SlideShare a Scribd company logo
1 of 31
Search Advertising
for Small Business
Fraudulent Internet Yellow Pages Traffic
http://digimechanix.com
What’s A Bot?
A Bot is:
A Malicious Software Program that infects a home
computer and simulates Human Activity
Controlled by a Criminal who makes money selling
fraudulent web traffic
Capable of simulating chats and clicks, rendering ads,
and impersonating real computer users
A Single Infected Home Computer that is often
Combined with other Bots in a Group called a Botnet
2014 Fraudulent Bot Traffic Report
63 to 80% of Traffic to Small and Medium-size websites came from Bots
Financial Impact of Fraudulent Bot Traffic
Fraudulent Bot Traffic
Worthless to small and medium-size businesses
Mixed in with legitimate unique visitor, click, and
page view data
Purchased by IYP publishers for fractions of a cent and
resold to small business advertisers with a huge markup
Fraudulent Bot Traffic is:
Acquired from IYPs’ Networks of Local Publishers
Indistinguishable from real online ad performance data
http://digimechanix.com
Be used in collections of computers called Botnets
that are controlled by fraudsters
Render ads on websites
Distribute malware disguised as popular search
items or games on download sites
Masquerade as legitimate search engine crawlers
Impersonate Real Unique Visitors
Impersonator Bots Confound IYP Results
Impersonator Bots can :
Attack of the Impersonator Bots
http://digimechanix.com
Bots Spread Across the U.S.
Bot Traffic Comes from Residential IP Addresses
http://digimechanix.com
Bots Hijack Home Computers
 Log in to large email exchanges
 Share/View content on Social Media websites
 Make purchases on ecommerce sites
Computer users unknowingly invite Bots into their home computers when they:
http://digimechanix.com
 Download Free Apps and Games
Consumers are Infected by Bots
http://digimechanix.com
Symptoms of Bot Infections
Free = Fraud
=
The Price of Free Software is Too High
http://digimechanix.com
Anatomy of IYP Fraud
Internet Yellow Pages publishers benefit from Bots because they:
 Mimic the profiles of the real consumers whose
computers they infect
 Click on ads and links more often than real
people do
 Move the cursor on webpages making sure to
pass over ads
 Visit various websites to generate user histories
and cookies
 Place items in online shopping carts
Bots Inflate IYP Results
Prevalence of Internet Yellow Pages Fraud
Internet Yellow Pages fraud from Bot traffic is more likely to occur:
http://digimechanix.com
Prevalence of Internet Yellow Pages Fraud
Internet Yellow Pages Fraud from Bot Traffic is more likely to occur:
Fraudulent IYP Traffic Occurs at Overnight
http://digimechanix.com
Fraudulent Saturday Afternoon IYP Traffic
Who Benefits from Fraudulent IYP Traffic?
The Sales and Distribution of Fraudulent Bot Traffic:
Pumps Up Internet Yellow Pages Profits
Inflates Ad Performance and Advertiser Fees
Increases the percentages paid to ad
Exchanges and Networks of Local Publishers
Provides a profitable income stream for
cyber thieves
Allows Ad Agencies to Over-estimate Their
Effectiveness
http://digimechanix.com
2014 Estimated Fraudulent IYP Traffic by Category
http://digimechanix.com
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Restaurants
Locksmiths
Attorneys
Plumbers
Dentist/Physicians
Bailbondsmen
Fraudulent Traffic In-House Traffic Human Traffic
IYP Advertisers Lose
Summary
56% of all online traffic comes from Bots
IYPs purchase fraudulent traffic from members of
their Networks of Local Publishers
Impersonator Bots are the most harmful type
of malware to IYP advertisers
IYP advertisers will pay about $1 billion for
worthless, fraudulent Bot traffic in 2015
67% of fraudulent Bot traffic originates from
home computers infected with malware
Summary
63 to 80% of IYP Traffic to Small and medium-size
websites comes from Bots
Over 20% of video ad impressions reported by IYP
publishers come from fraudulent Bot Traffic
Fraudulent IYP Traffic is more likely to occur everyday
between midnight and 6 am and on Saturday afternoons
52% of the traffic purchased from IYP’s Networks of
Local Publishers is fraudulent
Over 50% of IYP traffic received by advertisers in the
Legal, Plumbing, and Dentists/Physicians categories
came from Bots http://digimechanix.com
Recommendations for IYP Advertisers
 Apply day-parting strategies whenever possible
 Avoid signing long-term IYP contracts to
limit exposure to Fraudulent Bot Traffic
 Carefully scrutinize monthly IYP Traffic
reports
 Investigate how IYPs’ Networks of Local
Publishers source traffic
Recommendations for IYP Advertisers
Avoid IYP publishers that do not publicize
Blacklists of fraudulent IP addresses and traffic
sources
Be aware that video ad plays are often generated
by Bots rather than humans
Demand transparency from IYP publishers
regarding all third-party sources of traffic
http://digimechanix.com
Request a regularly scheduled, independent
third-party IYP Traffic Audit
For More Information Visit Us at:
http://digimechanix.com
Fraudulent IYP Traffic System
http://digimechanix.com

