• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security-State Adjustable Gateway with Threat-Based Configuration

    2013-07-14 01:21:06ChinFuKuoYungFengLuandChiYingChen

    Chin-Fu Kuo, Yung-Feng Lu, and Chi-Ying Chen

    1. Introduction

    Cloud computing is a combination of various computing entities, globally separated, but electronically connected. As the geography of computation is moving towards corporate server rooms, it brings more issues including security, such as the transmission security. There is a survey regarding the use of cloud services made by International Data Corporation highlights that the security is the greatest challenge for the adoption of cloud[1]. Hence,security is a huge concern for cloud users, and it becomes an important issue that provides a secure way to use the cloud. To improve the mutual trust between users and the cloud provider, the cloud security alliance (CSA)[2],[3]has developed a security guide that identifies many areas for concern in cloud computing. The cloud network and perimeter security is one of the most challenging issues.Hence, protecting the information from illegal access has become an inevitable issue for IT product vendors and developers.

    In this paper, we are concerned with how to configure the security mechanisms for security gateways in a systematic manner. Network gateways, one of the popular IT products, are designed to bridge network traffic between the Internet and private networks. The major responsibility of the gateways is to protect private networks from being accessed without appropriate permission. Although there do exist numerous security mechanisms, there is no universal standard for configuring security mechanisms on gateways.A gateway that is set up as a network router for an enterprise private network often requires strict security policies. However, a gateway for home usage might not have proper security measures. In addition, the majority of the security mechanisms are computationally intensive.Enforcing unnecessary security mechanisms may compromise the system performance and network throughput. The challenge is how to configure a network gateway so that its security features are met without compromising its performance.

    In the current gateway architecture, individual security software components are designed to provide particular security mechanisms. Designing each software component to provide particular security mechanisms has its own merits. However, it leads to additional administration overhead and it may also cause misconfiguration vulnerability.

    Instead of proposing new security features, this paper focuses on the providing of a threat-based security configuration architecture for gateways to ease the administration overhead and reduce the chance of misconfiguration vulnerability. Fig. 1 illustrates the threat-based security configuration architecture for the gateways. The novel architecture serves two purposes: 1)reducing the software integration and configuration overhead for product designers during the design phase and 2) providing an intuitive configuration interface for the end-users. From product designers’ perspective, the architecture provides a systematic manner to integrate the software components to overcome the threats and to properly configure the software components. The threat-based configuration architecture shown in the dashed box in Fig. 1 separates the software configuration into four parts: the common criteria document, threat dependency graph, state transition graph, and software configuration.The common criteria document defines the threats that the gateway should overcome.

    Given the threats defined by the common criteria document, we propose a threat dependency graph to model the occurrence relation among the threats. The threat dependency graph helps the designers identify the set of threats to be overcome in order to provide certain security features and reduce the chance of misconfiguration vulnerability. We also define the system security states,each of which defines the set of the threats that the system can overcome. The change of the security states during the run-time are modelled by the state transition digraph. Given the common criteria document and security states, the designers can find the software components to overcome the threats with minimal efforts. The four parts of the threat-based security configuration are determined during the design phase and are constructed by domain experts.From end-users’ perspective, the architecture allows the end-users to configure the gateways by selecting the desired security features, as shown on the left-hand side of Fig. 1.After the desired security features are selected, the software components on the gateways are configured according to the flow shown in the dashed box in Fig. 1 to provide the selected features. There is no need for the end-users to configure the individual software components on the gateways. When the new threats are discovered, the designer shall revise the threat dependency graph, state transition diagraph, and software configuration. The end-users shall download the revised threat and state information to reconfigure their own gateways. By this manner, the change of misconfiguration vulnerability can be reduced.

    The idea of threat dependency graph is related to the attack tree approach developed by Schneier[4]. The attack tree approach is intended for penetration testing where there is a little background information about the system to be tested. The basic idea is a combination of the work breakdown structure from project management and the familiar tree representation of a logical proposition.However, the occurrence of threats in the gateways may not always have such relation. When a system is vulnerable to eavesdropping, the system is vulnerable to both the unauthorized access to the security configuration data and spoof. We extend the tree structure to a directed acyclic graph to model the occurrence relation among the threats.

    To demonstrate the capability of the architecture, we integrate several open source security components on a Linux platform. However, the designed architecture is not limited to the software components used in this paper.Other (open source or commercial) software can also be integrated on such an architecture. A series of experiments are conducted to evaluate the capability of the proposed methodology.

    The rest of this paper is organized as follows. Section 2 describes the proposed security gateway based on common criteria. Section 3 describes the design of the gateway and discusses the implementation issues of the security gateway.Section 4 evaluates the performance of the system and demonstrates the effectiveness of the proposed architecture.Our work is summarized and the future work is discussed in Section 5.

    2. Security Gateway Based on Common Criteria

    Gateways in the paper are referred to the devices defined by RFC1009[5], in which a gateway is an IP-level router to connect two or more networks. In June 1993, the United States, the United Kingdom, Germany, France,Canada, and Netherlands started to develop an evaluation standard for a multi-national marketplace. This standard is known as the “Common Criteria for Information Technology Security Evaluation” (CCITSE), and it is usually referred to as the “Common Criteria” (CC).

    In CC, a product which is subjected to evaluation is called a target of evaluation (TOE). As shown in Fig. 2,there is a process for the evaluation of CC. Our TOE is a gateway that is designed to protect the private networks against security threats from the external network. For the sake of presentation, we will use terms “TOE” and“gateway” interchangeably in the paper. The security measures of a TOE are defined by two documents: the protection profile (PP) and security target (ST). PP allows the consumers and developers to compile standardized sets of security requirements to meet their needs. On the other hand, ST specifies the functional requirements and assurance security for the product developers. The evaluators use ST as the basis for evaluation. There are many research have adopted CC to help them verify their security requirements. Details of CC usages are given in[6]-[9].

    Fig. 1. Threatbased security configuration architecture.

    Fig. 2. Evaluation process of CC.

    Fig. 3. Threat dependency graph.

    2.1 Security Threats

    To define the security threats for a security gateway, we have studied several PPs and STs for the definition of threats for various TOEs. The target products include operating systems (OSs)[10], firewalls[11],[12], and intrusion detection systems[13]. The threats for the security gateway are summarized in Table 1. The threats listed here are not newly discovered but are categorized to aid the design of the threat-based configuration architecture. In the following sections, a symbol “T.threat” represents a threat named“threat”.

