From The Video Description: We are going to introduce you to the world of cloaking: how it evolved from simple IP filtering to the sophisticated platforms used for fraud and bot detection.
Web cloaking is a technique used to circumvent the automatic content analysis systems used by major ad networks and content providers. Cloaking systems are used by those trying to publish content that would otherwise be blocked by content providers. Examples vary from regulated industries like pornography or cryptocurrencies to malware-distributing websites and political propaganda.
You will learn about the demand for services offering moderation circumvention, the levels of sophistication for various players in the market, and what can be done to defeat web cloaking successfully. We will discuss our adventures of buying the most advanced web cloaking service and thoroughly dissecting it. Ilya works with user-generated content platforms and Sergey works on web traffic automation detection. We will discuss how much web cloaking has in common with modern fraud and automated detection systems.
We will go over web cloaking campaign survival time (some systems advertise their services lasting up to 3 months); the techniques developers use to achieve these numbers; and strategies they use to stay undetected for so long.
We will conclude by overviewing existing methodologies used to minimize the negative effects of web cloaking and suggest new defense mechanisms. – via ZeroNights 2018 and Ilya Nesterov’s & Sergey Shekyan’s Unveiling The Cloak: A Look At What Happens When You Click That Link‘
*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/GS6VLlgIG4E