• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    2018-07-12 10:54:58MingWanJiangyuanYaoYuanJingandXiJin
    Computers Materials&Continua 2018年6期

    Ming Wan, Jiangyuan Yao , Yuan Jingand Xi Jin

    Abstract:As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN(Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication packets. After that, the feature selection and event sequence extraction can be carried out by using theN-gram model and K-means algorithm. Based on the obtained event sequences, this approach finally trains an event-based HMM (Hidden Markov Model) to identify aberrant industrial communication behaviors. Experimental results clearly show that the proposed approach has obvious advantages of classification accuracy and detection efficiency.

    Keywords:Event sequence, anomaly detection, non-public industrial communication protocols, SDN.

    1 Introduction

    In recent years, ICSs (Industrial Control Systems) are exposed to an increasing number of cyberattacks [NCCIC/ICS-CERT (2016); NCCIC/ICS-CERT (2017)]. Especially, with the development of network technology, the original closure of ICSs has been broken.Although industrial automation can benefit from the situation attaching ICSs to Internet,the corresponding cybersecurity can also be dramatically impacted. Actually, the original control systems are designed for the process safety [Knijff (2014)], and they are always used in the air-gapped security environments [Ponomarev and Atkison (2016)]. In other words, ICSs are very sensitive to various cyberattacks, because they contain few security features during the early design phases. As defined in SP800-82 [Padgette, Scarfone andChen (2013)], ICSs are a group of automation systems used in industrial production and manufacturing, and they are widely applied to many critical infrastructures, such as power stations and transportation systems. Therefore, if one destructive cyberattack is unavoidable, it may inflict enormous life and property losses. With the deepening of Industrial Internet, IoT (Internet of Things) and Big Data, some new ICTs (Information Communication Technologies) have been proposed and applied in ICSs, and the SDN technology is a typical one [Genge and Haller (2016)]. However, although SDN-based control systems improve the communication efficiency and reliability, they cannot avoid the destructive cyberattacks.

    Through analysis, we find that one of the core reasons to result in these cyberattacks is the vulnerability of industrial communication protocols, which are not designed with security in mind. As the main communication mediums in industrial control networks,industrial communication protocols are always vulnerable to extreme exploitations.Although NIST (National Institute of Standards Technology) presents the “defense in depth” strategy which emphasizes the security defense by parsing industrial communication protocols in depth, there exist a multitude of different protocols and most industry organizations generally tend to use different protocols in their control networks.In particular, because ICSs include a wide range of industrial components which are not compatible enough with one another, many industry organizations have developed their own industrial communication protocols, whose essential property is non-public and private. That is, the protocol specification and message format are unknown for the cybersecurity workforce. In this case, it heightens the difficulty to carry out the appropriate security mechanisms in ICSs.

    Compared with traditional IT systems, the availability and timeliness of ICSs is extremely critical [Zhou, Huang, Xiong et al. (2015)]. Although various flexible and appropriate IT security approaches have been developed by both academia and industry,these approaches cannot be directly applied due to industrial communication protocols and the special requirements [Han, Xie, Chen et al. (2014)]. At present, two categories of ICS security approaches have been concerned: device-based and network-based. In the device-based cases, the interesting approaches are vulnerability exploiting [Liu, Liu, Liu et al. (2013)] and trusted computing [Wang, Liu, Yang et al. (2015)] for industrial field devices. In the network-based cases, the researches on network defense [Wan, Shang,Kong et al. (2017)], penetration testing and intrusion detection [Han, Xie, Chen et al.(2014); Zhu and Sastry (2010)] have been regarded as the significant breakthroughs. In practice, intrusion detection is the first step to secure ICSs, and its results can provide some necessary preparations for the self-adaptive protection or real-time response [Zhou,Huang, Xiong et al. (2015); Ten, Manimaran and Liu (2010)]. Besides, as a bypass monitoring technology, intrusion detection can effectively identify abnormal communication behaviors without affecting the availability and timeliness of ICSs. In the existing researches,anomaly detection, which is a representative class of intrusion detections, has been attracting many attentions of researchers, because the attack behaviors in ICSs always incorporate the characteristics of concealment and unpredictability. Simply stated, anomaly detection need not predefine and understand each attack behavior, and can build a normal communication behavior model to identify misbehaviors. However, one of the important prerequisites is that we can parse enough communication contents from the capturedpackets. In ICSs, this prerequisite may get lost due to non-public industrial communication protocols. So, developing flexible and adaptive anomaly detection approach for non-public industrial communication protocols in ICSs becomes a severe challenge.

