Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2815675.2815705acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Annoyed Users: Ads and Ad-Block Usage in the Wild

Published: 28 October 2015 Publication History

Abstract

Content and services which are offered for free on the Internet are primarily monetized through online advertisement. This business model relies on the implicit agreement between content providers and users where viewing ads is the price for the "free" content. This status quo is not acceptable to all users, however, as manifested by the rise of ad-blocking plugins which are available for all popular Web browsers. Indeed, ad-blockers have the potential to substantially disrupt the widely established business model of "free" content, currently one of the core elements on which the Web is built.
In this work, we shed light on how users interact with ads. We show how to leverage the functionality of AdBlock Plus, one of the most popular ad-blockers to identify ad traffic from passive network measurements. We complement previous work, which focuses on active measurements, by characterizing ad-traffic in the wild, i.e., as seen in a residential broadband network of a major European ISP. Finally, we assess the prevalence of ad-blockers in this particular network and discuss possible implications for content providers and ISPs.

References

[1]
https://easylist-downloads.adblockplus.org/easylist.txt.
[2]
https://easylist-downloads.adblockplus.org/easyprivacy.txt.
[3]
Acceptable Ads Manifesto. https://acceptableads.org/en/.
[4]
Adblock Plus Filters Explained. hhttps://adblockplus.org/en/filter-cheatsheet.
[5]
Allowing Acceptable Ads in Adblock Plus. https://adblockplus.org/en/acceptable-ads.
[6]
Amazon, Google and Microsoft Escape Adblock Plus, for a Price. http://www.engadget.com/2015/02/03/amazon-google-microsoft-adblock-plus/.
[7]
Display LUMAscape. http://www.lumapartners.com/lumascapes/display-ad-tech-lumascape/.
[8]
DoubleClick Nearing Privacy Settlements. http://news.cnet.com/2100-1023-871654.html.
[9]
EasyList Statistics: August 2011. https://easylist.adblockplus.org/blog/2011/09/01/easylist-statistics:-august-2011.
[10]
Electronic Frontier Foundation's Privacy Badger. https://www.eff.org/privacybadger.
[11]
Emulex Endace DAG technology. http://www.emulex.com/.
[12]
EU Carriers Plan to Block Ads, Demand Money from Google. http://arstechnica.com/business/2015/05/eu-carriers-plan-to-block-ads-demand-money-from-google/.
[13]
FTC Staff Report: Self-regulatory Principles for Online Behavioral Advertising. www.ftc.gov/opa/2009/02/behavad.shtm.
[14]
Google AdExchange. http://developers.google.com/ad-exchange/rtb/getting_started.
[15]
Google Chrome Store AdBlock Plus Statistics. https://chrome.google.com/webstore/detail/adblock-plus/cfhdojbkjhnklbpkdaibdccddilifddb.
[16]
libadblockplus: A C++ Library Offering the Core Functionality of Adblock Plus. https://github.com/adblockplus/libadblockplus.
[17]
Most Popular Extensions :: Add-ons for Firefox. ttps://addons.mozilla.org/en-us/firefox/extensions/?sort=users.
[18]
Mozilla AdBlock Plus Statistics. https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/statistics/usage/?last=30.
[19]
Publishers Watch Closely as Adoption of Ad Blocking Tech Grows. http://adage.com/article/digital/adoption-ad-blocking-tech-grows/297101/.
[20]
Selenium: Web Browser Automation. seleniumhq.org.
[21]
Writing Adblock Plus Filters. https://adblockplus.org/en/filters.
[22]
Abdurhnam Albasir, Kshirasagar Naik, Bernard Plourde, and Nishith Goel. Experimental Study of Energy and Bandwidth Costs of Web Advertisements on Smartphones. In IEEE MobiCASE, 2014.
[23]
Sebastian Angel and Michael Walfish. Verifiable Auctions for Online Ad Exchanges. In ACM SIGCOMM, 2013.
[24]
Rebecca Balebako, Pedro Leon, Richard Shay, Blase Ur, Yang Wang, and L. Cranor. Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising. In IEEE W2SP, 2012.
[25]
Paul Barford, Igor Canadi, Darja Krushevskaja, Qiang Ma, and S. Muthukrishnan. Adscape: Harvesting and Analyzing Online Display Ads. In WWW, 2014.
[26]
Theodore Book and Dan S Wallach. An Empirical Study of Mobile Ad Targeting. arXiv 1502.06577, 2015.
[27]
Michael Butkiewicz, Harsha V. Madhyastha, and Vyas Sekar. Understanding Website Complexity: Measurements, Metrics, and Implications. In ACM IMC, 2011.
[28]
Xiaomeng Chen, Abhilash Jindal, and Y. Charlie Hu. How Much Energy Can We Save From Prefetching Ads?: Energy Drain Analysis of Top 100 Apps. In ACM HotPower, 2013.
