• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Evil-hunter: a novel web shell detection system based on scoring scheme

    2014-09-06 10:49:45TruongDinhTuChengGuangGuoXiaojunPanWubin
    關(guān)鍵詞:系統(tǒng)漏洞東南大學(xué)源代碼

    Truong Dinh Tu Cheng Guang Guo Xiaojun Pan Wubin

    (1School of Computer Science and Engineering, Southeast University, Nanjing 210096, China)(2Department of Information Technology, Tuyhoa Industrial College, Phuyen 620900, Vietnam)(3 Key Laboratory of Computer Network and Information Integration of Ministry of Education, Southeast University, Nanjing 210096, China)

    ?

    Evil-hunter: a novel web shell detection system based on scoring scheme

    Truong Dinh Tu1,2,3Cheng Guang1,3Guo Xiaojun1,3Pan Wubin1,3

    (1School of Computer Science and Engineering, Southeast University, Nanjing 210096, China)(2Department of Information Technology, Tuyhoa Industrial College, Phuyen 620900, Vietnam)(3Key Laboratory of Computer Network and Information Integration of Ministry of Education, Southeast University, Nanjing 210096, China)

    In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-hunter. First, a large set of malicious function samples normally used in web shells are collected from various sources on the Internet and security forums. Secondly, according to the danger level and the frequency of using these malicious functions in the web shells as well as in legal web applications, an assigning score strategy for each malicious sample is devised. Then, the appropriate score threshold value for each sample is obtained from the results of a statistical analysis. Finally, based on the threshold value, a simple algorithm is presented to identify files that contain web shells in web applications. The experimental results show that compared with other approaches, Evil-hunter can identify web shells more efficiently and accurately.

    web shell detection; scoring scheme; malicious code identification

    A malicious file that hackers plant on web servers through system vulnerabilities or web pages’ open source to create a backdoor for them to return next time is called a web shell. In other words, a web shell is a code written in languages such as PHP, active server page (ASP), Perl, Java server page (JSP) or Python, etc., which runs on the system and can remotely control a machine. Once the web shell is run, it provides a web Interface for remote operations on the server with attacker functionality, such as file transfers, command execution, network reconnaissance, database connectivity, SQL manager, etc.

    The techniques used to build web applications are often developed in languages such as PHP, ASP, Java, Python, Ruby, Perl, etc. It not only supports full functions to access files, consoles, networks, and database, but also runs and manages the process in the system. This is quite convenient for building management applications in the web environment. However, this is also where the hackers will aim to create a backdoor. One of the usual ways to attack web servers is that the hackers use web shells to browse files, upload tools, and run commands; after that, they increase privileges and pivots to other targets. Thus, the role of web server managers is to ensure the privacy and security for customers’ web pages. A web page may contain thousands of code lines or more in each file; therefore, it is very difficult and sometimes impossible to review the source code manually to detect malicious files such as web shells. So, finding and detecting web shells inside web page applications are necessary for securing websites.

    There are some known tools to find web shells, such as NeoPI[1], PHP shell detector (SD)[2], and Grep[3]. However, these tools have some disadvantages: 1) NeoPI can find and detect obfuscated and encrypted contents within text and script files. However, its disadvantage is that it cannot provide a threshold value for these indices to determine which files are web shells. Therefore, we have to analyze and decide from the experience of experts; 2) SD has a known web shell signature database saved in web servers. Its disadvantage is that if a new web shell has not been updated on a database, this tool will fail to detect it; 3) Grep is an UNIX command for searching files for lines matching a given regular expression. However, the disadvantage of this method is that it does not have a list of given dangerous functions. Thus, users must have experience and know which dangerous functions should be found to detect web shells. Therefore, this method has many false positives since some of these functions are also used by legal web applications. As a result, the Evil-hunter system is proposed in this paper to detect web shells and overcome the above-described existing disadvantages.

    1 Background and Related Works

    1.1 Overview of web shell

    A web shell is a script/code written in various web scripting languages, such as PHP, ASP, Perl, JSP or Python, etc., which runs on the system and can remotely control a machine. In other words, a file containing malicious functionality that hackers have planted on web servers through system vulnerabilities or web pages’ open source to create a backdoor for them to return next time is called web shell.

    There is no clear difference between web shells and normal administration websites since they both belong to remote control software. If it is used to sabotage the website, it is a web shell; but if it is used to manage all the web pages, it is normal management software. Only the administrator can judge whether a remote management webpage is behaving maliciously or not[4-5].

    Classic web shell attacks: The attacker finds vulnerabilities in a hosted web application and uploads a malicious dynamic web page to a vulnerable web server; then he uses the web shell to browse files, upload tools, and run commands[6-8]. After that, he acquires privileges and pivots to other targets as allowed (see Fig.1).

    Fig.1 The classic model of web shell attacks

    Web shells can be classified into two main categories.

    ? Non-encrypted web shell: The source code of this web shell is stored in apparently normal text. From the source code files, we can see the functions used in it.

    ? Encrypted web shell: The source code of this kind of web shells usually contains characters that are obfuscated and not meaningful, but it still executes its features properly. The encryption functions such as base64_encode(), base64_decode(), etc.[9]are popular and most attackers often use these in their web shells.

    1.2 Related works

    Web servers attacks are one of the most frustrating problems for administrators. Some researchers have become concerned about this threat and their strategies have been useful for detecting malicious files on webpage applications. Behrens and Hagen[1]built a project called NeoPI, using a variety of statistical methods to detect obfuscated and encrypted contents within text and script files. However, the NeoPI offered only file statistics with the index of coincidence, entropy, longest word values, respectively, in order to help administrators find suspicious files. It cannot decide whether the file, which has obfuscated or encrypted contents, is a web shell or not. Thus, the administrators need manual analyses to decide. Luczko et al.[2]also built a PHP script called the PHP shell detector (SD) to help with finding and identifying web shells. Basically, the SD has a known web shell database saved at web servers, and previously calculated the MD5 value in each file. This method has the disadvantage that if a new web shell has not been updated in the database, this approach will fail to detect it. Mingkun et al.[10]conducted a study on the principles and characteristics of ASP web shells to find a method to identify ASP shells. Hu et al.[11]presented a study on the characteristics and mechanisms of web shells, and proposed a detection model based on the decision tree algorithm to detect them. Rahul[12]proposed some analyses to prove that the Anti-Virus software packages have a very poor web shell detection rate. Hou et al.[13]used the machine-learning approach to detect malicious web pages. In general, they analyzed malicious dynamic web pages to find important features which are input for training the classifier or obtaining the predicted class of pages.