    Differently, ICSs are equipped with the relatively stable communication patterns [Valdes and Cheung (2009)], that is, the communication behaviors and states of ICSs are limited and regular. Additionally, because the network architecture of logic control and data forwarding separation is presented in SDN-based control systems, the security functions can be designed as a series of software appliances, which can be installed in SDN switches to offer diversified network security measures for ICSs. According to these characteristics, this paper proposes a new event-based anomaly detection approach to identify misbehaviors which use non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach carries out the feature selection and event sequence extraction by using theN-gram model and K-means algorithm, and trains a normal event-based HMM model to identify the unexpected industrial communication behaviors. In order to evaluate our approach, we also build a simulated SDN-based control system, whose communication is based on Siemens Profinet protocol. The experimental results and analysis show that our approach has obvious advantages of classification accuracy and detection efficiency.

    2 Related work

    According to the proposed classification in traditional IT systems [Garcia-Teodoro, Diaz-Verdejo, Macia-Fernandez et al. (2009)], the anomaly detection approaches in ICSs can also fall into three categories: statistics-based, knowledge-based and machine learningbased. In the statistics-based approaches, Wei et al. [Wei and Kim (2012)] propose an intrusion detection system for wireless industrial networks, and this system introduce a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. Ozcelik et al. [Ozcelik and Brooks (2016)] use the CUSUM method to present a statistics description of the communication traffic in ICSs, and identify its abnormal change point. By using both statistical analysis of traditional network features and specification-based metrics, Kwon et al. [Kwon, Kim, Lim et al. (2015)] present a novel behavior-based IDS for the smart grid infrastructure. In the knowledge-based approaches, Khalili et al. [Khalili and Sami (2015)] propose SysDetect (a Systematic approach to Critical State Determination), which is an iterative algorithm to systematically determine the critical states of industrial processes based on Apriori algorithm. A novel multimodel-based anomaly intrusion detection system for industrial process automation is designed in Zhou et al. [Zhou, Huang, Xiong et al. (2015)], and this system uses a classifier based on an intelligent hidden Markov model to differentiate the actual attacks from faults. Goldenberg et al. [Goldenberg and Wool (2013)] design an algorithm to automatically construct the DFA (Deterministic Finite Automaton) of each HMI-PLC channel, and deploys a model-based intrusion detection system on Modbus/TCP networks. In the machine learning-based approaches, Almalawi et al.[Almalawi, Fahad, Tari et al. (2016)] propose an innovative intrusion detection approach to detect SCADA tailored attacks, and it is based on a data-driven clustering technique of process parameters, which automatically identifies the normal and critical states of a given system. Linda et al. [Linda, Vollmer and Manic (2009)] present an intrusion detection system using neural network-based modeling to tailor the specifics of critical infrastructures. Anoop et al. [Anoop and Sreeja (2013)] put forward a new genetic algorithm-based approach for calculating filtering parameters for DDOS, R2L, U2R attacks to make SCADA systems more secure. Schuster et al. [Schuster, Paul, Rietz et al.(2015)] and Wan et al. [Wan, Shang and Zeng (2017)] suggest using one class SVM(Support Vector Machine) to identify protocol-specific misbehaviors in industrial control networks. From the above three categories of approaches, we can see that the anomaly detection in ICSs has been widespread concerned and acknowledged by both academia and industry. Furthermore, one common characteristic of anomaly detection in ICSs is to build a normal model (such as industrial communication behavior model or state model),and identify abnormal activities by comparing the observed industrial data with this model. In this paper, our approach also stems from this characteristic, because it do not require the specific attack samples, which are scarce and often not publicly disclosed by utility companies [Silva, Silva, Wickboldt et al. (2016)].

