• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Crawler for Nodes in the Internet of Things

    2015-10-11 06:11:38XuemengLiYongyiWangFanShiandWenchaoJia
    ZTE Communications 2015年3期

    Xuemeng Li,Yongyi Wang,F(xiàn)an Shi,and Wenchao Jia

    (Department of Computer Science,Electronic Engineering Institute,Hefei 230037,China)

    Crawler for Nodes in the Internet of Things

    Xuemeng Li,Yongyi Wang,F(xiàn)an Shi,and Wenchao Jia

    (Department of Computer Science,Electronic Engineering Institute,Hefei 230037,China)

    Determining the application and version of nodes in the Internet of Things(IoT)is very important for warning about and managing vulnerabilities in the IoT.This article defines the attributes for determining the application and version of nodes in the IoT.By improving the structure of the Internet web crawler,which obtains raw data from nodes,we can obtain data from nodes in the IoT.We improve on the existing strategy,in which only determinations are stored,by also storing downloaded raw data locally in MongoDB.This stored raw data can be conveniently used to determine application type and node version when a new determination method emerges or when there is a new application type or node version.In such instances,the crawler does not have to scan the Internet again.We show through experimentation that our crawler can crawl the IoT and obtain data necessary for determining the application type and node version.

    crawler;local storage;nodes;Internet of Things

    1 Introduction

    W ith the fast development and increasing popularity of the Internet of Things(IoT),more and more devices are being used in everyday life and are being incorporated into the Internet. Such devices are also called nodes.Because these nodes are exposed to the Internet,they are not as safe many of the owners and users of these nodes think.The ability to connect to,communicate with,and remotely manage an incalculable number of networked,automated devices via the Internet has become pervasive.As we become increasingly reliant on intelligent,in-terconnected devices in everyday life,protecting billions of these devices from intrusion and interference has become a serious issue.Unauthorized intrusions can compromise personal privacy or even public safety[1].Vulnerability is related to the application and many of the affected devices as possible in order to give warnings and manage the problem.In this paper,we describe a crawler for nodes in the IoT.This crawler is based on local storage.By collecting and storing information about the nodes' features,we can determine the application and version of individual nodes locally and conveniently.

    ZoomEye[2]and Shandon[3]are two mature search engines that enable web users to search for application type and version.Using a distributed web crawler,ZoomEye collects information from Internet nodes all over the world.The ZoomEye interface enables the user to search for application,version,location,open port,and so on.The nodes from which this information is collected include websites and devices.Shodan,by contrast,is only focused on IoT device.It is used to expose vulnerabilities in routers,switches,and industrial control systems[2]and is often seen as a valuable tool for hackers.Shodan can be used to detect just about anything on the Internet,such as printers that can be controlled remotely;open,accessible web cameras;and other unsecured devices.

    A popular strategy for determining the node application and version is first to crawl the Internet and then directly use the downloaded information.Then,the determinations are stored,and the raw information is abandoned.If there is a new strategy for determining the application and node version or if there is a new node application or version,the only thing that can be done it to scan the Internet a second time in order to retrieve the raw information again.This significantly increases scanning costs.We improved the existing web crawler by putting the NoSQL database to use.Our proposed distributed web crawler can retrieve fingerprint information in the IoT.The raw information returned by crawler is stored in the NoSQL database and used to determine the node application and version. The NoSQL database has high storage capacity,which the crawler demands,but does not occupy much of the system.Because it can search big data efficiently,the NoSQL database might be helpful for searching through the innumerable results returned by the web crawler[3],[4].

    In section 2,we introduce MongoDB and traditional web crawler.In section 3,we describe the overall system structure,crawler design,data structure,local storage,and design of the database.In section 4,we experiment on our proposed crawler and show that it is efficient enough to satisfy the system requirements.

    2 Related Works

    2.1 MongoDB

    The company 10gen develops the MongoDB,which is a doc-ument-oriented NoSQL database,not a traditional relational database.Although it is non-relational,MongoDB is faster,more expansible,and has more useful than a relational database[5]. MongoDB has many more functions than a relational database,including sorting,secondary indexing,and range searching[6]. Mongo DB has the following features:

    ·binary JavaScript object notation(BSON)for data storage. This increases the speed of index page traversal.

    ·non-relational storage and support for sharding.With sharding,big data is automatically divided into small data blocks that are then stored in an appropriate server.Although separate,user searching and combining of results can be done in a highly efficient way,and servers can linearly increase expandability and performance.

    ·flag_id as the only flag of the document.The value of this flag can be automatically assigned by the database or assigned by users themselves.

    ·a combination of key and value as the means of storing data. This is a loose-storage solution that makes inserting data into MongoDB easier than inserting data into a relational database.In this way,a user does not need to define the detailed table structure in advance,which is necessary in a relational database.

    ·no support for transactions.MongoDB sacrifices transactional support for easy use,high speed,and expandability.

