<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=134132097137679&amp;ev=PageView&amp;noscript=1">

SIVT fraud detection: What are hijacked devices, user sessions, ad tags, and ad creative?

Jul 13, 2017 10:55:07 AM

Pixalate is an MRC-accredited company for the detection and filtration of Sophisticated Invalid Traffic ("SIVT") desktop and mobile web impressions.


According to the Media Rating Council’s (MRC) standards for Invalid Traffic Detection and Filtration Guidelines, there are two types of invalid traffic:

  • GIVT (General Invalid Traffic)
  • SIVT (Sophisticated Invalid Traffic)

Several related examples of SIVT include “hijacked devices, user sessions, ad tags, and ad creative.”

What are “hijacked devices, user sessions, ad tags, and ad creative” in the MRC definition of SIVT?

hijacked devices, user sessions, ad tags, and ad creative.jpg

According to the MRC, hijacked devices, hijacked sessions within hijacked devices, hijacked ad tags, and hijacked creative are all forms of SIVT.

Since they all share a common denominator — hijacking — we’re including them in the same post.

One simple example: Malware installed on a mobile device or computer is one means to direct the device into faking legitimate web traffic to a site or app.

Another way to think of this could be illegitimate activity from a legitimate device. In the above example, the mobile device is legitimate (it really is a mobile device), but the malware has “hijacked” the device and is driving illegitimate traffic.

MRC-accredited ad fraud detection and prevention companies must be able to identify and filter out hijacked devices, hijacked sessions within hijacked devices, hijacked ad tags, and hijacked creative.

What are some other examples of SIVT?

Hijacked devices, hijacked sessions within hijacked devices, hijacked ad tags, and hijacked creative are just a few examples of Sophisticated Invalid Traffic (SIVT) as defined by the MRC. To learn about some of the other examples of SIVT, click on any of the examples below:

demo-request-blog-cta

Search Blog

Follow Pixalate

Subscribe to our blog

*By entering your email address and clicking Subscribe, you are agreeing to our Terms of Use and Privacy Policy.

Subscribe to our blog

*By entering your email address and clicking Subscribe, you are agreeing to our Terms of Use and Privacy Policy.