<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Protection System for Analysis of External Link Placing</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ivan Liminovych</string-name>
          <email>liminovych@olimpdigital.com</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadym Poltorak</string-name>
          <email>v.poltorak@kpi.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nadia Kushnir</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Zhurakovskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergiy Obushnyi</string-name>
          <email>s.obushnyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,
          <addr-line>37 Beresteiskyi pros., Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Olimp Digital</institution>
          ,
          <addr-line>17b Mala Berdychivska str., Zhytomyr, 10014</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Zhytomyr Polytechnic State University</institution>
          ,
          <addr-line>103 Chudnivska str., Zhytomyr, 10005</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>179</fpage>
      <lpage>188</lpage>
      <abstract>
        <p>In the rapidly evolving digital landscape, effective Internet marketing strategies, particularly Search Engine Optimization (SEO), have become crucial for businesses. A novel system for optimizing SEO through strategic link placement on external internet resources is presented. At its core, an innovative algorithm analytically evaluates potential link-hosting platforms, focusing on key SEO metrics for optimal search engine visibility and authority. Emphasizing security, the system utilizes the Laravel PHP framework to guard against cyber threats, safeguarding user data integrity. This system offers a blend of enhanced SEO efficacy and robust security measures, revolutionizing online marketing through precise analysis, advanced security, and flexible user management.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Search engine optimization</kwd>
        <kwd>link analysis</kwd>
        <kwd>security</kwd>
        <kwd>data protection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Link Analysis System</title>
      <p>
        In our time, when digital technologies and
information systems play a crucial role in
shaping business strategies, the significance of
Internet marketing and the effective use of SEO
tools is rapidly increasing [
        <xref ref-type="bibr" rid="ref1">1, 2</xref>
        ].
      </p>
      <p>
        SEO is a critically important aspect of
modern digital marketing, playing a significant
role in shaping business strategies. This
process includes a series of actions aimed at
increasing a website’s visibility in search
engine results like Google. The primary goal of
SEO is to increase organic traffic to the site by
ensuring high positions in search results for
key queries [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. Such positioning is
important as it ensures high brand visibility,
attracts the target audience, and enhances the
competitiveness of the enterprise in the digital
space [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Scientific research in the field of digital
marketing confirms that effective SEO use not
only contributes to increased traffic and
improved online presence but also serves as a
tool for creating a better user experience
through content and website structure
optimization [6]. This, in turn, leads to
increased brand trust and long-term
strengthening of the company’s market
position. Thus, SEO is not just a marketing tool
but a comprehensive strategy that contributes
to the holistic development of a business in the
digital economy [
        <xref ref-type="bibr" rid="ref5 ref6">5–7</xref>
        ].
      </p>
      <sec id="sec-1-1">
        <title>1.1. Link Analysis System Goal</title>
        <p>
          An SEO optimization strategy that includes
placing external links becomes a key element
in increasing a website’s visibility in search
engines. This is important because a high
position in search results can significantly
increase web resource traffic, as well as its
authority and recognition in the digital world.
The importance of choosing quality and
relevant external resources for links cannot be
underestimated, as they affect the site’s
perception by search engines and its final
placement in the search output. Attention must
be paid to the context in which links are placed
and their relevance to the overall site theme to
avoid a negative impact on the SEO rating.
Improperly chosen resources can lead not only
to loss of potential traffic but also negatively
affect the website’s reputation, causing
skepticism among users and search engines [
          <xref ref-type="bibr" rid="ref6">7</xref>
          ].
        </p>
        <p>
          In the context of developing a system for
effective analysis of SEO parameters, the use of
an algorithmic approach to evaluate potential
platforms for placing links is important. Such a
system includes a comprehensive analysis of
key aspects: from the authority and popularity
of the domain, its history, and traffic, to the
analysis of content published on the site, its
quality, uniqueness, and relevance to the target
audience [
          <xref ref-type="bibr" rid="ref7">8</xref>
          ]. This comprehensive approach
allows for a deeper dive into the context of link
placement, assessing not only their potential
impact on SEO but also their overall alignment
with the brand or company’s marketing
strategy. The analysis may also include
checking for negative SEO factors, such as
spam links or artificially excessive
optimization, which can lead to a site’s rating
decline. Using such a system minimizes the
risks associated with choosing unreliable or
ineffective resources for link placement,
thereby ensuring more stable and effective
growth in search engine rankings.
