Affiliate Fraud
A form of invalid malicious activity in which an affiliate marketers or network attempts to drive invalid traffic to their partner's site to inflate their commissions.
Automation Tool
A tool used to perform automatic activity repetitively, fast and at scale.
Behavioral Anomalies
Abnormal actions performed by a user / visitor on digital assets, like excessive page hopping, refreshing, and non-human scrolling and browsing patterns.
Bot
A computer script designed to act with agency or simulate human behavior.
Chargeback Fraud
A form of invalid malicious activity in which a cardholder makes a purchase and then contacts the cardholder to dispute the charge and claim a refund, while still holding on to the item.
Click Farm
A Groups of workers available for hire that rapidly click on content or ads in order to inflate traffic, sign-ups or engagement.
Click Fraud
A form of invalid malicious activity in which an attempt is made to generate large volumes of ad-clicks with the aim of depleting the advertisers budget.
Client-Side Detection
Detection techniques that reside on the client side, applied after the request has already gone through the server. Common examples include TCP Techniques and STUN Techniques.
Cookie Stuffing
A form of invalid malicious activity in which an affiliate marketers or network attempts to plant a cookie on a visitor's browser without their knowledge and consent, usually via a 3rd party site. This is done so that when the visitors makes a purchase on an eCommerce site, the affiliate can claim credit for driving the visitor to that eCommerce site, winning them a commision.
Crawler
An automated script designed to catalogue and index web pages.
Customer Acquisition
A company’s collective marketing efforts to acquire customers online.
Customer Acquisition Security (CAS)
A cybersecurity-driven business strategy aimed at preventing invalid traffic from interacting with assets throughout the online customer acquisition funnel.
Data Center Traffic
Traffic originating from large data storage facilities as opposed to personal networks. Often times can be used to generate malicious bot activity.
Excessive Rate Limit
A threshold designed to limit a site visitor's ability to repeatedly perform invalid actions like incorrect login attempts and incomplete form fills.