• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Variable-length sequential dynamic features-based malware detection①

    2016-12-29 05:34:27DuDonggao杜冬高LiGaochaoMaYan
    High Technology Letters 2016年4期

    Du Donggao (杜冬高), Li Gaochao, Ma Yan

    (*Network and Information Center, Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China)(**Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) (***National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, P.R.China)(****Institute of Information Engineering,Chinese Academy of Sciences, Beijing 100029, P.R.China)

    ?

    Variable-length sequential dynamic features-based malware detection①

    Du Donggao (杜冬高)②*, Li Gaochao*******, Ma Yan***

    (*Network and Information Center, Institute of Network Technology, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China)(**Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) (***National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, P.R.China)(****Institute of Information Engineering,Chinese Academy of Sciences, Beijing 100029, P.R.China)

    In order to solve the problem that traditional signature-based malware detection systems are inefficacious in detecting new malware, a practical malware detection system is constructed to find out new malware. Application programming interface (API) call sequence is introduced to capture activities of a program in this system. After that, based on variable-length n-gram, API call order can be extracted from API call sequence as the malicious behavior feature of a software. Compared with traditional methods, which use fixed-length n-gram, the solution can find more new malware. The experimental results show that the presented approach improves the accuracy of malware detection.

    application programming interface (API) call order, variable-length, n-gram, malware detection

    0 Introduction

    Short for malicious software, malware is designed to exhaust system/network resources or infringe on a person’s privacy. Examples of such malware include virus, worms, Trojans and bots. Currently, the main difficulty of malware detection is the explosive growth of malware, which also presents great challenges to our nowadays society. According to China Internet Security Research Report in 2013, 1.2G suspicious samples were received, and 40.8 million samples were identified. Thus, signature-based malware detection systems need to update the signature repository constantly. However, it is impossible because of the exponential growth of malware. Actually, the number of the malware increases continuously because most of them have been widely adopted by self-protection techniques. Malware based on these techniques is divided into two categories: polymorphic and metamorphic[1]. Polymorphic malware has embedded encrypt engines. Therefore, it uses a random key to generate a new copy while being copied. As a result, the new copy generated by this technique is different from original malware, which leads to a large number of samples. Obviously, it is too hard to detect this type of malware by conventional detection of signature-based malware. Compared with polymorphic malware, metamorphic malware is the most complex type of malware because it can change self-forms each propagating and produce a new variant. The ways that malware alters itself are as follows: dead code insertion such as NOP instruction, register renaming, code transportation and instruction substitution. Thus, these transform techniques make many signature-based detection ineffective.

    In the beginning, to extend the capabilities of string based signatures, various algorithms have been employed to detect malware variants with superior classification. The n-gram algorithm was first used in natural language processing field which assumed that the probability of the m-th byte conditions is on the occurrence of the preceding m-1 bytes. Then, n-gram algorithm was used in intrusion and malware detection field. Ref.[2] used varied-length n-grams in intrusion detection. Ref.[3] used n-gram algorithm to extract features from byte sequences. In malware detection field, an n-gram is one of all possible fixed or varied sized substring extracted from a larger string. Traditionally, it is a fixed-length byte string. For example, Ref.[4] first used machine learning to extract feature from PE head file as a signature that consisted of byte sequence based on four-gram. Refs[5,6] used data mining, machine learning and four-gram-based methods, then computed the information gain (IG) to select the most relevant 500 features which were formed from four byte strings in binary executables. Ref.[7] conducted several experiments in which they evaluated the mixtures of seven kinds of feature selection techniques, three classifiers and n-gram byte. However, n-grams are ineffective with polymorphic malware because of the changes of instruction level content[8].

    In order to avoid the defects of n-gram byte based signature, malware behavior has been investigated. Since API is a procedure call interface to system’s resource, API call sequence is an excellent candidate for analyzing any malware behavior. For example, Ref.[9] firstly regarded API call sequence as a feature of a malware. Moreover, he constructed normal behavior profiles by short sequence of system call and used Hamming distance matching to construct an intrusion detection system. Besides, different order of each API in sequence infers different behavior model. Afterward, an extensive research worked on API calls, such as Ref.[10], Ref.[11] and Ref.[12].

    Ye analyzed API call sequence extracting from PE files and used it as the feature to construct the intelligent malware detection system (IMDS)[13]. Ref.[14] constructed a signature for an entire malware family by static statistical comparison of the correlation of malware semantics and its API calls. They created a profile of a program behavior based on the frequency of critical API calls extracted from a program by statistical technique, then used them as a signature for malware family.

    Therefore, it is a good choice to combine API call sequence with n-gram algorithm in malware detection. For example, Ref.[15] extracted API call sequence from an execution program by the dynamic analysis method, then utilized conventional fixed-length n-gram to constitute the feature set which consisted of the feature obtained from API call sequence. Finally, they used a best first selection method to reduce the size of feature set and got the optimal solution of n equaled four according to experimental results.

