Annoyed Users: Ads and Ad-Block Usage in the Wild

Content and services which are offered for free on the Internet are primarily monetized through online advertisement. This business model relies on the implicit agreement between content providers and users where viewing ads is the price for the "free" content. This status quo is not acceptable to all users, however, as manifested by the rise of ad-blocking plugins which are available for all popular Web browsers. Indeed, ad-blockers have the potential to substantially disrupt the widely established business model of "free" content, currently one of the core elements on which the Web is built. In this work, we shed light on how users interact with ads. We show how to leverage the functionality of AdBlock Plus, one of the most popular ad-blockers to identify ad traffic from passive network measurements. We complement previous work, which focuses on active measurements, by characterizing ad-traffic in the wild, i.e., as seen in a residential broadband network of a major European ISP. Finally, we assess the prevalence of ad-blockers in this particular network and discuss possible implications for content providers and ISPs.

[1]  Saikat Guha,et al.  Privad: Practical Privacy in Online Advertising , 2011, NSDI.

[2]  Ayman Farahat,et al.  How effective is targeted advertising? , 2012, 2013 American Control Conference.

[3]  R. Shay,et al.  Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising , 2012 .

[4]  Anja Feldmann,et al.  Back-Office Web Traffic on The Internet , 2014, Internet Measurement Conference.

[5]  Hamed Haddadi,et al.  Targeted Advertising on the Handset: Privacy and Security Challenges , 2011, Pervasive Advertising.

[6]  Anja Feldmann,et al.  Pitfalls in HTTP Traffic Measurements and Analysis , 2012, PAM.

[7]  Anja Feldmann,et al.  Distilling the Internet's Application Mix from Packet-Sampled Traffic , 2015, PAM.

[8]  Narseo Vallina-Rodriguez,et al.  Breaking for commercials: characterizing mobile advertising , 2012, Internet Measurement Conference.

[9]  Wei Meng,et al.  Understanding Malvertising Through Ad-Injecting Browser Extensions , 2015, WWW.

[10]  Michael Carl Tschantz,et al.  Automated Experiments on Ad Privacy Settings , 2014, Proc. Priv. Enhancing Technol..

[11]  Michael Carl Tschantz,et al.  Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination , 2014, ArXiv.

[12]  Aleksandra Korolova Privacy Violations Using Microtargeted Ads: A Case Study , 2011, J. Priv. Confidentiality.

[13]  Anja Feldmann,et al.  NAT Usage in Residential Broadband Networks , 2011, PAM.

[14]  Bernhard Ager,et al.  An Automated Approach for Complementing Ad Blockers’ Blacklists , 2015, Proc. Priv. Enhancing Technol..

[15]  Balachander Krishnamurthy,et al.  Cat and mouse: content delivery tradeoffs in web access , 2006, WWW '06.

[16]  Alberto Negro,et al.  Mobile phone batteries draining: Is green web browsing the solution? , 2014, International Green Computing Conference.

[17]  Suman Nath,et al.  Privacy-aware personalization for mobile advertising , 2012, CCS.

[18]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[19]  Christopher Krügel,et al.  Understanding fraudulent activities in online ad exchanges , 2011, IMC '11.

[20]  Jun Wang,et al.  Real-time bidding for online advertising: measurement and analysis , 2013, ADKDD '13.

[21]  Paul Barford,et al.  Impression Fraud in On-line Advertising via Pay-Per-View Networks , 2013, USENIX Security Symposium.

[22]  Balachander Krishnamurthy,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .

[23]  Marco Mellia,et al.  The Online Tracking Horde: A View from Passive Measurements , 2015, TMA.

[24]  Abram Hindle,et al.  Green mining: energy consumption of advertisement blocking methods , 2014, GREENS 2014.

[25]  Michalis Faloutsos,et al.  ReSurf: Reconstructing web-surfing activity from network traffic , 2013, 2013 IFIP Networking Conference.

[26]  Michael Walfish,et al.  Verifiable auctions for online ad exchanges , 2013, SIGCOMM.

[27]  Suman Nath,et al.  MAdScope: Characterizing Mobile In-App Targeted Ads , 2015, MobiSys.

[28]  Qiang Ma,et al.  Adscape: harvesting and analyzing online display ads , 2014, WWW.

[29]  Fang Yu,et al.  Knowing your enemy: understanding and detecting malicious web advertising , 2012, CCS '12.

[30]  Balachander Krishnamurthy,et al.  Best paper -- Follow the money: understanding economics of online aggregation and advertising , 2013, Internet Measurement Conference.

[31]  Anja Feldmann,et al.  On dominant characteristics of residential broadband internet traffic , 2009, IMC '09.

[32]  Vyas Sekar,et al.  Understanding website complexity: measurements, metrics, and implications , 2011, IMC '11.

[33]  Y. Charlie Hu,et al.  How much energy can we save from prefetching ads?: energy drain analysis of top 100 apps , 2013, HotPower '13.

[34]  Sagar Naik,et al.  Experimental study of energy and bandwidth costs of web advertisements on smartphones , 2014, 6th International Conference on Mobile Computing, Applications and Services.

[35]  Gianluca Stringhini,et al.  The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements , 2014, Internet Measurement Conference.

[36]  Dan S. Wallach,et al.  An Empirical Study of Mobile Ad Targeting , 2015, ArXiv.

[37]  Saikat Guha,et al.  Challenges in measuring online advertising systems , 2010, IMC '10.

[38]  Georgios Kontaxis,et al.  Tracking Protection in Firefox For Privacy and Performance , 2015, ArXiv.

[39]  Vivek S. Pai,et al.  Towards understanding modern web traffic , 2011, SIGMETRICS '11.