Fraud Prevention in Online Digital Advertising by Xingquan Zhu Haicheng Tao Zhiang Wu Jie Cao Kristopher Kalish & Jeremy Kayne
Author:Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish & Jeremy Kayne
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
4.1.1 Stuffing or Stacking
Stuffing (either keyword stuffing or pixel stuffing) is a way of displaying content incapable of being viewed by naked eyes. It is commonly used for both keyword stuffing [5] and placement stuffing. In Ad keyword stuffing, Ad keywords are hidden in the HTML tags that are not visibly displayed, or they are shown as the same color as the background, so they are incapable of being viewed by naked eyes. Although hidden keywords cannot be viewed by naked eyes, they are in fact visible to Ad network agents when they crawl the web page content in order to determine the relevant pages correlated to specific Ads. Such techniques, in fact, are commonly seen in search engine cloaking [38] or using search engine optimization to increase visibility [15].
Similar to keyword stuffing, placement stuffing stuffs a large number of placements, not intended to be viewed by naked eyes, in a web page. An example of stuffing Ads is shown in Fig. 4.1 where the placement has a reasonable size but the visibility is set as “none” therefore cannot be viewed. Similarly, stacking entails layering Ads on top of one other in the same Ad slot but only the Ad on the top layer is viewable. By doing so, fraudsters try to stuff or stack these invisible Ads as many as possible to inflate the number of impressions.
Fig. 4.1General examples of stuffing Ads. (a ) Stuffing Ads in a small iframe (e.g. 1 × 1 pixel). (b ) Although the size of iframe is sufficiently large, the display: none command takes precedence
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7797)
Grails in Action by Glen Smith Peter Ledbrook(7707)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6430)
Kotlin in Action by Dmitry Jemerov(5077)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3886)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2878)
The Art Of Deception by Kevin Mitnick(2617)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2395)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2320)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2144)
DarkMarket by Misha Glenny(2088)
Wireless Hacking 101 by Karina Astudillo(2085)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2032)