    Currently, the most popular method of analysis of API call sequence uses fixed-length n-grams. Because the host makes fixed n-gram presentation, which is simple and more susceptible, the intruders desire that they could gain benefits by secreting malware and reaching the host. Moreover, some malware producers can escape the conventional detection, which is based on fixed-length n-gram, by inserting independent API call or irrelevant API call transposition obfuscation techniques in process.

    To solve the above problems, a novel method is proposed to extract API call order from API call sequence as the feature by using variable-length n-gram. The rest of the paper is organized as follows: Section 1 presents our proposed approach. In Section 2, the experimental results are described and discussed. Finally, the study will come to the conclusion.

    1 Proposed approach

    A novel method based on variable-length sequential dynamic features for malware detection is proposed, which focuses on mining API call sequence for detecting unknown malware and malware variants. Above all, it is needed to extract the API call order of variable length from the API call sequence. Feature extraction model is shown in Fig.1.

    Fig.1 Feature extraction model

    In the feature extraction model, firstly, API call sequence is extracted by executing program in Cuckoo Sandbox, an open source simulator of operating system. Secondly, API call order is extracted from the API call sequence by using variable-length n-gram. At last, the most discriminative features are selected to speed up the system.

    1.1 API call sequence

    At first, it is needed to extract API call sequence from executable files. There are two categories of methods to extract API call sequence. One is static analysis, the other is dynamic analysis.

    Although static analysis can find all executing paths of malware, three main problems exist. To begin with, for most of packed malware, they need to be unpacked by particular tools such as UPX and PEID, which leads to hard work and failure sometimes. Then, it is fail to deal with polymorphic malware which could not be decrypted. Furthermore, it is hard to make a conclusion in some decision points so that a random decision is generally made in these points.

    Compared with static analysis, dynamic analysis can solve these defects above. Dynamic analysis refers to analyze behaviors of the running executable program[16]. It is a method which actually executes a program in a controlled environment and monitors its behavior, system interaction, and the effects on the host machine. Generally, a program is running in a virtual machine or a sandbox, at the same time, it is monitored and logged API call sequence.

    These sequences are usually used as feature sets in heuristic malware detection methods. The proposed approach is based on mining these features. There are some problems in dealing with API call sequence by data mining technique.

    1.2 API sequence fragmentation

    It is needed to construct a feature set according to extracted API call sequence when using the data mining technique. It is simple that each API call is used as a feature. Common method uses the identifying distinct API call order from this sequence set as a new feature to construct feature set. Although this method is simple and fast, it leads to low accuracy of detection method based on the feature set that misses an important portion of behavioral information of programs.

    The n-gram method can fragmentize the API call sequence without missing significant information about call ordering. Eskandari extracted features from API call sequence and these features are based on conventional fixed-length n-gram method. And also, their experimental results showed that this method was better than the aforementioned one.

    However, the method based on fixed-length n-gram has some problems. On one hand, different behavior of a malware corresponds to the different API call order. Furthermore, the number of API call is variable when malware completes different operations. Therefore, it is difficult for fixed API call to fully describe the behavior of malware. For example, malware completes a malicious operation through combination of CopyFileA, RegOpenKeyExA and RegSetValueExA (n equals tree), which is also used as a feature and can improve the accuracy of malware detection. However, Ref.[15] set n to the only value four according to their experimental results and they must not choose the 3-gram. In our experiments, the above combination appears with RegCloseKey, DeleteFileA, RegCreateKeyExA, WSAStartup or CreateThread, and these new combination (n=4) will no longer be used as features. On the other hand, the malware producers can escape the conventional detection, which use fixed-length n-gram method by inserting independent API call in process.

    To solve above problems, different length grams are selected as features and set n to two, three, and four. Therefore, a new approach is proposed to extract fragments from each API call sequence by using variable-length n-gram and build a feature set with these fragments.

    Algorithm 1: extract variable-length fragment from API calls and join the Ctmp

    Input: Sin: set of API call sequences; //each sequence corresponds to a sample;

    N: window length;

    Output: Cout: constructed candidate feature set;

    Ctmp: an empty set;

    for each sequence s in Sin do

    for each API i in s do

    for each k in N do

    fk= get a set of ithAPI up to (k+i)thitem;

    add fkto Ck// Ckis a set of k length;

    End

    Add Ckto Ctmp

    end

    end

    Cout= fetch unique features from Ctmp

    Return Cout; //A set of subsequences

    1.3 Candidate signature selection

    (1) Information gain (IG)

    Information gain is the reduction of entropy (or uncertainty) caused by partitioning a collection of examples according to a feature. It is a measure of the effectiveness of a feature in classifying examples[17]. The information gain IG(Ng) of a given n-gram(Ng) is defined in Eq.(1), and features are selected by computing the information gain for each fragment.