    2.2 Principle of the Traditional Web Crawler

    A web crawler is a computer program used to downloading the source page of a website.Web crawlers are widely used in Internet search engines or for managing web page caches[7]. Crawling usually starts from one URL or a collection of URLs. Crawlers store these URLs permanently in a queue.Guided by a priority principle,a web crawler selects one URL from the URL queue and downloads the corresponding web page.If there are any other URLs in the web page,crawler extracts these URLs from the page after it has been downloaded.These extracted URLs are also stored in the queue.The downloading and extracting process loops until the web crawler is turned off,and downloaded pages are stored in the server database.

    3 System Design

    3.1 Background Requirements

    The system must have a web crawler and database storage. As much as possible,the web crawler must crawl nodes on the IoT and grab information that is as complete as possible.Information stored locally in the database must be easy to understand,convenient to search,and useful for determining the application type and node version.At the same time,the crawling depth and width of the web crawler must be guaranteed.

    A distributed web crawler is necessary to ensure high crawling speed and in-depth crawling.Web crawlers are now very cooperative with each other,and a scheduling relationship can be established between multiple web crawlers.

    Traditional web crawling technology must also be improved so that traditional web crawlers can be used to grab specific information from nodes in the IoT.The information from these nodes can be used to determine the application type and node version in the future work.

    MongoDB is necessary to store the collected information locally.Because the web crawler is distributed and MongoDB does not support transactions,independent MongoDB interfaces must to be designed for database reading and writing.In this way,MongoDB remains consistent.

    Local storage is necessary for storing the information downloaded by the web crawler.Local storage enables the application type and node version to be determined locally,and scan time can be saved.

    3.2 Overall Design

    The system structure that best satisfies the previously mentioned requirements is shown in Fig.1.

    Within this system,the web crawler scheduler selects a URL from the URL cache queue,which has been sorted,and assigns the URL to a free web crawler.The web crawler crawls the web and downloads information from web pages or pages returned by devices.At the same time,the downloader also deletes duplicate useless webpages.Finally,the web crawler delivers the downloaded information to the MongoDB interface,which converts the information to BSON format and stores it. The web crawler scheduler,URL cache queue,and the web crawler can inherit the ones in mature crawler,so they are not covered in this paper.

    3.3 Downloader Design

    ▲Figure 1.Overall system structure.

    The IoT can be divided into public IoT and special IoT.In the former,all devices are connected.Public IoT covers one whole area of administration and connects to the public Internet.Public IoT is regarded as a true social information infrastructure[8].Each sensor and entity connected to the IoT corresponds to one web source defined by a web page URL and can be accessed by HTTP protocol.All these web sources canbe expressed as HTML pages and are usually regarded as sensor pages or entity pages.These pages contains the type of the nodes,reading of the nodes,and some unstructured information[9].Devices that can only be accessed with administrator privileges will return the administration web pages or error pages.These pages can also be used as the fingerprint of the device.By downloading the information included in these web pages,we can determine the application type and node version.

    Our proposed downloader is different from a traditional downloader in three ways:

    ·Our proposed downloader scans more ports.The downloader of the traditional web crawler mainly scans ports 80 and 8080 whereas the downloader of our web crawler aimed at the IoT also scans ports such as 21,22,and 23.

    ·The content downloaded by our proposed downloader is different.The downloader of a traditional web crawler downloads texts,pictures,files,and so on whereas the content downloaded by the web crawler of our proposed system only includes information useful for determining the application type and node version.

    ·Before our downloader downloads information,it has to determine whether the node belongs to the IoT or not.

    The content downloaded by our web crawler aimed at the IoT must be useful for determining the application type and node version.After analyzing existing fingerprint-judging software,we realized that there was much more information that could be used to determine the application type and node version than we initially thought.We need to find out as much as possible about the node's fingerprint as accurately as we can and consider the load of the web crawler and capacity of MongoDB.We also need to download the URL address,header of the HTML page,body of the HTML page,banner information,and the geographic location.The downloader should also remove duplicates of the pages and complete cleaning of the content.The system needs to be capable of incremental crawling from time to time to obtain complete and accurate node data.

    3.4 Local Storage of Node Data

    Raw data from nodes is commonly used to determine the application type and node version but is not stored.The downloaded data is used as soon as it is downloaded,and after a determination has been made,only the application type and node version are stored in the database.However,a problem emerges when a new method is introduced for determining application type and node version or if there is a new application type or node version.To maintain the integrity of the database,devices should be scanned a second or even third time to obtain data,then the new approach is used to judge these devices. This“directly using without storing”method wastes scanned data and creates more scanning workload.

    In terms of storing data,the system must avoid repetitive work.Our system stores the raw information downloaded by the downloader but stores it separately from the determinations.While the crawler is crawling devices,the data returned is directly passed to MongoDB and stored locally.The application type and node version are determined locally and independently.In the future,when derminations are being made about devices,regardless of whether or not the determination is made successfully,the raw information will be kept in MongoDB.If a new method for determining application type or node version emerges or if there is a new application type or node version,the only solution is to iterate through the database and obtain the fingerprint data of scanned devices.

    3.5 Data Structure and Design of MongoDB

    3.5.1 Data Structure

    The data downloaded by the downloader must be stored in MongoDB in a certain format.After removing duplicates,the data is converted into BSON format by MongoDB interface and then stored in the database.The data to be downloaded includes URL address,header of the HTML page and so on.