    2 Proposed Approach: Evil-Hunter

    In this section, we describe a brief overview of Evil-hunter overall and describe the components of Evil-hunter in detail.

    2.1 Overview of Evil-hunter

    As mentioned previously, the web shell is viewed as a malignant tumor for web applications on the Internet, finding and detecting web shells are very important for website security. The goal of the proposed approach is to identify suspicious files containing web shells inside web applications. To achieve this goal, we propose a system, called Evil-hunter. The framework of Evil-hunter consists of three main components as shown Fig.2. They are:

    1) The collection of malicious signature/function samples. In this section, we collect a large set of malicious signature/function samples that are often used in known web shells and assign them their danger levels.

    2) Scoring scheme. In this section, we describe an appropriate scoring scheme for malicious signature/function samples collected in the above section. The score range to be used is a range of numbers depending on their danger levels. On the other hand, in this section we also propose one calculation method to determine the threshold value to distinguish web shell files from benign files.

    3) An algorithm for detecting web shells. In this section, we propose an algorithm based on the above-mentioned scoring scheme to identify web shells. In this technique, there are two main modules: scanning and matching signature/function samples and scanning to find obfuscated or encrypted contents. Moreover, in order to improve the detection effectiveness of the Evil-hunter system, we also propose another supporting module, namely scanning and matching keywords in the blacklist.

    Fig.2 Framework of Evil-hunter

    Evil-hunter starts from a set of known malicious signatures/functions that are involved in malicious activities of the web shell. Each signature/function has different danger levels, in which some signatures/functions are also used in legal web pages. Thus, in order to assign these danger levels, we propose a scoring method for each signature/function, as well as proposing a method to calculate the threshold value to detect web shells. In the next step, we propose one technique to detect web shell files based on the scoring scheme proposed above.

    2.2 Components of Evil-hunter

    In the following sections, we provide details for the components of the proposed system.

    2.2.1 Collecting malicious signatures/function samples

    The malicious signatures/function samples are those that attackers often use for their web shells, and are rarely used in benign web source code[9]. These malicious functions can be classified into the encoded/decoded support functions, command execution functions, file system functions, compressed functions, etc.[6-7,9]. Therefore, collecting the malicious functions is necessary to aid detecting web shells.

    We collect a large set of malicious signatures/functions based on common tasks that are often used in the web shell, such as file management functions, database server access functions, file system functions, etc.[7,9,14-16]. The list of these malicious signatures/function samples are stored in a XML database file, which can be easily updated for further development.

    2.2.2 Scoring scheme

    In this section, we discuss how to assign a score for malicious signatures/function samples and how to determine a suitable threshold value for each sample to identify suspicious web shell files.

    1) Assigning scores for malicious signatures/functions

    The web application source code often uses many functions, in which each function has different danger levels. For example, system_exec() or system() are dangerous functions that are rarely used in benign web source code[9]. In order to indicate the danger level for each function, we use the scoring scheme. The scoring scheme is proposed based on a numerical scale, such as 1-10, where a score corresponds to low, medium, and high danger level, (low <5, medium=5-9, and high ≥10). Thus, a high score of 10 or more may indicate almost no false positives; a medium score of 6-9 may imply a possibility of some false positives and higher sensitivity while a low score of 5 or less can imply audit level sensitivity.

    For example, if the functions have a high danger level, they almost do not appear in benign web application source codes; then the score for these functions may be assigned to 10 points or more. However, if the functions have a medium danger level and they are sometimes used in normal websites, then the scores for these functions may be assigned with 6-9; and the functions that have a low danger level may be assigned with 1-5.

    The list of all the malicious signatures/functions and corresponding scores are stored in a XML database file (XMLDB). Thus, they can be easily altered, removed from or added to systems for further development.

    2) Determining threshold value

    A threshold value is the minimum value that the system can use to classify whether a file is a web shell or not. To determine a threshold value for malicious signatures and function samples, we collect a set of signatures and functions based on common tasks that are often used in the web shell, such as file management functions, database server access functions, file system functions, etc.[7,9,15-16]. After obtaining a set of necessary signatures and functions, we complete the task of scanning for a large amount of benign source code, and calculate the total score of the frequency of using these functions. Therefore, we can give a suitable threshold value for each sample.

    For example, in order to choose a suitable threshold value for malicious function samples, we scan each file of the legal web pages, count the appearance frequency of the dangerous functions (which are stored in XMLDB) in benign files, and calculate the total score of those files (e.g., {ts1, ts2, …, tsn}={6, 8, …, 18}. In which tsiis the total score of thei-th benign file, andnis the number of subfiles (e.g. js, css, PHP) that a webpage may include. Moreover, we also scan and count the appearance frequency of those malicious functions in the sample files containing web shells, and calculate the total score for each sample file (e.g, {wts1, wts2, …,wtsm}={30, 77, …, 80} in which wtsiis the total score of thei-th sample file contained web shells, andmis the number of web shell files). From there, we choose a suitable threshold value for malicious function samples, such as Threshold_MF=20. Similarly, we can also determine a suitable threshold value for dangerous signature sample (Threshold_S).

    To determine a threshold value for the longest word (Threshold_LW), we conduct a scan to look for the longest word from a set of samples encrypted web shells given and a set of legal web sources. From the list of values obtained, we decide an appropriate threshold value for the longest word.

    For example, in order to choose a suitable threshold value for the longest word, we scan each file of the legal web pages, meanwhile, calculate the value of the longest word for each file (e.g., {lw1, lw2, …, lwn}={63, 52, …, 82}, in which lwiis the value of the longest word of thei-th legal file). Similarly, we also scan and calculate the value of the longest word in a set of samples of encrypted web shell (e.g., {ws1, ws2, …, wsm}={118, 5 847, …, 208 496}, in which wsithe value of the longest word of thei-th web shell file, andmis the number of web shell files). Then, we choose a suitable threshold value for the longest word, such as Threshold_LW=100.

    Based on the above-mentioned approach, in the following section, we present an algorithm to identify web shells.

    2.2.3 Algorithms for web shell detection

    To work with the above-mentioned scoring scheme, we build an algorithm as shown in Algorithm 1 for identifying web shells. There are three steps in the algorithm: 1) Scanning and matching signature/function samples with database XMLDB; 2) Scanning to find obfuscated or encrypted contents; 3) Scanning and matching keywords in blacklist.

