SEARCH SPAM ANALYSIS AND DETECTION
First Claim
Patent Images
1. A method comprising:
- under control of at least one processor configured with executable instructions,retrieving a search results page to set a browser variable;
inserting a link to a suspect uniform resource locator (URL) into the search results page; and
clicking through to the suspect URL using the inserted link to determine that a host of the suspect URL serves spam content to users that click through to the suspect URL from search results.
2 Assignments
0 Petitions
Accused Products
Abstract
Defeating click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. Investigating cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script.
80 Citations
20 Claims
-
1. A method comprising:
under control of at least one processor configured with executable instructions, retrieving a search results page to set a browser variable; inserting a link to a suspect uniform resource locator (URL) into the search results page; and clicking through to the suspect URL using the inserted link to determine that a host of the suspect URL serves spam content to users that click through to the suspect URL from search results. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A method the method comprising:
under control of at least one processor configured with executable instructions, accessing a uniform resource locator (URL) with a browser; obtaining script associated with the URL; modifying the script to de-obfuscate the script; executing the modified script to determine that the script checks a browser variable against a name of one or more search engines; and identifying the URL as a suspect URL. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
19. A computing device comprising:
-
one or more processors coupled to computer storage media; and a spam detection component stored on the computer storage media and executed on the one or more processors to identify sources of spam web pages, the spam detection component configured to perform operations including; deriving, based on a name of a suspect uniform resource locator (URL), one or more keywords; submitting the one or more keywords to a search engine; receiving, by a browser, as a result of submitting the one or more keywords to the search engine, a search results page that sets a browser variable in the browser; inserting a link to the suspect URL into the search results page; and clicking through to the suspect URL using the inserted link to determine whether a host of the suspect URL serves spam web pages. - View Dependent Claims (20)
-
Specification