Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5

Abstract

Metacafe is one of the most popular video sharing system among all online video sharing systems, these video sharing systems provide features that allow users to post a video as a response to the topic that is being discussed. There are opportunities for its users to introduce polluted content,or simply pollution, into the system because of these features. For example, spammers may post an unrelated video as response to a popular one, aiming at increasing the likelihood of the response being viewed by a larger number of users in the same way also content promoters may try to gain visibility to a specific video by posting a large number of responses for boosting the rank of the responded video so that it will appear in the top lists maintained by the system. Content pollution means the posting of irrelevant content may jeopardize the trust of users on the video sharing system, thus in turn it compromises the success in promoting social interactions. In spite of that, the available literature is very limited in providing a deep understanding of this problem. In this paper, we address the issue of detecting video spammers and promoters considering you tube video sharing system. Index Terms: Promoter, social media, social networks, spammer, video promotion, video response, video spam.

Authors and Affiliations

Panga Eswaraiah , Dr. D. Kavitha

Keywords

Related Articles

PMA-Chord: Peer Mobility Adaptable Lookup for Chord Protocol

Structured Overlay Networks provide a promising system for high-performance applications because they may be fault-tolerant, scalable and self managing. Organized overlays provide lookup services that guide keys to nodes...

Improving Service Credibility Using Password Authenticated Peer Services

Password-Authenticated Key Exchange (PAKE) is where a client and a server, who share a password, authenticate each other and meanwhile establish a cryptographic key by exchange of messages. In a scenario where two server...

Meticulous Tasks of Various Cryptographic Techniques in Secure Communications

Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...

Private Grid Environment for Personal Users

The overall aim of this paper is to introduce the Private grid environment (PvGrid) as a ubiquitous grid environment that is not only owned and utilized by personal users but also deployed over their own devices. In this...

Mining Techniques in Health Care: A Survey of Immunization

data processing has been used intensively and generally by many organizations. The applications will greatly profit all parties concerned within the aid business. The aid background is usually supposed as being info a lo...

Download PDF file
  • EP ID EP141587
  • DOI -
  • Views 98
  • Downloads 0

How To Cite

Panga Eswaraiah, Dr. D. Kavitha (2013). Real Time Detection of Odd Behavior and Irrelevant Promotion in Video Sharing Systems. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(5), 248-253. https://europub.co.uk/articles/-A-141587