[29]
S. D'Ambrosio, S. De Pasquale, G. Iannone, D. Malandrino, A. Negro, G. Patimo, A. Petta, V. Scarano, L. Serra, and R. Spinelli. Mobile Phone Batteries Draining: Is Green Web Browsing the Solution? In IEEE IGCC, 2014.
[30]
Amit Datta, Michael Carl Tschantz, and Anupam Datta. Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. IEEE PETS, 2014.
[31]
Ayman Farahat and Michael C Bailey. How Effective is Targeted Advertising? In WWW, 2012.
[32]
Phillipa Gill, Vijay Erramilli, Augustin Chaintreau, Balachander Krishnamurthy, Konstantina Papagiannaki, and Pablo Rodríguez. Follow the Money: Understanding Economics of Online Aggregation and Advertising. In ACM IMC, 2013.
[33]
David Gugelmann, Markus Happe, Bernhard Ager, and Vincent Lenders. An Automated Approach for Complementing Ad Blockers Blacklists. In IEEE PETS, Jul 2015.
[34]
Saikat Guha, Bin Cheng, and Paul Francis. Challenges in Measuring Online Advertising Systems. In ACM IMC, 2010.
[35]
Saikat Guha, Bin Cheng, and Paul Francis. Privad: Practical Privacy in Online Advertising. In USENIX NSDI, 2011.
[36]
Hamed Haddadi, Pan Hui, Tristan Henderson, and Ian Brown. Targeted Advertising on the Handset: Privacy and Security Challenges. In Pervasive Advertising, pages 119--137. 2011.
[37]
Michaela Hardt and Suman Nath. Privacy-aware Personalization for Mobile Advertising. In ACM CCS, 2012.
[38]
Sunghwan Ihm and Vivek S. Pai. Towards Understanding Modern Web Traffic. In ACM IMC, 2011.
[39]
Georgios Kontaxis and Monica Chew. Tracking Protection in Firefox for Privacy and Performance. arXiv 1506.04104, 2015.
[40]
Aleksandra Korolova. Privacy Violations Using Microtargeted Ads: A Case Study. In IEEE PADM, 2010.
[41]
Balachander Krishnamurthy and Craig Wills. Privacy Diffusion on the Web: A Longitudinal Perspective. In WWW, 2009.
[42]
Balachander Krishnamurthy and Craig E. Wills. Cat and Mouse: Content Delivery Tradeoffs in Web Access. In WWW, 2006.
[43]
Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, and XiaoFeng Wang. Knowing Your Enemy: Understanding and Detecting Malicious Web Advertising. In ACM CCS, 2012.
[44]
Gregor Maier, Anja Feldmann, Vern Paxson, and Mark Allman. On Dominant Characteristics of Residential Broadband Internet Traffic. In ACM IMC, 2009.
[45]
Gregor Maier, Fabian Schneider, and Anja Feldmann. NAT Usage in Residential Broadband Networks. In PAM, 2011.
[46]
Hassan Metwalley, Stefano Traverso, Marco Mellia, Stanislav Miskovic, and Mario Baldi. The Online Tracking Horde: A View From Passive Measurements. In Traffic Monitoring and Analysis, 2015.
[47]
Suman Nath. MAdScope: Characterizing Mobile In-App Targeted Ads. In ACM MobiSys, 2015.
[48]
Vern Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23--24):2435--2463, 1999.
[49]
Enric Pujol, Philipp Richter, Balakrishnan Chandrasekaran, Georgios Smaragdakis, Anja Feldmann, Bruce Maggs, and K. C. Ng. Back-Office Web traffic on the Internet. In ACM IMC, 2014.
[50]
Kent Rasmussen, Alex Wilson, and Abram Hindle. Green Mining: Energy Consumption of Advertisement Blocking Methods. In ACM GREENS, 2014.
[51]
Philipp Richter, Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann, and Walter Willinger. Distilling the Internet's Application Mix from Packet-Sampled Traffic. In PAM, 2015.
[52]
Fabian Schneider, Bernhard Ager, Gregor Maier, Anja Feldmann, and Steve Uhlig. Pitfalls in HTTP Traffic Measurements and Analysis. In PAM, 2012.
[53]
Kevin Springborn and Paul Barford. Impression Fraud in Online Advertising via Pay-Per-View Networks. In USENIX Security, 2013.
[54]
Brett Stone-Gross, Ryan Stevens, Apostolis Zarras, Richard Kemmerer, Chris Kruegel, and Giovanni Vigna. Understanding Fraudulent Activities in Online Ad Exchanges. In ACM IMC, 2011.
[55]
Narseo Vallina-Rodríguez, Jay Shah, Alessandro Finamore, Yan Grunenberger, Konstantina Papagiannaki, Hamed Haddadi, and Jon Crowcroft. Breaking for Commercials: Characterizing Mobile Advertising. In ACM IMC, 2012.
[56]
Guowu Xie, Marios Iliofotou, Thomas Karagiannis, Michalis Faloutsos, and Yaohui Jin. Resurf: Reconstructing Web-Surfing Activity from Network Traffic. In IEEE IFIP, 2013.
[57]
Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. Understanding Malvertising Through Ad-Injecting Browser Extensions. In WWW, 2015.
[58]
Shuai Yuan, Jun Wang, and Xiaoxue Zhao. Real-Time Bidding for Online Advertising: Measurement and Analysis. In ACM ADKDD, 2013.
[59]
Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. In ACM IMC, 2014.

