How to prevent Online Fraud with Bot Protection

Eduardo Rocha Senior Sales Engineer and Security Analyst
7 Min read

The world of digital publishers is being plagued with bots. Data breach is a main concern for anyone running an e-commerce business. The research shows that only 40% of digital publishers can distinguish between good bots, bad bots and human traffic and over half of those have their data stolen by nefarious online actors, also known as cyber criminals. Not only criminals, but also competitors threat leveraging bad bots.

We have chosen a few methods that can help you measure and mitigate this problem, as well as define those problems, whether you deploy via physical or virtual appliance or a cloud CDN. Actionable threat intelligence is the key to effective cyber threat detection and response. In these short overview, we will go through the types of digital ad fraud, the scale of these frauds in terms of money loss for retailers. We will also inspect how botnets function, how bad bots impact everything from brand reputation, competitiveness, revenue and cost perspectives and what are the precaution measures that you can make yourself or leave it to a third party as we are entering the bot era where more retailers are to trust companies that build smart bots, and their expertise in machine learning.

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%
An illustration of a masked character attempting to open a safe on a computer screen.
Image Source

Types of digital ad fraud

Click fraud is a type of fraud that occurs on the Internet in pay-per-click (PPC) online advertising when a person, automated script or computer program imitates a legitimate user of a web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad’s link.

Impression fraud is an invalid traffic generation that aims to inflate advertising impressions on websites. For this, Pay Per View (PPV) networks need to be identified, that are comprised of legitimate websites that use JavaScript provided by PPV network service providers to render unwanted web pages “underneath” requested content on a real user’s browser so that additional advertising impressions are registered.

Skewed analytic data signifies a lack of visibility into some type of activity of your users that could be skewing your data, leaving you unaware of an entire segment of customers that purchase, or prefer to purchase, via a phone call, for example.

The scale of digital ad fraud

If 56 billion dollars is estimated to be in circulation in the digital ad world, than 1 in 3 of these dollars is wasted on bots. We offer two examples, that of Ashley Madison Breach and Bob Carr and Heartland Payment System breach. In July 2015, a group calling itself “The Impact Team” stole the user data of Ashley Madison, a commercial website billed as enabling extramarital affairs. The group copied personal information about the site’s user base and leaked 32 million log-in credentials into the wild. In the case of Bob Carr, way back in 2008, after Heartland’s network was breached, this lead to the compromise of some 130 million credit and debit cards.

Heartland’s breach cost card issuing banks and credit unions about $500 million. If the same type of processor breach were to occur today, Carr said the cost to banks and credit unions would likely be billions of dollars, and there’s no way Heartland, or any other processor or retailer, could afford to pay issuers the full amount to cover that cost. Today, approximately 1.4% of online revenue is lost to fraud. In 2015, the average total cost of a data breach was estimated at $3.79 million, a 23% increase from 2013.

Robot and network

A close-up view of a network server room with numerous cables and blue lights illuminating the equipment.
Image Source

In order to protect your commerce from losing money to frauds, it is useful to understand how bots are functioning. They are actually connected computers communicating to other internet-connected computers in what is known as botnet. They are not always malicious, as in their essence they were built for communication. But many times they are used for coordinating DDoS attacks or spam campaigns. A compromised device, known as “bot” is created when a computer is penetrated by software from malware distribution. It could also be a “spider” that hacks into the computer. The controller of a botnet is able to direct the activities of compromised computers through communication channels formed by standards-based network protocols such as IRC and HTTP. A “bot herder” or “bot master” can then control the group remotely, usually through IRC or Domains, and often for criminal purposes.

Blocking IP addresses in order to prevent these attacks does not work any more as a protection but you need a purpose built solution that will use machine learning to refine these profiles in real time, learn through patterns, and then ad malicious behaviors to bots/violators database.

From the image (Wiki) it is visible in which ways botnets can work. They can send viruses or worms to a computer whose payload is then going to become a “bot”. Or, they can send Trojans, through e-mail, for example. The bot will then log into a C&C server, that is, command and control server that belongs to a bot herder. Spammer will then purchase services of the botnet from the operator by providing spam messages. This endangers overall security of e-commerce website, loyal consumers and your brands, your SEO and costs money.

Bad bots impact online retailers from competitive, revenue and cost perspectives

Malicious bots create significant challenges for both organisations and end-users by creating high false positive rates and by generating risk scores. Advertisers, publishers and end-users need to be able to distinguish between legitimate and malicious activities in real time. Authentication methods such as out-of-band, one-time passwords and security questions can all be bypassed easily and with minimal effort by violators. While more sophisticated authentication methods have been developed, the customer experience has been compromised.

Botnets can be exploited for various purposes, including denial-of-service attacks, creation or misuse of SMTP mail relays for spam, click fraud, mining bitcoins, spamdexing, and the theft of application serial numbers, login IDs, and financial information such as credit card numbers. This instantly impacts brands, damaging their SEO and stealing content, causing slowdowns and downtime. Bots are scraping, spamming and proning for vulnerabilities. Bot attacks instantly endanger your:

Importance of prevention of bot attacks and brand trust

Digital publishers that care about their brand trust need to find solutions to prevent ad serving resources and revenue to be wasted on bots. Doing an e-commerce business is no longer possible without some kind of a digital transaction. For the transaction purposes, ad-buyers and ad-sellers are willing to pay more for human traffic, or more correctly, this is 37% of ad-buyers, the research shows.

