2014 Cooperative-Filter countering Interest
上传者:兰毓华|上传时间:2015-05-11|密次下载
2014 Cooperative-Filter countering Interest
SoftComput(2014)18:1803–1813DOI10.1007/s00500-014-1275-z
FOCUS
Cooperative-Filter:counteringInterest?oodingattacksinnameddatanetworking
KaiWang·HuachunZhou·YajuanQin·HongkeZhang
Publishedonline:10April2014
©Springer-VerlagBerlinHeidelberg2014
AbstractNameddatanetworking(NDN)isanemerg-ingnetworkingparadigmthatisconsideredasoneofthepromisingcandidatesfornext-generationInternetarchitec-ture.TobeaviableInternetarchitecture,NDNmustberesilientagainstcurrentandemergingthreats.ThispaperfocusesonhowtodetectandmitigatetheInterest?ood-ingattack(IFA)inNDN,whichcanexcessivelyconsumetheresourceofeachinvolvedrouterby?oodingtoomanymaliciousInterestpacketswithfakenames.Inthispaper,tocounterIFA,anarchitecturecalledCooperative-Filterisproposed.ItdetectsIFAusingfuzzylogic,andmitigatesitbasedonthecooperationbetweenroutersatthegranular-ityofper-pre?x-per-interface,bytakingadvantagesofthestatestatisticsofeachrouter.Moreover,theperformanceofCooperative-Filterisevaluated,basedonbotheffectofitonreducingmemoryresourceconsumptionofeachinvolved
CommunicatedbyA.Castiglione.
ThisresearchissupportedbytheNationalBasicResearchProgramofChina(“973program”)(2013CB329101),theNationalHigh-TechResearchandDevelopmentProgramofChina(863)
(2011AA010701),theNationalNaturalScienceFoundationofChina(NSFC)(61232017,61271202,61271201,61003283,61102049),BeijingNaturalScienceFoundation(4122060,4132053)andSRFforROCS,SEM(W13C300010).
K.Wang(B)·H.Zhou·Y.Qin·H.Zhang
NationalEngineeringLaboratoryforNextGenerationInternetInterconnectionDevices,BeijingJiaotongUniversity,Beijing100044,China
e-mail:wangkai_bjtu@http://wendang.chazidian.comH.Zhou
e-mail:hchzhou@http://wendang.chazidian.comY.Qin
e-mail:yjqin@http://wendang.chazidian.comH.Zhang
e-mail:hkzhang@http://wendang.chazidian.com
routerandtheeffectonincreasingInterestsatisfactionrateforlegitimateuserswhensufferingIFAaswellasondecreas-ingtheInterest-retrievingdelay.Simulationresultsdemon-stratethatCooperative-FiltercandetectIFAandeffectivelymitigateitsdamageeffectonNDN.Tothebestofourknowl-edge,thisisthe?rstattempttodesignanIFAcountermeasureembeddingwithfuzzylogicaswellascounteringIFAatthegranularityofper-pre?x-per-interface.
KeywordsInterest?oodingattack·Fuzzylogic·Resourceconsumption·Nameddatanetworking
1Introduction
Communicationsandnetworkparadigmoftoday’sInternethasshiftedfromtheconnectionsbetweenhoststotheglobaldistributionandretrievalofcontentinhugeamounts.ThisnewtrendrequiresamajortransformationofcurrentInternetarchitecture,anditleadstotheemergenceofinformation-centricnetworking(ICN)(Koponenetal.2007;Dannewitz2009;Visalaetal.2009;Jacobsonetal.2009,2012;TheCCNprojectteam2010;Lagutinetal.2010;Fotiouetal.2010).OnerepresentativeeffortamongICNresearchesisthenameddatanetworking(NDN)(Jacobsonetal.2009,2012;TheCCNprojectteam2010),whichhasbeenapromisingcandidatefornext-generationInternetarchitecture.
