首页 > 最新文献

IEEE/ACM Transactions on Networking最新文献

英文 中文
IEEE/ACM Transactions on Networking Publication Information IEEE/ACM Transactions on Networking 出版信息
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-16 DOI: 10.1109/TNET.2024.3473629
{"title":"IEEE/ACM Transactions on Networking Publication Information","authors":"","doi":"10.1109/TNET.2024.3473629","DOIUrl":"https://doi.org/10.1109/TNET.2024.3473629","url":null,"abstract":"","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"C2-C2"},"PeriodicalIF":3.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10720551","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE/ACM Transactions on Networking Society Information IEEE/ACM Transactions on Networking Society Information
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-16 DOI: 10.1109/TNET.2024.3473571
{"title":"IEEE/ACM Transactions on Networking Society Information","authors":"","doi":"10.1109/TNET.2024.3473571","DOIUrl":"https://doi.org/10.1109/TNET.2024.3473571","url":null,"abstract":"","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 5","pages":"C3-C3"},"PeriodicalIF":3.0,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10720575","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic-Aware Merkle Trees for Shortening Blockchain Transaction Proofs 用于缩短区块链交易证明的流量感知Merkle树
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-14 DOI: 10.1109/TNET.2024.3466245
Avi Mizrahi;Noam Koren;Ori Rottenstreich;Yuval Cassuto
Merkle trees play a crucial role in blockchain networks in organizing network state. They allow proving a particular value of an entry in the state to a node that maintains only the root of the Merkle trees, a hash-based signature computed over the data in a hierarchical manner. Verification of particular state entries is crucial in reaching a consensus on the execution of a block where state information is required in the processing of its transactions. For instance, a payment transaction should be based on the balance of the two involved accounts. The proof length affects the network communication and is typically logarithmic in the state size. In this paper, we take advantage of typical transaction characteristics for better organizing Merkle trees to improve blockchain network performance. We focus on the common transaction processing where Merkle proofs are jointly provided for multiple accounts. We first provide lower bounds for the communication cost that are based on the distribution of accounts involved in the transactions. We then describe algorithms that consider traffic patterns for significantly reducing it. The algorithms are inspired by various coding methods such as Huffman coding, partition and weight balancing. We also generalize our approach towards the encoding of smart contract transactions that involve an arbitrary number of accounts. Likewise, we rely on real blockchain data to show the savings allowed by our approach. The experimental evaluation is based on transactions from the Ethereum network and demonstrates cost reduction for both payment transactions and smart contract transactions.
在区块链网络中,默克尔树在组织网络状态方面起着至关重要的作用。它们允许向仅维护Merkle树根的节点证明状态中条目的特定值,这是一种以分层方式计算数据的基于哈希的签名。在交易处理过程中需要状态信息的情况下,对特定状态条目的验证对于就区块的执行达成共识至关重要。例如,支付交易应该基于两个相关账户的余额。证明长度影响网络通信,并且在状态大小上通常是对数的。在本文中,我们利用典型的事务特征来更好地组织Merkle树,以提高区块链网络的性能。我们关注的是共同为多个账户提供默克尔证明的公共交易处理。我们首先根据交易中涉及的账户分布为通信成本提供下限。然后,我们描述了考虑流量模式的算法,以显着减少流量。该算法的灵感来自于各种编码方法,如霍夫曼编码、分割和权重平衡。我们还概括了涉及任意数量账户的智能合约交易的编码方法。同样,我们依赖于实际区块链数据来显示我们的方法所允许的节省。实验评估基于以太坊网络的交易,并展示了支付交易和智能合约交易的成本降低。
{"title":"Traffic-Aware Merkle Trees for Shortening Blockchain Transaction Proofs","authors":"Avi Mizrahi;Noam Koren;Ori Rottenstreich;Yuval Cassuto","doi":"10.1109/TNET.2024.3466245","DOIUrl":"https://doi.org/10.1109/TNET.2024.3466245","url":null,"abstract":"Merkle trees play a crucial role in blockchain networks in organizing network state. They allow proving a particular value of an entry in the state to a node that maintains only the root of the Merkle trees, a hash-based signature computed over the data in a hierarchical manner. Verification of particular state entries is crucial in reaching a consensus on the execution of a block where state information is required in the processing of its transactions. For instance, a payment transaction should be based on the balance of the two involved accounts. The proof length affects the network communication and is typically logarithmic in the state size. In this paper, we take advantage of typical transaction characteristics for better organizing Merkle trees to improve blockchain network performance. We focus on the common transaction processing where Merkle proofs are jointly provided for multiple accounts. We first provide lower bounds for the communication cost that are based on the distribution of accounts involved in the transactions. We then describe algorithms that consider traffic patterns for significantly reducing it. The algorithms are inspired by various coding methods such as Huffman coding, partition and weight balancing. We also generalize our approach towards the encoding of smart contract transactions that involve an arbitrary number of accounts. Likewise, we rely on real blockchain data to show the savings allowed by our approach. The experimental evaluation is based on transactions from the Ethereum network and demonstrates cost reduction for both payment transactions and smart contract transactions.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5326-5340"},"PeriodicalIF":3.0,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OBMA: Scalable Route Lookups With Fast and Zero-Interrupt Updates 具有快速和零中断更新的可扩展路由查找
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-11 DOI: 10.1109/TNET.2024.3446689
Chuwen Zhang;Yong Feng;Haoyu Song;Ying Wan;Wenquan Xu;Bin Liu