    (1)

    where Ng is a fragment (n-gram of API call sequence), C is the class of the samples and can be divided into two categories: Benign (B) and Malware (M), VNgis the value of n-gram Ng, VNg=1 if n-gram Ng occurs in the sample. It is 0, otherwise. P(VNg, C) is the proportion that feature Ng has the value VNgin the class C, P(VNg) is the proportion that feature Ng has the value VNgin the training data, P(C) is the proportion of the training samples belonging to the class C. (2) Candidate feature selection

    Each fragment (n-gram) can be used as a feature, but not every feature is valuable. Such as, Email-Worm-Win32.NetSky.a has 44 kinds of 1-gram, 174 kinds of 2-gram, 321 kinds of 3-gram, 443 kinds of 4-gram and 568 kinds of 5-gram. In particular, all samples resulted in 44306 kinds of distinct n-gram when N equals five. One problem in this method is that the number of features is very large, which is dimension required, so the grams that have more valuable are chosen as candidate features.

    According to the information gain, the best first selection method is used to choose the optimal features as a candidate signature. To further reduce the amount of features, the elements in the set of Ckare sorted by descending order according to the information gain. By parameter ε, the number of feature selected from Ckis |Ck|×ε.

    (3) Signature selection

    For further reduce the number of the features, a new algorithm is constructed.

    Algorithm 2: generate the signature of variable-length gram

    Input: Cout: Candidate feature set;

    N:windows length;

    Output: Dout: feature set;

    Dout: an empty set;

    for each k in N do

    for each fkin Cout

    if (mc>bc and α>0.6) then

    End

    end

    add Dkto Dout

    end

    return Dout

    2 Experimental setup

    In this section, the presented approach is evaluated. The used database and performance measures are described in detail.

    2.1 Dataset description

    Our experimental data consists of 172 benign executables and 183 Massive Mailing Worms as malware set, all of which are in Windows PE format. A mailing worm spreads copies of itself by email according to system mail addresses. These malware families include Bagle, Netsky, Zhetalin, Mydoom, and so on. And all downloaded from VX Heavens[18].

    2.2 Experimental environment

    API call sequences of samples are dynamically extracted from a fresh installed Microsoft Windows XP SP3 on a virtual machine. Moreover, some popular softwares are installed on that machine such as Microsoft Office, Python, Foxmail. The hardware configuration includes a Core(TM) i3-2.3GHz processor and 4 GB of RAM. The host is Ubuntu 13.04 server 64 bit operation system and the sandbox is Cuckoo 1.0.

    2.3 Performance measure and classification

    In this section, some commonly used measures are presented for evaluating the approach and measuring quantitatively of classification results.

    Main parameters are described as follows:

    (2)

    where TP refers to true positive rate, FP indicates false positive rate.

    (3)

    where FN refers to false negative rate.

    The evaluation system is verified by the harmonic mean F-measure.

    (4)

    The classifier described is a Na?ve Bayes classifier[19]. In order to reduce variability, five-fold cross validation is used.

    2.4 Discussion

    Firstly, feature set via algorithm 1 is constructed when parameter N is set to four. Table 1 shows the results of both traditional and our algorithms when N equals four.

    Secondly, optimal parameter ε is chosen according to Algorithm 2. Parameter ε determines the number of candidate features. Finally K is set to 2, 3, and 4 to construct variable-length feature set as new signatures. α is a parameter in Bayes classification, which is the probability that the test sample is malicious when samples contain the feature. The threshold of 0.6 is chosen empirically through experimental testing.

    Table 1 Parameter N and the number of unique gram

    In the experiments, the number of signature is zero sometimes when parameter ε is equal to 0.1 or 0.2. Fig.2 shows a mean of F-measure of different parameter ε. When value of parameter ε is more than 0.7, F-measure tends to a fixed value. Results indicate that the approach achieves best performance when value of parameter ε is 0.5.

    Fig.2 The F-measure value and the number of signature of different Parameter ε

    The classifier mentioned above has higher detection accuracy, the comparison of the proposed approach with traditional approach (fixed-length n-gram, N equals four) in the aspect of accuracy sees Table 2. Results show that the approach achieves better performance.

    Table 2 F-measure results of classification for traditional approach and the approach

    3 Conclusion

    A novel method is proposed to extract API call order from API call sequence as the feature by using variable-length n-gram instead of conventional fixed-length n-gram. Moreover, these algorithms are implemented in a prototype and the performance of the system is evaluated. According to the results, the approach is better than conventional approaches.

    In the future work, testing this method is done over a larger set of malware and benign executables. In addition with a larger data set, evaluating this method will be carried out on different types of malware such as virus and Trojans. Furthermore, other classification such as decision tree, random tree and support vector machine will be tested. Finally, the API call sequences, which are used by a program, represent a good choice and have been widely used in behavioral analysis of malware. Compared with syntactic features, control flow is more invariant and can be a good choice. Therefore, API call sequence will be combined with the control flow in malware detection.

