Detecting Anti Ad-blockers in the Wild

Open access

Abstract

The rise of ad-blockers is viewed as an economic threat by online publishers who primarily rely on online advertising to monetize their services. To address this threat, publishers have started to retaliate by employing anti ad-blockers, which scout for ad-block users and react to them by pushing users to whitelist the website or disable ad-blockers altogether. The clash between ad-blockers and anti ad-blockers has resulted in a new arms race on the Web. In this paper, we present an automated machine learning based approach to identify anti ad-blockers that detect and react to ad-block users. The approach is promising with precision of 94.8% and recall of 93.1%. Our automated approach allows us to conduct a large-scale measurement study of anti ad-blockers on Alexa top-100K websites. We identify 686 websites that make visible changes to their page content in response to ad-block detection. We characterize the spectrum of different strategies used by anti ad-blockers. We find that a majority of publishers use fairly simple first-party anti ad-block scripts. However, we also note the use of third-party anti ad-block services that use more sophisticated tactics to detect and respond to ad-blockers.

[1] IAB Internet Advertising Revenue Report. http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_Revenue_FY_2014.pdf, April 2015.

[2] Saikat Guha, Bin Cheng, and Paul Francis. Privad: Practical privacy in online advertising. In NSDI, 2011.

[3] Micah Lee Morgan Marquis-Boire, Glenn Greenwald. NSA’s Google for the World’s Private Communications. https://theintercept.com/2015/07/01/nsas-google-worlds-private-communications/.

[4] Steven Englehardt and Arvind Narayanan. Online tracking: A 1-million-site measurement and analysis. In ACM Conference on Computer and Communications Security (CCS). ACM, 2016.

[5] Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. In ACM Internet Measurement Conference (IMC), 2014.

[6] Daniel G Goldstein, R Preston McAfee, and Siddharth Suri. The Cost of Annoying Ads. In WWW, 2013.

[7] AdBlock Plus. https://adblockplus.org.

[8] Matthew Malloy, Mark McNamara, Aaron Cahn, and Paul Barford. Ad blockers: Global prevalence and impact. In ACM Internet Measurement Conference (IMC), 2016.

[9] Enric Pujol, Oliver Hohlfeld, and Anja Feldmann. Annoyed Users: Ads and Ad-Block Usage in the Wild. In ACM Internet Measurement Conference (IMC), 2015.

[10] 2015 Adblocking Report. The PageFair Team. https://blog.pagefair.com/2015/ad-blocking-report.

[11] 2016 Mobile Adblocking Report. The PageFair Team. https://blog.pagefair.com/2015/ad-blocking-report, 2016.

[12] Allowing acceptable ads in adblock plus. https://adblockplus.org/acceptable-ads, Nov 2015.

[13] Jared Newman. Yahoo Mail begins blocking users with ad block enabled. http://www.pcworld.com/article/3006981/data-center-cloud/yahoo-mail-begins-blocking-users-with-ad-block-enabled.html.

[14] Jeremy Barr. Checking in on Wired’s Ad-Blocking Experiment, Including an Ad-Free Version. http://adage.com/article/media/checking-wired-magazine-s-ad-blocking-experiment/303795/, 2016.

[15] Martin Anderson. Sites that block adblockers seem to be suffering. https://thestack.com/world/2016/04/21/sites-that-block-adblockers-seem-to-be-suffering/, 2016.

[16] M Zubair Rafique, Tom Van Goethem, Wouter Joosen, Christophe Huygens, and Nick Nikiforakis. It’s free for a reason: Exploring the ecosystem of free live streaming services. In Proceedings of the 23rd Network and Distributed System Security Symposium (NDSS), 2016.

[17] Rishab Nithyanand, Sheharbano Khattak, Mobin Javed, Narseo Vallina-Rodriguez, Marjan Falahrastegar, Julia E. Powles, Emiliano De Cristofaro, Hamed Haddadi, and Steven J. Murdoch. Ad-Blocking and Counter Blocking: A Slice of the Arms Race. In 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2016.

[18] Leo Kelion. Apple brings ad-blocker extensions to Safari on iPhones. http://www.bbc.com/news/technology-34173732, September 2015.

[19] Ghostery. https://www.ghostery.com.

[22] IAB. Ad Block Detection Code Access Request. https://www.iab.com/ad-block-detection-code-access-request/, 2016.

[23] Franziska Roesner, Tadayoshi Kohno, and David Wetherall. Detecting and Defending Against Third-Party Tracking on the Web. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2012.

[24] Hassan Metwalley, Stefano Traverso, Marco Mellia, Stanislav Miskovic, and Mario Baldi. The Online Tracking Horde: A View from Passive Measurements. In Traffic Monitoring and Analysis. 2015.

[25] Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In Proceedings of USENIX Security, 2016.

[26] Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, and XiaoFeng Wang. Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising. In ACM CCS, 2012.

[27] Robert J Walls, Eric D Kilmer, Nathaniel Lageman, and Patrick D McDaniel. Measuring the impact and perception of acceptable advertisements. In ACM Internet Measurement Conference (IMC), 2015.

[28] David Gugelmann, Markus Happe, Bernhard Ager, and Vincent Lenders. An Automated Approach for Complementing Ad Blockers’ Blacklists. Privacy Enhancing Technologies (PETS), 2015(2):282–298, 2015.

[29] S. Afroz and R. Greenstadt. Phishzoo: Detecting phishing websites by looking at them. In 2011 IEEE Fifth International Conference on Semantic Computing, 2011.

[30] M. Dunlop, S. Groat, and D. Shelly. Goldphish: Using images for content-based phishing analysis. In 2010 Fifth International Conference on Internet Monitoring and Protection, 2010.

[32] W3C DOM4. W3C Recommendation 19 November 2015. http://www.w3.org/TR/dom/#mutationobserver.

[35] T. Mitchell. Machine Learning. Mc-Graw-Hill, 1997.

[36] Other Supplementary Filter Lists and EasyList Variants. https://easylist.to/pages/other-supplementary-filter-lists-and-easylist-variants.html.

[37] V8 JavaScript Engine. https://code.google.com/p/v8/.

[38] Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, and Christian Seifert. ZOZZLE: Fast and Precise In-Browser JavaScript Malware Detection. In USENIX Security Symposium, 2011.

[39] Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, and Giovanni Vigna. Revolver: An Automated Approach to the Detection of Evasive Webbased Malware. In USENIX Security Symposium, 2013.

[40] Esprima Javascript Parser. http://esprima.org.

Journal Information

Metrics

All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 206 206 29
PDF Downloads 100 100 25