A Taxonomy of Hyperlink Hiding Techniques

  • Guang-Gang Geng
  • Xiu-Tao Yang
  • Wei Wang
  • Chi-Jie Meng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8709)


Hidden links are designed solely for search engines rather than visitors. To get high search engine rankings, link hiding techniques are usually used for the profitability of underground economies, such as illicit game servers, false medical services, illegal gambling, and less attractive high-profit industry. This paper investigates hyperlink hiding techniques on the Web, and gives a detailed taxonomy. We believe the taxonomy can help develop appropriate countermeasures.

Statistical experimental results on real Web data indicate that link hiding techniques are very prevalent. We also tried to explore the attitude of Google towards link hiding spam by analyzing the PageRank values of relative links. The results show that more should be done to punish the hidden link spam.


Web spam link hiding hidden spam spam detection 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems 30(1), 107–117 (1998)CrossRefGoogle Scholar
  2. 2.
    Chellapilla, K., Maykov, A.: A taxonomy of javascript redirection spam. In: Proceedings of the 3rd International Workshop on Adversarial Information Retrieval on the Web, pp. 81–88. ACM (2007)Google Scholar
  3. 3.
    Erdélyi, M., Garzó, A., Benczúr, A.A.: Web spam classification: a few features worth more. In: Proceedings of the 2011 Joint WICOW/AIRWeb Workshop on Web Quality, pp. 27–34. ACM (2011)Google Scholar
  4. 4.
    Flanagan, D.: JavaScript: the definitive guide. O’Reilly Media, Incorporated (2006)Google Scholar
  5. 5.
    Google: Webmaster guidelines - webmaster tools help (2013), (accessed January 17, 2013)
  6. 6.
    Gyongyi, Z., Garcia-Molina, H.: Web spam taxonomy. In: First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb 2005) (2005)Google Scholar
  7. 7.
    Gyöngyi, Z., Garcia-Molina, H., Pedersen, J.: Combating web spam with trustrank. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol. 30, pp. 576–587. VLDB Endowment (2004)Google Scholar
  8. 8.
    Kleinberg, J.: Authoritative sources in a hyperlinked environment. Journal of the ACM (JACM) 46(5), 604–632 (1999)CrossRefzbMATHMathSciNetGoogle Scholar
  9. 9.
    Liu, Y., Chen, F., Kong, W., Yu, H., Zhang, M., Ma, S., Ru, L.: Identifying web spam with the wisdom of the crowds. ACM Transactions on the Web (TWEB) 6(1),  2 (2012)Google Scholar
  10. 10.
    Mori, S., Nishida, H., Yamada, H.: Optical character recognition. John Wiley & Sons, Inc. (1999)Google Scholar
  11. 11.
    Ng, A., Zheng, A., Jordan, M.: Stable algorithms for link analysis. In: Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 258–266. ACM (2001)Google Scholar
  12. 12.
    Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web (1999)Google Scholar
  13. 13.
    Snapshotter (2013), (accessed Febrary 20, 2013)
  14. 14.
    Spirin, N., Han, J.: Survey on web spam detection: principles and algorithms. ACM SIGKDD Explorations Newsletter 13(2), 50–64 (2012)CrossRefGoogle Scholar
  15. 15.
    element Wikipedia, The Free Encyclopedia, B (2013), (accessed January 20, 2013)
  16. 16.
    Wikipedia: Marquee element — Wikipedia, the free encyclopedia (2013), (accessed January 19, 2013)
  17. 17.
    Wikipedia: Spamdexing — Wikipedia, the free encyclopedia (2013), (accessed January 17, 2013)
  18. 18.
    Wkhtmltopdf (2013), (accessed Febrary 20, 2013)
  19. 19.
    Wu, B., Davison, B.: Cloaking and redirection: A preliminary study. In: First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb 2005) (2005)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Guang-Gang Geng
    • 1
  • Xiu-Tao Yang
    • 2
  • Wei Wang
    • 1
  • Chi-Jie Meng
    • 1
  1. 1.China Internet Network Information Center, Computer Network Information CenterChinese Academy of SciencesBeijingChina
  2. 2.Beijing Institute of Electronic System EngineeringBeijingChina

Personalised recommendations