More Related Content

What's hot

What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with ForterSimplifilm
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In EcommerceLarry_Moffatt
 
Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015James Nichols
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attackijtsrd
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet FraudGoose & Gander
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesTransUnion
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analyticsSven Hezel
 

What's hot (11)

What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 
Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015Apsalar App Fraud Index Report - July 2015
Apsalar App Fraud Index Report - July 2015
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attack
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
 
Sim swapping
Sim swappingSim swapping
Sim swapping
 
Report on ios piracy
Report on ios piracyReport on ios piracy
Report on ios piracy
 
Lunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial ServicesLunch and Learn: Fraud Trends in Financial Services
Lunch and Learn: Fraud Trends in Financial Services
 
Detecting fraud through traffic analytics
Detecting fraud through traffic analyticsDetecting fraud through traffic analytics
Detecting fraud through traffic analytics
 

Viewers also liked

Rise 2011 pricing_profits_qualityof_life
Rise 2011 pricing_profits_qualityof_lifeRise 2011 pricing_profits_qualityof_life
Rise 2011 pricing_profits_qualityof_lifeReuben Swartz
 
Xearthquakerocksjapan efatt saleh
Xearthquakerocksjapan efatt salehXearthquakerocksjapan efatt saleh
Xearthquakerocksjapan efatt salehgeoffdymond
 
Utazási magazin(1)+ani (nx power lite)
Utazási magazin(1)+ani (nx power lite)Utazási magazin(1)+ani (nx power lite)
Utazási magazin(1)+ani (nx power lite)VarganeAnny
 
Proyecto Programación Lineal
 Proyecto Programación Lineal Proyecto Programación Lineal
Proyecto Programación LinealMichelle Cordano
 
Jplan preso westartup
Jplan preso westartupJplan preso westartup
Jplan preso westartupBart Collet
 
Fraternidad Misionera Padre Manuel Soria
Fraternidad Misionera Padre Manuel SoriaFraternidad Misionera Padre Manuel Soria
Fraternidad Misionera Padre Manuel SoriaOscar Sagastume
 
Ow2 Open World Forum09 Trustie Project
Ow2 Open World Forum09 Trustie ProjectOw2 Open World Forum09 Trustie Project
Ow2 Open World Forum09 Trustie ProjectOW2
 
Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014
Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014
Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014Donna Gaudet
 
Overzicht BEST Project - NWO Site Visit
Overzicht BEST Project - NWO Site VisitOverzicht BEST Project - NWO Site Visit
Overzicht BEST Project - NWO Site VisitRinke Hoekstra
 
Korekta tekstów Acutext - prezentacja platformy
Korekta tekstów Acutext - prezentacja platformyKorekta tekstów Acutext - prezentacja platformy
Korekta tekstów Acutext - prezentacja platformyAcutext
 
Xebia Knowledge Exchange (mars 2010) - Lucene : From theory to real world
Xebia Knowledge Exchange (mars 2010) - Lucene : From theory to real worldXebia Knowledge Exchange (mars 2010) - Lucene : From theory to real world
Xebia Knowledge Exchange (mars 2010) - Lucene : From theory to real worldMichaël Figuière
 
