• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Low-Rate DoS Attack Flows Filtering Based on Frequency Spectral Analysis

    2017-05-09 07:48:36
    China Communications 2017年6期

    The College of Electronic Information & Automation, Civil Aviation University of China, Tianjin 300300,China

    * The corresponding author, email: zjwu@cauc.edu.cn

    I. INTRODUCTION

    Low-rate denial of service (LDoS) attack was first detected on Internet2 Abilene in 2001[1]and presented on SIGCOMM conference in 2003 by Kuzmanovic [2]. The primary aim of LDoS attacks is to reduce the network quality of service (QoS).

    LDoS attack exploits the vulnerability of timeout retransmission (RTO) mechanism in TCP protocol to degrade the QoS at the end of victim by sending a sequence of periodic pulses in square wave. A typical LDoS attack can be expressed in a three tuple of attack periodT, attack durationL, and attack rateHere,Tis the interval between two successive attack pulses.Tcan be obtained by estimating the execute duration of trusted source. The duration of this timer is referred as retransmission timeout (RTO).Lis the width of attack pulse.Ris the intensity of attack pulse.Rindicates the highest rate of attack flows[2][3].

    LDoS attack is quite different from that of traditional flood-based attacks in behaviors,attack effects and vulnerable mechanism exploitations. LDoS attacks only send attack packets within a specific time interval with a relatively low rate, which is hidden deep in the normal network traffic. Hence, LDoS attack is characterized as an intermittent attack [1].LDoS attack flows are quite similar with legitimate network traffic, and which is completely embedded into legitimate TCP traffic. It is difficult to detect and filter LDoS attack flows by available methods which adopt the network traffic sample and time statistics[4].

    Based on frequency spectrum analysis, the authors proposed an approach of LDoS attack flow filtering.

    It is well known that network traffic data is a sequence of discrete time signal and a majority of traffic on Internet is using TCP protocol nowadays[5]. Furthermore, TCP traffic flows behave obvious periodicity. Hence, LDoS attack flows are small periodic signal, which is hidden in the periodic TCP background traffic. This analysis result provides a basis for distinguishing LDoS attack flows and normal TCP traffic from the spectral distribution in frequency domain. Available research results show that the power spectrum distribution of legitimate TCP traffic and LDoS attack flows were not the same in frequency domain[6].Therefore, an approach of filtering LDoS attack flows based on frequency spectrum analysis is proposed. In this approach, the network data (Including the normal traffic and attack traffic) is transformed from the time domain into the frequency domain and processed by using the technology of digital signal processing (DSP).

    II. RELATED WORKS

    The LDoS attack detection by using time statistics analysis method in time domain has deficiencies in detection effects, because the average LDoS attack flows are very small while the effect of background traffic is relatively large. Therefore, many researchers proposed new approaches of detecting LDoS attacks by using the method of spectrum analysis in frequency domain [7][8]. The signal processing technology is combined with network traffic data processing techniques and the classical signal detection and filter theory are applied with the method to detect and filter LDoS attack flows [9].

    In the research of network traffic periodicity, Yu Chen etc.[10] explored the energy distributions of normal Internet flows in frequency domain on Abilence-III. Legitimate TCP traffic flows presented periodicity because of its protocol behavior. The periodicity is closely related with round-trip time (RTT)(RTT also called round-trip delay, is the time between a request for data and the complete return that data. RTT is defined as the interval between data transmission and the receipt of a positive acknowledgement.). Their results revealed that legitimate TCP flows could be segregated from malicious flows according to energy distribution properties. They discovered the spectral shifting of attack flows from that of normal flows. Combining flow-level spectral analysis with sequential hypothesis testing, they proposed a novel defense scheme against RoQ attacks. The research shows their detection and filtering scheme can effectively rescue 99% of legitimate TCP flows under the RoQ attacks.

    In the research on spectrum distribution of DoS attacks, Ramin Fadaei Fouladi etc.[11] characterized the frequency domain of DoS attacks instead of time domain. They considered the number of packets arriving to the node of victim as a random process which was acquired by sampling the packets number every 1 mil-second. Their research shows that the main energy of DoS and DDoS attacks is distributed in high and low frequencies respectively. While the energy is spread evenly through all range of frequencies in Legitimate TCP traffic.

    In the research of attack energy detection,Hao Chen etc. [12] explored the existent energy which was exposed to Shrew attacks in frequency domain, and proposed an optimized FPGA based on an accelerator for the real-time PSD (Power Spectral Density)conversion. And this work is based on their innovative component-reusable Auto-Correlation (AC) algorithm and the adapted 2N-point real-valued DFT (Discrete Fourier Transform)algorithm. They designed the accelerator in a Xilinx Virtex2 Pro FGPA.

    In the research of filtering attack flows in frequency domain, WU Zhijun and SHI Zhen[13] proposed a method of filtering LDoS attack by a finite impulse response (FIR) filter.They analyzed spectrum characteristics of LDoS attacks in frequency domain by adopting digital signal processing technology, and designed a FIR filter to eliminate the illegitimate frequencies in frequency domain. Experiments result shows that 92.88% of LDoS attack energy is filtered, and 19.75% of normal energy is eliminated. WU Zhijun and ZHANG Dong [14] presented an approach of defending against DoS attack in frequency domain.This approach analyzed DoS attack flows which utilized the signal processing method to explore the DoS attack spectrum distribution in frequency domain. The FIR filter was designed to filter the illegitimate frequencies in frequency domain and the LAR (Legitimate traffic to attacked traffic ratio) was improved about 10 dB.

    Periodic characteristic of LDoS attack flows facilitates to the research of attacks detection and filtration. Periodic signals and non periodic signals show different properties in spectrum distribution in frequency domain.A legitimate TCP flow should exhibit strong periodicity around its round-trip time (RTT) in both flow directions. Similarly, LDoS attack is also cyclical. But, the TCP-periodicity is millisecond while that of the cyclical LDoS attack is a second-level. Hence, the differences between TCP and LDoS attack are their periodical occupancies in different frequency bands of the spectrum in frequency domain [6][11]. And these differences are very easy to be distinguished by using signal processing technology.

    This paper proposes an approach of filtering LDoS attack flows based on the spectral energy distribution. A comb filter using IIR filter is designed to filter out the spectral energy belonging to LDoS attacks.

    III. INTERNET TRAFFIC ANALYSIS

    In time domain, it is quite difficult to distinguish LDoS attack flows from legitimate TCP flows, because both flows are very similar in nature and totally mixed. In order to explore the differences between LDoS attack flows and legitimate TCP flows, traffic energy distributions of LDoS attack flows and legitimate TCP flows are analyzed in frequency domain.The RTT value is estimated by using spectral analysis method. The comparative analysis of energy distribution of both legitimate TCP flows and LDoS attack flows are carried out in frequency domain.