    3.5.2 Design of MongoDB

    The collection obtained by MongoDB is similar to the table of a relational database.However,the definition of the collection is not as strict as that of a table.The MongoDB collection only comprises similar elements.Each data item in the collection is called a document.In our system,we create one document for every IP address.The fixed data structure of every document is shown in Table 1.Because MongoDB does not strictly define the collection,we can improve the downloader according to the background requirements.The structure of MongoDB does not need to change obviously.The design of MongoDB is shown in Fig.2.

    4 Realization of the Key Technology

    4.1 Dividing Web

    For N web pages,by using some certain dividing rule,thecollection G of web pages to be downloaded is divided into M(where M>N)subsets:{G1,G2,...,GM}.If G1?G2?...?GM=G,G1?G2?...GM=φ,and|Gi|≈|Gj|, then G is called a division of N.Reasonable division of web pages prevents agents belonging to the system from crawling the same pages and increases the overall efficiency of web page crawling.The system uses dynamic distribution.At the start of a crawling job,the system distributes 1 to N subsets of web pages to N agents for crawling.Once an agent has finished crawling,the system distributes the next subset of web pages to the crawler.This distribution lasts until the end of the crawling job.To increase the efficiency of web crawling,the crawler should crawl web pages as close to it in network as possible. Therefore,a threshold timeout value is set for every agent.During crawling,if the time to connect to the web server exceeds the timeout threshold,the crawler will give up trying to connect.The agent will keep these URL addresses in its own list,and after a specified period,will pass the list to the system scheduler.This scheduler will re-schedule the nodes that the crawler could not connect to.

    ▼Table 1.Data structure

    ▲Figure 2.Design of MongoDB.

    The advantage of dynamic distribution is that the load can be dynamically balanced and the agent is not turned down mistakenly[10].

    4.2 Agent Synergy

    Division of web pages requires the synergy of every agent in the system.To adapt to the strategy of web page division,our system synergizes with a scheduler.Each agent passes URL addresses that have been newly crawled to the scheduler,which distributes them in a uniform way.At the same time,the scheduler re-schedules nodes that the crawler could not connect to. Agent synergy is useful for controlling the division of web pages but overloads individual nodes and causes single-node failure[10].

    An exchange approach is used to deal with links that cross the subset of the division.If an agent finds a URL that does not belong to its division subset,it passes the URL address to the crawler responsible for it.

    4.3 Incremental Crawling

    To ensure the integrity of the fingerprint database,incremental crawling is required.The easiest method of incremental crawling is to crawl pages again every specified period.However,doing this requires huge effort.Web pages are updated at different times,and some pages may not be updated for a long time.Therefore,the update period for web pages must be considered in the incremental crawling strategy.Among nodes in the IoT,there are important nodes whose accuracy must be guaranteed.As in[11],we categorize the nodes in the IoT as very important,important,general,or not important.The attribute of incremental crawling is the weighted average of the quantized importance and the update frequency.The incremental crawling attribute of all the nodes in the IoT is calculated to obtain the average.If a node has a higher-than-average incremental crawling attribute,the system crawls that node three times faster than average.If a node has a lower-than-average incremental crawling attribute,the system crawls that node at a speed 0.8 times the average.

    5 Experiments and Conclusion

    The performance of our web crawler under experimentation was affected to an extent by network bandwidth and hardware. We used Windows 7;internal storage was 2 GB;hard drive capacity was 250 GB;and network bandwidth was 100 Mbps.If the thread count of the distributed web crawler for the IoT is set to 10,1085 URL address can be accessed in ten minutes. The downloaded information from 114 of these URL addresses belonged to nodes in the IoT.We used mature software to determine the application type and node version from this downloaded information.Fifty-six nodes were determined correctly,49 of which included the application type.

    After the web crawler had crawled the Internet and downloaded information from nodes over a period of time,we tested the local storage.MongoDB containing the raw crawling data was put into use in this experiment.We selected vulnerability CVE-2015-2049 published on 2 March 2015 in the China National Vulnerability Database[12].This vulnerability in a DLink DCS-931L remote wireless cloud camera with firmware 1.04 or earlier is an intermediate risk.Unrestricted file upload vulnerability in the camera allows a remote unauthenticated user to execute an arbitrary code by uploading a file with an executable extension[13].In the previous identification for fingerprint,the application type and node version related to this vulnerability were not determined.To monitor the posture of the vulnerability,the application type and version need to be determined.First,we need to find fingerprint used for the determination.After information has been collected from the Internet,the fingerprint is defined by the keyword SCS-931L in the WWW-Authenticate field of the HTTP header.After constructing a query statement for MongoDB and searching for the results in the raw information database,several results were returned(Fig.3).The time cost for this search was less than 2 s, which is much faster than crawling the Internet and collecting information a second time.

    ▲Figure 3.The search result of D-Link DCS-931L.

    [1]Security in the Internet of Things[online].Available:http://www.Windriver.com/whitepapers/security-in-the-internet-of-things/wr_security-in-the-internet-ofthings.pdf

    [2]The instruction to Shodan[online].Available:http//:drops.Wooyun.org/1tips/ 2469

    [3]Y.Gu,S.Shen,and G.Zheng,“Application of NoSQL database in web crawling,”International Journal of Digital Content Technology and its Applications,vol.5,no.6,pp.261-266.2011.

