On the security of pay-per-click and other Web advertising schemes

被引:28
作者
Anupam, V [1 ]
Mayer, A
Nissim, K
Pinkas, B
Reiter, MK
机构
[1] Lucent Technol, Bell Labs, Secure Syst Res Dept, Murray Hill, NJ USA
[2] Weizmann Inst Sci, Dept Appl Math & Comp Sci, IL-76100 Rehovot, Israel
来源
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING | 1999年 / 31卷 / 11-16期
关键词
electronic commerce; secure systems; on-line advertising; pay-per-click;
D O I
10.1016/S1389-1286(99)00023-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a hit inflation attack on pay-per-click Web advertising schemes. Our attack is virtually impossible for the program provider to detect conclusively, regardless of whether the provider is a third-party 'ad network' or the target of the click itself. if practiced widely, this attack could accelerate a move away from pay-per-click programs and toward programs in which referrers are paid only if the referred user subsequently makes a purchase (pay-per-sale) or engages in other substantial activity at the target site (pay-per-lead). We also briefly discuss the lack of auditability inherent in these schemes. (C) 1999 Published by Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1091 / 1100
页数:10
相关论文
共 6 条
[1]  
ANUPAM V, 1998, IEEE INTERNET COMPUT, V2
[2]  
Flanagan D., 1998, DEFINITIVE GUIDE
[3]  
MORRIS RT, 1985, 117 AT T BELL LAB
[4]  
MUSCIANO C, 1997, HTML DEFINITIVE GUID
[5]  
Reiter MK, 1998, PROCEEDINGS OF THE 3RD USENIX WORKSHOP ON ELECTRONIC COMMERCE, P155
[6]  
1998, US TODAY 0928