Quintiles Second Quarter 2014 Earnings Call
Quintiles Second Quarter 2014 Earnings CallQuintiles Second Quarter 2014 Earnings Call
Quintiles Second Quarter 2014 Earnings CallQuintiles2014
 

Viewers also liked (20)

Rise 2011 pricing_profits_qualityof_life
Rise 2011 pricing_profits_qualityof_lifeRise 2011 pricing_profits_qualityof_life
Rise 2011 pricing_profits_qualityof_life
 
Xearthquakerocksjapan efatt saleh
Xearthquakerocksjapan efatt salehXearthquakerocksjapan efatt saleh
Xearthquakerocksjapan efatt saleh
 
Trabajo sandra.docx
Trabajo sandra.docxTrabajo sandra.docx
Trabajo sandra.docx
 
Utazási magazin(1)+ani (nx power lite)
Utazási magazin(1)+ani (nx power lite)Utazási magazin(1)+ani (nx power lite)
Utazási magazin(1)+ani (nx power lite)
 
Proyecto No de Ley
Proyecto No de LeyProyecto No de Ley
Proyecto No de Ley
 
Proyecto Programación Lineal
 Proyecto Programación Lineal Proyecto Programación Lineal
Proyecto Programación Lineal
 
RIP GCM
RIP GCMRIP GCM
RIP GCM
 
Quintero Gómez fotos
Quintero Gómez fotosQuintero Gómez fotos
Quintero Gómez fotos
 
Jplan preso westartup
Jplan preso westartupJplan preso westartup
Jplan preso westartup
 
Fraternidad Misionera Padre Manuel Soria
Fraternidad Misionera Padre Manuel SoriaFraternidad Misionera Padre Manuel Soria
Fraternidad Misionera Padre Manuel Soria
 
Ow2 Open World Forum09 Trustie Project
Ow2 Open World Forum09 Trustie ProjectOw2 Open World Forum09 Trustie Project
Ow2 Open World Forum09 Trustie Project
 
Domestic Offsetting; A local option - Liam Kinsella DAFF -EPA June 2010
Domestic Offsetting; A local option -  Liam Kinsella DAFF -EPA June 2010Domestic Offsetting; A local option -  Liam Kinsella DAFF -EPA June 2010
Domestic Offsetting; A local option - Liam Kinsella DAFF -EPA June 2010
 
OW2 Community and more!
OW2 Community and more!OW2 Community and more!
OW2 Community and more!
 
Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014
Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014
Evolution of a Truly Open Arithmetic MOOC - OCWC Global 2014
 
Izovenezuela[1]
Izovenezuela[1]Izovenezuela[1]
Izovenezuela[1]
 
Overzicht BEST Project - NWO Site Visit
Overzicht BEST Project - NWO Site VisitOverzicht BEST Project - NWO Site Visit
Overzicht BEST Project - NWO Site Visit
 
Utf 8 Have A Nice Day
Utf 8  Have A Nice DayUtf 8  Have A Nice Day
Utf 8 Have A Nice Day
 
Korekta tekstów Acutext - prezentacja platformy
Korekta tekstów Acutext - prezentacja platformyKorekta tekstów Acutext - prezentacja platformy
Korekta tekstów Acutext - prezentacja platformy
 
Xebia Knowledge Exchange (mars 2010) - Lucene : From theory to real world
Xebia Knowledge Exchange (mars 2010) - Lucene : From theory to real worldXebia Knowledge Exchange (mars 2010) - Lucene : From theory to real world
Xebia Knowledge Exchange (mars 2010) - Lucene : From theory to real world
 
Quintiles Second Quarter 2014 Earnings Call
Quintiles Second Quarter 2014 Earnings CallQuintiles Second Quarter 2014 Earnings Call
Quintiles Second Quarter 2014 Earnings Call
 

Similar to Fraudulent Internet Yellow Pages Traffic

Fraud in digital advertising botnet baseline summery ziv ginsberg
Fraud in digital advertising botnet baseline summery   ziv ginsbergFraud in digital advertising botnet baseline summery   ziv ginsberg
Fraud in digital advertising botnet baseline summery ziv ginsbergZiv Ginsberg
 
