Characterizing long-Tail SEO spam on cloud web hosting services

Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem Beyah

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    The popularity of long-Tail search engine optimization (SEO) brings with new security challenges: incidents of long-Tail keyword poisoning to lower competition and increase rev-enue have been reported. The emergence of cloud web host-ing services provides a new and effective platform for long-tail SEO spam attacks. There is growing evidence that large-scale long-Tail SEO campaigns are being carried out on cloud hosting platforms because they offer low-cost, high-speed hosting services. In this paper, we take the first step toward understanding how long-Tail SEO spam is implemented on cloud hosting platforms. After identifying 3,186 cloud direc-tories and 318,470 doorway pages on the leading cloud plat-forms for long-Tail SEO spam, we characterize their abusive behavior. One highlight of our findings is the effectiveness of the cloud-based long-Tail SEO spam, with 6% of the doorway pages successfully appearing in the top 10 search.

    Original languageEnglish (US)
    Title of host publication25th International World Wide Web Conference, WWW 2016
    PublisherInternational World Wide Web Conferences Steering Committee
    Pages321-332
    Number of pages12
    ISBN (Electronic)9781450341431
    DOIs
    StatePublished - 2016
    Event25th International World Wide Web Conference, WWW 2016 - Montreal, Canada
    Duration: Apr 11 2016Apr 15 2016

    Publication series

    Name25th International World Wide Web Conference, WWW 2016

    Other

    Other25th International World Wide Web Conference, WWW 2016
    Country/TerritoryCanada
    CityMontreal
    Period4/11/164/15/16

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Software

    Fingerprint

    Dive into the research topics of 'Characterizing long-Tail SEO spam on cloud web hosting services'. Together they form a unique fingerprint.

    Cite this