Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5

Abstract

Metacafe is one of the most popular video sharing system among all online video sharing systems, these video sharing systems provide features that allow users to post a video as a response to the topic that is being discussed. There are opportunities for its users to introduce polluted content,or simply pollution, into the system because of these features. For example, spammers may post an unrelated video as response to a popular one, aiming at increasing the likelihood of the response being viewed by a larger number of users in the same way also content promoters may try to gain visibility to a specific video by posting a large number of responses for boosting the rank of the responded video so that it will appear in the top lists maintained by the system. Content pollution means the posting of irrelevant content may jeopardize the trust of users on the video sharing system, thus in turn it compromises the success in promoting social interactions. In spite of that, the available literature is very limited in providing a deep understanding of this problem. In this paper, we address the issue of detecting video spammers and promoters considering you tube video sharing system. Index Terms: Promoter, social media, social networks, spammer, video promotion, video response, video spam.

Authors and Affiliations

Panga Eswaraiah , Dr. D. Kavitha

Keywords

Related Articles

Credit Based Collaborative Filtering Approach: An Improvement in Recommender Systems

In recent years Internet has emerged as an important tool for gaining information. But people confronts with abundance of data. High performance information searching is required to cope with this situation. Recommender...

Multiple Criteria Decision Making Methodology for Network security

Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling th...

Importance and Techniques of Information Hiding : A Review

Information or data is very crucial resource to us. Thus securing the information becomes all the more necessary. The communication media through which we send data does not provide data security, so other methods of sec...

A Survey of Preprocessing Method for Web Usage Mining Process

The amount of web applications are increasing in large amount and users of web applications are also increasing rapidly with high speed. By increasing number of users the size of log file also increases .The information...

Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol

We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on...

Download PDF file
  • EP ID EP141587
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Panga Eswaraiah, Dr. D. Kavitha (2013). Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(5), 248-253. https://europub.co.uk/articles/-A-141587