Skip to main content

高频交易

高频交易一般是以电脑买卖盘程式进行非常高速的证券交易,从中赚取证券买卖价格的差价。
目录

    1 内部技术
    2 电脑系统
    3 监管与限制
        3.1 中国内地
    4 参考资料
    5 外部链接

内部技术

技术大体包括: [1] [2] [3]

    夺取优先权 (Priority Jumping)
    算法监听 (Algo Sniffing)
    监听大买卖盘 (Iceberg Sniffing)
    黑池交易平台、传统证券交易平台交叉买卖 (Dark Sub Penny Queue Jumping)
    信号触发(Signaling)
    触发证券交易所补偿(Intentional Locking Markets)

电脑系统

由于高频交易需要以高速的硬件执行买卖盘程式,因此也有电脑厂商提供高速电脑系统,甚至以超频的中央处理器增加效能。[4]
监管与限制
中国内地

中国内地的股票市场由于采用T+1交易制度,普通投资者难以进行一般意义上的高频交易。虽然通过建仓及分散持仓可以近似模拟高频交易,但是由于法律法规限制同一人实际控制的账户之间进行大量或频繁的交易[5],这种交易可能会被认定为市场操纵。期货市场虽然采用T+0交易制度,但交易规则将日内频繁回转交易以及计算机程序自动批量下单、快速下单的交易列为异常交易行为[6],因此高频交易同样受到限制。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...