        </p>
        <p>
          It’s worth mentioning a functionally similar
system like LinkChecker Pro [
          <xref ref-type="bibr" rid="ref8">9</xref>
          ].
        </p>
        <p>LinkChecker Pro is a backlink management
tool designed for various users, including
linkbuilding specialists, SEO experts, project
managers, and business owners. It provides the
ability to monitor and manage the status of
backlinks, Google indexing, rel attributes, robots
meta tags, and other parameters. The tool also
provides notifications and reports on changes in
the link status, access to detailed analytics, and
the ability to conduct bulk analysis. The
application interface is shown in Fig. 1.</p>
        <p>The program offers several tariff plans,
starting from $21 per month for small
businesses and marketing beginners, to plans
for large agencies and enterprises, which can
be customized according to their needs.
LinkChecker Pro users note its advantages
such as reducing stress, automating routine
tasks, improving team management, and
supporting only quality backlinks.</p>
      </sec>
      <sec id="sec-1-2">
        <title>1.2. Link Analysis Basics</title>
        <p>
          The innovation of the proposed system lies in
its comprehensive approach to analyzing and
selecting resources for link placement. The use
of advanced technologies to obtain various SEO
metrics from internet resources where links
are planned to be placed ensures its relevance
and effectiveness in the long term. The system
can analyze these metrics and inform about the
advisability or inadvisability of placing links on
resources. This approach not only enhances
the effectiveness of SEO strategies but also
prevents financial losses due to the use of
inappropriate resources that will not provide
the expected result [
          <xref ref-type="bibr" rid="ref9">10</xref>
          ].
        </p>
        <p>
          The link analysis consists of two stages—
checking page indexing indicators for search
engines and taking statistical page indicators.
The first stage includes indicators such as:
• Whether the page is found: relates to the
HTTP response status that the page
returns when trying to access it, whether
the page exists and loads successfully.
• Whether the page has the &lt;meta
name="robots" content="noindex,
nofollow"&gt; tag (or individually noindex,
and nofollow): noindex instructs search
engines not to index the page, i.e., not to
add it to their search results, nofollow
indicates that search engines should not
follow the links on this page [
          <xref ref-type="bibr" rid="ref10">11</xref>
          ].
• Whether the page has an x-robots status
noindex: This is an HTTP header that can
also be used to instruct search engines.
The X-Robots-Tag header with a noindex
value instructs not to index this page.
• Whether the page is closed in robots.txt:
this is a file on the server that gives
instructions to web crawlers about which
pages or sections of the site they should or
should not visit. If a page is “closed” in
robots.txt, it means that web crawlers are
instructed not to visit this page.
• Whether the page corresponds to the
canonical tag: this tag is used to indicate
the main version of the page if there are
duplicates or very similar versions.
• Whether the page is indexed in Google:
this means whether the page has been
added to Google’s index and can appear
in Google’s search results.
        </p>
        <p>These page indicators generally relate to
the indexing and accessibility of the page for
search engines. They include detecting pages,
checking for meta tags that control indexing,
checking for compliance with canonical tags,
and Google indexing status.</p>
        <p>
          The second stage involves obtaining
indicators related to search engine optimization
and website authority. Each of them plays an
important role in determining the popularity,
reliability, and visibility of the website in search
engines. These indicators include:
• Domain Rating (DR): This indicator
reflects the authority of the domain
based on the quality and quantity of
external links pointing to it. A higher DR
rating indicates that the website has
more high-quality inbound links, which
can positively affect its position in search
engines [
          <xref ref-type="bibr" rid="ref11">12</xref>
          ].
• Referring Domains (RD): This is the
number of unique domains that link to
the website. This indicator is important
because search engines consider sites
with a large number of inbound links
from different domains to be more
authoritative and reliable [
          <xref ref-type="bibr" rid="ref12">13</xref>
          ].
• Pages: This is the total number of web
pages on the site. A larger number of
pages can mean more content for
indexing by search engines, which can
increase the site’s visibility.
• Organic Keywords (OK): This indicator
reflects the number of keywords for which
the site appears in search queries in search
engines. A higher number of organic
keywords can indicate greater visibility
and attractiveness of the site [
          <xref ref-type="bibr" rid="ref13">14</xref>
          ].
• Organic Traffic (OT): This is the number
of website visits obtained through free
search queries. High organic traffic is an
indicator of the effectiveness of SEO
strategies and the site’s popularity
among users [
          <xref ref-type="bibr" rid="ref14">15</xref>
          ].
