Search Ranger System and Double-Funnel Model For Search Spam Analyses and Browser Protection
First Claim
1. An architecture for monitoring search spam, the architecture comprising:
- a first component to receive one or more spammer targeted keywords and to search, scan and analyze URLs based at least in part on the one or more spammer targeted keywords;
a second component to receive one or more URLs from the first component and to verify one or more of these URLs as a spam URL; and
a third component to collect spammer targeted keywords associated with one or more spam URLs and to provide one or more of the spammer targeted keywords to the first component,wherein each of the first, second and third component are implemented at least in part by a computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary system for monitoring search spam and protecting against search spam includes a self-monitoring subsystem to uncover spam patterns and a self-protection subsystem to protect against spam by providing spam-related information to strengthen a relevance ranking algorithm. An exemplary architecture for monitoring search spam includes a first component to receive one or more spammer targeted keywords and to search, scan and analyze URLs based at least in part on the one or more spammer targeted keywords, a second component to receive one or more URLs from the first component and to verify one or more of these URLs as a spam URL and a third component to collect spammer targeted keywords associated with one or more spam URLs and to provide one or more of the spammer targeted keywords to the first component. Other methods, systems, etc., are also disclosed.
-
Citations
25 Claims
-
1. An architecture for monitoring search spam, the architecture comprising:
-
a first component to receive one or more spammer targeted keywords and to search, scan and analyze URLs based at least in part on the one or more spammer targeted keywords; a second component to receive one or more URLs from the first component and to verify one or more of these URLs as a spam URL; and a third component to collect spammer targeted keywords associated with one or more spam URLs and to provide one or more of the spammer targeted keywords to the first component, wherein each of the first, second and third component are implemented at least in part by a computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, implemented at least in part by a computing device, for grouping suspected spam URLs, the method comprising:
-
receiving a spammer targeted keyword; inputting the spammer targeted keyword to a search engine to generate search results; selecting a search result; recording one or more URLs associated with the selected search result; and grouping the one or more recorded URLs using similarity-based grouping. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method, implemented at least in part by a computing device, the method comprising:
-
scanning each URL in a set of URLs; recording all redirection URLs for each scanned URL; classifying URLs that redirect to a known spammer redirection domain as spam URLs; and grouping unclassified URLs by each 3rd party domain that received redirection traffic. - View Dependent Claims (23, 24)
-
-
25. A system for monitoring search spam and protecting against search spam, the system comprising:
-
a self-monitoring subsystem to uncover spam patterns; and a self-protection subsystem to protect against spam by providing spam-related information to strengthen a relevance ranking algorithm.
-
Specification