The Impact of Evolving Algorithms on Search Engine Optimization Strategies
DOI:
https://doi.org/10.52783/jns.v14.3172Keywords:
Search ranking enhancement, Website visibility improvement, Online presence optimization, Search result optimization, Web search improvementAbstract
Strategies aimed at improving website visibility in search engine results, known as Search Engine Optimization (SEO), are commonly employed. However, the proliferation of internet-based malware has created new avenues for cybercriminals. In addition to conventional methods like malicious links or attachments in unsolicited emails, attackers are increasingly utilizing sophisticated tactics. A particularly concerning trend is the exploitation of search engines to distribute malware, which can have significant consequences. This approach, termed SEO poisoning, manipulates search results for popular search terms, spreading malware effectively. While a relatively recent phenomenon, it has proven to be both pervasive and impactful, often involving the compromise of legitimate websites and the creation of numerous fake pages targeting trending keywords
Downloads
Metrics
References
D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: using statistical analysis to locate spam Web pages. In Proceedings of the 7th International Workshop on the Web and Databases, WebDB, 2004.
A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the Web. In Pro- ceedings of the Network and Distributed System Security Symposium, NDSS, 2006.
D. Arthur and S. Vassilvitskii. K-means++: the advan- tages of careful seeding. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, 2007.
C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Sil- vestri. Know your neighbors: Web spam detection using the Web topology. In Proceedings of the 30th Interna- tional ACM Conference on Research and Development inInformation Retrieval, SIGIR, 2007.
M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The nocebo effect on the web: an analysis of fakeanti-virus distribution. In Proceedings of the 3rd USENIX LEET, 2010
L. Lu, V. Yegneswaran, P. Porras, and W. Lee. Blade: an attack-agnostic approach for preventing drive-by malwareinfections. In Proceedings of the 17th ACM CCS, 2010
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real- time url spam filtering service. In InProceedings of the IEEE S&P, 2011.
J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proceedings of the 20th USENIX Security, 2011.
Google search engine optimization. http://www.google.com/webmasters/.
Kozak The dirty little secrets of search. http://www.nytimes.com/2011/02/13/business/13search.html,February 2011.
https://www.bankinfosecurity.com/how-seo-poisoning-used-to-deploy-malware-a- 16882#:~:text=SEO%20poisoning%20is%20an%20illegitimate,websites%20to%20download%20malicious%20files.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.