SlideShare a Scribd company logo
1 of 53
OWASP – Web Spam Techniques Roberto Suggi Liverani Security Consultant Security-Assessment.com 29 April 2008
Who am I? ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam - Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – White Hat and Black Hat SEO ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Web Spam Business ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Aggressive Black Hat SEO ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – The “online pharmacy” industry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Affiliate/Associate Programs  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Affiliate/Associate Programs ,[object Object],[object Object],[object Object],[object Object]
Web Spam – Affiliate/Associate Programs ,[object Object]
Web Spam – Affiliate/Associate Programs ,[object Object],[object Object]
Web Spam – So how does it work? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Online Pharmacy Keywords ,[object Object],Keywords Google Yahoo Live Spam Links Buy viagra online 11,200,000 44,600,000 57,400,000 G:4/10 Y:6/10 L:10/10 Cheap viagra 12,100,100 36,700,000 53,100,000 G:7/10 Y:7/10 L:9/10 Buy cialis online 7,810,000 33,400,000 25,000,000 G:8/10 Y:9/10 L:10/10 Buy phentermine online 4,340,000 27,000,000 52,600,000 G:8/10 Y:8/10 L:10/10
Web Spam – Recognising web spam links ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Studies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 5 1590 112 1530 433 19726 7220 1 836238 Aug 2003
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study I ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 6 6530 399 8640 25 8123 18900 0 370332 Nov 1996
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 6 586000 3660 231887 73748 1010000 476000 0 9102 Jun 2006
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],PR Google Index Google Links Yahoo Index Yahoo Links Yahoo Link domains Live Index MSN Links Alexa Rank Online Since 6 14700 2960 19400 23874 119300 159000 3 165573 Apr 1997
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Case Study IV ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam – Security Considerations ,[object Object],[object Object],[object Object],[object Object]
Web Spam – Security Recommendations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques – Questions? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques - Disclaimer ,[object Object],[object Object],[object Object]
Web Spam Techniques - References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Spam Techniques - References ,[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (20)

SSRF workshop
SSRF workshop SSRF workshop
SSRF workshop
 
Web Scraping With Python
Web Scraping With PythonWeb Scraping With Python
Web Scraping With Python
 
Website and seo audit checklist
Website and seo audit checklistWebsite and seo audit checklist
Website and seo audit checklist
 
The step by step guide to SEO Website Audit
The step by step guide to SEO Website Audit The step by step guide to SEO Website Audit
The step by step guide to SEO Website Audit
 
Threads in python
Threads in pythonThreads in python
Threads in python
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Web Development
Web DevelopmentWeb Development
Web Development
 
PYTHON PPT.pptx
PYTHON PPT.pptxPYTHON PPT.pptx
PYTHON PPT.pptx
 
CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2CNIT 129S: Securing Web Applications Ch 1-2
CNIT 129S: Securing Web Applications Ch 1-2
 
Top 5 Frameworks In Python | Django, Web2Py, Flask, Bottle, CherryPy | Edureka
Top 5 Frameworks In Python | Django, Web2Py, Flask, Bottle, CherryPy | EdurekaTop 5 Frameworks In Python | Django, Web2Py, Flask, Bottle, CherryPy | Edureka
Top 5 Frameworks In Python | Django, Web2Py, Flask, Bottle, CherryPy | Edureka
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
Seo checklist
Seo checklistSeo checklist
Seo checklist
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Scrapy-101
Scrapy-101Scrapy-101
Scrapy-101
 
Core Web Vitals - Why You Need to Pay Attention
Core Web Vitals - Why You Need to Pay AttentionCore Web Vitals - Why You Need to Pay Attention
Core Web Vitals - Why You Need to Pay Attention
 
Lecture 3: Servlets - Session Management
Lecture 3:  Servlets - Session ManagementLecture 3:  Servlets - Session Management
Lecture 3: Servlets - Session Management
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Dark web
Dark webDark web
Dark web
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open Redirect
 

Similar to Web Spam Techniques

The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceAffiliate Summit
 
White hat and black hat differences
White hat and black hat differencesWhite hat and black hat differences
White hat and black hat differenceswebvidhya
 
Different Module of Digital Marketing
Different Module of Digital MarketingDifferent Module of Digital Marketing
Different Module of Digital MarketingAbhishekBasak11
 
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMYA SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMYIJNSA Journal
 
Google Places - Your Information on the Net
Google Places - Your Information on the NetGoogle Places - Your Information on the Net
Google Places - Your Information on the NetBirgit Pauli-Haack
 
Reducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UXReducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UXMichael Jones
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partnersmaosongppt
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partnersmaosongppt
 
Common mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno PrussakovCommon mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno Prussakovauexpo Conference
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET Journal
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideBenedek Menesi
 
