Fake View Analytics in Online Video Services

Online video-on-demand (VoD) services invariably maintain a view count for each video they serve, and it has become an important currency for various stakeholders, from viewers, to content owners, advertizers, and the online service providers themselves. There is often significant financial incentive to use a robot (or a botnet) to artificially create fake views. How can we detect the fake views? Can we detect them (and stop them) efficiently? What is the extent of fake views with current VoD service providers? These are the questions we study in this paper. We develop some algorithms and show their effectiveness for this problem.

[1]  Marina Thottan,et al.  Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..

[2]  Kavé Salamatian,et al.  Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.

[3]  Patrick Haffner,et al.  ACAS: automated construction of application signatures , 2005, MineNet '05.

[4]  Kang G. Shin,et al.  Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[5]  Weifeng Liu,et al.  Adaptive and Learning Systems for Signal Processing, Communication, and Control , 2010 .

[6]  Yipeng Zhou,et al.  Video Browsing - A Study of User Behavior in Online VoD Services , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[7]  Matthew V. Mahoney,et al.  Network traffic anomaly detection based on packet bytes , 2003, SAC '03.

[8]  Xizhao Wang,et al.  Covariance-Matrix Modeling and Detecting Various Flooding Attacks , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[9]  Simon Haykin,et al.  Adaptive Signal Detection (Adaptive and Learning Systems for Signal Processing, Communications and Control Series) , 2006 .

[10]  Paul Barford,et al.  Characteristics of network traffic flow anomalies , 2001, IMW '01.

[11]  Fulvio Gini,et al.  Adaptive and Learning Systems for Signal Processing, Communications, and Control , 2008 .

[12]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[13]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[14]  Soheila Dehghanzadeh,et al.  Optimizing Fuzzy K-means for network anomaly detection using PSO , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[15]  Yipeng Zhou,et al.  Fake View Analytics in Online Video Services , 2013, International Workshop on Network and Operating System Support for Digital Audio and Video.

[16]  Paul Barford,et al.  A signal analysis of network traffic anomalies , 2002, IMW '02.

[17]  Vyas Sekar,et al.  Data streaming algorithms for estimating entropy of network traffic , 2006, SIGMETRICS '06/Performance '06.

[18]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[19]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[20]  Thorsten Joachims,et al.  Making large scale SVM learning practical , 1998 .

[21]  Donald F. Towsley,et al.  Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.

[22]  Mark Crovella,et al.  Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.

[23]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[24]  Dong Xiang,et al.  Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.