• URL Rating (UR): This indicator is similar
to DR but assesses the authority of a
specific web page, not the entire domain. It
is based on the quality and quantity of
links pointing to this page [
          <xref ref-type="bibr" rid="ref15">16</xref>
          ].
• Trust Flow (TF): This metric measures
the reliability of a site based on the
quality of the links pointing to it. Sites
with high TF are usually associated with
high-quality and reliable sources [
          <xref ref-type="bibr" rid="ref16">17</xref>
          ].
• Citation Flow (CF): This indicator assesses
the influence of a website based on the
number of links pointing to it, regardless of
the quality of these links. A higher CF
indicates a greater number of links but not
necessarily high quality [
          <xref ref-type="bibr" rid="ref17">18</xref>
          ].
        </p>
        <p>To obtain data related to search engine
optimization and website authority, APIs from
Ahrefs and Majestic were used. Both of these
tools are integral in the analysis of SEO and the
evaluation of websites.</p>
        <p>
          Ahrefs is a leading tool for backlink analysis
and SEO auditing. It provides extensive
information on backlinks, organic search,
keywords, and other factors influencing SEO.
Ahrefs is also instrumental in determining
Domain Rating (DR) and URL Rating (UR),
which are key indicators of a domain’s and
individual web pages’ authority [
          <xref ref-type="bibr" rid="ref18">19</xref>
          ].
        </p>
        <p>
          Majestic specializes in backlink analysis and
boasts one of the largest link databases in the
world. This tool provides detailed insights into
metrics such as Trust Flow (TF) and Citation
Flow (CF). Trust Flow evaluates the
trustworthiness of a website based on the quality
of links pointing to it, while Citation Flow
assesses a website’s influence based on the
number of links pointing to it, regardless of their
quality [
          <xref ref-type="bibr" rid="ref19">20</xref>
          ].
        </p>
        <p>By using these tools, a comprehensive
understanding of a website’s SEO standpoint can
be obtained. This includes an evaluation of the
quality of backlinks, domain authority, and page
influence, as well as an understanding of the
impact of organic traffic and keywords on the
overall visibility of the website in search engines.</p>
      </sec>
      <sec id="sec-1-3">
        <title>Algorithm for</title>
        <p>After these indicators are collected, their analysis
takes place. Fig. 2 shows a flowchart of the link
analysis algorithm for evaluating donor sites.
The algorithm starts with a list of donors and
uses a series of metrics to classify domains as
“Bad Donor”, “Good Donor”, or “Potential Spam”.
Key steps of this algorithm include:
• Checking Domain Rating. If DR is less than
or equal to 10, the domain is classified as a
“Bad Donor”.
• For domains with DR greater than 10, the
number of Referring Domains is analyzed.
If RD is less than or equal to 50, the domain
is also classified as a “Bad Donor”.
• Organic Traffic is then assessed. If OT is
less than or equal to 500, the domain is
classified as a “Bad Donor”.
• If OT is more than 500, it is checked
whether Referring Domains are greater
than Organic Traffic. If so, the domain may
be classified as “Potential Spam”.
• If RD is less than or equal to OT, the
analysis continues with Organic Keywords
and URL Rating.
• If OK is less than or equal to 5, Trust Flow
and Citation Flow are checked.
• If TF is greater than or equal to 10, and CF
is less than or equal to TF, the domain is
classified as a “Good Donor”.
• If UR equals 0, the domain is classified as
“Potential Spam”.
• If the OK is more than 5, the domain is
considered a “Good Donor”.</p>
        <p>The proposed flowchart demonstrates a
systematic approach to evaluating websites to
determine their value as link donors.</p>
        <p>Only those donors that receive the status of
“Good Donor” at the output of the algorithm
are economically feasible.</p>
        <p>Additionally, the system has sufficient
functionality for reporting, namely:
• Domain reporting: Each domain can
have many different link donors, each
with its own price. The system allows for
exporting a report by domain to
understand when and how money was
spent on it.
• User reporting: Each user will have a fee
for placing a link on the resource.
Managers will be able to receive reports
on users for a month or a year.
• Project reporting: Links can be divided
by projects. There is functionality for
obtaining reports on the use of financial
resources on links related to a given
project.