Software-based IP route lookup is a key component for packet forwarding in Software Defined Networks. Running lookup algorithms on commodity CPUs is flexible and scalable, which shows advantages on cost and power consumption over the hardware-based forwarding engines. However, dynamic network functions and services make route updates more frequent than ever. Existing algorithms often fall short of the incremental update requirements. In this paper, we propose the Overlay BitMap Algorithm (OBMA), which contains several variations, to support extraordinary update performance while maintaining the highest-in-class lookup speed and storage efficiency. Starting from the basic OBMA_B, we develop two variations with different tradeoffs for different application scenarios. OBMA_L supports faster lookups than OBMA_B at a small cost of update speed. OBMA_S achieves better storage efficiency than OBMA_B at a small cost of lookup throughput. We run our algorithms on a commodity CPU and evaluate them with real-world route tables and traces. The experiments show that OBMA achieves the lowest memory footprint, the highest update speed, and over 200 Mpps lookup throughput. Specifically, OBMA_S reduces the memory footprint to 3.98 bytes/prefix which is 25.33% smaller that of the state-of-the-art Poptrie; OBMA_L supports 252.02 Mpps lookup throughput with a single thread, and more than 600 Mpps with multiple parallel threads in a single CPU, significantly outperforming the state-of-the-art Poptrie and SAIL; OBMA_B supports updates at a rate of 14.58M updates/s which is 15 times faster than Poptrie. The tests show that the update process has little interference with the lookup process for OBMA, and achieves zero-interrupt to lookups with multiple threads.
基于软件的IP路由查找是软件定义网络中报文转发的关键组成部分。在商用cpu上运行查找算法具有灵活性和可扩展性,与基于硬件的转发引擎相比,在成本和功耗方面具有优势。然而,动态的网络功能和服务使得路由更新比以往更加频繁。现有的算法往往不能满足增量更新的要求。在本文中,我们提出了覆盖位图算法(OBMA),它包含几个变体,以支持非凡的更新性能,同时保持最高的查找速度和存储效率。从基本的OBMA_B开始,我们为不同的应用程序场景开发了两个具有不同权衡的变体。OBMA_L支持比OBMA_B更快的查找,而更新速度的代价很小。OBMA_S以较小的查找吞吐量为代价,实现了比OBMA_B更好的存储效率。我们在一个商品CPU上运行我们的算法,并用真实世界的路由表和轨迹对它们进行评估。实验表明,OBMA实现了最低的内存占用、最高的更新速度和超过200 Mpps的查找吞吐量。具体来说,OBMA_S将内存占用减少到3.98字节/前缀,比最先进的Poptrie小25.33%;OBMA_L支持单个线程的252.02 Mpps查找吞吐量,在单个CPU中支持多个并行线程的600 Mpps查找吞吐量,显著优于最先进的Poptrie和SAIL;OBMA_B支持14.58M更新/s的速度,比Poptrie快15倍。测试表明,更新过程对OBMA查找过程的干扰很小,实现了多线程查找的零中断。
{"title":"OBMA: Scalable Route Lookups With Fast and Zero-Interrupt Updates","authors":"Chuwen Zhang;Yong Feng;Haoyu Song;Ying Wan;Wenquan Xu;Bin Liu","doi":"10.1109/TNET.2024.3446689","DOIUrl":"https://doi.org/10.1109/TNET.2024.3446689","url":null,"abstract":"Software-based IP route lookup is a key component for packet forwarding in Software Defined Networks. Running lookup algorithms on commodity CPUs is flexible and scalable, which shows advantages on cost and power consumption over the hardware-based forwarding engines. However, dynamic network functions and services make route updates more frequent than ever. Existing algorithms often fall short of the incremental update requirements. In this paper, we propose the Overlay BitMap Algorithm (OBMA), which contains several variations, to support extraordinary update performance while maintaining the highest-in-class lookup speed and storage efficiency. Starting from the basic OBMA_B, we develop two variations with different tradeoffs for different application scenarios. OBMA_L supports faster lookups than OBMA_B at a small cost of update speed. OBMA_S achieves better storage efficiency than OBMA_B at a small cost of lookup throughput. We run our algorithms on a commodity CPU and evaluate them with real-world route tables and traces. The experiments show that OBMA achieves the lowest memory footprint, the highest update speed, and over 200 Mpps lookup throughput. Specifically, OBMA_S reduces the memory footprint to 3.98 bytes/prefix which is 25.33% smaller that of the state-of-the-art Poptrie; OBMA_L supports 252.02 Mpps lookup throughput with a single thread, and more than 600 Mpps with multiple parallel threads in a single CPU, significantly outperforming the state-of-the-art Poptrie and SAIL; OBMA_B supports updates at a rate of 14.58M updates/s which is 15 times faster than Poptrie. The tests show that the update process has little interference with the lookup process for OBMA, and achieves zero-interrupt to lookups with multiple threads.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4842-4854"},"PeriodicalIF":3.0,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers 基于区域锚的移动IP地理定位,无需用户或互联网服务提供商的合作
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-11 DOI: 10.1109/TNET.2024.3471335
Ruixiang Li;Xiaoyun Yuan;Meijuan Yin;Xiangyang Luo
Mobile IP geolocation aims to obtain a mobile device’s geographic location by IP. This technology is widely used in preventing financial risk, investigating cybercrime, and delivering targeted information. Currently, there are three types of IP geolocation: based on cooperation, querying in database, or network measurement. However, since restricted cooperation, low-reliability databases, and unresponsive mobile IPs, existing technologies are hard to geolocate fine-grained location of mobile IP. In this paper, we propose the concept of district anchor, and propose a non-cooperative mobile IP geolocation scheme, including three parts: acquiring district anchors by clustering, evaluating the reliability of district anchors, and geolocating mobile IPs. We also give implemented approach of this scheme. Instead of using existing clustering algorithms treating IPs and geolocations in no particular order, we propose two-stages clustering algorithm (IPG2C) to acquire district anchors, and establish reliability evaluation mechanism by IP distribution and spatial distribution of cluster. Eventually, using obtained reliable district anchors, we use “subnet geolocation” strategy to geolocate mobile IPs. The experimental results in 10 cities show that: 1) our scheme can be used to geolocate mobile IPs without cooperation; 2) the mean geolocation error is 12.47km, where precision of 56.67% of mobile IPs is street-level and minimum error is only 13m; 3) that the mean geolocation error of the anchor-based method is smaller than that of the landmark-based method; 4) compared with 13 clustering algorithms (e.g., K-Means++, Mean Shift, DBSCAN, and GMM), mean geolocation error using IPG2C’s district anchors is reduced by 26.62%~50.77%.
