教育资源为主的文档平台

当前位置: 查字典文档网> 所有文档分类> 工程科技> 兵器/核科学> 2014 Cooperative-Filter countering Interest

2014 Cooperative-Filter countering Interest

上传者:兰毓华
|
上传时间:2015-05-11
|
次下载

2014 Cooperative-Filter countering Interest

SoftComput(2014)18:1803–1813DOI10.1007/s00500-014-1275-z

FOCUS

Cooperative-Filter:counteringInterest?oodingattacksinnameddatanetworking

KaiWang·HuachunZhou·YajuanQin·HongkeZhang

Publishedonline:10April2014

©Springer-VerlagBerlinHeidelberg2014

AbstractNameddatanetworking(NDN)isanemerg-ingnetworkingparadigmthatisconsideredasoneofthepromisingcandidatesfornext-generationInternetarchitec-ture.TobeaviableInternetarchitecture,NDNmustberesilientagainstcurrentandemergingthreats.ThispaperfocusesonhowtodetectandmitigatetheInterest?ood-ingattack(IFA)inNDN,whichcanexcessivelyconsumetheresourceofeachinvolvedrouterby?oodingtoomanymaliciousInterestpacketswithfakenames.Inthispaper,tocounterIFA,anarchitecturecalledCooperative-Filterisproposed.ItdetectsIFAusingfuzzylogic,andmitigatesitbasedonthecooperationbetweenroutersatthegranular-ityofper-pre?x-per-interface,bytakingadvantagesofthestatestatisticsofeachrouter.Moreover,theperformanceofCooperative-Filterisevaluated,basedonbotheffectofitonreducingmemoryresourceconsumptionofeachinvolved

CommunicatedbyA.Castiglione.

ThisresearchissupportedbytheNationalBasicResearchProgramofChina(“973program”)(2013CB329101),theNationalHigh-TechResearchandDevelopmentProgramofChina(863)

(2011AA010701),theNationalNaturalScienceFoundationofChina(NSFC)(61232017,61271202,61271201,61003283,61102049),BeijingNaturalScienceFoundation(4122060,4132053)andSRFforROCS,SEM(W13C300010).

K.Wang(B)·H.Zhou·Y.Qin·H.Zhang

NationalEngineeringLaboratoryforNextGenerationInternetInterconnectionDevices,BeijingJiaotongUniversity,Beijing100044,China

e-mail:wangkai_bjtu@http://wendang.chazidian.comH.Zhou

e-mail:hchzhou@http://wendang.chazidian.comY.Qin

e-mail:yjqin@http://wendang.chazidian.comH.Zhang

e-mail:hkzhang@http://wendang.chazidian.com

routerandtheeffectonincreasingInterestsatisfactionrateforlegitimateuserswhensufferingIFAaswellasondecreas-ingtheInterest-retrievingdelay.Simulationresultsdemon-stratethatCooperative-FiltercandetectIFAandeffectivelymitigateitsdamageeffectonNDN.Tothebestofourknowl-edge,thisisthe?rstattempttodesignanIFAcountermeasureembeddingwithfuzzylogicaswellascounteringIFAatthegranularityofper-pre?x-per-interface.

KeywordsInterest?oodingattack·Fuzzylogic·Resourceconsumption·Nameddatanetworking

1Introduction

Communicationsandnetworkparadigmoftoday’sInternethasshiftedfromtheconnectionsbetweenhoststotheglobaldistributionandretrievalofcontentinhugeamounts.ThisnewtrendrequiresamajortransformationofcurrentInternetarchitecture,anditleadstotheemergenceofinformation-centricnetworking(ICN)(Koponenetal.2007;Dannewitz2009;Visalaetal.2009;Jacobsonetal.2009,2012;TheCCNprojectteam2010;Lagutinetal.2010;Fotiouetal.2010).OnerepresentativeeffortamongICNresearchesisthenameddatanetworking(NDN)(Jacobsonetal.2009,2012;TheCCNprojectteam2010),whichhasbeenapromisingcandidatefornext-generationInternetarchitecture.

