• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    SGuard: A Lightweight SDN Safe-Guard Architecture for DoS Attacks

    2017-05-09 07:48:39
    China Communications 2017年6期

    National Digital Switching System Engineering and Technological Research Center, Zhengzhou 450002, China

    I. INTRODUCTION

    Software Defined Networking (SDN) has quickly emerged as a new networking paradigm that greatly changes the traditional network architecture. With the help of the concept of decoupling the control plane from data plane [1], SDN uses logically centralized controller to maintain a network-wide view and performs forwarding decisions to support finegrained network management policies, which gives our full programming flexibility. The logically centralized controller communicates with switches that it controls by using open and standardized protocols such as OpenFlow[2]. What’s more, switches can be made lighter and cheaper since there is no need for them to perform forwarding decisions [3], which greatly reduces the complexity of network configuration and operation.

    In OpenFlow, a switch performs packet forwarding by consulting its flow table and determining the output port on which the packet is sent. Each entry in the flow table (called a flow rule or flow entry) consists of the packet header fields to match, the actions to apply on matched packets and the corresponding counters to update (see Fig.1). When a switch receives a packet which cannot be matched to any installed flow rule, the OpenFlow switch will first buffer it and then send it to the controller to request a new flow entry usingPacket Inmessage. In the meanwhile, controller responds with aFlow Modmessage, containing the action to be performed on the data packet and the duration for which to keep the flow rule in its flow table.

    The authors design and implement SGuard, a security application on top of the NOX controller.

    However, it’s obvious to see that the centralized controller carries considerable overhead and would be easy to become a bottleneck. This leads to issues in both scalability and security. While there are many studies and solutions on the scalability issue [4][5], there is very little research on even more challenging security issue. On the one hand SDN gives us an unprecedented opportunity to completely solve the defects in traditional design, but on the other hand it gives rise to new security problems [6]. For example, attackers may simply mount saturation attacks towards SDN controller by sending massive useless packets,as a consequence, controller will handle every useless new packet for flow entry creation,which greatly occupies compute resource and overwhelms the controller.

    In our paper, two kinds of DoS attacks are considered in SDN networks. In the first attack, the switch receives massive new packets in a remarkably short period of time and then sends packets to the controller to request flow entries, which greatly consumes the control plane bandwidth and causes high latency of inserting flow entries. Additionally, the DoS attacks usually include combination of other attacks such as IP or MAC spoofing to make attacks hard to be detected. When the control plane bandwidth is exhausted, the switch can’t receiveFlow Modmessages and may directly drop the new packets instead of forwarding them normally. In the second attack, the switch can only store a certain amount of flow entries due to limited memory, so if the attacker aims to saturate the memory [7], as the switch cannot insert the new flow entry, it will respond with error message to the controller and then simply drop the packets.

    To defend against these attacks, we have two research challenges as follows:

    ? How to discover the true origin of a packet,and then trace the attacker’s location and avoid spoofing attacks.

    ? How to identify whether the traffic is legitimate or not, and then take effective measures to defend against attacks.

    For the first problem, we propose a novel access control mechanism to know the true origin of packets. We can also use the authorization information to track the attacker’s location and take some preventive measures as soon as possible. For the second problem,we must admit that it is hard to distinguish aggressive packets from normal packets by analyzing a huge number of packets, so we create a classification module on top of the NOX controller [8], extracting six the most representative characters as the features from the flow entries of all switches. In order to make the classifier have a high accuracy and efficiency, we introduce novel feature ranking and selecting algorithms to process these features. To the best of our knowledge, such feature processing algorithms have not been adopted before. Our classifier is based on Self Organizing Maps (SOM) [9], which is a suitable way to classify network traffic. All the above constitutes the basic content of SGuard.

    The rest of paper is organized as follows.Section II describes the related work. Section III proposes the detailed design of SGuard.The implementation and evaluation of SGuard are in Section IV. A conclusion is drawn in Section V.

    Fig. 1 Openflow network and attack process

    II. RELATED WORK

    As SDN has recently emerged as a novel networking prototype, there are more and more projects related to security, one important aspect of which is the prevention against the DoS attacks. Yan [10] argues that, although SDN itself is vulnerable, it’s easy to detect and mitigate DoS attacks with the help of global state views of the network especially in cloud computing environments. Moreover, it’s more flexible to detect DoS attacks by decoupling control plane from the data plane.

    DoS is also considered to be one of the most important threats as well as one of the hardest problems in traditional networks. Client puzzles approaches [11][12] have been proposed by several researchers so as to avoid denial of service attacks in traditional networks. However, such techniques wouldn’t be appropriate for SDN, because SDN controller is more likely to be overloaded by additional malicious requests. The puzzle distribution process and puzzle solution transmission process may generate new packets, so malicious clients will use the trait to initialize a large number of new flows simultaneously inside the network. Since by definition all new flows should be sent to the controller to find routing paths, a large number of simultaneous packet-in requests can easily overload the controller.

    In general, the DoS attacks are usually combined with other attack like MAC/IP spoofing.Hence, detecting such attached attacks is essential to mitigate the DoS attacks. [13] introduces a mechanism called BASE to detect spoofing attacks by marking packets with an identification of its path, but the mechanism is too sophisticated to identify the attacker on the network for us, so SGuard proposes a relatively lightweight mechanism to avoid address spoofing.

    Avant-Guard [14] introduces two modules into the SDN architecture to solve the SYN Flood attack challenge: Connection Migration and Actuating Triggers. Using SYN proxy and monitoring the rate of SYN request can effectively defend against TCP based saturation attacks, but it doesn’t work to other DoS attacks in SDN. Of course, our approach attempts to mitigate all kinds of DoS attacks. [15] presents ROSEMARY controller, which implements a network application containment and resilience strategy based around the notion of spawning applications independently within a micro-NOS. Silva et al. [16] introduce a novel architecture to trigger the congestion event and respond against these events. [17][18]propose a mechanism called XenFlow, which implements on Xen hypervisor and OpenFlow to guarantee the quality of service for each virtual machine. FortNox [19] proposes a security enforcement kernel to enhance the SDN controller to mitigate attacks.

    Previous works, such as [20][21][22], also employed Self Organizing Maps (SOM) to classify whether the traffic is normal or not.However, the overhead of the classification is too high to be used in real time, while our approach is quite different from that by using improved feature vector and forward selection algorithm, SGuard can easily extract the features of interest for detection with lower overhead.

    III. DESIGN

    In order to solve the security problems discussed above, we propose a novel defense framework SGuard for SDN networks. SGuard can control access to the networks to prevent from spoofing attacks, and can also classify and defend against malicious traffic. In the meanwhile, its high efficiency, flexibility, scalability and lightweight method characteristics will attract more researchers to use and develop it. Then, we present the detailed design of SGuard in this section.

