Overview
- Slices - organize the data according to the specific criteria.
- Subslices - some slices are also used as subslices to display the cross report.
- Filters - most of the slices are used as filters which limit the data in the report.
- Metrics - parameters or measures of numerical data.
Slices / Subslices / Filters | Definition |
Date | The date defined for a range. |
Channel | Statistics by Channels (publishers). |
Source | Statistics by Sources. |
Advertiser | Statistics by Advertisers. |
Campaign | Statistics by Campaigns. |
Domain | Statistics by Domains. Top domain names, as well as all subdomains, are included in the report. |
Top Domain | Only top domain of a website an ad request comes from is shown. |
Scoring System | Statistics by Scoring System. |
IMPORTANT: please keep in mind that entities that are not connected to scoring services are not displayed in the statistics.
Metrics
|
Definition
|
Protected media | |
Total | The total number of transactions that meet the filter criteria. |
Fraudulent | The percentage of the total number of transactions identified as fraudulent. |
Suspicious | The percentage of the total number of transactions identified as suspicious. |
Bot/Virus | Computer programs/viruses designed to run on large-scale and simulate human users to create a virtual audience, which can achieve the advertising goal with minimum effort. Advertising bots range from simple script to advanced impersonating bots, which may elude many security measures. |
Hostile Tools | Tools that mask the user, thus tricking the measurement into counting ad access as if coming from a different device. This can be accomplished using a virtual machine, cellphone emulator, plug-in, or extension. |
Tunneled Traffic | A method used by fraudsters to mask the geolocation of the user by using a proxy or VPN to mask the IP address. Sophisticated methods include peer-to-peer proxies, which allow the fraudster to use a real PC with a real residential IP address that would not generally be black-listed. This method is typically used by click-farms, which employ people to click on ads and install applications while impersonating users from the desired locations. |
Non-malicious bots (Non) | Legitimate and self-declared non-humans, for example, Google’s search bot. This transaction category is usually classified as suspicious. |
View Fraud | Ads deliberately displayed in a manner that is invisible to the human eye, such as being stacked below other ads on a page or within an invisible iFrame. This transaction category is usually classified as suspicious. |
Publisher Fraud | Ads displayed on a website, location, or application different from the one reported to the advertiser. This transaction category is usually classified as suspicious. |
Reputation | An indicator of whether a web entity, such as a Publisher, Website or a User ID, is suspected of having engaged in fraudulent behavior. The higher the rate of detection, the greater the potential risk. |
Total IVT | The percentage of the total number of transactions identified as invalid transactions (fraudulent and suspicious combined). |