DifferentfromcurrentIP-basedInternet,NDNischar-acterizedbyname-basedroutingandforwarding,andthusnameddataisthe“waist”oftheInternetratherthanphysi-callocations(i.e.,IPaddress).ThecommunicationinNDNisenabledbytwodistincttypesofpackets:Interestpack-etsandDatapackets.Consumersaskfortheirwantedcon-tentbysendingInterestpacketswhichcarrythenameofthedesiredData,andcorrespondingDatapacketsaredeliveredin
123
1804responsetoconsumersonlyupontheseexplicitInterestpack-ets.Tofacilitatename-basedcontentroutingandretrieval,NDNintroducesacontentstore(CS)thatisusedtocacheDatapacketsforpotentialfutureInterestsandapendingInter-esttable(PIT)thatkeepstrackofInterestsforwardedtowardcontentsource(s)intoeveryrouter,withthehelpofthefor-wardinginformationbase(FIB)thatisusedtoguideforward-ingInterestpacketstowardpotentialsource(s)ofmatchingdata.
InNDN,anyonecangenerateastreamofIntereststorequesttheirwantedcontent.IfaNDNrouterhasutilizedallitsPITmemoryresourceforforwardingInterests,itcannolongerforwardanyincomingInterestsfromlegitimateusers.Thus,althoughsecurityisamongthenaturalrequire-mentsofNDN(oneofthekeygoalsofNDNis“securitybydesign”,e.g.,eachcontentitemisboundtoitsnamebycryp-tographicsignatures),unfortunately,itcannotevadesomenetwork-basedsecuritythreatssuchastheInterest?oodingattack(IFA)(Daietal.2013;Gastietal.2012;Widjaja2012).InIFA,attackers?oodexcessivenumberofmaliciousInterestpacketswithfakenamestorequestfornonexistentcontent.WithsomanyfakeInterestpacketspendinginthePITofeachinvolvedrouter,thememoryresourceforPITsoftheserouterswouldbeseverelyexhausted,whichwouldresultindenialofserviceforlegitimateusers.Moreover,thesemali-ciousInterestpacketscanbependinginPITforalongerperiodthanlegitimateones(nolongeratthetimescaleofroundtriptime(RTT),butwaitingtobedeleteduntiltheirPITentriesexpire,whosevalueismorethanRTTandgen-erallyatthetimescaleofthewholelifetimeofeachInterest(Yietal.2013),whichcouldaggravatedenialofserviceforinvolvedusers/consumers.
IFAexploitsthekeyarchitecturalfeatureofNDNrelyingonPITtorecordtraf?cstates,andthuscanbringinseverenegativeimpactiononNDN’sfuturedevelopment(e.g.,itcansigni?cantlydegradeusers’experienceonretrievingcon-tent).Therefore,howtocounterIFAdeservesthefullatten-tionofthispaper.Fortunately,NDNroutersarestatefulsinceeachofthemneedstokeepper-communicationstateinitsPIT(recordingalltheforwardedInterests),andthustheycanlearnmuchmoreinformationaboutthetraf?cgoingthroughthem.Inaddition,PITentrytimeoutsofferrela-tivelycheaptraf?caggregatedetection(Vyasetal.2006).AllofthesecanhelpNDNcounterIFA.TakingadvantageofthesefeaturesofNDN,thispaperproposesacountermeasurenamedCooperative-Filter,whichisbasedonfuzzylogicandacooperationmechanismbetweenrouterstocounterIFA(fuzzylogiccanmakeeasythesystemmodelingwith-outahardmathematicalmodeling,aswellasgiveasatis-factorysolutioninareasonableimprovementofuser’sexpe-rienceonretrievingcontent).Practically,Cooperative-FilterdetectsIFAineachrouterconsideringtwoparameters:PIToccupancyrate(POR)andPITexpirationrate(PER)asthe
123
K.Wangetal.
inputsforitsfuzzylogicmodule,whereproducesthedeci-sionaboutthenecessityofsendingcontrolmessages(e.g.,pushbackmessages),andmitigatesIFAonlyatedgerouterswheremaliciousInterestpacketsareoriginally?oodedintoNDNwiththehelpofcooperationbetweeninvolvedrouters,toreducethemaliciousInterestpacketsthatcanenterNDN.
