TY - GEN
T1 - Priceless
T2 - 2012 ACM Conference on Computer and Communications Security, CCS 2012
AU - McCoy, Damon
AU - Dharmdasani, Hitesh
AU - Kreibich, Christian
AU - Voelker, Geoffrey M.
AU - Savage, Stefan
PY - 2012
Y1 - 2012
N2 - Large-scale abusive advertising is a profit-driven endeavor. Without consumers purchasing spam-advertised Viagra, search-advertised counterfeit software or malware-advertised fake anti-virus, these campaigns could not be economically justified. Thus, in addition to the numerous efforts focused on identifying and blocking individual abusive advertising mechanisms, a parallel research direction has emerged focused on undermining the associated means of monetization: payment networks. In this paper we explain the complex role of payment processing in monetizing the modern affiliate program ecosystem and characterize the dynamics of these banking relationships over two years within the counterfeit pharmaceutical and software sectors. By opportunistically combining our own active purchasing data with contemporary disruption efforts by brand-holders and payment card networks, we gather the first empirical dataset concerning this approach. We discuss how well such payment interventions work, how abusive merchants respond in kind and the role that the payments ecosystem is likely to play in the future.
AB - Large-scale abusive advertising is a profit-driven endeavor. Without consumers purchasing spam-advertised Viagra, search-advertised counterfeit software or malware-advertised fake anti-virus, these campaigns could not be economically justified. Thus, in addition to the numerous efforts focused on identifying and blocking individual abusive advertising mechanisms, a parallel research direction has emerged focused on undermining the associated means of monetization: payment networks. In this paper we explain the complex role of payment processing in monetizing the modern affiliate program ecosystem and characterize the dynamics of these banking relationships over two years within the counterfeit pharmaceutical and software sectors. By opportunistically combining our own active purchasing data with contemporary disruption efforts by brand-holders and payment card networks, we gather the first empirical dataset concerning this approach. We discuss how well such payment interventions work, how abusive merchants respond in kind and the role that the payments ecosystem is likely to play in the future.
KW - Economics
KW - Measurement
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84869463505&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84869463505&partnerID=8YFLogxK
U2 - 10.1145/2382196.2382285
DO - 10.1145/2382196.2382285
M3 - Conference contribution
AN - SCOPUS:84869463505
SN - 9781450316507
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 845
EP - 856
BT - CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security
Y2 - 16 October 2012 through 18 October 2012
ER -