    Algorithm 1 Identifying web shell

    For each file in web application do

    STS=0; MFTS=0;

    Scanning and matching signatures/function samples

    if sample.Type=1 then

    nCount=Count the number of occurrences of this sample in the file.

    STS+=nCount*sample.Score

    else if sample.Type=2 then

    nCount=Count the number of occurrences of this sample in the file.

    MFTS+=nCount*sample.Score

    LW=Count the number of characters in the longest word in the file.

    if (STS>=Threshold_S) or (MFTS>=Threshold_MF)

    Or (LW>=Threshold_LW) then add the file to suspicious list.

    Scanning and matching keywords from the blacklist

    if the keyword is in the blacklist then add the file to the suspicious list

    The detail of these steps is explained as follows:

    1) Scanning and matching signatures/function samples

    In this module, we scan each file in the web application to filter malicious functions in these files and determine their dangerous levels according to malicious signatures/function samples in the XMLDB database. As shown in Algorithm 1, sample.Type=1 implies that it is a dangerous signature sample; sample.Type=2 implies that it is a malicious function sample. In the next step, we count the appearance frequency of those signatures/functions and calculate the signature total score (STS) and the malicious function total score (MFTS) of the files. If the STS exceeds a threshold value of signature (Threshold_S), that file is marked as suspicious. If MFTS exceeds a threshold value of malicious functions (Threshold_MF), that file is also marked as suspicious.

    2) Scanning to find obfuscated or encrypted contents

    Obfuscated or encrypted contents are often stored as an uninterrupted long string within a file. These strings can be decoded into malicious codes to execute them. Finding the longest uninterrupted string existing in the files is very useful to identify obfuscated or encrypted contents.

    Typically, the source code is written in a relatively short length of words. So, identifying files with unusual long strings can help us to recognize files with obfuscated or encrypted codes.

    Behrens and Hagen[1]used this method in their NeoPI project to find obfuscated and encrypted contents within text or script files. However, if it is scanned on a set of source codes that contain many images, videos, rich-text-format, js, css, the false alert rate will be very high. Thus, we try to test NeoPI on a set of benign source codes, and the result shows a relatively high false alert rate, which implies that NeoPI does not work well when identifying web shells accurately.

    This stage checks only the longest string that starts and ends with header tags, such as “ for PHP language, “<\%@ Page Language>” for ASPX language, similarly for other languages because the source code is only executed when it is enclosed in header tags.

    Algorithm2 FindingthelongestwordIf(data.Count(“longest: longest=length longest_word=word

    Algorithm 2 will search and identify the longest word (LW) in the file that starts and ends with header tags. As discussed previously, if the LW exceeds a threshold value of the longest word (Threshold_LW), that file is also marked as suspicious.

    3) Scanning for and matching dangerous/blacklist keywords

    The web shell files are often written and developed by many hackers, in which there are comment lines with suspicious keywords on the source codes. Therefore, searching for these suspicious keywords, such as a web shell by *, Hack by *, developed by *, r57, c99, n3shell, TrYaG Team, http://cctea-m.ru/update/c999shell, http://ccteam.ru/files/c999sh_sourc-es, etc.,[17]is useful for finding web shells. The above keywords are rarely used in a benign website the source, so their appearance inside the source code has the possibility of being highly malicious and may be marked as a suspicious file.

    3 Experiment and Evaluation

    3.1 Data set

    For our test, we collected a total of 13 151 files from the test dataset which included 12 982 files of benign web pages (with high confidence) that did not contain malicious codes and 169 malicious web shell files.

    For legal web pages, we downloaded directly from open sources websites which are prestigious and of high rank based on Alexa[18]; for malicious web shell files, we downloaded and collected them from several security forums that were published and discussed on the Internet[17, 19]. We named this testing file T1.

    On the other hand, we also collected 32 895 files of open sources web pages, such as Oscommerce, VBB, Joomla, WordPress, PhpNuke, Phpbb, etc., which were shared on the Internet (these web pages may or may not contain malicious files). We named this testing file T2.

    3.2 Experimental results

    The experiments are run on a machine with an Intel?Pentium?CPU G640 2.80 GHz processor with 4 GB memory. We use python language to build a software for Evil-hunter.

    We run Evil-hunter to scan for T1 with different threshold values. The threshold value is configurable to adjust the detection rate. The results in Fig.3 show that when we set thresholds (LW, S, MF ) higher, i.e., (354, 10, 30) which is marked as S1, Evil-hunter had a true positive (TP) rate of 62.72% with a false positive (FP) rate of 0.57%. It means that, Evil-hunter indentified 106 of the total 169 malicious web shell files correctly, and 74 of total 12 982 files of legal web pages were mistaken for web shell files. On the other hand, when we set low thresholds (354, 10, 2) marked as S2, Evil-hunter obtained a true positive rate of 82.25% with a false positive rate of 5.03%. It means that the Evil-hunter identified 139 of total 169 malicious web shell files correctly, and 653 of total 12 982 files of legal web pages were mistaken for web shell files.

    Fig.3 True positive rates and false positive rates at different threshold values (LW, S, MF)

    Compare test results of Evil-hunter with some other de-tection tools and Anti-Virus (AV) software packages, such as Norton Anti-Virus (NA), Bit Defender (BD), Microsoft Safety Scanner (MSS), AVG Anti-Virus (AVG), Kaspersky Anti-Virus (KS), 360 Shadu (360 SD), Avast Antivirus (AVAST), and PHP shell detector (PHP SD)[2]. As shown in Fig.4, the comparison results show that Evil-hunter has a relatively high detection rate and identifies web shells better than other Anti-Virus software such as Kaspersky Anti-Virus(76%), 360 Shadu (0%), AVG Anti-Virus (37%), Norton Anti-Virus (20%), and Microsoft Safety Scanner (14%).