DifferentfromcurrentIP-basedInternet,NDNischar-acterizedbyname-basedroutingandforwarding,andthusnameddataisthe“waist”oftheInternetratherthanphysi-callocations(i.e.,IPaddress).ThecommunicationinNDNisenabledbytwodistincttypesofpackets:Interestpack-etsandDatapackets.Consumersaskfortheirwantedcon-tentbysendingInterestpacketswhichcarrythenameofthedesiredData,andcorrespondingDatapacketsaredeliveredin

123

1804responsetoconsumersonlyupontheseexplicitInterestpack-ets.Tofacilitatename-basedcontentroutingandretrieval,NDNintroducesacontentstore(CS)thatisusedtocacheDatapacketsforpotentialfutureInterestsandapendingInter-esttable(PIT)thatkeepstrackofInterestsforwardedtowardcontentsource(s)intoeveryrouter,withthehelpofthefor-wardinginformationbase(FIB)thatisusedtoguideforward-ingInterestpacketstowardpotentialsource(s)ofmatchingdata.

InNDN,anyonecangenerateastreamofIntereststorequesttheirwantedcontent.IfaNDNrouterhasutilizedallitsPITmemoryresourceforforwardingInterests,itcannolongerforwardanyincomingInterestsfromlegitimateusers.Thus,althoughsecurityisamongthenaturalrequire-mentsofNDN(oneofthekeygoalsofNDNis“securitybydesign”,e.g.,eachcontentitemisboundtoitsnamebycryp-tographicsignatures),unfortunately,itcannotevadesomenetwork-basedsecuritythreatssuchastheInterest?oodingattack(IFA)(Daietal.2013;Gastietal.2012;Widjaja2012).InIFA,attackers?oodexcessivenumberofmaliciousInterestpacketswithfakenamestorequestfornonexistentcontent.WithsomanyfakeInterestpacketspendinginthePITofeachinvolvedrouter,thememoryresourceforPITsoftheserouterswouldbeseverelyexhausted,whichwouldresultindenialofserviceforlegitimateusers.Moreover,thesemali-ciousInterestpacketscanbependinginPITforalongerperiodthanlegitimateones(nolongeratthetimescaleofroundtriptime(RTT),butwaitingtobedeleteduntiltheirPITentriesexpire,whosevalueismorethanRTTandgen-erallyatthetimescaleofthewholelifetimeofeachInterest(Yietal.2013),whichcouldaggravatedenialofserviceforinvolvedusers/consumers.

IFAexploitsthekeyarchitecturalfeatureofNDNrelyingonPITtorecordtraf?cstates,andthuscanbringinseverenegativeimpactiononNDN’sfuturedevelopment(e.g.,itcansigni?cantlydegradeusers’experienceonretrievingcon-tent).Therefore,howtocounterIFAdeservesthefullatten-tionofthispaper.Fortunately,NDNroutersarestatefulsinceeachofthemneedstokeepper-communicationstateinitsPIT(recordingalltheforwardedInterests),andthustheycanlearnmuchmoreinformationaboutthetraf?cgoingthroughthem.Inaddition,PITentrytimeoutsofferrela-tivelycheaptraf?caggregatedetection(Vyasetal.2006).AllofthesecanhelpNDNcounterIFA.TakingadvantageofthesefeaturesofNDN,thispaperproposesacountermeasurenamedCooperative-Filter,whichisbasedonfuzzylogicandacooperationmechanismbetweenrouterstocounterIFA(fuzzylogiccanmakeeasythesystemmodelingwith-outahardmathematicalmodeling,aswellasgiveasatis-factorysolutioninareasonableimprovementofuser’sexpe-rienceonretrievingcontent).Practically,Cooperative-FilterdetectsIFAineachrouterconsideringtwoparameters:PIToccupancyrate(POR)andPITexpirationrate(PER)asthe

123

K.Wangetal.

inputsforitsfuzzylogicmodule,whereproducesthedeci-sionaboutthenecessityofsendingcontrolmessages(e.g.,pushbackmessages),andmitigatesIFAonlyatedgerouterswheremaliciousInterestpacketsareoriginally?oodedintoNDNwiththehelpofcooperationbetweeninvolvedrouters,toreducethemaliciousInterestpacketsthatcanenterNDN.

Themaincontributionsofthispapercanbesummarizedasfollows:

1.TheCooperative-Filterisdesigned,whichdetectsIFAbasedonfuzzylogicineachrouterbutmitigatesitby?l-teringincomingmaliciousInterestpacketsonlyatedgeroutersofNDNwiththehelpofcooperationbetweenrouters,ratherthaneverysinglerouter.

2.Anin-depthevaluationstudyusingextensivesimulationsquanti?esthedamageeffectofIFAonNDN,underareal-istic,large-scalenetworktopology.

