% This is based on the LLNCS.DEM the demonstration file of
% the LaTeX macro package from Springer-Verlag
% for Lecture Notes in Computer Science,
% version 2.4 for LaTeX2e as of 16. April 2010
%
% See http://www.springer.com/computer/lncs/lncs+authors?SGWID=0-40209-0-0-0
% for the full guidelines.
%
\documentclass{llncs}
\usepackage{graphicx}
\begin{document}
\title{The Effects And Dangers Of Online Advertisements}
%
\titlerunning{Hamiltonian Mechanics} % abbreviated title (for running head)
% also used for the TOC unless
% \toctitle is used
%
\author{Mohammed Almokri}
%
\authorrunning{Ivar Ekeland et al.} % abbreviated author list (for running head)
%
%%%% list of authors for the TOC (use if author list has to be modified)
\tocauthor{Ivar Ekeland, Roger Temam, Jeffrey Dean, David Grove,
Craig Chambers, Kim B. Bruce, and Elisa Bertino}
%
\institute{Multimedia University , Jalan Multimedia,63000 Cyberjaya, Selangor, Malaysia\\
\email{Almokri91@hotmail.com}
}
\maketitle % typeset the title of the contribution
\begin{abstract}
• Human life has developed in many aspects since the evolution of computer started. The main function of creating new technologies is to make human life easier. New technologies are being invented everyday which creates limitless opportunities for developers to make use of these technologies to serve a specific purpose or task. The Advertising used to be print paper or TV ads. Today mobile and online video creates new ways to contact with customers. Today Ads are kind of the most popular online advertising market in the world and trading ad spaces over the Internet. Currently the social online ads like Facebook and YouTube have some preferred set of users they wish to reach by showing their ads but some cases force the users to watch their Advertising. Ethan Zuckerman wad created the first pop-up advertising on the web was 15-Aug-2014. The pop-up advertising most using in the pc application and browser, and APPs for smartphone. The small internet windows that pop up on your screen can be useful, annoying or dangerous often used by advertisers to get your attention or by viruses to trick you into clicking on them. This guide gives them basic information about your identity. Some dangerous pop-up can leak your private information like your name, number, credit card member, and etc. In this paper we sum up, all these facts contribute to show how danger the pop-up advertising with developing new pop-up advertising to leak the user identity.
\end{abstract}
%
\section{Danger of on-line advertisements:}
%
Pop-up ads or another ads are always forms of on-line advertising on the “WWW” intended to attract web traffic or get some email addresses. Pop-ups are generally new web browser windows to display advertisements. The pop-up window, containing an advertisement is usually generated by JavaScript using cross-site scripting (XSS). Recently we can use Adobe Fladhbut to secondary payload also be generate by another vulnerabilities/security holes in browser security.\\
A variation on the pop-up window is the pop-under advertisement, which opens a new browser window hidden under the active window. Pop-up doesn’t interrupt the user immediately and are not seen until the covering window is closed, making it more difficult to determine which web site opened them.
%
\begin{itemize}
\item The technology of pop-up ad.\\
Most of pop-up advertising using simple JavaScript. The fighter 1 sow the methodology used in across the web. Most of advertisers use this methodology to create a window in front of the user screen.
\begin{figure}
\centering
\includegraphics[width=0.9\textwidth]{code.jpg}
\caption{\label{fig:code}}
\end{figure}
Modern browser allow this instruction “window.open” which executed only if the user click somewhere in page or non-interactive calls using timer call-back. Load events, etc.
\\
\item Fake close buttons\\
Usually the browser have some unwanted pop up ads. Normally the users respond by dismissing the pop-up through close button or cancel button. Because this is only way to close the ads. Some ads when the user click close or cancel button the ads will create new screen look similar previous ad like fighter2.\\
\begin{figure}
\centering
\includegraphics[width=0.6\textwidth]{virus.png}
\caption{\label{fig:viris}}
\end{figure}
.\\
\item URL redirection\\
EBay has been compromised so that people who clicked on some of its links were automatically diverted to a site designed to steal their cre fighter as fighter 3.