• Obtaining reports on the use of financial
resources on links related to a given
project.</p>
        <p>No
No
No
No</p>
        <p>Donors
DR&gt;10</p>
        <p>RD&gt;50
Yes
Yes
Yes</p>
        <p>OT&gt;500</p>
        <p>RD&gt;OT
No</p>
        <p>OK&gt;5</p>
        <p>Yes</p>
        <p>Yes
Good Donor</p>
        <p>Yes
No
TF&gt;=10</p>
        <p>and
CF&lt;=TF</p>
        <p>UR=0
No
Yes
Bad Donor
Potential Spam</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Protection of Information in the System</title>
      <p>Given the functionality and innovation of the
proposed system, as well as the near absence of
similar comprehensive solutions in one package,
it is potentially at risk of unauthorized attempts at
appropriation. Therefore, security was one of the
key factors in choosing the development tools.</p>
      <p>Information protection in web systems is a
critical aspect, particularly in an era where
data breaches and cyber attacks are
increasingly common. Effective security
measures are essential to safeguard sensitive
data, maintain user trust, and comply with
legal standards. A robust web system security
strategy encompasses several layers, including
secure coding practices, data encryption,
authentication and authorization controls,
regular security audits, and adherence to best
practices in cybersecurity.</p>
      <p>
        Firstly, secure coding practices are
fundamental in preventing common
vulnerabilities such as SQL injection, Cross-Site
Scripting (XSS), and Cross-Site Request Forgery
(CSRF). Developers must be vigilant in sanitizing
user inputs, validating data, and using secure
APIs [
        <xref ref-type="bibr" rid="ref20">21</xref>
        ]. Additionally, implementing data
encryption both in transit (using SSL/TLS
protocols) and at rest ensures that sensitive
information, such as personal user data and
payment details, is protected from unauthorized
access. Encryption acts as a critical barrier,
making it extremely challenging for attackers to
exploit intercepted data [
        <xref ref-type="bibr" rid="ref21">22</xref>
        ].
      </p>
      <p>
        Furthermore, robust authentication and
authorization mechanisms are crucial [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ].
Multi-factor Authentication (MFA) adds a layer
of security beyond traditional password-based
systems. Implementing Role-Based Access
Control (RBAC) ensures that users can access
only the information and functionalities that
are necessary for their role, minimizing the
risk of internal data breaches. Regular security
audits and penetration testing can identify and
address potential vulnerabilities in the system
while staying updated with the latest
cybersecurity trends and threats ensuring that
the system remains resilient against new types
of attacks.
      </p>
      <p>With this in mind, the PHP framework
Laravel was selected for the development of
the system.</p>
      <p>Laravel includes many built-in features for
ensuring security and data protection. Here are
some key security aspects in Laravel:
• Protection against SQL Injections:
Laravel uses Eloquent Object-Relational
Mapping (ORM) and PHP Data Objects
(PDO), which automatically sanitize
query parameters, reducing the risk of
SQL injections.
• Protection against Cross-Site Scripting
(XSS): Laravel’s Blade templating engine
automatically escapes output data,
preventing the insertion of malicious
scripts.
• Protection against Cross-Site Request
Forgery (CSRF): Laravel has built-in
CSRF protection, namely CSRF tokens,
which ensure requests are sent from a
trusted form.
• Hashing and Encryption of Passwords:
Laravel uses Bcrypt and Argon2
algorithms for password hashing, and
provides tools for secure data
encryption and decryption.
• Middleware for Security: Laravel allows
the use of middleware classes to
implement various levels of access and
authorization, controlling access to
different parts of the application.
• Rate limiting: Laravel provides
capabilities for limiting the frequency of
requests, which can help prevent DoS
attacks.
• Content Security Policy (CSP): The
framework offers the ability to integrate
a content security policy to prevent the
use of malicious resources.
• Logging and Auditing: Laravel provides
extensive logging capabilities, allowing
for tracking and analysis of user and
system actions.
• Updates and Support: Laravel is actively
maintained and regularly updated,
including security enhancements.
• Data Validation: The framework offers
powerful tools for validating input data,
and reducing risks associated with
incorrect data.</p>
      <p>
        The Laravel framework includes special
classes that provide an organized way to
manage authorization, especially when it
comes to models or resources—Policies. These
classes allow you to easily define what actions
a user can perform on a specific resource.
Policies define methods that correspond to
certain actions (e.g., view, create, update,
delete). Each Policy is usually associated with a
specific Eloquent model. Laravel automatically
detects the Policy that corresponds to a certain
model based on standard naming conventions.