    Fig.4 True positive rates and false positive rates for different detection tools on T1

    We also scanned to check the detection ability of unknown web shells on T2 from the above software packages. Results in Tab.1 show that the software packages of NA, BD, MSS, AVG, KS, 360SD, AVAST did not detect any suspected web shell files in T2. Meanwhile, the PHP SD tool at the time of writing this paper, had 499 well-known shells in its database[2]and gave warning of 763 suspicious files, in which 4 files were precisely web shells because they matched MD5 with the database of PHP SD on servers. On the other hand, Evil-hunter gave warning of 187 suspicious files. Through another manual analysis and submitting suspicious files to the virus total[20]for checking and analyzing, we determined exactly 11 web shell files that were possibly inserted into the web application’s source code by hackers or web developers for malicious purposes before sharing them on the Internet. However, there are also 176 files that were false alerts, because programmers used a few dangerous function samples for the purpose of installing or encrypting sensitive information such as passwords or personal information[21].

    Tab.1 Comparison of other tools and software packages on T2 dataset

    ApproachNumberofsuspiciousfilesTruewebshellfilesFalsewebshellfilesBDAVASTKSAVGNAMSS360SDPHPSDEvil-hunter120000076318712000004110000000759176

    3.3 Discussion and evaluation

    For AV software packages, as shown in Fig.4 and Tab.1, on the T1 and T2 datasets, we find that the AV software packages have a relatively poor web shell detection rate. Rahul[12]also provided some analyses to prove that the efficiency of current AV software in detecting web shells is inadequate. Therefore, web server administrators should combine other detection tools with it to effectively detect web shells.

    Comparing the advantages and disadvantages of some other web shell detection tools, we have:

    1) Grep[3]is a Unix command for searching files for lines matching a given regular expression. The advantage of this method is that it can easily find files containing the keywords. However, the disadvantage of this method is that it does not provide a list of dangerous functions. To detect web shells, users must know which dangerous functions should be found beforehand. Therefore, this method has many false positives since some of these functions are also used by benign web applications. Evil-hunter can find the dangerous functions automatically based on the XMLDB database that was collected previously.

    2) NeoPI[1]has the advantage that it can find and detect obfuscated and encrypted contents within text and script files by calculating and listing some indices such as coincidence, entropy, longest word, signature; after that it will give a rank for all the files and the top ten files with the highest ranking. However, its disadvantage is that it cannot provide a threshold value for these indices to determine which files is a web shell. Therefore, we have to analyze and judge from experts. Evil-hunter calculates the score and determines the appropriate threshold value to detect web shells.

    3) PHP shell detector (SD). Basically, SD has a known web shell signature database saved in web servers. The advantage of this method is that its true positive rate can be up to 99% for known web shells in the database[2]. However, it has the disadvantage that if a new web shell have not been updated in the database, this approach will fail to detect it. Evil-hunter can detect unknown web shells based on the threshold value and a large set of malicious signatures/functions collected previously. As shown in Tab.1, the detection ability of Evil-hunter on T2 is better than that of PHP SD.

    4 Conclusion

    In this paper, we propose a novel web shell detection system based on the scoring scheme. From a large set of malicious signatures/functions involved in malicious activities of the web shell, we propose a scoring method to indicate their danger levels, as well as a technique to determine the threshold value for detecting web shells. We implemented this approach in a tool, called Evil-hunter, and validated it on large datasets that we collected previously. The results show that Evil-hunter can identify web shells more efficiently compared to some other approaches. Generally, Evil-hunter can minimize time and cost for administrators by reviewing a source code automatically and give warnings for any file suspected of being malicious.

    [1]Behrens S, Hagen B. Web shell detection using NeoPI [EB/OL]. (2012-04-13)[2013-10-10]. http://resources.infosecinstitute.com/web-shell-detection/.

    [2]Luczko P, Thornton J. PHP shell detector [EB/OL]. (2012-06-12)[2013-10-10]. https://github.com/emposha/PHP-Shell-Detector.

    [3]Unix operating system. A manual for grep [EB/OL]. (2008-05-20)[2013-09-10].http://www.gnu.org/savannah-checkouts/gnu/grep/manual/grep.html.

    [4]Jakobsson M, Ramzan Z.Crimeware:understandingnewattacksanddefenses[M]. New York: Addison Wesley, 2008: 608.

    [5]Canali D, Balzarotti D, Francillon A. The role of web hosting providers in detecting compromised websites [C]//Proceedingsofthe22ndInternationalConferenceonWorldWideWeb. Rio de Janeiro, Brazil, 2013: 177-187.

    [6]Garg A, Singh S. A review on web application security vulnerabilities [J].InternationalJournalofAdvancedResearchinComputerScienceandSoftwareEngineering, 2013, 3(1): 222-226.

    [7]Mirdula S, Manivannan D. Security vulnerabilities in web application an attack perspective [J].InternationalJournalofEngineeringandTechnology, 2013, 5(2): 1806-1811.

    [8]Cova M, Kruegel C, Vigna G. Detection and analysis of drive-by-download attacks and malicious javascript code [C]//Proceedingsofthe19thInternationalConferenceonWorldWideWeb. Raleigh, NC, USA, 2010: 281-290.

    [9]Exploitable PHP functions [EB/OL]. (2012-03-22)[2013-09-10].http://stackoverflow.com/questions/3115559/exploitable-php-functions.

    [10]Mingkun X, Xi C, Yan H. Design of software to search ASP web shell [J].JournalofProcediaEngineering, 2012, 29(1): 123-127.

    [11]Hu J K, Xu Z, Ma D H, et al. Research of webshell detection based on decision tree [J].JournalofNetworkNewMedia, 2012, 1(6): 15-19.(in Chinese)

    [12]Rahul S. Effectiveness of antivirus in detecting web application backdoors [EB/OL]. (2012-07-30)[2013-10-10]. http://www.chmag.in/article/feb2011/effectivenessantivirus-detecting-web-appli-cation-backdoors.

    [13]Hou Y T, Chang Y, Chen T, et al. Malicious web content detection by machine learning [J].ExpertSystemswithApplications, 2010, 37(1): 55-60.

    [14]Koo T M, Chang H C, Hsu Y T, et al. Malicious website detection based on honeypot systems [C]//The2ndInternationalConferenceonAdvancesinComputerScienceandEngineering. Paris:Atlantis Press, 2013:76-81.

    [15]Canali D, Balzarotti D. Behind the scenes of online attacks: an analysis of exploitation behaviors on the web [C]//Proceedingsofthe20thAnnualNetwork&DistributedSystemSecuritySymposium. San Diego, CA, USA, 2013:1-18.

    [16]Verma A, Insan D S. Signature based detection of web application attacks [J].InternationalJournalofAdvancedResearchinComputerScienceandSoftwareEngineering, 2013, 3(8): 117-121.

