1. Causes of CheatingHere I would like to first explain the mobile advertising industry. Advertisers post links to their own brands on ad spaces on apps and settle accounts for the app’s ad spaces based on the proportion of user clicks or user activations after clicks (the activation behavior may be user registration, user generation of UGC , user consumption, or other activities, which require specific determination for different applications). It seems that advertisers use "mobile advertising" to push their applications simply to achieve results in the rankings (clicks, downloads) and effects (activation, retention ). APP advertising space wants to realize more monetization, so cheating behavior comes into being. Specifically, starting from 2013, the emergence of a large number of online money-making applications and the strong demand for App Store rankings have provided the most fundamental foundation for cheating. At the same time, the monitoring technology threshold for mobile advertising is high, the background data structure is cumbersome and complex, and there are many monitoring dimension indicators, which provide continuous development impetus for cheating behaviors derived from the mobile advertising process. Types of CheatingAccording to the two dimensions that advertisers are concerned about, clicks and activations, the types of cheating are also divided into these two types. Click cheatClick fraud is a relatively low-cost and easy method. It can usually be sent directly using a large number of test machines or simulators. Some methods also involve hiring or incentivizing users to make a large number of clicks. By analyzing the logs of click data, we can find several phenomena:
The following two phenomena are aimed at the large-scale use of simulators for click cheating
Activate cheatsIn addition to clicks, the effectiveness of mobile advertising lies more in performance data, namely subsequent activations. Some common methods are consistent with click cheating methods, such as simulating downloads on test machines or simulators, modifying device information through mobile manual or technical means, cracking SDK to send virtual information, simulating download activation, etc. The phenomenon of activation cheating also includes:
3. Prevention of CheatingClick cheatBefore we sort out the methods of click fraud protection, let’s first list some important indicators.
Click-through rate is a key method to determine whether there is click cheating. If the click-through rate of a website's advertisements is too high, it can be directly judged as cheating.
If this value is too high, probably greater than 3, we can assume that the user with this IP value may have click cheating. There are several ways to prevent click fraud:
Activate cheats
Association cheatingSimply put, users who are marked as click cheaters may also be abnormal in activation cheating. Such association allows us to more easily detect potential cheating users. Linking click fraud with activation fraud is also an effective protective measure. IV. Future development direction of anti-cheatingAnti-fraud prediction analysis model combined with big dataTo give a simple example, two important indicators of an advertisement, clicks and activations, are under the same process. The user sees the ad on the website, clicks on the traffic , finds interest, and activates it. The user traffic is successfully transferred from the website's ad space to the advertiser's application. Under normal circumstances (no cheating), the entire process will take some time from the time a user clicks on an ad to the time the activation is completed. Just now we discussed this overall situation for too short a time, and it may be considered cheating. This is a micro-level view of this data indicator. From a macro perspective, the overall time should follow a mathematical distribution. We can detect abnormal areas based on this mathematical distribution model. For example, during the period from August 1 to August 22, there is an IP segment (because cheating is an organized behavior, it may appear regularly in a certain IP segment rather than a single IP) whose model distribution does not match the normal model. We can then detect this network segment and discover the cheating organization. The author of this article @Mitsuizq compiled and published by (Qinggua Media). Please indicate the author information and source when reprinting! Product promotion services: APP promotion services Advertising |
From March to April 30, Zhengzhou has experienced...
Content Marketing Trends in 2017 (Part 2) Preface...
This article comes from the content shared in the...
There are many debates online about "raising...
1. Background The development of technology is th...
Taking the growth of Internet products as an examp...
Products of various categories cover all aspects ...
Last week, a reader sent me a private message: &q...
1. Advantages of Tencent Trading Site 1. Expandin...
During the 2017 "Two Sessions", the gov...
Each product has its own characteristics and feat...
With the development of Internet advertising tech...
Short videos are a black hole for netizens' t...
Course Content Catalog: TikTokShopi Training Camp ...
On a media platform, there will be tens of thousa...