Cloaker Catcher: A Client-based Cloaking Detection System

نویسندگان

  • Ruian Duan
  • Weiren Wang
  • Wenke Lee
چکیده

Cloaking has long been exploited by spammers for the purpose of increasing the exposure of their websites. In other words, cloaking has long served as a major malicious technique in search engine optimization (SEO). Cloaking hides the true nature of a website by delivering blatantly different content to users versus web crawlers. Recently, we have also witnessed a rising trend of employing cloaking in search engine marketing (SEM). However, detecting cloaking is challenging. Existing approaches cannot detect IP cloaking and are not suitable for detecting cloaking in SEM because their search-and-visit method leads to click fraud. In addition, they focus on detecting and measuring cloaking on the server side, but the results are not visible to users to help them avoid frauds. Our work focuses on mitigating IP cloaking and SEM cloaking, and providing client-based real-time cloaking detection services. To achieve these goals, we first propose the Simhash-based Website Model (SWM), a condensed representation of websites, which can model natural page dynamics. Based on SWM, we design and implement Cloaker Catcher, an accurate, efficient and privacy-preserving system, that consists of a server that crawls websites visited by users on demand and a client-side extension that fetches spider views of websites from the server and compares them with user views to detect cloaking. Since Cloaker Catcher checks on the client side for each real user, IP cloaking can be detected whenever it occurs and click fraud in SEM can also be prevented. Using our system, we conducted the first analysis of SEM cloaking and found that the main purpose of SEM cloakers is to provide illicit services.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Catching Remote Administration Trojans (RATs)

A Remote Administration Trojan (RAT) allows an attacker to remotely control a computing system and typically consists of a server invisibly running and listening to specific TCP/UDP ports on a victim machine as well as a client acting as the interface between the server and the attacker. The accuracy of host and/or network-based methods often employed to identify RATs highly depends on the qual...

متن کامل

Detecting Stealth Web Pages That Use Click-Through Cloaking

Search spam is an attack on search engines’ ranking algorithms to promote spam links into top search ranking that they do not deserve. Cloaking is a wellknown search spam technique in which spammers serve one page to search-engine crawlers to optimize ranking, but serve a different page to browser users to maximize potential profit. In this experience report, we investigate a different and rela...

متن کامل

Sensitive Semantics-Aware Personality Cloaking on Road-Network Environment

Recently, several cloaking methods based on K-anonymity and L-diversity has been proposed to protect the user’s location privacy for Location-based Services (LBS). Considering that a cloaking region could contain some semantic places, which can easily endanger the user’s privacy, it is not safe to cloak the user’s location only consider Kanonymity and L-diversity. This paper presents a novel pe...

متن کامل

Cloaking locations for anonymous location based services: a hybrid approach

An important privacy issue in Location Based Services(LBS) is to hide a user’s identity while still provide quality location based services. Previous work has addressed the problem of locational K-anonymity either based on centralized or decentralized schemes. However, a centralized scheme relies on an anonymizing server(AS) for location cloaking, which may become the performance bottleneck whe...

متن کامل

Spatial Cloaking Algorithms for Location Privacy

DEFINITION Spatial cloaking is a technique to blur a user’s exact location into a spatial region in order to preserve her location privacy. The blurred spatial region must satisfy the user’s specified privacy requirement. The most widely used privacy requirements are k-anonymity and minimum spatial area. The k-anonymity requirement guarantees that a user location is indistinguishable among k us...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1710.01387  شماره 

صفحات  -

تاریخ انتشار 2017