Policies can be easily integrated with Laravel
Middleware, allowing for control of access to
different parts of the application. Policies can
be used in conjunction with Gates, another
Laravel mechanism for access control [
        <xref ref-type="bibr" rid="ref23 ref24">24, 25</xref>
        ].
      </p>
      <sec id="sec-2-1">
        <title>2.1. User Roles in the System</title>
        <p>Additionally, the Spatie/Laravel-Permission
library was used for the development of the
user roles system. It is one of the most popular
third-party libraries for managing roles and
permissions in Laravel. Key features of the
Spatie/Laravel-Permission library include:
• The ability to create and manage roles
and permissions in the database.
• Roles and permissions can be easily
assigned to users, allowing for flexible
access management.
• Support for Middleware classes to
protect routes and controllers based on
permissions and roles.
• Integration with the Blade templating
engine, controlling UI elements display
based on user permissions.
• Efficient caching to optimize database
queries.
• Customizability to tailor to the specific
needs of the application.</p>
        <p>The proposed system has three user roles:
• Administrator: Has unlimited access to
all system resources.
• Manager: Has access to all system
resources except managing access and
roles. Can create, edit, and delete users,
as well as determine their salary for
placing links on the resource. Managers
have access to all types of reporting.
• Outricher: Only has access to links and
projects. Can add and edit them, but not
delete them. They only see links assigned
to them or unassigned. They have a
limited number of domains to work with,
by default—50. Can only view reporting
related to their pay.</p>
        <p>Using Policies in combination with the
Spatie/Laravel-Permission library provides
significant flexibility and control over
authorization in the application. This allows for
clearly defined authorization logic that is easily
maintainable and scalable, enhancing the
security and scalability of the proposed system.</p>
        <p>Administrators can create new methods for
accessing different components of the system
directly from the admin panel.</p>
        <p>Furthermore, the system does not have
functionality for unauthorized users. If a user
navigates to the site via a link, they are
redirected to the login page. Without
authorization, they will not have access to the
system’s resources.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. System Interface Overview</title>
        <p>
          When working with large data volumes, the
question of optimizing system performance
becomes especially important. In modern web
application development, various JavaScript
libraries like Vue.js and React.js are widely
used, which significantly facilitate the creation
of interactive web interfaces. However, in the
context of working with large data, using these
libraries can lead to additional loads on the
client side of the web application, as they load
the page and require additional resources for
processing JavaScript code [
          <xref ref-type="bibr" rid="ref25">26</xref>
          ].
        </p>
        <p>
          Considering this, a decision was made to
avoid using large JavaScript libraries in the
development of the client side of the web
application. Instead, the web application is
designed to maximize the use of built-in HTML
and CSS capabilities, which provide a sufficient
level of interactivity without heavy loading on
the browser. This approach reduces page load
times, as the absence of large JavaScript
frameworks reduces the overall load on the
server [
          <xref ref-type="bibr" rid="ref26">27</xref>
          ].
        </p>
        <p>Moreover, this approach improves the
interface’s responsiveness to user actions, as
browsers do not need to perform complex
JavaScript operations, which can be critical for
web applications processing large data
volumes. It also ensures better compatibility
with various browsers and devices, as
standard HTML and CSS technologies have
broad support without needing to account for
the specifics of particular JavaScript libraries.
Forgoing the use of Vue.js, React.js, or similar
frameworks requires more work on interface
optimization and may limit some interactive
capabilities. However, in the context of working
with large data, this is a justified compromise.
This approach ensures faster user response,
better overall performance, and reduced load on
the client side, which is critically important for
systems processing large volumes of data. The
interface of the page with the list of domains of
the proposed system is presented in Fig. 3.
The domain list contains essential information
about the links, specifically: the domain; the
user it is assigned to; the projects of this
domain; results of the first stage of checking for
each parameter; expenses related to the
domain, and other additional information, as
well as buttons for actions with the domain
(edit, view, scan, and delete).</p>
        <p>Above the table with the list of domains, there
are buttons for bulk addition of domains using an
Excel spreadsheet or a standard list of domains
in the specified format, as well as a button for
scanning all domains. The form for importing
domains varies depending on the user’s role.
Both the administrator and manager have the
functionality to assign a link to an outricher and
to disable the check for domain duplicates (Fig.
4). Instead of checking for duplicates, domains
that are already in the system will be added to
the projects selected in the form. The outricher
does not have access to this functionality.
