The speed of update and iteration is unimaginable. Many companies are deceived and their interests are damaged because they have not established a good learning and early warning mechanism. The means of cheating Cheating methods can be divided into attribution hijacking and fake traffic according to technical principles. Attribution hijacking means using attribution rules to hijack conversions generated by real users by posting fake clicks. Fake traffic means that all conversion data is not real users, it may come from virtual devices, or it may come from real machine brushing. 1.
Attribution Hijacking Click flooding, also known as the so-called big click. Illegal gangs use scripts to inject random data or target data from other sources to fake the exposure or click of advertisements. Under the principle of lastclick attribution, they are activated by crashing the device ID and fingerprint information. This method has the lowest cheating cost, but is concealed. Sex is bad. Clickjacking, small clicks that are the opposite of big clicks. Due to the Bulk SMS Service existence of the android broadcast mechanism, the spy APP or malicious plug-in in the device will eavesdrop on the installation completion event, and try to report the click data of the same device, ID and fingerprint information to the server before the user opens it, and it is easy to be classified according to the lastclick rule. Because of this, and because there is no Android broadcast mechanism on the IOS side, the installation list cannot be obtained, and it is more difficult to achieve small clicks. However, with the development of time and cheating technology, this technology is also slowly emerging. Installation hijacking refers to the hijacking of channel packages. It is also a headache for everyone to promote Android APPs.
The application store or software will issue unsafe prompts to users and guide users to go to their corresponding addresses to download. As we all know, in different application markets or promotions The source of the channel package of the channel will be distinguished by the channel ID when it is packaged. The purpose of hijacking is to change the source of the channel package for the user without knowing it, so that the corresponding app store or channel can acquire new users. 2. Fake traffic Compared with the above three methods, fake traffic is more self-sufficient. Unconstrained by attribution rules and natural quantities, click activations are all forged; at the data request level, black production gangs often use some anonymous addresses to submit click and activation data