    3.1 System architecture

    In our design, we introduce three novel functional modules to existing NOX controller:1)access controlmodule 2)classificationmodule 3)data plane cache. The main functionality of the access control module is to know the true origin of packets and track the attacker’s location so as to take the mitigation measures as soon as possible. The classification module is designed to identify whether the traffic is legitimate or not and next to take effective measures to defend against attacks.Fig. 2 shows the conceptual architecture of SGuard. All of these modules are implemented as SDN controller applications based on the controller platform. It’s also worth noting that the data plane cache component sits between the SGuard and the data plane, and this data plane cache plays an incomparable role during the saturation attack. The final point I’ll make is that, to defend against DoS attacks, we only need to make the SGuard be incorporated into frame without any modification to existing OpenFlow infrastructure, and so it is of high practical and popularization value.

    We maintain a finite-state machine to manage the whole SGuard system. Fig. 3 shows the state machine. When the network has been set up and run, SGuard will receive packets from switches and come to theInitial State.After the preparation work, SGuard comes to thePrimary Detection State, access control module will first inspect the identity of each node and then classification module will distinguish abnormal flow traffic from normal traffic. If malicious attacks are detected,SGuard will come to theDefense Stateand timely notify the controller of the relevant information including attacker’s MAC, IP, etc(see section 3.2 in detail). And then controller can use the relevant information to generate Flow Mod messages to the switch so that the subsequent packets will not be sent to controller. That is to say, packets that match the specific flow table entry that reside in the switch are considered as malicious packets and will be directly dropped to block attackers. With the termination of an attack, SGuard comes to theSafe Mode State, and then forwards normal packets and adds the corresponding flow entry to the switch.

    3.2 Access cntrol module

    In most case, the DoS attacks are always combined with other attacks, such as IP or MAC Spoofing. Therefore, it’s necessary to know the identity [23] of each user in the network.When a new user connects to the network,access control module collects its relevant information (such as MAC, IP, Port and Switch ID) and binds them together into Hashtable,as Fig.4 shows, which brings enormous con-venience to track the location [24] of hosts.By inspecting over source MAC/IP and looking up the Hashtable, SGuard can decide to forward the legal packets or drop the spoofed packets. However, if the identified spoofed attackers continue to send packets to controller,switch will not forward the subsequent packet and directly drop it.

    Fig. 2 Conceptual architecture

    Fig. 3 State of SGuard

    Fig. 4 Work process of access control module

    Fig. 5 Work process of classification module

    3.3 Classification module

    Classification module runs as an application above the control platform and consists of three main parts: 1)data collector2)feature extractor3)classifier, as depicted in Fig.5.Initially, data collector periodically requests flow entries from flow tables of OpenFlow switches through secure channel, and then feature extractor immediately extracts existing features from the data set. Each sample is then passed to classifier module to classify it either as normal traffic or attack traffic. In order to optimize classification, we apply novel algorithms to rank and select the features according to a set of rules based on a comparison of performance.

    3.3.1 Data Collector

    In order to detect DoS attack as soon as possible, data collector collects flow entries at predetermined time intervals. During such intervals, data collector first sends a request command to the OF switch, then the data plane returns results through secure channel.We can classify traffic as normal or as an attack by using the features extracted from the data set, and with the help of access control module, we can easily identify and locate the attacker. In the meanwhile, data collector also obtains the global state views of registered OF switch and information of network traffic.What’s more, the definition of the time interval will have a great influence on performance of the system. If we choose an infrequent time interval, there will be additional latency to identify the attacker and take corresponding measures to defend against the attack. But if the time interval is too short, there will be an increase of packets requesting flows which will lead to an increase in the overhead of our detection mechanism, so we should determine a suitable time interval according to the actual network conditions.

    3.3.2 Feature Extractor

    The module extracts features vectors from the data set and transfers the feature vectors to the classifier which is capable of efficiently distinguishing attack from normal traffic. But before the process, we must determine how to choose the features that directly reflect whether the system is under attack or not. This is also one of the most important innovations in our paper. We introduce six novel features based on characteristics of DoS attacks [25], these features are sensitive to the network security environment. A more detailed description follows.

    (1) Percentage of flows with a small number of packets (PFSP)

    As we all know, DoS attacks can generate flows continuously and effectively in a short time, one of the main features is the large number of flows, and small amount packet in per flow, i.e. about 1~3 packets per flow. Considering normal traffic tends to have a larger number of packets per flow, neither average value nor the median value of packets per flow can precisely indicate whether our network is under attack or not. What’s more, the summation and sorting can increase the extra overhead of the system. However, it’s relatively easy to compute the values of PFSP by the following Equation.

    (2) Percentage of flows with small average bytes (PFSB)

    In order to increase the efficiency of DoS attacks, its payload size is usually small. That is to say, flooding packets consists of little useful bytes, so the average of bytes per flow is small (for example, some TCP flooding packets are about 120 bytes).system is under DoS attack.

    (4) Percentage of reversible flows (PRF)

    Given any two flows (i.e.flowx andflowy), if two flows meet the following three conditions, then we call both flows are reversible.

    a) SrcIP X = DstIP Y

    b) DstIP X = SrcIP Y

    c) Protocol X = Protocol Y

    Another feature of DoS attacks is the obviously increasing number of irreversible flows,due to the fake IP address. In order to compute PRF, we use Equation 4.

    (5) Growth rate of irreversible flows (GRIF)

    Both DoS attacks and busy time can cause the sharply increase of traffic, so it’s difficult to distinguish which is the true reason leading to this phenomenon. To solve the problem,GRIFis proposed.that the value of PFSB will exceed 0.75 when system is under DoS attack.

    (3) Percentage of flows with short time duration (PFSD)

    It’s well known that each flow rule in flow table has two associated timeout values. One is an idle timeout value, which is triggered when the flow rule is seldom being used. The other is a hard timeout, which is triggered at the timer expiry. During attack, it won’t be long before most of the flow rules are idle,since attackers usually randomly send large amounts of useless packets. As a consequence,the values ofPFSDwill increase in a short time. The following Equation is employed for this computation.

    GRIFcan not only precisely reflect the generating speed of irreversible flows, but also indicate the characteristic of DoS. Typically,when the system is under DoS attack, the value ofGRIFis about 1000 packets/s, which is several orders of magnitude higher than that in normal condition.

    (6) Growth rate of ports (GRP)

    During DoS attacks, attacker usually generates large amount of flows using fake IP address, in the meanwhile, ports are generated too. Therefore, we computeGRPas follows.