移动IP地理定位的目的是通过IP获取移动设备的地理位置。该技术广泛应用于防范金融风险、调查网络犯罪和提供有针对性的信息。目前,IP地理定位主要有三种类型:基于协作、数据库查询和网络测量。然而,由于合作受限、数据库可靠性低、移动IP响应缓慢等原因,现有技术难以实现移动IP的细粒度定位。本文提出了区域锚点的概念,并提出了一种非合作的移动IP地理定位方案,包括聚类获取区域锚点、区域锚点可靠性评估和移动IP地理定位三个部分。并给出了该方案的实现方法。针对现有聚类算法对IP和地理位置的无先后性处理,提出了两阶段聚类算法(IPG2C)获取区域锚点,并通过IP分布和聚类的空间分布建立可靠性评估机制。最后,利用获得的可靠区域锚点,采用“子网地理定位”策略对移动ip进行地理定位。在10个城市的实验结果表明:1)该方案可以实现无需合作的移动ip定位;2)平均地理定位误差为12.47km,其中56.67%的移动ip精度为街道级,最小误差仅为13m;3)基于锚点的方法平均地理定位误差小于基于地标的方法;4)与k - meme++、Mean Shift、DBSCAN、GMM等13种聚类算法相比,IPG2C区域锚点的平均地理定位误差降低了26.62%~50.77%。
{"title":"Mobile IP Geolocation Based on District Anchor Without Cooperation of Users or Internet Service Providers","authors":"Ruixiang Li;Xiaoyun Yuan;Meijuan Yin;Xiangyang Luo","doi":"10.1109/TNET.2024.3471335","DOIUrl":"https://doi.org/10.1109/TNET.2024.3471335","url":null,"abstract":"Mobile IP geolocation aims to obtain a mobile device’s geographic location by IP. This technology is widely used in preventing financial risk, investigating cybercrime, and delivering targeted information. Currently, there are three types of IP geolocation: based on cooperation, querying in database, or network measurement. However, since restricted cooperation, low-reliability databases, and unresponsive mobile IPs, existing technologies are hard to geolocate fine-grained location of mobile IP. In this paper, we propose the concept of district anchor, and propose a non-cooperative mobile IP geolocation scheme, including three parts: acquiring district anchors by clustering, evaluating the reliability of district anchors, and geolocating mobile IPs. We also give implemented approach of this scheme. Instead of using existing clustering algorithms treating IPs and geolocations in no particular order, we propose two-stages clustering algorithm (IPG2C) to acquire district anchors, and establish reliability evaluation mechanism by IP distribution and spatial distribution of cluster. Eventually, using obtained reliable district anchors, we use “subnet geolocation” strategy to geolocate mobile IPs. The experimental results in 10 cities show that: 1) our scheme can be used to geolocate mobile IPs without cooperation; 2) the mean geolocation error is 12.47km, where precision of 56.67% of mobile IPs is street-level and minimum error is only 13m; 3) that the mean geolocation error of the anchor-based method is smaller than that of the landmark-based method; 4) compared with 13 clustering algorithms (e.g., K-Means++, Mean Shift, DBSCAN, and GMM), mean geolocation error using IPG2C’s district anchors is reduced by 26.62%~50.77%.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5507-5523"},"PeriodicalIF":3.0,"publicationDate":"2024-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fluid-Shuttle: Efficient Cloud Data Transmission Based on Serverless Computing Compression 流体穿梭:基于无服务器计算压缩的高效云数据传输
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-10 DOI: 10.1109/TNET.2024.3402561
Rong Gu;Shulin Wang;Haipeng Dai;Xiaofei Chen;Zhaokang Wang;Wenjie Bao;Jiaqi Zheng;Yaofeng Tu;Yihua Huang;Lianyong Qi;Xiaolong Xu;Wanchun Dou;Guihai Chen
Nowadays, there exists a lot of cross-region data transmission demand on the cloud. It is promising to use serverless computing for data compressing to save the total data size. However, it is challenging to estimate the data transmission time and monetary cost with serverless compression. In addition, minimizing the data transmission cost is non-trivial due to the enormous parameter space. This paper focuses on this problem and makes the following contributions: 1) We propose empirical data transmission time and monetary cost models based on serverless compression. It can also predict compression information, e.g., ratio and speed using chunk sampling and machine learning techniques. 2) For single-task cloud data transmission, we propose two efficient parameter search methods based on Sequential Quadratic Programming (SQP) and Eliminate then Divide and Conquer (EDC) with proven error upper bounds. Besides, we propose a parameter fine-tuning strategy to deal with transmission bandwidth variance. 3) Furthermore, for multi-task scenarios, a parameter search method based on dynamic programming and numerical computation is proposed. We have implemented the system called Fluid-Shuttle, which includes straggler optimization, cache optimization, and the autoscaling decompression mechanism. Finally, we evaluate the performance of Fluid-Shuttle with various workloads and applications on the real-world AWS serverless computing platform. Experimental results show that the proposed approach can improve the parameter search efficiency by over $3times $ compared with the state-of-art methods and achieves better parameter quality. In addition, our approach achieves higher time efficiency and lower monetary cost compared with competing cloud data transmission approaches.
