A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detecting semantic cloaking on the web
2006
Proceedings of the 15th international conference on World Wide Web - WWW '06
In this paper, we propose an automated two-step method to detect semantic cloaking pages based on different copies of the same page downloaded by a web crawler and a web browser. ...
In the second step, a classifier is used to detect semantic cloaking pages from the candidates generated by the filtering step. ...
We propose a two-step process to detect semantic cloaking on the Web. The filtering step will detect all candidates that may utilize semantic cloaking. ...
doi:10.1145/1135777.1135901
dblp:conf/www/WuD06
fatcat:ktenh5gpb5fv5ggtdgroopr3a4
A Reputation Based Detection Technique to Cloaked Web Spam
2012
Procedia Technology - Elsevier
Cloaking is a kind of hiding technique which is used to return different pages to the crawler and the user on their request to the cloaked web server. ...
This paper also presents an abstract model to detect cloaking based on reputation. ...
Based on these features a classifier is built and used to detect whether the page is semantically cloaked or not. ...
doi:10.1016/j.protcy.2012.05.090
fatcat:pwgyblczbjfm7fukbo3fm4rdzq
A Survey on Web Spam Detection Methods: Taxonomy
2012
International journal of network security and its applications
This paper classifies web spam techniques and the related detection methods. ...
Hence spam detection methods have been proposed as a solution for web spam in order to reduce negative effects of spam pages. ...
C) Semantic Cloaking Wu and Davison [11] proposed a two-step cloaking detection method which detects semantic cloaking on the web. The first step is called filtering step. ...
doi:10.5121/ijnsa.2012.4510
fatcat:ql36fw6hl5ahfjctd4yfhdo4om
Detecting Cloaking Web Spam Using Hash Function
2013
Computer Science and Information Technology
Previous cloaking detection methods based on terms/links differences between crawler and browser's copies are not accurate enough. The latest technique is tag-based method. ...
Web spam is an attempt to boost the ranking of special pages in search engine results. Cloaking is a kind of spamming technique. ...
[1] , proposed a two-step cloaking detection method, which detects semantic cloaking on the web. In the first step, C 1 and B 1 are compared. ...
doi:10.13189/csit.2013.010104
fatcat:rcef6wqwungtlfo6kenponzd3a
Fine-Grained Analysis of Compromised Websites with Redirection Graphs and JavaScript Traces
2017
IEICE transactions on information and systems
The result shows that our system successfully identified malicious URL relations and compromised web content, and the number of URLs and the amount of web content to be analyzed were sufficient for incident ...
An incident response organization such as a CSIRT contributes to preventing the spread of malware infection by analyzing compromised websites and sending abuse reports with detected URLs to webmasters. ...
For example, original content is necessary for compromise detection, and these methods can detect only compromised web content on the web server under control. ...
doi:10.1587/transinf.2016icp0011
fatcat:kmdujk7fwrg25bjcutopiprtki
Cloak and dagger
2011
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11
Cloaking is a common "bait-and-switch" technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. ...
In this paper, we measure and characterize the prevalence of cloaking on different search engines, how this behavior changes for targeted versus untargeted advertising and ultimately the response to site ...
in-kind support from Google, Microsoft, Yahoo, Cisco, HP and the UCSD Center for Networked Systems (CNS). ...
doi:10.1145/2046707.2046763
dblp:conf/ccs/WangSV11
fatcat:zvofcjucf5au5axdh3gzfoaowq
Website Forensic Investigation to Identify Evidence and Impact of Compromise
[chapter]
2017
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
As a result, our system successfully identified compromised web content and malicious URL relations, and the amount of web content and the number of URLs to be analyzed were sufficient for incident responders ...
., a CSIRT and a webmaster, because these websites change behavior depending on a client environment. ...
For example, original content is necessary for compromise detection, and these methods can detect only compromised web content on the web server under control. ...
doi:10.1007/978-3-319-59608-2_25
fatcat:g3birlugyneslaax6ba5z74lbm
Cloaker Catcher: A Client-based Cloaking Detection System
[article]
2017
arXiv
pre-print
In addition, they focus on detecting and measuring cloaking on the server side, but the results are not visible to users to help them avoid frauds. ...
Cloaking hides the true nature of a website by delivering blatantly different content to users versus web crawlers. ...
