Skip to main content

ISPs and Ad Networks Against Botnet Ad Fraud

  • Conference paper
Decision and Game Theory for Security (GameSec 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6442))

Included in the following conference series:

Abstract

Botnets are a serious threat on the Internet and require huge resources to be thwarted. ISPs are in the best position to fight botnets and there are a number of recently proposed initiatives that focus on how ISPs should detect and remediate bots. However, it is very expensive for ISPs to do it alone and they would probably welcome some external funding. Among others, botnets severely affect ad networks (ANs), as botnets are increasingly used for ad fraud. Thus, ANs have an economic incentive, but they are not in the best position to fight botnet ad fraud. Consequently, ANs might be willing to subsidize the ISPs to do so. We provide a game-theoretic model to study the strategic behavior of ISPs and ANs and we identify the conditions under which ANs are likely to solve the problem of botnet ad fraud by themselves and those under which the AN will subsidize the ISP to achieve this goal. Our analytical and numerical results show that the optimal strategy depends on the ad revenue loss of the ANs due to ad fraud and the number of bots participating in ad fraud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Directive 2006/24/EC of the European parliament and of the council. Official Journal of the European Union (2006)

    Google Scholar 

  2. 2008 Year-in-Review Benchmarks. DoubleClick Research Report (2009)

    Google Scholar 

  3. Biggest, Baddest Botnets: Wanted Dead or Alive. PC World (2009), http://www.pcworld.com/article/169033/biggest_baddest_botnets_wanted_de_or_alive.html

  4. Click Fraud Index. ClickForennsics Inc. (2009)

    Google Scholar 

  5. Internet Advertising Revenue Report. Interactive Advertising Bureau (2009)

    Google Scholar 

  6. Adamic, L.A., Huberman, B.A.: The Web’s hidden order. Communication ACM (2001)

    Google Scholar 

  7. Australian Internet Security Initiative (AISI), A.C., Media Authority: (2010), http://www.acma.gov.au/WEB/STANDARD/1001/pc=PC_310317

  8. Mungamuru, B., Weiss, S., Garcia-Molina, H.: Should Ad Networks Bother Fighting Click Fraud? (Yes, They Should.). Technical report, Stanford InfoLab (2008)

    Google Scholar 

  9. Click Forensics Discovers Click Fraud Surge from New Sophisticated Bahama Botnet: (2009), http://www.clickforensics.com/newsroom/press-releases/144-bahama-botnet.html

  10. Constantin, L.: German Government to Help Rid Computers of Malware (2009), http://news.softpedia.com

  11. Crowcroft, J.: Net Neutrality: The Technical Side of the Debate: A White Paper. SIGCOMM Computer Communication Review (2007)

    Google Scholar 

  12. Daswani, N., Stoppelman, M.: The Anatomy of Clickbot.A. In: Hot Topics in Understanding Botnets (HotBots) (2007)

    Google Scholar 

  13. Edelman, B.G.: Securing Online Advertising: Rustlers and Sheriffs in the New Wild West. SSRN eLibrary (2008)

    Google Scholar 

  14. Edelman, B.G.: Deterring Online Advertising Fraud Through Optimal Payment in Arrears. SSRN eLibrary (2009)

    Google Scholar 

  15. Gandhi, M., Jakobsson, M., Ratkiewicz, J.: Badvertisements: Stealthy Click-Fraud with Unwitting Accessories. Digital Forensic Practice 1(2) (2006)

    Google Scholar 

  16. Viral Web infection siphons ad dollars from Google, http://www.theregister.co.uk/2009/05/14/viral_web_infection/

  17. Botnet caught red handed stealing from Google (2009), http://www.theregister.co.uk/2009/10/09/bahama_botnet_steals_from_google

  18. Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: a game-theoretic analysis of information security games. In: International Conference on World Wide Web (WWW) (2008)

    Google Scholar 

  19. Growing number Of ISPs Injecting Own Content Into Websites (2008), http://www.techdirt.com/articles/20080417/041032874.shtml

  20. Livingood, J., Mody, N., O’Reirdan, M., and Comcast Communications: Recommendations for the Remediation of Bots in ISP Networks. Internet-Draft Version 3, IETF (2009)

    Google Scholar 

  21. Jakobsson, M., Ramzan, Z.: Crimeware. Addison-Wesley, Reading (2008)

    Google Scholar 

  22. Krishnamurthy, B., Wills, C.E.: Cat and Mouse: Content Delivery Tradeoffs in Web Access. In: International conference on World Wide Web (WWW) (2006)

    Google Scholar 

  23. Lelarge, M., Bolot, J.: Economic Incentives to Increase Security in the Internet: The Case for Insurance. In: INFOCOM (2009)

    Google Scholar 

  24. Livingood, J., Mody, N., O’Reirdan, M., and Comcast Communications: ISP: Voluntary Code of Practice for Industry Self-regulation in the Area of e-security. Internet industry code of practice, Internet Industry Association (2009)

    Google Scholar 

  25. Network Bluepill: Stealth Router-based Botnet (2009), http://dronebl.org/blog

  26. Reis, C., Gribble, S.D., Kohno, T., Weaver, N.C.: Detecting In-Flight Page Changes with Web Tripwires. In: USENIX Symposium on Networked Systems Design & Implementation (NSDI) (2008)

    Google Scholar 

  27. Cisco Intrusion Detection Systems, http://www.google.com/products?q=cisco+intrusion+detection+system&aq=3&oq=cisco+in

  28. VeriSign Inc., http://www.verisign.com/ssl/buy-ssl-certificates/secure-site-services/index.html

  29. Vratonjic, N., Freudiger, J., Felegyhazi, M., Hubaux, J.P.: Securing Online Advertising. Technical report 2008-017, EPFL (2008)

    Google Scholar 

  30. Vratonjic, N., Freudiger, J., Hubaux, J.P.: Integrity of the Web Content: The Case of Online Advertising. In: Usenix CollSec (2010)

    Google Scholar 

  31. Vratonjic, N., Raya, M., Hubaux, J.P., Parkes, D.C.: Security Games in Online Advertising: Can Ads Help Secure the Web? In: Workshop on the Economics of Information Security (WEIS) (2010)

    Google Scholar 

  32. Weisstein, E.: Euler-maclaurin integration formulas. MathWorld (2010), http://mathworld.wolfram.com/Euler-MaclaurinIntegrationFormulas.html

  33. Zhao, X., Fang, F., Whinston, A.B.: An economic mechanism for better Internet security. Decision Support Systems 45(4) (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vratonjic, N., Manshaei, M.H., Raya, M., Hubaux, JP. (2010). ISPs and Ad Networks Against Botnet Ad Fraud. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds) Decision and Game Theory for Security. GameSec 2010. Lecture Notes in Computer Science, vol 6442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17197-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17197-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17196-3

  • Online ISBN: 978-3-642-17197-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics