A metasearch engine (or aggregator) is a search tool that uses another search engine's data to produce its own results from the Internet. Metasearch engines take input from a user and simultaneously send out queries to third party search engines for results. Sufficient data is gathered, formatted by their ranks and presented to the users.
Metasearch engines have their own sets of unique problems. All of the websites stored on search engines are different, which draws irrelevant content. Problems such as spamming reduces result accuracy. The process of fusion aims to tackle this issue and improve the engineering of a metasearch engine.
There are many types of metasearch engines available to allow users to access specialised information in a particular field. These include Savvysearch engine and Metaseek engine.
The first person to incorporate the idea of meta searching was Colorado State University's Daniel Dreilinger. He revealed SearchSavvy, which let users search up to 20 different search engines and directories at once. Although fast, the search engine was restricted to simple searches and thus wasn't too reliable. University of Washington student Eric Selberg released a more "updated" version called MetaCrawler. This search engine improved on SearchSavvy's accuracy by adding its own search syntax behind the scenes, and matching the syntax to that of the search engines it was probing. Metacrawler reduced the amount of search engines queried to 6, but although it produced more accurate results, it still wasn't considered as accurate as searching a query in an individual engine.
Another metasearch engine was created in May 20, 1996. HotBot, owned by Wired at the time, was a search engine with search results coming from the Inktomi and Direct Hit database. It was known at the time for its fast results and funky name, and as a search engine with the ability to search within search results. Upon being bought by Lycos in 1998, development for the search engine staggered and its market share fell drastically. After going through a few alterations, HotBot was redesigned into a simplified search interface, with its features being incorporated into Lycos' website redesign.
In April 2005, Dogpile (owned and operated by InfoSpace, Inc. at the time) collaborated with researchers from University of Pittsburgh and Pennsylvania State University to measure the overlap and ranking differences of leading Web search engines in order to gauge the benefits of using a metasearch engine to search the web. Results found that from 10,316 random user-defined queries from Google, Yahoo!, and Ask Jeeves, only 3.2 percent of first page search results were the same across those search engines for a given query. Another study later that year using 12,570 random user-defined queries from Google, Yahoo!, MSN Search, and Ask Jeeves found that only 1.1 percent of first page search results were the same across those search engines for a given query.
By sending multiple queries to several other search engines this extends the search coverage of the topic and allows more information to be found. They use the indexes built by other search engines, aggregating and often post-processing results in unique ways. A metasearch engine has an advantage over a single search engine because more results can be retrieved with the same amount of exertion. It also reduces the work of users from having to individually type in searches from different engines to look for resources.
Metasearching is also a useful approach if the purpose of the user’s search is to get an overview of the topic or to get quick answers. Instead of having to go through multiple search engines like Yahoo! or Google and comparing results, metasearch engines are able to quickly compile and combine results. They can do it either by listing results from each engine queried with no additional post-processing (Dogpile) or by analyzing the results and ranking them by their own rules (IxQuick, Metacrawler, and Vivismo).
Metasearch engines are not capable of decoding query forms or able to fully translate query syntax. The number of links generated by metasearch engines are limited, and therefore do not provide the user with the complete results of a query. The majority of metasearch engines do not provide over ten linked files from a single search engine, and generally do not interact with larger search engines for results. Sponsored webpages are prioritised and are normally displayed first.
Metasearching also gives the illusion that there is more coverage of the topic queried, particularly if the user is searching for popular or commonplace information. It's common to end with multiple identical results from the queried engines. It is also harder for users to search with advanced search syntax to be sent with the query, so results may not be as precise as when a user is using an advanced search interface at a specific engine. This results in many metasearch engines using simple searching.
A metasearch engine accepts a single search request from the user. This search request is then passed on to another search engine’s database. A metasearch engine does not create a database of webpages but generates a virtual database to integrate data from multiple sources.
Since every search engine is unique and has different algorithms for generating ranked data, duplicates will therefore also be generated. To remove duplicates,a metasearch engine processes this data and applies its own algorithm. A revised list is produced as an output for the user. When a metasearch engine contacts other search engines, these search engines will respond in three ways:
- They will both cooperate and provide complete access to interface for the metasearch engine, including private access to the index database, and will inform the metasearch engine of any changes made upon the index database;
- Search engines can behave in a non-cooperative manner whereby they will not deny or provide any access to interfaces;
- The search engine can be completely hostile and refuse the metasearch engine total access to their database and in serious circumstances, by seeking legal methods.
Architecture of ranking
Webpages that are highly ranked on many search engines are likely to be more relevant in providing useful information. However, all search engines have different ranking scores for each website and most of the time these scores are not the same. This is because search engines prioritise different criteria and methods for scoring, hence a website might appear highly ranked on one search engine and lowly ranked on another. This is a problem because Metasearch engines rely heavily on the consistency of this data to generate reliable accounts.
A metasearch engine uses the process of Fusion to filter data for more efficient results. The two main fusion methods used are: Collection Fusion and Data Fusion.
- Collection Fusion: also known as distributed retrieval, deals specifically with search engines that index unrelated data. To determine how valuable these sources are, Collection Fusion looks at the content and then ranks the data on how likely it is to provide relevant information in relation to the query. From what is generated, Collection Fusion is able to pick out the best resources from the rank. These chosen resources are then merged into a list.
- Data Fusion: deals with information retrieved from search engines that indexes common data sets. The process is very similar. The initial rank scores of data are merged into a single list, after which the original ranks of each of these documents are analysed. Data with high scores indicate a high level of relevancy to a particular query and are therefore selected. To produce a list, the scores must be normalized using algorithms such as CombSum. This is because search engines adopt different policies of algorithms resulting in the score produced being incomparable.
Spamdexing is the deliberate manipulation of search engine indexes. It uses a number of methods to manipulate the relevance or prominence of resources indexed in a manner unaligned with the intention of the indexing system. Spamdexing can be very distressing for users and problematic for search engines because the return contents of searches have poor precision. This will eventually result in the search engine becoming unreliable and not dependable for the user. To tackle Spamdexing, search robot algorithms are made more complex and are changed almost every day to eliminate the problem.
It is a major problem for metasearch engines because it tampers with the search robot's indexing criteria, which are heavily relied upon to format ranking lists. Spamdexing manipulates the natural ranking system of a search engine, and places websites higher on the ranking list than they would naturally be placed. There are three primary methods used to achieve this:
Content spam are the techniques that alter the logical view that a search engine has over the page's contents. Techniques include:
- Keyword Stuffing - Calculated placements of keywords within a page to raise the keyword count, variety, and density of the page
- Hidden/Invisible Text - Unrelated text disguised by making it the same color as the background, using a tiny font size, or hiding it within the HTML code
- Meta-tag Stuffing - Repeating keywords in meta tags and/or using keywords unrelated to the site's content
- Doorway Pages - Low quality webpages with little content, but relatable keywords or phrases
- Scraper Sites - Programs that allow websites to copy content from other websites and create content for a website
- Article Spinning - Rewriting existing articles as opposed to copying content from other sites
- Machine Translation - Uses machine translation to rewrite content in several different languages, resulting in illegible text
Link spam are links between pages present for reasons other than merit. Techniques include:
- Link-building Software - Automating the search engine optimization (SEO) process
- Link Farms - Pages that reference each other (also known as mutual admiration societies)
- Hidden Links - Placing hyperlinks where visitors won't or can't see them
- Sybil Attack - Forging of multiple identities for malicious intent
- Spam Blogs - Blogs created solely for commercial promotion and the passage of link authority to target sites
- Page Hijacking - Creating a copy of a popular website with similar content, but redirects web surfers to unrelated or even malicious websites
- Buying Expired Domains - Buying expiring domains and replacing pages with links to unrelated websites
- Cookie Stuffing - Placing an affiliate tracking cookie on a website visitor's computer without their knowledge
- Forum Spam - Websites that can be edited by users to insert links to spam sites
This is a SEO technique in which different materials and information are sent to the web crawler and to the web browser. It is commonly used as a spamdexing technique because it can trick search engines into either visiting a site that is substantially different from the search engine description or giving a certain site a higher ranking. https://en.wikipedia.org/w/index.php?title=Metasearch_engine&action=edit§ion=7#
- Federated search
- List of metasearch engines
- Search aggregator
- Search engine optimization
- Hybrid Search Engine
- Sandy Berger's Great Age Guide to the Internet by Sandy Berger. Que Publishing, 2005, ISBN 0-7897-3442-7.
