Is your network marketing flow real? Common ways of forgery and basic principles

Source: Internet
Author: User
Keywords Network marketing traffic fraud

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

  

Every day there is a large number of advertisers marketing projects online, there are hundreds of millions of netizens to see ads, click Ads or visit marketing sites. When advertisers regularly look at the perfect data performance in their so-called project reports, do they question whether the traffic is real?

In fact, no one can answer the question accurately. However, through a number of monitoring and analysis methods can be discriminated one or two. Google and Baidu, such as large companies have a professional anti-cheating team; in the network marketing market, there are also many third-party monitoring technology solutions; In the United States there are special companies to publish traffic fraud reports ...

As the saying goes, villains, outsmart. Traffic fraud is always with these anti-cheating team and technical tools continue to struggle and progress, in fact, has been parasitic in the whole process of network marketing.

This article will "display" common traffic fraud and basic principles, to make readers have a clear understanding.

Initial stage:

In the case of cookies and IP unchanged, repeated location ads. Cheating Level: ★

resulting in an increase in the number of ads, if the counterfeiters are willing (and so on after the click of the page to open), can also cause landing page (Landing page) Page view (PV) increase.

In the case of cookies and IP unchanged, refresh the page repeatedly. Cheating Level: ★

From the angle of the advertisement, will cause the exposure (impression) to increase, from the promotion website angle, will cause the page the PV to increase.

Summary

In this phase of traffic fraud, is very simple and brutal, basically all professional monitoring tools can find this ignorant behavior. Even so low-level, this kind of traffic fraud organization or individual still enjoy. Because of its high efficiency and low technical content, programming is easy to implement. Sometimes even natural persons will participate, they have a direct interest with the flow of the relationship.

Dangerous tip: Do not try your own Google Adsense/Baidu Alliance ads, or to ensure that within a week to receive the agreement to abort the message.

Intermediate Stage:

  

Clear cookies at a certain frequency or do not support cookies. Cheating Level: ★

Cleaning cookies over and over again is easy to implement for your program. Many monitoring tools are based on cookies. The removal of cookies means that each visit is a new independent visitor (visitors).

Call the broiler or buy the flow. Cheating level: ★★★

The internet has a large number of computers are in the virus, the hacker easily controlled by the chicken. Hackers often command thousands of computers like generals, and the simplest job is to open certain websites or click on certain ads. Some organizations or individuals will spend 10 of dollars to buy traffic, one of these flows is provided by hackers, and then the advertising resources sold can earn 100 dollars. If there is no analyst to monitor the effect of internet marketing, many online marketing money may be easily wasted.

Summary

This is the most popular way of forgery, counterfeiters not only the pursuit of increased flow, but also began to quantify the sea, and has a basic ability to counter detection. However, the fraud is more easily found. The premise is that you have to use Third-party monitoring! Here are two suggestions:

Choosing a professional third-party monitoring tool is a prerequisite for obtaining data analysis

A professional monitoring tool can help collect enough information that is an important evidence against fraud. For example, an advertising monitoring tool can monitor the IP and cookies of the ad-clicked person. Then in the report generated in the monitoring tool, it is clear that the previous mentioned situation in one of the same IP people in the change Cookie in the click.

Focus on exposure and frequency of clicks, and exposure frequency before clicking

Most of the ads click on the first few exposures occurred, and the general frequency of clicks and exposure frequency are fixed values, cheating flow will find a variety of strange phenomena.

  

Focus on the source of the clicks

From the technical point of view, it is possible to get a click from a designated website, which can help to do more in-depth analysis. The following figure contains a variety of related properties for the monitoring tool to obtain, such as the Referer mentioned.

  

Logical analysis from the interaction level.

Do not just stay in the exposure, click, Access, page views such as "quantitative" measurement, more need to consider the two jump rate (that is, 1-bounce Rate), the transformation of this "interactive" measure. The amount of traffic that is bought, or the flow that is unrelated to it, is naturally less participatory.

Advanced Stage:

Change IP at a certain frequency, even cookies are cleared together. Cheating level: ★★★★

This approach allows a PC to cause thousands of independent accesses. However, the change of IP address to achieve more complex, changing the IP address section is more difficult to achieve. The simplest way to replace the IP is through a fixed IP broadband dial-up Internet, but the IP segment generally will not be a big change. So if the organization can take this way to cheat, indicating already specific strong technical strength and network resources, basically the advertising end of the monitoring tools began to be stretched.

Stripping monitoring code, everywhere, or software virtual execution. Cheating level: ★★★

Advertising monitoring Code is not binding or encrypted, can be arbitrarily stripped, used everywhere. For example, the advertising code of the main ads can be added to the advertising material of main B. In this way the advertisement of the main B is shown, the advertisement master A is also counted. This kind of cheating is not uncommon.

There is also the software virtual execution, only need a server, a program can.

Introduce traffic, program control and click on the designated Ads link, specify the link to promote the page. Cheating level: ★★★★★

The previous discussion from the "Interaction level" analysis can be found to a large extent traffic fraud. But if the flow of access, then click on how to do? At this point, the "interaction level" of the analysis method is beginning to be challenged, may not work. Powerful cheaters can simulate the behavior distribution of a large number of visitors, by establishing an algorithm model, the control program clicks on a variety of specific links on the Web page, and links to deeper pages.

This is a very high level of traffic fraud, in which case the two jump rate can be optimized to seem perfectly perfect, even incredibly high. Professional "counterfeiters" can allow visitors to click on the page in a decentralized key content, and control two jump rate within reasonable range. In this way, you will find that your landing page data performance is surprisingly good, and the user's click distribution is very reasonable.

Summary

This level of traffic fraud has begun to rise, and the integration of the potential (that is, a combination of two or three). At this time the common monitoring tools are completely ineffective, and then need professional third-party monitoring tools and experienced analysts. Analysts can combine tools with various diagrams from data structures, flow funnels (traffic flows), custom monitoring, and innovative metrics to integrate analysis. Like a case, and then suspense mystery, good detective can solve the case.

In general, traffic fraud can not be separated from four elements: IP, cookies, Browser, Click, through the four elements of control and change, so that monitoring tool performance difficult to point to the actual situation.

Traffic fraud is already an internet industry, is a latent rule, is a lot of sites to survive and continue to develop the stimulant. This article is only the emperor's new clothes in the little boy, say a few words to the truth. No matter how rampant the phenomenon of traffic fraud in China and even the world, fake is always false! They all have clues that analysts can find their falsity. Of course, there is no rule that organizations or individuals can manufacture false traffic that is almost consistent with normal flow. But I believe that with the production of this high-quality false flow, it is not as real site to do their own website well, to attract users to be cost-effective.

Finally for the site owner, hope to build a station, for advertisers, want to carefully spend money. The last reference to the rice is a hot article to end this article: money, not so earned.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.