Themaincontributionsofthispapercanbesummarizedasfollows:
1.TheCooperative-Filterisdesigned,whichdetectsIFAbasedonfuzzylogicineachrouterbutmitigatesitby?l-teringincomingmaliciousInterestpacketsonlyatedgeroutersofNDNwiththehelpofcooperationbetweenrouters,ratherthaneverysinglerouter.
2.Anin-depthevaluationstudyusingextensivesimulationsquanti?esthedamageeffectofIFAonNDN,underareal-istic,large-scalenetworktopology.
3.TheperformanceofCooperative-Filterisevaluatedindetail,viaextensivesimulationsusingthewell-knownndnSIM(Afanasyevetal.2012),underarealisticusersbehaviormodelofInternet(theratesofInterestpack-etsrequestingdifferentcontentitemsfollowingZipf–Mandelbrotdistribution(Caro?glioetal.2011a,b,c)inalarge-scalenetworktopology,andresultsshowthatCooperative-FiltercaneffectivelydegradethedamageeffectofIFAonNDN.Therestofthepaperisorganizedasfollows.Section2overviewstheNDNbackgroundandrelatedworks.Sec-tion3proposestheCooperative-Filter.Section4evalu-atesthedamageofIFAaswellastheeffectivenessoftheproposedCooperative-Filter.Finally,Sect.5concludesthispaper.
2Background
Inthissection,abriefintroductionaboutNDNisgivenat?rst,andthentherelatedworksoncounteringIFAarepresented.2.1NDN2.1.1NDNnames
InNDN,thepacketnameishierarchicallyconstructedbyvariable-lengthnamecomponents,whichgenerallyincludesapre?xaswellasseveralsuf?xes.Forexample,thenameforadocumentinouruniversityBJTUcanbepresentedas“/China/Beijing/BJTU/document1”,where“/China/Beijing/BJTU”isthepre?xwhile“document1”isthesuf?x.InIFA,attackerscaneasilygeneratelargeamountofmaliciousInter-estpacketsbyspoo?ngtheirnames.Forexample,attackers
Cooperative-Filter:CounteringIFAinNDN
内容需要下载文档才能查看namespace(e.g.,“/China/Beijing/BJTU/xxxx”isthespoofedname,where“/China/Beijing/BJTU”isanexistentpre?xbut“xxxx”istheforgedsuf?x,asshowninFig.1).
2.1.2NDNpacketforwarding
CommunicationinNDNisthepullmodel(thatis,itisdrivenbytheconsumersofdata):aconsumerasksforcontentbysendinganInterestpacketthatcarriesthenameofthedesiredData,andDatapacketisdeliveredtoresponsetoconsumersonlyuponanexplicitInterestpacket.
UponanInterestpacket,anyintermediateNDNrouterchecksitsCStoseeifthereistherequestedcontent(thecor-respondingDatapacket)cachedthere.Ifso,itcanreturnwithacorrespondingDatapacket.Otherwise,therouterwouldlookupitsPITtocheckwhetherthereisalreadyaPITentryforthesameInterestpacketexisting.Ifso,thenewinter-facewherethisInterestcomesinisaddedintothematchingPITentrydescribedabove,buttheInterestisthendroppedwithoutforwarding.Otherwise,theInterestpacketwouldbeforwardedupstreambasedonFIBofthisNDNrouteraswellasrecordedasanewPITentry.
OnceaDatapacketreturns,thePIToftherouterischeckedtoseeiftheDatapackethasbeenrequestedbefore.IfthenameoftheDatapacketmatchesnoentryinPIT,theDatapacketisdroppedwithoutforwarding.Otherwise,theDatapacketisforwardedfromthecor-respondinginterfacerecordedinthematchingPITentry,andthenthecorrespondingentryisdeleted.Afterthat,acopyoftheDatapacketiscachedintheCSbasedonsomecachingreplacementpolicytosatisfypotentialfutureInterests.Inaddition,iftherearenoDatapacketreturnstosatisfythependingInterestinPIT,thecorrespond-ingPITentrywouldnotbeerasedfromthisrouteruntilexpired.