    3 Software defined security function model

    Based on the SDN technology [Gelberger, Yemini and G iladi (2013)], the network architecture can be decoupled into two parts: control plane and data plane. Furthermore, SDN controllers in the control plane give the network control decisions, and SDN switches in the data plane only accomplish the data forwarding function according to these decisions.From this point, some security mechanisms based on the SDN architecture have been announced by many researchers [Silva, Silva, Wickboldt et al. (2016); Kalman (2015);Sainz, Iturbe, Garitano et al. (2017)]. Similarly, a novel security viewpoint is that security defense functions can be dynamically configured in accordance with different network security requirements. Fig. 1 shows the dynamic configuration model of security defense functions based on the SDN architecture. More specifically, SDN controllers can gather diversified security defense functions in the form of software appliances, and install these softwares into SDN switches on the basis of the specific network resources and different security requirements. After the deep packet parsing, SDN switches can perform different network security defenses by using the downloaded functions. As an application example,we propose an event-based anomaly detection approach for non-public industrial communication protocols, and this approach can be applied in SDN switches to identify misbehaviors. Due to the similar work in Silva et al. [Silva, Silva, Wickboldt et al. (2016);Kalman (2015); Sainz, Iturbe, Garitano et al. (2017)], it is worth mentioning that we do not emphasize the specific implementation process on this model, and we only focus on the detailed design and evaluation on our event-based anomaly detection approach.Besides, to detect the encrypted communication data is beyond the applied scope of our approach, and one of the main reasons is that the encryption-based methods have not been properly used in today’s ICSs because of the highly-available and real-time requirements.

    4 Event-based anomaly detection for non-public industrial communication protocols

    By capturing and analyzing industrial communication packets, this approach can differentiate misbehaviors (such as intrusion behaviors, unauthorized behaviors or misoperations) from the normal technological operations. Fig. 2 presents the basic model of the proposed approach, and this model is a two-stage process, including online selflearning stage and real-time detection stage. Furthermore, by using the extracted event sequences, the online self-learning stage mainly trains an effective event-based hidden Markov model, and achieves the behavior probability threshold by the iterative computing. The real-time detection stage calculates the responding behavior probability of the observed industrial communication data according to the trained hidden Markov model, and compares with the behavior probability threshold to realize anomaly detection.

    4.1 Data preprocessing

    A detailed implementation of data preprocessing in both online self-learning stage and real-time detection stage can be listed as follows:

    Session reconstruction.By capturing industrial communication packets in real time, we recombine these packets in chronological order. In general, the non-public industrial communication protocols may involve two types: one is based on TCP/IP, and the other is directly layered on typical Ethernet. Furthermore, the biggest difference between these two types is to meet the special response time requirement. In the reconstruction process,if these packets are based on TCP/IP, we reconstruct each session according to the four tuples, including source IP address, destination IP address, source port and destination port; if these packet belongs to the second type, we reconstruct each session in accordance with the three tuples, including source MAC address, destination MACaddress and protocol type. Besides, we also rearrange the out-of-order packets according to the sequence number and drop the duplicate packets.

    Figure 2: Basic model of event-based anomaly detection approach for non-public industrial communication protocols

    Payload data merging.For each session, we get the payload data from the application layer of each packet, and form the session messages by merging all payload data belonging to the same session. In this case, the merged payload data in one session may either be too large or be not suitable for the further analysis. In order to resolve this problem, we can break these data into several small session messages in order.

    Feature extraction.Although the protocol specifications of non-public industrial communication protocols are unknown, ICSs always implement the periodic technological process. So, the session messages belonging to different sessions have strong similarities. By establishing theN-gram model, we map the byte sequences in the session messages to a limited feature space, and all features in this feature space can represent the specific nature of session messages. Because ICSs have the relatively limited network scale and communication states, the “address field” or “function field”defined in industrial communication protocols generally do not exceed 2 bytes. So, we adoptN=2when establishing theN-gram model.

    Cluster analysis.Because the initial dimension of feature space is very big, we use the cluster analysis to reduce the dimension of feature space, and improve the efficiency and accuracy of HMM model to some extent. In our approach, we introduceK-means algorithm to aggregate the features, and divide the whole feature space into several clusters. Specifically, the features in the same cluster have a remarkably general similarity, and the features in different clusters vary significantly. Besides, we regard each cluster as one kind of event. Above all, the interactive sessions belonging to nonpublic industrial communication protocols can be described as a series of event sequences,and each event sequence can be considered as one industrial communication behavior.

