Abstract
Online video-on-demand(VoD) services invariably maintain a view count for each video they serve, and it has become an important currency for various stakeholders, from viewers, to content owners, advertizers, and the online service providers themselves. There is often significant financial incentive to use a robot (or a botnet) to artificially create fake views. How can we detect fake views? Can we detect them (and stop them) efficiently? What is the extent of fake views with current VoD service providers? These are the questions we study in this article. We develop some algorithms and show that they are quite effective for this problem.
- Paul Barford, Jeffery Kline, David Plonka, and Amos Ron. 2002. A signal analysis of network traffic anomalies. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW'02). ACM, New York, 71--82. Google Scholar
Digital Library
- Paul Barford and David Plonka. 2001. Characteristics of network traffic flow anomalies. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (IMW'01). ACM, New York, 69--73. Google Scholar
Digital Library
- Richard J. Bolton and David J. Hand. 2002. Statistical fraud detection: A review. Statist. Sci. 17, 3, 235--249.Google Scholar
Cross Ref
- BuyViews. 2013. Buy YouTube views. http://500views.com/regular-youtube-views.Google Scholar
- Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12). USENIX Association, Berkeley, CA, 197--210. Google Scholar
Digital Library
- Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3, Article 15, 58 pages. Google Scholar
Digital Library
- Liang Chen, Yipeng Zhou, and Dah Ming Chiu. 2014. Fake view analytics in online video services. In Proceedings of Network and Operating System Support on Digital Audio and Video Workshop (NOSSDAV'14). ACM, New York, Article 1. DOI:http://dx.doi.org/10.1145/2578260.2578263 Google Scholar
Digital Library
- Roya Ensafi, Soheila Dehghanzadeh, R. Mohammad, and T. Akbarzadeh. 2008. Optimizing fuzzy k-means for network anomaly detection using PSO. In Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications. IEEE, 686--693. Google Scholar
Digital Library
- Yu Gu, Andrew McCallum, and Don Towsley. 2005. Detecting anomalies in network traffic using maximum entropy estimation. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05). USENIX Association, Berkeley, CA, 345--350. Google Scholar
Digital Library
- Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, and Dongmei Wang. 2005. ACAS: Automated Construction of Application Signatures. In Proceedings of the ACM SIGCOMM Workshop on Mining Network Data (MineNet'05). ACM, New York, 197--202. Google Scholar
Digital Library
- Thorsten Joachims. 1999. Making large-scale SVM learning practical. In Advances in Kernel Methods - Support Vector Learning, B. Schölkopf, C. Burges, and A. Smola (Eds.), MIT Press, Cambridge, MA, 169--184. Google Scholar
Digital Library
- Anukool Lakhina, Mark Crovella, and Christiphe Diot. 2004. Characterization of network-wide anomalies in traffic flows. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC'04). ACM, New York, 201--206. Google Scholar
Digital Library
- Ashwin Lall, Vyas Sekar, Mitsunori Ogihara, Jun Xu, and Hui Zhang. 2006. Data streaming algorithms for estimating entropy of network traffic. SIGMETRICS Perform. Eval. Rev. 34, 1, 145--156. Google Scholar
Digital Library
- Zahid Mahmood. 2012. YouTube slashes 2 billion fake views. http://www.technouz.com/696/youtube-slashes-2-billion-fake-views/.Google Scholar
- Matthew V. Mahoney. 2003. Network traffic anomaly detection based on packet bytes. In Proceedings of the ACM Symposium on Applied Computing (SAC'03). ACM, New York, 346--350. Google Scholar
Digital Library
- Robin Sommer and Vern Paxson. 2010. Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the IEEE Symposium on Security and Privacy (SP). IEEE, 305--316. Google Scholar
Digital Library
- Augustin Soule, Kavé Salamatian, and Nina Taft. 2005. Combining filtering and statistical methods for anomaly detection. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05). USENIX Association, Berkeley, CA. 331--344. Google Scholar
Digital Library
- Tencent. 2013. Tencent Video. (2013). http://v.qq.com/.Google Scholar
- Marina Thottan and Chuanyi Ji. 2003. Anomaly detection in IP networks. IEEE Trans. Sig. Process. 51, 8, 2191--2204. Google Scholar
Digital Library
- Vladimir N. Vapnik. 1998. Statistical learning theory. Adaptive and Learning Systems for Signal Processing, Communications and Control Series.Google Scholar
- Haining Wang, Danlu Zhang, and Kang G. Shin. 2002. Detecting SYN flooding attacks. In Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFoCoMM 2002). Vol. 3, IEEE, 1530--1539.Google Scholar
- Daniel S. Yeung, Shuyuan Jin, and Xizhao Wang. 2007. Covariance-matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybernet. Part A: Syst. Humans, 37, 2, 157--169. Google Scholar
Digital Library
- YouTube. 2014. Frozen view count. https://support.google.com/youtube/troubleshooter/2991876.Google Scholar
Index Terms
Analysis and Detection of Fake Views in Online Video Services
Recommendations
Fake View Analytics in Online Video Services
NOSSDAV '14: Proceedings of Network and Operating System Support on Digital Audio and Video WorkshopOnline video-on-demand (VoD) services invariably maintain a view count for each video they serve, and it has become an important currency for various stakeholders, from viewers, to content owners, advertizers, and the online service providers ...
Fake View Analytics in Online Video Services
NOSSDAV '14: Proceedings of Network and Operating System Support on Digital Audio and Video WorkshopOnline video-on-demand (VoD) services invariably maintain a view count for each video they serve, and it has become an important currency for various stakeholders, from viewers, to content owners, advertizers, and the online service providers ...
Multidimensional Analysis of Fake News Spreaders on Twitter
Computational Data and Social NetworksAbstractSocial media has become a tool to spread false information with the help of its large complex network. The consequences of such misinformation could be very severe. The paper uses the Twitter conversations about the scrapping of Article 370 in ...






Comments