    The threats are classified into three categories: the threats for the gateway OSs, the threats for the private networks, and the threats for the communication channel.The threats for the gateway OSs may cause abnormal operations in the underlying OSs. Two threats, T.NOAUTH and T.SELPRO, are listed in this category. The threats for the private networks are the ones that may cause disordered operations on the private networks and information leakage.T.AUDIT, T.MEDIATE, and T.RESOURCE are the threats listed in this category. The threats for the communication channels are the ones that may compromise the confidentiality of the communication channels when network packets are not encrypted during transmission.T.EAVESDROP, T.SPOOF, and T.MASQEURADE are the threats in this category.

    Although the listed threats could occur individually,their occurrences are not fully independent. For example,T.EAVESDROP might occur when an unauthorized user is able to eavesdrop on the communication media and obtain the authentication data. Hence, the user can bypass the security mechanisms to modify critical configuration data,which causes T.NOAUTH. Note that such a scenario occurs even when the system enforces a flawless authentication mechanism, i.e., no user can log in the system without giving proper identity information. In short, when the threat T.EAVESDROP occurs on the system, it is very likely that threat T.NOAUTH also occurs on the system. We call such a sequence of attacking events of threats as an attacking scenario.

    Table 1: Threat description of the gateway[9],[14]

    2.2 Threat Dependency Graph

    A threat dependency graph is an acyclic directed graph in which each node represents a threat on the gateway and each directed edge represents an attacking scenario from the source threat to the destination threat. We call a threat T.a a preceding threat of a threat T.b if there exists a path from T.a to T.b. Essentially, an edge in the threat dependency graph represents that failing to overcome the source threat leads to the failure of overcoming the destination threat. In other words, to fully overcome one threat T, the system must overcome all the preceding threats of T.a and T.b.

    Fig. 3 shows a simple threat dependency graph with four threats: T.i, T.j, T.k, and T.l, and three directed edges(i.e., attacking scenarios). The edges in Fig. 2 illustrate that T.k may occur when T.i or T.j occurs on the system.Similarly, T.l may occur when T.k has been observed on the system. To protect the system from T.k, the system needs the security mechanisms to prevent all preceding threats of T.k (i.e., T.i and T.j) and T.k rather than T.k only.

    To construct the threat dependency graph for the security gateway, we studied the attack scenarios collected by the CERT?coordination Center, Snort rules database[15],and earlier work in the literature (e.g., [16] and [17]). We selected the attacking scenarios in which the threats related to the gateway are involved. Fig. 4 shows the threat dependency graph system from T.EAVSDROP. On the other hand, T.AUDIT is the threat that requires most overhead to overcome. It is because the system has to overcome all eight threats in the graph.

    Note that the threat dependency graph shown in Fig. 4 may not cover all possible threats on a security gateway.This is because the graph is compiled based on the observed attacking scenarios. Any attacking scenarios not observed in the literature are not covered by the graph.However, the graph can be revised incrementally when a new threat or an attack scenario has been discovered. The product designer or security service providers can revise the threat dependency graph by analyzing the relationship between the new threat and any of the existing threats. For example, if failing to overcome the new threat T.new could lead to the failure of overcoming one of the existing threat T.old, and a new edge from T.new to T.old will be added to the graph.

    3. System Design and Implementation

    3.1 System Architecture

    We propose a layered software architecture for threat based security gateways. The advantage of this architecture is the following. The security functionalities of each layer are verified without any concern for the software components in the other layers. Its correct functionalities can be used in other above layers. As a result, the system designer can reduce the overhead of selecting and integrating security software components on the gateway.Each layer is designed to overcome the threats listed in one threat category defined in Section 2.2. The software at each layer will be chosen to overcome the threats of the layer. In the proposed architecture, there are three software layers:the secure OS, secure gateway, and service of gateway, as shown in Fig. 5. The bottom layer is the secure operating system layer, which is responsible for providing the basic OS protection to the gateway. The top layer is the gateway service layer, which is on the top of the secure OS layer and is responsible for providing a secure private network. It is responsible for providing secure communication channels.

    For the rest of this section, we describe the selected software components in each layer. Rather than implementing new security modules in each layer, existing open source security modules are integrated to demonstrate the effectiveness of our design. However, the gateway is not limited to use the software chosen in this paper. Other commercial or open source software can also be used in this architecture as long as the software overcomes the threats defined in the paper.

    ·Secure OS layer: The secure OS layer is the minimal requirement for our security gateway. The mechanisms adopted to implement the secure OS layer are pluggable authentication modules (PAM)[18]and security-enhanced Linux (SELinux)[19],[20].

    Fig. 4. Threat dependency graph for the security gateway.

    Fig. 5. System architecture of the security-enhanced gateway.

    PAM provides the authentication mechanism and is used in our gateway to overcome T.NOAUTH. In addition,we choose SELinux as a part of the secure OS layer to overcome T.SELPRO. There are two main types of implementation for access control: the discretionary access control (DAC) and mandatory access control (MAC). The DAC grants the access permission based on the user identity and ownership. Other security-relevant information are ignored. On the other hand, the MAC grants the access permission based on the subjects and objects specified in security policies. With MAC, users can confine user programs and system daemons to the minimum privilege required to complete their tasks. By specifying appropriate security policies, the probability in which the user programs and system daemons might cause harm (e.g., buffer overflow or configuration errors) is minimized. Most OSs,such as FreeBSD[21], implement through DAC.

    ·Secure gateway layer: Three security modules are selected for the secure gateway layer: iptables[22], Snort[15],and iproute2[23]. Iptables is part of the netfilter framework in the Linux kernel. We use iptables to implement the network address translation (NAT1) protocol and build a packet filtering firewall at the packet level. Iptables is used in our gateway to overcome T.MEDIAT. Iptables is also one of the minimal requirements for our security gateway.

    The Snort[15]is an intrusion detection system (IDS) that could inspect the traffic flow passing through the gateway to protect the private networks. By logging the packets or only the packet header, the administrator can trace or analyze the attacks later. Hence, T.AUDIT is overcome. In addition, when certain attacks occur, Snort signals can alarm to the system.

    Iproute2[23]consists of traffic control mechanisms for classifying, prioritizing, sharing, and limiting traffic of either direction. Iproute2 allows the end users to control the traffic such that the bandwidth is not over-consumed by certain hosts. Iproute2 also allows the end users to assign the priority to each host. Therefore, T.RESOURCE. is overcome by iproute2.