3.TheperformanceofCooperative-Filterisevaluatedindetail,viaextensivesimulationsusingthewell-knownndnSIM(Afanasyevetal.2012),underarealisticusersbehaviormodelofInternet(theratesofInterestpack-etsrequestingdifferentcontentitemsfollowingZipf–Mandelbrotdistribution(Caro?glioetal.2011a,b,c)inalarge-scalenetworktopology,andresultsshowthatCooperative-FiltercaneffectivelydegradethedamageeffectofIFAonNDN.Therestofthepaperisorganizedasfollows.Section2overviewstheNDNbackgroundandrelatedworks.Sec-tion3proposestheCooperative-Filter.Section4evalu-atesthedamageofIFAaswellastheeffectivenessoftheproposedCooperative-Filter.Finally,Sect.5concludesthispaper.

2Background

Inthissection,abriefintroductionaboutNDNisgivenat?rst,andthentherelatedworksoncounteringIFAarepresented.2.1NDN2.1.1NDNnames

InNDN,thepacketnameishierarchicallyconstructedbyvariable-lengthnamecomponents,whichgenerallyincludesapre?xaswellasseveralsuf?xes.Forexample,thenameforadocumentinouruniversityBJTUcanbepresentedas“/China/Beijing/BJTU/document1”,where“/China/Beijing/BJTU”isthepre?xwhile“document1”isthesuf?x.InIFA,attackerscaneasilygeneratelargeamountofmaliciousInter-estpacketsbyspoo?ngtheirnames.Forexample,attackers

Cooperative-Filter:CounteringIFAinNDN

内容需要下载文档才能查看

namespace(e.g.,“/China/Beijing/BJTU/xxxx”isthespoofedname,where“/China/Beijing/BJTU”isanexistentpre?xbut“xxxx”istheforgedsuf?x,asshowninFig.1).

2.1.2NDNpacketforwarding

CommunicationinNDNisthepullmodel(thatis,itisdrivenbytheconsumersofdata):aconsumerasksforcontentbysendinganInterestpacketthatcarriesthenameofthedesiredData,andDatapacketisdeliveredtoresponsetoconsumersonlyuponanexplicitInterestpacket.

UponanInterestpacket,anyintermediateNDNrouterchecksitsCStoseeifthereistherequestedcontent(thecor-respondingDatapacket)cachedthere.Ifso,itcanreturnwithacorrespondingDatapacket.Otherwise,therouterwouldlookupitsPITtocheckwhetherthereisalreadyaPITentryforthesameInterestpacketexisting.Ifso,thenewinter-facewherethisInterestcomesinisaddedintothematchingPITentrydescribedabove,buttheInterestisthendroppedwithoutforwarding.Otherwise,theInterestpacketwouldbeforwardedupstreambasedonFIBofthisNDNrouteraswellasrecordedasanewPITentry.

OnceaDatapacketreturns,thePIToftherouterischeckedtoseeiftheDatapackethasbeenrequestedbefore.IfthenameoftheDatapacketmatchesnoentryinPIT,theDatapacketisdroppedwithoutforwarding.Otherwise,theDatapacketisforwardedfromthecor-respondinginterfacerecordedinthematchingPITentry,andthenthecorrespondingentryisdeleted.Afterthat,acopyoftheDatapacketiscachedintheCSbasedonsomecachingreplacementpolicytosatisfypotentialfutureInterests.Inaddition,iftherearenoDatapacketreturnstosatisfythependingInterestinPIT,thecorrespond-ingPITentrywouldnotbeerasedfromthisrouteruntilexpired.

Asdescribedabove,PITplaysaveryimportantroleinbothInterestandDatapacketforwardingprocess,anditbringsinextramemoryresourceconsumptionforeachNDNrouterthanthetraditionalIP-basedrouterforpacketforward-ing.IFAtakesadvantageofPIT,whichisthefundamentalfeatureofNDN,toharmNDN.Asaresult,whetherIFAcanbeeffectivelymitigatediscriticaltoNDN’sfuture.