    [ 1] Dube T, Raines R, Peterson G, et al. Malware target recognition via static heuristics. Computers & Security, 2012, 31(1): 137-147

    [ 2] Jiang G F, Chen H F, Ungrureanu C, et al. Multiresolution abnormal trace detection using varied-length n-grams and automata. IEEE Transactions on System, Man, and Cybernetics, 2007, 37(1): 86-97

    [ 3] Kephart J O, Arnold W C. Automatic extraction of computer virus signature. In: Proceeding of the 4th Virus Bulletin International Conference, Abingdon, England, 1994. 179-194

    [ 4] Schultz M, Eskin E, Zadok E, et al. Data mining methods for detection of new malicious executables. In: Proceeding of IEEE Symposium on Security and Privacy, Los Alamitos, USA, 2001. 38-49

    [ 5] Kolter J Z, Maloof M A. Learning to detect malicious executables in the wild. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, USA, 2004. 470-478

    [ 6] Kolter J Z, Maloof M A. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research, 2006, 7: 2721-2744

    [ 7] Cai D M, Gokhale M, Theiler J. Comparison of feature selection and classification algorithms in identifying malicious executables. Computational Statistics and Data Analysis, 2007, 51(6): 3156-3172

    [ 8] Cesare S, Xiang Y, Zhou W L. Control flow-based malware variant detection. IEEE Transactions on Dependable and Secure Computing, 2014, 11(4): 307-317

    [ 9] Hofmeyr S, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1998, 6(3):151-180

    [10] Bergeron J, Debbabi M, Desharnais J, et al. Static detection of malicious code in executable programs. In: Proceedings of the 2001 Symposium on Requirements Engineering for Information Security, Indianapolis, USA, 2001. 184-189

    [11] Sekar R, Bendre M, Bollineni P, et al. A fast automaton-based approach for detecting anomalous program behaviors. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, USA, 2001. 144-155

    [12] Sung A H, Xu J, Chavez P, et al. Static analyzer of vicious executables. In: Proceedings of the 20th Annual Computer Security Applications Conference, Tuson, USA, 2004. 326-334

    [13] Ye Y F, Wang D D, Li T, et al. IMDS: intelligent malware detection system. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, USA, 2007. 1043-1047

    [14] Sathyanarayan V S, Kohli P, Bruhadeshwar B. Signature generation and detection of malware families. In: Proceedings of the 13th Australia Conference on International Security and Privacy, Wollongong, Australia, 2008. 336-349

    [15] Eskandari M, Khorshidpur Z, Hashemi S. To incorporate sequential dynamic features in malware detection engines. In: Proceedings of the 2012 European Intelligence and Security Informatics Conference, Odense, Denmark, 2012. 46-52

    [16] Egele M, Sholte T, Kirda E, et al. A survey on automated dynamic malware analysis techniques and tools. ACM Computing Surveys, 2012, 44(2): 1-42

    [17] Ding Y X, Yuan X B, Zhou D, et al. Feature representation and selection in malicious code detection methods based on static system calls. Journal of Computer Security, 2011, 30(6-7): 514-524

    [18] VX Heavens, http://vx.netux.org: Netux, 2013

    [19] Lewis D. Na?ve (Bayes) at forty: The independence assumption in information retrieval. In: Proceedings of the 10th European Conference on Machine Learning, Chemnitz, Germany, 1984. 4-15

    Du Donggao, born in 1978. He is a Ph.D student in Institute of Network Technology of Beijing University of Posts and Telecommunications. He received his M.S. degree in Computer Science Department of East China University of Science and Technology in 2008. He also received his B.S. degree from Henan Polytechnic University in 2001. His research interests include information security, malware detection.

    10.3772/j.issn.1006-6748.2016.04.004

    ① Supported by the National High Technology Research and Development Programme of China (No. 2013AA014702), the Fundamental Research Funds for the Central University (No. 2014PTB-00-04) and the China Next Generation Internet Project (No. CNGI-12-02-027).

    ② To whom correspondence should be addressed. E-mail: dudonggao@126.com Received on Oct. 29, 2015