    ·Service of gateway layer: The widely used IPv4 has no authentication and encryption mechanisms on the header and content of IP (Internet protocol) datagrams. Therefore,the datagrams could be read, modified, or forged during transmission. This defect may cause threats T.EAVESDROP, T.SPOOF, and T.MASQUERADE.IPSec is one of many mechanisms to resolve this defect.There are two major protocols in IPSec: the IP authentication header (AH)[24]and IP encapsulated security payload (ESP) protocol[25]. AH authenticates IP datagrams to provide data integrity and source authentication; ESP encrypts IP datagrams to prevent eavesdropping. Therefore,all communication channels of different applications operated over the IP protocol could be protected.

    3.2 Security State and State Transition

    The security state of a gateway is a set of threats that the gateway can overcome. For each threat in the threat set,its preceding threats must also be included in the set.Otherwise, the gateway is not able to be fully protected against the threats and the threat set is not a valid security state. Consider the threat dependency graph in Fig. 6. The threat set {T.i, T.j, T.k} is a valid security state because all preceding threats of threats T.i, T.j, and T.k are included in the set. However, the threat set {T.i, T.k} is not a valid security state because T.j is a preceding threat of threat T.k but not included in the threat set.

    There are eight security states in our security gateway.Table 2 shows the states, the threats that the system can overcome, and the corresponding security software configuration for each state. State S0is the initial state of the system and activates no security software. State S1has the minimal security level which overcomes threats T.MEDIATE, T.EAVESDROP, and T.SPOOF. When the system is in state S1, the system activates iptables and IPSec with data encryption standard (DES) to overcome the threats. State S7has the maximal security level which overcomes all eight threats of the gateway. But note that the index of the security state does not imply the security level of the gateway. A greater index does not imply a higher security level. For example, it is difficult to compare the security level of states S2and S3because they could overcome different threats and attacking scenarios.

    Table 2: State configuration

    Fig. 6. State transition digraph.

    The state transition digraph of the gateway is shown in Fig. 6. Each node represents a security state and each edge represents the state transition from the source state to the destination state. The initial system state is state S0. The annotation on each edge represents the changing of the threat set. The system may overcome or ignore certain threats. For example, when the gateway is in state S5, its security state could be changed to S6by changing the software configuration to ignore another threat,T.RESOURCE.

    The state transition digraph aids the end users to reduce the runtime administration overhead. With the state transition digraph, the end users only focus on determining the security features that the system should overcome. The security mechanisms on the system are automatically configured based on the software configuration shown in Table 2. For instance, when the system starts, the system is in the initial state S0. If the end user decides that the system should be protected from the T.NOAUTH attacks, the end user can request the system to migrate to state S3. And the software on the system is, then, configured according to Table 2. (The system can also be protected from threat T.NOAUTH by migrating to state S4, S5, S6, or S7. However,it will over consume more resources and compromise the system performance. The performance of the system at different states will be studied in Section 4.)

    The state transition digraph also aids the end users to eliminate the misconfiguration vulnerability. When the system is in state S4and the end user decides to ignore T.NOAUTH attacks but overcome T.SELPRO attacks, the system state should be migrated to state S5. Without the state transition digraph, the end user may decide to deactivate PAM and activate SELinux. However, without activating PAM, the system is not able to overcome threat T.SELPRO. This is because T.NOAUTH has a path to T.SELPRO in the threat dependency graph and must be overcome.

    3.3 Implementation Challenges

    In this section, we present the alternatives for implementing the proposed architecture and discuss the implementation decisions we made. We also present the challenges for integrating several existing security mechanisms, and how we handle those challenges. The alternatives for the implementation of IDS and the communication channel protection are discussed as follows.

    ·IDS: There are two main types of IDS. One is the network-based IDS and the other is the host-based IDS. A network-based IDS installed on the edge of the networks scans all of the incoming/outgoing traffic of the private networks for suspicious attacks; the host-based IDS installed on a host machine scans security vulnerabilities only on the host machine. IDS is used on our gateway to protect the private network rather than one host machine.Therefore, a network-based IDS such as Snort is more suitable for our gateway. One benefit of Snort is that its online signature database is updated constantly by the user/security community. The database contains signatures for various attacks. By updating the new signatures, Snort could respond to new attacks quickly.

    ·Communication channel protection: There are two ways to protect the communication channels. One way is to provide authentication and encryption mechanisms on the application layer. For example, the secure socket layer protocol (SSL)[26]has been proposed to protect a communication channel between a web browser and a web server. However, the disadvantage of this approach is that each application must be tailored to support secure communication channels. The other way is to adopt IPSec on the network layer. The IPSec serves as a transparent mechanism to authenticate and encrypt IP datagrams flowing through the secure gateway, so that all hosts in the private network could benefit from it without any modification.

    Several challenges occur during our system integration:

    ·Integrating the IPSec and firewall: There are several challenges when IPSec has to work with firewalls. One challenge is that the firewall should allow the IPSec traffic to pass through the firewall. The firewall has to be configured to allow traffic using ports 50 and 500. Because the port 50 is used by ESP and the port 500 is used for the key exchange. The other challenge is about NAT. IPSec authenticates IP datagrams to ensure that they are not modified during transmission, but NAT rewrites the header of the datagrams when they go pass through the gateway.As a result, IPsec authentication fails since IP datagrams are modified. A resolution to this problem is that the sending gateway passes the IPSec datagrams without doing NAT, and the receiving gateway also passes the IPSec datagrams without doing NAT. The process is shown in Fig. 7.

    ·Integrating the IDS and firewall: An important consideration in the installation of IDS is the time to analyze the packets. If the IDS analyzes the packets before they are processed by the firewall, the IDS analyzes all packets directed to the gateway. On the other hand, an IDS behind the firewall will only analyze packets that pass through the firewall. We choose the former setting. The reason is that the system will get more information for the state of the environment, avoiding a false sense of safety.This approach introduces additional performance overhead to the system. Unfortunately, it is extremely difficult to quantify the increased overhead. This is because the amount of increased overhead highly depends on the number and type of rules set in the firewall. In addition,although more firewall rules may filter more packets to reduce the run-time overhead on the IDS, it also introduces additional overhead on the firewall.

    Fig. 7. System configuration with both NAT and IPSec.

    Table 3: Software versions for the experimental environment

    4. Performance Evaluation

    In this section, we evaluate the effectiveness and performance of the proposed threat-based security gateway.

    4.1 Workload Generation and Performance Metrics

    To evaluate the performance of a threat-based security gateway, we set up an experimental environment which was isolated from the Internet to avoid interference, as shown in Fig. 8. The security gateway was installed on an x86-based machine which has an Intel Pentium III 700 MHz CPU and 512 MB RAM (random access memory).Two security gateways were connected via a wire-speed layer-3 switch. Each security gateway was connected to a private network which has one or more hosts. The software installed on the gateways is listed in Table 3.