1805

2.2IFAmodel

Tobringinhugedamage,the?oodedmaliciousInterestpack-etsfromIFAshouldberoutedtowardstothevictim(e.g.,dataproducer)ascloseaspossible(Afanasyevetal.(2013)).ThiscanbeachievedwhenallthemaliciousInterestpacketsarewiththesamepre?x(e.g.,“/China/Beijing/BJTU”)butwithnonexistent/forgedsuf?x(e.g.,arandomstringsuchas“xxxx”),whichmakesthesemaliciousInterestpacketstoreachthevictimwithoutbeingsatis?edbycachesofinter-mediaterouters,sincetherequestedDatapacketsdonotexistthroughoutNDN.

ThispaperexclusivelyfocusesonthisparticularIFA(thatis,IFAattackersdotheirbesttoattackacertainnamespace/pre?xby?oodingfakeInterestpackets)becauseitcanbeeasytolaunchandbringinseveredamageonNDN(Afanasyevetal.2013).2.3Relatedwork

SinceNDNisproposedbyJacobsonetal.(2009),severalproposalshavefocusedonIFAandattemptedtodegradeitsdamageeffect.TheworksinTobiasetal.(2010)andGastietal.(2012)summarizetheIFAinNDN,whiletheauthorsinWahlischetal.(2013)mainlyanalyzedata-drivenstates(e.g.,bothcontentpublicationsandsubscriptionscanintroduceroutingorforwardingstatesatthenetworklayer)candegradethestabilityandsecurityofNDN.However,noneofthemdesignanycountermeasureforIFA(thatis,theyleaveitasanopenproblemandthedesignspeci?csforcounteringIFAremaintobe?lledin).

Furthermore,inWidjaja(2012),I.Widjajaproposesa?ex-ibleresourcemanagement(RM)systemforNDN.AlthoughRMmaypreventIFA,itchangesthebasicarchitectureofNDNrouterbydeletingPITandthenmixingthecachingofInterestsintoCS,whichincreasesthecomplexitytoindexeachdistinctInterestforinterfaceperformanceevaluationorguidingInterestforwardingwithineachrouter(Yietal.2013).Moreover,RMmainlyaimsathowtomakeintelli-gentdecisionsonstoringcontentobjects,ratherthanhowtosuppresstheincomingmaliciousInterestswithineachNDNrouter.

ThemechanismsinthelatestresearchofDaietal.(2013)andAfanasyevetal.(2013)focusonthesametopiconcoun-teringIFA,butdifferinthespeci?cs.TheauthorsinDaietal.(2013)proposethe“Interesttraceback”tocounterIFAbyspoo?ngcorrespondingDatapacketstosatisfythepend-ingfakeInterestsrecordedinPIT,andthentoblockmali-ciousInterestsattheedgerouterswheretheycomein,whichcande-stressthememoryresourceforPITineachinvolvedNDNrouter.However,“Interesttraceback”detectsIFAbysimplymonitoringthePITusage,whichcouldbringinrela-tivelyhigherfalsepositivewhenevertherecomesshort-term

123

1806networkchurns.Inaddition,theauthorsinAfanasyevetal.(2013)designthreedifferentIFAcountermeasures(Tokenbucketwithper-interfacefairness,satisfaction-basedInter-estacceptanceandsatisfaction-basedpushback)withvaryingdegreesofimplementationcomplexityandeffectiveness,byextendingthePITtosupport?aggingofIntereststhatcan-notbeimmediatelyforwardedandimplementinghierarchi-calqueuesforeachinterfaceofNDNrouter.Infact,allthethreemechanismsproposedatAfanasyevetal.(2013)mon-itoreachInterestpacketatthegranularityofper-interfaceineachrouter(withoutdistinguishingdifferentpre?xesofInterestpackets),whichmakessomelegitimatebutunfortu-nateInterestpacketsarerate-limitedaswell,iftheycomeintotheNDNrouterfromthesameinterfaceasmaliciousInterestpackets(eventheyarewithdifferentpre?xesratherthanthemaliciousone).

Inthispaper,theCooperative-Filterisproposed,whichembedsfuzzylogic-baseddetectionandintroducescooper-ativemechanismbetweenrouterstomitigateIFAata?nergranularity(e.g.,per-pre?x-per-interface).

3Proposedcountermeasure:Cooperative-FilterInNDN,Interestpacketisroutedbasedonthepre?xofcon-tentnamemeanwhiletemporarilycachedinPIT,whichcon-sumesthememoryresourceofeachintermediaterouterandthusgivesachanceforattackerstolaunchIFAbyexploitingPIT.Inthissection,ourIFAcountermeasureCooperative-Filterisdesignedindetail,whichestimatesthepossibilityofIFAbasedonfuzzylogic,andmitigatesitwiththehelpofcooperationbetweenrouters.

