|Look up spamdexing in Wiktionary, the free dictionary.|
This article needs additional citations for verification. (February 2013) (Learn how and when to remove this template message)
In digital marketing and online advertising, spamdexing (also known as search engine spam, search engine poisoning, black-hat search engine optimization (SEO), search spam or web spam) is the deliberate manipulation of search engine indexes. It involves a number of methods, such as link building and repeating unrelated phrases, to manipulate the relevance or prominence of resources indexed, in a manner inconsistent with the purpose of the indexing system.
It could be considered to be a part of search engine optimization, though there are many search engine optimization methods that improve the quality and appearance of the content of web sites and serve content useful to many users. Search engines use a variety of algorithms to determine relevancy ranking. Some of these include determining whether the search term appears in the body text or URL of a web page. Many search engines check for instances of spamdexing and will remove suspect pages from their indexes. Also, search-engine operators can quickly block the results-listing from entire websites that use spamdexing, perhaps alerted by user complaints of false matches. The rise of spamdexing in the mid-1990s made the leading search engines of the time less useful. Using unethical methods to make websites rank higher in search engine results than they otherwise would is commonly referred to in the SEO (search engine optimization) industry as "black-hat SEO". These methods are more focused on breaking the search-engine-promotion rules and guidelines. In addition to this, the perpetrators run the risk of their websites being severely penalized by the Google Panda and Google Penguin search-results ranking algorithms.
- 1 History
- 2 Content spam
- 3 Link spam
- 3.1 Link-building software
- 3.2 Link farms
- 3.3 Private blog networks
- 3.4 Hidden links
- 3.5 Sybil attack
- 3.6 Spam blogs
- 3.7 Guest blog spam
- 3.8 Buying expired domains
- 3.9 Cookie stuffing
- 3.10 Using world-writable pages
- 4 Other types
- 5 Overall counterplan
- 6 See also
- 7 References
- 8 External links
The problem arises when site operators load their Web pages with hundreds of extraneous terms so search engines will list them among legitimate addresses. The process is called "spamdexing," a combination of spamming — the Internet term for sending users unsolicited information — and "indexing."
These techniques involve altering the logical view that a search engine has over the page's contents. They all aim at variants of the vector space model for information retrieval on text collections.
Keyword stuffing involves the calculated placement of keywords within a page to raise the keyword count, variety, and density of the page. This is useful to make a page appear to be relevant for a web crawler in a way that makes it more likely to be found. Example: A promoter of a Ponzi scheme wants to attract web surfers to a site where he advertises his scam. He places hidden text appropriate for a fan page of a popular music group on his page, hoping that the page will be listed as a fan site and receive many visits from music lovers. Older versions of indexing programs simply counted how often a keyword appeared, and used that to determine relevance levels. Most modern search engines have the ability to analyze a page for keyword stuffing and determine whether the frequency is consistent with other sites created specifically to attract search engine traffic. Also, large webpages are truncated, so that massive dictionary lists cannot be indexed on a single webpage.
Hidden or invisible text
Unrelated hidden text is disguised by making it the same color as the background, using a tiny font size, or hiding it within HTML code such as "no frame" sections, alt attributes, zero-sized DIVs, and "no script" sections. People screening websites for a search-engine company might temporarily or permanently block an entire website for having invisible text on some of its pages. However, hidden text is not always spamdexing: it can also be used to enhance accessibility.
"Gateway" or doorway pages are low-quality web pages created with very little content, but are instead stuffed with very similar keywords and phrases. They are designed to rank highly within the search results, but serve no purpose to visitors looking for information. A doorway page will generally have "click here to enter" on the page. In 2006, Google ousted BMW for using "doorway pages" to the company's German site, BMW.de.
Scraper sites are created using various programs designed to "scrape" search-engine results pages or other sources of content and create "content" for a website. The specific presentation of content on these sites is unique, but is merely an amalgamation of content taken from other sources, often without permission. Such websites are generally full of advertising (such as pay-per-click ads), or they redirect the user to other sites. It is even feasible for scraper sites to outrank original websites for their own information and organization names.
Article spinning involves rewriting existing articles, as opposed to merely scraping content from other sites, to avoid penalties imposed by search engines for duplicate content. This process is undertaken by hired writers or automated using a thesaurus database or a neural network.
Similarly to article spinning, some sites use machine translation to render their content in several languages, with no human editing, resulting in unintelligible texts.