    3.1 Analysis of legitimate TCP flows

    The TCP congestion control mechanism serving as a reliable end-to-end byte-based transport protocol, it has been remarkably successful in making the current Internet function efficiently. TCP protocol carries 95% of today’s Internet traffic and constitutes more than 80%of the total number of the flows in the Internet[5]. Hence, TCP-targeted LDoS attacks take advantage of the time-out mechanism of the TCP protocol to create persistent link congestions.

    Packet transmission of TCP can be characterized by the packet conservation principle[15]. This principle asserts that every arriving data packet at the receiver allows the departure of an ACK packet, and every arriving ACK packet at the sender enables the injection of a new data packet into the network. Consecutive packets within a window are sent out in a bursty manner, constrained only by the transmission time of the bottleneck link [7].The conservation principle leads to TCP flows showing obvious periodicity. If a TCP packet is sent out in the network at any point, that is to say, chances are there to see another packet belonging to the same TCP flow passing through the same point after one RTT. Therefore, legitimate TCP traffic flow also present some features related to RTT in frequency domain. Yu Chen and Kai Hwang [10] reveal that TCP flow presents a clear periodicity in frequency domain and the positions of peaks are related to the RTT of the communication by using the Abilene-III Internet trace data.

    The TCP flow whose RTT is about 50 ms was sampled every 1 ms withinThen the packet arrivals to the detecting router are regarded as a signal sequenceUsing Discrete Fourier Transform (DFT) to transformas following.

    Fig. 1 Amplitude spectrum of a TCP flow

    The amplitude spectrum of TCP flow is obtained by using DFT to convertinto the frequency according to the sampling theorem[16], the TCP signal is band-limited within 500 Hz. Fig. 1(a) evaluates the energy distribution of signal sequence, and Fig. 1(b) zooms in the low frequency band of 0 Hz to 200 Hz to show the detail characteristics of TCP flow in frequency domain.

    Fig. 1.(a) shows that the energy of TCP flow is almost evenly distributed along all the range of frequency band. Through carefully observation on the spectrum of each frequency range, there are more TCP energy located in some frequency bands than others, as shown in Fig. 1.(b). The peaks of energy distribution are located at different points determined by the RTT related to the TCP flow. This characteristic is particularly obvious in the low-frequency band.

    Because of congestion control mechanisms of TCP, packet arrivals of traffic flows appear periodic, which leads to the main energy of the flow locating in the bands corresponding to the RTT. Thus, it is feasible to guarantee the main energy of TCP can pass through if a filter scheme is designed to make sure that the energy corresponding to the RTT can pass through.So it is necessary to estimate RTT precisely in frequency domain for the sake of filtering work as follows.

    3.2 Estimation of RTT in frequency domain

    RTT is an important factor has direct impact on the QoS in the Internet. Taking TCP as an example, for its best popularity, it uses RTT to estimate the network load or the congestion,and therefore RTT needs to be measured frequently. RTT consists of the following parameters.

    A new available RTT estimation method is proposed by using traffic spectrum analysis.This method aims to estimate the peak locations of the flow in frequency domain related to RTT for the sake of filtering work following in the passage.

    The estimation of the RTT in frequency domain is as following, which is called frequency domain research method.

    Fig. 2 Estimation result using frequency domain research method

    The theory foundation of the estimation method is that the main energy of the TCP flow is distributed in the frequency bands corresponding to RTT.can be extracted from the selected maximum value ofFig. 2 shows the result of using the proposed method to estimate RTT of a TCP flow, and whose RTT is about 50 ms (Corresponding frequency point of 20 Hz).

    3.3 Energy distribution comparison of LDoS attack and legitimate TCP flows

    LDoS attack flows are generated by using LDoS attacks generation tool, which is Linux TCP-kernel source code [21]. A UDP-based software is used to generate attack flows in network simulation (NS-2) platform.The attack period is 1000 seconds, and the attack begins at 400 seconds and ends at 500 seconds. A tripleLDoS(T,L,R) = (2000 ms,50 ms, 15 Mbps) is used to describe the LDoS attacks.

    Transforming LDoS attack flows into power spectrum from time domain to frequency domain by using DFT. the Normalized Cumulative Amplitude Spectrum (NCAS) [6][10] of LDoS attack flows is obtained as Fig. 3.

    In time domain, the LDoS attack flows are a series of typical periodic rectangular impulse sequences, its power spectrum distribution is very similar to the rectangular pulse signal.So, the main energy of LDoS attack flows is concentrated in the main lobe.

    Fig. 3 shows that the power spectrum (energy) distribution of LDoS attack flows are concentrated in the low-frequency band. This distribution presents a very different spectral pattern from that of legitimate TCP flows, its power spectrum (energy) is distributing evenly all over the whole band[6][10].

    Fig. 3 Normalized amplitude spectrum of A single LDoS attack flow

    Fig. 4 Energy distribution comparison of LDoS attack and TCP flows

    In order to measure the difference between two power spectrum distributions, both NCAS of LDoS attack flows and legitimate TCP flows are calculated respectively[6][10]. Fig.4(a) indicates two power spectrum distributions, while Fig. 4(b) is the enlarged figure of interesting area, which locates in low frequency band of 0 Hz to 88 Hz.

    As shown in Fig. 4(a), the NCAS curve of legitimate TCP flow is almost rising linearly with the increases of frequency value, and its slope keeps nearly the same in the whole frequency band. However, the NCAS curve of LDoS attack flow has a very steep slope at low frequencies but a very gentle slope in other frequency bands. That is to say, the energy of TCP flow is substantially evenly distributed throughout the frequency domain. But the energy of LDoS attack flow is concentrated in the low-frequency band, in which more than 67% is located within frequency band range of[0,50]Hz [6][10].

    Fig. 4(b) shows that there is a step slope at frequency points of 0 Hz, 20 Hz, 40 Hz and 60 Hz while the slope is relative smooth at other frequency points. In other word, the slope has a abrupt increase at step frequency points. The mathematical interpretation of step slope is that the energy distributed at step frequency points are directly related to the monotonicity of a function in a certain interval. Hence, it is concluded that step change at these frequency points represents energy is concentrated in the vicinity of 0 Hz, 20 Hz,40 Hz and 60 Hz. This conclusion is consistent with the previous discussion that the main energy of legitimate TCP flow is distributed at the frequency points of n/RTT. In other word,the energy peaks of TCP flow occur at the frequency points of n/RTT. Except step frequency points, the slope is smaller and almost flat at other frequency points, this situation indicates that little energy is distributed at non-step frequency points. In low frequency band, it is extremely obvious that the energy distribution of legitimate TCP flows is ladder shaped, which is the most different characteristic from LDoS attack flows[6][10].

    Therefore, a comb filter can be designed 0to separate legitimate TCP flows and LDoS attack flows by filtering hybrid network traffic[13]. If the comb of designed filter is alignment of frequency points of n/RTT, most of the legitimate TCP flows will pass through the designed filter, while most of the LDoS attack flows will be filtered out. This is the basic principle of LDoS attack flows filtering based on frequency spectral analysis.

