Overview
- Slices - organize the data according to the specific criteria.
- Subslices - some slices are also used as subslices to display the cross report.
- Filters - most of the slices are used as filters which limit the data in the report.
- Metrics - parameters or measures of numerical data.
| Slices / Subslices / Filters | Definition |
| Date | The date defined for a range. |
| Channel | Statistics by Channels (publishers). |
| Source | Statistics by Sources. |
| Advertiser | Statistics by Advertisers. |
| Campaign | Statistics by Campaigns. |
| Domain | Statistics by Domains. Top domain names, as well as all subdomains, are included in the report. |
| Top Domain | Only top domain of a website an ad request comes from is shown. |
| Scoring System | Statistics by Scoring System. |
IMPORTANT: please keep in mind that entities that are not connected to scoring services are not displayed in the statistics.
|
Metrics
|
Definition
|
| Protected media | |
| Total | The total number of transactions that meet the filter criteria. |
| Fraudulent | The percentage of the total number of transactions identified as fraudulent. |
| Suspicious | The percentage of the total number of transactions identified as suspicious. |
| Bot/Virus | Computer programs/viruses designed to run on large-scale and simulate human users to create a virtual audience, which can achieve the advertising goal with minimum effort. Advertising bots range from simple script to advanced impersonating bots, which may elude many security measures. |
| Hostile Tools | Tools that mask the user, thus tricking the measurement into counting ad access as if coming from a different device. This can be accomplished using a virtual machine, cellphone emulator, plug-in, or extension. |
| Tunneled Traffic | A method used by fraudsters to mask the geolocation of the user by using a proxy or VPN to mask the IP address. Sophisticated methods include peer-to-peer proxies, which allow the fraudster to use a real PC with a real residential IP address that would not generally be black-listed. This method is typically used by click-farms, which employ people to click on ads and install applications while impersonating users from the desired locations. |
| Non-malicious bots (Non) | Legitimate and self-declared non-humans, for example, Google’s search bot. This transaction category is usually classified as suspicious. |
| View Fraud | Ads deliberately displayed in a manner that is invisible to the human eye, such as being stacked below other ads on a page or within an invisible iFrame. This transaction category is usually classified as suspicious. |
| Publisher Fraud | Ads displayed on a website, location, or application different from the one reported to the advertiser. This transaction category is usually classified as suspicious. |
| Reputation | An indicator of whether a web entity, such as a Publisher, Website or a User ID, is suspected of having engaged in fraudulent behavior. The higher the rate of detection, the greater the potential risk. |
| Total IVT | The percentage of the total number of transactions identified as invalid transactions (fraudulent and suspicious combined). |