    九九爱精品视频在线观看| 精品午夜福利在线看| 综合色丁香网| 成年女人毛片免费观看观看9| 国产欧美日韩精品一区二区| 国内少妇人妻偷人精品xxx网站| 国产精品一及| 午夜免费激情av| 高清毛片免费看| 特级一级黄色大片| 日本五十路高清| 日日撸夜夜添| 一级毛片我不卡| 精品午夜福利视频在线观看一区| av在线亚洲专区| 日韩一本色道免费dvd| 亚洲av美国av| 亚洲最大成人手机在线| 精品国内亚洲2022精品成人| 午夜福利高清视频| 综合色av麻豆| 国产欧美日韩一区二区精品| 日日摸夜夜添夜夜添小说| 在线a可以看的网站| 少妇丰满av| 日本a在线网址| 欧美丝袜亚洲另类| 看黄色毛片网站| ponron亚洲| av免费在线看不卡| 午夜老司机福利剧场| 精品久久久久久成人av| 看免费成人av毛片| 成人国产麻豆网| 国产高清有码在线观看视频| 亚洲人成网站在线播| 久久久久国产精品人妻aⅴ院| 亚洲成人中文字幕在线播放| 91久久精品国产一区二区成人| 久久精品国产99精品国产亚洲性色| 亚洲欧美成人精品一区二区| 成人三级黄色视频| 亚洲高清免费不卡视频| 老师上课跳d突然被开到最大视频| 亚洲精品一卡2卡三卡4卡5卡| 久久精品夜夜夜夜夜久久蜜豆| 狠狠狠狠99中文字幕| 欧美中文日本在线观看视频| 一个人看的www免费观看视频| 男人舔女人下体高潮全视频| 99国产精品一区二区蜜桃av| 中文字幕人妻熟人妻熟丝袜美| 在线a可以看的网站| 免费av毛片视频| 国产一区二区在线av高清观看| 嫩草影院精品99| 高清午夜精品一区二区三区 | 午夜日韩欧美国产| 欧美激情久久久久久爽电影| 日本黄色视频三级网站网址| 国产乱人视频| 菩萨蛮人人尽说江南好唐韦庄 | 热99re8久久精品国产| 国产中年淑女户外野战色| 免费在线观看成人毛片| 免费看日本二区| 精品久久久久久久久久久久久| 国内精品久久久久精免费| 欧美+日韩+精品| 熟女电影av网| 亚洲精品亚洲一区二区| 欧美bdsm另类| 久久人人爽人人爽人人片va| 国产高清有码在线观看视频| 久久午夜亚洲精品久久| 国产美女午夜福利| 99热这里只有精品一区| 日本一本二区三区精品| 久久精品91蜜桃| 亚洲自偷自拍三级| 亚洲欧美日韩高清专用| 亚洲无线观看免费| 国产高清激情床上av| 欧美xxxx黑人xx丫x性爽| 国产又黄又爽又无遮挡在线| 大型黄色视频在线免费观看| 一个人免费在线观看电影| 久久精品国产亚洲网站| 成人高潮视频无遮挡免费网站| 国产一区二区在线观看日韩| 性色avwww在线观看| 亚洲av成人精品一区久久| 人妻夜夜爽99麻豆av| 亚洲熟妇熟女久久| 中文字幕精品亚洲无线码一区| 在线播放无遮挡| 久久人人精品亚洲av| 成人漫画全彩无遮挡| 欧美3d第一页| 99视频精品全部免费 在线| 精品乱码久久久久久99久播| 成人性生交大片免费视频hd| 欧美+日韩+精品| 精华霜和精华液先用哪个| 男女之事视频高清在线观看| 午夜久久久久精精品| 精品熟女少妇av免费看| 国产av不卡久久| 国产欧美日韩一区二区精品| a级毛色黄片| 观看美女的网站| 亚洲aⅴ乱码一区二区在线播放| 最新在线观看一区二区三区| 精品福利观看| 国产精品人妻久久久影院| 亚洲欧美中文字幕日韩二区| 天堂网av新在线| 日韩,欧美,国产一区二区三区 | 欧美成人a在线观看| 久久6这里有精品| 1024手机看黄色片| 久久午夜亚洲精品久久| 午夜爱爱视频在线播放| 亚洲婷婷狠狠爱综合网| 国产精品久久视频播放| 久久九九热精品免费| 午夜爱爱视频在线播放| 国产单亲对白刺激| 大又大粗又爽又黄少妇毛片口| 日日摸夜夜添夜夜添小说| av在线亚洲专区| 波野结衣二区三区在线| 男女啪啪激烈高潮av片| 2021天堂中文幕一二区在线观| 男人舔女人下体高潮全视频| 国产成年人精品一区二区| 听说在线观看完整版免费高清| 夜夜爽天天搞| 精品人妻熟女av久视频| 午夜激情欧美在线| 人妻制服诱惑在线中文字幕| 国产精品人妻久久久影院| 能在线免费观看的黄片| 少妇高潮的动态图| 国产亚洲91精品色在线| 如何舔出高潮| 我的老师免费观看完整版| 淫秽高清视频在线观看| 99久久成人亚洲精品观看| 你懂的网址亚洲精品在线观看 | 国产一区二区在线观看日韩| 亚洲欧美日韩高清专用| 亚洲最大成人中文| 亚洲av成人av| 欧美在线一区亚洲| 成年av动漫网址| 插逼视频在线观看| 