473,856 Members | 1,510 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Effective method against internet bots: How Kaminari Click technology optimizes Kadam's advertising campaigns

In today's digital world, where internet traffic volume and its quality play a key role in the success of advertising campaigns, it's important to ensure protection against malicious actions, such as internet bots. Kaminari Click technology represents a cutting-edge tool in this fight, allowing advertisers to effectively filter traffic and improve the outcomes of their campaigns.

Let's examine the mechanics of our solution based on data obtained from the Kadam advertising network.

Continuous Monitoring and Traffic Analysis

The key aspect of the technology is our solution's ability to constantly monitor. Every 15 minutes, Kadam conducts checks based on a specific set of conditions using data collected by our system, totaling 1440 checks a day. This not only allows for the prompt identification and exclusion of undesirable segments of Kadam's traffic but also maintains the overall quality at a high level.

The IVT (Invalid Traffic) metric remains within 2-3%. This indicates a consistently low level of bots within the total traffic volume, thanks to the use of Kaminari. It's important to note that advertisers do not incur financial losses for clicks identified as bot-generated, which contributes to higher traffic quality.

Active Filtering of Kadam Sources

Each month, about 33,000 traffic segments are blocked using Kaminari Click, an important part of the strategy to ensure its purity. The filtering is conducted based on detailed analysis of sources through various Kadam transmitted tags (sub1-sub10), allowing for the effective exclusion of low-quality and potentially fraud elements.

Percentages of bots by GEO and verticals for January - February 2024

Verticals. Statistics on the percentage of bots

Verticals. Statistics with positive dynamics

Statistics by GEO with the highest percentage of bots

Statistics by GEO with positive dynamics

Percentages of bots by GEO and verticals December 2023 - February 2024

The analysis of verticals and geographic distribution of bots shows that, thanks to Kaminari, their share can be significantly reduced in certain segments. For example, in the "Crypto" vertical, the percentage of bots decreased from 7% to 3.4% over three months. This demonstrates the system's effectiveness under various conditions and at different levels of threat.

Statistics for "Crypto" by month, showing that the percentage of bots decreased nearly threefold (changes in other verticals are insignificant):

We also observe the dynamics by month

As an example, we will mention Vietnam and the USA – for them, the percentage of bots decreased over this period:



Example case of traffic source optimization using SSP

In March 2024, the Kadam advertising network conducted a test launch of two platforms to compare click prices (SSP): 2412 Junnify_CU_cpcF and 2413 Junnify_CU_cpcF _adult. In the initial testing phase, platform 2412 recorded about 40% bot clicks, while platform 2413 reached 50%. Using the Kaminari system, sources generating unwanted traffic were identified and blocked. After compiling and providing a report to the partners (SSP), they took measures to exclude problematic sources on their end, leading to a significant improvement in traffic quality subsequently.

As a result, an investment of only $5 for testing quickly identified and eliminated sources of bot traffic, leaving only high-quality sources in the Kadam advertising campaign.

The process of requesting a refund from SSP

There was a case when, after detecting the provision of bot traffic by one of the SSP platforms, a report highlighting the problematic sources was formed and presented using data collected by Kaminari. Subsequently, a request for a refund was sent to compensate the advertisers for their losses.

It's important to emphasize that in such situations, it's preferable to refer to SSP platforms as "partners" to avoid disclosing confidential information.

Note on the dynamics of bot traffic

It is noted that the percentage of bots in the total volume of traffic remains relatively stable over different months. This is due to the strategy of combating bots, which includes careful selection and blocking of suspicious traffic segments. Measures are taken to minimize the impact on the quality of Kadam's traffic, allowing its volume to be maintained at an appropriate level.


The Kaminari Click technology proves its effectiveness in combating internet bots, providing Kadam with quality and clean traffic. Continuous monitoring, analytics, and prompt response to threats not only reduce risks but also optimize advertising campaign costs, making them more effective and economically advantageous.
4 Weeks Ago #1
0 106

Sign in to post your reply or Sign up for a free account.

Similar topics

by: Jim Hubbard | last post by:
By one-click deployment I mean the ability to click on an EXE located on a server (internet or intranet) and run it locally. Due to the default restrictions placed on such code (no file manipulation, no registry manipulation, etc.) what can you accomplish with the code (other than reading and writing to non-local databases)? Almost all functional code requires access to the local file system. I think that most software publishers will...
by: news.btinternnet.com | last post by:
I can do this in IE myLink.click(); //Invoking the handler as if the user had clicked on the link themselves. I need to be able to do the same in Netscape Navigator, can anyone help ?
by: Jim Witt | last post by:
Ref: Win2000, .NET 1.1 I want to place series of buttons on a form, my own button class. Would like to create descriptor array to describe buttons - each needs: text, x and y position, and method invoked when button clicked. I've been able to create descriptor with 'text, x, y' just fine (no brainer). However, I designate button click method as follows: this.button.Click += System.EventHandler(MyMethod);
by: pradeep_TP | last post by:
I am facing a strange problem with my web site. Afer reinstalling the web application on the web server, I am getting a dialog box for each page. The dialog box has the following information. "This page contains both secure and nonsecure items. Do you want to display the nonsecure items." It was not happening before. I have searched in internet for removing the dialog box. This is the solution that I got
by: Jaime Stuardo | last post by:
i all, I have a web service in a Windows 2003 Server machine and ASP.NET 2.0. The website has windows integrated security so that, in order to allow domain users to connect to it, I add permissions using Front Page Server extensions. What about calling the web service over the Internet? do I need to create a special account on the machine and allow access to the website? Do you have an example of calling a web service under these...
by: DBC User | last post by:
I have a static class with bunch of static methods. That is my common routines used spratically across the programs. I am wondering which is the best coding and performance wise good standard. Try to put the required methods in a class and use the class or keep the static on most commonly used methods? Thanks.
by: pemigh | last post by:
I've seen several problems cropping up on computers with Internet Explorer 7. The oddest so far: Shortcuts to .mdb files fail silently when another user on the network has the file open. The more typical manifestation of the problem: You try to open a Microsoft Access file that resides on a different computer, and are told: 'Microsoft Access cannot open this file.
by: sheldonlg | last post by:
My customer (a web site company) has a client that wanted a web site which provides easy access to thousands of web sites for travel in the south pacific. I created that site. Now that client wants this to be a subscription service. I have advised my customer that this client might possibly get one or two subscriptions -- if that many. The proper business model, in my estimation, is to be paid by the target web sites on a pay per...
by: =?Utf-8?B?Si5MLg==?= | last post by:
I am unable to access the internet when I click on internet explorer. The Internet Properties window appears only. I click on OK and then attempt to access the internet again by clicking on the internet explorer icon which is now a globe rather than the e icon as it was before the update took place. But what is strange is that I have been able to connect to this microsoft help site so the explorer is working but not by clicking on the...
by: lostinaccess | last post by:
I'm building an access database for a mortgage portfolio. Our properties can have prior mortgage charges against specific properties. I've created an "add charge" & "view charge" button in one of my subforms. "Add charge" obviously opens up a new dialogue box and allows you to input a mortgage against a property and register it. I want the "view charge" button to open a query (that is already built) to search for the property in the...
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.