• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Aware-Scheduling Security Architecture with Priority-Equal Multi-Controller for SDN

    2017-04-09 05:53:02ChaoQiJiangxingWuGuozhenChengJianjianAiShuoZhao
    China Communications 2017年9期

    Chao Qi*, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, Shuo Zhao

    National Digital Switching System Engineering & Technological R&D Center Zhengzhou 450002, Henan, China

    * The corresponding author, email: 13937147170@163.com

    I. INTRODUCTION

    SDN frameworks, such as OpenFlow, introduce separation of data and control planes to achieve highly programmable switch infrastructure [1]. Nowadays, SDN has been widely applied in various fields and a large number of attacks on it appear. Thus, researchers have recently paid more attention to the security issues of SDN and a great deal of research have been conducted on it. Although from the view of protecting users directly, existing proposed mechanisms can improve the security of SDN,there is still urgent need to consider additional information concerning threats, and ideas how SDN should be secured [2].

    In SDN, the control layer is the critical part and responsible for handling and distributing the flows of information between network applications and the data plane. As key components in control layer, OpenFlow controllers [3][4][5][6] have been largely adopted to probe the data plane for state information,generate and deliver flow rules. They can communicate with switches within their network domain or slice [7]. And the set of flow rules distributed by them is of importance to optimize flow routes and improve the network efficiency [8]. Thus, it’s obvious that controllers play an important role in SDN applications.And it’s no doubt that the controller is bound to be an important target of attackers.

    Focusing on the modifying flow rule attack,the authors propose Mcad-SA, an aware decision-making security architecture with multi-controller, which exploits heterogeneity and redundancy from different controllers to prevent that attack proactively.

    From the perspective of network security,due to the fact that all unknown traffic must be transmitted to the controller for investigation, it’s common that malicious traffic may lead to Denial of Service (DoS) attack [9].Furthermore, most networks are managed by merely one controller, which may easily result in single failures. Besides, as there are no compulsory mechanisms for enforcing access control on applications [10], an application cooperating with the controller may have effect on the generation of flow rules if the application is infected with some malicious codes that attempt to impact rule generating process to worsen the effectiveness of generated rules. In other words, instead of paralyzing the controller, an attacker can enable the basic function of the controller but in extremely low efficiency.

    In order to address or alleviate the above problems, we exploit heterogeneity and redundancy from different controllers to construct the control plane, which means the network is no longer equipped with one controller but manipulated by multiple controllers which are priority-equal. Meantime, ADS algorithm is adopted to choose the most reliable controllers through perception to supervise the corresponding network. This mechanism can to some extent lower the controllers’ probability of being attacked, increase the attack cost and improve security further.

    The paper is organized as follows. The next section describes the problems we try to solve.

    Fig. 1 Modifying flow rule attack

    The third section introduces explicitly constitutions of Mcad-SA and the ADS algorithm.Section 4 presents experimental results. We present related work in Section 5. The last section concludes by summarizing our work and discussing future work.

    II. PROBLEM DESCRIPTION

    As illustrated in figure 1, the right flow rule generated by controllerbetween switch A and B is normally the green arrow. After the modifying flow rule attack, that rule is modified into the path along with the red arrow(i.e). We refer these ineffective rules as distorted rules. Obliviously, these distorted rules won’t influence the forwarding function because packets from switch A will eventually reach switch B. However, the network performance is dramatically decreased.What’s worse, it may cause traffic congestion to some critical links if the majority of distorted rules go through that link, which will lead to paralysis of the whole network in the end.

    The above depicted attack can be regarded as a high-level type of attack in control plane because it’s difficult for managers to detect the abnormity and determine whether the controller has been compromised or not in a short period. Thus, it’s urgent that a novel and effective method should be devised to deal with such attacks.

    In this paper, we propose Mcad-SA to address this problem. This architecture associates with various controllers to make the most use of their advantages of security respectively. And the key idea of this design is that flow rules in a network are no longer generated by a single controller, since multiple controllers will take part in the decision procedure to judge which controller produces the valid rules. As the difficulty and cost is increased tremendously when attackers attempt to compromise numerous controllers successfully simultaneously. Thus, the probability of altering flow rules via attacks gets low under this situation. Further, a scheduling mechanism called ADS is devised to protect the system from intruding easily, which is also an effective method to defend attackers. Hence, the defense strategy offered by this architecture can improve the robustness and resilience of the holistic network.

    III. THE DESIGN OF MCAD-SA

    First, we illustrates the overview of the Mcad-SA as shown in figure 2. Then specific functions are described for main components in the framework. Last but not the least, a scheduling algorithm is presented which combines probability theory to achieve better defense policies.

    3.1 Architecture

    3.1.1 Overview

    In addition to the data plane and control plane,a scheduling plane is introduced between them to assist the implementation of virtual functions (perception, scheduling, etc.) in Mcad-SA. The constitution and functions of different planes are described as follows:

    Data Plane:It’s identical to that in traditional SDN without any modification.

    Control Plane:Instead of deploying one controller, this plane is equipped with N (N≥3)controllers. And they possess the equal priority on the subnet they supervise. What’s more,N controllers are achieved on heterogeneous structures (POX, Ryu, Floodlight, etc.) which are implemented with various programming languages but with the coherent algorithm.One point to be specified specially, although these controllers are created in diverse ways,they achieve identical output when they acquire equal input, which means that these controllers will generate the same flow rules in the case that they receive identical network state information. Further, to enhance the level of security, all the controllers are deployed on diverse hosts with different operation systems(Windows, MacOS, Linux, etc.).