    The experiment shows that the value of GRP is about over thousands when system is under DoS attack, whileGRPin normal condition is not bigger than 200.

    In this way, SOM is able to create a topo-logical map where different regions represent each kind of traffic.

    3.3.3 Classifier

    According to the feature vectors as mentioned above, we use Self Organizing Maps (SOM)classifier to classify traffic as normal or as an attack. SOM is a part of artificial neural network that is just like human brain, it has the ability to abstract and acquire knowledge through unsupervised learning, to seek out the regularities and properties of the samples automatically and then to change the parameters and structure of the network adaptively. It consists of input layer and competitive layer.Input layer plays a role of observer, which is in charge of accepting outside information and passing the input pattern to the competitive layer. The competitive layer is responsible for analyzing and comparing the input pattern to find the regularities in them, and then classifying them. We can refer to [9] for more specific steps.

    The statistical characteristics of flows varygreatly from one switch to another, so directly using all of the features without reprocessing this data will have bad effect on the accuracy and efficiency of classifier. Therefore, we introduce novel feature ranking and selecting algorithms to improve the current situation.It is an iterative algorithm, where each iteration consists of two steps: feature ranking and feature selecting. The general methodology shows as follows.

    Algorithm 1 The feature ranking algorithm

    First, features ranking, evaluated by accuracy to rank each specified candidate feature.We first calculate the global accuracy using all of the above features, and thenis calculated by using each featureWe next sort the features set in descending order based on

    Then, feature selecting, FS is to select the features according to a set of rules based on a comparison of performance. It starts by picking the first feature from the features set (T)as an initial features set. Repeatedly, add next featurewith the highest classification accuracy to, we will getand calculateThrough this process, we need to do two comparisons: one compares the accuracy ofwith that ofand if it’s less, remove the featurefromotherwise, assignin another comparison, the global accuracy is compared with, and if it’s less, assigntois the target features set.

    3.4 Data plane cache

    Data plane cache is a machine/device that temporarily caches table-miss packets during the saturation attack. It sits between the control plane and data plane, and plays an incomparable role in data cache and backup during the saturation attack. Each part of the memory space has its own function and contributes in a large way to the overall functionality. As Fig.6 shows, we can divide them into four simple categories from the point of view of function.

    Packet Buffer Queue Block: During the saturation attacks, most of the flooding traffic will be redirected to data plane cache instead of flooding the OpenFlow infrastructure,by this way, the data plane will avoid DoS attacks. When a migrated table-miss packet arrives in data plane cache, the data plane cache system attaches it in the corresponding packet buffer queue. Then scheduler of data plane cache adopts round-robin scheduling algorithm to serve the packet buffer queues for generatingPacket Inmessages, by this way, we can control the rate ofPacket Inmessages sent to controller, so the control plane will avoid DoS attacks. Therefore, the control plane bandwidth and the data plane memory space will not be totally exhausted by the possible DoS attacks.

    NetLog Block: the NetLog stores and maintains compressed flow tables of every switch attached to the SGuard so as to improve the overall system fault tolerance in SDN.

    Classification Results Block: we use Self Organizing Maps (SOM) classifier to classify traffic as normal or as an attack. Additionally,all of the policy-making refers to the results,so in view of its great significance, we specially set the classification results storage area.

    Access Control List Block: In order to defend against IP or MAC spoofing attack,each user needs to be authenticated by SGuard which gathers MAC, IP, Port information of all hosts and bind them together into the list.

    IV. EVALUATION

    In this section, we introduce the implementation of SGuard and evaluate the performance and the overhead of our framework.

    4.1 Implementation

    We implement SGuard and use Mininet [26]to emulate the OpenFlow network environment. SGuard is a security application running on top of the NOX controller [8], which gives us full programming flexibility. The detailed design is stated in section III. Fig.7 describes the topology for our experiments. The experiments are done by three physical servers, all of which host virtual machines and run Debian Linux 3.2.0-4-amd64 with Intel(R) Xeon(R)processors CPU X5690 3.47GHz. Attackeris implemented on the first server. The client,server, OF switch, SGuard and NOX controller are implemented on the second server.SGuard and the NOX controller are attached to the management ports, and the others are attached to the data ports. We implement the data plane cache as a software system in approximately 1,500 lines of C++ code on an external server which is connected with both the switches and the controller. The bandwidth of shared link is allocated 50 Mb/s. We use hping3, a commonly used network attack tool,to generate attacking traffic, such as TCP SYN floods with IP address spoofing. A tool called iperf is used to measure network performance,such as network bandwidth.

    Algorithm 2 The feature selecting algorithm

    Fig. 6 Data plane cache

    We perform three sets of experiments. In the first experiment, we measure the bandwidth received by a legitimate client during DoS attacks, with and without the SGuard defense, as a way of validating the framework.We also use Httperf to measure the latency for a client to establish the HTTP connections with the server under a DoS attack instead of simply measuring the number of dropped packets, with and without the SGuard defense.In the second experiment, we measure the overhead of SGuard. We keep monitoring the utilization of CPU and Cache and also evaluating the average time consumption of each module. In the last experiment, we collect the training time and classification time respectively when we use feature ranking and selecting algorithms or not, so as to evaluate the efficiency of classifier. Our implementation of classifier includes 50*50 matrix of nodes,initial neighborhood radius, initial learning rate and iterative time limit are 30, 0.5, 4000,respectively.

    4.2 SGuard defense effects

    We first use Mininet to build up the network topology as Fig.7 shows. The attacker launches different rates of DoS attacks to the Open-Flow SDN networks, and in the meanwhile,the client and the server keep normal communication with each other. In this experiment,iperf is used to measure the bandwidth obtained by the client under different attack rates with or without use of SGuard. What’s more,we also set 3 different time intervals (1s, 5s and 20s) for the detection loop to study the laws as well as the relationship between the performance of SGuard and interval.

    Fig. 7 Experiment’s topology

    The results of average bandwidth obtained by the legitimate client are shown in Fig. 8(a).The results show that, when there is no attack, the bandwidth of using SGuard is a little smaller than that of without using SGuard, and not surprisingly, this is owing to the design of SGuard. SGuard is responsible for inspectingpacket inmessages and classifying the packets into normal traffic or an attack, so it will have a little impact on the data plane, but this impact is still within our desired tolerance.Next, we will gradually increase attack rate.It’s obvious to see that the bandwidth decreases sharply without using SGuard. It’s also important to note that the bandwidth declines by half at the attack rate of 100 Mb/s, and the NOX controller loses the control ability so as to break down the whole network after an attack rate of about 480 Mb/s. By contrast, it’s noteworthy that the bandwidth remains roughly unchanged under the same attack rate with the use of SGuard. From this point of view,SGuard can protect the OpenFlow switch well.