    IV. FILTER DESIGN

    Filter design is completed on the basis of the LDoS attack traffic analysis. It is designed according to the characteristic of the frequency spectrum distribution of normal TCP traffic and LDoS attack traffic in the frequency domain.

    4.1 Filter response

    Spectrum analysis shows that the spectrum distribution of LDoS attacks (as shown in Fig 3) is composed of a series of regularly distributed peaks, which looks similar to the comb. Hence, the traditional signal processing technology is used in designing a comb filter,which has several equally spaced passbands starting at[16]. Considering the fact that the spectrum of LDoS attack is mainly concentrated in the low frequency band (as shown in Fig 3) and the spectrum of TCP flows is almost uniformly distributed in the whole frequency band (as shown in Fig 1),the frequency at 1/RTT and its corresponding frequency at integral multiples of 1/RTT are designed as the passband of the comb filter,which ensures that most of normal TCP flow is passed. Hence, the designed comb filter has following frequency response [16].

    where, the order of filter isfundamental frequencyand sample frequencyis 1s.

    The magnitude response of comb filter is shown as Fig. 5.

    Fig 5 shows that the response simply consists of a repeating series of impulses decreasing in amplitude over time when stable. The magnitude response periodically drops to a local minimum and rises to a local maximum at corresponding frequency point of 1/RTT and integral multiples of 1/RTT [16]. The purpose of this design is to ensure that the overwhelming majority of normal TCP traffic can pass through, and as much as possible to stop the LDoS attack flows (filtering LDoS attack flows).

    4.2 Determining the filter order

    Fig. 5 The magnitude response of comb filter

    Fig. 6 The filtering flow chart of LDoS attack flow

    The ordernof comb filter is determined through precise estimation of RTT value. It can be calculated as

    The filtering effect should be fully considered once the order of comb filter is determined. The estimation of RTT value and evaluation of filtering effect are shown in following flow chart as Fig. 6.

    The procedures are as following.

    (i) Sample legitimate TCP flows under no LDoS attack situation with sampling interval of 1s

    (ii) Estimate RTT value by using frequency search method to determine the filter order.The estimated RTT is 50msThen the filter order

    (iii) Set the filter parameters. The center frequency of passband is 20 Hz and its integer times, and the passband bandwidth is 5.8 Hz.The passband maximum attenuation 1 dB, and the stop band minimum attenuation 15 dB.

    (iv) Sample legitimate TCP and LDoS attack flows respectively under LDoS attack situation.

    (v) Start filter operation and evaluate filtering effect.

    (vi) Change LDoS attack parameters ofTandL, and reconfigure comb filter design parameters.

    (vii) Change RTT value, repeat all above steps.

    In order to make the filtering effect better until getting the optimal, filtering results should be analyzed and evaluated during the whole process of filtering LDoS attack flows.

    Fig. 7 Diagram of filtering LDoS attack flows

    4.3 Filtering rule

    The principle of LDoS attack flows filtering by using comb filter is shown in Fig. 7[13].

    Spectral analysis explores that legitimate TCP flow has even energy distribution over the entire frequency band and main energy of LDoS attack flow is distributed in low frequency band. Based on the differences of energy distribution between the legitimate TCP flows and LDoS attack flows in frequency domain, Fig. 7 shows that the comb filter can be designed to ensure the main energy of legitimate TCP flows distributed in the frequency band corresponding to the RTT passing through the filtering rules, while most energy of LDoS attacks flows are blocked.

    (i) In low frequency band, main energy of LDoS attack flows are filtered out, and the vast majority of legitimate TCP flows pass through the comb filter. A very small amount of legitimate TCP flows are abandoned due to overlap of legitimate TCP flows and LDoS attack flows at frequency points corresponding to n/RTT.

    (ii) In high frequency band, legitimate TCP flows are the principal component while LDoS attack flows occupy small proportion. Hence,nearly all legitimate TCP flows are kept due to the well-designed magnitude response of comb filter. But, all the energy of LDoS attack flows that distributed in high frequency band pass through the designed comb filter smoothly.

    In general, the designed comb filter aims to let as much as possible legitimate TCP traffic pass through and maximum stop LDoS attack flows through.

    V. EXPERIMENTS AND RESULT ANALYSIS

    Experiments on LDoS attack flows filtering are carried out by using designed comb filter in Network Simulation (NS-2) platform with the topology shown in Fig. 8.

    Experimental network topology is a dumbbell shape, two routers A and B connect all TCP and victim servers.

    In Fig. 8, node 1, 2, and 3 are TCP clients,Node 4 is LDoS attacker, and Node 5, 6 and 7 are TCP servers. Node A and B are two routers at both end of bottleneck link. The bandwidth between clients and the router A is 100Mb with a delay of 2.5ms, the link between router B and servers is the same configuration. Total 9 links between TCP clients 1, 2, 3 to server 5, 6, 7 are recorded, and the RTT values of the all links are set to the same value (Because all link paths are the same).

    The experimental scenario is a simulation of FTP transmission process. The client uses the UDP protocol to upload and download files to the server. In this scenario, the sender and receiver are described as (i) In the absence of LDoS attacks, TCP clients 1, 2, and 3 are the senders of packets, and TCP servers 5, 6 and 7 are the receivers of packets. (ii) In the case of LDoS attacks, Node 4 ( LDoS attacker) is the sender of packets, and TCP servers 5, 6 and 7 are the receivers of packets.

    LDoS attack flows are generated by using a UDP-based software, which is a tool exploiting the Linux TCP-kernel source code [1][21].The period of LDoS attack is 1000 seconds.

    The bandwidth of bottleneck link between the router A and B is 15Mb with a delay ofαms. The bandwidth between attacker and the router A is 15Mb with a delay of 2.5ms. Thus,

    where,RTTis calculated according to whole link.

    5.1 RTT estimation

    As mentioned above, Fig 2 illustrates the estimation of RTT by using frequency domain research method and shows that there was a peak at 20 Hz (50ms), which is the estimated value of RTT. Therefore, to find the highest peak of the spectrum through frequency domain analysis, and the frequency point corresponding to the highest peak of the spectrum is RTT value

    In Fig. 8, all links have the same RTT value, and then the frequency points corresponding to the highest peak of the spectrum are identical for all links. Hence, spectrum superposition is realized to form the aggregated flow.

    Set RTT to be 20 ms, 40 ms, … , and 200 ms individually by adjusting the delay ofαto in NS-2 platform. Then, estimate RTT value of whole link. The estimated RTT is expressed as RTTes, which is the obtained by using frequency domain research method. In order to obtained preciseα, the relative errors between RTT and RTTes are calculated and result are listed in Table I.

    Table I shows that the value of RTTes is very close to that of the RTT and their relative error is tiny. Considering the response processing time of NS-2 simulation platform, the value of RTTes is typically larger than the value of RTT set in NS-2 simulation platform. In fact, the relative error will be tinier if the real values of RTT are acquired.

    5.2 LDoS attack flow filtering

    The comber filter is designed to filter the LDoS attack flows.