This section may be confusing or unclear to readers. (July 2014) (Learn how and when to remove this template message)
Publishing web pages that contain information that is unrelated to the title is a misleading practice known as deception. Despite being a target for penalties from the leading search engines that rank pages, deception is a common practice in some types of sites, including dictionary and encyclopedia sites.
Link spam is defined as links between pages that are present for reasons other than merit. Link spam takes advantage of link-based ranking algorithms, which gives websites higher rankings the more other highly ranked websites link to it. These techniques also aim at influencing other link-based ranking techniques such as the HITS algorithm. There are many different types of link spam, built for both positive and negative ranking effects on websites. (See Google penalty § Negative SEO).
A common form of link spam is the use of link-building software to automate the search engine optimization process.
Link farms are tightly-knit networks of websites that link to each other for the sole purpose of gaming the search engine ranking algorithms. These are also known facetiously as mutual admiration societies. Use of links farms has been greatly reduced after Google launched the first Panda Update in February 2011, which introduced significant improvements in its spam-detection algorithm.
Private blog networks
Blog networks (PBNs) are a group of authoritative websites used as a source of contextual links that point to the owner's main website to achieve higher search engine ranking. Owners of PBN websites use expired domains or auction domains that have backlinks from high-authority websites. Google targeted and penalized PBN users on several occasions with several massive deindexing campaigns since 2014.
A Sybil attack is the forging of multiple identities for malicious intent, named after the famous multiple personality disorder patient "Sybil". A spammer may create multiple web sites at different domain names that all link to each other, such as fake blogs (known as spam blogs).
Spam blogs are blogs created solely for commercial promotion and the passage of link authority to target sites. Often these "splogs" are designed in a misleading manner that will give the effect of a legitimate website but upon close inspection will often be written using spinning software or very poorly written and barely readable content. They are similar in nature to link farms.
Guest blog spam
Guest blog spam is the process of placing guest blogs on websites for the sole purpose of gaining a link to another website, or websites. Unfortunately often confused with legitimate forms of guest blogging with other motives than placing links. Made famous by Matt Cutts publicly declaring "war" against this method of link spam.
Buying expired domains
Some link spammers utilize expired domain crawler software or monitor DNS records for domains that will expire soon, then buy them when they expire and replace the pages with links to their pages. However, it is possible but not confirmed that Google resets the link data on expired domains. To maintain all previous Google ranking data for the domain, it is advisable that a buyer grabs the domain before it is "dropped". Some of these techniques may be applied for creating a Google bomb — that is, to cooperate with other users to boost the ranking of a particular page for a particular query.
Cookie stuffing involves placing an affiliate tracking cookie on a website visitor's computer without their knowledge, which will then generate revenue for the person doing the cookie stuffing. This not only generates fraudulent affiliate sales, but also has the potential to overwrite other affiliates' cookies, essentially stealing their legitimately earned commissions.
Using world-writable pages
Web sites that can be edited by users can be used by spamdexers to insert links to spam sites if the appropriate anti-spam measures are not taken.
Spam in blogs
Spam in blogs is the placing or solicitation of links randomly on other sites, placing a desired keyword into the hyperlinked text of the inbound link. Guest books, forums, blogs, and any site that accepts visitors' comments are particular targets and are often victims of drive-by spamming where automated software creates nonsense posts with links that are usually irrelevant and unwanted.
Comment spam is a form of link spam that has arisen in web pages that allow dynamic user editing such as wikis, blogs, and guestbooks. It can be problematic because agents can be written that automatically randomly select a user edited web page, such as a Wikipedia article, and add spamming links.
Wiki spam is a form of link spam on wiki pages. The spammer uses the open editability of wiki systems to place links from the wiki site to the spam site. The subject of the spam site is often unrelated to the wiki page where the link is added.
Referrer log spamming
Referrer spam takes place when a spam perpetrator or facilitator accesses a web page (the referee), by following a link from another web page (the referrer), so that the referee is given the address of the referrer by the person's Internet browser. Some websites have a referrer log which shows which pages link to that site. By having a robot randomly access many sites enough times, with a message or specific address given as the referrer, that message or Internet address then appears in the referrer log of those sites that have referrer logs. Since some Web search engines base the importance of sites on the number of different sites linking to them, referrer-log spam may increase the search engine rankings of the spammer's sites. Also, site administrators who notice the referrer log entries in their logs may follow the link back to the spammer's referrer page.
