Search ranger system and double-funnel model for search spam analyses and browser protection
First Claim
1. A method comprising:
- providing a multi-layer model that comprises;
an advertiser layer associated with advertisers that compensate syndicators to display advertisements;
a syndicator layer associated with the syndicators that buy click traffic from aggregators for the advertisements;
an aggregation layer associated with the aggregators that buy the click traffic from spammers to insulate the syndicators and the advertisers from being associated with spam content;
a redirection layer associated with redirection domains used by the spammers to fetch the spam content after a doorway web page is clicked; and
a doorway layer associated with doorway web pages that the spammers promote to top search result positions to attract the click traffic;
identifying, based on an analysis of the multi-layer model, the aggregation layer as a bottleneck layer that uses at least one Internet Protocol (IP) block to funnel the advertisements and to associate the advertisements with the spam content; and
performing, by one or more processors configured with executable instructions, one or more corrective actions that act on the bottleneck layer to protect web browsers from search spam.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary method for protecting web browsers from spam includes providing a multi-layer model that includes a doorway layer, a redirection domain layer, an aggregator layer, a syndicator layer and an advertiser layer; identifying domains as being associated with at least one of the layers; and, based at least in part on the identifying, taking one or more corrective actions to protect web browsers from search spam. An exemplary method for identifying a bottleneck layer in a multi-layer spam model includes providing a multi-layer spam model, collecting spam advertisements, associating a block of IP addresses with the collected spam advertisements and identifying a bottleneck layer based on the block of IP addresses. Other methods, systems, etc., are also disclosed.
-
Citations
18 Claims
-
1. A method comprising:
-
providing a multi-layer model that comprises; an advertiser layer associated with advertisers that compensate syndicators to display advertisements; a syndicator layer associated with the syndicators that buy click traffic from aggregators for the advertisements; an aggregation layer associated with the aggregators that buy the click traffic from spammers to insulate the syndicators and the advertisers from being associated with spam content; a redirection layer associated with redirection domains used by the spammers to fetch the spam content after a doorway web page is clicked; and a doorway layer associated with doorway web pages that the spammers promote to top search result positions to attract the click traffic; identifying, based on an analysis of the multi-layer model, the aggregation layer as a bottleneck layer that uses at least one Internet Protocol (IP) block to funnel the advertisements and to associate the advertisements with the spam content; and performing, by one or more processors configured with executable instructions, one or more corrective actions that act on the bottleneck layer to protect web browsers from search spam. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
providing a multi-layer spam model that includes; an advertiser layer associated with an advertising entity that compensates a syndicator to display one or more advertisements; a syndicator layer associated with the syndicator that buys click-through traffic from an aggregator for the one or more advertisements; an aggregation layer associated with the aggregator that buys the click-through traffic from one or more spammers to insulate the syndicator and the advertising entity from being associated with spam content; a redirection layer associated with one or more redirection domains used by the one or more spammers to fetch the spam content after a doorway web page is clicked; and a doorway layer associated with the doorway web page that the one or more spammers promote to top search result positions to attract the click-through traffic; identifying at least one of the syndicator layer, the aggregation layer or the redirection layer as an intermediate layer in the multi-layer spam model that is used to convert the click-through traffic associated with the spam content into money; identifying a block of Internet Protocol (IP) addresses in the intermediate layer that funnels the one or more advertisements from the advertiser layer to the doorway web page from the doorway layer; and performing, by one or more processors configured with executable instructions, one or more corrective actions on the block of IP addresses. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. One or more computer memories storing instructions that, when executed by a computing device, instruct the computing device to perform actions comprising:
-
providing a multi-layer model including; an advertiser layer associated with an advertising entity that compensates a syndicator to display one or more advertisements; a syndicator layer associated with the syndicator that buys click-through traffic from an aggregator for the one or more advertisements; an aggregation layer associated with the aggregator that buys the click-through traffic from one or more spammers to insulate the syndicator and the advertising entity from being associated with spam content; a redirection layer associated with one or more redirection domains used by the one or more spammers to fetch the spam content after a doorway web page is clicked; and a doorway layer associated with the doorway web page that the one or more spammers promote to top search result positions to attract the click-through traffic; identifying at least one of the syndicator layer, the aggregation layer or the redirection layer as an intermediate layer in the multi-layer model that is used to convert the click-through traffic associated with the doorway web page into value; identifying at least one Internet Protocol (IP) block associated with the intermediate layer, the at least one IP block configured to funnel the one or more advertisements as advertising spam to the click-through traffic associated with the doorway web page; and taking one or more corrective actions on the at least one IP block to protect web browsers from the advertising spam.
-
Specification