    However, from the results we can see that the definition of the time interval to collect flow entries is of great importance, if collection is made at infrequent time intervals, such as 20s, then there will be a delay to detect an attack and consequently a reduction of the time available for a possible mitigation, the bandwidth decreases sharply with the increase of attack rate. On the other hand, if the time interval for collection is short, such as 1s,there will be an increase of packets requesting flows which will lead to an increase in the overhead of our detection mechanism, for example, when there is no attack, the bandwidth of SGuard (interval=1s) is a little smaller than that of SGuard (interval=5s,20s), but the metric of SGuard (interval=1s) shows a relatively stable performance when the attack occurs.

    We also use Httperf to measure the latency for a client to establish the HTTP connections with the server under a DoS attack, with and without the SGuard defense. As Fig. 8(b)shows, when there is no attack, the average reply time of using SGuard is a little greater than that of without using SGuard. This is because when we use SGuard, every packet needs to go through several stages, such as authorization, migration, classification, features selection and policy implementation, which will increase some time delay. However, the additional time delay is still within our desired tolerance. If SGuard is not used, the time delay will increase sharply with the increase of attack rate, reaching approximately 500 ms,when the attack rate is 480 Mb/s, as the size of the requested content is only 1 KB, so the reply time is too long. By contrast, with SGuard,time slightly increases. This is because that SGuard is not only responsible for providing services to client, but also identifying the attacker and shutting down it. SGuard shows better protection results again. As for the relationship between reply time and interval is similar to the relationship between bandwidth and interval, and this is because time increases drastically as bandwidth speed falls.

    Fig. 8 SGuard defense effect

    Fig. 9 CPU and cache utilization under different rates of DoS attack

    4.3 Overhead analysis

    In this section, we present our analysis on the overhead of the SGuard (interval=1s). First,we use CPU and Cache utilization to indicate the overhead of the system. Next, we separately launch attack at rate of 100 Mb/s, 200 Mb/s,300 Mb/s and 400 Mb/s. Meanwhile, we keep measuring the CPU utilization and Cache utilization. The evaluation results are presented in Fig. 9.

    Fig. 10 Overhead of each component of SGuard

    It’s obvious to see that the overall utilization (either CPU or Cache) is relatively low,which indicates SGuard is with highly scalability and able to provide security services for more network devices. At the beginning of the DoS attack, the utilization of CPU and Cache increases slowly. This is because the main tasks in this stage are to implement the authorization functions. For example, in Fig. 9(b),while at about 8 ms, the utilization of Cache begins to increase quickly because of migration flows, and there is also some increase in corresponding CPU utilization. Owing to computing the values of feature vectors, at about 13 ms, the CPU utilization increases quickly.Classifier seems to be time-consuming component, which indicates whether this information corresponds to normal traffic or an attack, and stores the results, as a result, from 23 ms to 33 ms, both CPU and Cache utilization reaches a peak of the whole process. After classification, at about 37 ms, the CPU utilization decreases, but a bit later, SGuard will insert flow rules to block the attacker, so the utilization will have a slight fluctuation and then go back to the initial level. Of course, with the increase of attack rate, the overall utilization will also slightly increase. Owing to the relatively small-scale experiment, the CPU utilization is below 30%, while Cache utilization is below 20%. All in all, we can conclude from the results that SGuard can defend against attack with lower overhead.

    In order to verify the performance of different main parts of SGuard, i.e., authorization and migration, classification, feature selection and policy implementation, we measure the delay of each component when the attack rate is ramped up from 100 Mb/s up to 400 Mb/s.We can see from Fig.10, the classification is the most time-consuming component, and not surprisingly, as it enforces the major functionality of SGuard, all of the policy settings are based on classification results. It can also be observed that all the delay times for each component are in a reasonable range.

    4.4 Classification performance

    To evaluate the classification performance of SGuard (interval=1s), we generate a data set which is used for training and testing. The data set contains 10000 samples, of which 4700 samples (47%) are collected during normal traffic and the other (53%) are attack samples. The evaluation is done by using traditional SOM and improved SOM classifier(withAlgorithm 1, 2). Each experiment is repeated three times and by randomly selecting the training and the testing data with different splitting ratios which are ((training%)/ (testing%): 30/70, 50/50, 70/30) to avoid either accidentally or intentionally introducing bias into the sample. As Table 1 shows, the comparison between the different classifiers is done by respecting to different performance factors: number of selected features, detection rate (DR), training time and testing time.

    Table 1 shows the results of the classification performance and the SOM classifier performance is surely improved by using Algorithm 1 2, such as the detection rate and testing time, and the feature selection module leads to a significant contribution to the great performance. Feature selection seeks to reduce the number of attributes in the dataset,unlike simple dimensionality reduction, our feature selection methods include and exclude attributes present in the data without changing them. So when we classify a given sample,feature selection module can guarantee the accuracy of the classification, reducing the amount of calculation and the testing time at the maximum degree. However, it’s noteworthy that the training time increases slightly owing to the feature selection, our algorithms can be seen as the combination of a search technique for proposing new feature subsets,along with an evaluation measure which scores the different feature subsets. They are to test each possible subset of features finding the one which minimizes the error rate, so the overall training time is increase slightly by additional computation, but this should not be problems, because the training time is still within normal ranges and we also make the training phase in offline mode.

    V. CONCLUSIO N

    With the development of Software Defined Networking (SDN), the network security becomes critical. This paper describes DoS attacks combined with IP/MAC spoofing attacks in detail. To mitigate such attacks in the Open-Flow networks, we design and implement SGuard, a security application on top of the NOX controller. When the network has been set up and run, SGuard will gather MAC, IP,Port information of all hosts and bind them together into Hashtable for access control. Then the classifier will extract features and classify the traffic flows as normal or abnormal. Final-ly, according to the results, NOX controller will install flow rules to block the attackers.We also experimentally use Mininet to evaluate SGuard in a software environment. The results demonstrate SGuard is lightweight, efficient and with a relatively low overhead. As a future work, we plan to implement SGuard with larger experiment topologies to obtain more convincing results.

    Table I Performance comparison between different classifier

    ACKNOWLEDGEMENT

    This work is partly supported by the National key Research and Development Program of China (No.2016YFB0800100,2016YFB0800101) and the National Natural Science Fund for Creative Research Groups Project(No.61521003) and the National Natural Science Fund for Youth Found Project(-No.61602509). We gratefully acknowledge anonymous reviewers who read drafts and made many helpful suggestions.

    [1] Mckeown N, Anderson T, Balakrishnan H, et al. “OpenFlow: enabling innovation in campus networks.”,Acm Sigcomm Computer Communication Review, vol. 38, no. 2, pp 69-74, 2008.