Cooperative-FilterisanIFA-counteringarchitectureimple-mentedinNDN,whichcanbeconsideredasasetofalgo-rithmsthatrunonrouters,andhaslowdegreeofimplemen-tationcomplexity.ItsgoalistoidentifyIFAaswellastomitigateitsdamageeffect.ThemainideaofCooperative-Filteris“detectingIFAeverywhere,butmitigatingitatthesource”,where“everywhere”meanseveryrouterinNDNwhile“source”meanseveryedgerouterthroughwhichcon-sumerscanaccessintoNDN.Thatis,thedetectionmecha-nismofCooperative-FilterisenabledateachrouterofNDNwhileitsmitigationmechanismisonlyenabledattheedgerouters.Thisisbecausetheroutersupstreamcanaggregatemoretraf?cthantheedgerouters,whichmakesthemthebettermonitoringpointtodetectanyattacks.Meanwhile,theedgeroutersdirectlyconnectwithexplicitconsumers,whichmakesittobemoreef?cientto?ltermaliciousInter-estpacketsthere.Tosumup,Cooperative-Filtercombineswidespreaddetectionandlocalizedmitigation,withthelat-terbeingascloseaspossibletotheattackingsource.

Particularly,Cooperative-Filterintegratesafuzzylogic-baseddetectionmechanism(DM)andamitigationmecha-

123

K.Wangetal.

nism(MM)basedoncooperationbetweenrouters.InDM,PIToccupancyrate(POR)andPITexpirationrate(PER)aremonitoredperiodically.PORrepresentstheratioofthenum-beroftemporalPITentriesagainstthemaximumPITentriesinrealtime,http://wendang.chazidian.comingthesetwoparameters(PORandPER)asinput,DMadjudgeswhetherthereisIFAexistingbasedonfuzzylogic.WheneverIFAisdetectedinarouter,MMisenabledandapushbackmessageisgeneratedtonotifyotherinvolvedrouters,bringincooperativemitigationonIFAtoreducethenumberofmaliciousInterestpacketsthatcanenterNDN.

3.1DM:IFAdetectionusingfuzzylogic

Fuzzylogic(Zadeh1965)wasproposedtodealwithsub-jectiveorimpreciseinformation,openingmanypossibilitiestosolveproblemsthatclassicalbooleanlogicisunabletoachieve.Thebasisforfuzzylogic(linguisticvalue/naturallanguage)isthebasisforhumancommunication(itcanassignintermediatevaluesbetweentrueandfalse),whichmakesiteasytouse.

NDNroutercankeepthestatisticsforongoingcommu-nications.Thus,PORandPERineachNDNroutercanbeeasilyobtainedbyDMofCooperative-Filter.InCooperative-Filter,thefuzzi?cationforPOR,PERandoutputofDMarerealizedusingfuzzylogic.Thatis,theaccuratevaluesforthesevariablesshouldbemappedintolinguisticvalues.Inthispaper,thetwolinguisticvaluesforPOR(orPER)aresettobeHIGHandNORMAL,whilethelinguisticvaluesforoutputofDMareIFAorNORMAL(whichmeansthereisnoIFAexisting).ThemappingofnumericalinputparametersandoutputofDMforfuzzysetsisrealizedusingmembershipfunctions.Respectively,themembershipfunctionforPOR,PERandoutputofDMareshowninFig.2a-c.ThefuzzycontrollerinferencerulesinthispaperareshowninTable1.Basedontheserules,theDMofCooperative-FiltergetsthePORandPERineachrouterasinput,andgivesthesecurestatusofthisrouter(e.g.,IFAorNORMAL)asoutput.TheworkingprocessofDMineachNDNrouterisdescribedasfollowing:

Step1:DMperiodicallymonitorsPORbycomparingthereal-timePITsizeandthemaximumPITvalue,meanwhileevaluatesPERbycomparingtheinstantaneousnumberoftheexpiredPITentriesandthetotalnumberofpendingPITentries;

Step2:Thereal-timePORandPERvaluesaremappedtofuzzysetsbasedontheircorrespondingmembershipfunc-tions(showninFig.2,takingPORforexample,ifPORequals0.9,thenPORcanbeidenti?edasbelongingtoNORMALby25%meanwhilebelongingtoHIGHby75%);