- "Architecture of a Metasearch Engine that Supports User Information Needs" (PDF). Proceedings of the Eighth International Conference on Information Knowledge Management. 1999.
- Lawrence, S. and Lee Giles, C. (2014). Patent US6999959 - Meta search engine. [online] Google Books. Available at: http://www.google.com/patents/US6999959 [Accessed 20 Oct. 2014].
- The collection fusion problem. By E. M. Voorhees, Narendra K. Gupta, and Ben Johnson-Laird. NIST SPECIAL PUBLICATION SP, 1995, 95-95.
- "The Meta-search -- Search Engine History". Retrieved 5 August 2015.
- "Search engine rankings on HotBot: a brief history of the HotBot search engine". Retrieved 5 August 2015.
- "ABOUT US - Our history". Retrieved 5 August 2015.
- "Welcome to the Department of Informatics at the University of Fribourg". Retrieved 5 August 2015.
- Intelligence Exploitation of the Internet, 2002 [Accessed 10 May 2017].
- MENG, W. (2014). Metasearch Engines. [online] http://www.cs.binghamton.edu. Available at: http://www.cs.binghamton.edu/~meng/pub.d/EDBS_Metasearch.pdf [Accessed 20 Oct. 2014].
- Selberg, E., Etzioni ,O. (1997). "The MetaCrawler architecture for resource aggregation on the Web". IEEE expert. pp. 11–14. Retrieved April 3, 2014.
- Manoj, M Jacob, E. (July 2013). "Design and Development of a Programmable Meta Search Engine" (PDF). Foundation of Computer Science. pp. 6–11. Retrieved April 3, 2014.
- Patel, B. and Shah, D. (2014). RANKING ALGORITHM FOR META SEARCH ENGINE. [online] http://www.technicaljournalsonline.com. Available at: http://www.technicaljournalsonline.com/ijaers/VOL%20II/IJAERS%20VOL%20II%20ISSUE%20I%20%20OCTBER%20DECEMBER%202012/231.pdf [Accessed 21 Oct. 2014]..
- Manoj, M Elizabeth, Jacob (October 2008). "Information retrieval on Internet using Metasearch engines: A review". CSIR. pp. 739–746. Retrieved February 25, 2012.
- M, M. and Jacob, E. (2014). Information retrieval on Internet using meta-search engines: A review. [online] http://nopr.niscair.res.in. Available at: http://nopr.niscair.res.in/bitstream/123456789/2243/1/JSIR%2067(10)%20739-746.pdf [Accessed 27 Oct. 2014].
- Wu, S.; Crestani, F.; Bi, Y. (2006). "Evaluating Score Normalization Methods in Data Fusion". Information Retrieval Technology: 642–648. doi:10.1007/11880592_57.
- Manmatha, R. and Sever, H. (2014). A Formal Approach to Score Normalization for Meta-search. [online] http://maroo.cs.umass.edu. Available at: http://maroo.cs.umass.edu/pdf/IR-242.pdf [Accessed 27 Oct. 2014].
- Al-Kabi, M., Wahsheh, H. and Alsmadi, I. (2014). An Online Arabic Web Spam Detection System. [online] http://thesai.org. Available at: http://thesai.org/Downloads/Volume5No2/Paper_16-OLAWSDS_An_Online_Arabic_Web_Spam_Detection_System.pdf [Accessed 24 Oct. 2014].
- Najork, M. (2014). Web Spam Detection. [online] http://research.microsoft.com. Available at: http://research.microsoft.com/pubs/102938/eds-webspamdetection.pdf [Accessed 23 Oct. 2014].
- Vandendriessche, G., Altius, and Brussels, (2014). A few legal comments on spamdexing. [online] http://www.altius.com. Available at: http://www.altius.com/media/pdf_files/spamdexing.pdf [Accessed 22 Oct. 2014].
- Wang, Y., Ma, M., Niu, Y. and Chen, H. (2014). Connecting Web Spammers with Advertisers. [online] http://www2007.org/. Available at: http://www2007.org/papers/paper111.pdf [Accessed 24 Oct. 2014].