Of these, 10% are willing to pay even 50 to 100% more. In opposition, 59% of ad buyers are willing to pay more for non-human traffic. Buyers today are unable to ensure they reach humans. 50% of ad-buyers and ad-sellers report they are unable to measure non-human traffic. Digital ad fraud is of a top concern for digital publishers. In order to protect brand reputation amongst ad networks, you need to:

  • ensure that your servers load at the optimal speed, without downtimes or slowdowns since most users will abandon page if it loads in under 4 seconds (take into account the rise of mobile users, including tablets)

  • you must be able to detect bad bots

  • eliminate false positives

  • prevent from stealing user data

  • create safe and reliable environment

  • since traffic from all sources arrives for identification, you must be able to filter out non-human and fraudulent traffic by using validation tools to audit ad-inventory

  • measure viewability

There are multiple mediums through which Web traffic consumes content and ads; a growing number of ads are served on mobile devices, within online videos, and within emails. These means: display ads, e-mail ads, mobile ads, video ads. Each of these channels has a number of unique characteristics that impacts the value of the ads to advertisers, and therefore the expected revenue to the publishers.

Precaution measures

Threats of automated website interaction lead to grand theft of customer property. In order to prevent this you can take some precaution measures as presented below, or leave this to a third party, as also suggested. You should:

  • install proper network security

  • double your authentication system

  • prioritize data and define what requires the most stringent control

  • collect and analyze meaningful information about your cyber security

  • present findings to key stakeholders

  • know what assets are valuable to your business and to others

  • take proactive steps in anticipation of attack

  • hire a third party to supplement your information security

  • make your network less static

  • move data around, change your network design

  • always monitor for signs of alarm

The Bot era

A humanoid robotic figure with red eyes and exposed mechanical components,set against a futuristic industrial backdrop.
Image Source

With the rise of mobile device, “there are more than 1.5 million apps on iOS, and 1.6 million on Android. The apps have given rise to a host of new services: for hailing rides or for ordering takeout, for booking travel, or for messaging co-workers,” reports the Verge and continues: “In the desktop era, the glue that bound everything together was the search engine, routing us from Wikipedia to Orbitz to Priceline to Yelp. In the mobile era, that glue is the application programming interface — the API — a bit of software that allows apps to talk to each other. It’s an API that lets you upload a photo from your phone to Facebook, or order an Uber from the Google Maps app.”

All this gave rise to the bot era where large enterprise software companies are all going to invest in building smart bots that scrape content, and retailers will rely on these companies expertise in machine learning to help with security. But on a criminal part, a large scale account takeover is each day more possible because of bots. In a brute force attack, bot could be stealing usernames and passwords and create new accounts which are than used for various types of ad fraud, as already explained. Bot powered fake account registration could be used to create so called “synthetic” identities with which criminals evade detection and execute new account fraud at scale. It is important to remember that fake accounts run by bots hurt conversions, trick legitimate users and create fraudulent transactions which directly influences your revenue and brand reputation.

Latest Articles

Complying with AWS’s RI/SP Policy Update: Save More, Stress Less

Shared Reserved Instances (RIs) and Savings Plans (SPs) have been a common workaround for reducing EC2 costs, but their value has always been limited. On average, these shared pools deliver only 25% savings on On-Demand costs—far below the 60% savings achievable with automated reservation tools. For IT and DevOps teams, the trade-offs include added complexity, […]

Itay Tal Head of Cloud Services
5th December, 2024
The Future of Cybersecurity: Shlomo Kramer’s Bold Predictions for the SASE Era

What does the next decade of cybersecurity hold? Few can answer that better than Shlomo Kramer—co-founder of Check Point and Imperva, and founder & CEO of Cato Networks. In a candid conversation on the CloudNext podcast, Shlomo shared bold predictions and actionable strategies for navigating the challenges and opportunities ahead. From the rise of SASE […]

Ganesh The Awesome Senior Pre & Post-Sales Engineer at GlobalDots
4th December, 2024
Three Ways CISOs Can Combat Emerging Threats in 2025

73% of CISOs fear a material cyberattack in the next 12 months, with over three-quarters convinced AI is advancing too quickly for existing methods to combat it. But what can CISOs do to prepare for the coming wave – and access the resources they need to deal with this evolving threat landscape? To find out, […]

11th November, 2024
How Optimizing Kafka Can Save Costs of the Whole System

Kafka is no longer exclusively the domain of high-velocity Big Data use cases. Today, it is utilized on by workloads and companies of all sizes, supporting asynchronous communication between even small groups of microservices.  But this expanded usage has led to problems with cost creep that threaten many companies’ bottom lines. And due to the […]

Itay Tal Head of Cloud Services
29th September, 2024

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services