Jump to content

Adversarial information retrieval

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Anthony717 (talk | contribs) at 12:05, 16 January 2011 (not zero sum gain. spammers cause massive harm for relatively small rewards.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Adversarial information retrieval (adversarial IR) is a topic in information retrieval related to strategies for working with a data source where some portion of it has been manipulated maliciously. Tasks can include gathering, indexing, filtering, retrieving and ranking information from such a data source. Adversarial IR includes the study of methods to detect, isolate, and defeat such manipulation.

On the Web, the predominant form of such manipulation is search engine spamming (also known as spamdexing), including techniques that are employed to disrupt the activity of web search engines, usually for financial gain. Examples of spamdexing are link-bombing, comment or referrer spam, spam blogs (splogs), malicious tagging, reverse engineering of ranking algorithms, advertisement blocking, and web content filtering [1].

Activities intended to poison the supply of useful data make search engines less useful for users. If search engines are more exclusionary they risk becoming more like directories and less dynamic.

Topics

Topics related to Web spam (spamdexing):

Other topics:

History

The term "adversarial information retrieval" was first coined in 2000 by Andrei Broder (then Chief Scientist at Alta Vista) during the Web plenary session at the TREC-9 conference[2].

See also

References

  • AIRWeb: series of workshops on Adversarial Information Retrieval on the Web
  • Web Spam Challenge: competition for researchers on Web Spam Detection
  • Web Spam Datasets: datasets for research on Web Spam Detection