2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANAWhite Ops
 
Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Wossname
 
Bot detection deck 042514 final
Bot detection deck 042514 finalBot detection deck 042514 final
Bot detection deck 042514 finalVindicoGroup
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Distil Networks
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Distil Networks
 
Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015Romain Fonnier
 
Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)Margarita Zlatkova
 
The Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital AdvertisingThe Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital Advertisingyann le gigan
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
What is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itWhat is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itAlan King
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckG3 Communications
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...G3 Communications
 
WTF is Ad Fraud?
 WTF is Ad Fraud? WTF is Ad Fraud?
WTF is Ad Fraud?Digiday
 
Programmatic Ad Fraud
Programmatic Ad FraudProgrammatic Ad Fraud
Programmatic Ad FraudTed Politidis
 

Similar to Fraudulent Internet Yellow Pages Traffic (20)

Fraud in digital advertising botnet baseline summery ziv ginsberg
Fraud in digital advertising botnet baseline summery   ziv ginsbergFraud in digital advertising botnet baseline summery   ziv ginsberg
Fraud in digital advertising botnet baseline summery ziv ginsberg
 
2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA
 
Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)
 
ComplianceBrief
ComplianceBriefComplianceBrief
ComplianceBrief
 
Bot detection deck 042514 final
Bot detection deck 042514 finalBot detection deck 042514 final
Bot detection deck 042514 final
 
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
Field Guide To Preventing Competitor Price Scraping, Unwanted Transactions, B...
 
Digital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fouDigital ad fraud superheroes the good guys by augustine fou
Digital ad fraud superheroes the good guys by augustine fou
 
Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?Are Bot Operators Eating Your Lunch?
Are Bot Operators Eating Your Lunch?
 
Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015
 
Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)
 
The Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital AdvertisingThe Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital Advertising
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
What is online ad fraud and what does um do about it
What is online ad fraud and what does um do about itWhat is online ad fraud and what does um do about it
What is online ad fraud and what does um do about it
 
8 types of mobile ad fraud
8 types of mobile ad fraud8 types of mobile ad fraud
8 types of mobile ad fraud
 
Rtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deckRtp rsp16-distil networks-final-deck
Rtp rsp16-distil networks-final-deck
 
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
StubHub's Field Guide To Preventing Competitor Price Scraping, Unwanted Trans...
 
WTF is Ad Fraud?
 WTF is Ad Fraud? WTF is Ad Fraud?
WTF is Ad Fraud?
 
IAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud FinalIAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud Final
 
Display Ad Fraud Explainer by Augustine Fou
Display Ad Fraud Explainer by Augustine FouDisplay Ad Fraud Explainer by Augustine Fou
Display Ad Fraud Explainer by Augustine Fou
 
Programmatic Ad Fraud
Programmatic Ad FraudProgrammatic Ad Fraud
Programmatic Ad Fraud
 

More from Ramon Cartwright

Neo Souls' Demographic Profile, Smartphone Usage, and Purchase Behavior
Neo Souls' Demographic Profile, Smartphone Usage, and Purchase BehaviorNeo Souls' Demographic Profile, Smartphone Usage, and Purchase Behavior
Neo Souls' Demographic Profile, Smartphone Usage, and Purchase BehaviorRamon Cartwright
 
Neo Soul consumers: A Demographic Profile of African American Millennials
Neo Soul consumers: A Demographic Profile of African American MillennialsNeo Soul consumers: A Demographic Profile of African American Millennials
Neo Soul consumers: A Demographic Profile of African American MillennialsRamon Cartwright
 
DigiKnowledge: Consumer opinions about display ads
DigiKnowledge: Consumer opinions about display adsDigiKnowledge: Consumer opinions about display ads
DigiKnowledge: Consumer opinions about display adsRamon Cartwright
 
A Rating & Review of Display Advertising: FRAUD ALERT
A Rating & Review of Display Advertising: FRAUD ALERTA Rating & Review of Display Advertising: FRAUD ALERT
A Rating & Review of Display Advertising: FRAUD ALERTRamon Cartwright
 