    We adopted Iperf[27]to generate network traffic and measure network performance. In our setting, there were an Iperf client and an Iperf server. The Iperf client sent(transmission control protocol (TCP) or user datagram protocol (UDP)) packets to the Iperf server. The TCP traffic was used to measure the throughput of the connection.

    The experiments also verified the effectiveness and performance tradeoff of state transition. Attacking packets were generated by using hping[28]. We used hping to forge malicious packets by stuffing the payloads with the signatures specified in the Snort database. Packets were sent by hping at the rate of 100 packets per second to trigger attacking alerts of Snort. When Snort detected attack events, it sent alert messages to the end-user. So, the end-user can modify the desired security features of the gateway, and then the state of the gateway could be automatically adjusted.

    The performance metrics are the average network throughput and average CPU workload. The average network throughput is the amount of transferred data in mega bits per second (Mb/sec) on the network connection between the Iperf client and Iperf server in average; the average CPU workload is the ratio of the time when the CPU is busy. We measured performance for different security states.

    4.2 Results and Analysis

    We present the results that show the tradeoff between the security states and performance. In the evaluation results, the 95% confidence interval of each data point in our results is no greater than 2.4% of its data values.

    ·Average throughput: The average network throughput for different security states are shown in Fig. 9.The average network throughputs were no more than 25 Mb/sec. This was caused by the overhead imposed by IPSec. The overhead of authentication and IP datagrams encryption backlogged the network packets and reduced the average network throughput.

    In Fig. 9, the average throughput increases when the system state migrates from S1to S2and from S3to S4(i.e.,the system is able to overcome more threats). This is because that AES used in S2and S4is more efficient than DES used in S1and S3. Although AES provides more functionalities and has better performance than DES does,we chose AES and DES for different states for the purpose of demonstration. In practice, the system designer can use AES for both states to reduce the overhead. Moreover, the difference of the average network throughput between S1and S3(or S2and S4) was small because PAM introduced negligible overhead when there was a new secure shell(SSH) session generated. In order to overcome additional threats from S4to S7, additional security software components were activated and the average network throughput was decreased gradually.

    Fig. 8. Experimental environment for performance evaluation.

    Fig. 9. Average throughput for different state configurations.

    Table 4: Average CPU workload

    ·Average CPU workload: The average CPU workload for different security states are shown in Table 4. The average CPU workloads of states S1and S3(or S2and S4)are similar. It shows that overcoming T.NOAUTH needed little overhead. Moreover, it is clear that enabling AES in states S2and S4could reduce the CPU workload. The reason is that AES is more efficient than DES. Overcoming T.SELPRO increased the CPU workload from S4to S5. The average CPU workloads of states S5and S6are similar. It shows that overcoming T.RESOURCE imposed ignorable effect on the CPU workload. When the system was in state S7, the CPU workload was 100%. This was because the Snort was activated in S7. Incoming packets were analyzed by the Snort to check for suspicious activities. The checking process involved pattern-matching with thousands of build-in attacking signatures. This process was computationally intensive.

    ·Threat detection and state transition: The throughput variation of the security gateway as the system state changes is shown in Fig. 10. The upper part shows the change of network throughput over time; the bottom part shows the attacks generated by hping over time. In order to demonstrate the state transition, the default state of the gateway was set as S1and the Snort was turned on. In the figure, Si+Snort represents the software configuration when the system was in the state Siand the Snort was activated.Afterward, the Snort detected attack events. If attack events were detected, alarm messages were sent to the end-user.Then, the state of the security gateway was changed automatically based on the security features of the end-user.

    When no attack occurred, the throughput was about 16 Mb/sec. At time 5, a T.MASQUERADE attack was issued and detected by the Snort. The state of the security gateway was manually changed from S1to S4to overcome T.MASQUERADE. It is clear that the throughput was increased to around 20 Mb/sec because AES was enabled.(Note that AES is a more efficient algorithm.) At time 13, a T.RESOURCE attack was added in and detected by the Snort. The state of the gateway was manually changed from S4to S7to overcome T.RESOURCE. We used iproute2 to restrict the total traffic of the private network to be 10 Mb/sec. The throughput was further maintained around 10 Mb/sec. At time 19, when there was no attack of T.MASQUERADE, the state of the gateway was still S7. At time 25, when there was no attack belonging to T.RESOURCE and T.MASQUERADE, the state of the gateway was changed from S7to S1+Snort, which was the default state. The throughput was back to around 16 Mb/sec again. The results demonstrate how the threat-based security gateway can react to the change of system security features. When the system is in safe states, unnecessary security mechanisms are turned off to improve the system performance. However, when the system is under threats,necessary security mechanisms are turned on to protect the system. The tradeoff is the system performance.

    The average number of packets analyzed by the Snort and received UDP packets. Fig. 11 shows the traffic flow in the gateway when the Snort is active. The Snort copies the incoming packets to its own buffer space and performs the inspection. When the gateway is overloaded, the Snort may have to drop/ignore packets. However, when the Snort drops a packet, the original packet still arrives on the gateway.

    The average number of packets analyzed by the Snort and the received UDP packets are shown in Fig. 12. When the system was in state S5, the number of the received UDP packets increased steadily until the UDP sending rate was 35 Mbits/sec. When the sending rate was greater than 35 Mbits/sec, the number of the received UDP packets began to decrease. The reason is as follows. Before the peak, the interrupt service routine had enough CPU resources to handle the incoming packets. However, when the UDP sending rate reached 35 Mb/sec, the system was fully loaded by the incoming packets. After the peak, the number of the received UDP packets began to decrease. The reason is that the buffer of the network interface card was corked and the incoming packets were dropped. The same result could be observed when the state of the system was in state S6. The difference was that the peak appeared earlier,because the IPSec was turned on in the state S6. This phenomenon also affected the number of packets analyzed by the Snort. There was also a peak point for the number of packets analyzed by the Snort. Either in state S2or S6, the number of analyzed packets increased until the peak was reached, and began to decrease after the peak. This is because the priority of interrupt service routine is higher than that of the Snort. Therefore, when the system is overloaded, the resource is mostly consumed by the interrupt service routine and forces the Snort to drop packets without analyzing. This is the reason why the peak of the number of analyzed packets by the Snort appeared earlier than that of the number of received UDP packets.

    Fig. 10. Throughput with manual state changing.

    Fig. 11. Flow of packets in the gateway.

    Fig. 12. Average number of analyzed packets by Snort and the received UDP packets.