    4.2 Event-based hidden Markov model

    The hidden Markov model is a tool which can effectively represent the probability distributions of observed sequences [Ghahramani (2001)], and it is widely used to resolve three problems: decoding, evaluation and learning [Kohlschein (2013)]. In particular, our approach successfully utilizes its evaluation ability. The basic definition of a hidden Markov model can be briefly depicted by the following parameters:

    1)N: the number of the states in the model.Nstates can be marked asand if some state at timetisqt,qtmust meet

    2)M: the number of the observations in the model.Mobservations can be marked asand if some observation at timetisot,otmust meet

    3)ω: the probability distribution of initial states. Whereanddenotes the probability of the HMM to start in statesi.

    4)A: the matrix of state transition matrix. Whereandaijdenotes the probability of a transition from state

    5)B: the matrix of emission matrix. Whereandbijdenotes the probability of emitting observationvjin statesi.

    Based on the above parameters, the hidden Markov model can be further defined as

    According to the definition of the hidden Markov model, we use the event sequences obtained from the normal industrial communication data to train the event-based hidden Markov model through iterations, and build a normal behavior model for non-public industrial communication protocols. The detailed steps are the followings:

    Step 1: Establish the initial hidden Markov modelλ0according to the selected initial parameters.

    Step 2: Based on the initial modelλ0and the input event sequenceO, introduce the Baum-Welch algorithm [Kohlschein (2013)] to train new hidden Markov modelλ.

    Step 3: By using the Forward algorithm [Kohlschein (2013)], calculate the behavior probabilitiesp(O|λ)andp(O|λ0)of the event sequenceOin the modelsλandλ0,respectively. Moreover, the behavior probability can be computed byHere, logPois the log probability of the event sequenceO, andnois the number of the events in the event sequenceO.

    Step 4: If the m consecutive comparisons are(Here,δis a default value.), the trained process is over, and the final hidden Markov modelλKand the behavior probability thresholdare obtained. Here, the behavior probability threshold is the smallest one ofmtraining behavior probabilities.

    Step 5: Conversely, setλ0equal toλ, and go to Step 2.

    4.3 Real-time detection

    In our real-time detection stage, we use the detection mechanism of HMM. That is, we calculate the behavior probabilityby using the observed event sequenceXand the hidden Markov modelλK, and comparewith the behavior probability thresholdKto identify misbehaviors. The real-time detection process can be stated as follows:

    Step 1: Capture industrial communication data in real time, and carry out the data preprocessing, including session reconstruction, payload data merging, feature extraction and cluster analysis. After that, generate the observed event sequenceX.

    Step 2: Input the observed event sequenceXinto the hidden Markov modelλK, and use the Forward algorithm to calculate the corresponding behavior probability

    5 Experimental results and analysis

    5.1 Experimental environment and preprocessing

    In order to evaluate our approach, we build a simulated SDN-based control system in which some attack and detection experiments are performed. As shown in Fig. 3, this system simply simulates the automobile assembly line, and its control segment mainly consists of one master PLC and three slave controllers. Furthermore, the communication between master PLC and slave controllers conforms to Siemens Profinet protocol, which can be approximately considered as a non-public industrial communication protocol in our experiments. The technological process can be outlined as follows: Firstly, robot controller A receives the commands from master PLC to actuate industrial robot A, and industrial robot A catches the model car to the numerical control system; Secondly,master PLC sends the assembly commands to slave PLC, and salve PLC drives the numerical control system to complete the simulation assembly; Finally, based on the commands of master PLC, robot controller B controls industrial robot B to unload the assembled model car. In addition, we run this system and capture the Profinet packets from the SDN switch, which analyze the experimental data by using our anomaly detection approach to identify misbehaviors.

