Analyzing Content-Level Properties of the Web Adversphere Yong Wang* **, Daniel Burgener**, Aleksandar Kuzmanovic**, Gabriel Maciá-Fernández*** * University.

Slides:



Advertisements
Similar presentations
Research Summary Nick Feamster. The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground.
Advertisements

A platform of for knowledge and services sharing Fernando Ferri IRPPS-CNR.
Learning Objectives 1 Copyright © 2002 South-Western/Thomson Learning Primary Data Collection: Observation CHAPTER seven.
On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
1 The Google Online Marketing Challenge: Compelling Experiential Learning Jamie Murphy Murdoch Business School.
Back to Table of Contents
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
21 21 Web Content Management Architectures Vagan Terziyan MIT Department, University of Jyvaskyla, AI Department, Kharkov National University of Radioelectronics.
Understanding the Network and User-Targeting Properties of Web Advertising Networks Yong Wang 1,2 Daniel Burgener 1 Aleksandar Kuzmanovic 1 Gabriel Maciá-Fernández.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Databases Chapter 11.
1 E-Commerce Introduction Professor Joshua Livnat, Ph.D., CPA 311 Tisch Hall New York University 40 W. 4th St. NY NY Tel. (212) Fax (212)
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Web Analytics
Harini Sridharan Stephen Duraski.  Behavioral Targeting (BT) is a technique that uses a user’s web-browsing behavior to determine which ads to display.
1 Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Abstract Introduction Results and Discussions James Kasson  (Dr. Bruce W.N. Lo)  Information Systems  University of Wisconsin-Eau Claire In a world.
1. 1.Charting the CDNs(locating all their content and DNS servers). 2.Assessing their server availability. 3.Quantifying their world-wide delay performance.
A brief walkthrough the world of the internet.  TCP/IP stands for Transmission Control Protocol/Internet Protocol  TCP/IP is the standard for transmitting.
Ao-Jan Su, David R. Choffnes, Fabián E. Bustamante and Aleksandar Kuzmanovic Department of EECS Northwestern University Relative Network Positioning via.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
Towards Street-Level Client- Independent IP Geolocation Yong Wang, UESTC/Northwestern Daniel Burgener, Northwestern Marcel Flores, Northwestern Aleksandar.
The Internet By Amal Wali 10DD. Contents  What is the Internet? What is the Internet?  Who owns the Internet? Who owns the Internet?  How do you connect.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Understanding Cross-site Linking in Online Social Networks Yang Chen 1, Chenfan Zhuang 2, Qiang Cao 1, Pan Hui 3 1 Duke University 2 Tsinghua University.
What is ? Free service offered by Google The most widely used website statistics service* Provides statistics and reports about visitors and transactions.
Abstract Objective Selected Results To determine whether globalization influence of the internet results in similarity in web browsing behavior. To determine.
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
CHAPTERCHAPTER 8 Evaluation. Topics Covered in Chapter 8 The Purpose of Evaluation Objectives: A Prerequisite for Evaluation Current Status of Measurement.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
The Variety of Reports in Business Business Information Management II.
Understanding Crowds’ Migration on the Web Yong Wang Komal Pal Aleksandar Kuzmanovic Northwestern University
Log files presented to : Sir Adnan presented by: SHAH RUKH.
Serving a Global Audience Brian Oh Director, Business Development.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
EVALUATE YOUR SITE’S PERFORMANCE. Web site statistics Affiliate Sales Figures.
Stephen Panjaitan PRESIDENT UNIVERSITY ORGANIZATION BEHAVIORAL.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
Unconstrained Endpoint Profiling Googling the Internet Ionut Trestian, Supranamaya Ranjan, Alekandar Kuzmanovic, Antonio Nucci Reviewed by Lee Young Soo.
August 3, March, The AC3 GRID An investment in the future of Atlantic Canadian R&D Infrastructure Dr. Virendra C. Bhavsar UNB, Fredericton.
Implementing ISA Server Caching
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Social Networking for Scientists (Research Communities) Using Tagging and Shared Bookmarks: a Web 2.0 Application Marlon Pierce, Geoffrey Fox, Joshua Rosen,
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
A Study on Policy-Based Interaction Techniques with Autonomic Computing Peter Khooshabeh University of California, Santa Barbara 1 Department of Psychology,
Selective Behavior in Online Social Networks Chunjing Xiao Ling Su Juan Bi Yuxia Xue Aleksandar Kuzmanovic University of Electronic Science and Technology.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
1 DATA-DRIVEN SOLUTIONS. 2 KEYWORD-LEVEL SEARCH RETARGETING TARGET USERS BASED ON THEIR RECENT SEARCH HISTORY AND SEARCH QUERIES. A user performs a search.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Lecture-6 Bscshelp.com. Todays Lecture  Which Kinds of Applications Are Targeted?  Business intelligence  Search engines.
Introduction to Information Systems SSD1: Introduction to Information Systems Unit 1. The World Wide Web Unit 2. Introduction to Java and Object- Oriented.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Automated Experiments on Ad Privacy Settings
WWW and HTTP King Fahd University of Petroleum & Minerals
Automated ad placement
The Internet Industry Week Two.
Evolution of Internet.
Social Media Marketing: A Strategic Approach, 2e
Information and Network Security
MKT 498 Education for Service-- snaptutorial.com.
MKT 498 Teaching Effectively-- snaptutorial.com
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
HTML5 and Local Storage.
Web Mining Department of Computer Science and Engg.
WJEC GCSE Computer Science
Presentation transcript:

