What is Click Flooding or Click Spamming?
Click flooding (AKA click spamming) is a case in which networks send large numbers of fraudulent click reports in the hopes of delivering the last-click prior to installs.
How This Works:
The fraudster will try and execute clicks for users who haven’t made them, claiming credit for fake clicks. A fraudulent app could be executing clicks while the user engages with it or even while active in the background (battery savers, launchers etc.). The app could even report impressions as clicks to present false engagement, all of these (and other creative methods) happen without the user’s intent or knowledge as he’s never viewed an actual ad.
Anti-fraud providers such as Protect360 automatically block traffic from click flood sources. To identify a source perpetrating a click flooding attack, look for traffic with long CTIT distribution rates, low click-to-install conversion rates and/or high multi-touch contributor rates (note: this requires multi-touch attribution data).
A helpful general benchmark when examining your own data: about 75% of installs occur during the first hour following a click, and 94% of installs occur within 24 hours following a click. Video ads and large apps often have longer CTIT.
Protect360 automatically detects and blocks all click flooding attempts, reporting responsible sources and associating potential click flooding fraudsters using in-depth data analysis such as multi-touch contribution rates.
The anomaly insights graph gives you the option of further investigating your partner’s performance based on their CTIT rates.
« Back to Glossary Index