    5. Conclusions

    This paper explores the design and implementation of a security gateway based on CC, and proposes a threat-based software-configuration architecture. The architecture serves two purposes: 1) reducing the integration and configuration overhead for the product designers and administrators and 2)providing a user-friendly manner for the end-users to configure the gateway. We identify potential threats for security gateways, derive the relationship among the threats,define the system security states, and integrate several open source security software components to demonstrate our design. The performance evaluation shows that when the system security state changes, the network throughput significantly changes. In addition, when the Snort is turned off, 60% of the CPU workload can be released. If it is not required to overcome T.AUDIT, the released CPU time can be used to increase the throughput or execute other critical operations.

    [1] F. Gens. New IDC IT cloud services survey: Top benefits and challenges. [Online]. Available: http://blogs.idc.com/ie/?p=730

    [2] Security Guidance for Critical Areas of Focus in Cloud Computing, Cloud Security Alliance, 2012.

    [3] M. Pan, P. Li, Y. Song, Y. Fang, and P. Lin, “Spectrum clouds: a session based spectrum trading system for multi-hop cognitive radio networks,” in Prof. of Int. Conf.Computer Communications, Orlando, 2012, pp. 1557-1565.

    [4] B. Schneier, “Attack trees,” Dr Dobb’s Journal, vol. 24, no.12, pp. 21-19, Dec. 1999.

    [5] R. Braden and J. Postel, RFC 1009 (Requirements for Internet gateways), 1987.

    [6] Y. Wu, Y. Suhendra, and H. Guo, “A gateway-based access control scheme for collaborative clouds,” in Prof. of the 7th Int. Conf. on Internet Monitoring and Protection, Stuttgart,2012, pp. 54-60.

    [7] Common criteria for information technology security evaluation. [Online]. Available: http://www.commoncriteriaportal.org/cc/

    [8] K. V. Dolan, P. A. Wright, and R. R. Montequin. U.S.Department Defense application-level firewall protection profile for medium robustness environments, version 1.0.Technical Report. [Online]. Available:http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA395046

    [9] K. V. Dolan, P. A. Wright, and R. R. Montequin, B. Mayer,L. Gilmore, and C. Hall. U.S. government traffic-filter firewall protection profile for medium robustness environments. Technical Report. Available:http://www.dtic.mil/dtic/tr/fulltext/u2/a395046.pdf

    [10] National Security Agency. Protection profile for single-level operating systems in environments requiring medium robustness, version 1.22. Technical Report. [Online].Available: http://www.niap-ccevs.org/pp/pp_os_sl_mr_v1.22.pdf

    [11] T. Alexander, R. Hawkins, and T. Kelly. Security assurance cases: motivation and the state of the art. [Online]. Available:http://www-users.cs.york.ac.uk/~rda/York%20CESG%20sec urity%20case%20report%20i1_1.pdf

    [12] T. Kaneko, S. Yamamoto, and H. Tanaka, “Proposal on countermeasure decision method using assurance case and common criteria,” in Proc. of the 6th Int. Conf. on Project Management, Honolulu, 2012, pp. 331-336.

    [13] A network infrastructure security product for attack detection, analysis and response, version 2.11. Technical Report. [Online]. Available: http://www.commoncriteriaportal.org/files/epfiles/st_vid2013-st.pdf

    [14] Common criteria for information technology security evaluation, version 2.1. Technical Report. [Online].Available: http://www.niap-ccevs.org/Documents_and_Guidance/ cc_docs/cc_users_guide.pdf

    [15] M. Roesch, “Snort-lightweight intrusion detection for networks,” in Proc. of the 13th USENIX conference on System administration, Berkeley, 1999, pp. 229-238.

    [16] B. Hatch and J. Lee, Hacking Linux Exposed, New York:McGraw Hill, 2003.

    [17] W. Stallings, Network Security Essentials, Upper Saddle River: Prentice Hall, 2002.

    [18] Pluggable authentication modules. [Online]. Available:http://www.kernel.org/pub/linux/libs/pam

    [19] S. Smalley, C. Vance, and W. Salamon. Implementing selinux as a linux security module. Technical Report.[Online]. Available: http://www.nsa.gov/research/_files/publications/implementing_selinux.pdf

    [20] SELinux Project. [Online]. Available: http://selinuxproject.org/page/Main_Page

    [21] FreeBSD. [Online]. Available: http://www.openbsd.org/

    [22] H. Welte, J. Kadlecsik, M. Josefsson, and P. McHardy.Iptables. [Online]. Available: http://www.netfilter.org

    [23] Iproute2. [Online]. Available: http://snafu.freedom.org/linux2.2/iproute

    [24] S. Kent and R. Atkinson, RFC 2402 (IP Authentication Header), 1998.

    [25] S. Kent and R. Atkinson, RFC 2406 (IP Encapsulating Security Payload), 1998.

    [26] Secure sockets layer. [Online]. Available: http://www.openssl.org/

    [27] C. H. Hsu and U. Kremer, “Iperf: a framework for automatic construction of performance prediction models,” in Proc. of Workshop on Profile and Feedback-Directed Compilation,Paris, 1998, doi: 10.1.1.40.2777.

    [28] Hping: Netwrok packet analyzer and reassembler. [Online].Available: http://www.hping.org/

