[关闭]
@Macux 2017-08-21T12:31:33.000000Z 字数 9466 阅读 2600

反作弊研究

Mobvista



1、第三方反作弊玩法

1.1 Adjust 反作弊玩法

  • Distribution Modeling examines the click-to-install time distribution to determine instances of fraud. If an install is tied to statistically abnormal click behavior, we ignore the attribution and instead attribute the install to the next-best tracker.
    分布模型通过检验从点击到安装的分布,来判断样本的虚假性。如果一个安装行为被关联到的点击行为在统计意义上属于异常值,则该归因将被舍弃,然后把安装归因到次好的跟踪码。
  • Anonymous IP(匿名IP):IP来自匿名Proxies。IP来自匿名VPN服务。
  • Too many engagement(互动度过高):同一 device_Id 下多次点击广告。
    (1)、如果被标记为高互动频率(high-level engagement)的归因带有相同的:
    a) 跟踪码(Tracker ID)
    b) 应用识别码(App Token)
    c) 设备标签(Device tag)
    则该归因将被弃,并把安装归因到次好的跟踪码(next-best tracker)。
    (2)、如果是通过指纹匹配方式的归因,如果被标记高互动频率的归因带有相同的:
    a) IP 地址(IP address)
    b) 设备类型(Device type)
    c) 设备名称(Device name)
    d) OS 名称(OS name)
    e) OS 版本(OS version)
    则该归因将被弃,并把安装归因到次好的跟踪码(next-best tracker)。

1.2 Appsfly 反作弊玩法


1.3 Kochava 反作弊玩法


2、反作弊现状研究(paper)

2.1 fraud-whitepaper

4 basic forms of fraudulent activity and standard industry solutions

  1. Faulty Targeting: generates clicks and installs from untargeted and unwanted users.
    (1)、作弊形式:Faulty targeting refers the traffic that comes from mistargeted countries or device types.
    (2)、反作弊:Attributions from only targeted countrie or device type can match, and any install from a user not matching the targeting criteria will not be attributed.
  2. Automating User Activity: fakes installs on simulated devices.
    (1)、作弊形式:Clicks,
    installs, sessions, and in some occurrences even in-app user behavior are then triggered endlessly by server-side software.
    (2)、反作弊: Any install coming from an IP address associated with the aforementioned services(VPN、常见IP段) should be rejected – blocking the faulty attribution before it happens.
  3. Poaching Organic Installs with click spam and pre-loading ads.
    (1)、作弊形式:Sending a myriad of background clicks for a multitude of offers from as many devices on the market as possible.(类似VBA)
    (2)、反作弊:Creat an attribution model based on
    gathered click-to-install data.【flat distribution -> fraud; exponential distribution -> genuine】
    此处输入图片的描述
  4. Faking SDK-Triggered Installs: driven via fraudulent HTTP calls
    (1)、作弊形式:Track partners who aren't properly encrypting(加密) their data, and then use this information to spoof SDK-transmitted install data.
    此处输入图片的描述
    (2)、反作弊:Prevent tampered HTTP calls.
    此处输入图片的描述

2.2 Mobile_Fraud_eBook

The main prevention methods include:

  1. Active IP, UserAgent and deviceId filtering.
  2. Distribution Modelling. Detecting anomalies such as MTTI, geographic distribution, click volume by IP address and deviceId, UserAgent versus IP benchmarks and more.
  3. Device ranking.
  4. install and in-app receipt validation. By connecting to the app store's servers to validate the legitimacy of an install or in-app purchase.

The following examples will help us open our eyes to potential threats:

  1. IP-related
    • Large numer of clicks / installs / unique indentifiers from the same IP.
    • Different IP locations between the ad click and the install / first launch
  2. Consistency/patterens
    • Click / install every 20 seconds
    • Players / users from a specific source always drop off at the exact same point in a game / app (eg. before a game tutorial, before a registration)
    • Large number of installs from the same device brand / model
  3. DeviceId-related
    • Different identifiers for the same device.
    • Multiple IDFAs for a single IDFV(identifier for a vendor).
  4. Performance-related
    • Sharp increase in install volume, a stark decline in day 1 retention.
    • Premium traffic performing like low quality traffic.
    • Suspiciously low pricing.
    • Extremely low conversation rates.
    • Extremely high uninstall rates.
  5. Mismatchs:
    • App versions different than versions avaliable at the store.
    • Platform mismatches between ad click and install.
    • Geographic mismatches between ad click and install.
  6. Other issues:
    • Appearance of GEOs not in included in targeting criteria
    • For in app events - if the value of the transaction does not exist in the app.
    • Device IDs increase at the same pattern.
    • Large volume of instals without data on carrier / city / country

2.3 applift-fraud-ebook-the-next-battleground


2.4 FraudShield



2.5 click-fraud-detection-on-advertiser-side

添加新批注
在作者公开此批注前,只有你和作者可见。
回复批注