SlideShare a Scribd company logo
1 of 53
OWASP – Web Spam Techniques Roberto Suggi Liverani Security Consultant Security-Assessment.com 29 April 2008
Who am I? ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam - Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – White Hat and Black Hat SEO ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Web Spam Business ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Aggressive Black Hat SEO ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – The “online pharmacy” industry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Affiliate/Associate Programs  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Affiliate/Associate Programs ,[object Object],[object Object],[object Object],[object Object]
Web Spam – Affiliate/Associate Programs ,[object Object]
Web Spam – Affiliate/Associate Programs ,[object Object],[object Object]
Web Spam – So how does it work? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Online Pharmacy Keywords ,[object Object],Keywords Google Yahoo Live Spam Links Buy viagra online 11,200,000 44,600,000 57,400,000 G:4/10 Y:6/10 L:10/10 Cheap viagra 12,100,100 36,700,000 53,100,000 G:7/10 Y:7/10 L:9/10 Buy cialis online 7,810,000 33,400,000 25,000,000 G:8/10 Y:9/10 L:10/10 Buy phentermine online 4,340,000 27,000,000 52,600,000 G:8/10 Y:8/10 L:10/10
Web Spam – Recognising web spam links ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Studies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 5 1590 112 1530 433 19726 7220 1 836238 Aug 2003
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 6 6530 399 8640 25 8123 18900 0 370332 Nov 1996
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 6 586000 3660 231887 73748 1010000 476000 0 9102 Jun 2006
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 6 14700 2960 19400 23874 119300 159000 3 165573 Apr 1997
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Security Considerations ,[object Object],[object Object],[object Object],[object Object]
Web Spam – Security Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Questions? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques - Disclaimer ,[object Object],[object Object],[object Object]
Web Spam Techniques - References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques - References ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testing
Imaginea
 

What's hot (20)

Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testing
 
Phishing
PhishingPhishing
Phishing
 
WEP/WPA attacks
WEP/WPA attacksWEP/WPA attacks
WEP/WPA attacks
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
Phishing
PhishingPhishing
Phishing
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Web application vulnerabilities
Web application vulnerabilitiesWeb application vulnerabilities
Web application vulnerabilities
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Web mining
Web miningWeb mining
Web mining
 
Internship presentation
Internship presentationInternship presentation
Internship presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?Phishing Attacks - Are You Ready to Respond?
Phishing Attacks - Are You Ready to Respond?
 
Ch 3: Network and Computer Attacks
Ch 3: Network and Computer AttacksCh 3: Network and Computer Attacks
Ch 3: Network and Computer Attacks
 

Similar to Web Spam Techniques

Search Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content SpamSearch Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content Spam
jagadish thaker
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partners
maosongppt
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partners
maosongppt
 
Common mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno PrussakovCommon mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno Prussakov
auexpo Conference
 
seo-ppt.pptx
seo-ppt.pptxseo-ppt.pptx
seo-ppt.pptx
Poriumlimited
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 

Similar to Web Spam Techniques (20)

Web spam
Web spamWeb spam
Web spam
 
The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing Compliance
 
White hat and black hat differences
White hat and black hat differencesWhite hat and black hat differences
White hat and black hat differences
 
Different Module of Digital Marketing
Different Module of Digital MarketingDifferent Module of Digital Marketing
Different Module of Digital Marketing
 
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMYA SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
 
Google Places - Your Information on the Net
Google Places - Your Information on the NetGoogle Places - Your Information on the Net
Google Places - Your Information on the Net
 
Seo Analysis Report
Seo Analysis ReportSeo Analysis Report
Seo Analysis Report
 
Reducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UXReducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UX
 
Optimising Google's Knowledge Graph - #SMX Munich
Optimising Google's Knowledge Graph - #SMX MunichOptimising Google's Knowledge Graph - #SMX Munich
Optimising Google's Knowledge Graph - #SMX Munich
 
Get More Traffic
Get  More  TrafficGet  More  Traffic
Get More Traffic
 
Search Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content SpamSearch Engine Spam Index - Types of Link Spam & Content Spam
Search Engine Spam Index - Types of Link Spam & Content Spam
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partners
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partners
 
Common mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno PrussakovCommon mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno Prussakov
 
seo-ppt.pptx
seo-ppt.pptxseo-ppt.pptx
seo-ppt.pptx
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)
 
SEO & Content Areas for Growth in 2019
SEO & Content Areas for Growth in 2019 SEO & Content Areas for Growth in 2019
SEO & Content Areas for Growth in 2019
 

More from Roberto Suggi Liverani

More from Roberto Suggi Liverani (13)

I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 
Augmented reality in your web proxy
Augmented reality in your web proxyAugmented reality in your web proxy
Augmented reality in your web proxy
 
Cross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationCross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitation
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
None More Black - the Dark Side of SEO
None More Black - the Dark Side of SEONone More Black - the Dark Side of SEO
None More Black - the Dark Side of SEO
 
Bridging the gap - Security and Software Testing
Bridging the gap - Security and Software TestingBridging the gap - Security and Software Testing
Bridging the gap - Security and Software Testing
 
Defending Against Application DoS attacks
Defending Against Application DoS attacksDefending Against Application DoS attacks
Defending Against Application DoS attacks
 
Exploiting Firefox Extensions
Exploiting Firefox ExtensionsExploiting Firefox Extensions
Exploiting Firefox Extensions
 
Black Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysis
 
XPath Injection
XPath InjectionXPath Injection
XPath Injection
 
Reversing JavaScript
Reversing JavaScriptReversing JavaScript
Reversing JavaScript
 
Ajax Security
Ajax SecurityAjax Security
Ajax Security
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Web Spam Techniques

  • 1. OWASP – Web Spam Techniques Roberto Suggi Liverani Security Consultant Security-Assessment.com 29 April 2008
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.

Editor's Notes

  1. Each word in the document will be followed by another with a certain frequency http://en.kerouac3001.com/markov-chains-spam-that-search-engines-like-pt-1-5.htm