Domains added by them are automatically
assigned to that user. The form for importing
domains by an outricher is shown in Fig. 5.</p>
        <p>Also, the interface shown in Fig. 3 has a
search field for the domain and filters for the
results of the first stage of domain verification.
For convenience, the filter block can be
collapsed or expanded. Domain filtering occurs
asynchronously, i.e., without reloading the
page. This significantly enhances the ease of
working with the system.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Important Features of the System</title>
        <p>Each domain can be added to several projects.
This is because a single website can host
several different articles on various topics with
links to promoted resources. For each project,
specific parameters such as Donor, Acceptor,
Anchor, the status of work with the domain,
and the placement price are filled out
separately.</p>
        <p>In the context of SEO, the term “Donor”
refers to the web address from which an
external link leads to another site—the
“Acceptor.” The Anchor, or anchor text, refers
to the visible, clickable text in a hyperlink
leading to the Acceptor. This text is usually
highlighted in color (often blue) and
underlined to distinguish it from regular text
on the page. Anchor text helps search engines
understand the context and content of the
linked page. If the anchor text is closely related
to the content on the target page, it improves
SEO, as it indicates higher relevance and
quality of information.</p>
        <p>The status of work with the domain
involves setting one of the stages of working
with this domain for a given project by the
person responsible for the domain. There are
several main statuses, namely: “new,” “in
progress,” “negotiation,” “recommended for
placement,” “refusal,” “error,” and “closed deal.”
The status “closed deal” can only be set by a
manager or administrator, as it is not available
to other users. This is because only users with
these roles make the final decision on placing
links on the resource. After the user working
with the donor has set the status
“recommended for placement”, the manager
receives a notification about this and decides to
place or not to place the link on this resource.</p>
        <p>After placing the link on the resource and
setting the corresponding status in this project,
the user responsible for the donor is credited
with a salary, and the costs for placement and
salary are recorded in the overall expenses for
the domain.</p>
        <p>All links that have received the status
“closed deal” undergo periodic automatic
checks by the system. The link on which the
link is placed, i.e., the Donor, undergoes the
first stage of verification, as well as a check for
the presence of the Acceptor link. If the link
fails any of the checks, the manager receives a
notification, and the Donor gets the status
“error”. To implement such functionality,
CRON was used.</p>
        <p>CRON is a program for UNIX-like operating
systems, used for the scheduled execution of
tasks (commands or scripts) at a specific time.
It operates as a daemon, continuously
executing tasks according to instructions
specified in the crontab file. This file contains a
schedule of tasks specified through specific
time intervals. The format of the schedule in
crontab includes five fields representing
minutes, hours, days of the month, months, and
days of the week, allowing flexibility in
planning. Each task in the crontab file usually
points to a specific script or command to be
executed.</p>
        <p>In the Laravel framework, a concept based
on CRON is used for managing scheduled tasks.
Laravel introduces a wrapper over CRON
called “task scheduling”. It allows developers
to easily define the execution schedule of
various tasks within the application’s code.
Using this mechanism, tasks such as cache
clearing, sending emails, and gathering
statistics can be easily set up. Laravel requires
only one CRON entry on the server, which calls
the artisan schedule: run command every
minute. This command checks if there are tasks
scheduled for execution and launches them
according to the defined schedule. This
approach greatly simplifies the management of
scheduled tasks in the Laravel environment,
making the process more intuitive and
integrated with the rest of the framework’s
functionality.</p>
        <p>All domains in work undergo the first stage
of verification weekly. This is necessary to
update information about the activity of the
domain.</p>
        <p>Certain projects are targeted at specific
countries or regions, so when choosing domains
that can potentially be donors for links,
websites that only operate in their country are
sometimes selected. Also, certain sites may be
blocked in the territory of a country important
for the planned link placement. Therefore, the
system contains functionality for selecting a
proxy server when performing an analysis.</p>
        <p>A proxy server acts as an intermediary node
between the user and target internet resources,
serving as a mediator in transmitting requests.
