skip to main content
research-article

Analysis and Detection of Fake Views in Online Video Services

Published:24 February 2015Publication History
Skip Abstract Section

Abstract

Online video-on-demand(VoD) services invariably maintain a view count for each video they serve, and it has become an important currency for various stakeholders, from viewers, to content owners, advertizers, and the online service providers themselves. There is often significant financial incentive to use a robot (or a botnet) to artificially create fake views. How can we detect fake views? Can we detect them (and stop them) efficiently? What is the extent of fake views with current VoD service providers? These are the questions we study in this article. We develop some algorithms and show that they are quite effective for this problem.

References

  1. Paul Barford, Jeffery Kline, David Plonka, and Amos Ron. 2002. A signal analysis of network traffic anomalies. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW'02). ACM, New York, 71--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Paul Barford and David Plonka. 2001. Characteristics of network traffic flow anomalies. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (IMW'01). ACM, New York, 69--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Richard J. Bolton and David J. Hand. 2002. Statistical fraud detection: A review. Statist. Sci. 17, 3, 235--249.Google ScholarGoogle ScholarCross RefCross Ref
  4. BuyViews. 2013. Buy YouTube views. http://500views.com/regular-youtube-views.Google ScholarGoogle Scholar
  5. Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12). USENIX Association, Berkeley, CA, 197--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3, Article 15, 58 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Liang Chen, Yipeng Zhou, and Dah Ming Chiu. 2014. Fake view analytics in online video services. In Proceedings of Network and Operating System Support on Digital Audio and Video Workshop (NOSSDAV'14). ACM, New York, Article 1. DOI:http://dx.doi.org/10.1145/2578260.2578263 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Roya Ensafi, Soheila Dehghanzadeh, R. Mohammad, and T. Akbarzadeh. 2008. Optimizing fuzzy k-means for network anomaly detection using PSO. In Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications. IEEE, 686--693. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yu Gu, Andrew McCallum, and Don Towsley. 2005. Detecting anomalies in network traffic using maximum entropy estimation. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05). USENIX Association, Berkeley, CA, 345--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, and Dongmei Wang. 2005. ACAS: Automated Construction of Application Signatures. In Proceedings of the ACM SIGCOMM Workshop on Mining Network Data (MineNet'05). ACM, New York, 197--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Thorsten Joachims. 1999. Making large-scale SVM learning practical. In Advances in Kernel Methods - Support Vector Learning, B. Schölkopf, C. Burges, and A. Smola (Eds.), MIT Press, Cambridge, MA, 169--184. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Anukool Lakhina, Mark Crovella, and Christiphe Diot. 2004. Characterization of network-wide anomalies in traffic flows. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC'04). ACM, New York, 201--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ashwin Lall, Vyas Sekar, Mitsunori Ogihara, Jun Xu, and Hui Zhang. 2006. Data streaming algorithms for estimating entropy of network traffic. SIGMETRICS Perform. Eval. Rev. 34, 1, 145--156. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Zahid Mahmood. 2012. YouTube slashes 2 billion fake views. http://www.technouz.com/696/youtube-slashes-2-billion-fake-views/.Google ScholarGoogle Scholar
  15. Matthew V. Mahoney. 2003. Network traffic anomaly detection based on packet bytes. In Proceedings of the ACM Symposium on Applied Computing (SAC'03). ACM, New York, 346--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Robin Sommer and Vern Paxson. 2010. Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the IEEE Symposium on Security and Privacy (SP). IEEE, 305--316. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Augustin Soule, Kavé Salamatian, and Nina Taft. 2005. Combining filtering and statistical methods for anomaly detection. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05). USENIX Association, Berkeley, CA. 331--344. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Tencent. 2013. Tencent Video. (2013). http://v.qq.com/.Google ScholarGoogle Scholar
  19. Marina Thottan and Chuanyi Ji. 2003. Anomaly detection in IP networks. IEEE Trans. Sig. Process. 51, 8, 2191--2204. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Vladimir N. Vapnik. 1998. Statistical learning theory. Adaptive and Learning Systems for Signal Processing, Communications and Control Series.Google ScholarGoogle Scholar
  21. Haining Wang, Danlu Zhang, and Kang G. Shin. 2002. Detecting SYN flooding attacks. In Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFoCoMM 2002). Vol. 3, IEEE, 1530--1539.Google ScholarGoogle Scholar
  22. Daniel S. Yeung, Shuyuan Jin, and Xizhao Wang. 2007. Covariance-matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybernet. Part A: Syst. Humans, 37, 2, 157--169. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. YouTube. 2014. Frozen view count. https://support.google.com/youtube/troubleshooter/2991876.Google ScholarGoogle Scholar

Index Terms

  1. Analysis and Detection of Fake Views in Online Video Services

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Multimedia Computing, Communications, and Applications
              ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 11, Issue 2s
              Special Issue on MMSYS 2014
              February 2015
              138 pages
              ISSN:1551-6857
              EISSN:1551-6865
              DOI:10.1145/2739966
              Issue’s Table of Contents

              Copyright © 2015 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 24 February 2015
              • Accepted: 1 October 2014
              • Revised: 1 September 2014
              • Received: 1 April 2014
              Published in tomm Volume 11, Issue 2s

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!