Emergence of Mobile Search
Emergence of Mobile SearchEmergence of Mobile Search
Emergence of Mobile SearchRamon Cartwright
 

More from Ramon Cartwright (6)

Neo Souls' Demographic Profile, Smartphone Usage, and Purchase Behavior
Neo Souls' Demographic Profile, Smartphone Usage, and Purchase BehaviorNeo Souls' Demographic Profile, Smartphone Usage, and Purchase Behavior
Neo Souls' Demographic Profile, Smartphone Usage, and Purchase Behavior
 
Neo Soul consumers: A Demographic Profile of African American Millennials
Neo Soul consumers: A Demographic Profile of African American MillennialsNeo Soul consumers: A Demographic Profile of African American Millennials
Neo Soul consumers: A Demographic Profile of African American Millennials
 
DigiKnowledge: Consumer opinions about display ads
DigiKnowledge: Consumer opinions about display adsDigiKnowledge: Consumer opinions about display ads
DigiKnowledge: Consumer opinions about display ads
 
A Rating & Review of Display Advertising: FRAUD ALERT
A Rating & Review of Display Advertising: FRAUD ALERTA Rating & Review of Display Advertising: FRAUD ALERT
A Rating & Review of Display Advertising: FRAUD ALERT
 
Mobile Local Search
Mobile Local SearchMobile Local Search
Mobile Local Search
 
Emergence of Mobile Search
Emergence of Mobile SearchEmergence of Mobile Search
Emergence of Mobile Search
 

Recently uploaded

定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一s SS
 
From Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOFrom Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOSzymon Słowik
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceSapana Sha
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldScalenut
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project VideoSineadBidwell
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...Ahrefs
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Search Engine Journal
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...CIO Business World
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityMonishka Adhikari
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptxMasterPhil1
 
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfResearch and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfVWO
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfHigher Education Marketing
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationAli Raza
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDemandbase
 

Recently uploaded (20)

定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
 
From Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOFrom Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEO
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts Service
 
Mastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven WorldMastering SEO in the Evolving AI-driven World
Mastering SEO in the Evolving AI-driven World
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project Video
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
Do More with Less: Navigating Customer Acquisition Challenges for Today's Ent...
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic Creativity
 
Best Persuasive selling skills presentation.pptx
Best Persuasive selling skills  presentation.pptxBest Persuasive selling skills  presentation.pptx
Best Persuasive selling skills presentation.pptx
 
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfResearch and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdf
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store Optimization
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
 

