The Impact of Evolving Algorithms on Search Engine Optimization Strategies

Authors

  • Debmalya Mukherjee
  • Shuvrajit Nath
  • Shankar Prasad Mitra
  • Ranjan Banerjee
  • Partha Shankar Nayak

DOI:

https://doi.org/10.52783/jns.v14.3172

Keywords:

Search ranking enhancement, Website visibility improvement, Online presence optimization, Search result optimization, Web search improvement

Abstract

Strategies aimed at improving website visibility in search engine results, known as Search Engine Optimization (SEO), are commonly employed. However, the proliferation of internet-based malware has created new avenues for cybercriminals. In addition to conventional methods like malicious links or attachments in unsolicited emails, attackers are increasingly utilizing sophisticated tactics. A particularly concerning trend is the exploitation of search engines to distribute malware, which can have significant consequences. This approach, termed SEO poisoning, manipulates search results for popular search terms, spreading malware effectively. While a relatively recent phenomenon, it has proven to be both pervasive and impactful, often involving the compromise of legitimate websites and the creation of numerous fake pages targeting trending keywords

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: using statistical analysis to locate spam Web pages. In Proceedings of the 7th International Workshop on the Web and Databases, WebDB, 2004.

A. Moshchuk, T. Bragin, S. D. Gribble, and H. M. Levy. A crawler-based study of spyware on the Web. In Pro- ceedings of the Network and Distributed System Security Symposium, NDSS, 2006.

D. Arthur and S. Vassilvitskii. K-means++: the advan- tages of careful seeding. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, 2007.

C. Castillo, D. Donato, A. Gionis, V. Murdock, and F. Sil- vestri. Know your neighbors: Web spam detection using the Web topology. In Proceedings of the 30th Interna- tional ACM Conference on Research and Development inInformation Retrieval, SIGIR, 2007.

M. A. Rajab, L. Ballard, P. Mavrommatis, N. Provos, and X. Zhao. The nocebo effect on the web: an analysis of fakeanti-virus distribution. In Proceedings of the 3rd USENIX LEET, 2010

L. Lu, V. Yegneswaran, P. Porras, and W. Lee. Blade: an attack-agnostic approach for preventing drive-by malwareinfections. In Proceedings of the 17th ACM CCS, 2010

K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real- time url spam filtering service. In InProceedings of the IEEE S&P, 2011.

J. John, F. Yu, Y. Xie, M. Abadi, and A. Krishnamurthy. deSEO: Combating search-result poisoning. In Proceedings of the 20th USENIX Security, 2011.

Google search engine optimization. http://www.google.com/webmasters/.

Kozak The dirty little secrets of search. http://www.nytimes.com/2011/02/13/business/13search.html,February 2011.

https://www.bankinfosecurity.com/how-seo-poisoning-used-to-deploy-malware-a- 16882#:~:text=SEO%20poisoning%20is%20an%20illegitimate,websites%20to%20download%20malicious%20files.

Downloads

Published

2025-04-07

How to Cite

1.
Mukherjee D, Nath S, Prasad Mitra S, Banerjee R, Nayak PS. The Impact of Evolving Algorithms on Search Engine Optimization Strategies. J Neonatal Surg [Internet]. 2025Apr.7 [cited 2025Jun.18];14(13S):46-50. Available from: https://jneonatalsurg.com/index.php/jns/article/view/3172

Most read articles by the same author(s)