    Scheduling Plane:The virtual plane is the most important layer in Mcad-SA and responsible for interaction, decision-making and scheduling process in the sub-network.Due to its critical importance, it’s deployed on equipment with specific protection and high security. And it consists of four virtual function modules: Transponder, Sensor, Decider and Scheduler whose functions are depicted below.

    ●Transponder:The main goal of the transponder is gathering network information including topology, state information of switches and so on. Then collected information will be transmitted to all running controllers managing the same domain.On receiving messages some controllers merely store and update corresponding data while others are required to generate flow rules relying on the messages. And the role assigned to each controller is guided by the scheduler.

    ●Sensor:The primary purpose of sensor is monitoring the state of controllers in the control plane. For example, it will try to analyze whether they have been probed or exploited by attackers. If so, an alert message is produced and sent to the scheduler.This message is an indication of controllers’reliability.

    Fig. 2 The overview of Mcad-SA

    ●Decider:The vital function of the decider is receiving data produced by controllers and judging whether controllers are in benign conditions or not via comparing their flow rules. Then the decider chooses to send the most reliable rules to switches. The choice is made on the following assumption: the probability of successful attacks simultaneously to the majority of controllers is relatively low. Thus, the identical flow rules from the majority can be considered as secure, correct and effective rules. After the decision-making procedure, the decider will transmit a message to notify the scheduler of suspecting controllers’ information if it discovers incongruous flow rules.

    Fig. 3 Process of scheduling and decision-making

    Fig. 4 Flow Rule Attack under Mcad-SA

    ●Scheduler:The chief duty of the scheduler is responsible for selecting controllers to provide service for the network. In general,it picks M (M is usually an odd number and changeable and) from N controllers via the policy we design and generates flow rules respectively as described in figure 3.And there are two mechanisms under which the scheduler will switch M controllers.One is timer mechanism which indicates the scheduler is going to re-select new M controllers to implement the above procedure at fixed intervals. The other is that only when an alert or a notification message arrives at the scheduler does it execute the formal actions. Finally, according to results observed by the decider, the scheduler will notify the control plane to make adaptations or not.

    3.1.2 Workflow

    Next, we make a conclusion about the entire work flow in Mcad-SA. First, the transponder maintains collecting real-time state information of infrastructure and transmits them to controllers. In the meantime, the sensor keeps an eye on anomaly detection and intrusion attacks about controllers. It will notify the scheduler of real-time “healthy condition”about controllers. Then the scheduler selects M reliable controllers and the decider sends the valid instructions to switches. Then, once two mechanisms of the scheduler are activated, new M controllers will be chosen to generate their own flow rules respectively and present results to the decider for judgment.And if some rules are different from that of most controllers, the decider will inform the scheduler of messages about controllers which produce fake rules. Next time those controllers will be picked with lower probability till they are reset. Ultimately, above steps will be repeated to protect the network and maintain the network in a secure, robust and resilient state.

    Now, let’s review the attack in figure 1 under Mcad-SA. In figure 3 flow rules controllerproduces are distorted or false while that fromandare correct. Obviously, the aberrant rule can’t reach switch A because of the decision mechanism which chooses the same rules from the majority to forward. Moreover,as running controllers are always varying in some scheduling strategies, it’s difficult for attackers to locate them and launch attacks.

    Therefore, Mcad-SA can guarantee the network operates smoothly even when facing threats. Further, the scheduling algorithm has effect on the security of Mcad-SA. Next, we introduce an aware dynamic scheduling algorithm to improve its security to the maximum.

    3.2 An aware dynamic scheduling algorithm

    In order to intensify security and increase attack cost, we present an aware algorithm to dynamically schedule controllers (ADS). The algorithm is implemented inside the scheduler.Moreover, this method will improve controllers’ uncertainty while maintains the network operate normally and reliably, making it more difficult for attackers to compromise running controllers. The notations used in the statement of ADS are listed in table 1.

    3.2.1 Problem statement

    Mcad-SA is a third-layer SDN which has been illustrated above. The upper layer is the control plane which hastotal controllers. The middle layer is the scheduling plane which is comprised of four components depicted above.The lower layer is the data plane consisting of a set of switches and hosts.

    The problem of aware dynamic scheduling controllers (ADS) in Mcad-SA can be concluded as follows: Given a set of controllers and a subnet, attackers attempt to compromise controllers through probes (i.e. the more probes on a controller, the easier it can be controlled) while the defender attempts to devise a dynamic scheduling strategy that can ensure the subnet operate in a reliable way, in other words, it reducesdue to attacks to the maximum extent.

    3.2.2 Design of ADS

    Our goal is to guarantee the subnet operates in a most reliable and secure way when facing probes from attackers. That’s to say, we need ensure the reliability and safety of the running controllers setThus, we formulate the aware dynamic scheduling mechanism as an optimization problem to minimize failure probability of Mcad-SA via every switching step. And the essential requirements for this problem are: 1) To ensure the switch cost is reasonable, the total switch times of controllers each step can’t exceedbecause once the number is immense, more time is required to accomplish the switch process. 2) To guarantee service quality, the number of controllers inis no bigger thanIfis too big, it takes longer for the decider to hand flow rules to switches since it waits for rules from all controllers to compare. One point to be mentioned,andare changeable relying on current conditions and demands of the subnet.

    It’s obvious that to ensure the security of control plane, we ought to choose the most reliable controllers from C. And the reliability can be measured bywhich means the more reliable a controller is, the biggeris.Besides,is allocated by the scheduler which regulatesaccording to messages from the sensor and decider.