    [4]H.Dong,A.Wu,Q.Wu,and X.Zhu,“A novel distributed web crawling approach based on Mongodb,”International Journal of Advancements in Computing Technology(IJACT),vol.5,no.6,pp.794-801.2013.

    [5]H.David,P.Eelco,M.Peter,and H.Tim,The Definitive Guide to MongoDB,Second Edition.Beijing,China:tsinghua university press,2015,pp.4-8.

    [6]H.Li,Design and Implementation of Crawler System for Public Feelings on Internet.Xia Men,China:Xia Men University,2014.

    [7]P.Zhao,Design and Implementation of Distributed Books Web Crawler System. Cheng Du,China:Southwest Jiaotong University,2014.

    [8]S.Shen,Y.Mao,Q.Fan,P.Zong,and W.Huang,“The concept model and architecture of the internet of things,”Journal of Nanjing University of Post and Telecommunication(Nature Science),vol.30,no.4,pp.3-8,2010.

    [9]Z.Wang,Q.Pan,and T.Xing,“Survey on real-time search engine for entities of internet of things,”Application Research of Computers,vol.28,no.6,pp.2001-2010,2011.

    [10]X.Xu,W.Zhang,H.Zhang,and B.Fang,“WAN-based distributed web crawling,”Journal of Software,vol.21,no.5,pp.1067-1082,2010.doi:10.3724/ SP.J.1001.2010.03725.

    [11]X.Su,The Research,Implement on Technology of Distributed Web Crawler.Harbin,China:Harbin Institute of Technology,2006.

    [12]Vulnerability summary for CVE-2015-2049[online].Available:https//:web. Nvd.Nist.gov/view/vuln/detail?vulnId=CVE-2015-2049

    [13]Cross-site request forging loophole of D-Link-DCS-931L[online].Available: http//:www.cnvd.org.cn/flaw/show/CNVD-2015-01375

    Manuscript received:2015-04-22

    Biographies

    Xuemeng Li(benqer@126.com)received her BS degree in computer science from Electronic Engineering Institute.She is currently a graduate student at the Electronic Engineering Institute,Hefei.Her research interest is computer security.

    Yongyi Wang(rose_1203@yeah.net)is a professor of computer science at the Electronic Engineering Institute.He receives his graduate degree at the Electronic Engineering Institute.His research interest is computer security.

    Fan Shi(shif00@gmail.com)received his master′s degree in computer science from Electronic Engineering Institute.He now works in Electronic Engineering Institute. His research interests include networks and search engine.

    Wenchao Jia(jiatoday2013@163.com)received his master′s degree at the Electronic Engineering Institute.He is currently a PhD candidate there.His research interests include networks and big data.

    Call for Papers ZTE CommunicationsSpecial Issue on Vehicular Communications,Networks,and Applications

    Vehicular communications and networking can improve road safety,facilitate intelligent transportation,support infotainment,data sharing,and location based services,and will be a critical component in the Internet of Things.This special issue aims to present the state of the art in research and development of vehicular communication technology and its potential applications.We are soliciting original contributions. The topics of interest include,but are not limited to:

    ·Vehicle-to-vehicle and vehicle-to-infrastructure transmissions,DSRC,channel models,and mobility models;

    ·Vehicular networking protocols,vehicular/cellular interworking,user privacy protection,and network information security;

    ·Road safety,data offloading,data sharing,remote diagnosis,platooning,cooperative driving,driving assistance,vehicle traffic monitoring and management;

    ·Standardization,regulations,testbed,prototyping,human machine interfaces,and pilot systems.

    Paper Submission

    Please directly send to Li Zhu(zhu.li1@zte.com.cn)and copy to both guest editors,with subject title“ZTE-VCN-Paper-Submission”.

    Tentative Schedule

    Paper submission deadline:January 1,2016

    Editorial decision:April 1,2016

    Final manuscript:May 1,2016

    Guest Editors

    Prof.Weihua Zhuang, University of Waterloo, Canada(wzhuang@uwaterloo.ca)

    Prof.Hongzi Zhu,Shanghai Jiaotong University,China(hongzi@cs.sjtu.edu.cn)

    This research work is supported by the ZTE Corporation and University Joint Research Project under Grant No.CON1307100001,and the National High Technology Research and Development Program of China under Grant No.2013AA013602.

