{"id":340382,"date":"2025-03-21T17:46:54","date_gmt":"2025-03-21T17:46:54","guid":{"rendered":"https:\/\/integralads.com\/?p=340382"},"modified":"2025-10-20T12:44:25","modified_gmt":"2025-10-20T12:44:25","slug":"iass-multi-tiered-approach-to-combating-ad-fraud","status":"publish","type":"post","link":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/","title":{"rendered":"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"340382\" class=\"elementor elementor-340382\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-4580f99 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"71963\" data-id=\"4580f99\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25f55da\" data-eae-slider=\"22872\" data-id=\"25f55da\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b60c3c8 elementor-widget elementor-widget-text-editor\" data-id=\"b60c3c8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">Ad fraud is sophisticated and purpose-built to avoid detection. Bad actors attempt to identify new vulnerabilities, gaps, and attack vectors every day. The constant evolution of ad fraud requires a connected, multi-stage approach to detect and avoid.<\/span><\/p><p><span style=\"font-weight: 300;\">At IAS, we use a combined, AI-powered approach to detect ad fraud and protect our advertiser and publisher customers:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2841b80 elementor-widget elementor-widget-heading\" data-id=\"2841b80\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Pre-Bid\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5b33d9 elementor-widget elementor-widget-text-editor\" data-id=\"f5b33d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">IAS advertisers are able to apply our fraud pre-bid avoidance segment to their campaigns within their DSPs. Our DSP partners decide whether or not to bid on a given bid request based on their engagement framework with IAS. Our DSP partners share information from the bid request such as URL, app bundle ID, and\/or IP address. Based on our proprietary in-house fraud detection algorithms, we let the DSP know whether or not we would consider the impression to be invalid traffic or \u201cIVT\u201d (i.e., the impression is non-human).<\/span><\/p><p><span style=\"font-weight: 300;\">Some of our DSP partners prefer not to share IP addresses. For these partners, we allow the DSP to check the IP address from the bid request against our list of known IVT IP addresses, and, if the IP address is on the list, advertisers can choose not to bid on the impression.<\/span><\/p><p><span style=\"font-weight: 300;\">In either case, our pre-bid integrations benefit from the large scale of data we process post-bid and allow us to inform DSPs of bad IP addresses or sites.<\/span><\/p><p><span style=\"font-weight: 300;\">Our DSP partners can leverage the <\/span><span style=\"text-decoration: underline;\"><a href=\"https:\/\/iabtechlab.com\/what-is-the-iab-tech-lab-spiders-and-bots-list\/\"><span style=\"font-weight: 300;\">IAB\/ABC International Spiders &amp; Bots List<\/span><\/a><\/span><span style=\"font-weight: 300;\"> to detect and filter non-human traffic based on user agent pre-bid. IAS uses this information in post-bid processing.<\/span><\/p><p><span style=\"font-weight: 300;\">Publishers can also prevent direct campaigns from displaying on fraudulent IPs by leveraging IAS&#8217;s Publisher Optimization product, which allows them to target ads away from impressions labeled as IVT.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef5af24 elementor-widget elementor-widget-heading\" data-id=\"ef5af24\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Post-Bid (prior to ad render)\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-878d1ab elementor-widget elementor-widget-text-editor\" data-id=\"878d1ab\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">Our JavaScript tag is enabled prior to the ad rendering on the page. The tag inspects the page for URL, IP address, user agent, and many more signals not available pre-bid. We then assess if the impression is fraudulent or demonstrates any potential profile of ad fraud. If we determine the impression is fraudulent, we block the ad from rendering or report on the presence of IVT, depending on advertisers\u2019 settings.<\/span><\/p><p><span style=\"font-weight: 300;\">Publishers also use our measurement so they can see the same data we report to our buy-side customers. The difference with our primary publisher tag, however, is that, by design, it does not block ads from rendering during post-bid processing. When publisher monitoring tags are in use, we label impressions as IVT where appropriate so publishers and advertisers can quantify IVT rates, but the creatives are still rendered. Publishers can use our previously mentioned Publisher Optimization service to target ads away from IPs labeled as IVT.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c4e85e elementor-widget elementor-widget-heading\" data-id=\"0c4e85e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Post-Bid (post ad render)\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-860cc77 elementor-widget elementor-widget-text-editor\" data-id=\"860cc77\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">We have developed sophisticated machine learning models that continuously learn across different environments of operation (e.g., open web, mobile, CTV). These models analyze hundreds of signals to detect ad fraud, thereby providing us proactive fraud detection and mitigation capabilities.