    [2] O.N.Foundation, “Openflow switch specification(v1.3.0)”. [Online]. Available: https://www.opennetworking.org/

    [3] Antikainen M, Aura T, S?rel? M. “Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch.”,Secure IT Systems.Springer International Publishing, pp 229-244.2014.

    [4] Curtis A R, Mogul J C, Tourrilhes J, et al. “Devo-Flow: Scaling flow management for high-performance networks.”,Acm Sigcomm Computer Communication Review,vol. 41, no. 4, pp 254-265, 2011.

    [5] Yu M, Rexford J, Freedman M J, et al. “Scalable flow-based networking with DIFANE.”,Acm Sigcomm Computer Communication Review, vol.40, no. 4, pp 351-362, 2010

    [6] Kreutz D, Ramos F M V, Verissimo P. “Towards secure and dependable software-defined networks.”,ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING,pp 55-60,2013.

    [7] Kloti R, Kotronis V, Smith P. “OpenFlow: A Security Analysis.”,IEEE International Conference on Network Protocols, pp 1-6. 2013.

    [8] Gude N, Koponen T, Pettit J, et al. “NOX: towards an operating system for networks.”,Acm Sigcomm Computer Communication Review, vol.38, no. 3, pp 105-110, 2008.

    [9] Kohonen T. “The self-organizing map.”,Proceedings of the IEEE, vol. 21, no. 3, pp 1-6, 1990.

    [10] Yan Q, Yu F. “Distributed denial of service attacks in software-defined networking with cloud computing.”,IEEE Communications Magazine, vol. 53, no. 4, pp 52-59, 2015.

    [11] Waters B, Juels A, Halderman J A, et al. “New Client Puzzle Outsourcing Techniques for DoS Resistance.”ACM Conference on Computer and Communications Security, CCS 2004, Washington, Dc, Usa, pp 246-256, October. 2004.

    [12] Michalas A, Komninos N, Prasad N R, et al. “New client puzzle approach for DoS resistance in ad hoc Networks.”,IEEE International Conference on Information Theory and Information Security,pp 568-273, 2010.

    [13] Kwon J, Seo D, Kwon M, et al. “An incrementally deployable anti-spoofing mechanism for software-defined networks.”,Computer Communications, vol. 64, pp 1-20, 2015.

    [14] Shin S, Yegneswaran V, Porras P, et al. “AVANTGUARD: scalable and vigilant switch flow management in software-defined networks.”,ACM Sigsac Conference on Computer & Communications Security. pp. 413-424, 2013.

    [15] Shin S, Song Y, Lee T, et al. “Rosemary: A Robust, Secure, and High-performance Network Operating System.”,ACM Conference on Computer and Communications Security, pp 78-89,2014.

    [16] Delgado J S S, Pe?uela D J M, Medina L V M, et al. “Automatic network reconfiguration because of security events.”,IEEE Communications and Computing, pp 1-6, 2014.

    [17] Mattos D M F, Duarte O C M B. “XenFlow:Seamless migration primitive and quality of service for virtual networks.”,IEEE Global Communications Conference, pp 2326-2331, 2014.

    [18] Mattos D M F, Ferraz L H G, Duarte O C M B.“Virtual Machine Migration.”,Wiley-IEEE Press,pp 49-72, 2015.

    [19] Porras P, Shin S, Yegneswaran V, et al. “A Security Enforcement Kernel for OpenFlow Networks.”,ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING, pp 121-126, 2012.

    [20] Yang Y H, Jiang D B, Shen Q N, et al. Research on intrusion detection based on an improved GHSOM[J].Journal on Communications, 2009,1(1): 400-403.

    [21] Alsulaiman M M, Alyahya A N, Alkharboush R A, et al. “Intrusion Detection System Using Self-Organizing Maps.”,International Conference on Network & System Security. IEEE Computer Society, pp 397-402, 2009.

    [22] Braga R, Mota E, Passito, “A Lightweight DDoS flooding attack detection using NOX/Open-Flow.”,IEEE Local Computer Networks, vol. 8, no.11, pp 408-415, 2010.

    [23] Kim H J, Basescu C, Jia L, et al. “Lightweight source authentication and path validation.”Acm Sigcomm Computer Communication Review, vol.44, no. 4, pp 271-282, 2014.

    [24] Yao G, Bi J, Vasilakos A V. “Passive IP Traceback:Disclosing the Locations of IP Spoofers From Path Backscatter.”,IEEE Transactions on Information Forensics & Security, vol. 10, no. 3, pp 471-484, 2015.

    [25] Feng Y, Guo R, Wang D, et al. “Research on the Active DDoS Filtering Algorithm Based on IP Flow.”,International Journal of Communications Network & System Sciences, vol. 2, no. 7, pp 628-632, 2009.