Cited By

View all
  • (2024)Re-Identification Attacks against the Topics APIACM Transactions on the Web10.1145/367540018:3(1-24)Online publication date: 27-Jun-2024
  • (2024)Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript BundlesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690262(2192-2206)Online publication date: 2-Dec-2024
  • (2024)From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser ExtensionsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657028(1753-1769)Online publication date: 1-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IMC '15: Proceedings of the 2015 Internet Measurement Conference
October 2015
550 pages
ISBN:9781450338486
DOI:10.1145/2815675
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 October 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adblock plus
  2. advertising
  3. residential broadband traffic
  4. web

Qualifiers

  • Research-article

Conference

IMC '15
Sponsor:
IMC '15: Internet Measurement Conference
October 28 - 30, 2015
Tokyo, Japan

Acceptance Rates

IMC '15 Paper Acceptance Rate 31 of 96 submissions, 32%;
Overall Acceptance Rate 277 of 1,083 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)131
  • Downloads (Last 6 weeks)11
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Re-Identification Attacks against the Topics APIACM Transactions on the Web10.1145/367540018:3(1-24)Online publication date: 27-Jun-2024
  • (2024)Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript BundlesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690262(2192-2206)Online publication date: 2-Dec-2024
  • (2024)From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser ExtensionsProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3657028(1753-1769)Online publication date: 1-Jul-2024
  • (2024)Cross-Country Examination of People’s Experience with Targeted Advertising on Social MediaExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3650780(1-10)Online publication date: 11-May-2024
  • (2024)Detecting Generated Native Ads in Conversational SearchCompanion Proceedings of the ACM Web Conference 202410.1145/3589335.3651489(722-725)Online publication date: 13-May-2024
  • (2023)Online Ads Annoyance Factors: A Survey of Computer Science StudentsOnline Advertising [Working Title]10.5772/intechopen.110169Online publication date: 23-Feb-2023
  • (2023)Effective Techniques for Protecting the Privacy of Web UsersApplied Sciences10.3390/app1305319113:5(3191)Online publication date: 2-Mar-2023
  • (2023)The Drivers and Consequences of Ad Blocking: A Self-Filtering Mechanism That Increases Ad EffectivenessJournal of Interactive Marketing10.1177/1094996823118050059:1(59-75)Online publication date: 7-Aug-2023
  • (2023)A First Look at the Privacy Harms of the Public Suffix ListProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624836(383-390)Online publication date: 24-Oct-2023
  • (2023)Assessing Technology Innovation of Mobile Health Apps for Medical Care ProvidersIEEE Transactions on Engineering Management10.1109/TEM.2022.314261970:8(2809-2826)Online publication date: Aug-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media