    久久久久视频综合| 国产乱来视频区| 内地一区二区视频在线| 国产伦在线观看视频一区| 高清黄色对白视频在线免费看 | 久久精品国产自在天天线| 精品久久国产蜜桃| 国产精品一区www在线观看| 久久久a久久爽久久v久久| 99re6热这里在线精品视频| 1000部很黄的大片| 国产国拍精品亚洲av在线观看| 18禁在线无遮挡免费观看视频| 国产无遮挡羞羞视频在线观看| 小蜜桃在线观看免费完整版高清| 在线观看av片永久免费下载| 亚洲精品乱久久久久久| 激情五月婷婷亚洲| 日韩伦理黄色片| 日产精品乱码卡一卡2卡三| 久久国产精品大桥未久av | 九九爱精品视频在线观看| 啦啦啦啦在线视频资源| 国产黄片视频在线免费观看| 国产成人精品婷婷| 亚洲经典国产精华液单| 亚洲av中文字字幕乱码综合| 久久久久精品性色| 一级a做视频免费观看| 色婷婷av一区二区三区视频| 成人黄色视频免费在线看| 亚洲怡红院男人天堂| 久久精品国产鲁丝片午夜精品| 国产成人免费无遮挡视频| 欧美日韩国产mv在线观看视频 | 欧美 日韩 精品 国产| 日韩 亚洲 欧美在线| 大香蕉97超碰在线| 午夜免费鲁丝| 国产精品精品国产色婷婷| 日日撸夜夜添| 五月伊人婷婷丁香| 深夜a级毛片| 国产精品国产三级专区第一集| 亚洲美女黄色视频免费看| 天天躁夜夜躁狠狠久久av| 男女啪啪激烈高潮av片| 免费观看a级毛片全部| 亚洲av男天堂| 国产精品欧美亚洲77777| 午夜免费鲁丝| 国产老妇伦熟女老妇高清| 国产中年淑女户外野战色| 成人综合一区亚洲| 日本免费在线观看一区| 有码 亚洲区| av女优亚洲男人天堂| 国产一区有黄有色的免费视频| av天堂中文字幕网| 亚洲精品色激情综合| 国模一区二区三区四区视频| 老师上课跳d突然被开到最大视频| h日本视频在线播放| 中文欧美无线码| 99九九线精品视频在线观看视频| 日韩 亚洲 欧美在线| 99久久精品一区二区三区| 午夜福利在线观看免费完整高清在| 七月丁香在线播放| 老司机影院成人| 直男gayav资源| 午夜免费男女啪啪视频观看| 一个人看视频在线观看www免费| 亚洲人成网站在线观看播放| 国产探花极品一区二区| 亚洲三级黄色毛片| 色5月婷婷丁香| av.在线天堂| 成人亚洲欧美一区二区av| 色网站视频免费| 亚洲,欧美,日韩| 五月开心婷婷网| 久久女婷五月综合色啪小说| 性高湖久久久久久久久免费观看| 免费观看在线日韩| 制服丝袜香蕉在线| 国产黄频视频在线观看| 亚洲综合色惰| 97在线视频观看| 日日摸夜夜添夜夜爱| 亚洲综合精品二区| 韩国av在线不卡| 尤物成人国产欧美一区二区三区| 赤兔流量卡办理| 三级经典国产精品| 中文天堂在线官网| 偷拍熟女少妇极品色| 天堂俺去俺来也www色官网| 免费看不卡的av| 亚洲av国产av综合av卡| 18禁在线播放成人免费| 国产欧美日韩一区二区三区在线 | 久久人人爽人人片av| 亚洲丝袜综合中文字幕| 天堂中文最新版在线下载| 日韩中文字幕视频在线看片 | 只有这里有精品99| 观看美女的网站| 欧美 日韩 精品 国产| 国产精品.久久久| 国产精品秋霞免费鲁丝片| 好男人视频免费观看在线| 极品少妇高潮喷水抽搐| 免费观看在线日韩| 亚洲欧洲日产国产| 亚洲成人一二三区av| 亚洲最大成人中文| 日韩大片免费观看网站| 亚洲精品第二区| 国产精品不卡视频一区二区| 免费播放大片免费观看视频在线观看| 热99国产精品久久久久久7| 黄色欧美视频在线观看| 自拍偷自拍亚洲精品老妇| 青青草视频在线视频观看| 免费看日本二区| 九草在线视频观看| 亚洲自偷自拍三级| 啦啦啦啦在线视频资源| 国产av码专区亚洲av| 中国三级夫妇交换| 亚洲欧美一区二区三区国产| 高清视频免费观看一区二区| 久久久亚洲精品成人影院| 搡女人真爽免费视频火全软件| 各种免费的搞黄视频| 少妇裸体淫交视频免费看高清| 国产精品久久久久久av不卡| 一级毛片我不卡| 乱系列少妇在线播放| 久久久久久久大尺度免费视频| 尤物成人国产欧美一区二区三区| 麻豆成人av视频| 在线看a的网站| 少妇丰满av| 深爱激情五月婷婷| 日韩欧美一区视频在线观看 | 亚洲中文av在线| 国产成人精品久久久久久| 岛国毛片在线播放| 不卡视频在线观看欧美| 日日啪夜夜撸| 黑人猛操日本美女一级片| 久久国内精品自在自线图片| av线在线观看网站| 人人妻人人看人人澡| 你懂的网址亚洲精品在线观看| 