    Table I Estimation of RTT by using frequency domain search method

    Fig. 8 The layout of simulation experiments

    5.2.1 Comb filter

    Fig. 9 Energy distribution of both TCP and LDoS attack flows within 50 Hz

    Fig. 10 Feedback magnitude response for delay values of 19.625

    Table II Filtering effect comparison when T changes with constant L

    RTT values in the Ethernet environment are typically several tens of milliseconds. In the experiment environments shown as Fig. 8,settingαto satisfy RTT=49.25 s,αequals 19.625 according to equation (4). The value of RTTes=50 s is obtained by using the frequency domain search method, thenHz.The filter order iswhereis 1000 Hz [6]. Setting the parameters of LDoS attack: T=2 s,L=50 ms. Sampling TCP traffic under no LDoS attack for 100 s, so does to the TCP and LDoS attack flows under LDoS attack. The energy distribution of both TCP and LDoS attack flows within 50 Hz are shown in Fig. 9.

    The magnitude response of designed feedback comb filter is shown in Fig. 10.

    The filtering effect is analyzed as following.

    After filtering, the energy of TCP remains 91.84% under no attack situation, while it remains 81.08% and the energy of LDoS attack remains 22.21% under the attack situation.The filtering effects are shown in Fig. 11(a),(b)and Fig. 12(a),(b). They are respectively for TCP and LDoS attack both in frequency domain and time domain under attack situation.

    As shown in Fig. 11(a), the TCP flow remains the features of the comb spectrum broadly under attack situation. The shape of the spectrum nearly keeps unchanged after filtering. It is also observed clearly that the majority of TCP packets pass through the comb filter in Fig. 11(b). Most energy of the LDoS attack can be eliminated from the filter through comparison in Fig. 12(a), and it is verified visually in Fig. 12(b).

    In order to get a better observation on the performance of the filter, different values of attack period T and pulse duration L are applied with during the experiments. The remained percentage of energy is shown in Table II and Table III.

    From the Table II and Table III, we can make a conclusion that different attack parameters lead to different filtering effect even of the same comb filter. The longer the attack period T is set, the more energy of TCP flow remains after filtering, which illustrates a better filtering effect.

    At the same time, it has little impact on the remained energy of LDoS attack. The longer the pulse duration L is set, the less energy of TCP flow remains and the less energy of LDoS attack flow is filtered out, which shows a bad filtering effect. It is clear that LDoS attack traffic throttles legitimate TCP traffic more heavily with a shorter attack period T and a longer pulse duration L. Therefore, if the proportion of LDoS attack traffic in the whole link rises, it will lead to the changes of queuing delay which affects the value of RTT,resulting in the spectrum changes of legitimate TCP traffic. Since the spectrum appearance of TCP traffic under attack situation is not consistent with that of TCP traffic under no attack situation. It makes the filtering effect of TCP traffic under attack situation become worse.The filtering effect will be closer to that of under no attack situation when parameters of LDoS attack have less impact on TCP traffic.

    5.2.2 Improved comb filter

    Even the comb filter can satisfy the basic requests of filtering, the filtering effect is not optimal due to the limitations of the comb filter design and the estimation deviations of the RTT. Based on the Equation (3), the accuracy ofleads to passbands of comb filter deviating slowly from the peak locations corresponding to the RTT with the increase ofOn the other hand, the main energy of LDoS attack is concentrated in low frequency-band whereas TCP flow has its energy distributed along the whole frequency band. From the above considerations, the comb filter can be improved as following. Making the whole energy of high frequency pass through, which makes sure that the filtering effect of the TCP flow has a great improvement and promises little impact on LDoS attack. Then decreasing the passband bandwidth of the comb filter and increasing the value of the maximum attenuation of its passband, which guarantee the main energy of TCP still pass through and also eliminate more energy of LDoS attack remarkably in low frequency-band.

    By improving the filter based on the analysis mentioned before, and decreasing the passband bandwidth of the comb filter while increasing the value of the maximum attenuation of its passband can let all the energy above the frequency band [80,500]Hz pass through. The remained percentage of energy is obtained as in Table IV.

    Fig. 11(a) Spectrum analysis of TCP traffic under attack situation

    Fig. 11(b) Analysis of TCP traffic under attack situation in time domain

    Table III Filtering effect comparison when L changes with constant T

    Fig. 12(a) Spectrum analysis of LDoS attack traffic

    Fig. 12(b) Analysis of LDoS attack traffic in time domain

    Table IV Filtering effect of improved comb filter

    Through comparison between Table IV and Table II, the filtering effect of LDoS attack has a slight improvement while that of TCP flow has improved about 5%. It means that more energy of TCP flow remains after filtering.The improved filter has a better filtering effect than that of a single comb filter, and of which effects is shown in Fig. 13(a) and (b).

    Let’s compare Fig. 13(a) with Fig. 11(a),Fig. 10(b) with Fig. 12(a) respectively. It is shown that the improved filter makes more TCP traffic energy pass through while has little impact on the energy of LDoS attack, and whose most energy is concentrated in low-frequency band. Since the TCP traffic energy distributes evenly along the whole frequency band, the improved filter makes more TCP traffic pass through while hardly hurts the filtering effect of LDoS attack.

    5.2.3 Comparison analysis

    The proposed approach is conducted by the means of comparing with other related methods of filtering LDoS attack traffic in frequency domain.

    The paper[14] exploited PSD to show the energy distribution’s difference between normal traffic and attack traffic with designing FIR filter in frequency domain directly to filter out shrew attacks. It adopted windowing method to design a magnitude response of prescribed shape. However, the desired magnitude response contains several jump discontinuities. And the oscillations caused by Gibb’s phenomenon effectively prohibit the design of filters having a very small passband ripple or stopband attenuation[16]. So the width of the transition band is increased to remedy it,which can affect the filtering effect. Besides,the premise of the windowing method of paper[14] is that the spectrum of TCP traffic is known. The proposed approach overcomes the shortcoming of the method in that paper[14]by designing IIR filter with the RTT estimation in frequency domain. So it has a good filtering property for unknown spectrum of TCP traffic.

    The paper[13] explored the obvious differences mainly in the low-frequency band with designing a window–function FIR filter to eliminate LDoS attack traffic whose main energy is distributed in the low-frequency band. The key of this method is to find out the detection point FD, where the biggest difference between the energy proportion of legit-imate TCP flow and LDoS attack occurred in low-frequency band. The energy distributed at frequency which is smaller than that of the detection point is filtered out, whereas the energy distributed at frequency which is bigger than that of the detection point passes through the FIR filter. So it is difficult to find out the detection point accurately, which affects the filtering effect greatly. If the mistake was made in finding out the detection point, it would result in filtering out massive legitimate traffic or letting a massive of LDoS attack traffic pass through. Besides, it does not allow any energy distributed at frequency which is smaller than the detection point to pass through the filter, which hurts the TCP traffic a lot whose energy proportion in the low-frequency band should not be ignored. However, the proposed approach is aimed at solving this problem by designing a comb filter to ensure the energy of TCP in the low-frequency band pass through,and with limited impact on LDoS attack traffic. The improved comb filter offers a better filtering effect than the FIR filter in paper[13]in the same experiment environments, especially the pass rate of TCP traffic.