Asdescribedabove,PITplaysaveryimportantroleinbothInterestandDatapacketforwardingprocess,anditbringsinextramemoryresourceconsumptionforeachNDNrouterthanthetraditionalIP-basedrouterforpacketforward-ing.IFAtakesadvantageofPIT,whichisthefundamentalfeatureofNDN,toharmNDN.Asaresult,whetherIFAcanbeeffectivelymitigatediscriticaltoNDN’sfuture.
1805
2.2IFAmodel
Tobringinhugedamage,the?oodedmaliciousInterestpack-etsfromIFAshouldberoutedtowardstothevictim(e.g.,dataproducer)ascloseaspossible(Afanasyevetal.(2013)).ThiscanbeachievedwhenallthemaliciousInterestpacketsarewiththesamepre?x(e.g.,“/China/Beijing/BJTU”)butwithnonexistent/forgedsuf?x(e.g.,arandomstringsuchas“xxxx”),whichmakesthesemaliciousInterestpacketstoreachthevictimwithoutbeingsatis?edbycachesofinter-mediaterouters,sincetherequestedDatapacketsdonotexistthroughoutNDN.
ThispaperexclusivelyfocusesonthisparticularIFA(thatis,IFAattackersdotheirbesttoattackacertainnamespace/pre?xby?oodingfakeInterestpackets)becauseitcanbeeasytolaunchandbringinseveredamageonNDN(Afanasyevetal.2013).2.3Relatedwork
SinceNDNisproposedbyJacobsonetal.(2009),severalproposalshavefocusedonIFAandattemptedtodegradeitsdamageeffect.TheworksinTobiasetal.(2010)andGastietal.(2012)summarizetheIFAinNDN,whiletheauthorsinWahlischetal.(2013)mainlyanalyzedata-drivenstates(e.g.,bothcontentpublicationsandsubscriptionscanintroduceroutingorforwardingstatesatthenetworklayer)candegradethestabilityandsecurityofNDN.However,noneofthemdesignanycountermeasureforIFA(thatis,theyleaveitasanopenproblemandthedesignspeci?csforcounteringIFAremaintobe?lledin).
Furthermore,inWidjaja(2012),I.Widjajaproposesa?ex-ibleresourcemanagement(RM)systemforNDN.AlthoughRMmaypreventIFA,itchangesthebasicarchitectureofNDNrouterbydeletingPITandthenmixingthecachingofInterestsintoCS,whichincreasesthecomplexitytoindexeachdistinctInterestforinterfaceperformanceevaluationorguidingInterestforwardingwithineachrouter(Yietal.2013).Moreover,RMmainlyaimsathowtomakeintelli-gentdecisionsonstoringcontentobjects,ratherthanhowtosuppresstheincomingmaliciousInterestswithineachNDNrouter.
ThemechanismsinthelatestresearchofDaietal.(2013)andAfanasyevetal.(2013)focusonthesametopiconcoun-teringIFA,butdifferinthespeci?cs.TheauthorsinDaietal.(2013)proposethe“Interesttraceback”tocounterIFAbyspoo?ngcorrespondingDatapacketstosatisfythepend-ingfakeInterestsrecordedinPIT,andthentoblockmali-ciousInterestsattheedgerouterswheretheycomein,whichcande-stressthememoryresourceforPITineachinvolvedNDNrouter.However,“Interesttraceback”detectsIFAbysimplymonitoringthePITusage,whichcouldbringinrela-tivelyhigherfalsepositivewhenevertherecomesshort-term
123
1806networkchurns.Inaddition,theauthorsinAfanasyevetal.(2013)designthreedifferentIFAcountermeasures(Tokenbucketwithper-interfacefairness,satisfaction-basedInter-estacceptanceandsatisfaction-basedpushback)withvaryingdegreesofimplementationcomplexityandeffectiveness,byextendingthePITtosupport?aggingofIntereststhatcan-notbeimmediatelyforwardedandimplementinghierarchi-calqueuesforeachinterfaceofNDNrouter.Infact,allthethreemechanismsproposedatAfanasyevetal.(2013)mon-itoreachInterestpacketatthegranularityofper-interfaceineachrouter(withoutdistinguishingdifferentpre?xesofInterestpackets),whichmakessomelegitimatebutunfortu-nateInterestpacketsarerate-limitedaswell,iftheycomeintotheNDNrouterfromthesameinterfaceasmaliciousInterestpackets(eventheyarewithdifferentpre?xesratherthanthemaliciousone).
