In addition, customers can add their own site IDs, IP addresses and device IDs directly from their account’s Fraud Console to curate their own account level blacklist. In this post, I’ll explain the different levels and views we use to mitigate fraud in real time and how to enable the Blacklist.
This graph shows the amount of traffic flagged by the Blacklist. Here, you can see the number of flagged devices, sites and IP addresses.
Blacklisted sitesThree separate criteria can land a network’s site ID on the Global Fraud Blacklist: MTTI outliers, ad stacking and invalid install receipts. Each entity must surpass an established threshold to be considered fraudulent. The threshold required to land a site ID, IP address or device ID on the Blacklist is much higher than what is used for reports in the Fraud Console which flag statistical anomalies for marketers to investigate.
MTTI Outliers: With mean-time-to-install (MTTI), our Fraud Console will highlight any outliers that are 2.5 standard deviations from the network mean time for a given app. However, for the Blacklist we are more stringent. For a specific site ID to be blacklisted, we look at a rolling timeframe where the behavior was observed against multiple apps and exceeded a volume floor on the minimum number of installs reported for the outlier site. We only blacklist an additional deviation from the norm. Preload and self-attributing networks (SANs) are excluded from our algorithms.
The criteria for blacklisting sites is as follows:
- Significant statistical outlier (more of an outlier than what’s reported in the Fraud Console)
- Behavior must be observed on multiple apps
- Rolling time window
- Minimum volume of 50+ installs
Ad stacking: As with MTTI, we’re more stringent with the blacklist than what we report in the Fraud Console. We set a minimum click threshold for stacked clicks. Anything beyond that threshold is blacklisted. In my previous post, I discussed ad stacking in detail.
Invalid install receipt: For installs originating from the iTunes or the Google Play Store, we receive a receipt that an installation occurred. In the cases when the App Store returns a non-verified install receipt, we deem the install fraudulent as reported by the site. Again, we set a minimum on the number of unverified receipts to warrant blacklisting a site ID.
Blacklisted IP addressesWe flag instances of anonymized IP addresses including proxies, VPNs and TOR exit nodes. These are sites purposefully trying to mask their traffic source.
Bad actors take steps to obscure their true IP address using proxies or VPNs (Virtual Private Networks) to circumvent geolocation restrictions; both are used in botnet traffic.
TOR or “The Onion Router” is a process by which web traffic is routed through a byzantine maze of encrypted relays with the purpose of anonymizing traffic. A TOR exit node is the gateway where encrypted traffic hits the internet. Legitimate traffic sources should not mask the sources of their traffic.
Blacklisted device IDsDevice IDs are placed on the Global Fraud Blacklist if they have an exorbitant click volume. When adding a device to the Blacklist because of click volume, it must surpass a threshold of clicks within a 24-hour period.
Not all devices with high click volumes are automatically blacklisted. A device may be reported on an individual app’s fraud report from Kochava but not blacklisted. For more information, read my previous post about devices with high click volume.
Devices, where we’ve observed an invalid purchase receipt, are also added to the Global Fraud Blacklist. There are two primary methods for generating false receipts to spoof the verification from iTunes or the Google Play Store:
- A hijacked device with malicious code on it pretends to be the App Store
- “Man-in-the-middle” attacks where the malicious code sits between the device and the App Store
Enabling the Global Fraud BlacklistMarketers can begin using the Global Fraud Blacklist by contacting their Client Success Manager for the service. From that point on, marketers are in control of how they use the Blacklist.
There are two ways to enable the list:
- Navigate to Fraud Console (under Account Options) select to apply the Blacklist to your entire account or to specific apps in the account
- At the tracker level (under Campaign Manager and Traffic Verification), you can select to apply the list by IP, site, device ID or all three in addition to other criteria to verify the traffic delivered by networks
With the Fraud Console, marketers have a powerful suite of preventative tools to eliminate fraudulent activity from their traffic. Because fraud is evident in most app traffic, employing the real-time Global Fraud Blacklist is a necessary step to protect ad spend and run effective campaigns with legitimate impressions, clicks, installs and post-install events.
In case you missed them, read also Parts 1, 2, 3 and 4 of the Fraud Abatement Series.