    The filtering operations of proposed approach are carried out in more complicated experiments. Furthermore, the filtering effects with different attack parameters are compared,so it increases the experimental complexity and describes the filter principle in details.From the implementation point of view, it can be stated that the improved comb filter offers a more effective and more robust design in comparison to the conventional FIR approach.

    VI. CONCLUSIONS

    Fig. 13(a) Spectrum analysis of TCP traffic

    Fig. 13(b) Spectrum analysis of LDoS attack traffic

    Characteristics of TCP congestion control mechanism determines that the TCP connection appears a peak flow for every RTT, resulting in the periodic change of a single TCP flow associated with RTT to some extent. For LDoS attack traffic, the long-period (second-level)features and the rectangular pulse characteristics determine that its spectral energy is more concentrated in the lower frequency band.Based on the analysis mentioned above, it is possible to design the improved comb filter in frequency domain. The filter is designed to filter out LDoS attack traffic as much as possible whose energy is concentrated in low frequency at the same time ensures the TCP traffic pass though the filter successfully whose energy distribution exhibits periodicity in frequency domain. The simulation experiments show that the filtering work in frequency domain has a good filtering effect.

    However, there is an inevitable spectrum overlap of energy distribution between them,especially near the zero frequency, which results in a great difficulty in separating LDoS attack traffic from TCP traffic completely in frequency domain. To filter out more LDoS attack traffic is bound to bring losses to legitimate TCP traffic.

    ACKNOWLEDGEMENTS

    The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was supported in part by the National Natural Science Foundation under grant No. U1533107, the Major Program of Natural Science Foundation of Tianjin under grant No. 17JCZDJC30900,the Fundamental Research Funds for the Central Universities of CAUC under grant No.3122016D003, and the graduate program of curriculum development project of Civil Aviation University of China (2050070515).

    [1] A. Kuzmanovic, E. W. Knightly, “Low-rate TCP-targeted denial of service attacks and counter strategies[J]”,IEEE/ACM Transactions on Networking, vol.14, no.4, pp 683-696, 2006.

    [2] A. Kuzmanovic, E. W. Knightly, “Low-rate TCP-targeted denial of service attacks [C]”, inproceedings of ACM SigComm 2003, pp 75-86,2003.

    [3] Y. J Tang, X. P Luo, Q Hui, R. K. C. Chang,“Modeling the vulnerability of feedback-control based Internet services to Low-Rate DoS attacks[J]”.IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp 339 – 353,2014.

    [4] V. Kumar, P. Jayalekshmy, G. Patra, R. Thangavelu, “On remote exploitation of TCP sender for low-rate flooding denial-of-service attack[J]”,IEEE Communications Letters, vol. 13, no. 1, pp 46-48,2009.

    [5] K. Thompson, G.J. Miller, R. Wilder, “Wide-area Internet traffic patterns and characteristics[J]”,IEEE Network, vol. 11, no. 6, pp 10-23, 1997.

    [6] Y Chen, and K. Hwang, “Collaborative detection and filtering of Shrew DDoS attacks using spectral analysis[J]”,Journal of Parallel and Distributed Computing, vol. 66, no. 9, pp 1137-1151,2006.

    [7] C. M Cheng, H Kung, K. S Tan, “Use of spectral analysis in defense against DoS attacks[C]”,in proceedings of IEEE Conference on Global Telecommunications, pp 2143-2148, 2002.

    [8] P. Barford, J. Kline, D. Plonka, A. Ron, “A signal analysis of network traffic anomalies[J]”,Proceedings of ACM Sigcomm Internet Measure-ment Workshop, pp 71-82, 2002.

    [9] A. Petropulu, R. Nowak, “Signal processing for networking[C]”,IEEE Signal Processing Magazine, pp 12-13, May , 2002.

    [10] Y Chen, K. Hwang, “Spectral analysis of TCP flows for defense against reduction-of-quality attacks[C]”,Proc. IEEE Communications Society subject matter experts ICC, 2007.

    [11] R. F. Fouladi, T. Seifpoor, E. Anarim. “Frequency characteristics of DoS and DDoS attacks[C]”,in proceedings of 21th Signal Processing and Communications Applications Conference, 2013.

    [12] H Chen, Y Chen, D. H. Summerville, Z Su, “An optimized design of reconfigurable PSD accelerator for online Shrew DDoS attacks detection”,Proc. IEEE Infocom, vol. 12, no. 11, pp 1780-1787, 2013.

    [13] Z.J Wu, Z Shi, “Filtering LDoS attack by FIR filter”,The Chinese Journal of Electronics (CJE), vol.19, no. 2, pp 275-278, 2010.

    [14] Z.J Wu, D. Zhang, “The approach of defending against DoS attack in frequency domain[J]”,Journal of Electronics & Information Technology,vol. 30, no. 6, pp 1493-1495, 2008.

    [15] V. Jacobson, “Congestion avoidance and control[J]”,ACM Computer Communication Review,vol. 18, no. 4, pp 314-329, August, 1988.

    [16] V. K. Ingle, J. G. Proakis, “Digital Signal Processing Using MATLAB [M]”,WIELY, pp 361-571,2011.

    [17] M. Imal, Y. Sugizaki, K. Asatani, “A new estimation method using RTT for available bandwidth of a bottleneck link”, in proceedings ofInternational Conference on Information NETWORKING IEEE Computer Society, pp 529-534, 2013.

    [18] A. Moosbrugger, P. Dorfinge, “Passive RTT measurement during connection close”,Software,Telecommunications and Computer Networks(SofteCOM), pp 392-396, 2010.

    [19] S. Floyd, E. Kohler, “Internet research needs better models”,In Proceedings of HOTNETS’02,Princeton, October, 2002.

    [20] H. Jiang and C. Dovrolis, “Passive estimation of TCP round-trip times”,ACM Computer Comm.Review, vol. 32, no. 5 , pp 5-21, July, 2002.

    [21] E. W. Knightly, A. Kuzmanovic, “Shrew attack Linux code,” December, 2004, http://www.cs.northwestern.edu/~akuzma/rice/shrew/.