    The sensor records operating conditions of all controllers. For example, if it detects probes against running controllers, then it will calculate their reliability based on results of detections. Andequalswhereis a scaling parameter. After this process, a message aboutwill be sent to the scheduler.

    Table I Notations in the ADS problem.

    Minimize:

    Subject to:

    3.2.3 Procedures

    The above optimization is a typical NP-hard problem which is difficult to finish the computation if C is very large. Therefore, we put forward a heuristic algorithm to solve this question with polynomial time complexity. In this algorithm,is represented with 3-tuplewheremeans what kind of controller it is, POX or Floodlight, etc.

    In this section, an algorithm attempting to minimize failure probability of the control plane (MinFP) is proposed to solve the ADS problem. Its fundamental idea is to successively choose the most reliable controllers from various types of controllers. This method can ensure heterogeneity of controllers and guarantee the most secure controllers are chosen every time. The specific process is discussed as follows.

    Initialization: All controllers are acssigned with a 3-tuple label. And we divide C intogroups according to their types. Later in each group controllers are sorted in a descending order based on theirThen we pop up the first controller from groups successively till we obtain required sizeNow the initialization is completed.

    Switching: There are two mechanisms which lead to controllers’ switch. One is timer mechanism. The other is message-driven mechanism. In the first situation, all running controllers will be switched after a fixed intervalThe switching procedure is similar to the initialization step. While in the latter circumstance, the scheduler need regulate controllersrelying on messages from sensor and decider. And that’s the sensing progress. Then each controllerwill selectto switch and the best circumstance is

    The pseudo code of the proposed algorithm is shown in table 2, 3 and 4. Function Init_RunCon_Set whose code is listed in Algorithm 2 is used to initiatefrom C. While the Switch_RunCon_Set function illustrated in Algorithm 3 aims at updatingby eliminating compromised controllers and inserting relatively more reliable controllers.

    Considering Mcad-SA equipped withcontrollers, the time complexity of MinFP isat most. Thus, it’s a cost-effective heuristic algorithm.

    IV. PERFORMANCE EVALUATION

    In this section, we conduct simulation-based experiments to evaluate the effectiveness of the proposed architecture and algorithm.

    4.1 Simulation results of MinFP

    Simulations are conducted on estimating the effectiveness of MinFP. In the simulation, we presume there are G types of controllers andcontrollers are in each group. Also, we assume that the number of controllers attackers probe each timeis satisfying the similar restraint set for the defender because of attack cost. Specifications of these parameters are listed in table 5.

    First of all, we analyze reliability of the control plane when adopting the proposed scheduling strategy. And it’s measured by.The smalleris, the more reliable the control plane is. Next, we compare our proposed scheduling policies (MinFP) to two common methods. One is random switching and the other is without switching which is mostly adopted by current traditional SDN architectures.As to random switching, we divide it into RandomWithRepeat and RandomWithoutRepeat in detail. RandomWithRepeat means we selectuniformly from all the available controllers while the latter will pick uprandomly from the rest controllers to guarantee

    As illustrated in figure 5,of traditional control plane goes up tremendously with time,reaching approximately 50% after 10 time units. This phenomenon is predictable because controllers keep stationary all the time. Thus,attackers can enforce persistent probes on same targets till all controllers are compromised, which leads to failure of control plane easily. While in random and MinFP situations,both curves increase slowly and their slopes are relatively small. That’s due to the reason that running controllers are always varying sothat attackers have to restart probes on new added controllers. Especially with time goingon, their advantages are more obvious, which indicates dynamism can intensify security of control plane to some extent. What’s more,of MinFP is the lowest and stable, which is strong evidence on its superiority. This demonstrates MinFP can sense controllers’secure states and always pick up more reliable controllers based on their real-time conditions.Therefore, it reducesfurther compared with random switching (no matter RandomWithRepeat or RandomWithoutRepeat).

    Table II Main procedures of MinFP

    Table III Initialization of MinFP

    Table IV The switch procedure of MinFP

    Table 5 Specifications of parameters in simulation

    Fig. 5 Failure probability with various switch strategies

    Fig. 6in different architectures

    In above simulations, we analyze the effectiveness of MinFP. Here, we focus on the overall performance of Mcad-SA compared to traditional architectures.

    As stated previously, Mcad-SA employs several entities as running controllers and the running set is varying with time. Thus, the cost of Mcad-SA is obviously increased. Here we define the cost of security gain (to measure the overall performance of different structures. The essence ofcan be regarded as the cost required to acquire security gain.It’s computed via [5].

    4.2 Evaluation of overall performance of Mcad-SA

    Further, we reveal the relation betweenand diversity. We equip the control plane in Mcad-SA with 12 controllers but in four compositions. And the compositions areandThe bigger G is, the more kinds of controllers are. Then figure 7 indicates there is a negative correlation betweenand G.This phenomenon is intriguing but expected.With more types of controllers existing, the cost of probing, invading and attacking is augmented since attackers have to realize and utilize different bugs and vulnerabilities, which is extremely difficult compared to destroying the same kind of controller. However, this property provides us with inspiration that in order to gain more powerful performance, we should take diversity into consideration when designing the control plane of Mcad-SA. That’s to say, devising and adopting controllers as heterogeneous as possible is a critical point to improve SDN’s security.

