Back to Results
First PageMeta Content
Consumer fraud / Internet fraud / Internet marketing / Computer network security / Click fraud / Online advertising / Botnet / Affiliate marketing / Click farm / Internet / Electronic commerce / Business


Characterizing Large-Scale Click Fraud in ZeroAccess †✸ †✸ ✷
Add to Reading List

Document Date: 2014-09-30 19:09:49


Open Document

File Size: 342,79 KB

Share Result on Facebook

City

Module / Scottsdale / /

Company

Google / InfoSpace / Invasive Software / Symantec / Yahoo / Microsoft / /

Country

United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

George Mason University / International Computer Science Institute / University of California / /

IndustryTerm

partner ad network / advertising networks / anti-virus software / ad server / online advertising / affiliate ad networks / ad networks / linked Web sites / Search engines select ads / publishers / advertising revenue / intermediate publisher / search-hijacking activity / syndicate publisher / search-hijacking functionality / forensic accounting / hourly sum server / syndicate network / advertising network / niche search engines / Web request / communication protocol / search result / organic search results / Web page corresponding / advertising losses / search result page / advertiser site / realistic Web / user search traffic / substituted search ad / normal Web browser behavior / functional headless Web browser / advertising campaigns / search ad network / actual client Web browser / induced advertising losses / search ad networks / Web requ est ith JS / less well-known publishers / publishers Web site / publisher Web / click fraud infrastructure / ad network / downstream publisher / syndicate search ads / paid search ads / Search engines / display ad networks / syndication network / cryptocurrency mining / click fraud payload performing search-hijacking / Search ad syndication network / Internet scammer / search query / Search ads / advertising clicks / Web Advertising / search engine / online sale / advertising budget depletion / search results / search engine hijacking / advertising ecosystem / /

Organization

Microsoft’s Digital Crimes Unit / Dirty Ad Unit / International Computer Science Institute / University of California / Berkeley / Digital Crimes Unit / Good Ad Unit / George Mason University / University of California / San Diego / /

Person

Geoffrey M. Voelker / Web / Stefan Savage Geoffrey / Paul Pearce Vacha Dave Chris / Serpent / Min Previous H−Hour / Dave Chris Grier Kirill Levchenko Saikat / Damon McCoy Vern Paxson Stefan / Kirill Levchenko Saikat Guha / /

Position

author / CPA / straight-forward / /

Product

plus ultra / ZeroAccess / Fisher / Dataset Granularity Quantity ZA DNS / P2P / /

ProgrammingLanguage

HTML / JavaScript / /

ProvinceOrState

Manitoba / California / Arizona / /

Technology

peer-to-peer / P2P / search engine / machine learning / P2P protocol / HTML / UDP / anti-virus software / cryptography / C&C protocol / DNS / P2P communication protocol / ASCII / HTTP / autoclicking protocol / ZA-C&C protocol / /

URL

http /

SocialTag