    不卡一级毛片| 国产黄色免费在线视频| 一区二区三区激情视频| bbb黄色大片| 国产欧美亚洲国产| 午夜日韩欧美国产| 国产麻豆69| 亚洲视频免费观看视频| 亚洲精品一卡2卡三卡4卡5卡| 一级片'在线观看视频| 午夜福利在线免费观看网站| 精品人妻1区二区| 丁香六月欧美| 高清毛片免费观看视频网站 | 中文字幕人妻丝袜制服| 欧美在线黄色| 久久精品亚洲熟妇少妇任你| 人妻久久中文字幕网| 两性夫妻黄色片| 99riav亚洲国产免费| 亚洲国产精品sss在线观看 | 日日爽夜夜爽网站| 99久久99久久久精品蜜桃| 欧美乱码精品一区二区三区| 下体分泌物呈黄色| 我的亚洲天堂| 老司机福利观看| 国产aⅴ精品一区二区三区波| 国产成人av激情在线播放| 国产高清国产精品国产三级| 亚洲免费av在线视频| 中出人妻视频一区二区| 亚洲精品国产一区二区精华液| 久久久国产成人精品二区 | 欧美亚洲 丝袜 人妻 在线| 亚洲熟妇熟女久久| 九色亚洲精品在线播放| 一区二区三区精品91| 一二三四社区在线视频社区8| 麻豆成人av在线观看| 欧美另类亚洲清纯唯美| 日韩大码丰满熟妇| 国产男靠女视频免费网站| aaaaa片日本免费| 极品少妇高潮喷水抽搐| 久久久久精品国产欧美久久久| 国产欧美亚洲国产| 亚洲全国av大片| 久久久久国产精品人妻aⅴ院 | 精品视频人人做人人爽| 人人妻,人人澡人人爽秒播| 久久久久久久国产电影| 久久人人97超碰香蕉20202| 国产精品久久久久成人av| 亚洲专区字幕在线| 在线国产一区二区在线| 丰满迷人的少妇在线观看| 国产精品一区二区在线不卡| 一区二区三区国产精品乱码| 午夜精品久久久久久毛片777| 久久精品国产亚洲av高清一级| 欧美日韩中文字幕国产精品一区二区三区 | 丝袜美足系列| 亚洲在线自拍视频| 成人影院久久| 国产成人啪精品午夜网站| 欧美国产精品一级二级三级| 亚洲精品av麻豆狂野| 老司机在亚洲福利影院| 国产精品1区2区在线观看. | 国产亚洲精品久久久久久毛片 | 一区在线观看完整版| 18禁裸乳无遮挡免费网站照片 | 51午夜福利影视在线观看| 欧美在线一区亚洲| 精品福利永久在线观看| 在线观看午夜福利视频| 亚洲色图 男人天堂 中文字幕| 69精品国产乱码久久久| 久久久久视频综合| 精品久久蜜臀av无| 50天的宝宝边吃奶边哭怎么回事| 一本综合久久免费| 不卡一级毛片| av在线播放免费不卡| 国产真人三级小视频在线观看| 午夜视频精品福利| 老司机福利观看| 一进一出抽搐动态| 777米奇影视久久| 国产熟女午夜一区二区三区| 久久草成人影院| 脱女人内裤的视频| 午夜福利影视在线免费观看| 亚洲精品国产区一区二| av在线播放免费不卡| 在线天堂中文资源库| 久久中文字幕人妻熟女| 高清视频免费观看一区二区| 一本综合久久免费| 婷婷丁香在线五月| 免费在线观看亚洲国产| 黑人猛操日本美女一级片| 欧美日韩亚洲国产一区二区在线观看 | av福利片在线| 国产欧美日韩一区二区精品| 久久香蕉激情| 在线av久久热| 国产成人av激情在线播放| av不卡在线播放| 丝袜在线中文字幕| 欧美午夜高清在线| 日本a在线网址| av片东京热男人的天堂| 韩国av一区二区三区四区| videos熟女内射| 18禁国产床啪视频网站| 欧美日韩亚洲综合一区二区三区_| 91国产中文字幕| 多毛熟女@视频| 国产免费男女视频| 亚洲国产欧美日韩在线播放| 午夜福利乱码中文字幕| 亚洲七黄色美女视频| 一进一出抽搐动态| 夫妻午夜视频| 夜夜躁狠狠躁天天躁| 超碰成人久久| 9热在线视频观看99| 亚洲欧美精品综合一区二区三区| 午夜两性在线视频| 国产精品综合久久久久久久免费 | 夜夜爽天天搞| 午夜老司机福利片| 免费在线观看日本一区| 一边摸一边做爽爽视频免费| 午夜福利欧美成人| 久久中文字幕人妻熟女| 99久久精品国产亚洲精品| 日韩欧美在线二视频 | 日韩制服丝袜自拍偷拍| 天堂动漫精品| 亚洲五月天丁香| 中国美女看黄片| 嫁个100分男人电影在线观看| 国产亚洲精品久久久久5区| 中文欧美无线码| 嫁个100分男人电影在线观看| 69精品国产乱码久久久| svipshipincom国产片| 久久国产亚洲av麻豆专区| 9热在线视频观看99| av中文乱码字幕在线| 国产黄色免费在线视频| а√天堂www在线а√下载 | 成人国产一区最新在线观看| 国产精品二区激情视频| 丝袜美腿诱惑在线| 高清毛片免费观看视频网站 | 亚洲人成电影观看| 色尼玛亚洲综合影院| 侵犯人妻中文字幕一二三四区| 一区二区日韩欧美中文字幕| 久久精品91无色码中文字幕| 久久久久精品国产欧美久久久| 日韩中文字幕欧美一区二区| 国产淫语在线视频| 一夜夜www| 高清av免费在线| 欧美最黄视频在线播放免费 | 正在播放国产对白刺激| 成年人午夜在线观看视频| 老司机靠b影院| 美女午夜性视频免费| 啦啦啦 在线观看视频| 欧美黑人欧美精品刺激| 午夜亚洲福利在线播放| 18禁黄网站禁片午夜丰满| 国产精品一区二区在线不卡| 精品国内亚洲2022精品成人 | 18禁观看日本| 日本精品一区二区三区蜜桃| 中亚洲国语对白在线视频| 夫妻午夜视频| 亚洲av片天天在线观看| 纯流量卡能插随身wifi吗| 国产欧美日韩精品亚洲av| 一级片免费观看大全| 国产成人啪精品午夜网站| 欧美日韩av久久| 亚洲精品成人av观看孕妇| 大码成人一级视频| 99国产精品99久久久久| 亚洲欧美精品综合一区二区三区| 国产单亲对白刺激| 人妻丰满熟妇av一区二区三区 | 一边摸一边做爽爽视频免费| 一区福利在线观看| 黄频高清免费视频| 大型av网站在线播放| 久久久久久亚洲精品国产蜜桃av| 欧美国产精品一级二级三级| 国产精品免费视频内射| 国产亚洲精品第一综合不卡| 亚洲av电影在线进入| 久久久久国产一级毛片高清牌| 午夜激情av网站| 精品一品国产午夜福利视频| 