Ishu again talk about the Web site is malicious brush traffic and malicious clicks to solve the idea

Source: Internet
Author: User
Keywords Malicious clicks

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

1.5 months ago, Guangzhou Yi Tiger published a "Tragic, web site is malicious brush flow, introduced the easy Tiger interconnection encounter malicious brush with malicious peers when the flow of some experience and views, here, easy Tiger again to talk about the site is malicious brush flow of solutions. By the way, talk about the malicious click of another way of thinking.

From the type of malicious brush flow, probably can be divided into two kinds, one is less IP more PV, the other is more than IP PV.

One, less IP multiple PV (seo applicable)

There are not too many IP numbers in this case, a person may change the IP on the site to refresh, but can change the IP is limited, such as the use of ADSL dial-up, you can change the IP, but inefficient, if the other side of the use of tool software to change the IP, the principle is the same, the number of IP is limited, It is possible that 2-3 IP will produce hundreds of thousands of PV. It can be understood that the first is the individual client to a page for a F5-style refresh, simple to a page refresh. Ishu previously encountered is this situation of malicious brush flow, this situation is easier to solve, as long as the other side is to determine the malicious brush flow, you can take measures, specific measures can be in the easy Tiger earlier for Baidu bid to promote the "anti-malicious click Code System Ideas and implementation" introduced in the method, By identifying the visitor's flow device and other parameters, the malicious brush PV Machine screen closed, or even simple attacks. Although this problem solution is not difficult, but if the solution is not easy, the site is very easily due to the sudden rise of PV or suddenly reduce the search engine into the sandbox, or even K station. Need solutions for children shoes can be viewed: "Malicious click Code System Ideas and implementation."

Multi-IP multi-PV (applicable to bid promotion)

In this case, the IP number and PV value will not be much different, perhaps each IP corresponds to have 2-3 PV, this is "China Internet high-speed development" product, there is a lot of this type of software on the network, its nature is a bit like Peer-to-peer software, the biggest feature is the use of this software, will become one of the malicious clicks, As long as you open the software, you have a nationwide brush circle. Purchase available clicks or refreshes by hanging or RMB. Some people use this software to Baidu's bidding ads for malicious clicks, or Taobao through the through-train malicious clicks, flexible application, this software can not be underestimated. Although Baidu or Taobao has the ability, or have the strength to organize or build a counter to this software team or technology, but from a commercial point of view, this software in the short term is to promote their advertising revenue, in the long run, this software will lead to unfair competition, and ultimately disrupt the market, thus affecting the fundamental interests of advertising. So is this software the enemy of Baidu or Taobao? This to their own to judge, because at present, they do not have any effective measures to protect the interests of advertisers, be malicious point ads, can only silently bear the loss.

Then, back to the solution to the problem, this software is not just random IP, and smart to be able to randomly open the homepage of the Brush site link, but also with a random stay n seconds of "browsing time", so the simulation, but also how to prevent it? This is really a problem, it is Baidu, I don't think I can give you the perfect solution. Can only say that the Chinese are too clever, always try to deal with their own people, but did not put their minds on the country has contributed to the development of technology.

Since there is no perfect solution, it can only be returned to the second, to find ways to reduce the loss. To find a solution here, there are two aspects to be analysed:

1. SEO for website

SEO for the site, this brush flow seems to have no harm, so here is not to talk about the solution, because no competitor will help you brush the flow. Most site owners will take the initiative to try to use this kind of software, and even in the major sites are advertising, the content is roughly: "Baidu top three page rankings, one day into the home page, you dare?" If you are looking for traffic, then you can try, as to the specific effect, the consequences of conceit. Ishu only give advice: any illegal or not user experience for the purpose of SEO means, even if the short-term benefits, ultimately can only end in failure.

2, for the bidding advertising (this part should be the proposition of malicious click to solve the idea)

For competitive advertising, this malicious click is basically not able to prevent. So how do you reduce the damage? There are generally two kinds of malicious clicks on the Internet, one is to limit the consumption of keywords, the other is to restrict access to IP. In this case, the second method is clearly not feasible. So the first method works? Think casually with the head, all know that this is not realistic, malicious traffic keywords with uncertainty, not every keyword is limited to traffic, the most important point is that the keywords are key keywords, high conversion key words, if limited costs, it is tantamount to give up the key keyword competition.

To this end, the Yi Tiger staff specifically to study some of this type of software to find solutions. After study, this kind of software type is many, although many kinds, but are very similar, seems to be the same source, the biggest feature is the basic reliance on virtual machines (VMware), the other is, these software did not form a big alliance (illegal-big league will be blocked), are a small circle. This means that these software support users are not many, most of the dozens of or hundreds people in use. That is, we may be able to reduce losses by shutting down the dozens of or hundreds machines. Through access to information, we found that through the Web site program is unable to detect whether the user is using a virtual machine to access, "Malicious click Code System Ideas and implementation" is also mentioned in the article, the Web site program can not judge the MAC address systems such as key information, so the idea of a virtual machine through the screen is not realistic, Then there's only one alternative: find a machine that clicks every day.

This type of software can be set every day to click on a website to launch the number of ads, time to release the free set, but must be every day someone to point, even if not every day, at least also intermittent click. So let's take a look at this part of the rule: the malicious clicks are a circle, they all use virtual machines, each day each person's task is to the circle of people set the Click Object for a Rotary click, of course, these are implemented by the software.

Well, that's enough to know, we first, to visit the website of the aircraft to record, this point with ASP or PHP are very easy to do, and then compare these visitors whether in recent days there are multiple clicks, keywords are the same, if a machine clicks on a keyword more than n times, Then you can set this visitor may be malicious clicks, with JS to hint, "please do not frequent through the search engine to enter the site, like the site can be clicked Collection", if the faithful visitors estimated on the collection, malicious clicks will ignore, if the user a keyword clicks more than n? times, stating that this user does not listen to advice, Can only be hard, through the screen or simple prompts, so that the malicious click Machine can no longer click behavior.

So far, Guangzhou Tiger detailed the site is malicious brush traffic and malicious click of the various possibilities and corresponding solutions, like the study of children's shoes can be discussed together. Easy Tiger Interconnection hope the environment becomes more and more harmonious ...

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.