99在线人妻在线中文字幕| 韩国av在线不卡| 亚洲国产精品合色在线| 成人亚洲欧美一区二区av| 国产亚洲精品综合一区在线观看| 欧美成人a在线观看| 露出奶头的视频| 97在线视频观看| 婷婷六月久久综合丁香| av免费在线看不卡| 久久久久久国产a免费观看| 我要搜黄色片| 在现免费观看毛片| 成年女人毛片免费观看观看9| 精品久久久久久久久久免费视频| 精品少妇黑人巨大在线播放 | 毛片一级片免费看久久久久| 色视频www国产| 成人一区二区视频在线观看| av福利片在线观看| 亚洲精品日韩在线中文字幕 | 一边摸一边抽搐一进一小说| 免费人成在线观看视频色| 成年版毛片免费区| 人人妻,人人澡人人爽秒播| 亚洲美女黄片视频| 国产国拍精品亚洲av在线观看| 亚洲av一区综合| 午夜福利视频1000在线观看| 国产精品一区www在线观看| 色尼玛亚洲综合影院| 亚洲欧美成人精品一区二区| 日本黄大片高清| 成人三级黄色视频| 欧美一区二区国产精品久久精品| 亚洲精品国产av成人精品 | 一级黄色大片毛片| 激情 狠狠 欧美| 九九爱精品视频在线观看| 精品一区二区三区人妻视频| 卡戴珊不雅视频在线播放| 亚洲在线观看片| 亚洲乱码一区二区免费版| 18禁在线无遮挡免费观看视频 | 日韩欧美免费精品| 亚洲三级黄色毛片| 久久国产乱子免费精品| 熟女人妻精品中文字幕| 亚洲成人av在线免费| 色综合站精品国产| 级片在线观看| 91av网一区二区| 亚洲aⅴ乱码一区二区在线播放| 亚洲精品456在线播放app| 欧美高清性xxxxhd video| 欧美zozozo另类| 亚洲av不卡在线观看| 国产欧美日韩精品一区二区| 不卡一级毛片| 一进一出好大好爽视频| 午夜精品在线福利| 日本三级黄在线观看| 日韩,欧美,国产一区二区三区 | 久久国内精品自在自线图片| 欧美丝袜亚洲另类| 看片在线看免费视频| 国产高清视频在线播放一区| 日本精品一区二区三区蜜桃| 最近在线观看免费完整版| 国产高清三级在线| 欧美三级亚洲精品| 国产欧美日韩精品亚洲av| 久久午夜亚洲精品久久| 精品国内亚洲2022精品成人| 国产精品美女特级片免费视频播放器| 欧美色欧美亚洲另类二区| 久久亚洲国产成人精品v| 97碰自拍视频| 精品久久国产蜜桃| 国产黄色小视频在线观看| 99久国产av精品国产电影| 国内久久婷婷六月综合欲色啪| 国产精品久久久久久久电影| 乱人视频在线观看| 久久精品国产亚洲av天美| 寂寞人妻少妇视频99o| 久久久久久大精品| 亚洲久久久久久中文字幕| 你懂的网址亚洲精品在线观看 | 大又大粗又爽又黄少妇毛片口| 精品人妻视频免费看| а√天堂www在线а√下载| 九九爱精品视频在线观看| 99视频精品全部免费 在线| 蜜臀久久99精品久久宅男| 亚洲av免费在线观看| 午夜福利在线观看吧| 少妇人妻一区二区三区视频| 免费观看人在逋| 最新在线观看一区二区三区| 亚洲性久久影院| 美女大奶头视频| 久久6这里有精品| 欧美国产日韩亚洲一区| 小说图片视频综合网站| 黑人高潮一二区| 人妻少妇偷人精品九色| 日韩成人伦理影院| 少妇丰满av| 亚洲va在线va天堂va国产| 亚洲av中文字字幕乱码综合| 色噜噜av男人的天堂激情| 精品久久久久久久末码| 国内久久婷婷六月综合欲色啪| 久久久午夜欧美精品| 久久国内精品自在自线图片| 欧美最新免费一区二区三区| 男女之事视频高清在线观看| 亚洲性久久影院| 亚洲精品粉嫩美女一区| 成人美女网站在线观看视频| 色吧在线观看| 蜜桃久久精品国产亚洲av| 久久欧美精品欧美久久欧美| 乱系列少妇在线播放| 中文亚洲av片在线观看爽| 成人午夜高清在线视频| 搞女人的毛片| 18禁在线播放成人免费| 久久久久久久久中文| 在线免费观看的www视频| 色av中文字幕| 国产av在哪里看| 亚洲四区av| 亚洲色图av天堂| 成人特级av手机在线观看| 女的被弄到高潮叫床怎么办| 亚洲美女黄片视频| 久久99热6这里只有精品| 国内精品美女久久久久久| 校园人妻丝袜中文字幕| 亚洲av电影不卡..