Cooperative-Filter:CounteringIFAinNDN

内容需要下载文档才能查看

Fig.2Membershipfunctionsforinputandoutputthatareusedinfuzzylogic

Table1FuzzyinferencerulesPORPEROutputHIGHNORMALIFANORMALHIGHIFAHIGHHIGHIFANORMAL

NORMAL

NORMAL

Step3:ThefuzzyinferencerulesinTable1areapplied,toresultinafuzzysetoutput;

Step4:Thefuzzysetoutputistranslatedintoaquantitativevalue,whichiscalledasdefuzzi?cation,basedonthepopularmethod—centroidtechniquethatisshowninEq.(1).

??b

y=x=aμA(x)x,(1)x=aμA(x)whereyrepresentsthecenterofgravityoffuzzysetA

betweenaandb,andμA(x)representsthedegreeofxbelongingtofuzzysetA.

Forexample,asshowninFig.3,ifPORequals0.85andPERequals0.56,theoutputofthefuzzylogicwouldbe

内容需要下载文档才能查看

0.691.

1807

Fig.3Examplefortheoutoffuzzy

内容需要下载文档才能查看

logic

Fig.4Relationshipbetweenoutputandinputoffuzzylogic

Infact,basedontheFig.2,Table1andEq.(1),therela-tionshipbetweentheoutputofthefuzzylogicembeddedinDMandthePORaswellasPERcanbeshowninFig.4.Step5:WhenevertheoutputvalueofDMexceedstheprede?nedthreshold(e.g.,thethresholdfortheoutputofDMhasbeende?nedas0.6),IFAisidenti?edandanIFA-alertmessageissenttotheMMoftheproposedCooperative-Filter.

Afterthese?vesteps,DMis?nished.

InCooperative-Filter,DMonlyneedsthenaturalinforma-tionofPITrecordedineachNDNrouter,whichcanachievesmallconsumptiononeachrouterandthusavoidexception-allyrestrictiveinforwardingInterestpacketswhenIFAdoesnotexist.

3.2MM:IFAmitigationbasedoncooperationbetween

routersIntheIFAmodel(Sect.2.2)studiedinthispaper,allthemaliciousInterestpacketsarerequestingcorrespondingDatapacketswiththesamepre?xtoaggregateenoughamountofmalicioustraf?ctovictim.Asaresult,thepre?xwhichhas

123

版权声明:此文档由查字典文档网用户提供,如用于商业用途请与作者联系,查字典文档网保持最终解释权!

下载文档

热门试卷

2016年四川省内江市中考化学试卷
广西钦州市高新区2017届高三11月月考政治试卷
浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
广西钦州市钦州港区2017届高三11月月考政治试卷
广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
广西钦州市高新区2016-2017学年高二11月月考政治试卷
广西钦州市高新区2016-2017学年高一11月月考政治试卷
山东省滨州市三校2017届第一学期阶段测试初三英语试题
四川省成都七中2017届高三一诊模拟考试文科综合试卷
2017届普通高等学校招生全国统一考试模拟试题(附答案)
重庆市永川中学高2017级上期12月月考语文试题
江西宜春三中2017届高三第一学期第二次月考文科综合试题
内蒙古赤峰二中2017届高三上学期第三次月考英语试题
2017年六年级(上)数学期末考试卷
2017人教版小学英语三年级上期末笔试题
江苏省常州西藏民族中学2016-2017学年九年级思想品德第一学期第二次阶段测试试卷
重庆市九龙坡区七校2016-2017学年上期八年级素质测查(二)语文学科试题卷
江苏省无锡市钱桥中学2016年12月八年级语文阶段性测试卷
江苏省无锡市钱桥中学2016-2017学年七年级英语12月阶段检测试卷
山东省邹城市第八中学2016-2017学年八年级12月物理第4章试题(无答案)
【人教版】河北省2015-2016学年度九年级上期末语文试题卷(附答案)
四川省简阳市阳安中学2016年12月高二月考英语试卷
四川省成都龙泉中学高三上学期2016年12月月考试题文科综合能力测试
安徽省滁州中学2016—2017学年度第一学期12月月考​高三英语试卷
山东省武城县第二中学2016.12高一年级上学期第二次月考历史试题(必修一第四、五单元)
福建省四地六校联考2016-2017学年上学期第三次月考高三化学试卷
甘肃省武威第二十三中学2016—2017学年度八年级第一学期12月月考生物试卷

