Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update USE-CASES.md to include IP Spoofing #10

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions USE-CASES.md
Original file line number Diff line number Diff line change
Expand Up @@ -169,6 +169,9 @@ Attackers seeking private data (e.g. bearer tokens, passwords, form entries, ema
### Domain Spoofing
Domain spoofing (also referred to as Domain Laundering) is a form of Sophisticated Invalid Traffic (SIVT) in which a false representation is made about the domain associated with an ad impression. Two examples are when the domain in the ad request is different from the domain of the actual inventory being supplied or the actual ad is rendered to a different website or application than the one identified in the ad request. (See “False Representation” on page 8 of the Trustworthy Accountability Group (TAG) TAG Invalid Traffic Taxonomy v2.0.)

### IP Spoofing
IP spoofing is a form of Sophisticated Invalid Traffic (SIVT) where aggregate reports of events (such as ad impressions) can be modified to contain IPs that are more trusted than the original IPs, evading IP reputation systems that are built to evaluate these aggregate reports.

## Capabilities

### Motivation
Expand Down