Efficiency Analysis on Robots Exclusion Protocol Based on Game Theory

被引:0
|
作者
Li, Wei [1 ]
Liao, Jian [2 ]
Zeng, Jianping [2 ]
机构
[1] China Tobacco ZheJiang Ind CO LTD, Hangzhou 310000, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
关键词
game theory; obots exclusion protocol; Web server;
D O I
10.1109/icasid.2019.8925189
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As we know, there is a dilemma between Web servers and crawlers. The server may allow certain Web crawlers to visit it to harvest some useful feedbacks, while the interactions might draw the server into a vulnerable situation like being overloaded and consequently even harm the network security with possible DDOS (distributed denials of service attacks). Robots exclusion protocol (REP) which is implemented by robots.txt, serves as a reminder to inform crawlers whether or not a specific page they can crawl. However, several acute cases show that many crawlers do not obey the rules defined in the robots.txt. Hence, it is necessary to explore the validity of REP so that the key factors that lead to the disobey situation can be found. In this paper, we try to answer the question why many crawlers do not obey the REP from a point of view of game theory. We represent the interactions between servers and crawlers in the framework of game theory. The Nash equilibrium of the game model is attained, and the result shows that the best strategy for both parties of Web servers and crawlers in the context of present robots.txt will be the (Disobey, Disobey). Furthermore, several key factors, such as the reputation loss of the crawler, the cost of servers to take the crawler to court, and the benefit the server can get from crawlers, are shown to have influences in the effective implementation of REP.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [31] A hybrid, game theory based, and distributed clustering protocol for wireless sensor networks
    Liu Yang
    Yin-Zhi Lu
    Yuan-Chang Zhong
    Xue-Gang Wu
    Shao-Jing Xing
    Wireless Networks, 2016, 22 : 1007 - 1021
  • [32] Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness
    Alzahrani, Naif
    Bulusu, Nirupama
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 465 - 485
  • [33] A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks
    Sheu, Jang-Ping
    Hsu, Chao-Xiang
    Ma, Chuang
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 659 - 664
  • [34] Analysis on Logistical Socialization of University Based on the Game Theory
    Zhang Zhijun
    PROCEEDINGS OF 2008 INTERNATIONAL SEMINAR ON EDUCATION MANAGEMENT AND ENGINEERING, 2008, : 783 - 788
  • [35] Vulnerability Analysis of CSP Based on Stochastic Game Theory
    Shen, Jiajun
    Feng, Dongqin
    JOURNAL OF CONTROL SCIENCE AND ENGINEERING, 2016, 2016
  • [36] The Analysis of Tax Planning in the Enterprises Based on Game Theory
    Lin, Li-Ping
    Hao, Shi-Lei
    2015 2ND INTERNATIONAL CONFERENCE ON E-COMMERCE AND CONTEMPORARY ECONOMIC DEVELOPMENT (ECED 2015), 2015, : 399 - 402
  • [37] Analysis of Community In Social Networks Based on Game Theory
    Castiglione, Aniello
    Cozzolino, Giovanni
    Moscato, Vincenzo
    Sperli, Giancarlo
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 619 - 626
  • [38] Analysis of Bidding Collusion Problem Based on Game Theory
    Liu Rui-yu
    Hu Yong
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 5305 - 5307
  • [39] Analysis on Corporate Strategy Commitment Based on Game Theory
    Yang Weilong
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2009, : 310 - 316
  • [40] Analysis on Supplier's Yields Based on Game Theory
    Li Chilin
    Gong Lei
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INNOVATION & MANAGEMENT, VOLS I AND II, 2008, : 1287 - 1290