Using an IPPN to fight ad fraud: your questions, answered

Using an IPPN to fight ad fraud

It’s a well-known fact: the internet is a marketer’s dream, offering brands the chance to engage with consumers on a one-to-one basis, on a huge scale. Ads can be precisely targeted to users based on their location, device, browsing history, and so on.

However, this ecosystem has become a lucrative frontier for international fraud. According to the World Federation of Advertisers, ad fraud is now the second biggest source of income globally for organized criminal gangs, after drugs. The gains for criminals can be significant, which unfortunately means that the losses to brands and web domains – and consumers who are at the receiving end of fraud – are equally so. Juniper Research has estimated that total online, mobile and in-app ad fraud losses will reach $42 billion globally and will cost advertisers $44 billion in 2022. Digital ad technology has allowed for precision marketing, but it’s also provided a tool for fraud and fired the starting gun on an ongoing and fierce arms race.

How can a business wanting to promote itself via digital advertising avoid wasting a massive part of its marketing budget on fraudsters? How can it verify its ads are placed correctly and that they attract the intended target audience?

IPPN security wordpress 101

Through an IPPN (IP proxy network).

What is an IP Proxy Network?

Companies are finding it increasingly difficult to view or browse the internet openly without being blocked or served misleading content.

IPPN harnesses the power of real consumers who have willingly opted-in to the proxy network, usually in return for ad-free applications. They can also opt-out at any given time. These millions of real consumer IP addresses are used as a gateway for organizations to browse the internet without being blocked, and therefore see the internet with complete transparency just as their own consumers see it.

How can businesses use an IP proxy network to fight ad fraud?

With fraudsters getting more and more sophisticated and businesses losing more and more money on these digital crimes, it is critical that firms test their campaigns from every angle.

However, checking ads for fraud without a proxy network means companies (in using their own IP addresses) are exposing themselves to fraudsters. Remember, ad fraud is a criminal’s day job, meaning he/she will be able to quickly and easily spot when he/she is being automatically checked by companies, and serve false data in response to cover his/her tracks. Also bear in mind that ads are often targeted at very specific end-users or end-user groups, requiring brands fighting fraud to check how they’d receive all of these different ads as if they were all of these different end-users.

This is where the power of an IP proxy network comes in – and where its business value shines.

Using a proxy network, a business is able to select the geographical location, the device and the ISP (internet service provider) its customer is using to visit a site where ads are being served.  If a brand is promoting its ads in Copenhagen, Denmark, for example, it can use an IPPN to route traffic through the IP address of an opted-in consumer based in the city, and view the ads as if they are this individual. They’ll then be directed by the ad in exactly the same way that they would be if they were the Danish consumer – which hopefully means going to the legitimate, intended destination and not a malware-infected site!

How does an IP proxy network tackle ad fraud at scale?

Digital advertising technology is a double-edged sword. It’s allowed for automated distribution and targeting of ads at massive scale, but as a result, has meant that checking so many ads for veracity is a challenge. These ads are unique in terms of what/where/when they’re served, and the variables dictating this are changing all the time.

An IPPN is needed to create a session based on the attributes of a specific user (via their IP address), and then to test the multiple different ads that might be served to the user – and which are all competing for his/her attention. Think of a social media site for example; using an IP proxy network, the social media company can split the user session to immediately and concurrently check all ads served to the user at that particular time.

This is no small operation, often requiring dedicated teams who are working to protect users and brands from ad fraud. Equipped with a proxy network, though, these businesses can clean up their networks at scale. This leads us neatly onto our final commonly-asked question:

Ad fraudsters have developed multiple methods to identify a business’s advertising ‘soft spot’ and exploit its revenue chain. The value of digital advertising is huge, and with a large proportion of ad spend (from a large proportion of businesses) now dedicated to digital advertising, every business is a potential target for ad fraud.

Fraudsters can execute criminal campaigns very quickly on a massive scale, and the only way for businesses to keep pace in this arms race is to adopt a means of responding just as quickly and at equal scale. This can only be achieved via an IP proxy network, which protects businesses, online platforms, end-users and a brand’s bottom line.

By Or Lenchner

Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...
Louis
More CISOs will have to deliver revenue growth to protect their budgets and grow their careers in 2023 and beyond, and a core part of that will be getting multicloud security right. It’s the most common infrastructure strategy for ...
Stacey Farrar
Modern Auth and Exchange Online Migrations Microsoft has phased out Basic Authentication (Basic Auth), replacing it with Modern Authentication (Modern Auth) to provide increased protection and user security. Through this, Microsoft has turned off Basic ...
Gilad David Maayan
Network Security in the Public Cloud What is Network Security? Network security is a strategic approach to securing an organization’s resources and data across the corporate network. It helps protect organizations of all sizes, industries, ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Gilad David Maayan
What is SASE (Secure Access Service Edge)? SASE (Secure Access Service Edge) is a term coined by Gartner to refer to a new architecture for networking and security that combines both functions into a single, ...
Mark Banfield
Implement A Seamless Customer Experience The need for digital interaction has never seemed more critical than it does today. As the coronavirus continues to spread, citizens around the world are being asked to hunker down ...
Cybersecurity Bootcamps To Help Build Your Career
Cybersecurity Bootcamps We've discussed the importance of training and the hiring of cybersecurity professionals many times on CloudTweaks over the past 10+ years. Now more than ever as the world enters into a dark era ...
The Backup.png
Cloud For Dummies.png
Disaster Recovery Plan.png
David Fletcher Blown Image

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.