Inthispaper,theCooperative-Filterisproposed,whichembedsfuzzylogic-baseddetectionandintroducescooper-ativemechanismbetweenrouterstomitigateIFAata?nergranularity(e.g.,per-pre?x-per-interface).
3Proposedcountermeasure:Cooperative-FilterInNDN,Interestpacketisroutedbasedonthepre?xofcon-tentnamemeanwhiletemporarilycachedinPIT,whichcon-sumesthememoryresourceofeachintermediaterouterandthusgivesachanceforattackerstolaunchIFAbyexploitingPIT.Inthissection,ourIFAcountermeasureCooperative-Filterisdesignedindetail,whichestimatesthepossibilityofIFAbasedonfuzzylogic,andmitigatesitwiththehelpofcooperationbetweenrouters.
Cooperative-FilterisanIFA-counteringarchitectureimple-mentedinNDN,whichcanbeconsideredasasetofalgo-rithmsthatrunonrouters,andhaslowdegreeofimplemen-tationcomplexity.ItsgoalistoidentifyIFAaswellastomitigateitsdamageeffect.ThemainideaofCooperative-Filteris“detectingIFAeverywhere,butmitigatingitatthesource”,where“everywhere”meanseveryrouterinNDNwhile“source”meanseveryedgerouterthroughwhichcon-sumerscanaccessintoNDN.Thatis,thedetectionmecha-nismofCooperative-FilterisenabledateachrouterofNDNwhileitsmitigationmechanismisonlyenabledattheedgerouters.Thisisbecausetheroutersupstreamcanaggregatemoretraf?cthantheedgerouters,whichmakesthemthebettermonitoringpointtodetectanyattacks.Meanwhile,theedgeroutersdirectlyconnectwithexplicitconsumers,whichmakesittobemoreef?cientto?ltermaliciousInter-estpacketsthere.Tosumup,Cooperative-Filtercombineswidespreaddetectionandlocalizedmitigation,withthelat-terbeingascloseaspossibletotheattackingsource.
Particularly,Cooperative-Filterintegratesafuzzylogic-baseddetectionmechanism(DM)andamitigationmecha-
123
K.Wangetal.
nism(MM)basedoncooperationbetweenrouters.InDM,PIToccupancyrate(POR)andPITexpirationrate(PER)aremonitoredperiodically.PORrepresentstheratioofthenum-beroftemporalPITentriesagainstthemaximumPITentriesinrealtime,http://wendang.chazidian.comingthesetwoparameters(PORandPER)asinput,DMadjudgeswhetherthereisIFAexistingbasedonfuzzylogic.WheneverIFAisdetectedinarouter,MMisenabledandapushbackmessageisgeneratedtonotifyotherinvolvedrouters,bringincooperativemitigationonIFAtoreducethenumberofmaliciousInterestpacketsthatcanenterNDN.
3.1DM:IFAdetectionusingfuzzylogic
Fuzzylogic(Zadeh1965)wasproposedtodealwithsub-jectiveorimpreciseinformation,openingmanypossibilitiestosolveproblemsthatclassicalbooleanlogicisunabletoachieve.Thebasisforfuzzylogic(linguisticvalue/naturallanguage)isthebasisforhumancommunication(itcanassignintermediatevaluesbetweentrueandfalse),whichmakesiteasytouse.