The use of a proxy involves a special
mechanism: user requests are first directed to
the proxy server, which then forwards them to
the specified internet resource. Proxy servers
are also used to bypass geographic restrictions
and optimize performance through caching.</p>
        <p>With the Laravel framework and the HTTP
client Guzzle, integration with proxy servers
becomes particularly significant. Guzzle, as a
tool for creating HTTP requests in PHP,
provides extensive capabilities for setting up a
proxy. This is achieved through the ‘proxy’
parameter in Guzzle client configuration
settings, where the URL of the proxy server or a
set of configurations for different protocols can
be specified. This approach effectively manages
the routing of requests through a proxy.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Discussion</title>
      <p>In this work, a cutting-edge system for
optimizing internet marketing is presented,
particularly in the context of SEO and the
management of external links. The proposed
system is distinguished by its high level of
innovation, providing users with the ability to
effectively analyze and select the most optimal
platforms for link placement based on a variety
of SEO parameters.</p>
      <p>One of the key advantages of this system is
its high level of security. Thanks to integration
with the PHP framework Laravel, the system
provides robust protection against threats
such as SQL injections, XSS, CSRF, and others,
which is critically important for ensuring the
integrity and security of user data. This
integration not only guarantees security but
also ensures a high level of flexibility and
adaptability of the system.</p>
      <p>The system also stands out for its ability to
precisely analyze and classify potential donor
sites, categorizing them as “Good Donor,” “Bad
Donor,” and “Potential Spam.” This allows users
to avoid unreliable or ineffective resources, [6]
focusing instead on those that provide the
maximum return on SEO campaigns.</p>
      <p>Compared to existing tools, such as
LinkChecker Pro, this system offers a
significantly wider range of functionalities,
making it more effective in solving complex
tasks related to internet marketing. Considering
its high level of security, comprehensive
analytical approach, and flexibility of use, this
system has the potential to become an
indispensable tool for companies seeking to
efficiently manage their online marketing
strategies.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] [2]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security Rating Metrics for Distributed Wireless Systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Khorolska</surname>
          </string-name>
          , et al.,
          <article-title>Application of a Convolutional Neural Network with a Module of Elementary Graphic Primitive Classifiers in the Problems of Recognition of Drawing Documentation and Transformation of 2D to 3D Models</article-title>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Theor</surname>
          </string-name>
          . Appl. Inf. Technol.
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>7426</fpage>
          -
          <lpage>7437</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Z. B.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Deduplication Method for Ukrainian Last Names, Medicinal Names, and Toponyms Based on Metaphone Phonetic Algorithm, Advances in Computer Science for Engineering and Education III, vol</article-title>
          .
          <volume>1247</volume>
          (
          <year>2020</year>
          )
          <fpage>518</fpage>
          -
          <lpage>533</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -55506-1_
          <fpage>47</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <source>Implantation of Indexing Optimization Technology for Highly Specialized Terms based on Metaphone Phonetical Algorithm, East.- Eur. J. Enterp. Technol.</source>
          , vol.
          <volume>5</volume>
          , no.
          <volume>2</volume>
          (
          <issue>101</issue>
          ) (
          <year>2019</year>
          )
          <fpage>64</fpage>
          -
          <lpage>71</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2019</year>
          .
          <volume>181943</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Berman</surname>
          </string-name>
          , et al.,
          <article-title>The Role of Search Engine Optimization in Search Marketing</article-title>
          , Marketing
          <string-name>
            <surname>Science</surname>
          </string-name>
          (
          <year>2013</year>
          )
          <fpage>644</fpage>
          -
          <lpage>651</lpage>
          . doi:
          <volume>10</volume>
          .2139/ssrn.1745644. G. Roy, et al.,
          <source>Trends and Future Directions in Online Marketing Research, J. Internet Commerce</source>
          (
          <year>2016</year>
          )
          <fpage>1</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .1080/15332861.
          <year>2016</year>
          .
          <volume>1258929</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <source>Analyzing the Relationship Between Organic and Sponsored Search Advertising: Positive</source>
          , Negative, or Zero Interdependence, Marketing
          <string-name>
            <surname>Science</surname>
          </string-name>
          (
          <year>2010</year>
          )
          <fpage>602</fpage>
          -
          <lpage>623</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bhandari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bansal</surname>
          </string-name>
          ,
          <article-title>Impact of Search Engine Optimization as a Marketing Tool</article-title>
          , Jindal J.
          <source>Bus. Res</source>
          .
          <volume>7</volume>
          (
          <issue>1</issue>
          ) (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1177/2278682117754016.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Link</given-names>
            <surname>Checker</surname>
          </string-name>
          <article-title>Pro</article-title>
          . URL: https://linkchecker.pro
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Moshenchenko</surname>
          </string-name>
          , et al.,
          <source>Optimization Algorithms of Smart City Wireless Sensor Network Control, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          II Vol.