<\/span><\/p><p><span style=\"font-weight: 300;\">Our extensive machine learning modeling capabilities allow us to detect IVT by analyzing data and activity patterns over time to delineate human behavior vs. non-human behavior mimicking human behavior. Detecting IVT requires analyzing data over time to identify patterns of activity not associated with real people (e.g., devices running 24&#215;7; devices generating excessive volumes of ad requests). Most data that our technology processes comes post-bid via macros and our Firewall, which processes signals from multiple HTTP headers.<\/span><\/p><p><span style=\"font-weight: 300;\">In addition, our Threat Lab, a team of reconnaissance engineers, analyzes the data output by our models to identify emerging fraud schemes. The team researches schemes to determine how they are working and then collaborates with our platform partners to combat those schemes. The recent <\/span><span style=\"text-decoration: underline;\"><a href=\"https:\/\/integralads.com\/insider\/ias-threat-lab-fraud-scheme-fake-android-apps\/\"><span style=\"font-weight: 300;\">Vapor Threat<\/span><\/a><\/span><span style=\"font-weight: 300;\"> scheme identified by our Threat Lab is a prime example of this collaboration, which resulted in the removal of more than a hundred malicious apps from the Google Play Store.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1552c7 elementor-widget elementor-widget-heading\" data-id=\"b1552c7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">The Ad Fraud Detection Flywheel\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65fd96c elementor-widget elementor-widget-text-editor\" data-id=\"65fd96c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 300;\">Our AI-powered approach identifies fraudulent sites and apps by looking at a multitude of signals, including IP addresses, and this information is used to power our pre-bid avoidance technology. We detect fraud at three different stages.\u00a0 Everything we do is connected in a continuous \u201cflywheel\u201d effect. This holistic approach allows us to deliver the industry\u2019s most robust fraud detection and avoidance solution to our clients. We work collaboratively and closely with industry participants to reduce fraud and the proliferation of bad actors by applying our solutions across the 280 billion digital interactions we see daily, and continuously evaluate and innovate our offerings to respond to today\u2019s rapidly changing fraud threats.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ad fraud is sophisticated and purpose-built to avoid detection. Bad actors attempt to identify new vulnerabilities, gaps, and attack vectors every day. The constant evolution of ad fraud requires a connected, multi-stage approach to detect and avoid. At IAS, we&#8230;<\/p>\n","protected":false},"author":59,"featured_media":340383,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[38,846],"tags":[17],"class_list":["post-340382","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ad-fraud","category-products","tag-products"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud - Integral Ad Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud\" \/>\n<meta property=\"og:description\" content=\"Ad fraud is sophisticated and purpose-built to avoid detection. Bad actors attempt to identify new vulnerabilities, gaps, and attack vectors every day. The constant evolution of ad fraud requires a connected, multi-stage approach to detect and avoid. At IAS, we...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"Integral Ad Science\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-21T17:46:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-20T12:44:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"IAS Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@integralads\" \/>\n<meta name=\"twitter:site\" content=\"@integralads\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IAS Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/\"},\"author\":{\"name\":\"IAS Team\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/person\/dbb1eb8d41477c4193f06c013629e755\"},\"headline\":\"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud\",\"datePublished\":\"2025-03-21T17:46:54+00:00\",\"dateModified\":\"2025-10-20T12:44:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/\"},\"wordCount\":773,\"publisher\":{\"@id\":\"https:\/\/integralads.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png\",\"keywords\":[\"Products\"],\"articleSection\":[\"Ad Fraud\",\"Product\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/\",\"url\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/\",\"name\":\"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud - Integral Ad Science\",\"isPartOf\":{\"@id\":\"https:\/\/integralads.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png\",\"datePublished\":\"2025-03-21T17:46:54+00:00\",\"dateModified\":\"2025-10-20T12:44:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage\",\"url\":\"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png\",\"contentUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png\",\"width\":500,\"height\":500,\"caption\":\"IAS's Multi-tiered approach-tileimage\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/integralads.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/integralads.com\/#website\",\"url\":\"https:\/\/integralads.com\/\",\"name\":\"Integral Ad Science\",\"description\":\"The Hidden Cost of MFA Webinar\",\"publisher\":{\"@id\":\"https:\/\/integralads.