NDNroutercankeepthestatisticsforongoingcommu-nications.Thus,PORandPERineachNDNroutercanbeeasilyobtainedbyDMofCooperative-Filter.InCooperative-Filter,thefuzzi?cationforPOR,PERandoutputofDMarerealizedusingfuzzylogic.Thatis,theaccuratevaluesforthesevariablesshouldbemappedintolinguisticvalues.Inthispaper,thetwolinguisticvaluesforPOR(orPER)aresettobeHIGHandNORMAL,whilethelinguisticvaluesforoutputofDMareIFAorNORMAL(whichmeansthereisnoIFAexisting).ThemappingofnumericalinputparametersandoutputofDMforfuzzysetsisrealizedusingmembershipfunctions.Respectively,themembershipfunctionforPOR,PERandoutputofDMareshowninFig.2a-c.ThefuzzycontrollerinferencerulesinthispaperareshowninTable1.Basedontheserules,theDMofCooperative-FiltergetsthePORandPERineachrouterasinput,andgivesthesecurestatusofthisrouter(e.g.,IFAorNORMAL)asoutput.TheworkingprocessofDMineachNDNrouterisdescribedasfollowing:
Step1:DMperiodicallymonitorsPORbycomparingthereal-timePITsizeandthemaximumPITvalue,meanwhileevaluatesPERbycomparingtheinstantaneousnumberoftheexpiredPITentriesandthetotalnumberofpendingPITentries;
Step2:Thereal-timePORandPERvaluesaremappedtofuzzysetsbasedontheircorrespondingmembershipfunc-tions(showninFig.2,takingPORforexample,ifPORequals0.9,thenPORcanbeidenti?edasbelongingtoNORMALby25%meanwhilebelongingtoHIGHby75%);
Cooperative-Filter:CounteringIFAinNDN
内容需要下载文档才能查看Fig.2Membershipfunctionsforinputandoutputthatareusedinfuzzylogic
Table1FuzzyinferencerulesPORPEROutputHIGHNORMALIFANORMALHIGHIFAHIGHHIGHIFANORMAL
NORMAL
NORMAL
Step3:ThefuzzyinferencerulesinTable1areapplied,toresultinafuzzysetoutput;
Step4:Thefuzzysetoutputistranslatedintoaquantitativevalue,whichiscalledasdefuzzi?cation,basedonthepopularmethod—centroidtechniquethatisshowninEq.(1).
??b
y=x=aμA(x)x,(1)x=aμA(x)whereyrepresentsthecenterofgravityoffuzzysetA
betweenaandb,andμA(x)representsthedegreeofxbelongingtofuzzysetA.
Forexample,asshowninFig.3,ifPORequals0.85andPERequals0.56,theoutputofthefuzzylogicwouldbe
内容需要下载文档才能查看0.691.
1807
Fig.3Examplefortheoutoffuzzy
内容需要下载文档才能查看logic
Fig.4Relationshipbetweenoutputandinputoffuzzylogic
Infact,basedontheFig.2,Table1andEq.(1),therela-tionshipbetweentheoutputofthefuzzylogicembeddedinDMandthePORaswellasPERcanbeshowninFig.4.Step5:WhenevertheoutputvalueofDMexceedstheprede?nedthreshold(e.g.,thethresholdfortheoutputofDMhasbeende?nedas0.6),IFAisidenti?edandanIFA-alertmessageissenttotheMMoftheproposedCooperative-Filter.
Afterthese?vesteps,DMis?nished.
InCooperative-Filter,DMonlyneedsthenaturalinforma-tionofPITrecordedineachNDNrouter,whichcanachievesmallconsumptiononeachrouterandthusavoidexception-allyrestrictiveinforwardingInterestpacketswhenIFAdoesnotexist.