在线观看| av在线亚洲专区| 网址你懂的国产日韩在线| av天堂在线播放| 亚洲欧美日韩卡通动漫| 精品久久久久久久久久免费视频| av天堂中文字幕网| 深夜精品福利| 可以在线观看的亚洲视频| 国产色爽女视频免费观看| 国产一级毛片七仙女欲春2| 久久久精品94久久精品| 干丝袜人妻中文字幕| 黄色配什么色好看| 91麻豆精品激情在线观看国产| 男人和女人高潮做爰伦理| 日韩欧美在线乱码| 亚洲精品成人久久久久久| 春色校园在线视频观看| 人妻丰满熟妇av一区二区三区| 日韩精品青青久久久久久| 亚洲av第一区精品v没综合| 久久精品国产鲁丝片午夜精品| 国产精品一区二区性色av| 国产精品精品国产色婷婷| 亚洲三级黄色毛片| 免费不卡的大黄色大毛片视频在线观看 | 国产精品伦人一区二区| 最好的美女福利视频网| 麻豆精品久久久久久蜜桃| 日韩av不卡免费在线播放| 精品欧美国产一区二区三| 欧美区成人在线视频| 欧美激情在线99| 欧美激情国产日韩精品一区| 搡老妇女老女人老熟妇| 日韩国内少妇激情av| 深爱激情五月婷婷| 91在线观看av| 欧美日韩乱码在线| 国产精品人妻久久久久久| 男女边吃奶边做爰视频| 亚洲人成网站在线观看播放| 九九热线精品视视频播放| 99热精品在线国产| 国产一区二区亚洲精品在线观看| 真人做人爱边吃奶动态| 中文字幕熟女人妻在线| 国产伦在线观看视频一区| a级毛片a级免费在线| 99精品在免费线老司机午夜| 国产成人福利小说| 中文字幕av在线有码专区| 麻豆国产97在线/欧美| 国产成人a区在线观看| 97超视频在线观看视频| 亚洲三级黄色毛片| 女生性感内裤真人,穿戴方法视频| 国产精品一区二区免费欧美| 免费高清视频大片| 天堂av国产一区二区熟女人妻| 国产黄a三级三级三级人| 青春草视频在线免费观看| 亚洲av成人av| 波多野结衣巨乳人妻| 麻豆国产97在线/欧美| 国产精品电影一区二区三区| 国产一区二区亚洲精品在线观看| 日韩在线高清观看一区二区三区| 综合色丁香网| 亚洲av五月六月丁香网| 99久久无色码亚洲精品果冻| 欧美激情久久久久久爽电影| av卡一久久| 国产黄片美女视频| 欧美xxxx黑人xx丫x性爽| 变态另类成人亚洲欧美熟女| 99久久精品国产国产毛片| 欧美日韩一区二区视频在线观看视频在线 | 国产精品精品国产色婷婷| 亚洲成av人片在线播放无| 欧美性猛交╳xxx乱大交人| 97超碰精品成人国产| 国产精品爽爽va在线观看网站| 国产亚洲精品综合一区在线观看| 观看美女的网站| 伊人久久精品亚洲午夜| 女人十人毛片免费观看3o分钟| 伦理电影大哥的女人| 少妇猛男粗大的猛烈进出视频 | 色综合亚洲欧美另类图片| 级片在线观看| 久久人人爽人人爽人人片va| 在线国产一区二区在线| 少妇裸体淫交视频免费看高清| 伊人久久精品亚洲午夜| 一区二区三区四区激情视频 | 久久精品久久久久久噜噜老黄 | 亚洲av成人精品一区久久| 国产精品野战在线观看| eeuss影院久久| 亚洲国产精品成人久久小说 | 一级毛片aaaaaa免费看小| 国产高清激情床上av| aaaaa片日本免费| 日本-黄色视频高清免费观看| 欧美zozozo另类| 91在线观看av| 国产黄a三级三级三级人| 99久久成人亚洲精品观看| 欧美日韩在线观看h| 亚洲欧美中文字幕日韩二区| 欧美日韩综合久久久久久| 久久精品夜色国产| 日本黄大片高清| 天天躁日日操中文字幕| 欧美+日韩+精品| a级毛片a级免费在线| 精品久久久久久久久久免费视频| 亚洲美女黄片视频| 校园春色视频在线观看| 99热只有精品国产| 免费一级毛片在线播放高清视频| 亚洲精品粉嫩美女一区| 国产伦一二天堂av在线观看| 国产精品久久久久久av不卡| 国产午夜福利久久久久久| 国产淫片久久久久久久久| 日本免费一区二区三区高清不卡| 女人被狂操c到高潮| 日韩精品有码人妻一区| 久久久久久久亚洲中文字幕| 九九热线精品视视频播放| 亚洲,欧美,日韩| av视频在线观看入口| 国产高清不卡午夜福利| 麻豆国产av国片精品| 久久精品人妻少妇| 老司机午夜福利在线观看视频| 成人国产麻豆网| 最近最新中文字幕大全电影3| 99在线人妻在线中文字幕| 97超碰精品成人国产| 最近中文字幕高清免费大全6| 亚洲经典国产精华液单| 国产欧美日韩一区二区精品| 2021天堂中文幕一二区在线观| 色av中文字幕| 亚洲精品色激情综合| 精品久久久久久久人妻蜜臀av| 成人漫画全彩无遮挡| 国产毛片a区久久久久| 午夜福利在线观看吧| 一本一本综合久久| 久久久久久九九精品二区国产| 97超级碰碰碰精品色视频在线观看| 97人妻精品一区二区三区麻豆| 久久久久久久久久久丰满| 黑人高潮一二区| 亚洲中文日韩欧美视频| 一夜夜www| 一级黄色大片毛片| 国产片特级美女逼逼视频| 