    [17]Certified ethical hacker [EB/OL]. (2012-02-200[2013-09-10]. http://ceh.vn/@4rum/forumdisplay.php?fid=10.

    [18]Alexa—The web information company[EB/OL]. (2012-03-30)[2013-09-10].http://www.alexa.com.

    [19]Project hosting on google code provides a free collaborative development environment for open source projects [EB/OL]. (2012-05-16)[2013-09-10].http://code.google.com/.

    [20]VirusTotal—Free online virus, malware and url scanner [EB/OL].(2007-02-01)[2013-09-10].https://www.virustotal.com.

    [21]Agbefu R E, Hori Y, Sakurai K. Domain information based blacklisting method for the detection of malicious webpages [J].InternationalJournalofCyber-SecurityandDigitalForensics, 2013, 2(2): 36-47.

    Evil-hunter:基于評(píng)分機(jī)制的web shell檢測(cè)系統(tǒng)

    張庭秀1,2,3程 光1,3郭曉軍1,3潘吳斌1,3

    (1東南大學(xué)計(jì)算機(jī)科學(xué)與工程學(xué)院,南京210096)(2綏和工業(yè)學(xué)院信息技術(shù)部門, 富安 620900, 越南)(3東南大學(xué)計(jì)算機(jī)網(wǎng)絡(luò)和信息集成教育部重點(diǎn)實(shí)驗(yàn)室,南京210096)

    針對(duì)及時(shí)檢測(cè)攻擊者利用系統(tǒng)漏洞或篡改網(wǎng)頁(yè)開(kāi)源代碼秘密地在web服務(wù)器上嵌入的惡意代碼web shell問(wèn)題,提出了一種基于評(píng)分機(jī)制的web shell檢測(cè)系統(tǒng)Evil-hunter.首先,從互聯(lián)網(wǎng)和各種安全論壇上收集了大量的web shell經(jīng)常使用的惡意函數(shù)樣本數(shù)據(jù).其次,根據(jù)惡意函數(shù)在web shell 和正常web應(yīng)用中的不同危險(xiǎn)級(jí)別和使用頻度,利用所提出的評(píng)分策略對(duì)所收集的樣本數(shù)據(jù)進(jìn)行評(píng)分,并分析統(tǒng)計(jì)結(jié)果以得出適當(dāng)?shù)姆謹(jǐn)?shù)閾值.最后,根據(jù)所得出的分?jǐn)?shù)閾值,借用簡(jiǎn)單的檢測(cè)算法來(lái)對(duì)web 應(yīng)用中所包含的惡意代碼web shell進(jìn)行識(shí)別.實(shí)驗(yàn)結(jié)果表明,與其他方法相比Evil-hunter具有更高的識(shí)別率和準(zhǔn)確度.

    web shell 檢測(cè);評(píng)分策略;惡意代碼檢測(cè)

    TP393.08

    s:The Science and Technology Support Program of Jiangsu Province (No.BE2011173), the Future Network Proactive Program of Jiangsu Province (No.BY2013095-5-03), the Program for Special Talent in Six Fields of Jiangsu Province (No.2011-DZ024).

    :Truong Dinh Tu, Cheng Guang, Guo Xiaojun, et al. Evil-hunter: a novel web shell detection system based on scoring scheme[J].Journal of Southeast University (English Edition),2014,30(3):278-284.

    10.3969/j.issn.1003-7985.2014.03.004

    10.3969/j.issn.1003-7985.2014.03.004

    Received 2014-01-17.

    Biographies:Truong Dinh Tu (1979—), male, graduate; Cheng Guang (corresponding author), male, doctor, professor, gcheng@njnet.edu.cn.

