Invalid Traffic
CESP underlines that this document is based on CESP trust in all information shared by each measurement company.
To navigate in a table :
– on computer : click on one of its cells and navigate horizontally with the arrow keys on the keyboard or use the horizontal scroll bar at the bottom of the table.
– on mobile : we recommand you switch to landscape format for a better display.
You can download the grid you want in Excel format while filtering measurement companies but also the global grid concerning the invalid trafic in PDF format, with datas from both environments filled.
Measurement companies are splited in differents tabs according to whether their solution has been accredited by the MRC (Media Rating Council) or not.
Web environment
In-app environment
Web environment
Accredited solution
Updated April 16th, 2021 | ||||||
---|---|---|---|---|---|---|
1) Do you flag invalid traffic on a user level? | Yes | Yes | Yes | Yes | No | Yes |
2) Do you flag invalid traffic on a site level? | Yes | Yes | Yes | Yes | Yes | Yes |
3) Do you flag invalid traffic on a domain level? | Yes | Yes | Yes | Yes | Yes | Yes and much more: Deterministic +Technical Evidence at the device level; HREF Domain; Platform Type; Provider; Site ID; Camapaign ID; Placement ID; Inventory Source; … |
4) What information is used for the IVT filter? (are they shared between campaigns, between clients?) | Adloox’s proprietary technologies, machine learning skills and the ability to process billions of queries per day worldwide are placing Adloox at the forefront of detection and elimination of Ad Fraud. Adloox analysis is user centric, URL centric, supply centric,.. hundreds of algorithms are applied every day to provide the most precise and granular data that can be optimized in PreBid. | DV has a dedicated fraud lab with data scientists, mathematicians and analysts from the cyber fraud prevention community. We employ a variety of approaches to detect new forms of fraud - from AI and machine learning to manual review. Through constant analysis, scenario management and research, we pinpoint the sites, apps and devices responsible for fraudulent activity - updating our protection in virtual real time. | IAS sees up to 10 billion impressions and trillions of events a day, from around the world. Their machine learning technology becomes smarter as it gets more data from advertisers and publishers. IAS clients don’t just benefit from the data they contribute but also from fraud detection results across the ecosystem. | IVT information is shared between campaigns and clients, so new learnings are immediately applied to all customers | Moat analyses all traffic on an impression-level basis | ALL HUMAN (Ex White Ops) collect device and network-level data subjected to hundreds of dynamic and continuously evolving HUMAN (Ex White Ops) verification challenges to identify evidence of compromise with greater accuracy than probabilistic or anomaly-based approaches. Payload Signals: * >2,000 signals collected in every execution * >10T interactions inspected every week Markers: Technical & Statistical Models >250 algorithms identifying threat model & bot category based on: * Technical evidence of automation * Behavioral patterns or other statistical anomalies |
5) Do you use Machine Learning methods for IVT filtering? | Yes | Yes | Yes | No | Yes | Yes but not only What we see: * 10 trillion interactions observed weekly * Billions of mobile devices observed weekly * Traffic from millions of domains What we do: * Reputation algorithms for all devices we’re observing * IP classification ML models: addresses, proxies, VPNs, mobile networks, residential, corporate, data center * Clustering algorithms of domains, binaries * Predictive ML engine that responds in <10 ms * Privacy & Compliance: Our privacy-sensitive code detects bots without tracking individual users across the internet (We have never and do not collect 3rd-party cookies) |
6) How often do you refresh the IVT filter parameters? (For instance, when an IP address is blacklisted, how long is it blacklisted for?) | Daily | DV is continually updating items and discovering and analyzing new fraudulent ADIDs throughout the day. Throughout the hour, these are pushed to DV’s systems | Once traffic is identified as IVT, IAS places the source utilized to identify the suspicious activity onto a blacklist. The IP blacklist is refreshed once a day to ensure accuracy, and new sources are added to it in near real time. | Parameters are refreshed after 12 hours | Daily | It is dynamic, real time and action per action |
7) Do you filter on auto-refresh impressions considering an excessive refresh rate as a risk of IVT? | Yes | Yes | No | No | Yes, daily | Yes, |
8) Do you partner with other companies to help you detect Invalid Traffic? | No | No | No | No | Yes, Digital Envoy | No |
9) Are you able to prevent ads from being viewed post-bid? | Yes | Yes | Yes | Yes | Yes | Yes |
10) Has your solution been accredited by MRC for Sophisticated Invalid Traffic? N.B: MRC Accreditation for General Invalid Traffic is included in the viewability accreditation | Yes | Yes | Yes | Yes | Yes | Yes, Desktop. Mobile, Connected TV |
a) If yes, has your solution been continuously accredited since your first accreditation? | Yes | Yes | Yes | Yes | Yes | Yes |
b) If no, are you in the process of being accredited by MRC? | N/A | N/A | N/A | N/A | N/A | N/A |
In-app environment
Accredited solution
Updated April 16th, 2021 | ||||
---|---|---|---|---|
1) Do you flag invalid traffic on a user level? | Yes | Yes | No | Yes |
2) Do you flag invalid traffic on a site level? | Yes (app level) | Yes (app level) | Yes (app level) | Yes |