    [26] Mininet. “Mininet”. [Online]. Available: http://mininet.org/

    曰老女人黄片| 亚洲自偷自拍图片 自拍| 国产单亲对白刺激| 久久免费观看电影| 人妻一区二区av| 男人舔女人的私密视频| 曰老女人黄片| 精品少妇久久久久久888优播| 国产欧美日韩综合在线一区二区| 成在线人永久免费视频| 久久久国产欧美日韩av| 久热爱精品视频在线9| 真人做人爱边吃奶动态| 一边摸一边抽搐一进一小说 | 久久久国产精品麻豆| 新久久久久国产一级毛片| av不卡在线播放| 久久99热这里只频精品6学生| av片东京热男人的天堂| 亚洲一区二区三区欧美精品| 国产一区二区激情短视频| 国产一区有黄有色的免费视频| 亚洲精品成人av观看孕妇| 午夜福利视频精品| 成人影院久久| e午夜精品久久久久久久| 久久久久久久久久久久大奶| 一个人免费在线观看的高清视频| 欧美黄色片欧美黄色片| 香蕉久久夜色| 国产97色在线日韩免费| 精品国产乱码久久久久久男人| 91麻豆精品激情在线观看国产 | 国产成人影院久久av| 叶爱在线成人免费视频播放| 国产伦理片在线播放av一区| 亚洲欧美色中文字幕在线| 免费在线观看影片大全网站| 热99国产精品久久久久久7| 免费在线观看日本一区| 国产精品 欧美亚洲| 99久久精品国产亚洲精品| 桃红色精品国产亚洲av| 亚洲国产精品一区二区三区在线| 精品人妻1区二区| 啦啦啦在线免费观看视频4| 成年女人毛片免费观看观看9 | 久久精品国产亚洲av香蕉五月 | 国产不卡一卡二| 色老头精品视频在线观看| 久久久国产一区二区| 欧美精品人与动牲交sv欧美| 亚洲国产毛片av蜜桃av| 岛国在线观看网站| 多毛熟女@视频| 午夜福利在线观看吧| 久久精品国产亚洲av香蕉五月 | 午夜91福利影院| 色综合欧美亚洲国产小说| 一级,二级,三级黄色视频| 91精品三级在线观看| 国产亚洲精品第一综合不卡| 色婷婷久久久亚洲欧美| 国产精品 欧美亚洲| 男人操女人黄网站| 欧美日韩亚洲综合一区二区三区_| 精品一品国产午夜福利视频| 精品一区二区三区视频在线观看免费 | 丝袜人妻中文字幕| 免费在线观看完整版高清| www.自偷自拍.com| 亚洲一区中文字幕在线| 亚洲欧美日韩高清在线视频 | 麻豆成人av在线观看| 九色亚洲精品在线播放| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲国产av影院在线观看| 99精品久久久久人妻精品| 欧美乱妇无乱码| 99riav亚洲国产免费| 久久亚洲真实| 大型av网站在线播放| 日韩欧美免费精品| 狠狠婷婷综合久久久久久88av| 欧美激情极品国产一区二区三区| 99精品欧美一区二区三区四区| 深夜精品福利| 精品人妻熟女毛片av久久网站| 一二三四社区在线视频社区8| 激情在线观看视频在线高清 | 国产精品久久久久成人av| 热re99久久国产66热| 日日爽夜夜爽网站| 窝窝影院91人妻| 久久99热这里只频精品6学生| 亚洲情色 制服丝袜| 成人18禁高潮啪啪吃奶动态图| 最新美女视频免费是黄的| 国产高清国产精品国产三级| 国产精品一区二区在线不卡| 久久午夜综合久久蜜桃| 精品少妇内射三级| 99久久99久久久精品蜜桃| 五月天丁香电影| 亚洲五月色婷婷综合| 狠狠精品人妻久久久久久综合| 在线观看人妻少妇| 日韩 欧美 亚洲 中文字幕| www日本在线高清视频| xxxhd国产人妻xxx| 十八禁人妻一区二区| 中国美女看黄片| 电影成人av| 亚洲一码二码三码区别大吗| 一夜夜www| 天堂中文最新版在线下载| 99国产综合亚洲精品| 免费高清在线观看日韩| 国产一区二区三区在线臀色熟女 | 一级毛片电影观看| 国产男女内射视频| 国产男女内射视频| 欧美另类亚洲清纯唯美| 国产精品久久电影中文字幕 | 99精国产麻豆久久婷婷| 成人亚洲精品一区在线观看| 午夜福利免费观看在线| 亚洲av美国av| 亚洲久久久国产精品| 国产精品免费一区二区三区在线 | 手机成人av网站| e午夜精品久久久久久久| 99热国产这里只有精品6| 99热国产这里只有精品6| 国产极品粉嫩免费观看在线| 一进一出抽搐动态| 18禁黄网站禁片午夜丰满| 欧美人与性动交α欧美精品济南到| 一级,二级,三级黄色视频| 中亚洲国语对白在线视频| 久久亚洲真实| 亚洲精华国产精华精| 18在线观看网站| 汤姆久久久久久久影院中文字幕| 成人手机av| 国产欧美日韩一区二区精品| 欧美日韩福利视频一区二区| 精品熟女少妇八av免费久了| 99热国产这里只有精品6| 国产一区二区在线观看av| 亚洲成国产人片在线观看| 亚洲综合色网址| 搡老乐熟女国产| 国产单亲对白刺激| 久久久精品国产亚洲av高清涩受| 亚洲人成电影观看| 亚洲av欧美aⅴ国产| 久久人妻福利社区极品人妻图片| 大香蕉久久网| 中文字幕人妻丝袜一区二区| 欧美变态另类bdsm刘玥| 精品视频人人做人人爽| 日本欧美视频一区| 男女午夜视频在线观看| 丝袜在线中文字幕| 麻豆乱淫一区二区| 黄色视频在线播放观看不卡| 老司机深夜福利视频在线观看| 国产成+人综合+亚洲专区| 国产视频一区二区在线看| 妹子高潮喷水视频| 日韩制服丝袜自拍偷拍| 亚洲欧美色中文字幕在线| 他把我摸到了高潮在线观看 | 欧美日韩亚洲国产一区二区在线观看 | 日本五十路高清| 丝袜喷水一区| 国产av一区二区精品久久| 深夜精品福利| 黄色视频,在线免费观看| 一级片免费观看大全| 男女床上黄色一级片免费看| 国产精品免费一区二区三区在线 | 麻豆乱淫一区二区| 国产高清视频在线播放一区| 男女午夜视频在线观看| 国产精品国产av在线观看| 国产午夜精品久久久久久| 免费女性裸体啪啪无遮挡网站| 男女边摸边吃奶| 视频区图区小说| 一级片'在线观看视频| 国产日韩一区二区三区精品不卡| 色播在线永久视频| 亚洲精品一卡2卡三卡4卡5卡| 每晚都被弄得嗷嗷叫到高潮| 精品国产一区二区三区四区第35| 精品乱码久久久久久99久播| 亚洲av电影在线进入| 桃红色精品国产亚洲av| 精品欧美一区二区三区在线| bbb黄色大片| 