    V. RELATED WORK

    At present, the research on controllers’ security is focused on two aspects. On one hand,it aims at improving personal security of controllers through introducing internal secure mechanism. For example, FortNOX, an intensive secure NOX controller, is proposed in[11] by means of role-based authorization and security constraint enforcement to intensify its security. It’s able to check flow-rule conflicts in real time. Besides, it also implements a robust analysis algorithm to strategically prevent hostile applications from inserting malicious flow rules that will reduce routing efficiency in network. Porras et al. [12] presents SE-Floodlight, a Security Enhanced version of the widely used OpenFlow Floodlight Controller,to provide security management. It extends Floodlight with a security-enforcement kernel(SEK). The SEK consists of a particular set of secure application management policies, such as a permission model for mediating all configuration change requests to the data-plane and a security audit service. However, no matter how powerful a single controller it is, once it has been invaded, the service of the network it supervises no longer can be guaranteed.

    Fig. 7with diverse composition of controllers in Mcad-SA adopting MinFP

    On the other hand, researchers pay attention to distributed controllers to avoid the single point failure with one controller [13]. And the chief concept is introducing heterogeneity and redundancy to protect the network. ONOS,open network operating system, is designed in[14] to improve the robustness and resiliency of the network. It employs multiple controllers to act as different roles (master controller,backup controller, etc) in case when master controllers are unable to work, backup controllers are switched to master controllers via Zookeeper to maintain the network operate smoothly. Yazici et al. [15] considers the issue that controllers are prone to collapse under heavy data center loads. They propose a distributed and associated coordination framework that has the capability of achieving scalability and reliability even under such situations. This architecture adopts redundancy controllers to balance the load without any interruption to the network operation. It also provides support for adding and removing controllers dynamically with minimum or no required changes. [16] puts forward a secure SDN architecture where each switch is managed with multiple controllers. Further,the number of controllers assigned to devices depends on their status and security requirements in network, which is cost-efficient. Xin Jin et al. [17] proposes CoVisor, a new kind of hypervisor that allows multiple controllers to cooperate on managing the same shared traffic. This implementation can be used to assemble a collection of independently-developed applications and enable multiple controllers to manage the same subnet simultaneously.Although current architectures with multiple controllers can resist a series of attacks to some degree, their systems are entirely operating in a static state. This mechanism is a threat for it’s convenient and low-cost for attackers to probe and acquire useful information. Thus,in [18], we present a security architecture for SDN which exploits heterogeneity and redundancy from multi-controller to intensify security. Besides, a dynamic scheduling mechanism is introduced in this architecture to further improve its performance. And this paper is an extension of research work in [18].

    VI. CONCLUSION

    Security of controllers is a significant issue for ensuring the network operate effectively. Focusing on the modifying flow rule attack, we propose Mcad-SA, an aware decision-making security architecture with multi-controller,which exploits heterogeneity and redundancy from different controllers to prevent that attack proactively. Further, we devise a sensible,practical and dynamic scheduling mechanism to intensify its security. Simulation results demonstrate validity of the proposed method. Although increasing some additional but controllable cost, this novel architecture significantly improves security of SDN. Furthermore, the defending concept that combines heterogeneity, dynamism and redundancy of existing techniques, means and components can be applied in various fields. In the future,we plan to implement the Mcad-SA with the real experimental platform and pay attention to quantitative measurement on control plane’s security performance.

    This work is supported by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China(No.61521003), the National Key R&D Program of China (No.2016YFB0800100,No.2016YFB0800101), and the National Natural Science Foundation of China(No.61602509).

    [1] Mckeown N, Anderson T, Balakrishnan H, et al.“OpenFlow:enabling innovation in campus networks”. ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.

    [2] Kreutz, D, Ramos F.M.V, and Verissimo P. “Towards secure and dependable software-defined networks.” ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING, pp.55-60, 2013.

    [3] POX. “Python network controller”. http://www.noxrepo.org/pox/

    [4] Gude N, Koponen T, Pettit J, et al. “NOX: towards an operating system for networks”. ACM SIGCOMM Computer Communication Review,vol. 38, no. 3, pp. 105-110, 2008.

    [5] Floodlight. “Open SDN controller”. http://www.projectfloodlight.org/.

    [6] Erickson D. “The beacon openflow controller”.ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING. pp. 13-18, 2013.

    [7] Sherwood R, Gibb G, Yap K K, et al. “Can the production network be the testbed?”. Usenix Symposium on Operating Systems Design and Implementation. pp. 365-378, 2010.

    [8] Jain S, Kumar A, Mandal S, et al. “B4: experience with a globally-deployed software defined wan”. ACM SIGCOMM Computer Communication Review, vol. 43, no. 4, pp. 3-14, 2013.

    [9] Cabaj K, Wytr?bowicz J, Kukliński S, et al. “SDN architecture impact on network security”. Federated Conference on Computer Science and Information Systems. pp. 143-148, 2014.

    [10] Scott-Hayward S, Natarajan S, Sezer S. “A survey of security in software defined networks”. IEEE Communications Surveys & Tutorials, vol. 18,no. 1, pp. 623-654, 2016.

    [11] Porras P, Shin S, Yegneswaran V, et al. “A security enforcement kernel for OpenFlow networks”.ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING. pp. 121-126, 2012.

    [12] Porras P, Cheung S, Fong M, et al. “Securing the software-defined network control layer”.Network and Distributed System Security Symposium. 2015.

    [13] Open Network Foundation. “SDN security considerations in the data center”. 2015. https://www.opennetworking.org/solution-brief-sdnsecurity-considerations-in-the-data-center.

    [14] Berde P, Hart J, Hart J, et al. “ONOS: towards an open, distributed SDN OS”. ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING. pp. 1-6, 2014.