          <volume>3188</volume>
          (
          <year>2021</year>
          )
          <fpage>32</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Meta</given-names>
            <surname>Tags: What They</surname>
          </string-name>
          <string-name>
            <surname>Are</surname>
          </string-name>
          &amp;
          <article-title>How to Use Them for SEO</article-title>
          . URL: https://www. semrush.com/blog/meta-tag/
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>How</given-names>
            <surname>Ahrefs Domain Rating Can Boost Your</surname>
          </string-name>
          <article-title>Site's Search Rankings</article-title>
          . URL: https://aicontentfy.com/en/blog/howahrefs
          <article-title>-domain-rating-can-boost-sitessearch-rankings</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <article-title>What Are Referring Domains and Why They're Important</article-title>
          . URL: https://seota ctica.com/seo/link-building/referringdomains/
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Organic</given-names>
            <surname>Keywords: What Are</surname>
          </string-name>
          <string-name>
            <surname>They</surname>
          </string-name>
          &amp;
          <article-title>How to Find Them</article-title>
          . URL: https://www.semrush.com/blog/organ ic-keywords/
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Organic</surname>
            <given-names>Traffic</given-names>
          </string-name>
          :
          <article-title>Why it is Important, how to Generate it and Reasons Behind a Drop</article-title>
          . URL: https://baresquare. com/blog/organic
          <article-title>-traffic-why-it-isimportant-how-to-generate-it-andreasons-behind-a-drop</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <article-title>What is URL Rating (UR)? URL: https://ahrefs</article-title>
          .com/seo/glossary/urlrating
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>H.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <source>Information security risk analysis SWOT, in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>309</fpage>
          -
          <lpage>317</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>What</given-names>
            <surname>Is Citation Flow (CF) in</surname>
          </string-name>
          <string-name>
            <surname>SEO</surname>
          </string-name>
          ? URL: https://www.pageonepower.com/searc h-glossary/citation-flow
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rahmah</surname>
          </string-name>
          , et al.,
          <source>Analysis of Website Popularity and Quality Levels in Disseminating Information at Coffee Shops UsingAlexa Rank</source>
          ,
          <string-name>
            <surname>Majestic</surname>
            <given-names>SEO</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Webqual</surname>
          </string-name>
          ,
          <source>Int. Res. J. Adv. Eng. Sci</source>
          . (
          <year>2021</year>
          )
          <fpage>90</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>H.</given-names>
            <surname>Jaasko</surname>
          </string-name>
          ,
          <source>Search Engine Optimization When Entering New a Market</source>
          , in: Business Information Technology at Oulu University of Applied Sciences (
          <year>2018</year>
          )
          <fpage>1</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          , et al.,
          <article-title>Formation Of Shift Index Vectors of Ring Codes for Information Transmission Security, in: XXI International Scientific</article-title>
          and Practical Conference “Information Technologies and Security,” vol.
          <volume>3241</volume>
          (
          <year>2021</year>
          )
          <fpage>248</fpage>
          -
          <lpage>257</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Poltorak</surname>
          </string-name>
          , et al.,
          <source>Remote Object Confidential Control Technology based on Elliptic Cryptography, in: Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>121</fpage>
          -
          <lpage>130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Secured Remote Update Protocol in IoT Data Exchange System, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>67</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Thelwall</surname>
          </string-name>
          , Web Crawlers and
          <string-name>
            <given-names>Search</given-names>
            <surname>Engines</surname>
          </string-name>
          ,
          <source>Link Analysis: An Information Science Approach</source>
          (
          <year>2004</year>
          )
          <fpage>9</fpage>
          -
          <lpage>22</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>C.</given-names>
            <surname>Gutierrez</surname>
          </string-name>
          ,
          <source>Web Services Security Development and Architecture, Information Science Reference</source>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>F.</given-names>
            <surname>Nataliia</surname>
          </string-name>
          , et al.,
          <source>Software System for Processing and Visualization of Big Data Arrays, Advances in Computer Science for Engineering and Education</source>
          (
          <year>2022</year>
          )
          <fpage>324</fpage>
          -
          <lpage>336</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>I.</given-names>
            <surname>Vanderlei</surname>
          </string-name>
          , et al.,
          <source>Analysis of Laravel Framework Security Techniques Against Web Application Attacks, 16th Iberian Conference on Information Systems and Technologies</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>