Because of the large amount of spam posted to user-editable webpages, Google proposed a nofollow tag that could be embedded with links. A link-based search engine, such as Google's PageRank system, will not use the link to increase the score of the linked website if the link carries a nofollow tag. This ensures that spamming links to user-editable websites will not raise the sites ranking with search engines. Nofollow is used by several major websites, including Wordpress, Blogger and Wikipedia.
A mirror site is the hosting of multiple websites with conceptually similar content but using different URLs. Some search engines give a higher rank to results where the keyword searched for appears in the URL.
Cloaking refers to any of several means to serve a page to the search-engine spider that is different from that seen by human users. It can be an attempt to mislead search engines regarding the content on a particular web site. Cloaking, however, can also be used to ethically increase accessibility of a site to users with disabilities or provide human users with content that search engines aren't able to process or parse. It is also used to deliver content based on a user's location; Google itself uses IP delivery, a form of cloaking, to deliver results. Another form of cloaking is code swapping, i.e., optimizing a page for top ranking and then swapping another page in its place once a top ranking is achieved. Google refers to these type of redirects as Sneaky Redirects.
This section needs expansion. You can help by adding to it. (October 2017)
By search engine maintainer
Spamdexed pages are sometimes eliminated from search results by the search engine.
By search engine user
Users can craft at search keyword, for example, a keyword preceding "-" (minus) will eliminate sites that contains the keyword in their pages or in their domain of URL of the pages from search result. Example, search keyword "-naver" will eliminate sites that contains word "naver" in their pages and the pages whose domain of URL contains "naver".
Google Chrome extension
Google itself launched the Google Chrome extension "Personal Blocklist (by Google)" in 2011 as part of countermeasures against content farming. As of 2018, the extension only works with the PC version of Google Chrome.
- Adversarial information retrieval
- Index (search engine) – overview of search engine indexing technology
- Web scraping
- Microsoft SmartScreen
- Windows Defender
- SearchEngineLand, Danny Sullivan's video explanation of Search Engine Spam, October 2008 . Retrieved 2008-11-13.
- "Word Spy - spamdexing" (definition), March 2003, webpage:WordSpy-spamdexing.
- Gyöngyi, Zoltán; Garcia-Molina, Hector (2005), "Web spam taxonomy" (PDF), Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005 in The 14th International World Wide Web Conference (WWW 2005) May 10, (Tue)-14 (Sat), 2005, Nippon Convention Center (Makuhari Messe), Chiba, Japan., New York, NY: ACM Press, ISBN 1-59593-046-9
- Ntoulas, Alexandros; Manasse, Mark; Najork, Marc; Fetterly, Dennis (2006), "Detecting Spam Web Pages through Content Analysis", The 15th International World Wide Web Conference (WWW 2006) May 23–26, 2006, Edinburgh, Scotland., New York, NY: ACM Press, ISBN 1-59593-323-9
- Garg, Anubhav (2015-12-08). "What is Black Hat SEO (BHS) – A Detailed Guide". Search Engine Stream. Retrieved 2015-12-08.
- Smarty, Ann (2008-12-17). "What Is BlackHat SEO? 5 Definitions". Search Engine Journal. Retrieved 2012-07-05.
- "secrets-to-keeping-your-new-email-address-spam-free". webspam.org. Retrieved 2 January 2014.
- Segal, David (2011-02-13). "The Dirty Little Secrets of Search". The NY Times. Retrieved 2012-07-03.
- Davison, Brian (2000), "Recognizing Nepotistic Links on the Web" (PDF), AAAI-2000 workshop on Artificial Intelligence for Web Search, Boston: AAAI Press, pp. 23–28
- "The definitive guide to manipulative links - SpamFlag". The definitive guide to manipulative links.
- "Search Engines:Technology, Society, and Business - Marti Hearst, Aug 29, 2005" (PDF). berkeley.edu.
- "Google Targets Sites Using Private Blog Networks With Manual Action Ranking Penalties". Search Engine Land. 2014-09-23. Retrieved 2016-12-12.
- "The decay and fall of guest blogging for SEO". mattcutts.com. 20 January 2014.
- Mishne, Gilad; David Carmel; Ronny Lempel (2005). "Blocking Blog Spam with Language Model Disagreement" (PDF). Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web. Retrieved 2007-10-24.
- "Sneaky redirects - Search Console Help". support.google.com.
- "Google検索結果の悪質なサイトを非表示＆通報し検索品質アップに貢献できるGoogle公式Chrome拡張機能「Personal Blocklist」". gigazine.net.
- "New: Block Sites From Google Results Using Chrome's "Personal Blocklist" - Search Engine Land". searchengineland.com. 14 February 2011.