\begin{figure}
\centering
\includegraphics[width=0.7\textwidth]{ebay.jpg}
\caption{\label{fig:ebay}}
\end{figure}
\end{itemize}
%
\subsection{the ways of the attackers: }
%
\begin{itemize}
\item The new reaches say the first way is Sex trafficking to Identify potential victims in online advertisements. The Fighter 4 shows some indicators to get ethnicity and movement which present throughout the advertisement “circled in red”. The attacker easily can take the victim identity throw replaying this advertisement. \\
\begin{figure}
\centering
\includegraphics[width=0.6\textwidth]{123.png}
\caption{\label{fig:123}}
\end{figure}
\end{itemize}
%
\subsection{Methodology: }
%
In this reach we will develop the pup-up advertisements using WordPress software because this software is the most complete free Popups plugin, scroll triggered popups, compatible with social networks, Gravity Forms, Ninja Forms, Contact form 7,Mail.\\\\
There are multiple display filters that can be combined\\
\begin{itemize}
\item Show popup depending on referrer
\item Show popup to logged / non logged users
\item Show or not to mobile, desktop and tablet users
\item Show or not to bots / crawlers like Google
\item Show depending on page template, if page is parent, page name, page type
\item Show depending on post type, post template, post name, post format, post status and post taxonomy
\end{itemize}
First of all we have to create account in this software to go to home page as figure 5 and 6.
\begin{figure}
\centering
\includegraphics[width=0.6\textwidth]{login.JPG}
\caption{\label{fig:login}}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.7\textwidth]{home.JPG}
\caption{\label{fig:home}}
\end{figure}
.\\\\\\\\\\\\
After creating account we should connected with database as fugure7\\
\begin{figure}
\centering
\includegraphics[width=0.7\textwidth]{data.JPG}
\caption{\label{fig:data}}
\end{figure}
New we can design the pup-up advertising prompt from user to fill in his detail. The victim will thought this pup-up from browser also if he doesn’t fill, the pop-up come again. \\\\
%
\subsection{Results}
%
By sending the link of the pup-up ad to anyone by Facebook. When the victim open the link. The pup-up will stick in the victim’s browser and keep asking him to file his information like figure 8.
\begin{figure}
\centering
\includegraphics[width=0.3\textwidth]{adv.jpg}
\caption{\label{fig:adv}}
\end{figure}
Figure 9 showing the actual working of the pup-up
\begin{figure}
\centering
\includegraphics[width=0.4\textwidth]{flow_chart.JPG}
\caption{\label{fig:flow_chart}}
\end{figure}
.\\\\\\\\
When the victims fills the pup-up Ad by their information, all the data will save in the database that we created before. \\\\ Figure 10 shows all the data inside the database which’s all the information victims
\begin{figure}
\centering
\includegraphics[width=0.7\textwidth]{results.JPG}
\caption{\label{fig:results}}
\end{figure}
%
\subsection{Discussion }
%
According to the experiment and result the online advertising can seek your personal information and open unwanted windows but we can avoid the attacker to play unwanted pop-up ads by flowing these steps.
If you are using google chrome browser\\
1-Select Settings from the Chrome menu.\\
2-Click the Advanced Settings click.\\
3-Click the Content Settings button.\\
4-Toggle the Pop-ups option to "do not allow" or select exceptions. \\
If you are using other browser just download "adbloak" to kill all the dangerous ads.
%
\subsection{CONCLUSION}
%
In conclusion the online advertising over the world has many advantages and disadvantages. The advantages are takes your business to a whole new level targeting much more audience. It is also low cost and offers small business to invest in online marketing cutting down in initial cost of marketing. The disadvantages ads also makes your visitors that you are only writing for money, not for the visitors, and you will lose the reader's trust and this study has shed light upon how the pup-up advertising can be dangerous and leek your personal information according to the result of the experiment.Finally don't forget to install "adblock" to your browser to protect you from attacker.\\\\
\begin{thebibliography}{99}
\bibitem{c1} Watters, P. A., Watters, M., Ziegler, J. (2014, November). Malicious Advertising and Music Piracy: A New Zealand Case Study. In Cybercrime and Trustworthy Computing Conference (CTC), 2014 Fifth (pp. 22-29). IEEE.
\bibitem{c2} Sakib, M. N., Huang, C. T. (2015, August). Automated Collection and Analysis of Malware Disseminated via Online Advertising. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 1411-1416). IEEE.
\bibitem{c3}
Ibanez, M., Gazan, R. (2016, August). Virtual indicators of sex trafficking to identify potential victims in online advertisements. In Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on (pp. 818-824). IEEE.
\bibitem{c4} Zhou, M., Niu, C., Zheng, Z., Wu, F., Chen, G. (2015, December). An Efficient, Privacy-Preserving, and Verifiable Online Auction Mechanism for Ad Exchanges. In Global Communications Conference (GLOBECOM), 2015 IEEE (pp. 1-6). IEEE
\end{thebibliography}
\end{document}