Juice: A Longitudinal Study of an SEO Botnet

@inproceedings{Wang2013JuiceAL,
  title={Juice: A Longitudinal Study of an SEO Botnet},
  author={David Y. Wang and Stefan Savage and Geoffrey M. Voelker},
  booktitle={NDSS},
  year={2013}
}
Black hat search engine optimization (SEO) campaigns attract and monetize traffic using abusive schemes. Using a combination of Web site compromise, keyword stuffing and cloaking, a SEO botnet operator can manipulate search engine rankings for key search terms, ultimately directing users to sites promoting some kind of scam (e.g., fake antivirus). In this paper, we infiltrate an influential SEO botnet, GR, characterize its dynamics and effectiveness and identify the key scams driving its… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 30 CITATIONS

Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

  • Internet Measurement Conference
  • 2014
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Accurate Detection of Automatically Spun Content via Stylometric Analysis

  • 2017 IEEE International Conference on Data Mining (ICDM)
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Domain names abuse and TLDs: From monetization towards mitigation

  • 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
  • 2017
VIEW 1 EXCERPT

References

Publications referenced by this paper.
SHOWING 1-10 OF 19 REFERENCES

Cloak and dagger: dynamics of web search cloaking

  • ACM Conference on Computer and Communications Security
  • 2011
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

The Underground Economy of Fake Antivirus Software

Brett Stone-Gross, Ryan Abman, +3 authors Giovanni Vigna
  • WEIS
  • 2011
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Latest SEP (Search Engine Poisoning) Research, Part 1-7

C. Larsen
  • http: //www.bluecoat.com/security/ security-archive/2012-02-15/ latest-sep-search-engine-poisoningresearch-part-1,
  • 2012
VIEW 1 EXCERPT

Search Ad Spending Could Hit $19.51

D. Goodwin
  • Billion in 2012. http://searchenginewatch. com/article/2143093/ Search-Ad-Spending-Could-Hit-19
  • 2012
VIEW 1 EXCERPT

Click Trajectories: End-to-End Analysis of the Spam Value Chain

  • 2011 IEEE Symposium on Security and Privacy
  • 2011
VIEW 1 EXCERPT

Fashion crimes: trending-term exploitation on the web

  • ACM Conference on Computer and Communications Security
  • 2011
VIEW 1 EXCERPT

Huge Decline in Fake AV Following Credit Card Processing Shakeup. http://krebsonsecurity.com/2011/ 08/huge-decline-in-fake-avfollowing-credit-card-processingshakeup

B. Krebs
  • 2011
VIEW 2 EXCERPTS