With the advent of Web-based advertisements accessible over the Internet, different advertisers may pay different rates to have their ads placed on various websites. Various schemes have arisen to take advantage of this disparity in advertising rates. Put differently, these schemes may attempt to benefit from arbitrage or click fraud that attempt to take advantage of these disparities in advertising rates.
Previous approaches to combat these various arbitrage or click fraud schemes have typically relied upon active intervention or participation from end-users. For example, some Internet websites (e.g., search engines) may enable these end users to download various tools by which the end-users may report suspected arbitrage or click fraud, based on their personal observations while browsing the Internet. While these previous approaches may be somewhat effective in some circumstances, they typically rely upon the active participation of end users. In cases where end-users do not participate, these previous approaches may fail.
It should be appreciated that this Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
This description provides tools and techniques for detecting advertising arbitrage and click fraud. These tools may provide apparatus for monitoring packet traffic to or from subscribers to website hosting services. These tools may also analyze the packets to determine whether at least a part of the traffic is indicative of suspected click fraud affecting websites managed as part of the website hosting services
Other apparatus, systems, methods, and/or computer program products according to embodiments will be or become apparent to one with skill in the art upon reviewing the following drawings and Detailed Description. It is intended that all such additional apparatus, systems, methods, and/or computer program products be included within this description, be within the scope of the claimed subject matter, and be protected by the accompanying claims.
The following detailed description is directed to methods, systems, and computer-readable media (collectively, tools and/or techniques) for detection of advertising arbitrage and click fraud. While the subject matter described herein is presented in the general context of program modules that execute in conjunction with the execution of an operating system and application programs on a computer system, those skilled in the art will recognize that other implementations may be performed in combination with other types of program modules.
Generally, program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types. Moreover, those skilled in the art will appreciate that the subject matter described herein may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, and the like.
The networks 102 may enable the subscribers to access one or more external global communications networks, with
As shown in
In addition to the external Web servers 112, the subscribers may also access (perhaps inadvertently) any number of arbiter systems 116. Internet traffic flowing to and/or from such arbiter systems 116 is denoted at 118. The arbiter systems 116 are described in more detail in
To the extent that the arbiter system 116 is improperly profiting from the above arbitrage scenario, at least a portion of the Internet traffic 118 to and/or from the arbiter system 116 may be characterized as “click fraud”. Accordingly,
The systems or operating environments 100 may include any number of arbitrage detection systems 120 that are, as described in further detail below, operative to detect various arbitrage and/or click fraud scenarios. Evidence of ongoing arbitrage or click fraud scenarios may be manifested within the subscriber traffic 106, as well as the Internet traffic 110, 114, and/or 118. The arbitrage detection systems 120 may be incorporated into the service provider network 102, or may operate externally to the network 102.
Turning to the arbitrage detection systems 120 in more detail, these systems 120 may include one or more processors 124, which may have a particular type or architecture, chosen as appropriate for particular implementations. The processors 124 may couple to one or more bus systems 126 chosen for compatibility with the processors 124.
The arbitrage detection systems 120 may also include one or more instances of a computer-readable storage medium or media 128, which couple to the bus systems 126. The bus systems 126 may enable the processors 124 to read code and/or data to/from the computer-readable storage media 128. The media 128 may represent apparatus in the form of storage elements that are implemented using any suitable technology, including but not limited to semiconductors, magnetic materials, optics, or the like. The media 128 may include memory components, whether classified as RAM, ROM, flash, or other types, and may also represent hard disk drives.
The storage media 128 may include one or more modules of instructions that, when loaded into the processor 124 and executed, cause the arbitrage detection systems 120 to perform various techniques related to detecting advertising arbitrage and click fraud.
For convenience of discussion only this description provides examples in which the tools and techniques described herein are implemented in software. However, it is noted that these tools and techniques may also be implemented in hardware and/or circuitry without departing from the scope and spirit of this description.
The modules of instructions 130 may provide arbitrage detection tools, operable within the systems or operating environments 100 to detect scenarios in which the subscriber traffic 106 may be affected by click fraud or arbitrage traceable to one or more arbiter systems 116. Accordingly,
As noted above, specific examples of click fraud and/or arbitrage are provided below with
In other examples, computer systems associated with subscribers may become infected with malware, “bots”, or other types of malicious software under the direction of the arbiter systems 116. In these latter examples, these subscriber systems may unwittingly be commandeered by the arbiter systems 116, such that website traffic is diverted or redirected through these commandeered systems. Once again, this redirected Web traffic results in a form of click fraud that benefits the arbiter systems 116.
The foregoing discussion provides various non-limiting examples in which the arbitrage detection systems 120 may operate from the perspective of subscribers to the networks 102 operated by ISPs. However, implementations of this description may also detect advertising arbitrage and click fraud from the perspective of subscribers to hosted website services. Examples of these latter scenarios are now discussed with
Turning to
As shown in
Having described the various operating environments shown in
In providing
Turning to
The arbiter system 116 may also enter into at least a second agreement involving a Web server 314 hosting a second website 316. under the terms of this second agreement, the arbiter system 116 may pay the second website 316 a second per-click rate (e.g., $0.50 per click) in exchange for Internet traffic directed from the second website 316 to the arbiter system 116.