Analyzing Content-Level Properties of the Web Adversphere Yong Wang* **, Daniel Burgener**, Aleksandar Kuzmanovic**, Gabriel Maciá-Fernández*** * University of Electronic Science and Technology of China, Chengdu, Sichuan, China; ** Northwestern University, Evanston, IL, USA; *** University of Granada, Granada, Spain Introduction Location-based Advertising Behavioral Targeting Acknowledgements Motivation Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. Contributions We present our initial efforts on building a content- level auditing service for web-based ad networks. Understanding ad distribution mechanisms Evaluating behavioral targeting Evaluating location-based advertising Such a web ad auditing system, that bring useful auditing information to all entities involved in the online advertising business, can be universally applied to arbitrary commissioners’ networks to effectively monitor and help regulate web-based ad industry. Auditing Platform and Investigated Commissioners Auditing Platform We recruit 282 servers from PlanetLab, which are geographically distributed in 36 different countries. Investigated Commissioners We perform a content-level analysis of three representative ad networks with divergent design philosophies. Google Distributing a large number of data centers AOL- Adsonar Using CDN services Adblade Placing servers at a single location AOL has four subsidiaries: Adsonar, Advertising, Adtech, and Tacoda. Only Adsonar supports text- based ads that can be feasibly retrieved from the Web, as Google and Adblade do. Distribution Mechanisms Commissioners could send ads containing information related to the geographical location of the web users. We quantify the percentage of vantage points in which the use of location-based advertising is observed. (Table 3) Table 1: Global similarity of each commissioner CommissionerGlobal similarity (%) Google13.16 AOL-Adsonar Adblade72.62 ’Local’ similarity For each vantage point, we calculate the ’local’ similarity between itself and any other vantage point in terms of the percentage of identical ads observed in both vantage points. (Figure 1) ’Global’ similarity We also compute the ’global’ similarity of each commissioner by averaging the ’local’ similarities for all vantage points when accessing this commissioner’s ads. (Table 1) The darker the color in a given (x,y) box is, the larger the similarity between x and y is. Vantage points (a) Google(b) AOL- Adsonar (c) Adblade Similarites[%] Figure 1: Local similarities among vantage points Vantage points Summary of Findings Google distributes different ads into different servers. AOL-Adsonar distributes ads for four regions: U.S., Canada, U.K., and others. The servers in the same region serve the same content. Adblade uses a single machine (or a cluster) containing the whole pool of ads to serve the requests. Table 3: % of vantage points observing location-based ads CommissionerCity (%)State (%)No association (%) Google AOL-Adsonar Adblade Summary of Findings Google does business all over the world, so exploiting location-based advertising techniques is quite feasible. Adblade and AOL-Adsonar only apply location-based advertising in most areas of U.S.. Table 2: Incremental percentage of observed ’sport’ related ads when behavioral targeting is enabled (’local/uniform cookie’) comparing with disabled (’no cookie’) CommissionerLocal cookie (%) Uniform cookie (%) Google253 AOL-Adsonar135 Adblade00 Many commissioners claim to be able to more effectively reach users with behaviorally targeted ads. We want to examine the extent to which commissioners participate in behavioral targeting. We use the interest category “sports” in our tests. (Table 2) Establish baseline We disable cookies, and then retrieve the text-based ads from a list of websites, which may or may not be related to sports, and scan them for sports-related keywords, e.g., sport, cycling, etc. Establish browsing pattern We first enable cookies on our PlanetLab nodes and visit websites known to work with the commissioner that fit in the category “sports”. Local cookie We then repeat this experiment with cookies enabled, in order to determine the difference when behavioral targeting is used. Uniform cookie We finally repeat this experiment by copying the cookies from one computer to all Planetlab nodes, and then retrieving ads again to check whether profile data is stored locally or globally. Summary of Findings Both Google and AOL-Adsonar use behavioral targeting for the “sports” interest category, whereas Adblade does not. Both Google and AOL-Adsonar associate a user profile with interest categories only on an ad server close to a user. This work is supported by China Scholarship Council, NSF CAREER Award no , and Spanish MEC project TEC C03-02 (70% FEDER funds).