    90打野战视频偷拍视频| 亚洲第一区二区三区不卡| 一本综合久久免费| 国语自产精品视频在线第100页| 小说图片视频综合网站| 国产精品98久久久久久宅男小说| 欧美日韩瑟瑟在线播放| 欧美日本视频| 亚洲,欧美,日韩| 少妇熟女aⅴ在线视频| 亚洲欧美日韩东京热| 婷婷精品国产亚洲av| 日韩中文字幕欧美一区二区| 悠悠久久av| ponron亚洲| 日韩精品青青久久久久久| 丁香欧美五月| 成人av一区二区三区在线看| 久久久久久久久中文| 国产午夜精品论理片| 又黄又爽又免费观看的视频| 看十八女毛片水多多多| 亚洲一区二区三区色噜噜| 亚洲av成人不卡在线观看播放网| av在线天堂中文字幕| 国产成人av教育| 欧美潮喷喷水| 日韩免费av在线播放| 日韩欧美三级三区| 日本一二三区视频观看| 日韩欧美国产在线观看| 不卡一级毛片| 亚洲精品色激情综合| 成人无遮挡网站| 国产精品永久免费网站| 欧美区成人在线视频| 午夜福利欧美成人| 欧美xxxx黑人xx丫x性爽| 亚洲美女搞黄在线观看 | 亚洲人成电影免费在线| 波多野结衣巨乳人妻| 12—13女人毛片做爰片一| 男女床上黄色一级片免费看| 国产成人影院久久av| 午夜久久久久精精品| 黄色配什么色好看| 精华霜和精华液先用哪个| 少妇裸体淫交视频免费看高清| 日本撒尿小便嘘嘘汇集6| 波多野结衣巨乳人妻| 亚洲 国产 在线| 丰满乱子伦码专区| 午夜激情福利司机影院| 特级一级黄色大片| 亚洲美女视频黄频| 国产亚洲精品久久久com| 又爽又黄a免费视频| 在线观看66精品国产| 国产主播在线观看一区二区| 男插女下体视频免费在线播放| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 久久久久久久午夜电影| 别揉我奶头~嗯~啊~动态视频| 国产精品电影一区二区三区| 国产午夜精品久久久久久一区二区三区 | 久久久久免费精品人妻一区二区| 国产一区二区在线观看日韩| 久久午夜福利片| 色尼玛亚洲综合影院| 亚洲av二区三区四区| 精品一区二区免费观看| 在线观看美女被高潮喷水网站 | 亚洲成人久久爱视频| 97超视频在线观看视频| 一二三四社区在线视频社区8| 88av欧美| 欧美激情在线99| 老鸭窝网址在线观看| 别揉我奶头~嗯~啊~动态视频| xxxwww97欧美| 欧美国产日韩亚洲一区| 精品久久久久久久久久免费视频| 亚洲人成网站高清观看| 午夜免费男女啪啪视频观看 | 91在线精品国自产拍蜜月| 免费观看的影片在线观看| 蜜桃亚洲精品一区二区三区| 高潮久久久久久久久久久不卡| 成人国产综合亚洲| 神马国产精品三级电影在线观看| 男女做爰动态图高潮gif福利片| 黄色视频,在线免费观看| 18禁裸乳无遮挡免费网站照片| 国内精品美女久久久久久| 亚洲片人在线观看| 亚洲欧美日韩卡通动漫| 51国产日韩欧美| 亚洲第一电影网av| 亚洲成人免费电影在线观看| 亚洲内射少妇av| 18禁黄网站禁片午夜丰满| 免费av观看视频| 亚洲成人精品中文字幕电影| 看免费av毛片| 女人十人毛片免费观看3o分钟| 欧美极品一区二区三区四区| 久久精品91蜜桃| 久久精品影院6| 少妇人妻精品综合一区二区 | 久久久久久久久久黄片| 久久久久性生活片| av福利片在线观看| 国产高清视频在线观看网站| 在线看三级毛片| 内射极品少妇av片p| av欧美777| 男插女下体视频免费在线播放| 欧美最黄视频在线播放免费| 精品人妻视频免费看| 亚洲aⅴ乱码一区二区在线播放| 99久久成人亚洲精品观看| 国产亚洲精品久久久久久毛片| 亚洲18禁久久av| 久久久国产成人免费| 看免费av毛片| 国产不卡一卡二| www.www免费av| 中文字幕久久专区| av国产免费在线观看| 色精品久久人妻99蜜桃| 99久久精品一区二区三区| 又粗又爽又猛毛片免费看| 久久精品国产亚洲av香蕉五月| 欧美性感艳星| 一本精品99久久精品77| 悠悠久久av| av在线天堂中文字幕| 亚洲人成网站在线播| 国产精品98久久久久久宅男小说| 午夜福利免费观看在线| 日本在线视频免费播放| 午夜福利在线在线| 亚洲欧美清纯卡通| 搞女人的毛片| 免费高清视频大片| 免费看日本二区| 小说图片视频综合网站| 亚洲自偷自拍三级| 午夜福利成人在线免费观看| 悠悠久久av| 一级毛片久久久久久久久女| 午夜精品一区二区三区免费看| 亚洲精品亚洲一区二区| 国产高清有码在线观看视频| 欧美一级a爱片免费观看看| 此物有八面人人有两片| 欧美黑人巨大hd| 99热这里只有是精品50| 少妇人妻一区二区三区视频| 欧美乱妇无乱码| 在线观看舔阴道视频| 亚洲片人在线观看| 少妇人妻精品综合一区二区 | 一个人免费在线观看的高清视频| 婷婷丁香在线五月| 成人特级黄色片久久久久久久| 色综合站精品国产| 国产久久久一区二区三区| 国产一级毛片七仙女欲春2| 亚洲性夜色夜夜综合| 亚洲人成网站在线播| 三级国产精品欧美在线观看| 一区二区三区四区激情视频 | 18禁在线播放成人免费| 国产 一区 欧美 日韩| 在线观看av片永久免费下载| 69人妻影院| 丰满人妻熟妇乱又伦精品不卡| ponron亚洲| 嫩草影院新地址| 国产在线精品亚洲第一网站| 一级a爱片免费观看的视频| 午夜免费激情av| 国产亚洲精品综合一区在线观看| 亚洲,欧美精品.