    [15] Yazici V, Sunay M O, Ercan A O. “Controlling a software-defined network via distributed controllers”. Proceedings of the NEM Summit. pp.16-20, 2014.

    [16] Li H, Li P, Guo S, et al. “Byzantine-resilient secure software-defined networks with multiple controllers in cloud”. IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 436-447, 2015.

    [17] Jin X, Gossels J, Rexford J, et al. “CoVisor: a compositional hypervisor for software-defined networks”. Usenix Conference on Networked Systems Design and Implementation. pp. 87-101, 2015.

    [18] Qi C, Wu J, Hu H, et al. “An intensive security architecture with multi-controller for SDN”. IEEE Computer Communications Workshops. pp. 401-402, 2016.

    3wmmmm亚洲av在线观看| 国产精品久久久久久亚洲av鲁大| 你懂的网址亚洲精品在线观看 | 日本免费a在线| 嫩草影院新地址| 热99re8久久精品国产| 中文字幕人妻熟人妻熟丝袜美| 又黄又爽又免费观看的视频| 成人三级黄色视频| 91在线精品国自产拍蜜月| 久久精品夜色国产| 国产伦精品一区二区三区四那| 亚洲第一区二区三区不卡| 国产蜜桃级精品一区二区三区| 国产精品精品国产色婷婷| 国产成人aa在线观看| 尤物成人国产欧美一区二区三区| 国产视频一区二区在线看| 搡女人真爽免费视频火全软件 | a级一级毛片免费在线观看| 高清午夜精品一区二区三区 | 久久午夜福利片| 成熟少妇高潮喷水视频| 亚洲色图av天堂| av国产免费在线观看| 我要搜黄色片| 人妻久久中文字幕网| 91狼人影院| 国产精品久久久久久亚洲av鲁大| 日韩欧美免费精品| 女的被弄到高潮叫床怎么办| 亚洲精品一卡2卡三卡4卡5卡| 国产 一区精品| 中国国产av一级| 亚洲成人久久爱视频| 午夜精品一区二区三区免费看| 国产亚洲精品久久久久久毛片| 国产精品av视频在线免费观看| 欧美zozozo另类| 99热这里只有是精品在线观看| 亚洲精华国产精华液的使用体验 | 噜噜噜噜噜久久久久久91| 乱系列少妇在线播放| 国产探花在线观看一区二区| 麻豆久久精品国产亚洲av| 色吧在线观看| 在线免费十八禁| 精品久久久噜噜| 寂寞人妻少妇视频99o| 久久久久久久久大av| 久久久久国内视频| 黄色欧美视频在线观看| 又粗又爽又猛毛片免费看| 国产成人福利小说| 午夜激情欧美在线| 亚洲欧美日韩东京热| 亚洲精品在线观看二区| 国产精品女同一区二区软件| 成熟少妇高潮喷水视频| 国产精品久久久久久久电影| 亚洲av美国av| 悠悠久久av| 国产午夜福利久久久久久| 亚洲一级一片aⅴ在线观看| 成人无遮挡网站| 免费看av在线观看网站| 内射极品少妇av片p| 亚洲国产精品sss在线观看| 校园人妻丝袜中文字幕| 99热这里只有是精品在线观看| 美女被艹到高潮喷水动态| 国产爱豆传媒在线观看| 在线观看美女被高潮喷水网站| 欧美3d第一页| 日韩,欧美,国产一区二区三区 | 此物有八面人人有两片| 久久久精品欧美日韩精品| 麻豆精品久久久久久蜜桃| 在线播放无遮挡| av在线观看视频网站免费| 久久久久久国产a免费观看| 久久精品夜色国产| 欧美日本视频| 亚洲成人中文字幕在线播放| 天天躁日日操中文字幕| 亚洲欧美日韩高清在线视频| 日韩精品青青久久久久久| a级毛片a级免费在线| 久久人人爽人人片av| av在线亚洲专区| 国产午夜精品久久久久久一区二区三区 | 免费不卡的大黄色大毛片视频在线观看 | 久久久久久久久中文| 午夜福利在线在线| 少妇裸体淫交视频免费看高清| 免费看日本二区| 国内精品一区二区在线观看| 在线免费观看的www视频| 日本欧美国产在线视频| 欧美日本视频| 亚洲美女视频黄频| 99久国产av精品国产电影| 欧美一级a爱片免费观看看| 国产高清视频在线播放一区| 观看美女的网站| 一卡2卡三卡四卡精品乱码亚洲| 白带黄色成豆腐渣| 久久中文看片网| 老司机影院成人| 亚洲丝袜综合中文字幕| av天堂在线播放| 黄色视频,在线免费观看| 夜夜夜夜夜久久久久| 两性午夜刺激爽爽歪歪视频在线观看| 丰满的人妻完整版| 成人性生交大片免费视频hd| 国产亚洲精品综合一区在线观看| 国产真实伦视频高清在线观看| 校园人妻丝袜中文字幕| 午夜福利成人在线免费观看| 国产精品久久久久久久电影| 国国产精品蜜臀av免费| 女的被弄到高潮叫床怎么办| 寂寞人妻少妇视频99o| 色综合站精品国产| 成人亚洲精品av一区二区| 婷婷精品国产亚洲av| 免费电影在线观看免费观看| 久久久久性生活片| 日韩精品中文字幕看吧| 久久精品影院6| 国产日本99.