Login
Login is restricted to DCN Publisher Members. If you are a DCN Member and don't have an account, register here.

Digital Content Next logo

Menu

The Resource Center / Ad Fraud


Ad Fraud Glossary

There are many terms that are used in discussions about ad fraud. This glossary was gathered from recognized industry sources and will be updated as required.


A

Ad Fraud

The deliberate practice of attempting to serve ads that have no potential to be viewed by a human user.

Ad Injection

This happens when ad tags are taken from a publisher’s site and put onto another site without the publisher’s knowledge.

Ad Tag Hijacking

This occurs when online ads are not delivered by the publisher of the site that a user is visiting but by software residing on their machine.

Adware

Software, often automatically installed on user devices, that serves visible or hidden ads to users to boost ad consumption.

Adware Traffic

This occurs when a user is present and additional html or ad calls are made by the AdWare independently of the content being requested by the user.

B

Bot Fraud

This occurs when non-human traffic registers as an impression or clicks on an ad.

Bots

Any type of autonomous software that operates as an agent for a user or a program, or simulates a human activity.

Browser Pre-rendering

A device that makes html or ad requests ahead of specific human-initiated navigation to the requested resources.

C

Crawler Masquerading as a Legitimate User

A browser, server, or app that makes page load calls automatically without declaring themselves as a robot, instead declaring a valid regular browser or app user agent where there is no real human user.

Creative Hijacking

This refers to the copying of creative tags from a legitimately served ad so they can be rendered at a later time, without the consent of the advertiser or their contracted service provider.

D

Data-center Traffic

This originates from servers in data-centers, rather than residential or corporate networks, where the ad is not rendered in a user’s device.

Direct Buy

When a marketer purchases impressions in bulk for specific contexts and sites.

G

General Invalid Traffic (GIVT)

Traffic identified through routine means of filtration, such as bots and spiders.

H

Hijacked Device

A user’s device that has been modified to call html or make ad requests that is not under the control of a user and made without the user’s consent.

M

Malware

An umbrella term used to refer to a variety of forms of intrusive software, including adware.

N

Non-browser User-Agent Header

A device that declares a user-agent header not normally associated with human activity.

Non-human Traffic

This most often refers to bots that create fraudulent ad impressions.

P

Phantom Layer

This is where fraudulent web traffic is generated and laundered.

Proxy Traffic

This traffic is routed through an intermediary proxy device or network where the ad is rendered in a user’s device where there is a real human user.

R

Run-of-network

This refers to a form of internet marketing where an advertising campaign is applied to a variety of websites without the ability to choose specific sites.

S

Sophisticated Invalid Traffic (SIVT)

Invalid traffic that requires advanced analytics, multi-point corroboration/coordination, significant human intervention, etc., to analyze and identify—including hijacked devices, malware, or hijacked ad tags.

Sourced Traffic

This occurs when a digital media seller uses any method to acquire visitors through third parties.