| 在线看三级毛片| 国产精品98久久久久久宅男小说| 亚洲av电影在线进入| 蜜桃久久精品国产亚洲av| 国产精品一区二区性色av| 美女xxoo啪啪120秒动态图 | 深爱激情五月婷婷| 最近最新中文字幕大全电影3| 欧美+亚洲+日韩+国产| 亚洲黑人精品在线| 在线播放无遮挡| 国产免费av片在线观看野外av| 亚洲人成电影免费在线| 九九在线视频观看精品| 国产精品日韩av在线免费观看| 一级av片app| 成年女人看的毛片在线观看| 亚洲七黄色美女视频| 淫妇啪啪啪对白视频| 亚洲国产精品999在线| 在线观看午夜福利视频| 天天一区二区日本电影三级| 精品久久久久久久久av| 欧美高清性xxxxhd video| 一进一出抽搐gif免费好疼| 51午夜福利影视在线观看| 乱码一卡2卡4卡精品| 免费看a级黄色片| 国产成人影院久久av| 国产熟女xx| 国产精品免费一区二区三区在线| 色综合欧美亚洲国产小说| 国产精品久久久久久久电影| 国产高清有码在线观看视频| 国产亚洲精品av在线| 亚洲激情在线av| 日本撒尿小便嘘嘘汇集6| 国产亚洲精品久久久久久毛片| 国产精品爽爽va在线观看网站| 丰满人妻熟妇乱又伦精品不卡| 成人国产一区最新在线观看| a在线观看视频网站| 国产精品亚洲美女久久久| 日本精品一区二区三区蜜桃| 国产精品久久电影中文字幕| 亚洲国产精品sss在线观看| 俺也久久电影网| 国产精品人妻久久久久久| 国产精品久久久久久精品电影| 熟女人妻精品中文字幕| 欧美区成人在线视频| or卡值多少钱| 国产精品电影一区二区三区| 久久久久久久久久黄片| 在线播放国产精品三级| 国产午夜精品久久久久久一区二区三区 | 国产视频一区二区在线看| 九九在线视频观看精品| 一区二区三区四区激情视频 | 岛国在线免费视频观看| 亚洲午夜理论影院| 亚洲国产欧洲综合997久久,| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 成人av在线播放网站| 亚洲国产精品合色在线| 黄色视频,在线免费观看| 国产成人a区在线观看| 久久国产乱子免费精品| 精品无人区乱码1区二区| 国产精品亚洲一级av第二区| 色播亚洲综合网| 成人精品一区二区免费| 五月玫瑰六月丁香| 尤物成人国产欧美一区二区三区| 午夜福利欧美成人| 成年女人毛片免费观看观看9| 悠悠久久av| 久久午夜福利片| 久久久久免费精品人妻一区二区| 一二三四社区在线视频社区8| 亚洲不卡免费看| 精品人妻1区二区| 精品欧美国产一区二区三| 一个人看的www免费观看视频| 亚洲最大成人av| 国产在线精品亚洲第一网站| 亚洲av.av天堂| 欧美中文日本在线观看视频| 12—13女人毛片做爰片一| 老鸭窝网址在线观看| 天堂av国产一区二区熟女人妻| www.色视频.com| 老司机午夜福利在线观看视频| 国内少妇人妻偷人精品xxx网站| 日日干狠狠操夜夜爽| 国产伦精品一区二区三区四那| 宅男免费午夜| 毛片一级片免费看久久久久 | 老熟妇乱子伦视频在线观看| 深爱激情五月婷婷| 麻豆一二三区av精品| 高清日韩中文字幕在线| 国产av一区在线观看免费| 久久国产乱子伦精品免费另类| 简卡轻食公司| 亚洲成人免费电影在线观看| 国产精品久久久久久人妻精品电影| 午夜视频国产福利| 一二三四社区在线视频社区8| 特大巨黑吊av在线直播| av天堂在线播放| 1024手机看黄色片| 亚洲人成网站在线播放欧美日韩| 日本 欧美在线| 久久久久久久久久成人| 欧美一区二区亚洲| 好看av亚洲va欧美ⅴa在| 99在线人妻在线中文字幕| 亚洲欧美精品综合久久99| 精品人妻1区二区| 欧美日韩福利视频一区二区| 免费av毛片视频| 男人的好看免费观看在线视频| 欧美日韩瑟瑟在线播放| 精品免费久久久久久久清纯| 久久久久久久久久成人| 免费看美女性在线毛片视频| 成人永久免费在线观看视频| 免费看美女性在线毛片视频| 中文字幕久久专区| 精品午夜福利在线看| 内地一区二区视频在线| 国产高清激情床上av| 欧美黄色淫秽网站| 人人妻人人澡欧美一区二区| 国产视频内射| av在线观看视频网站免费| 成人av在线播放网站| 国产午夜福利久久久久久| www.www免费av| 亚洲av二区三区四区| 亚洲av熟女| 久久久久久久久久成人| 一夜夜www| 91九色精品人成在线观看| 国产精品日韩av在线免费观看| 免费在线观看日本一区| 国产欧美日韩精品亚洲av| 一本精品99久久精品77| 我的女老师完整版在线观看| 久久伊人香网站| 18禁黄网站禁片免费观看直播| aaaaa片日本免费| 男人舔奶头视频| 欧美日韩福利视频一区二区| 国产爱豆传媒在线观看| 久久久国产成人免费| 身体一侧抽搐| 国产人妻一区二区三区在| 麻豆久久精品国产亚洲av| 亚洲欧美清纯卡通| 国内精品美女久久久久久| 久久性视频一级片| 1000部很黄的大片| 国产精品美女特级片免费视频播放器| 国产精品综合久久久久久久免费| 日韩有码中文字幕| 一区二区三区高清视频在线| 午夜精品在线福利| 国产爱豆传媒在线观看| 少妇人妻精品综合一区二区 | 亚洲七黄色美女视频| 欧美日韩国产亚洲二区| 69人妻影院| 亚洲最大成人中文| 亚洲av一区综合| 免费人成在线观看视频色| 91麻豆精品激情在线观看国产| 中文字幕免费在线视频6| 国产三级在线视频| 在线看三级毛片| 成人国产一区最新在线观看| 亚洲人与动物交配视频| 国产爱豆传媒在线观看| 三级毛片av免费| 三级国产精品欧美在线观看| 青草久久国产| 女同久久另类99精品国产91| 一区二区三区免费毛片| 波野结衣二区三区在线| 国产精品久久视频播放| 亚洲专区国产一区二区| 免费人成视频x8x8入口观看| 少妇高潮的动态图| 亚洲av第一区精品v没综合| 国产精品不卡视频一区二区 | 一本综合久久免费| 我要看日韩黄色一级片| 人人妻人人看人人澡| 亚洲内射少妇av| 亚洲欧美日韩高清在线视频| 亚洲国产欧洲综合997久久,| 亚洲在线观看片| 宅男免费午夜| av在线老鸭窝| 精品午夜福利在线看| 国产成人a区在线观看| 国产91精品成人一区二区三区| 亚洲国产精品久久男人天堂| 黄色女人牲交| 久久国产精品人妻蜜桃| 丰满人妻一区二区三区视频av| 国产av一区在线观看免费| 草草在线视频免费看| 精品日产1卡2卡| 搡老岳熟女国产| 美女高潮的动态| 国产三级在线视频| 首页视频小说图片口味搜索| 丁香欧美五月| 久久精品国产亚洲av天美| avwww免费| 91麻豆av在线| avwww免费| 