5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)Christopher Dill
 
SEO & Content Areas for Growth in 2019
SEO & Content Areas for Growth in 2019 SEO & Content Areas for Growth in 2019
SEO & Content Areas for Growth in 2019 Prosperity Media
 
IRJET- Search Engine Optimization (Seo)
IRJET-  	  Search Engine Optimization (Seo)IRJET-  	  Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)IRJET Journal
 

Similar to Web Spam Techniques (20)

The Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing ComplianceThe Nitty Gritty of Affiliate Marketing Compliance
The Nitty Gritty of Affiliate Marketing Compliance
 
White hat and black hat differences
White hat and black hat differencesWhite hat and black hat differences
White hat and black hat differences
 
Different Module of Digital Marketing
Different Module of Digital MarketingDifferent Module of Digital Marketing
Different Module of Digital Marketing
 
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMYA SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
A SURVEY ON WEB SPAM DETECTION METHODS: TAXONOMY
 
Google Places - Your Information on the Net
Google Places - Your Information on the NetGoogle Places - Your Information on the Net
Google Places - Your Information on the Net
 
Seo Analysis Report
Seo Analysis ReportSeo Analysis Report
Seo Analysis Report
 
Reducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UXReducing Server Resources: Improve Costs, SEO, Conversions & UX
Reducing Server Resources: Improve Costs, SEO, Conversions & UX
 
Optimising Google's Knowledge Graph - #SMX Munich
Optimising Google's Knowledge Graph - #SMX MunichOptimising Google's Knowledge Graph - #SMX Munich
Optimising Google's Knowledge Graph - #SMX Munich
 
Get More Traffic
Get  More  TrafficGet  More  Traffic
Get More Traffic
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partners
 
How to get more quality partners
How to get more quality partnersHow to get more quality partners
How to get more quality partners
 
Common mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno PrussakovCommon mistakes stagnating your affiliate programme's growth - Geno Prussakov
Common mistakes stagnating your affiliate programme's growth - Geno Prussakov
 
seo-ppt.pptx
seo-ppt.pptxseo-ppt.pptx
seo-ppt.pptx
 
IRJET- Phishing Website Detection System
IRJET- Phishing Website Detection SystemIRJET- Phishing Website Detection System
IRJET- Phishing Website Detection System
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)5 Ways To Identify Blog Spam (As A Business Owner)
5 Ways To Identify Blog Spam (As A Business Owner)
 
SEO & Content Areas for Growth in 2019
SEO & Content Areas for Growth in 2019 SEO & Content Areas for Growth in 2019
SEO & Content Areas for Growth in 2019
 
Search Engine Optimization ppt
Search Engine Optimization pptSearch Engine Optimization ppt
Search Engine Optimization ppt
 
IRJET- Search Engine Optimization (Seo)
IRJET-  	  Search Engine Optimization (Seo)IRJET-  	  Search Engine Optimization (Seo)
IRJET- Search Engine Optimization (Seo)
 

More from Roberto Suggi Liverani

More from Roberto Suggi Liverani (13)

I got 99 trends and a # is all of them
I got 99 trends and a # is all of themI got 99 trends and a # is all of them
I got 99 trends and a # is all of them
 
Augmented reality in your web proxy
Augmented reality in your web proxyAugmented reality in your web proxy
Augmented reality in your web proxy
 
Cross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitationCross Context Scripting attacks & exploitation
Cross Context Scripting attacks & exploitation
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
None More Black - the Dark Side of SEO
None More Black - the Dark Side of SEONone More Black - the Dark Side of SEO
None More Black - the Dark Side of SEO
 
Bridging the gap - Security and Software Testing
Bridging the gap - Security and Software TestingBridging the gap - Security and Software Testing
Bridging the gap - Security and Software Testing
 
Defending Against Application DoS attacks
Defending Against Application DoS attacksDefending Against Application DoS attacks
Defending Against Application DoS attacks
 
Exploiting Firefox Extensions
Exploiting Firefox ExtensionsExploiting Firefox Extensions
Exploiting Firefox Extensions
 
Black Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysis
 
XPath Injection
XPath InjectionXPath Injection
XPath Injection
 
Reversing JavaScript
Reversing JavaScriptReversing JavaScript
Reversing JavaScript
 
Ajax Security
Ajax SecurityAjax Security
Ajax Security
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Web Spam Techniques

  • 1. OWASP – Web Spam Techniques Roberto Suggi Liverani Security Consultant Security-Assessment.com 29 April 2008
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.

Editor's Notes

  1. Each word in the document will be followed by another with a certain frequency http://en.kerouac3001.com/markov-chains-spam-that-search-engines-like-pt-1-5.htm