In the feature extraction phase, these algorithms traverse the web pages and extract statistical and semantic features. ...
arXiv:1710.01387v1
fatcat:ghr6vhnafng6tl2yycssiqfaky
Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications
2011
IEEE pervasive computing
In this paper we elaborate on this inference attack, named semantic location identification, and present a comprehensive framework supporting semantic location cloaking. ...
Typically the user discloses a cloaked region in place of the exact position. ...
The operation can be executed on a properly equipped device or on a different system, such a laptop or a Web application [19] . ...
doi:10.1109/mprv.2011.18
fatcat:fcorv55tjzh2xde6clesya2srq
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services
2016
Proceedings of the 25th International Conference on World Wide Web - WWW '16
The emergence of cloud web hosting services provides a new and effective platform for longtail SEO spam attacks. ...
One highlight of our findings is the effectiveness of the cloud-based long-tail SEO spam, with 6% of the doorway pages successfully appearing in the top 10 search results of the poisoned long-tail keywords ...
Compared to client-side cloaking, server-side cloaking is more concealed and much more likely to circumvent detection [32] . ...
doi:10.1145/2872427.2883008
dblp:conf/www/LiaoLMSHB16
fatcat:ypcf7xuwi5fjnpeeerlb4zqcqy
User generated content
2009
Proceedings of the 3rd workshop on Information credibility on the web - WICOW '09
Spam Challenge
• Label "spam" nodes on the host level
-agrees with existing granularity of Web spam
• Based on a crawl of .uk domain from May 2006
• 77.9 million pages
• 3 billion links
• 11,400 ...
Clicks, Bids)
20
What is in the Web? ...
/ Barcelona • Similarity @1 is 1/2 because the longest shared path is "Regional/ Europe/ Spain" and the length of the longest is 6
Experimental Evaluation • We evaluated a 1000 thousand edges sample ...
doi:10.1145/1526993.1526995
dblp:conf/www/Baeza-Yates09
fatcat:bhmtz6f2pna6pk2lx2jtzwkepu
EvilSeed: A Guided Approach to Finding Malicious Web Pages
2012
2012 IEEE Symposium on Security and Privacy
To search for malicious web pages, the first step is typically to use a crawler to collect URLs that are live on the Internet. ...
A key reason is that the crawler encounters many pages on the web that are benign, that is, the "toxicity" of the stream of URLs being analyzed is low. ...
Acknowledgments This research draws on data provided by the University Research Program for Google Search, a service provided by Google to promote a greater common understanding of the web. ...
doi:10.1109/sp.2012.33
dblp:conf/sp/InvernizziC12
fatcat:vz5jv4kglze3fpdz6abddo4mza
Approaches for Web Spam Detection
2014
International Journal of Computer Applications
We have categorized web spam detection with the primary focus on the approaches used for spam detection. The paper also gives the possible directions for future work. ...
Web Security being a prime challenge for search engines has motivated the researchers in academia and industry to devise new techniques for web spam detection. ...
Cloaking Cloaking is a technique by which a Web server provides to the crawler of a search engine a page that is different from the one shown to regular users. ...
doi:10.5120/17655-8467
fatcat:vjlkkwa6wbeupe6afkstqeeday
Detecting Web Spam Based on Novel Features from Web Page Source Code
2020
Security and Communication Networks
However, none of these techniques focused on semantic analysis of link and anchor text for detection. ...
Experiment results show that the proposed model could effectively detect web spam. ...
As the proposed method has features based on semantics, it is helpful to detect spam in web pages where links to spam content are easily injected into. ...
doi:10.1155/2020/6662166
fatcat:opknwyq3jfe2baaa33xg4vhdli
Cloak of Visibility: Detecting When Machines Browse a Different Web
2016
2016 IEEE Symposium on Security and Privacy (SP)
These web cloaking techniques hinder the effectiveness of security crawlers and potentially expose Internet users to harmful content. ...
In this work, we study the spectrum of blackhat cloaking techniques that target browser, network, or contextual cues to detect organic visitors. ...
Web Cloaking Incentives Web cloaking refers to the set of techniques that a web server uses to fingerprint incoming visitors in order to customize page content. ...
doi:10.1109/sp.2016.50
dblp:conf/sp/InvernizziTKCPB16
fatcat:koc4b2yuvzauvak67dopisnkw4
« Previous
Showing results 1 — 15 out of 1,302 results