Home Data-Driven Thinking Why Prebid Alone Only Provides A False Sense Of Security

Why Prebid Alone Only Provides A False Sense Of Security

SHARE:
Marc Goldberg, CRO, Method Media Intelligence

Data-Driven Thinking” is written by members of the media community and contains fresh ideas on the digital revolution in media.

Today’s column is written by Marc Goldberg, CRO at Method Media Intelligence.

Can prebid cure all that ails you? In a word … no.

The RTB protocols were put into place so that sellers and buyers could “talk” to each other about the details of an auction. Sellers, of course, want buyers to see what they have to sell. All of this happens in milliseconds and data is provided in the bid request to help with the decision.

The codes

The reasons behind why a buyer wins or doesn’t win an auction can vary widely. The RTB protocols provide lists of signals as to why a bid was not offered for an impression. This is the 5.24 section in the specifications, which are publicly available.

If a publisher didn’t receive a bid, the buyer could communicate back with the no-bid codes that translates to something along the lines of, “You didn’t get our money because your prices were not in line with our bid strategy.” These codes help sellers learn and optimize.

OpenRTB no-bid codes

But codes do more than only indicate when an auction didn’t receive a bid. There are also loss codes that help to explain why a bid was lost for the buyer.

The following table is a list of the potential reasons an exchange can give as to why a bidder didn’t win an impression. (See Section 5.25, “loss reason codes,” OpenRTB Spec v2.5.)

Taken together, the intent of these codes is to ensure that market dynamics are informed by a feedback loop that helps to create a robust and healthier marketplace.

Subscribe

AdExchanger Daily

Get our editors’ roundup delivered to your inbox every weekday.

Section 5.25, “loss reason codes,” OpenRTB Spec v2.5If you look at no-bid code 6, for example, which is related to an “unsupported device,” this is a situation in which a seller sent information to the auction using the wrong format. Perhaps it was mobile inventory for a desktop request. Having received the code, publishers can troubleshoot and see if everything is correctly set up.

No-bid codes 4 and 5 are “suspected non-human traffic,” while code 5 refers to “cloud data center or proxy IP.” Again, the intent of the code is to enable sellers to understand why their impressions are not filling.

So, if a reputable seller received a notification that its traffic was suspected to be non-human traffic, that publisher would ideally dig in to better understand what’s going on. How is this happening to me?

But what if a malicious seller receives code 4 or 5? Then, it’s, “Damn, they caught me – guess it’s time to switch IP addresses or traffic vendors.”

IP addresses

Is it that easy, though, to switch IP addresses? Why, yes it is. Just Google it or watch this video. You can even buy IP proxies by category. I’m not making this stuff up.

Real screen grab from a traffic seller that will remain nameless, because who wants to drive real traffic there?

Real screen grab from a traffic seller that will remain nameless, because who wants to drive real traffic there?

The traffic vendors that exist in the underbelly of the internet hang out in plain sight. Again, Google it, or look through our collection of posts on LinkedIn, all offering “traffic” for sale.

If we take a step back, it’s fair to say that using IP addresses as proxies to detect invalid activity has worked for your search campaigns in the past two decades.

Consider the user experience. A user from IP address 123.456.789 searches for something and then clicks on a link once. If that same IP address clicks on the same link several times, you’d identify that it as suspicious activity. You’d conclude that this user is not an actual person but rather a bot because multiple clicks on the same link is not what a real user would do.

But consider this: if an IP address is suspected of bad behavior, that decision is made after the suspicious activity already transpired. The IP address is identified as malicious and it is placed on a list. This is beneficial to search engines, because it helps them protect their advertisers from invalid activity. Search advertisers generally run more DR and performance-type campaigns with defined KPIs that are tied to a specific outcome, like a sale.

The IP address approach can, indeed, help detect this suspicious activity for searches – but the display user experience is quite different.

User behavior varies on publisher pages. If a user visits a news site and consumes one page to see a sports score, followed by maybe 10 pages in a gallery and then the consumption of three or four articles, that person is a highly desirable news junkie.

