Feeds

AVG fake traffic spares Google AdWords

You may pay. But not for clicks

Using blade systems to cut costs and sharpen efficiencies

Yes, AVG's LinkScanner is spewing fake traffic across the internet, messing with the log files and bandwidth budgets of web sites large and small. But there's one thing it doesn't mess with: search engine paid clicks.

Used by roughly 20 million people worldwide - and counting - AVG's new security tool scans search engine results before you click on them. If you type a keyword into Google, for instance, it automatically visits each site that turns up on Google's results page.

That includes sites that appear as "sponsored links" - a clever name for adverts. And in the wake of our recent AVG-annoys-webmasters story, many assumed the scanner was generating not only fake web traffic but also fake ad clicks, forcing advertisers to pay for eyeballs they aren't really getting.

But in scanning sponsored sites, AVG is careful to bypass the Google mechanism that records paid clicks. Rather than use Google's hyperlink, it uses the site's raw URL. "We parse out the target and go straight there, skipping any Google click counter," says Pat Bitton, head of communications at AVG, a Czech company with regional offices in the US and the UK.

And according to Bitton, this has been the case since AVG paired LinkScanner with its anti-virus engine in late February.

Ghost dancer

But sponsored sites - like other sites that frequently turn up on search result pages - are still plagued by the fake traffic problem. When it scans, LinkScanner does its best to disguise itself as an actual user. The average webmaster may have no idea the tool is skewing his traffic numbers, and in the long run, that too can damage a site's bottom line.

At the moment, webmasters can weed out this fake traffic by filtering a specific user agent from their log files: "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;1813)." AVG insists this will not affect legitimate traffic.

"[With a real user click], the user agent does not show with 1813. It will use the standard browser agent because the browser still handles those requests," says AVG CTO Karel Obluk. "Our traffic to scan and the user traffic from the browser are completely separate."

But during an interview last week, chief of research Roger Thompson - who designed the AVG LinkScanner - indicated he may do away with that unique user agent. His chief concern is security, and he doesn't want webmasters or malware writers gaming his scanner. "In order to detect the really tricky - and by association, the most important - malicious content, we need to look just like a browser driven by a human being," he argues.

That said, AVG has also promised to explore alternative solutions to the problem. A fix could arrive as early as this week.

But there's one problem the company can't solve without bagging LinkScanner entirely. Some webmasters complain that the scanner forces them to pay for extra bandwidth. And this problem will only grow. AVG's anti-virus engine is used by a total of 70 million people worldwide, and 50 million have yet to install version 8 - the version that comes with LinkScanner. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.