Efficiency Analysis on Robots Exclusion Protocol Based on Game Theory

被引:0
|
作者
Li, Wei [1 ]
Liao, Jian [2 ]
Zeng, Jianping [2 ]
机构
[1] China Tobacco ZheJiang Ind CO LTD, Hangzhou 310000, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
关键词
game theory; obots exclusion protocol; Web server;
D O I
10.1109/icasid.2019.8925189
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As we know, there is a dilemma between Web servers and crawlers. The server may allow certain Web crawlers to visit it to harvest some useful feedbacks, while the interactions might draw the server into a vulnerable situation like being overloaded and consequently even harm the network security with possible DDOS (distributed denials of service attacks). Robots exclusion protocol (REP) which is implemented by robots.txt, serves as a reminder to inform crawlers whether or not a specific page they can crawl. However, several acute cases show that many crawlers do not obey the rules defined in the robots.txt. Hence, it is necessary to explore the validity of REP so that the key factors that lead to the disobey situation can be found. In this paper, we try to answer the question why many crawlers do not obey the REP from a point of view of game theory. We represent the interactions between servers and crawlers in the framework of game theory. The Nash equilibrium of the game model is attained, and the result shows that the best strategy for both parties of Web servers and crawlers in the context of present robots.txt will be the (Disobey, Disobey). Furthermore, several key factors, such as the reputation loss of the crawler, the cost of servers to take the crawler to court, and the benefit the server can get from crawlers, are shown to have influences in the effective implementation of REP.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [41] The analysis of the government information sharing based on the game theory
    Wang Tianyong
    Gao Ge
    Wang Qianqian
    Wang Yulei
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2433 - +
  • [42] Analysis based on game theory for construction safety supervision
    Wang Jin
    Li Zhun
    Wang Dongmei
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL 6, PTS A AND B, 2006, 6 : 263 - 266
  • [43] Analysis of Food Safety Supervision Based on Game Theory
    Tong Guang-ji
    Zhu Guang-qin
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (4TH), VOL II, 2008, : 512 - 517
  • [44] Analysis of the Mechanisms of Emergency Management Based on Game Theory
    Wang Yan
    Zhai Fengyong
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON CONSTRUCTION & REAL ESTATE MANAGEMENT, VOLS 1 AND 2, 2008, : 1565 - 1568
  • [45] Analysis of Stakeholders in the Emergency Industry Based on Game Theory
    Fan Sha
    Ma Ying
    Wang Lijuan
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, VOLS I & II, 2016, : 299 - 303
  • [46] The Analysis of Equipment "Three Costs" Based on Game Theory
    Liu Cheng-bin
    Mang Huai-qiang
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1009 - 1016
  • [47] Analysis of Equilibrium in Competitive Intelligence Based on Game Theory
    Yu Haidong
    Tang Wenhui
    Tian Qihua
    Luo Yunfeng
    CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 3540 - +
  • [48] An Analysis on the Screening Mechanism of the Manipulator Based on Game Theory
    Wang, Chunxin
    Liu, Zaochen
    Shen, Qian
    Han, Peng
    Mu, Shuai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON MAN-MACHINE-ENVIRONMENT SYSTEM ENGINEERING, 2015, 356 : 85 - 92
  • [49] The Evolutionary-Game-Theory-Based Analysis of the Enterprise and Government Innovation Game
    Luo Yafei
    Meng Qingliang
    RECENT ADVANCE IN STATISTICS APPLICATION AND RELATED AREAS, VOLS I AND II, 2009, : 1223 - 1232
  • [50] Analysis of the Emergency Procurement Based on Evolutionary Game Theory
    Zhong, Qi
    Li, Zheng
    Zhang, Le
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 2, 2009, : 261 - 264