如今,在云上存在着大量的跨区域数据传输需求。使用无服务器计算进行数据压缩以节省总数据大小是有希望的。然而,估计无服务器压缩的数据传输时间和金钱成本是具有挑战性的。此外,由于参数空间巨大,使数据传输成本最小化是非常重要的。本文重点研究了这一问题,并做出了以下贡献:1)提出了基于无服务器压缩的经验数据传输时间和货币成本模型。它还可以预测压缩信息,例如,使用块采样和机器学习技术的比率和速度。2)针对单任务云数据传输,提出了基于顺序二次规划(SQP)和消除然后分治(EDC)的两种高效参数搜索方法,并证明了误差上界。此外,我们还提出了一种参数微调策略来处理传输带宽的变化。3)针对多任务场景,提出了一种基于动态规划和数值计算的参数搜索方法。我们实现了一个名为Fluid-Shuttle的系统,该系统包括离散优化、缓存优化和自动缩放解压机制。最后,我们在真实的AWS无服务器计算平台上评估了Fluid-Shuttle在各种工作负载和应用程序下的性能。实验结果表明,该方法与现有方法相比,参数搜索效率提高了3倍以上,参数质量得到了提高。此外,与竞争对手的云数据传输方法相比,我们的方法具有更高的时间效率和更低的货币成本。
{"title":"Fluid-Shuttle: Efficient Cloud Data Transmission Based on Serverless Computing Compression","authors":"Rong Gu;Shulin Wang;Haipeng Dai;Xiaofei Chen;Zhaokang Wang;Wenjie Bao;Jiaqi Zheng;Yaofeng Tu;Yihua Huang;Lianyong Qi;Xiaolong Xu;Wanchun Dou;Guihai Chen","doi":"10.1109/TNET.2024.3402561","DOIUrl":"https://doi.org/10.1109/TNET.2024.3402561","url":null,"abstract":"Nowadays, there exists a lot of cross-region data transmission demand on the cloud. It is promising to use serverless computing for data compressing to save the total data size. However, it is challenging to estimate the data transmission time and monetary cost with serverless compression. In addition, minimizing the data transmission cost is non-trivial due to the enormous parameter space. This paper focuses on this problem and makes the following contributions: 1) We propose empirical data transmission time and monetary cost models based on serverless compression. It can also predict compression information, e.g., ratio and speed using chunk sampling and machine learning techniques. 2) For single-task cloud data transmission, we propose two efficient parameter search methods based on Sequential Quadratic Programming (SQP) and Eliminate then Divide and Conquer (EDC) with proven error upper bounds. Besides, we propose a parameter fine-tuning strategy to deal with transmission bandwidth variance. 3) Furthermore, for multi-task scenarios, a parameter search method based on dynamic programming and numerical computation is proposed. We have implemented the system called Fluid-Shuttle, which includes straggler optimization, cache optimization, and the autoscaling decompression mechanism. Finally, we evaluate the performance of Fluid-Shuttle with various workloads and applications on the real-world AWS serverless computing platform. Experimental results show that the proposed approach can improve the parameter search efficiency by over \u0000<inline-formula> <tex-math>$3times $ </tex-math></inline-formula>\u0000 compared with the state-of-art methods and achieves better parameter quality. In addition, our approach achieves higher time efficiency and lower monetary cost compared with competing cloud data transmission approaches.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"4554-4569"},"PeriodicalIF":3.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crafting Binary Protocol Reversing via Deep Learning With Knowledge-Driven Augmentation 通过知识驱动增强的深度学习制作二进制协议反转
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-10 DOI: 10.1109/TNET.2024.3468350
Sen Zhao;Shouguo Yang;Zhen Wang;Yongji Liu;Hongsong Zhu;Limin Sun
Protocol reverse engineering (PRE) serves as an instrumental tool in various security research, such as protocol fuzzing and intrusion detection. Its primary objective lies in uncovering the format, semantics, and behavior of an unknown protocol without prior information. This paper presents DL-ProS2, a deep learning-based approach for binary protocol reversing, focusing on format segmentation and semantic inference from network traffic. Our approach is underpinned by highlighting the effectiveness of multi-scale features within the network traffic for identifying various types of fields and semantics. Based on this, DL-ProS2 employs a comprehensive end-to-end model that integrates U-Net, siamese network, and BiLSTM-CRF, which enables the effective analysis of unknown protocol traffic to extract the field boundaries and semantics. Meanwhile, to address the issue of limited data diversity and coverage, we implement an innovative knowledge-driven traffic simulation technique. This method harnesses the ChatGPT to extract protocol knowledge from publicly available protocol documents, such as RFCs, as the foundational rules for the simulation. Empirical results substantiate the efficacy of our approach, demonstrating precision rates exceeding 0.95 and recall rates surpassing 0.97 for partially unknown protocol format segmentation and semantic inference. It also retains effectiveness in the inference of completely unknown protocols, with average precision and recall rates of 0.69 and 0.62 for format segmentation, and 0.43 and 0.47 for semantic inference, respectively.