神马国产精品三级电影在线观看| 蜜桃亚洲精品一区二区三区| 色综合亚洲欧美另类图片| 大又大粗又爽又黄少妇毛片口| 国产精品精品国产色婷婷| 老熟妇乱子伦视频在线观看| 午夜福利视频1000在线观看| 日韩人妻高清精品专区| 性欧美人与动物交配| 久久这里只有精品中国| 国产色婷婷99| 乱人视频在线观看| 成年版毛片免费区| 久久午夜亚洲精品久久| 日产精品乱码卡一卡2卡三| 校园春色视频在线观看| 深夜精品福利| 97超碰精品成人国产| 免费人成视频x8x8入口观看| 亚洲中文字幕一区二区三区有码在线看| 国产淫片久久久久久久久| 精品一区二区三区人妻视频| 日本免费a在线| 插阴视频在线观看视频| 欧美高清成人免费视频www| 精品一区二区免费观看| 欧美色欧美亚洲另类二区| 老熟妇仑乱视频hdxx| 高清毛片免费观看视频网站| 大香蕉久久网| 国产高清有码在线观看视频| 日本熟妇午夜| 男女之事视频高清在线观看| 成人永久免费在线观看视频| 听说在线观看完整版免费高清| 中文字幕av在线有码专区| 国国产精品蜜臀av免费| 成人精品一区二区免费| 欧美一区二区国产精品久久精品| 日日摸夜夜添夜夜添小说| 有码 亚洲区| 精品国内亚洲2022精品成人| 国产男人的电影天堂91| 国产在线精品亚洲第一网站| 精品久久久久久久久亚洲| 最近在线观看免费完整版| 国产亚洲精品久久久久久毛片| 免费人成视频x8x8入口观看| 天堂av国产一区二区熟女人妻| 免费av毛片视频| 国产又黄又爽又无遮挡在线| 99久久中文字幕三级久久日本| 真实男女啪啪啪动态图| 亚洲18禁久久av| 啦啦啦韩国在线观看视频| 国国产精品蜜臀av免费| 亚洲欧美成人精品一区二区| 我要搜黄色片| 色综合色国产| 国产一区二区激情短视频| 久久韩国三级中文字幕| 欧美日本视频| 欧美日韩乱码在线| 人妻制服诱惑在线中文字幕| 日韩av在线大香蕉| 99久久九九国产精品国产免费| 国产精品,欧美在线| 男插女下体视频免费在线播放| 亚洲欧美精品自产自拍| 亚洲欧美清纯卡通| 国产一级毛片七仙女欲春2| 日韩亚洲欧美综合| 久久久久久九九精品二区国产| 欧美xxxx性猛交bbbb| 97碰自拍视频| 露出奶头的视频| 69人妻影院| 少妇熟女aⅴ在线视频| 亚洲国产精品成人综合色| 三级经典国产精品| 卡戴珊不雅视频在线播放| 国语自产精品视频在线第100页| 久久午夜福利片| 国产老妇女一区| 国产片特级美女逼逼视频| 蜜臀久久99精品久久宅男| 如何舔出高潮| 美女黄网站色视频| 亚洲av中文字字幕乱码综合| 日韩成人av中文字幕在线观看 | 色综合亚洲欧美另类图片| 久久久久久久亚洲中文字幕| 色哟哟·www| 特级一级黄色大片| 校园人妻丝袜中文字幕| av福利片在线观看| 精品欧美国产一区二区三| 亚洲精品在线观看二区| 欧美成人精品欧美一级黄| 国产精品久久久久久精品电影| 又黄又爽又刺激的免费视频.| 国产国拍精品亚洲av在线观看| 99久久精品一区二区三区| 床上黄色一级片| 欧美高清成人免费视频www| 国产一区二区三区在线臀色熟女| 亚洲国产日韩欧美精品在线观看| 综合色丁香网| 成年版毛片免费区| 国产成人影院久久av| 中文字幕av成人在线电影| a级毛色黄片| 国产不卡一卡二| 蜜桃久久精品国产亚洲av| 深夜精品福利| 亚洲国产日韩欧美精品在线观看| 一区二区三区四区激情视频 | h日本视频在线播放| 毛片女人毛片| 日本五十路高清| 成年av动漫网址| 亚洲精品色激情综合| 亚洲精华国产精华液的使用体验 | 夜夜爽天天搞| 成年女人看的毛片在线观看| 日本一二三区视频观看| 亚洲中文字幕一区二区三区有码在线看| 久久久色成人| 小说图片视频综合网站| 在线免费十八禁| 国产男靠女视频免费网站| 最近的中文字幕免费完整| 中文字幕av成人在线电影| 国产麻豆成人av免费视频| 村上凉子中文字幕在线| 亚洲av电影不卡..在线观看| 男女下面进入的视频免费午夜| 国产 一区 欧美 日韩| 精品一区二区免费观看| 国产高清三级在线| 女生性感内裤真人,穿戴方法视频| 久久久久久久久久成人| а√天堂www在线а√下载| 人妻制服诱惑在线中文字幕| 给我免费播放毛片高清在线观看| 日韩人妻高清精品专区| 干丝袜人妻中文字幕| 国内揄拍国产精品人妻在线| 亚洲一区高清亚洲精品| 国产一区二区三区av在线 | 亚洲图色成人| 亚洲美女视频黄频| 国内精品久久久久精免费| 亚洲无线在线观看|