3) Do you flag invalid traffic on a domain level? | Yes (app level) | Yes (app level) | Yes (app level) | Yes and much more: Deterministic +Technical Evidence at the device level; HREF Domain; Platform Type; Provider; Site ID; Camapaign ID; Placement ID; Inventory Source; … |
4) What information is used for the IVT filter? (are they shared between campaigns, between clients?) | DV has a dedicated fraud lab with data scientists, mathematicians and analysts from the cyber fraud prevention community. We employ a variety of approaches to detect new forms of fraud - from AI and machine learning to manual review. Through constant analysis, scenario management and research, we pinpoint the sites, apps and devices responsible for fraudulent activity - updating our protection in virtual real time. | IAS sees up to 10 billion impressions and trillions of events a day, from around the world. Their machine learning technology becomes smarter as it gets more data from advertisers and publishers. IAS clients don’t just benefit from the data they contribute but also from fraud detection results across the ecosystem. Additionally, IAS conducts offline technical research into apps and in-app inventory to identify suspicious activity. | Moat analyses all traffic on an impression-level basis | ALL HUMAN (Ex White Ops) collect device and network-level data subjected to hundreds of dynamic and continuously evolving HUMAN (Ex White Ops) verification challenges to identify evidence of compromise with greater accuracy than probabilistic or anomaly-based approaches. Payload Signals: * >2,000 signals collected in every execution * >10T interactions inspected every week Markers: Technical & Statistical Models >250 algorithms identifying threat model & bot category based on: * Technical evidence of automation * Behavioral patterns or other statistical anomalies |
5) Do you use Machine Learning methods for IVT filtering? | Yes | Yes | Yes | Yes but not only What we see: * 10 trillion interactions observed weekly * Billions of mobile devices observed weekly * Traffic from millions of domains What we do: * Reputation algorithms for all devices we’re observing * IP classification ML models: addresses, proxies, VPNs, mobile networks, residential, corporate, data center * Clustering algorithms of domains, binaries * Predictive ML engine that responds in <10 ms * Privacy & Compliance: Our privacy-sensitive code detects bots without tracking individual users across the internet (We have never and do not collect 3rd-party cookies) |
6) How often do you refresh the IVT filter parameters? (For instance, when an IP address is blacklisted, how long is it blacklisted for?) | DV is continually updating items and discovering and analyzing new fraudulent ADIDs throughout the day. Throughout the hour, these are pushed to DV’s systems | Once traffic is identified as IVT, IAS places the source utilized to identify the suspicious activity onto a blacklist. The IP blacklist is refreshed once a day to ensure accuracy, and new sources are added to it in near real time. | Daily | It is dynamic, real time and action per action |
7) Do you filter on auto-refresh impressions considering an excessive refresh rate as a risk of IVT? | Yes | No | Yes, daily | Yes |
8) Do you partner with other companies to help you detect Invalid Traffic? | No | No | Yes, Digital Envoy | No |
9) Are you able to prevent ads from being viewed post-bid? | Yes | Yes | No, Blocking is not available currently on the app level. | Yes |
10) Has your solution been accredited by MRC for Sophisticated Invalid Traffic? N.B: MRC Accreditation for General Invalid Traffic is included in the viewability accreditation | Yes, for mobile/tablet in-app as well as the CTV environment | Yes | Yes | Yes, Desktop. Mobile, Connected TV |
a) If yes, has your solution been continuously accredited since your first accreditation? | Yes | Yes | Yes | Yes |
b) If no, are you in the process of being accredited by MRC? | N/A | N/A | N/A | N/A |
Not accredited solution
Updated April 16th, 2021 | ||
---|---|---|
1) Do you flag invalid traffic on a user level? | Yes | Yes |
2) Do you flag invalid traffic on a site level? | Yes (app level) | Yes (app level) |
3) Do you flag invalid traffic on a domain level? | Yes (app level) | Yes (app level) |
4) What information is used for the IVT filter? (are they shared between campaigns, between clients?) | Adloox’s proprietary technologies, machine learning skills and the ability to process billions of queries per day worldwide are placing Adloox at the forefront of detection and elimination of Ad Fraud. Adloox analysis is user centric, URL centric, supply centric,.. hundreds of algorithms are applied every day to provide the most precise and granular data that can be optimized in PreBid. | IVT information is shared between campaigns and clients, so new learnings are immediately applied to all customers |
5) Do you use Machine Learning methods for IVT filtering? | Yes | No |
6) How often do you refresh the IVT filter parameters? (For instance, when an IP address is blacklisted, how long is it blacklisted for?) | Daily | Parameters are refreshed after 12 hours |
7) Do you filter on auto-refresh impressions considering an excessive refresh rate as a risk of IVT? | Yes | No |
8) Do you partner with other companies to help you detect Invalid Traffic? | No | No |
9) Are you able to prevent ads from being viewed post-bid? | Yes | Yes |
10) Has your solution been accredited by MRC for Sophisticated Invalid Traffic? N.B: MRC Accreditation for General Invalid Traffic is included in the viewability accreditation | Under review | No |
a) If yes, has your solution been continuously accredited since your first accreditation? | N/A | N/A |
b) If no, are you in the process of being accredited by MRC? | Under review | No |