免费观看| 亚洲性久久影院| 91av网一区二区| 69av精品久久久久久| av黄色大香蕉| 嫩草影视91久久| 日韩成人av中文字幕在线观看 | 色噜噜av男人的天堂激情| 日韩欧美精品免费久久| 97超碰精品成人国产| 婷婷色综合大香蕉| 日韩高清综合在线| 精品久久久久久久久久免费视频| 亚洲av中文av极速乱| 69人妻影院| 亚洲国产精品国产精品| 日韩一本色道免费dvd| 我要搜黄色片| 真实男女啪啪啪动态图| 在线天堂最新版资源| 国产亚洲91精品色在线| 国产v大片淫在线免费观看| av福利片在线观看| 最近视频中文字幕2019在线8| 人妻久久中文字幕网| 在线天堂最新版资源| 欧美一区二区国产精品久久精品| 亚洲国产精品久久男人天堂| 亚洲av中文av极速乱| 欧美激情在线99| 色尼玛亚洲综合影院| 麻豆久久精品国产亚洲av| 成人漫画全彩无遮挡| 亚洲不卡免费看| 日本黄大片高清| 18禁在线播放成人免费| 亚洲人成网站高清观看| 欧美日韩精品成人综合77777| 日韩欧美精品免费久久| 在线国产一区二区在线| 99热网站在线观看| 麻豆精品久久久久久蜜桃| 国语自产精品视频在线第100页| 丰满人妻一区二区三区视频av| 国产麻豆成人av免费视频| 国产成人freesex在线 | 伊人久久精品亚洲午夜| 97超视频在线观看视频| 日本撒尿小便嘘嘘汇集6| 老熟妇乱子伦视频在线观看| 久久久久久大精品| 别揉我奶头 嗯啊视频| 12—13女人毛片做爰片一| 亚洲av一区综合| 国产大屁股一区二区在线视频| 又粗又爽又猛毛片免费看| 亚洲aⅴ乱码一区二区在线播放| 精品久久久久久久久久免费视频| 久久精品久久久久久噜噜老黄 | 国产精品久久视频播放| 欧美激情国产日韩精品一区| 变态另类丝袜制服| 国内久久婷婷六月综合欲色啪| 老熟妇仑乱视频hdxx| 精品无人区乱码1区二区| 长腿黑丝高跟| 欧美xxxx黑人xx丫x性爽| 亚洲三级黄色毛片| 人妻夜夜爽99麻豆av| 色综合站精品国产| 亚洲精品456在线播放app| h日本视频在线播放| 久久99热这里只有精品18| 性插视频无遮挡在线免费观看| 日本在线视频免费播放| 久久久久国产网址| av免费在线看不卡| 国产真实乱freesex| 欧美人与善性xxx| 中文字幕av成人在线电影| 国产精品精品国产色婷婷| 如何舔出高潮| 亚洲人成网站在线播放欧美日韩| 99在线人妻在线中文字幕| 97超级碰碰碰精品色视频在线观看| 日韩精品中文字幕看吧| 久久久成人免费电影| 国产成人影院久久av| 国内精品久久久久精免费| 亚洲一区二区三区色噜噜| 久久精品综合一区二区三区| 亚洲欧美中文字幕日韩二区| 国产亚洲精品av在线| 此物有八面人人有两片| 国产精品精品国产色婷婷| 久久99热6这里只有精品| 色尼玛亚洲综合影院| 又黄又爽又免费观看的视频| av国产免费在线观看| 国产精品三级大全| 日本撒尿小便嘘嘘汇集6| 白带黄色成豆腐渣| 国产成人91sexporn| 一边摸一边抽搐一进一小说| 成年av动漫网址| 亚洲最大成人中文| 国产精品久久久久久亚洲av鲁大| 狂野欧美激情性xxxx在线观看| 国产精品美女特级片免费视频播放器| 直男gayav资源| 欧美激情久久久久久爽电影| 美女大奶头视频| 俄罗斯特黄特色一大片| 99热全是精品| 成人欧美大片| 永久网站在线| 五月玫瑰六月丁香| 国产成人影院久久av| 淫妇啪啪啪对白视频| ponron亚洲| 我要看日韩黄色一级片| 久久久精品大字幕| avwww免费| 久久精品夜色国产| 成人av一区二区三区在线看| 春色校园在线视频观看| 人人妻人人澡人人爽人人夜夜 | 在线免费观看不下载黄p国产| 亚洲专区国产一区二区| 久久6这里有精品| 赤兔流量卡办理| 国产精品一及| 久久精品国产亚洲av天美| av中文乱码字幕在线| 免费观看的影片在线观看| 国产精品乱码一区二三区的特点| 国产精品精品国产色婷婷| 黄色欧美视频在线观看| 99热只有精品国产| 亚洲av不卡在线观看| 又粗又爽又猛毛片免费看| 午夜福利视频1000在线观看| 在线观看66精品国产| 天美传媒精品一区二区| 欧美日韩国产亚洲二区| 中文字幕熟女人妻在线| 免费一级毛片在线播放高清视频| 