99国产精品免费福利视频| 一区二区三区乱码不卡18| 夜夜骑夜夜射夜夜干| 性色av一级| 欧美成人精品欧美一级黄| 成人美女网站在线观看视频| 成年女人在线观看亚洲视频| 日韩成人伦理影院| 美女脱内裤让男人舔精品视频| av在线蜜桃| 亚洲精品,欧美精品| 久久精品久久久久久噜噜老黄| 五月玫瑰六月丁香| 国产高清有码在线观看视频| 日韩一区二区三区影片| 午夜视频国产福利| 欧美三级亚洲精品| 精品久久久久久电影网| 欧美精品国产亚洲| 免费观看性生交大片5| 97在线视频观看| 国产高清国产精品国产三级 | 男人添女人高潮全过程视频| 久久毛片免费看一区二区三区| 日韩国内少妇激情av| 熟女电影av网| 亚洲欧洲国产日韩| 欧美zozozo另类| 亚洲精品国产av蜜桃| 人妻制服诱惑在线中文字幕| 国产真实伦视频高清在线观看| 亚洲内射少妇av| 国产精品女同一区二区软件| av卡一久久| 嘟嘟电影网在线观看| 久久毛片免费看一区二区三区| 高清黄色对白视频在线免费看 | 亚洲伊人久久精品综合| 欧美另类一区| 国产av国产精品国产| a级毛色黄片| 免费人成在线观看视频色| 亚洲av二区三区四区| av国产免费在线观看| 国产精品爽爽va在线观看网站| 国产淫片久久久久久久久| 亚洲美女搞黄在线观看| 黄色配什么色好看| 汤姆久久久久久久影院中文字幕| 男女边吃奶边做爰视频| 春色校园在线视频观看| 老女人水多毛片| 交换朋友夫妻互换小说| 色哟哟·www| 最近2019中文字幕mv第一页| 狂野欧美白嫩少妇大欣赏| 欧美精品国产亚洲| videossex国产| 亚洲精品456在线播放app| kizo精华| 国产黄色免费在线视频| 亚洲精品国产色婷婷电影| 日韩 亚洲 欧美在线| 国产成人午夜福利电影在线观看| 婷婷色麻豆天堂久久| 日韩一区二区视频免费看| av女优亚洲男人天堂| 亚洲欧美日韩另类电影网站 | 欧美成人精品欧美一级黄| 国产高清三级在线| 亚洲中文av在线| 高清黄色对白视频在线免费看 | 成人黄色视频免费在线看| 26uuu在线亚洲综合色| 一级片'在线观看视频| 嫩草影院新地址| 免费黄色在线免费观看| 欧美高清性xxxxhd video| 亚洲精华国产精华液的使用体验| 三级国产精品欧美在线观看| 自拍欧美九色日韩亚洲蝌蚪91 | 中文乱码字字幕精品一区二区三区| 一个人免费看片子| 久久久久久久久久久免费av| 国产精品成人在线| 久久韩国三级中文字幕| 亚洲av成人精品一区久久| 亚洲成人av在线免费| 草草在线视频免费看| 免费不卡的大黄色大毛片视频在线观看| 日韩成人av中文字幕在线观看| 99热6这里只有精品| 国产色爽女视频免费观看| 国产av精品麻豆| 夜夜看夜夜爽夜夜摸| 亚洲美女搞黄在线观看| 看免费成人av毛片| 亚洲伊人久久精品综合| 欧美成人a在线观看| 中文字幕免费在线视频6| 欧美高清性xxxxhd video| 波野结衣二区三区在线| 国产精品av视频在线免费观看| 大片免费播放器 马上看| 欧美高清性xxxxhd video| 人人妻人人澡人人爽人人夜夜| 亚洲av男天堂| 亚洲精品日本国产第一区| 久久婷婷青草| 国产成人免费观看mmmm| 高清毛片免费看| 日韩av不卡免费在线播放| 亚洲高清免费不卡视频| 九草在线视频观看| 国产精品女同一区二区软件| 亚洲人成网站在线观看播放| 日韩av免费高清视频| 高清毛片免费看| freevideosex欧美| a 毛片基地| 伦理电影大哥的女人| 九色成人免费人妻av| 中文字幕免费在线视频6| 亚洲精品久久久久久婷婷小说| 国产亚洲精品久久久com| 成人高潮视频无遮挡免费网站| 亚洲国产欧美人成| 99热这里只有是精品50| 我的女老师完整版在线观看| 色视频www国产| 大话2 男鬼变身卡| 能在线免费看毛片的网站| 色5月婷婷丁香| 又粗又硬又长又爽又黄的视频| 国产91av在线免费观看| 国产精品福利在线免费观看| 在线免费观看不下载黄p国产| 肉色欧美久久久久久久蜜桃| 最后的刺客免费高清国语| 99国产精品免费福利视频| 国国产精品蜜臀av免费| 成人美女网站在线观看视频| 亚洲国产精品专区欧美| 久久精品国产亚洲av天美| 亚洲真实伦在线观看| 亚洲国产色片| 久久女婷五月综合色啪小说| 毛片一级片免费看久久久久| 看免费成人av毛片| 成人漫画全彩无遮挡| 尤物成人国产欧美一区二区三区| 五月开心婷婷网| 国产无遮挡羞羞视频在线观看| kizo精华| av免费观看日本| 欧美日韩国产mv在线观看视频 | 交换朋友夫妻互换小说| 丰满乱子伦码专区| 韩国高清视频一区二区三区| 三级经典国产精品| 日韩三级伦理在线观看| 久久久久国产精品人妻一区二区| 内射极品少妇av片p| www.