亚洲欧洲精品一区二区精品久久久| 人人妻人人澡人人看| av天堂久久9| 国产精品电影一区二区三区 | 久久国产精品人妻蜜桃| 脱女人内裤的视频| 一本综合久久免费| 岛国在线观看网站| 精品国产超薄肉色丝袜足j| 精品人妻1区二区| 一区二区日韩欧美中文字幕| 一本一本久久a久久精品综合妖精| 人人妻人人澡人人爽人人夜夜| 亚洲av日韩在线播放| 成年人黄色毛片网站| 老司机午夜十八禁免费视频| 亚洲国产中文字幕在线视频| 黄片播放在线免费| 欧美日韩国产mv在线观看视频| 久久精品亚洲熟妇少妇任你| 在线观看66精品国产| 中文字幕制服av| 国产野战对白在线观看| 他把我摸到了高潮在线观看 | 黄片播放在线免费| 成人永久免费在线观看视频 | 亚洲一码二码三码区别大吗| 亚洲熟女精品中文字幕| 免费不卡黄色视频| 69精品国产乱码久久久| 99久久国产精品久久久| 国产精品免费大片| 黄色毛片三级朝国网站| 欧美日韩精品网址| 亚洲av成人不卡在线观看播放网| 在线观看免费视频网站a站| 国产欧美亚洲国产| 交换朋友夫妻互换小说| 18禁黄网站禁片午夜丰满| √禁漫天堂资源中文www| 窝窝影院91人妻| 成年人午夜在线观看视频| 亚洲精品中文字幕在线视频| 日韩成人在线观看一区二区三区| 1024香蕉在线观看| 91av网站免费观看| tocl精华| 国产男女内射视频| 丝袜美足系列| 日韩中文字幕欧美一区二区| 一个人免费看片子| 国产在线视频一区二区| 欧美精品一区二区大全| 日本一区二区免费在线视频| 欧美成人免费av一区二区三区 | 欧美亚洲 丝袜 人妻 在线| 亚洲免费av在线视频| 人人妻人人添人人爽欧美一区卜| 国产亚洲精品一区二区www | 亚洲熟女毛片儿| 少妇精品久久久久久久| 天堂动漫精品| 99国产精品一区二区蜜桃av | 超色免费av| svipshipincom国产片| 色视频在线一区二区三区| 亚洲av片天天在线观看| 757午夜福利合集在线观看| 久久久久久免费高清国产稀缺| 亚洲专区中文字幕在线| 国产又色又爽无遮挡免费看| 亚洲av美国av| 俄罗斯特黄特色一大片| 日韩大码丰满熟妇| 亚洲人成伊人成综合网2020| 国产精品久久电影中文字幕 | 日韩人妻精品一区2区三区| 午夜精品久久久久久毛片777| 日韩中文字幕视频在线看片| 丰满迷人的少妇在线观看| 91九色精品人成在线观看| 18禁观看日本| 日韩 欧美 亚洲 中文字幕| 亚洲七黄色美女视频| 午夜成年电影在线免费观看| 建设人人有责人人尽责人人享有的| 亚洲精品在线美女| 久久久国产欧美日韩av| 91精品三级在线观看| 国产极品粉嫩免费观看在线| 日日爽夜夜爽网站| 在线亚洲精品国产二区图片欧美| 欧美激情 高清一区二区三区| av网站免费在线观看视频| 久久久久国产一级毛片高清牌| 亚洲欧美一区二区三区久久| 午夜视频精品福利| 亚洲精品美女久久久久99蜜臀| 一边摸一边抽搐一进一小说 | 极品人妻少妇av视频| 啦啦啦在线免费观看视频4| 久久婷婷成人综合色麻豆| 亚洲成人国产一区在线观看| av网站免费在线观看视频| 91麻豆av在线| 国产精品久久久久成人av| 精品亚洲成国产av| 国产男女超爽视频在线观看| 国产精品美女特级片免费视频播放器 | 亚洲欧美日韩另类电影网站| 美女午夜性视频免费| 51午夜福利影视在线观看| 一本—道久久a久久精品蜜桃钙片| 亚洲av片天天在线观看| 丝瓜视频免费看黄片| 欧美日韩中文字幕国产精品一区二区三区 | 9热在线视频观看99| 丝袜喷水一区| 纵有疾风起免费观看全集完整版| 国产成人啪精品午夜网站| 麻豆乱淫一区二区| 99re6热这里在线精品视频| 欧美日韩福利视频一区二区| 久久国产亚洲av麻豆专区| 老司机靠b影院| 人人妻人人爽人人添夜夜欢视频| 亚洲国产欧美一区二区综合| 婷婷丁香在线五月| 无限看片的www在线观看| 国产精品影院久久| 91成年电影在线观看| 视频区图区小说| 少妇猛男粗大的猛烈进出视频| 欧美日韩亚洲高清精品| 国产在线视频一区二区| 一区在线观看完整版| 黄色怎么调成土黄色| 久久久久久免费高清国产稀缺| 亚洲,欧美精品.| 在线观看免费日韩欧美大片| 欧美大码av| 建设人人有责人人尽责人人享有的| 欧美午夜高清在线| 又大又爽又粗| 最新美女视频免费是黄的| 一边摸一边做爽爽视频免费| 久久天堂一区二区三区四区| 一边摸一边抽搐一进一小说 | av又黄又爽大尺度在线免费看| 高清欧美精品videossex| 丝袜喷水一区| 天堂中文最新版在线下载| 成年女人毛片免费观看观看9 | 18禁裸乳无遮挡动漫免费视频| 香蕉久久夜色| tube8黄色片| 亚洲欧美一区二区三区黑人| 国产区一区二久久| 国产成人av激情在线播放| 久热爱精品视频在线9| 国产欧美日韩一区二区三| 日韩大码丰满熟妇| 欧美久久黑人一区二区| 妹子高潮喷水视频| 欧美激情极品国产一区二区三区| 欧美日韩一级在线毛片| 啦啦啦中文免费视频观看日本| 久久婷婷成人综合色麻豆| 国产午夜精品久久久久久| 中文字幕人妻熟女乱码| 男男h啪啪无遮挡| 99国产极品粉嫩在线观看| 亚洲人成77777在线视频| 99热国产这里只有精品6| 久久人妻av系列| 一级a爱视频在线免费观看| 日韩视频在线欧美| 亚洲精品中文字幕一二三四区 | 国产精品1区2区在线观看. | 一区二区三区国产精品乱码| 午夜视频精品福利| 亚洲成人国产一区在线观看| 亚洲av国产av综合av卡| 少妇的丰满在线观看| 91九色精品人成在线观看| 日韩制服丝袜自拍偷拍| 成人免费观看视频高清| 18禁黄网站禁片午夜丰满| 不卡av一区二区三区| 亚洲第一青青草原| 18禁黄网站禁片午夜丰满| 欧美日韩国产mv在线观看视频| 日本欧美视频一区| 一边摸一边抽搐一进一小说 | 最新美女视频免费是黄的| 一边摸一边抽搐一进一小说 | 精品欧美一区二区三区在线| 黄网站色视频无遮挡免费观看| 99国产精品免费福利视频| 精品国产乱码久久久久久小说| 亚洲成人手机| 天天影视国产精品| 亚洲国产欧美一区二区综合| 亚洲情色 制服丝袜| 男人舔女人的私密视频| 国产亚洲精品久久久久5区| 亚洲国产中文字幕在线视频| 丰满饥渴人妻一区二区三| 国产一区二区激情短视频| 18禁裸乳无遮挡动漫免费视频| 国产精品99久久99久久久不卡| 男女床上黄色一级片免费看| 亚洲国产av新网站| 激情在线观看视频在线高清 | 国产精品香港三级国产av潘金莲| 久久天躁狠狠躁夜夜2o2o| 50天的宝宝边吃奶边哭怎么回事| 久久人人97超碰香蕉20202| 久久精品国产亚洲av高清一级| 国产aⅴ精品一区二区三区波| 天天躁夜夜躁狠狠躁躁| 国产成人精品久久二区二区免费| 欧美日韩亚洲高清精品| 99精国产麻豆久久婷婷| 黄色丝袜av网址大全| 丝瓜视频免费看黄片| 最新的欧美精品一区二区| 中文字幕av电影在线播放| 91成人精品电影| 久久天躁狠狠躁夜夜2o2o| 精品第一国产精品| 韩国精品一区二区三区| 免费女性裸体啪啪无遮挡网站| 熟女少妇亚洲综合色aaa.