Fraudulent Internet Yellow Pages Traffic

  • 1. Search Advertising for Small Business Fraudulent Internet Yellow Pages Traffic
  • 3. What’s A Bot? A Bot is: A Malicious Software Program that infects a home computer and simulates Human Activity Controlled by a Criminal who makes money selling fraudulent web traffic Capable of simulating chats and clicks, rendering ads, and impersonating real computer users A Single Infected Home Computer that is often Combined with other Bots in a Group called a Botnet
  • 4. 2014 Fraudulent Bot Traffic Report 63 to 80% of Traffic to Small and Medium-size websites came from Bots
  • 5. Financial Impact of Fraudulent Bot Traffic
  • 6. Fraudulent Bot Traffic Worthless to small and medium-size businesses Mixed in with legitimate unique visitor, click, and page view data Purchased by IYP publishers for fractions of a cent and resold to small business advertisers with a huge markup Fraudulent Bot Traffic is: Acquired from IYPs’ Networks of Local Publishers Indistinguishable from real online ad performance data http://digimechanix.com
  • 7. Be used in collections of computers called Botnets that are controlled by fraudsters Render ads on websites Distribute malware disguised as popular search items or games on download sites Masquerade as legitimate search engine crawlers Impersonate Real Unique Visitors Impersonator Bots Confound IYP Results Impersonator Bots can :
  • 8. Attack of the Impersonator Bots http://digimechanix.com
  • 10. Bot Traffic Comes from Residential IP Addresses http://digimechanix.com
  • 11. Bots Hijack Home Computers  Log in to large email exchanges  Share/View content on Social Media websites  Make purchases on ecommerce sites Computer users unknowingly invite Bots into their home computers when they: http://digimechanix.com  Download Free Apps and Games
  • 12. Consumers are Infected by Bots http://digimechanix.com
  • 13. Symptoms of Bot Infections
  • 15. The Price of Free Software is Too High http://digimechanix.com
  • 16. Anatomy of IYP Fraud
  • 17. Internet Yellow Pages publishers benefit from Bots because they:  Mimic the profiles of the real consumers whose computers they infect  Click on ads and links more often than real people do  Move the cursor on webpages making sure to pass over ads  Visit various websites to generate user histories and cookies  Place items in online shopping carts Bots Inflate IYP Results
  • 18. Prevalence of Internet Yellow Pages Fraud Internet Yellow Pages fraud from Bot traffic is more likely to occur: http://digimechanix.com
  • 19. Prevalence of Internet Yellow Pages Fraud Internet Yellow Pages Fraud from Bot Traffic is more likely to occur:
  • 20. Fraudulent IYP Traffic Occurs at Overnight http://digimechanix.com
  • 22. Who Benefits from Fraudulent IYP Traffic? The Sales and Distribution of Fraudulent Bot Traffic: Pumps Up Internet Yellow Pages Profits Inflates Ad Performance and Advertiser Fees Increases the percentages paid to ad Exchanges and Networks of Local Publishers Provides a profitable income stream for cyber thieves Allows Ad Agencies to Over-estimate Their Effectiveness http://digimechanix.com
  • 23. 2014 Estimated Fraudulent IYP Traffic by Category http://digimechanix.com 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Restaurants Locksmiths Attorneys Plumbers Dentist/Physicians Bailbondsmen Fraudulent Traffic In-House Traffic Human Traffic
  • 25. Summary 56% of all online traffic comes from Bots IYPs purchase fraudulent traffic from members of their Networks of Local Publishers Impersonator Bots are the most harmful type of malware to IYP advertisers IYP advertisers will pay about $1 billion for worthless, fraudulent Bot traffic in 2015 67% of fraudulent Bot traffic originates from home computers infected with malware
  • 26. Summary 63 to 80% of IYP Traffic to Small and medium-size websites comes from Bots Over 20% of video ad impressions reported by IYP publishers come from fraudulent Bot Traffic Fraudulent IYP Traffic is more likely to occur everyday between midnight and 6 am and on Saturday afternoons 52% of the traffic purchased from IYP’s Networks of Local Publishers is fraudulent Over 50% of IYP traffic received by advertisers in the Legal, Plumbing, and Dentists/Physicians categories came from Bots http://digimechanix.com
  • 27. Recommendations for IYP Advertisers  Apply day-parting strategies whenever possible  Avoid signing long-term IYP contracts to limit exposure to Fraudulent Bot Traffic  Carefully scrutinize monthly IYP Traffic reports  Investigate how IYPs’ Networks of Local Publishers source traffic
  • 28. Recommendations for IYP Advertisers Avoid IYP publishers that do not publicize Blacklists of fraudulent IP addresses and traffic sources Be aware that video ad plays are often generated by Bots rather than humans Demand transparency from IYP publishers regarding all third-party sources of traffic http://digimechanix.com Request a regularly scheduled, independent third-party IYP Traffic Audit
  • 29. For More Information Visit Us at: http://digimechanix.com
  • 30.
  • 31. Fraudulent IYP Traffic System http://digimechanix.com