亚洲男人的天堂狠狠| 最新中文字幕久久久久| 日韩欧美在线二视频| 国内揄拍国产精品人妻在线| 亚洲第一电影网av| 宅男免费午夜| 午夜精品一区二区三区免费看| 亚州av有码| 久久久久久久亚洲中文字幕 | 在线国产一区二区在线| 俄罗斯特黄特色一大片| 免费无遮挡裸体视频| 日韩高清综合在线| ponron亚洲| 国产成人av教育| 村上凉子中文字幕在线| 成熟少妇高潮喷水视频| 免费电影在线观看免费观看| 成人欧美大片| 超碰av人人做人人爽久久| 久久久久久久久久成人| 久久天躁狠狠躁夜夜2o2o| 夜夜看夜夜爽夜夜摸| 国产人妻一区二区三区在| av天堂在线播放| 亚洲欧美精品综合久久99| 搡女人真爽免费视频火全软件 | 中国美女看黄片| 亚洲中文字幕日韩| 精品熟女少妇八av免费久了| 亚洲精品一区av在线观看| 91麻豆av在线| 97超视频在线观看视频| 精品久久久久久久人妻蜜臀av| 国产一区二区三区在线臀色熟女| 亚洲最大成人中文| 男人的好看免费观看在线视频| 国产高潮美女av| x7x7x7水蜜桃| 久久精品夜夜夜夜夜久久蜜豆| 日韩欧美国产在线观看| 琪琪午夜伦伦电影理论片6080| 国产伦一二天堂av在线观看| 最近最新免费中文字幕在线| 精品一区二区三区人妻视频| 国产视频内射| 国产免费av片在线观看野外av| 日本精品一区二区三区蜜桃| 亚洲第一电影网av| 宅男免费午夜| 午夜免费男女啪啪视频观看 | 亚洲狠狠婷婷综合久久图片| 亚洲av五月六月丁香网| 在现免费观看毛片| av天堂在线播放| 亚洲av电影不卡..在线观看| 国产精品一区二区三区四区久久| 搡老熟女国产l中国老女人| 色播亚洲综合网| 999久久久精品免费观看国产| 无人区码免费观看不卡| 3wmmmm亚洲av在线观看| 夜夜躁狠狠躁天天躁| 综合色av麻豆| 亚洲经典国产精华液单 | 亚洲欧美日韩无卡精品| 在线播放国产精品三级| 久久精品综合一区二区三区| 欧美激情久久久久久爽电影| 亚洲最大成人手机在线| 午夜影院日韩av| 直男gayav资源| 床上黄色一级片| 两性午夜刺激爽爽歪歪视频在线观看| 18禁裸乳无遮挡免费网站照片| 中文字幕av成人在线电影| 如何舔出高潮| 国产成年人精品一区二区| 亚洲午夜理论影院| 久久天躁狠狠躁夜夜2o2o| 国产精品综合久久久久久久免费| 婷婷丁香在线五月| 国产精品一区二区三区四区久久| 国产成+人综合+亚洲专区| 午夜福利在线观看吧| 日本免费一区二区三区高清不卡| 成人亚洲精品av一区二区| 亚洲精品色激情综合| 久久久久免费精品人妻一区二区| 国模一区二区三区四区视频| 嫩草影视91久久| 欧美另类亚洲清纯唯美| 亚洲熟妇中文字幕五十中出| 一个人看视频在线观看www免费| 97热精品久久久久久| 久久精品人妻少妇| 亚洲男人的天堂狠狠| АⅤ资源中文在线天堂| 人妻制服诱惑在线中文字幕| 青草久久国产| 国产真实伦视频高清在线观看 | 不卡一级毛片| 成年女人毛片免费观看观看9| 免费电影在线观看免费观看| 国产熟女xx| 18禁裸乳无遮挡免费网站照片| 欧美又色又爽又黄视频| 亚洲第一电影网av| 噜噜噜噜噜久久久久久91| 国语自产精品视频在线第100页| 成人性生交大片免费视频hd| 午夜福利欧美成人| 可以在线观看毛片的网站| 99国产精品一区二区蜜桃av| 亚洲中文字幕日韩| 精品欧美国产一区二区三| 91字幕亚洲| 老司机午夜十八禁免费视频| 国产男靠女视频免费网站| 日本黄色片子视频| 中文字幕av成人在线电影| 一级作爱视频免费观看| 老熟妇仑乱视频hdxx| 亚洲成人久久爱视频| 欧美+亚洲+日韩+国产| 搡老妇女老女人老熟妇| 国产午夜精品论理片| 少妇裸体淫交视频免费看高清| 熟妇人妻久久中文字幕3abv| 最近中文字幕高清免费大全6 | 老女人水多毛片| 欧美精品国产亚洲| 国产精品野战在线观看| 综合色av麻豆| 成人永久免费在线观看视频| 69人妻影院| 国语自产精品视频在线第100页| 一边摸一边抽搐一进一小说| 在线天堂最新版资源| 日韩亚洲欧美综合| 中文字幕av成人在线电影| 夜夜夜夜夜久久久久| 欧美在线黄色| 丰满人妻熟妇乱又伦精品不卡| 亚洲av美国av| 国产精品野战在线观看| 18禁在线播放成人免费| 欧美激情久久久久久爽电影| 国产精品久久视频播放| 永久网站在线| 国产麻豆成人av免费视频| 国产三级在线视频| 色av中文字幕| 国产黄a三级三级三级人| 国产黄片美女视频| 精品无人区乱码1区二区| 国产私拍福利视频在线观看| 国产成人啪精品午夜网站| 国产一区二区亚洲精品在线观看| av天堂中文字幕网| 两人在一起打扑克的视频| 亚洲av美国av| 黄色一级大片看看| 在线免费观看不下载黄p国产 | 亚洲五月婷婷丁香| 美女免费视频网站| av专区在线播放| 国模一区二区三区四区视频| 亚洲自拍偷在线| 怎么达到女性高潮| 天天躁日日操中文字幕| 午夜福利在线在线| 淫妇啪啪啪对白视频| 91久久精品国产一区二区成人| 久久欧美精品欧美久久欧美| 国产 一区 欧美 日韩| 91在线精品国自产拍蜜月| 亚洲专区中文字幕在线| 国产精品永久免费网站| 免费看美女性在线毛片视频| 每晚都被弄得嗷嗷叫到高潮| 丰满人妻熟妇乱又伦精品不卡| 国产精品女同一区二区软件 | 女生性感内裤真人,穿戴方法视频| 亚洲精品一卡2卡三卡4卡5卡| 麻豆av噜噜一区二区三区| 国产av不卡久久| 久久国产精品影院| 国产精品伦人一区二区| 久久久久久久午夜电影| 一区二区三区激情视频| 中文字幕免费在线视频6| 最近视频中文字幕2019在线8| 久久精品91蜜桃| 亚洲人成网站在线播| 国产精品精品国产色婷婷| 悠悠久久av| 国产在视频线在精品| 狠狠狠狠99中文字幕| 波多野结衣高清无吗| 亚洲av成人精品一区久久| 夜夜爽天天搞| 日本与韩国留学比较| 成人一区二区视频在线观看| 性色avwww在线观看| 午夜福利欧美成人|