Crookies: Tampering With Cookies to Defraud E-Marketing

Crookies: Tampering With Cookies to Defraud E-Marketing

Bede Ravindra Amarasekara, Anuradha Mathrani, Chris Scogings
Copyright: © 2020 |Pages: 15
ISBN13: 9781522597155|ISBN10: 1522597158|EISBN13: 9781522597162
DOI: 10.4018/978-1-5225-9715-5.ch073
Cite Chapter Cite Chapter

MLA

Amarasekara, Bede Ravindra, et al. "Crookies: Tampering With Cookies to Defraud E-Marketing." Encyclopedia of Criminal Activities and the Deep Web, edited by Mehdi Khosrow-Pour D.B.A., IGI Global, 2020, pp. 1062-1076. https://doi.org/10.4018/978-1-5225-9715-5.ch073

APA

Amarasekara, B. R., Mathrani, A., & Scogings, C. (2020). Crookies: Tampering With Cookies to Defraud E-Marketing. In M. Khosrow-Pour D.B.A. (Ed.), Encyclopedia of Criminal Activities and the Deep Web (pp. 1062-1076). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch073

Chicago

Amarasekara, Bede Ravindra, Anuradha Mathrani, and Chris Scogings. "Crookies: Tampering With Cookies to Defraud E-Marketing." In Encyclopedia of Criminal Activities and the Deep Web, edited by Mehdi Khosrow-Pour D.B.A., 1062-1076. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9715-5.ch073

Export Reference

Mendeley
Favorite

Abstract

HTTP cookies provide stateful and reliable cross-domain tracking capability to web technologies including e-commerce. Affiliate marketing (AM) enables businesses to generate visitor traffic at a relatively low cost, but some advertising models of AM are prone to large-scale fraud, such as “click-fraud,” which can allow rogue affiliates to earn commissions fraudulently. Cost-per-acquisition (CPA) appeared as the silver bullet against AM fraud, as the e-commerce site does not pay for “clicks,” but only for monetary outcomes. The discovery of “cookie stuffing” fraud shows that CPA is not the silver bullet that it was thought to be. The researchers designed and developed AMNSTE, a simulation platform to discover new vulnerabilities such as load-time click, conversion hijacking, conversion stealing, conversion faking, which are presented in detail in this article. It also presents technical solutions to mitigate some of the vulnerabilities, which will help practitioners to implement new solutions or re-examine their existing security strategies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.