IVT Taxonomy and Examples
The below charts explain the different types of invalid traffic with corresponding examples. These examples are meant to be illustrative to help represent the differences between categories and only represent a subset of possible invalid behaviors & tactics.
Â
GIVT
Category | Definition | Examples |
---|---|---|
Data Center | Ad traffic originating from servers in data centers whose IPs are | TAG data center |
Known Crawler | A program or automated script that requests content and declares | IAB spiders & bots |
Irregular | Ad traffic that includes one or more attributes (e.g. user cookie) | False |
Â
SIVT
Category | Definitions | Examples |
---|---|---|
Automated | A program or automated script that requests web content (including | Botnets |
False | An ad request for inventory that is different from the actual inventory being supplied, including ad requests where the actual ad is rendered to a different website or application, device, or other target (such as geography). | Spoofed measurement, domain spoofing, |
Misleading | A web page, application, or other visual element modified to falsely | Stacked ads, ads |
Manipulated | A browser, application, or other program that triggers an ad | Pop-unders, |
Incentivized | The use of an explicit incentive to drive users to interact with one or | Undeclared |
Undisclosed | Invalid traffic that cannot be classified using any of the other | Machine learning |