    猜你喜歡
    系統(tǒng)漏洞東南大學(xué)源代碼
    人工智能下復(fù)雜軟件源代碼缺陷精準(zhǔn)校正
    《東南大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    《東南大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    《東南大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    《東南大學(xué)學(xué)報(bào)(醫(yī)學(xué)版)》稿約
    基于模擬攻擊的Windows系統(tǒng)漏洞提權(quán)攻擊檢測(cè)方法
    基于TXL的源代碼插樁技術(shù)研究
    軟件源代碼非公知性司法鑒定方法探析
    一種基于Android系統(tǒng)漏洞的通用攻擊模型
    黨政機(jī)關(guān)信息系統(tǒng)等級(jí)保護(hù)研究
    一本—道久久a久久精品蜜桃钙片| 极品少妇高潮喷水抽搐| 欧美黑人精品巨大| 看十八女毛片水多多多| 亚洲天堂av无毛| 大片电影免费在线观看免费| 亚洲欧美清纯卡通| 亚洲伊人色综图| 亚洲第一青青草原| 美女大奶头黄色视频| 国产成人一区二区三区免费视频网站 | 久久ye,这里只有精品| 天天躁日日躁夜夜躁夜夜| 一区二区三区激情视频| av欧美777| 国产高清不卡午夜福利| 国产国语露脸激情在线看| 久久久久精品国产欧美久久久 | 精品卡一卡二卡四卡免费| 国产亚洲一区二区精品| 午夜免费男女啪啪视频观看| a级毛片在线看网站| 少妇人妻久久综合中文| 精品少妇内射三级| 天天躁夜夜躁狠狠躁躁| 成人免费观看视频高清| 成人黄色视频免费在线看| 一级片'在线观看视频| 亚洲国产欧美网| 国产无遮挡羞羞视频在线观看| 男女无遮挡免费网站观看| 久久久国产精品麻豆| 丝袜人妻中文字幕| 成人影院久久| 亚洲精品第二区| 天天影视国产精品| 精品免费久久久久久久清纯 | 午夜影院在线不卡| 欧美日韩亚洲综合一区二区三区_| 69精品国产乱码久久久| 黄片播放在线免费| 日韩一区二区三区影片| 青春草视频在线免费观看| 波野结衣二区三区在线| 极品人妻少妇av视频| 黄色a级毛片大全视频| 欧美日韩精品网址| h视频一区二区三区| 免费高清在线观看日韩| 免费不卡黄色视频| 久久精品国产综合久久久| 晚上一个人看的免费电影| 国产不卡av网站在线观看| 国产福利在线免费观看视频| 日本猛色少妇xxxxx猛交久久| 美国免费a级毛片| 女人被躁到高潮嗷嗷叫费观| 成年人免费黄色播放视频| 亚洲五月婷婷丁香| 性少妇av在线| 午夜av观看不卡| 亚洲精品成人av观看孕妇| 久久国产亚洲av麻豆专区| 又大又黄又爽视频免费| 日韩大码丰满熟妇| 亚洲av日韩精品久久久久久密 | 亚洲国产精品一区三区| av国产久精品久网站免费入址| 成人黄色视频免费在线看| 国产又色又爽无遮挡免| 高清欧美精品videossex| 色综合欧美亚洲国产小说| 亚洲一码二码三码区别大吗| 少妇被粗大的猛进出69影院| 另类精品久久| 啦啦啦中文免费视频观看日本| 又大又黄又爽视频免费| 在线观看一区二区三区激情| 国产xxxxx性猛交| 欧美精品高潮呻吟av久久| tube8黄色片| 在线观看一区二区三区激情| 国产伦理片在线播放av一区| 亚洲中文av在线| 成人亚洲精品一区在线观看| 国产精品成人在线| 9色porny在线观看| 午夜两性在线视频| 赤兔流量卡办理| 国产福利在线免费观看视频| 国产成人啪精品午夜网站| 高清欧美精品videossex| av线在线观看网站| 你懂的网址亚洲精品在线观看| 亚洲国产av新网站| 最近手机中文字幕大全| 午夜免费成人在线视频| 99精国产麻豆久久婷婷| 国产一区亚洲一区在线观看| 中文乱码字字幕精品一区二区三区| 精品亚洲成a人片在线观看| 色94色欧美一区二区| 婷婷色综合大香蕉| 亚洲,一卡二卡三卡| 妹子高潮喷水视频| 亚洲中文av在线| 69精品国产乱码久久久| 亚洲av片天天在线观看| 欧美av亚洲av综合av国产av| 男的添女的下面高潮视频| 成人三级做爰电影| 国产黄色视频一区二区在线观看| 91麻豆精品激情在线观看国产 | 亚洲精品日韩在线中文字幕| 欧美大码av| 97精品久久久久久久久久精品| 午夜免费观看性视频| 亚洲av日韩在线播放| 成年女人毛片免费观看观看9 | 高清视频免费观看一区二区| 99热国产这里只有精品6| 一级毛片女人18水好多 | 免费不卡黄色视频| 在线 av 中文字幕| 日韩欧美一区视频在线观看| 国产精品偷伦视频观看了| 国产精品一区二区在线不卡| 丝袜在线中文字幕| 国产男女超爽视频在线观看| 国产男人的电影天堂91| 一级黄片播放器| 另类亚洲欧美激情| 1024视频免费在线观看| 我的亚洲天堂| www.自偷自拍.com| 大话2 男鬼变身卡| 制服人妻中文乱码| 成年av动漫网址| 色94色欧美一区二区| 精品久久久久久电影网| 美女国产高潮福利片在线看| 巨乳人妻的诱惑在线观看| 欧美xxⅹ黑人| 成人影院久久| 国产欧美日韩一区二区三区在线| av有码第一页| 日韩制服骚丝袜av| 国产老妇伦熟女老妇高清| 国产又爽黄色视频| 18在线观看网站| 中文字幕最新亚洲高清| 999久久久国产精品视频| 五月开心婷婷网| 日本wwww免费看| 一级毛片我不卡| 日本91视频免费播放| 肉色欧美久久久久久久蜜桃| 丰满人妻熟妇乱又伦精品不卡| 国产精品99久久99久久久不卡| 久久亚洲精品不卡| 男人操女人黄网站| 日韩免费高清中文字幕av| 新久久久久国产一级毛片| 狠狠婷婷综合久久久久久88av| 国产精品亚洲av一区麻豆| 亚洲精品国产av成人精品| 午夜影院在线不卡| 亚洲五月婷婷丁香| 99九九在线精品视频| 丝袜喷水一区| 亚洲一码二码三码区别大吗| 亚洲欧洲精品一区二区精品久久久| 国产亚洲av高清不卡| 91精品三级在线观看| 人成视频在线观看免费观看| 天天操日日干夜夜撸| 日本欧美国产在线视频| 国产成人av激情在线播放| av国产久精品久网站免费入址| 99热全是精品| 看免费成人av毛片| 