Abstract
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of whether the provider is a third-party `ad network' or the target of the click itself. If practiced widely, this attack could accelerate a move away from pay-per-click programs and toward programs in which referrers are paid only if the referred user subsequently makes a purchase (pay-per-sale) or engages in other substantial activity at the target site (pay-per-lead). We also briefly discuss the lack of auditability inherent in these schemes.
| Original language | English |
|---|---|
| Pages (from-to) | 1091-1100 |
| Number of pages | 10 |
| Journal | Computer Networks |
| Volume | 31 |
| Issue number | 11 |
| DOIs | |
| State | Published - 17 May 1999 |
| Externally published | Yes |
| Event | The WWW8: 8th International World Wide Web Conference - Toronto, Ont., Can Duration: 11 May 1999 → 14 May 1999 |
ASJC Scopus subject areas
- Computer Networks and Communications
Fingerprint
Dive into the research topics of 'On the security of pay-per-click and other Web advertising schemes'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver