Detecting Stealth Web Pages That Use Click-Through Cloaking

作者: Yi-Min Wang , Ming Ma

DOI:

关键词:

摘要: Search spam is an attack on search engines’ ranking algorithms to promote links into top that they do not deserve. Cloaking a well-known technique in which spammers serve one page search-engine crawlers optimize ranking, but different browser users maximize potential profit. In this experience report, we investigate and relatively new type of cloaking, called Click-Through Cloaking, non-spam content browsers who visit the URL directly without clicking through results, attempt evade detection by human investigators anti-spam scanners. We survey cloaking techniques actually used wild classify them three categories: server-side, client-side, combination. propose redirection-diff approach turning spammers’ against themselves. Finally, present eight case studies IP subnet-based hunting defend major engine stealth pages use click-through cloaking.

参考文章(7)
Baoning Wu, Brian D. Davison, Cloaking and Redirection: A Preliminary Study. adversarial information retrieval on the web. pp. 7- 16 ,(2005)
Chad Verbowski, Jeffrey Wang, Yi-Min Wang, Doug Beck, Brad Daniels, Strider typo-patrol: discovery and analysis of systematic typo-squatting conference on steps to reducing unwanted traffic on internet. pp. 5- 5 ,(2006)
Yi-Min Wang, D. Beck, Binh Vo, R. Roussev, C. Verbowski, Detecting stealth software with Strider GhostBuster dependable systems and networks. pp. 368- 377 ,(2005) , 10.1109/DSN.2005.39
Chad Verbowski, Roussi Roussev, Xuxian Jiang, Yi-Min Wang, Shuo Chen, Doug Beck, Samuel T. King, Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. network and distributed system security symposium. pp. 12- ,(2006)
David Maxwell Chickering, Kumar Chellapilla, Improving Cloaking Detection Using Search Query Popularity and Monetizability adversarial information retrieval on the web. pp. 17- 23 ,(2006)
Yuan Niu, Yi-Min Wang, Francis Hsu, Ming Ma, Hao Chen, A Quantitative Study of Forum Spamming Using Context-based Analysis. network and distributed system security symposium. pp. 14- ,(2007)
Hector Garcia-Molina, Zoltan Gyongyi, Web Spam Taxonomy adversarial information retrieval on the web. pp. 39- 47 ,(2005)