网友关注

教资统考|小学《综合素质》高频考点详解:外国古典文学
小学《综合素质》高频考点详解:文化素养之中国历史大事件(农业社会)
教资统考|小学《综合素质》高频考点详解:逻辑基础知识之命题
小学《综合素质》高频考点详解:文化素养之中国历史原始社会
小学《综合素质》高频考点详解:文化素养之中国历史大事件(工业文明)
教资统考|小学《综合素质》高频考点详解:理解阅读材料中重要句子的含意
教资统考|小学《综合素质》高频考点详解:分析概括作者在文中的观点态度
教资统考|小学《综合素质》高频考点详解:世界著名的科学家(二)
教资统考|小学《综合素质》高频考点详解:中外古代艺术成就(绘画)
教资统考|小学《综合素质》高频考点详解:中国古代文学名家名著(戏曲)
教资统考|小学《综合素质》高频考点详解:世界著名的科学家(三)
教师资格考试小学《综合素质》高频考点提要
教资统考|小学《综合素质》高频考点详解:外国近代文学(一)
教资统考|小学《综合素质》高频考点详解:逻辑推理之论证
教资统考|小学《综合素质》高频考点详解:归纳内容要点,概括中心意思
教资统考|小学《综合素质》高频考点详解:信息的筛选与整合
教资统考|小学《综合素质》高频考点详解:外国近代文学(二)
教资统考|小学《综合素质》高频考点详解:中外古代艺术成(建筑和园林艺术)
教资统考|小学《综合素质》高频考点详解:世界著名的科学家(一)
教资统考|小学《综合素质》高频考点详解:教育测量数据的分析与处理
教资统考|小学《综合素质》高频考点详解:中国古代文学名家名著(诗歌)
教资统考|小学《综合素质》高频考点详解:逻辑基础知识之概念
小学《综合素质》高频考点详解:写作能力之常用文体知识
教资统考|小学《综合素质》高频考点详解:中外古代艺术成就(文字和书法)
教资统考|小学《综合素质》高频考点详解:逻辑推理之类比推理
教资统考|小学《综合素质》高频考点详解:中国古代散文
教资统考|小学《综合素质》高频考点详解:传统科技文化
教资统考|小学《综合素质》高频考点详解:外国现代文学(一)
教资统考|小学《综合素质》高频考点详解:逻辑推理之演绎推理
教资统考|小学《综合素质》高频考点详解:中国现代文学名家名著

网友关注视频

外研版英语三起5年级下册(14版)Module3 Unit2
第12章 圆锥曲线_12.7 抛物线的标准方程_第一课时(特等奖)(沪教版高二下册)_T274713
化学九年级下册全册同步 人教版 第25集 生活中常见的盐(二)
冀教版小学英语四年级下册Lesson2授课视频
【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,湖北省
第五单元 民族艺术的瑰宝_16. 形形色色的民族乐器_第一课时(岭南版六年级上册)_T3751175
冀教版小学数学二年级下册第二单元《有余数除法的整理与复习》
七年级英语下册 上海牛津版 Unit9
七年级英语下册 上海牛津版 Unit3
19 爱护鸟类_第一课时(二等奖)(桂美版二年级下册)_T3763925
【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
七年级英语下册 上海牛津版 Unit5
【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
【部编】人教版语文七年级下册《逢入京使》优质课教学视频+PPT课件+教案,辽宁省
冀教版小学英语五年级下册lesson2教学视频(2)
冀教版英语三年级下册第二课
外研版英语七年级下册module3 unit2第一课时
【部编】人教版语文七年级下册《过松源晨炊漆公店(其五)》优质课教学视频+PPT课件+教案,江苏省
二年级下册数学第三课 搭一搭⚖⚖
沪教版牛津小学英语(深圳用) 四年级下册 Unit 12
冀教版小学数学二年级下册第二周第2课时《我们的测量》宝丰街小学庞志荣.mp4
【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,辽宁省
北师大版小学数学四年级下册第15课小数乘小数一
沪教版八年级下册数学练习册21.4(1)无理方程P18
3月2日小学二年级数学下册(数一数)
外研版八年级英语下学期 Module3
化学九年级下册全册同步 人教版 第22集 酸和碱的中和反应(一)
冀教版小学数学二年级下册1
沪教版牛津小学英语(深圳用) 四年级下册 Unit 7