Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5
Abstract
Metacafe is one of the most popular video sharing system among all online video sharing systems, these video sharing systems provide features that allow users to post a video as a response to the topic that is being discussed. There are opportunities for its users to introduce polluted content,or simply pollution, into the system because of these features. For example, spammers may post an unrelated video as response to a popular one, aiming at increasing the likelihood of the response being viewed by a larger number of users in the same way also content promoters may try to gain visibility to a specific video by posting a large number of responses for boosting the rank of the responded video so that it will appear in the top lists maintained by the system. Content pollution means the posting of irrelevant content may jeopardize the trust of users on the video sharing system, thus in turn it compromises the success in promoting social interactions. In spite of that, the available literature is very limited in providing a deep understanding of this problem. In this paper, we address the issue of detecting video spammers and promoters considering you tube video sharing system. Index Terms: Promoter, social media, social networks, spammer, video promotion, video response, video spam.
Authors and Affiliations
Panga Eswaraiah , Dr. D. Kavitha
Credit Based Collaborative Filtering Approach: An Improvement in Recommender Systems
In recent years Internet has emerged as an important tool for gaining information. But people confronts with abundance of data. High performance information searching is required to cope with this situation. Recommender...
Multiple Criteria Decision Making Methodology for Network security
Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling th...
Importance and Techniques of Information Hiding : A Review
Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of sec...
A Survey of Preprocessing Method for Web Usage Mining Process
The amount of web applications are increasing in large amount and users of web applications are also increasing rapidly with high speed. By increasing number of users the size of log file also increases .The information...
Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol
We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on...