skip to main content
research-article

Analysis and Detection of Fake Views in Online Video Services

Published: 24 February 2015 Publication History

Abstract

Online video-on-demand(VoD) services invariably maintain a view count for each video they serve, and it has become an important currency for various stakeholders, from viewers, to content owners, advertizers, and the online service providers themselves. There is often significant financial incentive to use a robot (or a botnet) to artificially create fake views. How can we detect fake views? Can we detect them (and stop them) efficiently? What is the extent of fake views with current VoD service providers? These are the questions we study in this article. We develop some algorithms and show that they are quite effective for this problem.

References

[1]
Paul Barford, Jeffery Kline, David Plonka, and Amos Ron. 2002. A signal analysis of network traffic anomalies. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW'02). ACM, New York, 71--82.
[2]
Paul Barford and David Plonka. 2001. Characteristics of network traffic flow anomalies. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement (IMW'01). ACM, New York, 69--73.
[3]
Richard J. Bolton and David J. Hand. 2002. Statistical fraud detection: A review. Statist. Sci. 17, 3, 235--249.
[4]
BuyViews. 2013. Buy YouTube views. http://500views.com/regular-youtube-views.
[5]
Qiang Cao, Michael Sirivianos, Xiaowei Yang, and Tiago Pregueiro. 2012. Aiding the detection of fake accounts in large scale social online services. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12). USENIX Association, Berkeley, CA, 197--210.
[6]
Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3, Article 15, 58 pages.
[7]
Liang Chen, Yipeng Zhou, and Dah Ming Chiu. 2014. Fake view analytics in online video services. In Proceedings of Network and Operating System Support on Digital Audio and Video Workshop (NOSSDAV'14). ACM, New York, Article 1.
[8]
Roya Ensafi, Soheila Dehghanzadeh, R. Mohammad, and T. Akbarzadeh. 2008. Optimizing fuzzy k-means for network anomaly detection using PSO. In Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications. IEEE, 686--693.
[9]
Yu Gu, Andrew McCallum, and Don Towsley. 2005. Detecting anomalies in network traffic using maximum entropy estimation. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05). USENIX Association, Berkeley, CA, 345--350.
[10]
Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, and Dongmei Wang. 2005. ACAS: Automated Construction of Application Signatures. In Proceedings of the ACM SIGCOMM Workshop on Mining Network Data (MineNet'05). ACM, New York, 197--202.
[11]
Thorsten Joachims. 1999. Making large-scale SVM learning practical. In Advances in Kernel Methods - Support Vector Learning, B. Schölkopf, C. Burges, and A. Smola (Eds.), MIT Press, Cambridge, MA, 169--184.
[12]
Anukool Lakhina, Mark Crovella, and Christiphe Diot. 2004. Characterization of network-wide anomalies in traffic flows. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC'04). ACM, New York, 201--206.
[13]
Ashwin Lall, Vyas Sekar, Mitsunori Ogihara, Jun Xu, and Hui Zhang. 2006. Data streaming algorithms for estimating entropy of network traffic. SIGMETRICS Perform. Eval. Rev. 34, 1, 145--156.
[14]
Zahid Mahmood. 2012. YouTube slashes 2 billion fake views. http://www.technouz.com/696/youtube-slashes-2-billion-fake-views/.
[15]
Matthew V. Mahoney. 2003. Network traffic anomaly detection based on packet bytes. In Proceedings of the ACM Symposium on Applied Computing (SAC'03). ACM, New York, 346--350.
[16]
Robin Sommer and Vern Paxson. 2010. Outside the closed world: On using machine learning for network intrusion detection. In Proceedings of the IEEE Symposium on Security and Privacy (SP). IEEE, 305--316.
[17]
Augustin Soule, Kavé Salamatian, and Nina Taft. 2005. Combining filtering and statistical methods for anomaly detection. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC'05). USENIX Association, Berkeley, CA. 331--344.
[18]
Tencent. 2013. Tencent Video. (2013). http://v.qq.com/.
[19]
Marina Thottan and Chuanyi Ji. 2003. Anomaly detection in IP networks. IEEE Trans. Sig. Process. 51, 8, 2191--2204.
[20]
Vladimir N. Vapnik. 1998. Statistical learning theory. Adaptive and Learning Systems for Signal Processing, Communications and Control Series.
[21]
Haining Wang, Danlu Zhang, and Kang G. Shin. 2002. Detecting SYN flooding attacks. In Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFoCoMM 2002). Vol. 3, IEEE, 1530--1539.
[22]
Daniel S. Yeung, Shuyuan Jin, and Xizhao Wang. 2007. Covariance-matrix modeling and detecting various flooding attacks. IEEE Trans. Syst. Man Cybernet. Part A: Syst. Humans, 37, 2, 157--169.
[23]
YouTube. 2014. Frozen view count. https://support.google.com/youtube/troubleshooter/2991876.