协议逆向工程(PRE)在协议模糊和入侵检测等安全研究中发挥着重要的作用。它的主要目标是在没有先验信息的情况下揭示未知协议的格式、语义和行为。本文介绍了DL-ProS2,一种基于深度学习的二进制协议反转方法,重点关注网络流量的格式分割和语义推断。我们的方法通过强调网络流量中用于识别各种类型字段和语义的多尺度特征的有效性来支持。在此基础上,DL-ProS2采用了U-Net、siamese网络和BiLSTM-CRF集成的全面端到端模型,能够有效分析未知协议流量,提取字段边界和语义。同时,为了解决数据多样性和覆盖范围有限的问题,我们实施了一种创新的知识驱动交通模拟技术。该方法利用ChatGPT从公开可用的协议文档(如rfc)中提取协议知识,作为模拟的基本规则。实证结果证实了我们方法的有效性,表明对于部分未知的协议格式分割和语义推理,准确率超过0.95,召回率超过0.97。它在完全未知协议的推理中也保持了有效性,格式分割的平均精度和召回率分别为0.69和0.62,语义推理的平均精度和召回率分别为0.43和0.47。
{"title":"Crafting Binary Protocol Reversing via Deep Learning With Knowledge-Driven Augmentation","authors":"Sen Zhao;Shouguo Yang;Zhen Wang;Yongji Liu;Hongsong Zhu;Limin Sun","doi":"10.1109/TNET.2024.3468350","DOIUrl":"https://doi.org/10.1109/TNET.2024.3468350","url":null,"abstract":"Protocol reverse engineering (PRE) serves as an instrumental tool in various security research, such as protocol fuzzing and intrusion detection. Its primary objective lies in uncovering the format, semantics, and behavior of an unknown protocol without prior information. This paper presents DL-ProS2, a deep learning-based approach for binary protocol reversing, focusing on format segmentation and semantic inference from network traffic. Our approach is underpinned by highlighting the effectiveness of multi-scale features within the network traffic for identifying various types of fields and semantics. Based on this, DL-ProS2 employs a comprehensive end-to-end model that integrates U-Net, siamese network, and BiLSTM-CRF, which enables the effective analysis of unknown protocol traffic to extract the field boundaries and semantics. Meanwhile, to address the issue of limited data diversity and coverage, we implement an innovative knowledge-driven traffic simulation technique. This method harnesses the ChatGPT to extract protocol knowledge from publicly available protocol documents, such as RFCs, as the foundational rules for the simulation. Empirical results substantiate the efficacy of our approach, demonstrating precision rates exceeding 0.95 and recall rates surpassing 0.97 for partially unknown protocol format segmentation and semantic inference. It also retains effectiveness in the inference of completely unknown protocols, with average precision and recall rates of 0.69 and 0.62 for format segmentation, and 0.43 and 0.47 for semantic inference, respectively.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5399-5414"},"PeriodicalIF":3.0,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KMSharing: The Framework and Space Abstraction for Efficient Data Sharing at the Network Edge KMSharing:网络边缘高效数据共享的框架和空间抽象
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-09 DOI: 10.1109/TNET.2024.3465844
Yuchen Sun;Lailong Luo;Deke Guo;Li Liu;Junjie Xie
Edge storage promises to be crucial for edge computing infrastructure, which enables users to access data within a low delay from widespread storage nodes at the network edge. The key challenge is how to integrate massive geographically distributed weak edge nodes to form an efficient storage system, enabling users to launch data operations from any node or retrieve the desired data across the entire distributed system. To address this data-sharing problem, researchers from both the traditional peer-to-peer (P2P) overlay networking and emerging edge computing fields have proposed some decentralized indexing mechanisms. However, existing studies lack insightful descriptions and analyses about the nature of the data-sharing problem at the network edge. It motivates us to rethink the edge data-sharing framework and provide the problem reformulation for analyzing the limitations of existing schemes. We reveal that the existing data-sharing schemes fail in complex network topologies which can be regarded as high-dimensional network spaces beyond the representation of low-dimensional Euclidean spaces or other existing hash spaces. A better space abstraction is an urgent need to alleviate the performance degradation due to the dimensional mismatch between network spaces and virtual spaces. To fill this gap, this paper proposes the Kautz metric space, a novel space abstraction extended from Kautz graphs, where the coordinates and the metric are defined as Kautz strings and Kautz distances (i.e., the shortest distances in undirected Kautz graphs), respectively. We design a dynamic programming algorithm to directly compute the Kautz distances. Then, we propose KMSharing, an efficient edge data-sharing scheme: both nodes and data are represented in a Kautz metric space, where the Kautz distance of any two Kautz strings reflects the