色视频.com| 国产精品久久久久久精品电影小说 | 又爽又黄a免费视频| 精品国产一区二区三区久久久樱花 | 深夜a级毛片| 亚洲国产最新在线播放| videos熟女内射| 国产av码专区亚洲av| 视频区图区小说| 免费观看的影片在线观看| 亚洲av中文字字幕乱码综合| 欧美亚洲 丝袜 人妻 在线| av卡一久久| 一级爰片在线观看| 国产精品av视频在线免费观看| 人妻系列 视频| 精品国产露脸久久av麻豆| 毛片一级片免费看久久久久| 一个人看的www免费观看视频| 免费大片18禁| 欧美日本视频| 久久ye,这里只有精品| 联通29元200g的流量卡| 各种免费的搞黄视频| 午夜精品国产一区二区电影| 久久精品久久久久久噜噜老黄| 国产精品伦人一区二区| 婷婷色综合大香蕉| 久热久热在线精品观看| 一区在线观看完整版| 成年免费大片在线观看| 国产精品国产三级专区第一集| 国产美女午夜福利| 男女边摸边吃奶| 久久久久网色| 人体艺术视频欧美日本| 日韩欧美精品免费久久| 国产精品一区二区在线观看99| 91久久精品国产一区二区成人| 99re6热这里在线精品视频| 18禁在线播放成人免费| 99re6热这里在线精品视频| 一级二级三级毛片免费看| 午夜免费男女啪啪视频观看| 中国国产av一级| 18+在线观看网站| 精品久久久久久久久av| 在线观看免费视频网站a站| 久久久国产一区二区| 黄色欧美视频在线观看| 有码 亚洲区| 亚洲丝袜综合中文字幕| 激情五月婷婷亚洲| 欧美老熟妇乱子伦牲交| 欧美性感艳星| 人人妻人人爽人人添夜夜欢视频 | 少妇裸体淫交视频免费看高清| 中国美白少妇内射xxxbb| 国产视频首页在线观看| 亚洲性久久影院| 久久人人爽av亚洲精品天堂 | 久久午夜福利片| av天堂中文字幕网| 高清欧美精品videossex| 欧美三级亚洲精品| 精品一区二区三区视频在线| 欧美xxⅹ黑人| 午夜免费鲁丝| 亚洲欧美一区二区三区国产| 一本久久精品| 男女无遮挡免费网站观看| 日韩av在线免费看完整版不卡| 国产成人a∨麻豆精品| 亚洲丝袜综合中文字幕| 少妇人妻 视频| 久久精品国产亚洲网站| 高清午夜精品一区二区三区| 深爱激情五月婷婷| 成人美女网站在线观看视频| 婷婷色综合大香蕉| 亚洲欧美日韩卡通动漫| 成年免费大片在线观看| 国产熟女欧美一区二区| 校园人妻丝袜中文字幕| 国产色婷婷99| 边亲边吃奶的免费视频| 亚洲国产欧美人成| 尤物成人国产欧美一区二区三区| 国产高清不卡午夜福利| 2018国产大陆天天弄谢| 久久久久久久久久久丰满| 日本与韩国留学比较| 国产淫片久久久久久久久| 亚洲人成网站在线观看播放| 亚洲国产欧美在线一区| 亚洲av在线观看美女高潮| 九九在线视频观看精品| 人体艺术视频欧美日本| 中文精品一卡2卡3卡4更新| 久久国内精品自在自线图片| 人人妻人人看人人澡| 九九久久精品国产亚洲av麻豆| 麻豆精品久久久久久蜜桃| 亚洲第一区二区三区不卡| 久久97久久精品| h视频一区二区三区| 日本av免费视频播放| 性色avwww在线观看| 国产精品99久久久久久久久| 亚洲av福利一区| 亚洲精品一区蜜桃| 日韩av不卡免费在线播放| 一本一本综合久久| 网址你懂的国产日韩在线| 亚洲av福利一区| 免费看日本二区| 国产永久视频网站| 国产亚洲精品久久久com| 久久久久久久久久成人| 多毛熟女@视频| 日本欧美视频一区| 99热国产这里只有精品6| 一区二区三区乱码不卡18| 国产成人freesex在线| 一级毛片久久久久久久久女| 日韩一区二区视频免费看| 国产成人免费观看mmmm| 在线免费观看不下载黄p国产| 国产探花极品一区二区| 少妇裸体淫交视频免费看高清| 少妇的逼水好多| 黑人高潮一二区| 妹子高潮喷水视频| 高清午夜精品一区二区三区| 最近手机中文字幕大全| 日韩国内少妇激情av| 多毛熟女@视频| videos熟女内射| 国产爱豆传媒在线观看| 精品久久久久久久末码| 国产欧美亚洲国产| 久久久久人妻精品一区果冻| 一个人免费看片子| 欧美亚洲 丝袜 人妻 在线| 乱系列少妇在线播放| 交换朋友夫妻互换小说| 