|
Adversarial information retrieval (adversarial IR) is a topic in information retrieval related to strategies for working with a data source where some portion of it has been manipulated maliciously. Tasks can include gathering, indexing, filtering, retrieving and ranking information from such a data source. Adversarial IR includes the study of methods to detect, isolate, and defeat such manipulation. On the Web, the predominant form of such manipulation is search engine spamming (also known as spamdexing), which involves employing various techniques to disrupt the activity of web search engines, usually for financial gain. Examples of spamdexing are link-bombing, comment or referrer spam, spam blogs (splogs), malicious tagging. Reverse engineering of ranking algorithms, advertisement blocking, click fraud,〔Jansen, B. J. (2007) (Click fraud ). IEEE Computer. 40(7), 85-86.〕 and web content filtering may also be considered forms of adversarial data manipulation.〔B. Davison, M. Najork, and T. Converse (2006), (SIGIR Worksheet Report: Adversarial Information Retrieval on the Web (AIRWeb 2006) )〕 Activities intended to poison the supply of useful data make search engines less useful for users. If search engines are more exclusionary they risk becoming more like directories and less dynamic. == Topics == Topics related to Web spam (spamdexing): * Link spam * Keyword spamming * Cloaking * Malicious tagging * Spam related to blogs, including comment spam, splogs, and ping spam Other topics: * Click fraud detection * Reverse engineering of search engine's ranking algorithm * Web content filtering * Advertisement blocking * Stealth crawling *Troll (Internet) * Malicious tagging or voting in social networks * Astroturfing * Sockpuppetry 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Adversarial information retrieval」の詳細全文を読む スポンサード リンク
|