Network security resource distributing method based on level bidding mechanism

A network security and resource allocation technology, applied in the field of network security resource allocation based on hierarchical bidding mechanism, can solve the problems of no research mechanism design, etc., to achieve the effect of ensuring maximum allocation, reducing network energy consumption, and improving utilization efficiency

Inactive Publication Date: 2017-05-17
NANJING UNIV OF SCI & TECH
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such work focuses on pricing equilibrium and does not address issues such as mechanism design

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security resource distributing method based on level bidding mechanism
  • Network security resource distributing method based on level bidding mechanism
  • Network security resource distributing method based on level bidding mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] The present invention adopts a network security resource allocation method based on a hierarchical bidding mechanism, and the steps are as follows:

[0090] Step 1, the intelligent centralized controller collects available bandwidth resources in the network;

[0091] The available bandwidth resources in the collection network are the total traffic bandwidth of the radio frequency resources in the heterogeneous network, and the total traffic bandwidth of the radio frequency resources we use in this embodiment is 20M.

[0092] Step 2, the intelligent centralized controller collects the security resource usage application of the user equipment;

[0093] Submit an application to users who use wireless frequency bandwidth to collect relevant information about their Internet access.

[0094] Step 3, the intelligent centralized controller uses the bacterial foraging optimization algorithm to allocate network security resources;

[0095] The size of the bacterial population i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security resource distributing method based on a level bidding mechanism. The network security resource distributing method based on the level bidding mechanism comprises the following steps: collecting available bandwidth resources in a network, wherein the bandwidth resources are total flow bandwidth of wireless frequency resources in a heterogeneous network; collecting security resource service application of user equipment; distributing network safety resources by using a bacteria foraging optimization algorithm; distributing bacteria into swimming bacteria and rotating bacteria according to movement modes; calculating fitness values of the bacteria, and storing the current fitness values of the bacteria as the most suitable value; searching each bacterium at an original position and calculating a fitness value at a new position; if the fitness value of bacterium at the new position is greater than that of the bacterium at the original position, the original position is replaced; if searching times reach a threshold value, randomly generating a new position; if the searching times are smaller than or equal to the threshold value, carrying out a next step; recording the position where the fitness value is maximum and a corresponding fitness function value; and repeating for multiple times to obtain the distributed resource maximum value of network security resources.

Description

technical field [0001] The invention belongs to the technical field of computer networks, in particular to a method for allocating network security resources based on a hierarchical bidding mechanism. Background technique [0002] With the increasing complexity of the network, there is an ownership structure. This means that traditional models and secure resource exchanges between original owners and end users using allocation mechanisms are no longer always relevant. There are more and more middlemen, and operators buy the network security resources of the original owners and sell them to end users. Although middlemen play an important role in matching supply and demand in urban distribution channels, they also lead to inefficient allocation of network security resources. [0003] Consider bandwidth allocation schemes. Network bandwidth is mainly owned by Tier 1 ISPs (Internet Service Providers), and then allocated to Tier 2 ISPs. Tier 2 ISPs are further assigned to Tie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04W16/10H04W24/02H04W28/20
CPCH04L41/0896H04L41/28H04W16/10H04W24/02H04W28/20Y02D30/70
Inventor 徐雷姜殷伟李千目牟甲鹏涂亮周迅钊
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products