3.2MM:IFAmitigationbasedoncooperationbetween
routersIntheIFAmodel(Sect.2.2)studiedinthispaper,allthemaliciousInterestpacketsarerequestingcorrespondingDatapacketswiththesamepre?xtoaggregateenoughamountofmalicioustraf?ctovictim.Asaresult,thepre?xwhichhas
123
下载文档
热门试卷
- 2016年四川省内江市中考化学试卷
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
- 山东省滨州市三校2017届第一学期阶段测试初三英语试题
- 四川省成都七中2017届高三一诊模拟考试文科综合试卷
- 2017届普通高等学校招生全国统一考试模拟试题(附答案)
- 重庆市永川中学高2017级上期12月月考语文试题
- 江西宜春三中2017届高三第一学期第二次月考文科综合试题
- 内蒙古赤峰二中2017届高三上学期第三次月考英语试题
- 2017年六年级(上)数学期末考试卷
- 2017人教版小学英语三年级上期末笔试题
- 江苏省常州西藏民族中学2016-2017学年九年级思想品德第一学期第二次阶段测试试卷
- 重庆市九龙坡区七校2016-2017学年上期八年级素质测查(二)语文学科试题卷
- 江苏省无锡市钱桥中学2016年12月八年级语文阶段性测试卷
- 江苏省无锡市钱桥中学2016-2017学年七年级英语12月阶段检测试卷
- 山东省邹城市第八中学2016-2017学年八年级12月物理第4章试题(无答案)
- 【人教版】河北省2015-2016学年度九年级上期末语文试题卷(附答案)
- 四川省简阳市阳安中学2016年12月高二月考英语试卷
- 四川省成都龙泉中学高三上学期2016年12月月考试题文科综合能力测试
- 安徽省滁州中学2016—2017学年度第一学期12月月考高三英语试卷
- 山东省武城县第二中学2016.12高一年级上学期第二次月考历史试题(必修一第四、五单元)
- 福建省四地六校联考2016-2017学年上学期第三次月考高三化学试卷
- 甘肃省武威第二十三中学2016—2017学年度八年级第一学期12月月考生物试卷
网友关注
- 教资统考|小学《综合素质》高频考点详解:外国古典文学
- 小学《综合素质》高频考点详解:文化素养之中国历史大事件(农业社会)
- 教资统考|小学《综合素质》高频考点详解:逻辑基础知识之命题
- 小学《综合素质》高频考点详解:文化素养之中国历史原始社会
- 小学《综合素质》高频考点详解:文化素养之中国历史大事件(工业文明)
- 教资统考|小学《综合素质》高频考点详解:理解阅读材料中重要句子的含意
- 教资统考|小学《综合素质》高频考点详解:分析概括作者在文中的观点态度
- 教资统考|小学《综合素质》高频考点详解:世界著名的科学家(二)
- 教资统考|小学《综合素质》高频考点详解:中外古代艺术成就(绘画)
- 教资统考|小学《综合素质》高频考点详解:中国古代文学名家名著(戏曲)
- 教资统考|小学《综合素质》高频考点详解:世界著名的科学家(三)
- 教师资格考试小学《综合素质》高频考点提要
- 教资统考|小学《综合素质》高频考点详解:外国近代文学(一)
- 教资统考|小学《综合素质》高频考点详解:逻辑推理之论证
- 教资统考|小学《综合素质》高频考点详解:归纳内容要点,概括中心意思
- 教资统考|小学《综合素质》高频考点详解:信息的筛选与整合
- 教资统考|小学《综合素质》高频考点详解:外国近代文学(二)
- 教资统考|小学《综合素质》高频考点详解:中外古代艺术成(建筑和园林艺术)
- 教资统考|小学《综合素质》高频考点详解:世界著名的科学家(一)
- 教资统考|小学《综合素质》高频考点详解:教育测量数据的分析与处理
- 教资统考|小学《综合素质》高频考点详解:中国古代文学名家名著(诗歌)
- 教资统考|小学《综合素质》高频考点详解:逻辑基础知识之概念
- 小学《综合素质》高频考点详解:写作能力之常用文体知识
- 教资统考|小学《综合素质》高频考点详解:中外古代艺术成就(文字和书法)
- 教资统考|小学《综合素质》高频考点详解:逻辑推理之类比推理
- 教资统考|小学《综合素质》高频考点详解:中国古代散文
- 教资统考|小学《综合素质》高频考点详解:传统科技文化