日韩制服骚丝袜av| 国产精品免费视频内射| 国产三级黄色录像| 2018国产大陆天天弄谢| 亚洲国产欧美日韩在线播放| 久久人妻熟女aⅴ| 中文精品一卡2卡3卡4更新| 9热在线视频观看99| 亚洲第一青青草原| 成人国语在线视频| 天堂俺去俺来也www色官网| 九草在线视频观看| 欧美中文综合在线视频| 午夜视频精品福利| 最近最新中文字幕大全免费视频 | 国产精品久久久av美女十八| 国产一区二区三区av在线| 真人做人爱边吃奶动态| 国产淫语在线视频| 女警被强在线播放| 9热在线视频观看99| 欧美黑人欧美精品刺激| 亚洲国产欧美在线一区| 国产高清视频在线播放一区 | 在线观看一区二区三区激情| 电影成人av| 国产成人av激情在线播放| 亚洲av成人不卡在线观看播放网 | 国产精品人妻久久久影院| 亚洲专区国产一区二区| 成在线人永久免费视频| 两个人看的免费小视频| 亚洲欧美色中文字幕在线| 视频在线观看一区二区三区| 久久精品国产综合久久久| 精品视频人人做人人爽| 国产国语露脸激情在线看| 在现免费观看毛片| 国产欧美亚洲国产| 夫妻午夜视频| 日本五十路高清| 久久免费观看电影| av在线播放精品| 亚洲国产毛片av蜜桃av| 亚洲色图 男人天堂 中文字幕| 丰满少妇做爰视频| 在线精品无人区一区二区三| 一边亲一边摸免费视频| 午夜精品国产一区二区电影| 麻豆av在线久日| 高清不卡的av网站| 午夜福利一区二区在线看| av福利片在线| 国产黄色视频一区二区在线观看| 黑丝袜美女国产一区| 国产男女内射视频| 精品亚洲乱码少妇综合久久| 国产精品国产三级专区第一集| 亚洲av片天天在线观看| 亚洲av美国av| 成人三级做爰电影| www.自偷自拍.com| 亚洲人成电影观看| 在现免费观看毛片| 成人亚洲精品一区在线观看| 亚洲av电影在线观看一区二区三区| 亚洲 国产 在线| 国产女主播在线喷水免费视频网站| 亚洲欧美日韩高清在线视频 | 国产爽快片一区二区三区| 亚洲欧美精品自产自拍| 日日夜夜操网爽| 国产免费又黄又爽又色| 欧美人与性动交α欧美精品济南到| 夜夜骑夜夜射夜夜干| 免费看不卡的av| 黄色片一级片一级黄色片| 老司机在亚洲福利影院| 亚洲av电影在线进入| 夫妻午夜视频| 午夜福利视频在线观看免费| 国产色视频综合| 美国免费a级毛片| 亚洲精品一二三| 精品久久久久久电影网| 欧美日韩黄片免| 精品国产乱码久久久久久男人| 青春草亚洲视频在线观看| 99久久人妻综合| 男女边摸边吃奶| 久久国产亚洲av麻豆专区| 久久精品熟女亚洲av麻豆精品| 亚洲熟女精品中文字幕| 久久久久国产精品人妻一区二区| 国产伦人伦偷精品视频| 91精品伊人久久大香线蕉| 国产av一区二区精品久久| 日韩制服骚丝袜av| 国产无遮挡羞羞视频在线观看| 免费观看av网站的网址| 91精品伊人久久大香线蕉| 少妇被粗大的猛进出69影院| 国产一区亚洲一区在线观看| 黑人巨大精品欧美一区二区蜜桃| 日本av免费视频播放| 免费日韩欧美在线观看| 成在线人永久免费视频| 日日夜夜操网爽| 亚洲精品久久成人aⅴ小说| 精品熟女少妇八av免费久了| 一边摸一边做爽爽视频免费| 日本a在线网址| 日日夜夜操网爽| 一区二区日韩欧美中文字幕| 久久久久视频综合| 久久精品国产a三级三级三级| 汤姆久久久久久久影院中文字幕| 欧美性长视频在线观看| 人人妻人人澡人人爽人人夜夜| 国产成人啪精品午夜网站| 亚洲图色成人| 亚洲熟女精品中文字幕| 99热全是精品| 国产精品久久久久久人妻精品电影 | 最新的欧美精品一区二区| 午夜91福利影院| 男女床上黄色一级片免费看| 2018国产大陆天天弄谢| 波多野结衣av一区二区av| 后天国语完整版免费观看| 五月天丁香电影| 视频区欧美日本亚洲| 亚洲国产精品一区三区| 一区二区日韩欧美中文字幕| 久久久久国产一级毛片高清牌| 欧美日韩亚洲高清精品| 两性夫妻黄色片| 国产精品久久久久久精品电影小说| 色94色欧美一区二区| 精品第一国产精品| 成人午夜精彩视频在线观看| 成年女人毛片免费观看观看9 | 男女下面插进去视频免费观看| 亚洲欧洲日产国产| 亚洲精品第二区| 久久精品熟女亚洲av麻豆精品| 欧美精品一区二区大全| 欧美中文综合在线视频| 又紧又爽又黄一区二区| kizo精华| 亚洲美女黄色视频免费看| 亚洲欧美日韩高清在线视频 | 啦啦啦在线观看免费高清www| 亚洲一区中文字幕在线| 少妇被粗大的猛进出69影院| 国产精品偷伦视频观看了| 国产av国产精品国产| 欧美+亚洲+日韩+国产| 国产男女超爽视频在线观看| 一本—道久久a久久精品蜜桃钙片| 欧美精品啪啪一区二区三区 | 中文字幕人妻丝袜一区二区| 国产高清国产精品国产三级| 久热这里只有精品99| e午夜精品久久久久久久| 免费在线观看影片大全网站 | 欧美国产精品va在线观看不卡| 国产免费现黄频在线看| 脱女人内裤的视频| 亚洲国产精品999| 国产亚洲欧美精品永久| 丝袜喷水一区| 桃花免费在线播放| 国产深夜福利视频在线观看| 国产精品秋霞免费鲁丝片| 久久精品久久久久久久性| 人成视频在线观看免费观看| 免费日韩欧美在线观看| 黄频高清免费视频| 无限看片的www在线观看| 国产精品九九99| 青青草视频在线视频观看| avwww免费| 女人精品久久久久毛片| 十八禁高潮呻吟视频| 精品国产乱码久久久久久小说| 亚洲精品成人av观看孕妇| 纵有疾风起免费观看全集完整版| av不卡在线播放| 久久国产精品大桥未久av| 亚洲,一卡二卡三卡| 黄片小视频在线播放| 免费av中文字幕在线| 国产又爽黄色视频| 777米奇影视久久| 十八禁高潮呻吟视频| 99热国产这里只有精品6| 久久久久久免费高清国产稀缺| 麻豆av在线久日| 手机成人av网站| 男女之事视频高清在线观看 | 久久精品国产亚洲av涩爱| 久久午夜综合久久蜜桃| 国产91精品成人一区二区三区 | 免费不卡黄色视频| 女人高潮潮喷娇喘18禁视频| 国产成人91sexporn| 欧美日韩亚洲高清精品| 最黄视频免费看| 老汉色∧v一级毛片| 汤姆久久久久久久影院中文字幕| 秋霞在线观看毛片| 超色免费av| 久久久久国产精品人妻一区二区| 色精品久久人妻99蜜桃| 国产黄色视频一区二区在线观看| 日韩av在线免费看完整版不卡| 