天堂动漫精品| 丝袜喷水一区| av免费在线看不卡| 精品午夜福利视频在线观看一区| 亚洲av中文av极速乱| 久久午夜亚洲精品久久| 国产精品久久久久久久电影| 日韩欧美精品免费久久| 三级男女做爰猛烈吃奶摸视频| 久久综合国产亚洲精品| 亚洲欧美成人精品一区二区| 一级毛片电影观看 | 99久国产av精品国产电影| 白带黄色成豆腐渣| 亚洲aⅴ乱码一区二区在线播放| 中文资源天堂在线| 国产一区二区亚洲精品在线观看| 青春草视频在线免费观看| 久久精品国产亚洲av香蕉五月| 成人鲁丝片一二三区免费| 国产乱人视频| 成人av在线播放网站| 亚洲人成网站在线播放欧美日韩| 在线观看午夜福利视频| av福利片在线观看| 精品久久久久久久末码| 三级男女做爰猛烈吃奶摸视频| 国产高清有码在线观看视频| 不卡视频在线观看欧美| 深爱激情五月婷婷| 99久久精品一区二区三区| 国产成年人精品一区二区| 亚洲图色成人| 草草在线视频免费看| 极品教师在线视频| 免费看a级黄色片| 乱系列少妇在线播放| 精品一区二区三区视频在线观看免费| 97热精品久久久久久| 欧美激情久久久久久爽电影| 欧美激情在线99| 亚洲,欧美,日韩| a级毛片a级免费在线| 啦啦啦韩国在线观看视频| 久久精品国产清高在天天线| 国产aⅴ精品一区二区三区波| 日本 av在线| 成年女人毛片免费观看观看9| 午夜福利在线在线| 久久99热6这里只有精品| 大型黄色视频在线免费观看| 国产精品美女特级片免费视频播放器| 在线观看av片永久免费下载| 久久精品夜色国产| 人人妻,人人澡人人爽秒播| 国产淫片久久久久久久久| 亚洲国产高清在线一区二区三| 亚洲精品影视一区二区三区av| 一个人看视频在线观看www免费| 舔av片在线| 国产在线男女| 露出奶头的视频| 亚洲丝袜综合中文字幕| 久久久久久久午夜电影| 18+在线观看网站| 床上黄色一级片| 日韩大尺度精品在线看网址| 亚洲精品粉嫩美女一区| av专区在线播放| 亚洲熟妇熟女久久| 国产精品野战在线观看| 淫秽高清视频在线观看| 搡老熟女国产l中国老女人| 综合色av麻豆| 国产午夜精品论理片| 黄色视频,在线免费观看| 18+在线观看网站| 亚洲无线在线观看| 美女被艹到高潮喷水动态| 国产私拍福利视频在线观看| 亚洲人成网站高清观看| 久久精品影院6| 国产精品一区二区免费欧美| 日本精品一区二区三区蜜桃| 精品久久久久久久久久免费视频| 国产成人91sexporn| 国产av一区在线观看免费| 久久久成人免费电影| 午夜精品国产一区二区电影 | 99国产极品粉嫩在线观看| 中文字幕精品亚洲无线码一区| 国产乱人视频| 狂野欧美白嫩少妇大欣赏| 国产精品综合久久久久久久免费| 51国产日韩欧美| 又粗又爽又猛毛片免费看| 最近的中文字幕免费完整| 在线观看av片永久免费下载| 欧美色欧美亚洲另类二区| 神马国产精品三级电影在线观看| 成人鲁丝片一二三区免费| 亚洲欧美日韩无卡精品| 成熟少妇高潮喷水视频| 色综合亚洲欧美另类图片| 久久精品国产鲁丝片午夜精品| 精品一区二区免费观看| 国产色爽女视频免费观看| 国产成年人精品一区二区| 久久久精品大字幕| 一级毛片电影观看 | 99热这里只有是精品在线观看| av在线观看视频网站免费| 日本黄色片子视频| 色噜噜av男人的天堂激情| 蜜桃久久精品国产亚洲av| 看非洲黑人一级黄片| 国产v大片淫在线免费观看| 看非洲黑人一级黄片| 欧美高清性xxxxhd video| 国产高清激情床上av| 国产av一区在线观看免费| av免费在线看不卡| 精品国内亚洲2022精品成人| 久久久精品94久久精品| 欧美激情国产日韩精品一区| 免费搜索国产男女视频| 中文亚洲av片在线观看爽| 最近手机中文字幕大全| 国产精品一区二区性色av| 成人性生交大片免费视频hd| 亚洲精品一区av在线观看| 国产69精品久久久久777片| 国产真实伦视频高清在线观看| 精品日产1卡2卡| 日本 av在线| 午夜久久久久精精品| 久久久久久久久久黄片| 真人做人爱边吃奶动态| 免费观看人在逋| 少妇高潮的动态图| 最后的刺客免费高清国语| 国产熟女欧美一区二区| 国产人妻一区二区三区在| 亚洲精品日韩在线中文字幕 | 日韩,欧美,国产一区二区三区 | 久久久精品欧美日韩精品| 真人做人爱边吃奶动态| 噜噜噜噜噜久久久久久91| 日韩成人伦理影院| 久久6这里有精品| 欧美最新免费一区二区三区| 亚洲最大成人手机在线| 91午夜精品亚洲一区二区三区| 免费在线观看成人毛片| 婷婷色综合大香蕉| 一本精品99久久精品77| 少妇的逼好多水| 国产激情偷乱视频一区二区| 综合色丁香网| 夜夜夜夜夜久久久久| 激情 狠狠 欧美| 国产高清三级在线| 国产高清激情床上av| 国产精品一二三区在线看| 国产精品综合久久久久久久免费| 日韩高清综合在线| 伦理电影大哥的女人| 