In illustrative arbitrage scenarios, the first payment 306 from the website 304 to the arbiter system 116 would exceed the second payment from the arbiter system 116 to the website 316. In the above example, the arbiter system 116 would generate a $0.50 profit on each hit redirected from the website 316 through the arbiter website 312 ultimately landing on the website 304. In effect, the arbiter system 116 is able to profit from a relatively generous fee paid by the website 304 to receive clicks, as compared to a relatively lower fee paid by the arbiter system 116 to receive clicks from the website 316.
The arbitrage detection system 120 may operate in general by monitoring Internet traffic. In some implementation scenarios, the arbitrage detection system 120 may monitor traffic (e.g., 322) flowing into possible arbiter systems 116. In other scenarios, the arbitrage detection system 120 may monitor traffic (e.g., 310) flowing from possible arbiter systems 116.
In example implementations, the arbitrage detection system may employ deep packet inspection (DPI) techniques to analyze or monitor packets passing by a given inspection point. DPI techniques may involve analyzing a data and/or header portion of a packet as it passes the inspection point, searching for evidence of the types of click fraud or arbitrage described herein. These DPI techniques may also collect statistical information supporting the foregoing packet analysis. In general, but not to limit possible implementations, DPI techniques may be distinguished from shallow packet inspection, which typically analyzes only the header portions of packets.
The discussion now turns to descriptions of process flows by which the arbitrage detection systems 120 may process this monitored Internet traffic 324 in connection with detecting arbitrage and click fraud. This description is now provided with
Turning to the processes 400 in more detail, block 402 represents monitoring network or Internet traffic. For example, block 402 may include monitoring a flow of packets from a convenient point within a service provider network (e.g., 102 in
Block 404 represents comparing the monitored network traffic to pre-existing signatures or performance characteristics indicative of arbitrage scenarios and/or click fraud. In different illustrative, but non-limiting, scenarios, block 404 may include monitoring for sequences of relatively quick browser redirects, represented generally at 406. For example, referring briefly back to
An additional example, block 404 may include monitoring packets for Internet protocol (IP) addresses associated with suspected arbitrage websites (e.g., 312) or arbiter systems (e.g., 116). In some example scenarios, block 406 may detect a sequence of quick browser redirects, with the process flows 400 flagging these redirects as suspicious. However, block 408 may further examine the IP addresses associated with these browser redirects, and may identify at least one suspected arbitrage website 312 involved in the browser redirects. Thus, the analysis performed in block 408 may further reinforce suspicions resulting from analysis performed in block 406.
In some implementation scenarios, block 408 may operate somewhat independently from block 406. For example, if a given website appears frequently enough in suspicious browser redirect scenarios, a given website may be added to a list of known or suspected arbitrage websites.
Block 404 may further include analyzing monitored packets, to determine whether these packets contain keywords or other identifiers associated with high profile or well-known online websites, as represented generally by block 410. In example scenarios, the arbiter systems 116 may target users who frequent such websites. Thus, monitored Internet traffic (e.g., 324 in
Block 404 may also include monitoring for any unexpected or unexplained patterns or deviations in browser behavior, as represented in block 412. For example, referring to the subscriber scenarios shown in
Decision block 414 represents evaluating whether the monitored Internet traffic 324 raises some threshold level of suspicion of arbitrage or click fraud. For example, if block 404 (as well as blocks 406-412) does not result in any significant suspicion of arbitrage or click fraud, the process flows 400 may take No branch 416 to return to block 402. However, from decision block 414, if monitoring one or more network packets raises suspicion of arbitrage or click fraud, the process flows 400 may take Yes branch 418 to block 420.
Block 420 represents providing some notification of suspected arbitrage and/or click fraud. the processing represented in block 420 may take different forms in different implementations, depending on whether a given implementation is relatively subscriber-centric (e.g., tools 130 shown in
Generalizing beyond a given subscriber, if malware infections are sufficiently commonplace among a given base of subscribers serviced by a given ISP, block 422 may include notifying the ISP about these infections. Given this notification, the ISP may take remedial measures, such as making anti-malware utilities available to subscribers, configuring routers or other access points (e.g., 104 in
Block 420 may also include notifying hosted clients, as represented generally at block 424. More specifically, block 424 may be applicable hosted services scenarios, such as those shown in
Block 420 may also include notifying advertisers or other interested parties, as represented generally at block 426. The parties notified in block 426 may be, for example, the parties other than subscribers, ISPs, or hosted clients. For example, a given advertiser that is neither a subscriber nor a hosted client may nevertheless benefit from knowing that advertising fees paid by the advertiser may be supporting arbitrage scenario under which an arbiter system is profiting. Given this information, the advertiser may lower or otherwise normalize its advertising fees as paid out to third parties.
In other scenarios, an advertiser (e.g., 314 and/or 316 and
In general, the notification provided by block 420 may include identifications of any suspected arbitrage websites 312 and/or suspected arbiter systems 116. Given this information, recipients of these notifications may take any suitable precautions, which may include, but are not limited to further investigating the status of the websites and/or systems identified in the notifications.
Having provided the above description of
Based on the foregoing, it should be appreciated that apparatus, systems, methods, and computer-readable storage media for detecting arbitrage and click fraud are provided herein. Although the subject matter presented herein has been described in language specific to computer structural features, methodological acts, and computer readable media, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features, acts, or media described herein. Rather, the specific features, acts and mediums are disclosed as example forms of implementing this description.
The subject matter described above is provided by way of illustration only and should not be construed as limiting. Various modifications and changes may be made to the subject matter described herein without following the example embodiments and applications illustrated and described, and without departing from the true spirit and scope of the claimed subject matter, which is set forth in the following claims.