interruptive advertising on consumers willingness to pay for products bearing the advertiser's brand.
Our results contribute to the research on the economic impact of advertising, and introduce a method of measuring actual (as opposed to self-reported) willingness to pay in experimental marketing research.
arXiv Detail & Related papers (2020-05-14T09:26:57Z) - Adversarial Attacks on Linear Contextual Bandits [87.08004581867537]
Malicious agents may have incentives to attack the bandit algorithm to induce it to perform a desired behavior.
We show that a malicious agent can force a linear contextual bandit algorithm to pull any desired arm $T - o(T)$ times over a horizon of $T$ steps.
We also investigate the case when a malicious agent is interested in affecting the behavior of the bandit algorithm in a single context.
arXiv Detail & Related papers (2020-02-10T15:04:09Z) - Quantifying the Vulnerabilities of the Online Public Square to Adversarial Manipulation Tactics [43.98568073610101]
We use a social media model to quantify the impacts of several adversarial manipulation tactics on the quality of content.
We find that the presence of influential accounts, a hallmark of social media, exacerbates the vulnerabilities of online communities to manipulation.
These insights suggest countermeasures that platforms could employ to increase the resilience of social media users to manipulation.
arXiv Detail & Related papers (2019-07-13T21:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.