午夜亚洲福利在线播放| 免费av观看视频| 日韩欧美免费精品| 欧美最新免费一区二区三区| 久久久国产成人免费| 亚洲激情五月婷婷啪啪| 99久国产av精品| 菩萨蛮人人尽说江南好唐韦庄 | 深爱激情五月婷婷| 黄色日韩在线| av女优亚洲男人天堂| 国产av在哪里看| 午夜福利成人在线免费观看| 亚洲av美国av| 欧美日本视频| 精品久久久久久久末码| 国产高清视频在线播放一区| 久久精品国产99精品国产亚洲性色| 在线观看一区二区三区| 午夜精品一区二区三区免费看| a级毛片免费高清观看在线播放| 欧美日韩国产亚洲二区| 成人无遮挡网站| 91久久精品电影网| 又爽又黄无遮挡网站| 热99在线观看视频| 亚洲三级黄色毛片| 综合色丁香网| 国产亚洲精品久久久久久毛片| 熟女人妻精品中文字幕| 美女大奶头视频| 尤物成人国产欧美一区二区三区| 国国产精品蜜臀av免费| 黄色一级大片看看| 亚洲四区av| 91午夜精品亚洲一区二区三区| 精品无人区乱码1区二区| 日本色播在线视频| 如何舔出高潮| 国产精品,欧美在线| 小蜜桃在线观看免费完整版高清| 69人妻影院| 欧美日韩一区二区视频在线观看视频在线 | 最近视频中文字幕2019在线8| 成人高潮视频无遮挡免费网站| 日韩高清综合在线| 国产精品久久久久久亚洲av鲁大| 欧洲精品卡2卡3卡4卡5卡区| 国产av不卡久久| 亚洲性久久影院| 欧美成人一区二区免费高清观看| 两个人的视频大全免费| 性欧美人与动物交配| 亚洲欧美日韩无卡精品| 国产在视频线在精品| 久久久精品94久久精品| 内射极品少妇av片p| 一本久久中文字幕| 自拍偷自拍亚洲精品老妇| 在线播放国产精品三级| 国产一区二区在线av高清观看| 久久精品国产亚洲av涩爱 | 中文在线观看免费www的网站| 国产一区二区在线av高清观看| 亚洲最大成人中文| 在现免费观看毛片| 深夜a级毛片| 十八禁国产超污无遮挡网站| 99精品在免费线老司机午夜| 免费看美女性在线毛片视频| 亚洲中文字幕日韩| 日本黄色片子视频| 在线免费观看的www视频| 大又大粗又爽又黄少妇毛片口| 欧美一区二区亚洲| 全区人妻精品视频| 色视频www国产| 久久99热这里只有精品18| 麻豆一二三区av精品| 欧美在线一区亚洲| 久久热精品热| 九九爱精品视频在线观看| 男女边吃奶边做爰视频| 老熟妇乱子伦视频在线观看| 熟女人妻精品中文字幕| 搡女人真爽免费视频火全软件 | 精品乱码久久久久久99久播| 日韩在线高清观看一区二区三区| videossex国产| 日韩一本色道免费dvd| 内地一区二区视频在线| 色综合站精品国产| 变态另类成人亚洲欧美熟女| 韩国av在线不卡| 亚洲精品日韩av片在线观看| 中文字幕久久专区| 一区二区三区四区激情视频 | 国产成人福利小说| 亚洲av五月六月丁香网| 国产麻豆成人av免费视频| 亚洲美女视频黄频| 免费av观看视频| 最后的刺客免费高清国语| 日产精品乱码卡一卡2卡三| 精品人妻一区二区三区麻豆 | 联通29元200g的流量卡| 两个人视频免费观看高清| 身体一侧抽搐| 校园春色视频在线观看| a级毛片免费高清观看在线播放| .国产精品久久| 久久人人爽人人片av| 99热网站在线观看| 国产午夜精品论理片| 亚洲最大成人手机在线| 五月伊人婷婷丁香| 免费一级毛片在线播放高清视频| 亚洲五月天丁香| 日产精品乱码卡一卡2卡三| 国产综合懂色| 综合色丁香网| 12—13女人毛片做爰片一| 蜜桃久久精品国产亚洲av| 亚洲精品国产成人久久av| 国产视频一区二区在线看| 免费看av在线观看网站| 免费高清视频大片| 网址你懂的国产日韩在线| 一级黄片播放器| 国产精品,欧美在线| 熟妇人妻久久中文字幕3abv| 麻豆国产av国片精品| 成人国产麻豆网| 久久久久久久久中文| 亚洲精品国产av成人精品 | 国产色爽女视频免费观看| 午夜亚洲福利在线播放| 欧美一区二区精品小视频在线| 亚洲精品乱码久久久v下载方式| 亚洲无线在线观看| 国产精品久久久久久久电影| 国产精品久久久久久久久免| 亚洲精品粉嫩美女一区| 成人亚洲欧美一区二区av| 成人鲁丝片一二三区免费| 亚洲熟妇熟女久久| 国产高清不卡午夜福利| 又爽又黄无遮挡网站| 床上黄色一级片| 日本成人三级电影网站| 免费看av在线观看网站| 精品久久久久久久久av| 婷婷精品国产亚洲av| 麻豆av噜噜一区二区三区| АⅤ资源中文在线天堂| 人人妻人人澡人人爽人人夜夜 | 在线观看av片永久免费下载| 中文字幕人妻熟人妻熟丝袜美| 日本爱情动作片www.在线观看 | 国产91av在线免费观看| 乱人视频在线观看| 永久网站在线| 高清毛片免费看| 欧美性感艳星| 99久久久亚洲精品蜜臀av| 直男gayav资源| 国产黄色小视频在线观看| 日韩av不卡免费在线播放| 亚洲天堂国产精品一区在线| 日本a在线网址|