Editor's Notes

  1. Warning: The internet advertising market is dangerous, unregulated and crawling with bots, scammers, and questionable traffic. There’s a serious risk a quarter of your ads will never be seen by a real person, and even the biggest publishers aren’t safe. So Internet Yellow Pages advertisers beware of the Bots.
  2. A bot is: A malicious software program that infects a home computer and simulates human activity Controlled by a criminal who makes money selling fraudulent web traffic A single infected home computer that is often combined with other Bots in a group called a Botnet Capable of simulating chats and clicks, rendering ads, and impersonating real computer users
  3. In 2014 56% of all online traffic was generated by bots only 44% was generated by humans. This means that those Internet Yellow Pages and local search engines that claim a billion annual unique visitors may only have about 450,000 unique human visitors every year. Also in 2014, 63 to 80 percent of traffic to small and medium-size business websites came from Bots. Many of these websites were built, hosted, and maintained by Internet Yellow Pages publishers.
  4. Worldwide advertisers will lose $6.3 billion dollars to Bots in 2015. It is estimated that internet yellow pages and local search engine advertisers will lose about $1 billion this year. While it’s not the only type of online advertising fraud today, fraudulent bot traffic is the most prevalent and fastest growing.
  5. Fraudulent Bot traffic is purchased by IYP publishers for fractions of a cent and resold to small business advertisers at a hefty profit, mixed in with legitimate unique visitor, click, and page view data, indistinguishable from real traffic, acquired from IYP publishers’ Networks of Local Publishers, worthless to small and medium-size businesses
  6. Impersonator Bots are most harmful to IYP advertisers because they can join together in botnets that are controlled by criminals, render ads on websites, distribute viruses and worms on game or download sites, masquerade as legitimate search engine crawlers, and impersonate REAL unique visitors
  7. 22% of all Bot traffic are Impersonator Bots right now but their popularity is steadily increasing. Criminals use Impersonator Bots so frequently because they can generate the type of cheap and profitable traffic that IYP publishers and their Networks of Local Publishers (NLPs) want.
  8. Fraudulent advertiser traffic comes from home computers across the nation. No single advertiser large or small is immune to criminals who use bots to steal ad dollars. However, small and medium-size businesses who can’t afford sophisticated online security measures are most susceptible to ad fraud.
  9. 67 percent of fraudulent Bot traffic came from residential IP addresses or home computers by comparison only 1 percent came from mobile networks. However, the use of malicious mobile bots will probably increase along with the popularity of mobile search because that’s where ad dollars are moving.
  10. Bots infect home computers when users download free software while they are checking email, download free apps and games, share or view content on Social Media websites, or make purchases on ecommerce site A significant proportion of online consumers are at risk because they fail to enable online security measures.
  11. 37% of women, 29% of men, and 41% of computer users between the ages of 18 and 44 do not use online security measures 23% of computer users and 19% of smartphone users download unknown files and weblinks 56% of smartphone users and 40% of computer users do not download the latest software and security updates And surprisingly, 37% of online consumers occasionally don’t install security software and 13% of online consumers occasionally turn off security software. This means that about half of all online consumers are vulnerable to bot attacks at all times.
  12. As a result 42% of online consumers have suffered an online security issue, 9% lost photos and important work, and 6% had credit card details stolen. Unfortunately, most of us are not even aware when we get infected.
  13. When it comes to online research, shopping or socializing, in general FREE = FRAUD.
  14. Consumers don’t realize that the real price for most of the free online games and software that they download is giving remote access control over their home computers and wireless networks to cyber criminals. In general, this is how fraudulent Internet Yellow Pages traffic gets created.
  15. Up close the scheme looks like this. A computer user clicks on a malicious software or web link. This infects the computer with a bot that gives a criminal remote access to and control over the computer. The cyber criminal creates a botnet with a group of home computers and builds a phantom website to create fraudulent clicks, impressions, and fake unique visitors. Criminals make deals with Networks of Local Publishers who sell online traffic to Internet Yellow Pages and local search engines . The process is repeated over and over as long as there are customers for the fraudulent traffic. This drives fraudulent searches, clicks, and impressions to IYPs and local search engines. Bogus ads, clicks and unique visitor data are generated by bots. This fraudulent traffic data gets included with legitimate data on IYP advertisers’ monthly performance reports and more importantly small business advertisers pay handsomely for it.
