Ad fraud is one of the biggest threats facing digital advertisers today. From fake impressions to deceptive clicks, fraudsters use a variety of tactics to siphon ad dollars and distort campaign performance. This not only wastes your budget but also undermines the trust and effectiveness of your marketing efforts.
To stay ahead, advertisers need to understand the different types of ad fraud and the ways they can impact their campaigns. This glossary breaks down the most common ad fraud tactics, helping you better protect your investments and drive real, measurable results.
What is ad fraud?
Ad fraud is any deliberate activity that prevents the proper delivery of ads to the right people at the right time, in the right place. Most often, ad fraud refers to certain kinds of traffic. From ad injection to traffic sourcing, here’s your glossary of key ad fraud terms. For more on ad fraud, check out our guide.
Ad injection
Inserting ads into an app, web page, etc., without the consent of the publisher or operator of that resource. The ad can be visible or hidden.
Ad stacking
Placing multiple ads on top of each other in a single placement, with only the top ad being viewable. This is a form of impression fraud because the advertiser is paying for impressions even if the end user is not seeing an ad.
Adware traffic/ad injection
A device where a user is present and additional HTML or ad requests are made by the adware independently of the content being requested by the user. Adware may also contain a function to inject an ad from the software onto a web page as the user browses, rather than the ad being delivered by the publisher of the web page.
Auto-refresh
A page ad unit is enabled to request a new rendered asset more than once and at periodic intervals.
Exclusion lists
Lists of known bad IPs, domains, or other parameters used to prevent the serving of ads matching those parameters.
Bot
Short for robot; refers to a software program that carries out automated tasks on the Internet. There are good bots and bad bots. They may intentionally or unintentionally view ads, watch videos, click on ads, etc. For more on bots, check out these resources.
Bot detection
The detection and differentiation of bot traffic and bot impressions from human traffic and human impressions.
Bot prevention
The prevention of bot traffic and bot impressions before the inventory is bought or sold.
Bot traffic
Nonhuman traffic designed to mimic users and inflate audience numbers.
Botnet
A group of computers taken over by software.
Brand safety
Protecting a brand’s reputation by ensuring ads do not appear alongside harmful, inappropriate, or fraudulent content.
Browser pre-rendering
A device makes HTML or ad requests prior to expected human-initiated navigation to the requested resources.
Click injection
A sophisticated form of click fraud where clicks are generated just before a user completes a real app download or conversion, stealing credit for the action.
Cookie stuffing
An advertiser is provided with cookies from other domains as if the user had visited those.
Datacenter traffic
Traffic originating from servers in datacenters, rather than residential or corporate networks. Typically, no end user is present, though proxy servers or other technologies may result in traffic appearing to originate from datacenters while still being delivered to human users.
Domain spoofing
HTML or an ad request that attempts to represent a site, device, etc., other than the actual placement. This tricks advertisers and ad exchanges into thinking the inventory is legitimate. This is also called domain laundering.
Fraudulent attribution
Manipulating attribution models to claim credit for conversions or sales that were not genuinely influenced by the fraudster’s ad placement.
Geo masking
A fraud tactic where fraudulent traffic is made to appear as if it originates from a different, often higher-value, geographic location.
Hidden ad impressions
Impressions that are not actually seen by people because they are hidden behind other ads or website content (as in ad stacking), displayed in tiny iframes (pixel stuffing), or otherwise served in a way that prevents real ad views.
Hijacked device
A user’s device (browser, phone, app) is modified to request HTML or make ad requests that are not under the control of a user and made without the user’s consent.
Incentivized browsing
A human user may be offered payment or benefits to view or interact with ads or generate traffic on ad-supported sites.
Impression fraud
A type of fraud where ads are loaded on a webpage but are never seen by a human, often because they are hidden or placed in an area unlikely to be viewed.
Invalid traffic (IVT)
Also referred to as Nonhuman Traffic (NHT) or Suspicious Activity Detection (SAD), it is online traffic generated from machines or other bot activity that interacts with digital ads.
- General Invalid Traffic (GIVT)
Traffic that comes from known, nonhuman sources on publicly available IP lists. It can be identified through routine means of filtration. Key examples include datacenter traffic; bots and spiders or other crawlers masquerading as legitimate users; non-browser user-agent headers; hidden, stacked, covered, or otherwise unviewable ads; pre-fetch or browser pre-rendering traffic; and invalid proxy traffic. - Sophisticated Invalid Traffic (SIVT)
Nonhuman traffic that is more difficult to detect, and requires advanced analytics, multipoint corroboration/coordination, or significant human intervention to analyze and identify. Key examples include hijacked devices, hijacked tags, adware, malware, incentivized browsing, misappropriated content (if applicable), falsified viewable impression decisions, and cookie stuffing.
Pixel stuffing
The process of serving one or multiple ads in a single 1X1 pixel frame, so that the ad can’t be seen.
Post-click fraud
Occurs after a user clicks on an ad. Fraudsters manipulate the activity to mimic conversions or other valuable actions to steal advertiser spend.
Programmatic fraud
Fraudulent activity that targets programmatic advertising platforms, exploiting the automated nature of ad buying and selling to deliver fake impressions or clicks.
Proxy traffic
Traffic is routed through an intermediary proxy device or network where the ad is rendered in a user’s device where there is a real human user.
Retargeting fraud
Bots mimic a human’s intentions, such as an interest in a specific brand, in order to warrant the higher CPM typically associated with retargeting. Advertisers are deceived into believing they are receiving valuable, targeted audiences.
Sophisticated bot
A bot not listed in the industry bots and spider list and known browser list.
Supply chain transparency
Ensuring all participants in the ad supply chain—publishers, exchanges, and ad networks—are legitimate and accountable, reducing fraud opportunities.
Traffic sourcing/sourced traffic
Any method by which publishers acquire more visitors through third parties.
Traffic laundering
Fraudsters redirect illegitimate traffic through seemingly legitimate sources to disguise its origin and make it appear authentic.
Video ad fraud
Fraudulent practices specifically targeting video ads, such as auto-playing videos in hidden tabs to rack up fake views and ad revenue.
Combat ad fraud with IAS
Navigating the complexities of ad fraud can be daunting, with its myriad forms and ever-evolving tactics posing significant challenges to advertisers. Effectively combating these fraudulent activities requires a deep understanding and robust strategies.
Integral Ad Science (IAS) offers comprehensive solutions to help advertisers protect their investments and maintain the integrity of their campaigns. Contact IAS today to safeguard your advertising efforts against the pervasive threat of ad fraud.