国产精品久久久久久精品电影小说| 天堂中文最新版在线下载| 咕卡用的链子| 你懂的网址亚洲精品在线观看| 99九九在线精品视频| 国产免费现黄频在线看| 午夜日韩欧美国产| 99精国产麻豆久久婷婷| 一本综合久久免费| 久久人妻熟女aⅴ| 中文字幕精品免费在线观看视频| 精品免费久久久久久久清纯 | 国产成人影院久久av| 亚洲欧美日韩另类电影网站| 国产成人影院久久av| 亚洲五月色婷婷综合| 一级,二级,三级黄色视频| 午夜激情av网站| 纵有疾风起免费观看全集完整版| 午夜激情av网站| 欧美精品人与动牲交sv欧美| 亚洲专区国产一区二区| 汤姆久久久久久久影院中文字幕| 韩国高清视频一区二区三区| 男人操女人黄网站| 狠狠精品人妻久久久久久综合| 中文字幕人妻熟女乱码| 亚洲专区中文字幕在线| bbb黄色大片| 久久人人97超碰香蕉20202| 亚洲人成电影免费在线| 嫩草影视91久久| 午夜老司机福利片| 精品亚洲成a人片在线观看| 国产成人免费观看mmmm| 国产日韩欧美在线精品| 午夜激情久久久久久久| 亚洲精品久久成人aⅴ小说| 国产激情久久老熟女| 男女无遮挡免费网站观看| 国产男女内射视频| 热99久久久久精品小说推荐| 9色porny在线观看| 国产在线视频一区二区| 少妇猛男粗大的猛烈进出视频| 视频区欧美日本亚洲| 大片免费播放器 马上看| 夫妻性生交免费视频一级片| 又黄又粗又硬又大视频| 亚洲一码二码三码区别大吗| 亚洲欧美精品综合一区二区三区| 超色免费av| 精品国产超薄肉色丝袜足j| 如日韩欧美国产精品一区二区三区| 免费在线观看影片大全网站 | 97人妻天天添夜夜摸| 欧美精品一区二区大全| 亚洲精品成人av观看孕妇| 国产精品国产三级专区第一集| 日韩中文字幕欧美一区二区 | 精品亚洲成国产av| 各种免费的搞黄视频| 午夜影院在线不卡| 夫妻午夜视频| 国产伦理片在线播放av一区| 精品少妇久久久久久888优播| 日本黄色日本黄色录像| 好男人视频免费观看在线| 色网站视频免费| 亚洲自偷自拍图片 自拍| 高清黄色对白视频在线免费看| 亚洲欧美中文字幕日韩二区| 国产黄色免费在线视频| 欧美亚洲日本最大视频资源| 亚洲欧美成人综合另类久久久| 精品人妻1区二区| 一本—道久久a久久精品蜜桃钙片| 国产一区有黄有色的免费视频| 久久久国产一区二区| av视频免费观看在线观看| 亚洲国产精品一区三区| 大香蕉久久网| 一本综合久久免费| 国产精品久久久久久人妻精品电影 | 国产男人的电影天堂91| 另类亚洲欧美激情| 日本av手机在线免费观看| 五月开心婷婷网| 日日摸夜夜添夜夜爱| 亚洲成人国产一区在线观看 | 亚洲久久久国产精品| 亚洲,一卡二卡三卡| 波野结衣二区三区在线| 免费日韩欧美在线观看| 性高湖久久久久久久久免费观看| 国产成人av教育| 国产精品国产三级国产专区5o| 国产欧美日韩精品亚洲av| 麻豆国产av国片精品| 97精品久久久久久久久久精品| 只有这里有精品99| 久久久久久久国产电影| 一本—道久久a久久精品蜜桃钙片| 男女无遮挡免费网站观看| 久久ye,这里只有精品| 99国产精品免费福利视频| 久久国产亚洲av麻豆专区| 欧美日韩亚洲综合一区二区三区_| 老司机亚洲免费影院| 麻豆av在线久日| 999精品在线视频| 免费观看a级毛片全部| 日韩制服丝袜自拍偷拍| 国产成人欧美在线观看 | 人人澡人人妻人| 日韩熟女老妇一区二区性免费视频| 一本综合久久免费| 久久久亚洲精品成人影院| 免费看av在线观看网站| 精品一区二区三区四区五区乱码 | 一区二区av电影网| 国产免费又黄又爽又色| 久久影院123| 美女高潮到喷水免费观看| 亚洲欧美清纯卡通| 亚洲激情五月婷婷啪啪| 国产成人欧美| 十分钟在线观看高清视频www| 午夜福利乱码中文字幕| 欧美日韩视频高清一区二区三区二| 国产精品.久久久| 免费在线观看视频国产中文字幕亚洲 | 国产成人影院久久av| 在线亚洲精品国产二区图片欧美| 国产精品亚洲av一区麻豆| 午夜福利乱码中文字幕| 精品少妇久久久久久888优播| 国产高清不卡午夜福利| 精品福利观看| 亚洲图色成人| 观看av在线不卡| 悠悠久久av| 操出白浆在线播放| 日本欧美视频一区| 国产精品一区二区在线不卡| 看十八女毛片水多多多| 在线 av 中文字幕| 成年人黄色毛片网站| 亚洲伊人色综图| 欧美中文综合在线视频| 日本黄色日本黄色录像| 又黄又粗又硬又大视频| 亚洲精品久久久久久婷婷小说| 午夜视频精品福利| 国产精品人妻久久久影院| a级片在线免费高清观看视频| 黑人欧美特级aaaaaa片| 99精国产麻豆久久婷婷| 久久久久国产精品人妻一区二区| 精品国产乱码久久久久久小说| 国产一区有黄有色的免费视频| 国产高清国产精品国产三级| videosex国产| 老司机影院成人| 久久九九热精品免费| 乱人伦中国视频| √禁漫天堂资源中文www| 19禁男女啪啪无遮挡网站| 超碰成人久久| 两性夫妻黄色片| videos熟女内射| 久久ye,这里只有精品| 久久精品人人爽人人爽视色| 9热在线视频观看99| 观看av在线不卡| 国产又爽黄色视频| 国产精品一区二区免费欧美 | av片东京热男人的天堂| 国产精品国产av在线观看| 中文字幕高清在线视频| 永久免费av网站大全| 悠悠久久av| 91麻豆av在线| 91精品三级在线观看| 我要看黄色一级片免费的| 亚洲人成电影观看| 亚洲少妇的诱惑av| av天堂久久9| 成在线人永久免费视频| 一级黄片播放器| 菩萨蛮人人尽说江南好唐韦庄| 两个人免费观看高清视频| 国产1区2区3区精品| av网站免费在线观看视频| 三上悠亚av全集在线观看| 高清av免费在线| 精品人妻熟女毛片av久久网站| 日本欧美国产在线视频| 国产精品一国产av| 丝袜喷水一区| 久久久久久久久免费视频了| 中文字幕另类日韩欧美亚洲嫩草| 国产精品国产三级国产专区5o| 亚洲av男天堂| 91麻豆精品激情在线观看国产 | 国产在线一区二区三区精| 男女高潮啪啪啪动态图| 女人久久www免费人成看片| 精品福利观看| 精品国产一区二区久久| 精品人妻在线不人妻| 丝袜美足系列| 丝袜人妻中文字幕| videos熟女内射| 亚洲情色 制服丝袜| 天堂中文最新版在线下载| 欧美亚洲日本最大视频资源|