Multiple clicks from one IP address is plausible, which makes detecting suspicious activity not as reliable for display if you’re just relying on IP. Someone that clicks on 20 pages would be deemed invalid – even though that is the most coveted user.

Prebid IVT "protection"Prebid “protection”

That’s why the list-based approach works for auctions. Auctions are fast and response codes don’t disrupt the bidding process. But prebid IVT protection is not only reliant on bidstream data, such as IP address and user agent lists, but is also limited to IP addresses and UA lists.

Limited means that vendors are all playing with the same information. Nothing in a prebid solution is proprietary. And reliance should be concerning to anyone reading this, because limited information is not reliable.

Returning to our hypothetical news junkie example, loss code 5 has identified a bad IP. For the “bad guys” the losses are temporary and a nuisance, while for the buyers that win is only temporary and provides a false sense of security. IP address 123.456.789 is now on the list, but a bad guy will be running the same game from IP address 987.654.321, or whatever, tomorrow. Once caught, a bad actor simply repeats the cycle using the endless supply of IP addresses available.

There is a lot of misconception about what Prebid IVT protection can do.

Buy-side vendors are not looking for mouse movement. They are limited to what is available in the auction. A user’s behavior is not at all close to the speed of an auction, and therefore prebid detection can’t perform more than basic block and tackling on static lists, such as IP and user agent.

In a prebid environment, a mouse movement would destroy the exchange mechanics, which is why it’s not available to use. Loss code 2 (“impression opportunity expired”), demonstrates this. Again, an auction is fast, which is why the rules are based on being able to serve auctions at scale.

The reality is, no prebid solution on its own is effective. So, what are you getting when you pay for it?

The shame in this game is that most DSPs offer a free solution, which makes third-party verification seem redundant since it’s based on all of the same bidstream signals.

If you’re reluctant to trust your DSP and you need a “trusted” third party, don’t pay for a prebid solution. This is where you need to complement prebid with a postbid solution.

Prebid IVT is ripe for the taking and let’s be clear, people are taking. Don’t get me wrong, prebid does catch some IVT and, when coupled with a postbid solution, you will see your invalid traffic issues markedly improved.

But while these flaws still exist, you need to go in with your eyes open.

Follow Marc Goldberg (@MarcJGoldberg) and AdExchanger (@adexchanger) on Twitter.

Must Read

Monopoly Man looks on at the DOJ vs. Google ad tech antitrust trial (comic).

Closing Arguments Are Done In The US v. Google Ad Tech Case

The publisher-focused DOJ v. Google ad tech antitrust trial is finished. A judge will now decide the fate of Google’s sell-side ad tech business.

Wall Street Wants To Know What The Programmatic Drama Is About

Competitive tensions and ad tech drama have flared all year. And this drama has rippled out into the investor circle, as evident from a slew of recent ad tech company earnings reports.

Comic: Always Be Paddling

Omnicom Allegedly Pivoted A Chunk Of Its Q3 Spend From The Trade Desk To Amazon

Two sources at ad tech platforms that observe programmatic bidding patterns said they’ve seen Omnicom agencies shifting spend from The Trade Desk to Amazon DSP in Q3. The Trade Desk denies any such shift.

Privacy! Commerce! Connected TV! Read all about it. Subscribe to AdExchanger Newsletters
influencer creator shouting in megaphone

Agentio Announces $40M In Series B Funding To Connect Brands With Relevant Creators

With its latest funding, Agentio plans to expand its team and to establish creator marketing as part of every advertiser’s media plan.

Google Rolls Out Chatbot Agents For Marketers

Google on Wednesday announced the full availability of its new agentic AI tools, called Ads Advisor and Analytics Advisor.

Amazon Ads Is All In On Simplicity

“We just constantly hear how complex it is right now,” Kelly MacLean, Amazon Ads VP of engineering, science and product, tells AdExchanger. “So that’s really where we we’ve anchored a lot on hearing their feedback, [and] figuring out how we can drive even more simplicity.”