Cited By

View all
  • (2021)ArtiMarker: A Novel Artificially Inflated Video Marking And Characterization Method on YouTube2021 5th International Conference on Computer, Communication and Signal Processing (ICCCSP)10.1109/ICCCSP52374.2021.9465497(244-249)Online publication date: 24-May-2021
  • (2020)Identification of the Use of Unauthorized Apps in the O2O Service by Combining Online Events and Offline ConditionsElectronics10.3390/electronics91119779:11(1977)Online publication date: 22-Nov-2020
  • (2020)The Extensible Data-Brain Model: Architecture, Applications and DirectionsJournal of Computational Science10.1016/j.jocs.2020.101103(101103)Online publication date: May-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 11, Issue 2s
Special Issue on MMSYS 2014
February 2015
138 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2739966
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 February 2015
Accepted: 01 October 2014
Revised: 01 September 2014
Received: 01 April 2014
Published in TOMM Volume 11, Issue 2s

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Fake view
  2. online video service

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • open fund of Shenzhen Key Lab of Advanced Communications and Information Processing
  • Natural Science Foundation of SZU
  • Natural Science Foundation of China
  • Hong Kong RGC support via GRF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)3
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)ArtiMarker: A Novel Artificially Inflated Video Marking And Characterization Method on YouTube2021 5th International Conference on Computer, Communication and Signal Processing (ICCCSP)10.1109/ICCCSP52374.2021.9465497(244-249)Online publication date: 24-May-2021
  • (2020)Identification of the Use of Unauthorized Apps in the O2O Service by Combining Online Events and Offline ConditionsElectronics10.3390/electronics91119779:11(1977)Online publication date: 22-Nov-2020
  • (2020)The Extensible Data-Brain Model: Architecture, Applications and DirectionsJournal of Computational Science10.1016/j.jocs.2020.101103(101103)Online publication date: May-2020
  • (2019)Modeling Dwell Time Engagement on Visual MultimediaProceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining10.1145/3292500.3330973(1104-1113)Online publication date: 25-Jul-2019
  • (2019)Solving Partial Least Squares Regression via Manifold Optimization ApproachesIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2018.284486630:2(588-600)Online publication date: Feb-2019
  • (2019)SliceNDice: Mining Suspicious Multi-Attribute Entity Groups with Multi-View Graphs2019 IEEE International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA.2019.00050(351-363)Online publication date: Oct-2019
  • (2018)Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on WaveletsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/318350614:1s(1-17)Online publication date: 26-Mar-2018
  • (2018)Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social NetworksIEEE Transactions on Industrial Informatics10.1109/TII.2017.275320214:2(799-813)Online publication date: Feb-2018
  • (2018)Localized LRR on Grassmann Manifold: An Extrinsic ViewIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2017.275706328:10(2524-2536)Online publication date: Oct-2018
  • (2018)Low Rank Representation on SPD matrices with Log-Euclidean metricPattern Recognition10.1016/j.patcog.2017.07.00976:C(623-634)Online publication date: 1-Apr-2018
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media