女性被躁到高潮视频| 欧美日韩一区二区视频在线观看视频在线| 欧美性感艳星| 最近最新中文字幕大全电影3| 久久久久精品久久久久真实原创| 亚洲国产毛片av蜜桃av| 日韩电影二区| 日韩制服骚丝袜av| 在线免费观看不下载黄p国产| 成人毛片a级毛片在线播放| 亚洲四区av| 精品熟女少妇av免费看| 一级毛片久久久久久久久女| 一个人免费看片子| 欧美日韩在线观看h| 亚洲人与动物交配视频| 一级毛片黄色毛片免费观看视频| 国产精品久久久久久av不卡| 一个人看视频在线观看www免费| 国产视频首页在线观看| 日韩一区二区视频免费看| 日韩三级伦理在线观看| 国产日韩欧美亚洲二区| 男女下面进入的视频免费午夜| 精品亚洲成国产av| av一本久久久久| 亚洲久久久国产精品| 久久午夜福利片| 91久久精品电影网| 热re99久久精品国产66热6| 亚洲av成人精品一二三区| 精品久久久噜噜| 亚洲国产精品一区三区| 国产高清不卡午夜福利| 狂野欧美激情性bbbbbb| 国产一区二区在线观看日韩| 欧美一级a爱片免费观看看| 成人18禁高潮啪啪吃奶动态图 | 国精品久久久久久国模美| 99视频精品全部免费 在线| 熟女人妻精品中文字幕| 国产一区二区在线观看日韩| 久久国产精品男人的天堂亚洲 | 伦理电影大哥的女人| 亚洲av免费高清在线观看| 国产亚洲5aaaaa淫片| 欧美 日韩 精品 国产| 97超视频在线观看视频| 亚洲国产精品999| 六月丁香七月| 国产爱豆传媒在线观看| 亚洲国产成人一精品久久久| 又粗又硬又长又爽又黄的视频| 麻豆成人av视频| 精品久久久精品久久久| 汤姆久久久久久久影院中文字幕| 直男gayav资源| 国产精品欧美亚洲77777| 九草在线视频观看| 麻豆成人午夜福利视频| 美女主播在线视频| 成人综合一区亚洲| 免费观看性生交大片5| 日本-黄色视频高清免费观看| 久久精品国产亚洲网站| 色婷婷av一区二区三区视频| 秋霞伦理黄片| 最近中文字幕高清免费大全6| 欧美区成人在线视频| 亚洲欧美日韩另类电影网站 | 久久精品久久久久久久性| 亚洲av.av天堂| 人人妻人人看人人澡| 亚洲成人手机| 亚洲精品乱码久久久久久按摩| 晚上一个人看的免费电影| 国产男人的电影天堂91| 日韩,欧美,国产一区二区三区| 国产精品熟女久久久久浪| 在线观看免费日韩欧美大片 | 国产精品久久久久久精品古装| 最近最新中文字幕免费大全7| 熟女av电影| 亚洲va在线va天堂va国产| 免费高清在线观看视频在线观看| 美女高潮的动态| 少妇丰满av| 久久国产乱子免费精品| 国产精品一二三区在线看| 午夜福利在线在线| 99热这里只有是精品在线观看| 在线观看免费日韩欧美大片 | 我要看黄色一级片免费的| 亚洲中文av在线| 精品久久久久久久末码| 国产av码专区亚洲av| 国产亚洲精品久久久com| 成人亚洲欧美一区二区av| 日韩欧美精品免费久久| 99视频精品全部免费 在线| 亚洲综合精品二区| 制服丝袜香蕉在线| 欧美精品亚洲一区二区| 国产爱豆传媒在线观看| 亚洲精品成人av观看孕妇| freevideosex欧美| 美女视频免费永久观看网站| 在线观看一区二区三区| 内地一区二区视频在线| 免费久久久久久久精品成人欧美视频 | 亚洲av成人精品一区久久| 亚洲国产精品一区三区| 亚洲电影在线观看av| 免费看日本二区| 中文精品一卡2卡3卡4更新| 看免费成人av毛片| 欧美精品亚洲一区二区| 日本vs欧美在线观看视频 | 性高湖久久久久久久久免费观看| 18禁在线播放成人免费| 国模一区二区三区四区视频| 欧美日韩综合久久久久久| 国产精品久久久久久av不卡| 少妇高潮的动态图| av国产久精品久网站免费入址| 人人妻人人澡人人爽人人夜夜| 美女cb高潮喷水在线观看| 人妻夜夜爽99麻豆av| 少妇 在线观看| 哪个播放器可以免费观看大片| 超碰97精品在线观看| 国产午夜精品久久久久久一区二区三区| 建设人人有责人人尽责人人享有的 | 看十八女毛片水多多多| 六月丁香七月| 制服丝袜香蕉在线| 在线免费观看不下载黄p国产| 婷婷色综合大香蕉| 乱码一卡2卡4卡精品| 亚洲内射少妇av| 国产在线免费精品| 久久人人爽人人片av| 国产欧美另类精品又又久久亚洲欧美| 久久久久国产网址| 在线免费观看不下载黄p国产| 一本—道久久a久久精品蜜桃钙片| 亚洲,欧美,日韩| 精品人妻熟女av久视频| 一级毛片 在线播放|