Skip to main content
Log in

Analyzing the uncharted territory of monetizing scam Videos on YouTube

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

In recent times, the Indian government has launched campaigns cautioning users against malicious apps which trick users into expending money on the app in the false hopes of quick passive income. They are also tricked into sharing their personally identifiable information in many cases. It is observed that such apps are heavily promoted on video sharing sites such as YouTube which results into exploitative monetization of user’s watch time and degrades user experience. In this work, we perform an investigative study to analyze and identify such videos termed as Monetary Scam videos. A detailed analysis of the characteristics of monetary scam videos has been performed based on contextual and statistical features. The context of a video targeted for Indian audience contains non-standard transliteration of Hindi words written in Roman script which makes existing video context-based models unsuitable for identification of such monetary scam videos. Thus, it is required to build a solution specific to the Indian context. A total of 1500 videos were collected and labeled for this work. Two types of features: 1) textual attributes and 2) Metadata-based statistical features have been used for three-class and two-class classification of the collected videos using five machine learning classifiers. In the experimental results, the Random Forest classifier predicts scam videos with the best accuracy scores among all the five classifiers in both three-class and two-class classifiers. A comparative analysis with three state-of-the-art models from similar studies depict that our model outperforms others for our collected dataset in both three-class and two-class classifications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

Public data has been collected from YouTube videos through YouTube Data API. It is not available for sharing without the permission of YouTube. Only the video IDs and ground-truth labels can be asked for sharing by mailing the authors.

Notes

  1. https://english.alaraby.co.uk/english/news/2020/6/2/saudi-bots-spam-fake-news-tweets-against-qatar.

  2. https://gadgets.ndtv.com/apps/news/wolfrat-whatsapp-facebook-messenger-line-wolf-research-2232314.

  3. https://www.ft.com/content/fbdf0f0d-c3a6-42dd-97b0-7f4b4ee63170.

  4. https://www.statista.com/statistics/1132981/number-removed-youtube-videos-worldwide-by-views/.

  5. https://www.statista.com/topics/2019/youtube/.

  6. https://edition.cnn.com/2019/12/13/tech/youtube-fake-accounts-viral/index.html.

  7. https://www.thetimes.co.uk/article/youtube-cashes-in-on-neo-nazis-hate-videos-9gg0nbvd6.

  8. https://techcrunch.com/2013/08/27/google-dumps-video-responses-from-youtube-due-to-dismal-0004-click-through-rate/.

  9. https://developers.google.com/youtube/v3/.

  10. https://trends.google.com/trends/?geo=IN.

  11. https://pythonspot.com/nltk-stop-words/.

References

  • Abu-Nimeh S, Chen T, Alzubi O (2011) Malicious and spam posts in online social networks. Computer 44(9):23–28

    Article  Google Scholar 

  • Ahmed F, Abulaish M (2013) A generic statistical approach for spam detection in online social networks. Comput Commun 36(10–11):1120–1129

    Article  Google Scholar 

  • Alberto TC, Lochter JV, Almeida TA (2015) Tubespam: Comment spam filtering on youtube. In 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA) (IEEE: 138–143

  • Alharthi R, Alhothali A, Moria K (2021) A real-time deep-learning approach for filtering arabic low-quality content and accounts on twitter. Information Systems 99: 101-740

    Article  Google Scholar 

  • Angeles CN, Ramos CDL (2021) Investigating Unrelated# COVID19 Twitter Expressions: Implications of Spam Content on Information Credibility. In Proceedings of the Future Technologies Conference (Springer): 293–309

  • Benevenuto F, Rodrigues T, Almeida V, Almeida J, Zhang C, Ross K (2008) in Proceedings of the 4th international workshop on Adversarial information retrieval on the web: 45–52

  • Chaudhary V, Sureka A (2013). Contextual feature based one-class classifier approach for detecting video response spam on youtube. In 2013 Eleventh Annual Conference on Privacy, Security and Trust (IEEE): 195–204

  • Chen C, Zhang J, Chen X, Xiang Y, Zhou W (2015) in 2015 IEEE international conference on communications (ICC) (IEEE), pp. 7065–7070

  • Choi H, Zhu BB, Lee H (2011) Detecting malicious web links and identifying their attack types. WebApps 11(11):218

    Google Scholar 

  • Davoudi M, Moosavi M, Sadreddini M (2022) DSS: A hybrid deep model for fake news detection using propagation tree and stance network. Expert Syst With Appl 198:116635

    Article  Google Scholar 

  • Deiana G (2015) Analysis and detection of clickjacking on facebook

  • de Keulenaar E, Burton AG, Kisjes I (2021) Deplatforming, demotion and folk theories of big tech persecution. Fronteiras-estudos midiáticos 23(2):118–139

    Article  Google Scholar 

  • Gogoglou A, Theodosiou Z, Kounoudes T, Vakali A, Manolopoulos Y (2016) Early malicious activity discovery in microblogs by social bridges detection. 2016 IEEE International Symposium On Signal Processing And Information Technology (ISSPIT): 132-137