男女下面插进去视频免费观看| aaaaa片日本免费| 亚洲午夜理论影院| 超碰成人久久| a级片在线免费高清观看视频| 亚洲精品自拍成人| 91老司机精品| 国产乱人伦免费视频| 久久亚洲精品不卡| 一级片免费观看大全| 50天的宝宝边吃奶边哭怎么回事| 久久久精品区二区三区| 国产精品免费一区二区三区在线 | 午夜久久久在线观看| 日韩免费高清中文字幕av| 丝瓜视频免费看黄片| 19禁男女啪啪无遮挡网站| 热99re8久久精品国产| 又黄又粗又硬又大视频| 日韩 欧美 亚洲 中文字幕| 久久天躁狠狠躁夜夜2o2o| 久久久国产一区二区| 国产免费男女视频| 80岁老熟妇乱子伦牲交| 男人操女人黄网站| 久久久久久久久免费视频了| 不卡一级毛片| 人妻 亚洲 视频| 久久精品亚洲av国产电影网| 精品少妇久久久久久888优播| 国产男靠女视频免费网站| 黑丝袜美女国产一区| 老司机午夜十八禁免费视频| 午夜日韩欧美国产| 老熟妇仑乱视频hdxx| 国产精品九九99| av片东京热男人的天堂| 午夜激情av网站| 18禁国产床啪视频网站| 亚洲精品自拍成人| 看免费av毛片| 人人妻,人人澡人人爽秒播| 岛国毛片在线播放| bbb黄色大片| 久久久久国产精品人妻aⅴ院 | 久久草成人影院| 免费在线观看视频国产中文字幕亚洲| 久久久精品免费免费高清| 亚洲五月天丁香| 淫妇啪啪啪对白视频| 99国产精品一区二区三区| 亚洲成人免费av在线播放| 精品免费久久久久久久清纯 | 精品视频人人做人人爽| 叶爱在线成人免费视频播放| 性少妇av在线| 欧美人与性动交α欧美软件| 大型黄色视频在线免费观看| 精品国产一区二区三区四区第35| 男女下面插进去视频免费观看| 国产精品久久电影中文字幕 | 99国产精品免费福利视频| 中亚洲国语对白在线视频| 夜夜躁狠狠躁天天躁| 国产男靠女视频免费网站| 满18在线观看网站| 国产成人啪精品午夜网站| 精品一区二区三区视频在线观看免费 | 黄色片一级片一级黄色片| 人人妻人人添人人爽欧美一区卜| 老司机亚洲免费影院| 久久中文看片网| 国产精品偷伦视频观看了| 伦理电影免费视频| 日韩免费av在线播放| 国产成人精品久久二区二区91| 人妻久久中文字幕网| 每晚都被弄得嗷嗷叫到高潮| а√天堂www在线а√下载 | av视频免费观看在线观看| 欧美乱妇无乱码| 免费一级毛片在线播放高清视频 | 亚洲欧美一区二区三区久久| 国产日韩欧美亚洲二区| 99riav亚洲国产免费| 欧美乱色亚洲激情| 一区二区日韩欧美中文字幕| 99riav亚洲国产免费| 不卡av一区二区三区| 久久精品国产亚洲av香蕉五月 | 建设人人有责人人尽责人人享有的| 国产不卡av网站在线观看| 国产精品偷伦视频观看了| 国产aⅴ精品一区二区三区波| 欧美国产精品va在线观看不卡| 在线观看一区二区三区激情| 最近最新中文字幕大全免费视频| 国产精品免费大片| 国产在线一区二区三区精| 日韩人妻精品一区2区三区| 亚洲精品国产色婷婷电影| 成人永久免费在线观看视频| 十八禁高潮呻吟视频| 天天操日日干夜夜撸| 国产单亲对白刺激| 曰老女人黄片| 在线免费观看的www视频| 国产精品成人在线| 少妇猛男粗大的猛烈进出视频| 伊人久久大香线蕉亚洲五| 90打野战视频偷拍视频| 久久久精品国产亚洲av高清涩受| 丁香六月欧美| 91字幕亚洲| 亚洲人成77777在线视频| 亚洲综合色网址| 亚洲五月色婷婷综合| 亚洲男人天堂网一区| 国产欧美日韩一区二区精品| xxxhd国产人妻xxx| 国产在线观看jvid| 母亲3免费完整高清在线观看| 国产精品 欧美亚洲| 岛国在线观看网站| 黄片小视频在线播放| 久久精品国产亚洲av高清一级| 淫妇啪啪啪对白视频| 新久久久久国产一级毛片| 亚洲av第一区精品v没综合| 亚洲精品国产一区二区精华液| 国产免费男女视频| 久热这里只有精品99| 欧美人与性动交α欧美精品济南到| 看免费av毛片| 好男人电影高清在线观看| 亚洲中文av在线| 中文字幕色久视频| 在线十欧美十亚洲十日本专区| 亚洲,欧美精品.| 国产熟女午夜一区二区三区| 丝袜美足系列| 日韩精品免费视频一区二区三区| 国产成人影院久久av| 丁香六月欧美| 精品国产一区二区三区四区第35| 两性夫妻黄色片| 91九色精品人成在线观看| 热99久久久久精品小说推荐| 夫妻午夜视频| 亚洲成人国产一区在线观看| 国产精品免费大片| 婷婷精品国产亚洲av在线 | 天天躁夜夜躁狠狠躁躁| 在线观看免费午夜福利视频| 精品电影一区二区在线| 操出白浆在线播放| 亚洲色图av天堂| 国产亚洲欧美在线一区二区| 日日夜夜操网爽| 一区福利在线观看| 别揉我奶头~嗯~啊~动态视频| 欧美成人午夜精品| 亚洲色图 男人天堂 中文字幕| 麻豆成人av在线观看| 久久亚洲真实| 欧美日韩精品网址| 又大又爽又粗| 精品国产超薄肉色丝袜足j| 在线观看午夜福利视频| 中文亚洲av片在线观看爽 | 日韩制服丝袜自拍偷拍| 美女 人体艺术 gogo| 三上悠亚av全集在线观看| 大香蕉久久成人网| 欧美日韩黄片免| 久久九九热精品免费| 亚洲五月色婷婷综合| 国产成人影院久久av| 国产亚洲av高清不卡| 桃红色精品国产亚洲av| 亚洲精品国产区一区二| bbb黄色大片| 天天躁夜夜躁狠狠躁躁| 国产成人免费观看mmmm| 国产野战对白在线观看| 99久久国产精品久久久| 欧美不卡视频在线免费观看 | 久久久久久免费高清国产稀缺| 免费高清在线观看日韩| 99精品久久久久人妻精品| 老熟妇乱子伦视频在线观看| 欧美在线一区亚洲| 99国产精品99久久久久| 欧美黑人欧美精品刺激| 国产精品一区二区在线不卡| 波多野结衣av一区二区av| 一区在线观看完整版| 国产成+人综合+亚洲专区| 国产欧美日韩一区二区三| aaaaa片日本免费| 在线观看www视频免费| 最近最新中文字幕大全免费视频| 久久国产亚洲av麻豆专区| 亚洲熟妇中文字幕五十中出 | 成人手机av| av国产精品久久久久影院| 久久天堂一区二区三区四区| 国产麻豆69| 一边摸一边做爽爽视频免费| 天天添夜夜摸| 久久人妻av系列| 一区二区三区激情视频| 黄色女人牲交| 日韩视频一区二区在线观看| 50天的宝宝边吃奶边哭怎么回事| 亚洲成人免费av在线播放| 亚洲一卡2卡3卡4卡5卡精品中文| netflix在线观看网站| 欧美黑人精品巨大| 精品久久久久久电影网| 侵犯人妻中文字幕一二三四区| 午夜亚洲福利在线播放| xxxhd国产人妻xxx| 国产不卡av网站在线观看| 可以免费在线观看a视频的电影网站| 久久婷婷成人综合色麻豆| 视频在线观看一区二区三区| 王馨瑶露胸无遮挡在线观看| 人人妻人人爽人人添夜夜欢视频| 校园春色视频在线观看| 精品亚洲成a人片在线观看| 欧美成狂野欧美在线观看| 亚洲欧美精品综合一区二区三区| 精品免费久久久久久久清纯 | 老司机影院毛片| 免费在线观看日本一区| 欧美在线黄色| 欧美日韩亚洲国产一区二区在线观看 | 国产欧美日韩精品亚洲av| 啦啦啦视频在线资源免费观看| av有码第一页| 免费日韩欧美在线观看| 视频在线观看一区二区三区| 老司机靠b影院| 性少妇av在线| 精品视频人人做人人爽| 亚洲在线自拍视频| 大陆偷拍与自拍| 久久精品亚洲熟妇少妇任你| 十八禁人妻一区二区| 动漫黄色视频在线观看| 日韩一卡2卡3卡4卡2021年| 亚洲美女黄片视频| 黄色丝袜av网址大全| 欧美黑人欧美精品刺激| 丝袜美足系列| 国产精品久久久久久人妻精品电影| 建设人人有责人人尽责人人享有的| 操出白浆在线播放| 天天影视国产精品| 正在播放国产对白刺激| 国产精品.久久久| 女人爽到高潮嗷嗷叫在线视频| 色94色欧美一区二区| 好看av亚洲va欧美ⅴa在| 高清黄色对白视频在线免费看| 变态另类成人亚洲欧美熟女 | 高清毛片免费观看视频网站 | 国产真人三级小视频在线观看| 99久久综合精品五月天人人| 亚洲精品一二三| av国产精品久久久久影院| 黑丝袜美女国产一区| 下体分泌物呈黄色| 国产熟女午夜一区二区三区| 午夜影院日韩av| 在线播放国产精品三级| 日韩三级视频一区二区三区| 欧美国产精品va在线观看不卡| 99riav亚洲国产免费| 纯流量卡能插随身wifi吗| 可以免费在线观看a视频的电影网站| 国产主播在线观看一区二区| 窝窝影院91人妻| 一夜夜www| 精品少妇一区二区三区视频日本电影| 69精品国产乱码久久久| 波多野结衣av一区二区av| 久久ye,这里只有精品| 国产欧美亚洲国产| 757午夜福利合集在线观看| 青草久久国产| 丝瓜视频免费看黄片| 亚洲avbb在线观看| 久久中文看片网| 亚洲国产欧美网| 51午夜福利影视在线观看| 国产亚洲一区二区精品| 欧美丝袜亚洲另类 | 欧美激情久久久久久爽电影 | 免费人成视频x8x8入口观看| 欧美成人午夜精品| 国产精品秋霞免费鲁丝片| 久久精品aⅴ一区二区三区四区| 夜夜躁狠狠躁天天躁| 国产一区二区三区在线臀色熟女 | 女人高潮潮喷娇喘18禁视频| 99热网站在线观看| 久久久久国产精品人妻aⅴ院 | 久久精品亚洲熟妇少妇任你| 久久中文字幕一级| 免费观看精品视频网站| 国产蜜桃级精品一区二区三区 | 巨乳人妻的诱惑在线观看| 中出人妻视频一区二区| 一区福利在线观看| www.精华液| 国产精品久久久人人做人人爽| 中文字幕最新亚洲高清| 亚洲第一av免费看| 中出人妻视频一区二区| 亚洲少妇的诱惑av| av片东京热男人的天堂| 国产深夜福利视频在线观看| 麻豆国产av国片精品| 欧美日韩亚洲高清精品| 在线观看午夜福利视频| 黄色成人免费大全| 欧美精品人与动牲交sv欧美| 欧美日韩精品网址| 亚洲国产欧美一区二区综合| 曰老女人黄片| 男女免费视频国产| 成年人午夜在线观看视频| 美女高潮到喷水免费观看| 国产高清国产精品国产三级| 成年动漫av网址| 人妻久久中文字幕网| 啦啦啦免费观看视频1| 国产精品亚洲av一区麻豆| 久久精品熟女亚洲av麻豆精品| 欧美一级毛片孕妇| 少妇粗大呻吟视频| 午夜精品久久久久久毛片777| 老司机靠b影院| 亚洲一卡2卡3卡4卡5卡精品中文| 大型黄色视频在线免费观看| 婷婷精品国产亚洲av在线 | 欧美成人午夜精品| 日韩大码丰满熟妇| 国精品久久久久久国模美| 日韩三级视频一区二区三区| 啦啦啦视频在线资源免费观看| 久久精品人人爽人人爽视色| 好看av亚洲va欧美ⅴa在| 午夜亚洲福利在线播放| 亚洲国产精品合色在线| 啪啪无遮挡十八禁网站| 久久香蕉精品热| 69精品国产乱码久久久| 精品电影一区二区在线| 夜夜夜夜夜久久久久| videos熟女内射| 91麻豆av在线| 欧美黑人精品巨大| xxx96com| a级片在线免费高清观看视频| 国产成人av教育| 精品人妻1区二区| 18禁裸乳无遮挡动漫免费视频| 女人高潮潮喷娇喘18禁视频| 中出人妻视频一区二区| 国产蜜桃级精品一区二区三区 | 亚洲熟妇中文字幕五十中出 | 欧美日韩精品网址| 免费人成视频x8x8入口观看| 亚洲欧美精品综合一区二区三区| 国产黄色免费在线视频| 欧美精品亚洲一区二区| 嫁个100分男人电影在线观看| 久久久久久免费高清国产稀缺| 久9热在线精品视频| 久久人人97超碰香蕉20202| bbb黄色大片| 精品亚洲成国产av| 在线播放国产精品三级| 宅男免费午夜| 又黄又爽又免费观看的视频| 亚洲五月天丁香| 亚洲精品中文字幕在线视频| x7x7x7水蜜桃| 精品人妻1区二区| 婷婷丁香在线五月| 欧美激情 高清一区二区三区| 国精品久久久久久国模美| 国产av精品麻豆| 欧美乱色亚洲激情| 国产精品久久视频播放| 美女视频免费永久观看网站| 亚洲成a人片在线一区二区| 久久狼人影院| 久久午夜综合久久蜜桃| 日韩熟女老妇一区二区性免费视频| 91在线观看av| 麻豆av在线久日| 亚洲精品在线美女| 国产国语露脸激情在线看|