| 欧美亚洲日本最大视频资源| 国产一区二区三区在线臀色熟女 | 在线观看一区二区三区激情| 一区二区三区精品91| 9191精品国产免费久久| 国产av一区二区精品久久| 操出白浆在线播放| 欧美激情久久久久久爽电影 | 美女高潮到喷水免费观看| 老司机福利观看| 黄色 视频免费看| 免费观看av网站的网址| 久久久精品94久久精品| 国产亚洲一区二区精品| 一个人免费在线观看的高清视频| 久久久国产一区二区| 免费在线观看影片大全网站| 性色av乱码一区二区三区2| 黄片播放在线免费| 免费黄频网站在线观看国产| 免费人妻精品一区二区三区视频| 欧美日韩国产mv在线观看视频| 国产精品国产av在线观看| 国产成人一区二区三区免费视频网站| 下体分泌物呈黄色| 日韩三级视频一区二区三区| 精品久久蜜臀av无| 亚洲精品在线美女| 日韩欧美免费精品| 精品第一国产精品| 免费看a级黄色片| 纵有疾风起免费观看全集完整版| xxxhd国产人妻xxx| 午夜福利欧美成人| 精品国产乱码久久久久久小说| 欧美日韩av久久| 人人妻人人澡人人爽人人夜夜| svipshipincom国产片| 亚洲av成人不卡在线观看播放网| 久久天躁狠狠躁夜夜2o2o| 99国产精品99久久久久| 久久精品aⅴ一区二区三区四区| 女警被强在线播放| 又紧又爽又黄一区二区| 黄色视频,在线免费观看| 久久热在线av| 国产xxxxx性猛交| 99香蕉大伊视频| 一二三四在线观看免费中文在| 一个人免费在线观看的高清视频| 制服人妻中文乱码| 波多野结衣av一区二区av| 国产欧美日韩一区二区精品| 我要看黄色一级片免费的| 日韩三级视频一区二区三区| 美女扒开内裤让男人捅视频| 乱人伦中国视频| 青草久久国产| 下体分泌物呈黄色| 极品教师在线免费播放| 久久99热这里只频精品6学生| avwww免费| 亚洲成a人片在线一区二区| 999久久久精品免费观看国产| 69av精品久久久久久 | 99re6热这里在线精品视频| 午夜激情久久久久久久| av线在线观看网站| 中文欧美无线码| 777久久人妻少妇嫩草av网站| 99精国产麻豆久久婷婷| 一级毛片女人18水好多| 午夜福利一区二区在线看| 首页视频小说图片口味搜索| 久久久久久久大尺度免费视频| 久久精品成人免费网站| 99国产精品一区二区三区| 午夜福利免费观看在线| 国产片内射在线| 久久久国产欧美日韩av| 制服诱惑二区| a级毛片黄视频| 欧美日韩中文字幕国产精品一区二区三区 | 建设人人有责人人尽责人人享有的| 大陆偷拍与自拍| 淫妇啪啪啪对白视频| 国产淫语在线视频| 99久久国产精品久久久| 午夜两性在线视频| 亚洲av第一区精品v没综合| 啦啦啦视频在线资源免费观看| 久久精品国产亚洲av香蕉五月 | 后天国语完整版免费观看| svipshipincom国产片| 亚洲av成人不卡在线观看播放网| 国产黄色免费在线视频| 欧美人与性动交α欧美软件| 亚洲熟妇熟女久久| 中文字幕av电影在线播放| 久久久久精品人妻al黑| 精品一区二区三区av网在线观看 | 99精品欧美一区二区三区四区| 国产单亲对白刺激| 国产精品影院久久| 性少妇av在线| 99国产极品粉嫩在线观看| 一区在线观看完整版| 欧美日韩黄片免| a在线观看视频网站| 成人特级黄色片久久久久久久 | 亚洲人成伊人成综合网2020| 纯流量卡能插随身wifi吗| 亚洲色图 男人天堂 中文字幕| 国产精品熟女久久久久浪| 午夜福利在线免费观看网站| 一级毛片女人18水好多| 亚洲,欧美精品.| av一本久久久久| 丝袜喷水一区| 国产福利在线免费观看视频| 搡老熟女国产l中国老女人| 亚洲精品国产精品久久久不卡| 日本一区二区免费在线视频| 欧美 亚洲 国产 日韩一| 90打野战视频偷拍视频| 母亲3免费完整高清在线观看| 一级毛片精品| 女人爽到高潮嗷嗷叫在线视频| 深夜精品福利| 久久久久久久久免费视频了| 国产av一区二区精品久久| 成人黄色视频免费在线看| av免费在线观看网站| 最近最新中文字幕大全免费视频| 丰满迷人的少妇在线观看| 久久毛片免费看一区二区三区| 老司机午夜十八禁免费视频| 日韩欧美国产一区二区入口| 亚洲人成电影免费在线| 无限看片的www在线观看| 日韩视频一区二区在线观看| 午夜精品久久久久久毛片777| 日韩中文字幕欧美一区二区| 在线观看免费视频日本深夜| 亚洲黑人精品在线| 大片电影免费在线观看免费| 成人av一区二区三区在线看| tocl精华| 国产视频一区二区在线看| 亚洲人成电影观看| 天堂俺去俺来也www色官网| 国产黄色免费在线视频| 97人妻天天添夜夜摸| 欧美av亚洲av综合av国产av| 国产单亲对白刺激| 国产一区有黄有色的免费视频| 亚洲精品中文字幕一二三四区 | 日本黄色视频三级网站网址 | 精品一区二区三卡| 高清av免费在线| 女人高潮潮喷娇喘18禁视频| 成年女人毛片免费观看观看9 | 午夜免费成人在线视频| 中国美女看黄片| 久久人妻av系列| 国产欧美日韩一区二区三| 99热网站在线观看| 久久精品国产综合久久久| 欧美黑人欧美精品刺激| 亚洲色图综合在线观看| 国产欧美亚洲国产| 久久国产精品人妻蜜桃| 亚洲av美国av| 久久国产精品人妻蜜桃| 蜜桃在线观看..| 久久久久久久久免费视频了| 国产深夜福利视频在线观看| 国产成人免费观看mmmm| 美女午夜性视频免费|