Ad-blocker circumvention System

Slides:



Advertisements
Similar presentations
Overview Environment for Internet database connectivity
Advertisements

1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
1 Software Testing and Quality Assurance Lecture 32 – SWE 205 Course Objective: Basics of Programming Languages & Software Construction Techniques.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
{ Content Distribution Networks ECE544 Dhananjay Makwana Principal Software Engineer, Semandex Networks 5/2/14ECE544.
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Chapter 33 CGI Technology for Dynamic Web Documents There are two alternative forms of retrieving web documents. Instead of retrieving static HTML documents,
Server-side Scripting Powering the webs favourite services.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Dynamic Content On Edge Cache Server (using Microsoft.NET) Name: Aparna Yeddula CS – 522 Semester Project Project URL: cs.uccs.edu/~ayeddula/project.html.
Computer Emergency Notification System (CENS)
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Dynamic web content HTTP and HTML: Berners-Lee’s Basics.
The Intranet.
Department of Computer Science Internet Performance Measurements using Firefox Extensions Scot L. DeDeo Professor Craig Wills.
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
Web Design and Development. World Wide Web  World Wide Web (WWW or W3), collection of globally distributed text and multimedia documents and files 
Web Server.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
Web Systems & Technologies Lecture 1
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Your final site CSS WP Hand- code, using TextEdit, TextWrangler, Dreamweaver or any other wysiwyg editor. Site doesn’t require to be hosted Deliver all.
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
Defining Network Infrastructure and Network Security Lesson 8.
Presented by Michael Rainey South Mississippi Linux Users Group
4.01 How Web Pages Work.
Web fundamentals: Clients, Servers, and Communication
Introduction to Dynamic Web Content
4.01 How Web Pages Work.
The Intranet.
How HTTP Works Made by Manish Kushwaha.
CISC103 Web Development Basics: Web site:
Caching Temporary storage of frequently accessed data (duplicating original data stored somewhere else) Reduces access time/latency for clients Reduces.
Internet and Intranet.
Practical Censorship Evasion Leveraging Content Delivery Networks
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
Introduction Web Environments
Web Caching? Web Caching:.
Processes The most important processes used in Web-based systems and their internal organization.
Introduction to Networking
Utilization of Azure CDN for the large file distribution
Providing Network Services
Internet and Intranet.
6.6 Firewalls Packet Filter (=filtering router)
IS333D: MULTI-TIER APPLICATION DEVELOPMENT
CS222 Web Programming Course Outline
IIS.
Web Design & Development
Configuring Internet-related services
CSE 461 HTTP and the Web.
World Wide Web “WWW”, "Web" or "W3". World Wide Web “WWW”, "Web" or "W3"
Unit 1.4 Wired and Wireless Networks Lesson 3
Internet and Intranet.
Module P3 Practical: Building a webapp in nodejs and
World Wide Web “WWW”, "Web" or "W3". World Wide Web “WWW”, "Web" or "W3"
AbbottLink™ - IP Address Overview
Introduction to World Wide Web
Unit-3.
Computer Networks Primary, Secondary and Root Servers
4.01 How Web Pages Work.
Client-Server Model: Requesting a Web Page
Internet and Intranet.
Presentation transcript:

Ad-blocker circumvention System Synoshur Ad-blocker circumvention System

Ad Blockers work by using one or both of two different methods The first method is to block outbound requests at the local (LAN) network- level. A browser extension can forbid connections to known ad servers, or to any specified host, domain or IP address. Or, instead of a browser extension, outbound requests can be disallowed by any intermediary hardware or software between the requesting client and the Internet, e.g. at a forward proxy, the gateway, a router or switch, etc. The second method is to use JavaScript to manipulate the HTML and/or CSS that specify the Document Object Model (DOM-level) of a Web page. Each page a browser has open is represented by its own DOM. The DOM determines how the page is rendered on screen. Both the JavaScript included within a page, and the JavaScript within a browser extension, have equal abilities to modify the page’s DOM via HTML/CSS manipulations, but neither can alter the other’s JavaScript code.

Synoshur Ad Blocker Circumvention System Consists of Four Major Components End user: Client JavaScript (cross-browser implementation) proactive ad management via stealthy HTML & CSS manipulations Customer: Web Server Middleware (minimal onsite footprint) dynamic HTML rewriting, versions for all major Web server platforms Synoshur Private CDN & API: Proxy & Caching Server cloud-hosted (domestic or global) API, CDN, proxies, caching & DNS Synoshur HQ: In-House Systems Management web front-end to the API, code distribution, customer licensing & analytics

Synoshur uses clever techniques to defeat both blocking methods. The first technique works at the network level and avoids request blocking altogether by simply NOT making requests to any ad servers. For a customer website located at www.example.com, Synoshur would provide a corresponding private CDN server(s) in the cloud using a hostname like cdn.example.com. The customer would have most or all of their static content files served from the CDN, including the most important or most often used resources, like logos & header images, CSS files, etc. While serving HTML pages, all URLs to static files AND all the URLs to ad servers are rewritten to point to the CDN and specific file names are replaced by ID numbers. The CDN is aware of which IDs map to the ads on the page, so for those requests, the CDN fetches ads from the ad servers and forwards them to the client. If an ad blocker denied access to the CDN, it would also be blocking images, CSS, JavaScript files, etc., rendering the website unusable for all ad blocker users. Therefore, blocking at the network level will no longer be an option.

Synoshur uses clever techniques to defeat both blocking methods. For each Web page that displays ads, the customer’s developers will mark each HTML container that holds an ad (typically iframes) using the CSS class “synoshur”. A minimal piece of software called middleware, made available for each of the major Web server platforms, will be added to the servers at or near the end of the of the HTTP response cycle. The middleware scans all outgoing HTML, removes ad containers, then obscures their locations. Much like in the first technique, generic URLs with IDs replace all requests to ad server URLs with requests to the private CDN. Embedded into the page is some encrypted data which the page’s JavaScript will be able to access, but the browser extensions will not. Once again the CDN fetches ads on behalf of the browser and they are returned along with the other static content. After decrypting the embedded data, the browser is able to reconstruct the original structure of the page inserts the ads where they should be. Finally, the page’s JavaScript monitors each ad to detect and reverse any tampering.