Blackhat Search Engine Optimization Techniques (SEO) and Counter Measures

Authors

  • Dr. R. D. Gaharwar  G. H. Patel Department of Computer Science & Technology, Sardar Patel University, Vallabh Vidyanagar, Gujarat, India
  • Prof. D. B. Shah  G. H. Patel Department of Computer Science & Technology, Sardar Patel University, Vallabh Vidyanagar, Gujarat, India

DOI:

https://doi.org//10.32628/IJSRST1840117

Keywords:

Search engines, Search Engine Optimization (SEO), Spamdexing, Meta tags, Spamming

Abstract

Search engine are being used by the most of the World population as their basic information retrieval system for getting useful information from internet. As a service provider who uses internet for digital marketing it becomes mandatory to get high ranks from search engines. Search engines optimization (SEO) techniques are used for this purpose. Black hat SEO techniques are used for quick results but are prohibited by most of the search engines. Hence web space users or website developers should be well aware of SEO techniques and how to use them in optimal way. This paper presents some of the most commonly used black hat SEO techniques and the counter measures done by different search engines to prohibit them.

References

  1. Rehman, K., & Khan, M. N. A. (2013). The foremost guidelines for achieving higher ranking in search results through Search Engine Optimization. International Journal of Advanced Science and Technology,52, 101-110.
  2. Danko, A. The concept of web search engines and metacrawlers within the Internet environment.
  3. Selberg, E., & Etzioni, O. (1995, December). Multi-service search and comparison using the MetaCrawler. In Proceedings of the Fourth Int'l WWW Conference, Boston
  4. Dr. B. V. Patel and Dr. R D Gaharwar.(2018) Search Engine Optimization (SEO) using HTML Meta-Tags. International Journal of Scientific Research in Science and Technology(IJSRST) , vol. 4 , Issue 9, page: 298-302.
  5. Dr. B. V. Patel and Dr. Dipti Shah.(2011) Adaptive Systems and Search Engine Optimization. International Journal of Information and Computing Technology, ISSN: 0976-5999, vol. 1 , Issue 2, page: 14-15.
  6. Laria, V.G., Griffiths, R., Winstanley, G.: Application of a clustering algorithm to recover topic content in an unstructured text-based environment. https://www.researchgate.net/profile/ Graham_Winstanley/publication/2504349_Application_of_a_Clustering_Algorithm_to_Recover_Topic_Content_in_an_Unstructured_TextBased_Environment/links/02e7e52f231abb5cac000000.pdf
  7. T. Bhatia (2011). Link Analysis Algorithm For Web Mining. International Journal of Computer Science And Technology, Vol. 2, Issue 2, pp. 243-246.
  8. http://www.seochat.com/c/a/search-engine-optimization-help/hidden-text-in-websites/
  9. https://www.searchenginejournal.com/hidden-text-seo/208866/

Downloads

Published

2018-11-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. R. D. Gaharwar, Prof. D. B. Shah, " Blackhat Search Engine Optimization Techniques (SEO) and Counter Measures, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 11, pp.27-32, November-December-2018. Available at doi : https://doi.org/10.32628/IJSRST1840117