  • Gunnerson S (2017) “get out of my face (book)!” using facebook to examine verbal aggressiveness and argumentativeness. Ph.D. thesis, University of Akron

  • Gupta N, Aggarwal A, Kumaraguru P (2014) in 2014 APWG Symposium on Electronic Crime Research (eCrime) (IEEE): 14–24

  • YouTube Help. YouTube partner earnings overview https://support.google.com/youtube/answer/72902?hl=en (2020). Accessed 2020-06-24

  • YouTube Help. Spam, deceptive practices and scams policies https://support.google.com/youtube/answer/2801973?hl=en (2020). Accessed 2020-06-24

  • In 31st USENIX Security Symposium (USENIX Security 22) (USENIX Association, Boston, MA, 2022). https://www.usenix.org/conference/usenixsecurity22/presentation/chu

  • Kuchhal D, Li F (2022) A view into YouTube view fraud. Proc ACM Web Confe 2022:555–563

    Google Scholar 

  • Lee S, Kim J (2013) Warningbird: A near real-time detection system for suspicious urls in twitter stream. IEEE transactions on dependable and secure computing 10(3):183–195

    Article  Google Scholar 

  • Li Z, Alrwais S, Xie Y, Yu F, Wang X (2013) in 2013 IEEE Symposium on Security and Privacy (IEEE): 112–126

  • Mariconti E, Onaolapo J, Ahmad S, Nikiforou N, Egele M, Nikiforakis N, Stringhini G (2016) Why allowing profile name reuse is a bad idea. Proceedings Of The 9th European Workshop On System Security 1-6

  • Mccord M, Chuah M (2011) Spam detection on twitter using traditional classifiers. In international conference on Autonomic and trusted computing (Springer): 175–186

  • Miller Z, Dickinson B, Deitrick W, Hu W, Wang AH (2014) Twitter spammer detection using data stream clustering. Inform Sci 260:64–73

    Article  Google Scholar 

  • Mishra S, Soni D (2022) Implementation of ‘Smishing Detector’: An efficient model for smishing detection using neural network. SN Comput Sci 3:1–13

    Article  Google Scholar 

  • Nepali RK, Wang Y (2016) You look suspicious!!: Leveraging visible attributes to classify malicious short urls on twitter. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (IEEE), pp. 2648–2655

  • O’Callaghan D, Harrigan M, Carthy J, Cunningham P. (2012) in Sixth International AAAI Conference on Weblogs and Social Media

  • Papadopoulou O, Zampoglou MS, Papadopoulos Y (2017) Web video verification using contextual cues. Proceedings Of The 2nd International workshop On multimedia Forensics and security: 6-10

  • Sahoo D, Liu C, Hoi SC (2017) Malicious url detection using machine learning: A survey arXiv preprint arXiv:1701.07179 (2017)

  • Samsudin NM, Mohd Foozy CF, Alias N, Shamala P, Othman NF, Wan Din WIS (2019) Youtube spam detection framework using naïve bayes and logistic regression. Indonesian J Electrical Eng Comput Sci 14(3):1508–1517

    Article  Google Scholar 

  • Shetty A, Abreo B, D’Souza A, Kondana A, Karimbi K (2021) Video Description Based Youtube Comment Classification. Applications Of Artificial Intelligence In Engineering: 667-678

  • Singh M, Bansal D, Sofat S (2016) Behavioral analysis and classification of spammers distributing pornographic content in social media. Soc Netw Anal Mining 6(1):41

    Article  Google Scholar 

  • Sohrabi MK, Karimi F (2018) A feature selection approach to detect spam in the facebook social network. Arabian J Sci Eng 43(2):949–958

    Article  Google Scholar 

  • Sureka A, Kumaraguru P, Goyal A, Chhabra S (2010) Mining youtube to discover extremist videos, users and hidden communities. Asia Information Retrieval Symposium: 13-24

  • Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: an analysis of twitter spam. Proceedings Of The 2011 ACM SIGCOMM Conference On Internet Measurement Conference: 243-258

  • Varshney D, Vishwakarma D (2021) A unified approach for detection of Clickbait videos on YouTube using cognitive evidences. Appl Intell 51:4214–4235

    Article  Google Scholar 

  • Yardi S, Romero D, Schoenebeck G, et al. (2010) Detecting spam in a twitter network. First monday

  • Yusof Y, Sadoon OH (2017) Detecting video spammers in youtube social media. In Proceedings of International Conference on Computing and Informatics: 228–234

  • Yu S, Vorobeychik Y (2019) Distributionally robust removal of malicious nodes from networks. arXiv preprint arXiv:1901.11463

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Ashutosh Tripathi, Mohona Ghosh or Kusum Bharti.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Competing Interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary file 1 (cls 54 KB)

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tripathi, A., Ghosh, M. & Bharti, K. Analyzing the uncharted territory of monetizing scam Videos on YouTube. Soc. Netw. Anal. Min. 12, 119 (2022). https://doi.org/10.1007/s13278-022-00945-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-022-00945-1

Keywords

Navigation