IVT Taxonomy (Marketing)

HUMAN measures a variety of signals to determine whether traffic is valid or invalid. Based on these signals, invalid traffic (also known as IVT) is further categorized as General IVT or Sophisticated IVT. In some cases, HUMAN will return additional information about the specific signals that drove our decisioning.

These examples are meant to illustrate some of the differences between IVT types. However, this is only a subset of all possible invalid behaviors and tactics and is not a complete list.

General IVT (GIVT)

Data center

Traffic originating from servers in data centers whose IPs are linked to invalid activity (such as non-human traffic). This traffic usually originates from known data center IPs that are included in an industry list, such as the Trustworthy Accountability Group (TAG) Data Center IP List.

Example: TAG Data Center IP List

Known crawler

A program or automated script that requests web content, but is not malicious and declares itself as non-human through a variety of standard identification mechanisms. These crawlers are usually included in the IAB International Spiders and Bots List.

Example: IAB Spiders and Bots List

Irregular pattern

Traffic that exhibits one or more attributes (e.g., user cookies) associated with known irregular patterns, such as auto-refresh traffic or duplicate clicks.

Example: Throttlers, duplicate or expired clicks

Sophisticated IVT (SIVT)

Automated browsing

A program or automated script that requests web content without user involvement and without declaring itself as a crawler. These programs and scripts are often used for malicious purposes.

Example: Botnets

False representation

A request for content that is different from the actual content being supplied, including requests where the content is rendered to a different website or application, device, or other target (such as geography).

Examples: Spoofed measurement, domain spoofing, emulators masquerading

Undisclosed classification

Invalid traffic that cannot be classified using any of the other categories listed here, or invalid traffic discovered using sensitive techniques that HUMAN cannot disclose.

Examples: Machine learning models, sensitive invalid traffic