network delay of the corresponding nodes. The workflow of KMSharing consists of three core components: the virtual address allocation represents edge nodes in the Kautz metric space; the data-to-node mapping ensures the uniqueness of target nodes; and forwarding table construction ensures the data delivery. Theoretical analyses confirm that KMSharing ideally achieves $mathcal {O}left ({{ tau }}right)$ network delays, $mathcal {O}left ({{ log N }}right)$ overlay hops, and $mathcal {O}left ({{ 1 }}right)$ forwarding entries in an N-node edge system with the network radius $tau $ , while the successive ensuring data delivery. Its worst-case network delay $mathcal {O}left ({{ tau log N }}right)$ is also much better than ${mathcal {O}left ({{ tau N^{alpha } }}right)},alpha mathrm {in }(0,1)$ , t
边缘存储对于边缘计算基础设施至关重要,它使用户能够在低延迟的情况下从网络边缘的广泛存储节点访问数据。关键的挑战是如何整合大量地理分布的弱边缘节点,形成一个高效的存储系统,使用户能够从任何节点发起数据操作,或者在整个分布式系统中检索所需的数据。为了解决这一数据共享问题,传统的P2P覆盖网络和新兴的边缘计算领域的研究人员都提出了一些分散的索引机制。然而,现有研究缺乏对网络边缘数据共享问题本质的深刻描述和分析。它促使我们重新思考边缘数据共享框架,并为分析现有方案的局限性提供问题重构。我们揭示了现有的数据共享方案在复杂的网络拓扑中失败,这些网络拓扑可以被视为高维网络空间,超越了低维欧几里得空间或其他现有哈希空间的表示。为了缓解由于网络空间和虚拟空间之间的维度不匹配而导致的性能下降,迫切需要更好的空间抽象。为了填补这一空白,本文提出了Kautz度量空间,这是由Kautz图扩展而来的一种新的空间抽象,其中坐标和度量分别定义为Kautz弦和Kautz距离(即无向Kautz图中的最短距离)。我们设计了一种动态规划算法来直接计算Kautz距离。然后,我们提出了一种有效的边缘数据共享方案KMSharing:节点和数据都在一个Kautz度量空间中表示,其中任意两个Kautz字符串的Kautz距离反映了相应节点的网络延迟。KMSharing的工作流程由三个核心部分组成:虚拟地址分配表示Kautz度量空间中的边缘节点;数据到节点的映射保证了目标节点的唯一性;转发表的构造保证了数据的传递。理论分析证实,在网络半径为$tau $的n节点边缘系统中,KMSharing理想地实现了$mathcal {O}left ({{ tau }}right)$网络时延、$mathcal {O}left ({{ log N }}right)$覆盖跳数和$mathcal {O}left ({{ 1 }}right)$转发表项,同时连续保证了数据的传输。它的最坏情况网络延迟$mathcal {O}left ({{ tau log N }}right)$也比${mathcal {O}left ({{ tau N^{alpha } }}right)},alpha mathrm {in }(0,1)$好得多,是使用欧几里得空间的基线的最坏情况。对各种网络拓扑的评估也表明,我们的KMSharing比现有的数据共享方案有效地降低了网络延迟和索引成本。
{"title":"KMSharing: The Framework and Space Abstraction for Efficient Data Sharing at the Network Edge","authors":"Yuchen Sun;Lailong Luo;Deke Guo;Li Liu;Junjie Xie","doi":"10.1109/TNET.2024.3465844","DOIUrl":"https://doi.org/10.1109/TNET.2024.3465844","url":null,"abstract":"Edge storage promises to be crucial for edge computing infrastructure, which enables users to access data within a low delay from widespread storage nodes at the network edge. The key challenge is how to integrate massive geographically distributed weak edge nodes to form an efficient storage system, enabling users to launch data operations from any node or retrieve the desired data across the entire distributed system. To address this data-sharing problem, researchers from both the traditional peer-to-peer (P2P) overlay networking and emerging edge computing fields have proposed some decentralized indexing mechanisms. However, existing studies lack insightful descriptions and analyses about the nature of the data-sharing problem at the network edge. It motivates us to rethink the edge data-sharing framework and provide the problem reformulation for analyzing the limitations of existing schemes. We reveal that the existing data-sharing schemes fail in complex network topologies which can be regarded as high-dimensional network spaces beyond the representation of low-dimensional Euclidean spaces or other existing hash spaces. A better space abstraction is an urgent need to alleviate the performance degradation due to the dimensional mismatch between network spaces and virtual spaces. To fill this gap, this paper proposes the Kautz metric space, a novel space abstraction extended from Kautz graphs, where the coordinates and the metric are defined as Kautz strings and Kautz distances (i.e., the shortest distances in undirected Kautz graphs), respectively. We design a dynamic programming algorithm to directly compute the Kautz distances. Then, we propose KMSharing, an efficient edge data-sharing scheme: both nodes and data are represented in a Kautz metric space, where the Kautz distance of any two Kautz strings reflects the network delay of the corresponding nodes. The workflow of KMSharing consists of three core components: the virtual address allocation represents edge nodes in the Kautz metric space; the data-to-node mapping ensures the uniqueness of target nodes; and forwarding table construction ensures the data delivery. Theoretical analyses confirm that KMSharing ideally achieves \u0000<inline-formula> <tex-math>$mathcal {O}left ({{ tau }}right)$ </tex-math></inline-formula>\u0000 network delays, \u0000<inline-formula> <tex-math>$mathcal {O}left ({{ log N }}right)$ </tex-math></inline-formula>\u0000 overlay hops, and \u0000<inline-formula> <tex-math>$mathcal {O}left ({{ 1 }}right)$ </tex-math></inline-formula>\u0000 forwarding entries in an N-node edge system with the network radius \u0000<inline-formula> <tex-math>$tau $ </tex-math></inline-formula>\u0000, while the successive ensuring data delivery. Its worst-case network delay \u0000<inline-formula> <tex-math>$mathcal {O}left ({{ tau log N }}right)$ </tex-math></inline-formula>\u0000 is also much better than \u0000<inline-formula> <tex-math>${mathcal {O}left ({{ tau N^{alpha } }}right)},alpha mathrm {in }(0,1)$ </tex-math></inline-formula>\u0000, t","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5440-5458"},"PeriodicalIF":3.0,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
eMPTCP: A Framework to Fully Extend Multipath TCP eMPTCP:一个完全扩展多路径TCP的框架
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-07 DOI: 10.1109/TNET.2024.3469396
Dian Shen;Bin Yang;Junxue Zhang;Fang Dong;John C. S. Lui
MPTCP provides the basic multipath support for network applications to deliver high throughput and robust communication. However, the original MPTCP is designed with limited extensibility. Various research works have tried to extend MPTCP to attain better performance or richer functionalities. These existing approaches either modify the kernel implementation of MPTCP, which involve considerable engineering efforts and may accidentally introduce safety issues, or control MPTCP via userspace tools, which suffer from restricted functionality support. To address this issue, we propose eMPTCP, an easy-to-use framework to fully extend MPTCP without safety risks. Internally, eMPTCP has a modular and pluggable model which allows operators to specify a comprehensive MPTCP extension as a chain of sub-policies. eMPTCP further enforces the policies through packet header manipulations. To ensure safety, eMPTCP is implemented using eBPF. Despite the stringent constraints of eBPF, we show that it is possible to implement an elaborated framework for a fully extensible MPTCP. Through verifying MPTCP in a number of real-world cases and extensive experiments, we show that eMPTCP is able to support a wide range of MPTCP extensions, while the overhead of eMPTCP operations in the kernel is in the scale of nanosecond, and the extra processing time accounts for only about 0.63% of flows’ transmission time.
MPTCP为网络应用程序提供了基本的多路径支持,以提供高吞吐量和健壮的通信。然而,最初的MPTCP设计具有有限的可扩展性。各种研究工作试图扩展MPTCP以获得更好的性能或更丰富的功能。这些现有的方法要么修改MPTCP的内核实现,这涉及大量的工程工作,可能会意外地引入安全问题,要么通过用户空间工具控制MPTCP,这受到功能支持的限制。为了解决这个问题,我们提出了一个简单易用的框架,可以在没有安全风险的情况下完全扩展MPTCP。在内部,eMPTCP有一个模块化和可插拔的模型,允许运营商指定一个全面的MPTCP扩展作为子策略链。eMPTCP通过包头操作进一步加强策略。为了保证安全性,使用eBPF实现了eMPTCP。尽管eBPF有严格的限制,但我们证明了为一个完全可扩展的MPTCP实现一个详细的框架是可能的。通过大量实际案例和大量实验验证,我们表明eMPTCP能够支持广泛的MPTCP扩展,而内核中eMPTCP操作的开销在纳秒量级,并且额外的处理时间仅占流传输时间的0.63%左右。
{"title":"eMPTCP: A Framework to Fully Extend Multipath TCP","authors":"Dian Shen;Bin Yang;Junxue Zhang;Fang Dong;John C. S. Lui","doi":"10.1109/TNET.2024.3469396","DOIUrl":"https://doi.org/10.1109/TNET.2024.3469396","url":null,"abstract":"MPTCP provides the basic multipath support for network applications to deliver high throughput and robust communication. However, the original MPTCP is designed with limited extensibility. Various research works have tried to extend MPTCP to attain better performance or richer functionalities. These existing approaches either modify the kernel implementation of MPTCP, which involve considerable engineering efforts and may accidentally introduce safety issues, or control MPTCP via userspace tools, which suffer from restricted functionality support. To address this issue, we propose eMPTCP, an easy-to-use framework to fully extend MPTCP without safety risks. Internally, eMPTCP has a modular and pluggable model which allows operators to specify a comprehensive MPTCP extension as a chain of sub-policies. eMPTCP further enforces the policies through packet header manipulations. To ensure safety, eMPTCP is implemented using eBPF. Despite the stringent constraints of eBPF, we show that it is possible to implement an elaborated framework for a fully extensible MPTCP. Through verifying MPTCP in a number of real-world cases and extensive experiments, we show that eMPTCP is able to support a wide range of MPTCP extensions, while the overhead of eMPTCP operations in the kernel is in the scale of nanosecond, and the extra processing time accounts for only about 0.63% of flows’ transmission time.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5459-5474"},"PeriodicalIF":3.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Stable Multi-Source Dynamic Broadcasting for Wireless Multi-Hop Networks Under SINR-Based Adversarial Channel Jamming 基于sinr的无线多跳网络对抗信道干扰下的分布式稳定多源动态广播