  16. Internet Yellow Pages Publishers target Bots because they: Mimic the profiles of real consumers Generate fraudulent histories and cookies by visiting various websites Click on ads and links more often than humans Emulate cursor movements over ads Place items in online shopping carts
  17. Fraudulent IYP traffic is more likely to come from: 17 to 19% of Programmed or retargeted clicks and impressions from online aggregators, pay per click networks, and search engines came from bots 52% of the traffic that IYP publishers purchase from members of their Networks of Local Publishers is fraudulent In specific advertiser categories like finance, family and food domains 16 to 22% of the online traffic came from bots
  18. 11% of all display ad impression Internet Yellow Pages sites are rendered by bots 23% of video ad impressions are generated by bots About half of bot clicks and impressions on IYPs and local search engines occur during Holidays and overnight after normal business hours
  19. In fact, fraudulent Internet Yellow Pages traffic is more likely to occur well after normal business hours. Bot traffic is far more prevalent during Holidays and between the hours of midnight and 6am.
  20. Each of the lines on this chart represents IYP traffic at noon on Saturday during a typical three month period. Saturday afternoon bot traffic on IYPs and local search engines is sometimes 4-800 times the normal hourly traffic on weekdays. Most IYP advertisers to do not take note of this trend on their monthly IYP traffic reports.
  21. Fraudulent Bot Traffic: -Inflates IYP profits -Inflates Ad Performance and Ad fees -Increases the percentages paid to ad exchanges and Networks of Local Publishers -Provides a profitable income stream for cyber thieves -Allows Ad Agencies to over-estimate their effectiveness In this scheme everyone wins except small and moderate size business advertisers.
  22. A recent analysis compared three types of IYP traffic: fraudulent traffic, in-house traffic from IYP sales, customer service, and technical staffs, and traffic from legitimate human searchers for several popular IYP categories. It is estimated that at least 50% of the traffic received by advertisers in the Plumbers, attorneys, Locksmiths, and Dentists/Physicians categories came from bots, while less than 25% of the IYP traffic they received was legitimate human traffic. In addition, 62% of the IYP traffic received by Restaurant advertisers was fraudulent while only 20% came from human searchers.
  23. Fraudulent IYP traffic is troublesome in other business categories as well. Another analysis found that Bots were responsible for 22% of the IYP traffic reported to advertisers in the financial services, 18% of the traffic reported in family services, and 16% of the traffic reported by food companies.
  24. In summary, the key points are these: 56% of all online traffic comes from Bots IYPs purchase fraudulent traffic from members of their Networks of Local Publishers Impersonator Bots are the most harmful type of malware to IYP advertisers IYP advertisers will pay over $1 billion for worthless, fraudulent traffic in 2015 67% of fraudulent Bot traffic originates from home computers infected with malware
  25. 63 to 80% of IYP traffic to small and moderate size business websites that are built and hosted by IYP publishers comes from Bots Over 20% of video impressions on IYP sites originates from Bots Fraudulent Bot traffic is more likely to occur everyday between midnight and 6 am and on Saturday afternoons 52% of the traffic purchased from IYP’s Networks of Local Publishers is fraudulent Over 50% of IYP traffic received by advertisers in the Legal, Plumbing, and Dentists/Physicians categories came from Bots
  26. Given this state of affairs, small business advertisers must: Carefully scrutinize monthly IYP traffic reports Avoid signing long-term annual IYP contracts to limit exposure to fraud Apply day-parting to avoid times when Bots are most active Investigate how IYP publishers’ Networks of Local Publishers source online traffic
  27. Request a regularly scheduled, independent third-party IYP traffic audit Demand that IYP publishers divulge sources of traffic Be aware that video ad plays are often generated by Bots Avoid IYP publishers who do not publish ongoing blacklists of fraudulent IP addresses and traffic sources
  28. For more information visit us at: http://digimechanix.com. DMX Advertising & Marketing Consultants
  29. Here’s how the system works. Criminals create bogus clicks and impressions with home computers in botnets. Bots generate video plays and social media likes on phantom websites created by the criminals. Cyber Traffic Suppliers use pay per click and anonymous search engine traffic to fulfill contracts with internet traffic brokers and ad exchanges. Internet traffic brokers purchase fraudulent traffic and mix it with traffic from legitimate websites. Internet Yellow Pages publishers purchase fraudulent traffic from search engines and their third party Networks of Local Publishers for fractions of a penny per click. Small business advertisers and ad agencies pay premium prices for worthless online traffic that is hidden laundered in this way.