Voluum Documentation

(Beta version) Best Practices

Voluum TRK  Anti Fraud Kit Beta Version Best Practices

Thanks to Anti-Fraud Kit you now have different tools at your disposal. You know where to find them and what do they do. But you still might have some questions: 

  • How many suspicious visits is too many?

  • Should you wait for some time or act immediately?

  • When a fast app installation becomes too fast?

  • What can I do?

Unfortunately, we cannot offer you straight answers to those questions. But we can offer you a set of best practices that can be a basis for finding your own answers to the questions above.

Table of Contents
I. Know

When you start using the Anti-Fraud Kit feature most probably you will notice a certain level of suspicious traffic in your campaign funnel on a general level. Before digging into more detailed reports think about your audience and try to evaluate, what metric values you should expect:

  • Do you expect a lot of traffic coming from VPN services? In that case the Known data centers metric might flag a lot of traffic you expect and want.

  • Do you advertise on websites considered to be of poor reputation? In that case the Badly ranked websites metric may not be of use for you.

  • Do you know that there might be some content scanning programs on web pages that you advertise on (PHP, Java, or other)? in that case the User agent - Library robots metric will flag those non-malicious robots.

  • Does your application requires large amounts of data to download? In that case, Time-To-Install metrics might not accurately show outliers, as most install times will shift towards the High TTI threshold.

All this is a matter of your expertise. Maybe you will come to a conclusion that you can disable certain metrics. Or that you will always see some part of your traffic marked as suspicious.

After this step it is time to go deeper and try to locate exact sources of the suspicious traffic.

II. Locate

To identify the source of your suspicious traffic, create a specific report for a campaign element with the most suspicious traffic or a significant amount of app installs below the Low TTI threshold. Then drill-down into data. The aim is to identify one single category for which an amount of invalid traffic is significantly higher than for other categories.

Categories:

This categories include, but are not limited to:

  • Countries

  • ISPs

  • Device types

  • IP addresses.

Create a specific report and drill-down into elements with the most suspicious traffic.

Example 6. In the below example, a specific report was created:
ivt_drilldown.png

Note that AADIX ISP generates over 60% of suspicious clicks with no conversions. You can use a rule-based path to redirect all traffic using this ISP outside your campaign funnel.



Reports:

Creating reports is a science in its own rights. Find below a few very short guidelines of how to find some information in Voluum Reports

  • To find IP addresses: Click a campaign that you want to check IP addresses for and click the Report button. The specific campaign report will open in a separate tab. Go to the IP category to see IP addresses responsible for visits and clicks in a set time range.

  • To drill-down into data: Go to any global category and click the category element (such as campaign, offer, traffic source, country or other). Click the Report button to create a specific report, that will be opened in a separate tab.

The point of this step is to learn what is the cause behind suspicious traffic in your campaign funnels. Use Voluum's extensive reporting options to locate the source. When located, you will be able to perform some actions to stop this traffic.

III. Act

After pinpointing the source of the suspicious traffic there are several actions you might take to eliminate it from your funnels.

Stop suspicious traffic in your traffic source platform

Go to your traffic source platform. Depending on the traffic options they provide, try to exclude this sources from buying (apart from IP address, which you can block in Voluum). This is the best solution, as it not only will eliminate suspicious traffic from your funnels, but at the same time will save you money that you were spending on it.

Redirect suspicious traffic in Voluum

If you have trouble with excluding sources of suspicious traffic that you have located in Voluum, you can try to use Rule-based paths to redirect this traffic outside your funnels. Rule-base paths give you plenty of options to redirect traffic to specific offers based on traffic characteristics, such as country or a device type. If you use located source of suspicious traffic as a rule in the Rule-based path, you will be able to redirect this traffic to a dummy offer.

You will still pay for this traffic, but at least it will not skew your stats and damage your reputation in an affiliate network platform.

Block suspicious traffic in Voluum based on IP or UA ranges

Voluum reports give you the option to identify IP addresses that are behind visits and clicks for a specific campaign. If you have located certain IP addresses or IP ranges that are responsible for suspicious traffic, you can block them from coming into Voluum. You can also block traffic based on User Agent info.

Stop suspicious traffic on you landing page

There are several ways to filter non-human traffic on your landing page. They all require advanced skills from your side, so they are recommended only to experienced users. 

  • Include an invisible click URL on your landing page that leads to a dummy offer (so called "honeypot"). Pasting a click URL at the top of your landing page that is invisible to a visitor, might cause that malicious website scanning programs will click this link instead of a real one. This will protect both your stats and your reputation in your affiliate network platform.

  • Consider using captcha-type solutions on a pre-landing page. This one is tricky because this might deter real user from clicking on your offers and you have to balance your problems with the invalid traffic with a potential loss of conversions.

Create a traffic log and analyze your data more thoroughly

Creating a traffic log gives you an opportunity to analyze raw visit data to learn more about suspicious visits that have occurred.

Search results

    No results found