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/integralads.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/integralads.com\/#organization\",\"name\":\"Integral Ad Science\",\"url\":\"https:\/\/integralads.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png\",\"contentUrl\":\"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png\",\"width\":600,\"height\":600,\"caption\":\"Integral Ad Science\"},\"image\":{\"@id\":\"https:\/\/integralads.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/integralads\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/person\/dbb1eb8d41477c4193f06c013629e755\",\"name\":\"IAS Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/integralads.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g\",\"caption\":\"IAS Team\"},\"url\":\"https:\/\/integralads.com\/insider\/author\/ias-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud - Integral Ad Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/","og_locale":"en_US","og_type":"article","og_title":"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud","og_description":"Ad fraud is sophisticated and purpose-built to avoid detection. Bad actors attempt to identify new vulnerabilities, gaps, and attack vectors every day. The constant evolution of ad fraud requires a connected, multi-stage approach to detect and avoid. At IAS, we...","og_url":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/","og_site_name":"Integral Ad Science","article_published_time":"2025-03-21T17:46:54+00:00","article_modified_time":"2025-10-20T12:44:25+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png","type":"image\/png"}],"author":"IAS Team","twitter_card":"summary_large_image","twitter_creator":"@integralads","twitter_site":"@integralads","twitter_misc":{"Written by":"IAS Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#article","isPartOf":{"@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/"},"author":{"name":"IAS Team","@id":"https:\/\/integralads.com\/#\/schema\/person\/dbb1eb8d41477c4193f06c013629e755"},"headline":"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud","datePublished":"2025-03-21T17:46:54+00:00","dateModified":"2025-10-20T12:44:25+00:00","mainEntityOfPage":{"@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/"},"wordCount":773,"publisher":{"@id":"https:\/\/integralads.com\/#organization"},"image":{"@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png","keywords":["Products"],"articleSection":["Ad Fraud","Product"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/","url":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/","name":"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud - Integral Ad Science","isPartOf":{"@id":"https:\/\/integralads.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage"},"image":{"@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage"},"thumbnailUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png","datePublished":"2025-03-21T17:46:54+00:00","dateModified":"2025-10-20T12:44:25+00:00","breadcrumb":{"@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#primaryimage","url":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png","contentUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/03\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thought-Ldeaership-Blog_Tile.png","width":500,"height":500,"caption":"IAS's Multi-tiered approach-tileimage"},{"@type":"BreadcrumbList","@id":"https:\/\/integralads.com\/insider\/iass-multi-tiered-approach-to-combating-ad-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integralads.com\/"},{"@type":"ListItem","position":2,"name":"IAS\u2019s Multi-Tiered Approach to Combating Ad Fraud"}]},{"@type":"WebSite","@id":"https:\/\/integralads.com\/#website","url":"https:\/\/integralads.com\/","name":"Integral Ad Science","description":"The Hidden Cost of MFA Webinar","publisher":{"@id":"https:\/\/integralads.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integralads.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/integralads.com\/#organization","name":"Integral Ad Science","url":"https:\/\/integralads.com\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/integralads.com\/#\/schema\/logo\/image\/","url":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png","contentUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png","width":600,"height":600,"caption":"Integral Ad Science"},"image":{"@id":"https:\/\/integralads.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/integralads"]},{"@type":"Person","@id":"https:\/\/integralads.com\/#\/schema\/person\/dbb1eb8d41477c4193f06c013629e755","name":"IAS Team","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/integralads.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g","caption":"IAS Team"},"url":"https:\/\/integralads.com\/insider\/author\/ias-team\/"}]}},"_links":{"self":[{"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/posts\/340382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/comments?post=340382"}],"version-history":[{"count":0,"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/posts\/340382\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/media\/340383"}],"wp:attachment":[{"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/media?parent=340382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/categories?post=340382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integralads.com\/wp-json\/wp\/v2\/tags?post=340382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}