- 教资统考|小学《综合素质》高频考点详解:外国现代文学(一)
- 教资统考|小学《综合素质》高频考点详解:逻辑推理之演绎推理
- 教资统考|小学《综合素质》高频考点详解:中国现代文学名家名著
网友关注视频
- 外研版英语三起5年级下册(14版)Module3 Unit2
- 第12章 圆锥曲线_12.7 抛物线的标准方程_第一课时(特等奖)(沪教版高二下册)_T274713
- 化学九年级下册全册同步 人教版 第25集 生活中常见的盐(二)
- 冀教版小学英语四年级下册Lesson2授课视频
- 【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
- 【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,湖北省
- 第五单元 民族艺术的瑰宝_16. 形形色色的民族乐器_第一课时(岭南版六年级上册)_T3751175
- 冀教版小学数学二年级下册第二单元《有余数除法的整理与复习》
- 七年级英语下册 上海牛津版 Unit9
- 七年级英语下册 上海牛津版 Unit3
- 19 爱护鸟类_第一课时(二等奖)(桂美版二年级下册)_T3763925
- 【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
- 七年级英语下册 上海牛津版 Unit5
- 【部编】人教版语文七年级下册《老山界》优质课教学视频+PPT课件+教案,安徽省
- 【部编】人教版语文七年级下册《逢入京使》优质课教学视频+PPT课件+教案,辽宁省
- 冀教版小学英语五年级下册lesson2教学视频(2)
- 冀教版英语三年级下册第二课
- 外研版英语七年级下册module3 unit2第一课时
- 【部编】人教版语文七年级下册《过松源晨炊漆公店(其五)》优质课教学视频+PPT课件+教案,江苏省
- 二年级下册数学第三课 搭一搭⚖⚖
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 12
- 冀教版小学数学二年级下册第二周第2课时《我们的测量》宝丰街小学庞志荣.mp4
- 【部编】人教版语文七年级下册《泊秦淮》优质课教学视频+PPT课件+教案,辽宁省
- 北师大版小学数学四年级下册第15课小数乘小数一
- 沪教版八年级下册数学练习册21.4(1)无理方程P18
- 3月2日小学二年级数学下册(数一数)
- 外研版八年级英语下学期 Module3
- 化学九年级下册全册同步 人教版 第22集 酸和碱的中和反应(一)
- 冀教版小学数学二年级下册1
- 沪教版牛津小学英语(深圳用) 四年级下册 Unit 7
精品推荐
- 2016-2017学年高一语文人教版必修一+模块学业水平检测试题(含答案)
- 广西钦州市高新区2017届高三11月月考政治试卷
- 浙江省湖州市2016-2017学年高一上学期期中考试政治试卷
- 浙江省湖州市2016-2017学年高二上学期期中考试政治试卷
- 辽宁省铁岭市协作体2017届高三上学期第三次联考政治试卷
- 广西钦州市钦州港区2016-2017学年高二11月月考政治试卷
- 广西钦州市钦州港区2017届高三11月月考政治试卷
- 广西钦州市钦州港区2016-2017学年高一11月月考政治试卷
- 广西钦州市高新区2016-2017学年高二11月月考政治试卷
- 广西钦州市高新区2016-2017学年高一11月月考政治试卷
分类导航
- 互联网
- 电脑基础知识
- 计算机软件及应用
- 计算机硬件及网络
- 计算机应用/办公自动化
- .NET
- 数据结构与算法
- Java
- SEO
- C/C++资料
- linux/Unix相关
- 手机开发
- UML理论/建模
- 并行计算/云计算
- 嵌入式开发
- windows相关
- 软件工程
- 管理信息系统
- 开发文档
- 图形图像
- 网络与通信
- 网络信息安全
- 电子支付
- Labview
- matlab
- 网络资源
- Python
- Delphi/Perl
- 评测
- Flash/Flex
- CSS/Script
- 计算机原理
- PHP资料
- 数据挖掘与模式识别
- Web服务
- 数据库
- Visual Basic
- 电子商务
- 服务器
- 搜索引擎优化
- 存储
- 架构
- 行业软件
- 人工智能
- 计算机辅助设计
- 多媒体
- 软件测试
- 计算机硬件与维护
- 网站策划/UE
- 网页设计/UI
- 网吧管理