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-10-07 DOI: 10.1109/TNET.2024.3470649
Xiang Tian;Baoxian Zhang;Cheng Li;Jiguo Yu
Disseminating continuous packet flows injected at multiple location-random source nodes to all network nodes, known as the multi-source dynamic global broadcast problem, is a fundamental building block for wireless multi-hop networks to run smoothly and efficiently. Previous studies on dynamic global broadcast all assume reliable communications. However, in realistic wireless networks, there exist unpredictable transmission failures caused by the randomized signal interference from uncorrelated wireless networks sharing the same spectrum or even malicious attackers. In this paper, by integrating the Signal-to-Interference-plus-Noise-Ratio (SINR) model, multi-channel communication mode, and randomized malicious channel jamming controlled by an adaptive adversary, we present an SINR-based adversarial channel jamming model to capture the unpredictable transmission failures in a wireless multi-hop network. We first propose a distributed Jamming-resilient Multi-source Static Broadcast (JMSB) algorithm based on random channel selection and message transmissions for multi-hop wireless networks under the above SINR-based adversarial channel jamming model. We then propose a distributed stable Jamming-resilient Multi-source Dynamic Broadcast (JMDB) algorithm which iterates JMSB repeatedly and efficiently in a two-stage manner. We derive the maximum supportable broadcast throughput of JMDB under the stability guarantee, i.e., the expected boundedness on the queue length of each network node and expected broadcast latency for each injected packet. Simulation results shows the stability and throughput efficiency of our proposed JMDB algorithm.
将多个位置随机源节点注入的连续数据包流传播到所有网络节点,即多源动态全局广播问题,是无线多跳网络平稳高效运行的基本组成部分。以往关于动态全局广播的研究都假定通信是可靠的。然而,在现实的无线网络中,由于来自共享同一频谱的不相关无线网络的随机信号干扰,甚至恶意攻击者,会导致不可预测的传输失败。本文通过综合信噪比(SINR)模型、多通道通信模式和随机恶意信道干扰(由自适应对手控制),提出了一种基于SINR的对抗性信道干扰模型,以捕获无线多跳网络中不可预测的传输故障。在上述基于sinr的对抗性信道干扰模型下,针对多跳无线网络提出了一种基于随机信道选择和消息传输的分布式抗干扰多源静态广播(JMSB)算法。然后,我们提出了一种分布式稳定抗干扰多源动态广播(JMDB)算法,该算法以两阶段的方式重复有效地迭代JMDB。我们导出了在稳定性保证下JMDB支持的最大广播吞吐量,即每个网络节点的队列长度的期望有界性和每个注入数据包的期望广播延迟。仿真结果表明了本文提出的JMDB算法的稳定性和吞吐量效率。
{"title":"Distributed Stable Multi-Source Dynamic Broadcasting for Wireless Multi-Hop Networks Under SINR-Based Adversarial Channel Jamming","authors":"Xiang Tian;Baoxian Zhang;Cheng Li;Jiguo Yu","doi":"10.1109/TNET.2024.3470649","DOIUrl":"https://doi.org/10.1109/TNET.2024.3470649","url":null,"abstract":"Disseminating continuous packet flows injected at multiple location-random source nodes to all network nodes, known as the multi-source dynamic global broadcast problem, is a fundamental building block for wireless multi-hop networks to run smoothly and efficiently. Previous studies on dynamic global broadcast all assume reliable communications. However, in realistic wireless networks, there exist unpredictable transmission failures caused by the randomized signal interference from uncorrelated wireless networks sharing the same spectrum or even malicious attackers. In this paper, by integrating the Signal-to-Interference-plus-Noise-Ratio (SINR) model, multi-channel communication mode, and randomized malicious channel jamming controlled by an adaptive adversary, we present an SINR-based adversarial channel jamming model to capture the unpredictable transmission failures in a wireless multi-hop network. We first propose a distributed Jamming-resilient Multi-source Static Broadcast (JMSB) algorithm based on random channel selection and message transmissions for multi-hop wireless networks under the above SINR-based adversarial channel jamming model. We then propose a distributed stable Jamming-resilient Multi-source Dynamic Broadcast (JMDB) algorithm which iterates JMSB repeatedly and efficiently in a two-stage manner. We derive the maximum supportable broadcast throughput of JMDB under the stability guarantee, i.e., the expected boundedness on the queue length of each network node and expected broadcast latency for each injected packet. Simulation results shows the stability and throughput efficiency of our proposed JMDB algorithm.","PeriodicalId":13443,"journal":{"name":"IEEE/ACM Transactions on Networking","volume":"32 6","pages":"5356-5371"},"PeriodicalIF":3.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE/ACM Transactions on Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1