    According to the above technological process, we capture the normal communication packets at three intervals, and obtain 3 Profinet data samples by removing all insignificant packets, such as broadcast packets. Additionally, these data samples represent the normal communication activities of this simulated control system, and mainly involve the control commands and running states of field execution devices. After the session reconstruction, we totally get 233 normal communication sessions, and Fig. 4 plots the number variation of packets in each session, which depicts the session comparison in different data samples. From this figure we can see that, the packetnumbers of all sessions are roughly distributed into three areas, which are [0, 12], [56, 60]and [92, 126], respectively. Moreover, most of packets belong to the first area, that is, the majority of sessions are composed of a small quantity of packets. By extracting features from the session messages, we win a total of 101854 feature values from all sessions, and the number of features after the removal of duplicate data is 5670. Fig. 5(a) shows the number variation of features under different sessions. Similarly, the number of features in each session also presents three statuses: small, medium and large numbers. Furthermore,most of sessions are assigned to the small and medium statuses, and each status changes steadily and with little volatility. Fig. 5(b) plots the accumulated percentage variation for all features. According to the stepped curve in this figure, there are plenty of duplicative feature values in the extracted features, and it also means that the session has the relatively high similarity with each other. In other words, we can exploit the similarity to accomplish the anomaly detection for non-public industrial communication protocols.

    Figure 3: Simulated SDN-based control system based on Siemens Profinet protocol

    Before evaluating the detection performance of our approach, we first use K-means algorithm to preprocess all features. In this experiment, we divide the whole feature space into 15 clusters, and Fig. 6 shows the distribution of the corresponding 15 cluster centers.On this basis, the event sequence description of each session can be established by using these 15 clusters. According to the 233 normal event sequences, we further introduce the Baum-Welch algorithm to train the event-based hidden Markov model. In order to build an optimal HMM model, it is worth mentioning that we selectm=100 andinthe training process. Furthermore, the whole training time is about 2749.63 seconds, and the behavior probability threshold of the optimal HMM modelλKisK=1.1333.

    Figure 4: Number variation of packets in different data samples

    Figure 5: Number variation of features under different sessions and accumulated percentage variation for all features

    5.2 Detection performance evaluation

    In order to evaluate the practical detection performance, we perform 10 experiments to analyze the predicted accuracy and consuming time. In each experiment, we forge and replay the false Profinet packets to simulate the attack to the robot controllers and slave PLC. More specifically, the percentage of the forged data in these packets is aboutand these forged data basically change Profinet protocol parameters, such as register values. Finally, we generate 120 malicious sessions in each experiment according to the data preprocessing. Additionally, we calculate the behavior probability for each malicious session, which is compared with the above behavior probability threshold to identify the corresponding abnormal communication behavior. Tab. 1 shows the experimental results on the predicted accuracy and consuming time in detail. From this table we can see that the average predicted accuracy and average consuming time are 91.08% and 2.11 s,respectively. Especially, the maximum predicted accuracy can reach 94.17% in the 5th and 9th experiments, and the minimum consuming time is only 1.49 s to detect 120 malicious sessions. To some degrees, these results indicate that our approach has distinct advantages of classification accuracy and detection efficiency, and also indirectly verify it has the remarkable capacity to detect the abnormal communication behaviors under non-public industrial communication protocols.

    Figure 6: Distribution of 15 cluster centers

    In practice, the different percentages of the forged data in the packets can exert a noticeable influence on the predicted accuracy. Fig. 7 draws the predicted accuracy variation when detecting the malicious sessions which using various percentages of forged data in the packets. In this figure,represent the different percentages of forged data, whose values areandrespectively. One step further, for each percentage we perform 3 experiments, and also generate 120 malicious sessions in each experiment. As shown in Fig. 7, we plot theminimum predicted accuracies, the maximum predicted accuracies and the average predicted accuracies for every 3 experiments. The results indicate that the predicted accuracy markedly increases with the increment of the percentage of forged data in the packets. Especially, the predicted accuracy may reach 100%, when the percentage of forged data in the packets is. In other words, our approach can be more effective to identify the abnormal communication behaviors caused by the large percentage of forged data.

    Table 1: Predicted accuracy and consuming time under 15 clusters

    Figure 7: Predicted accuracy variation under different percentages of forged data in the packets

    In particular, cluster analysis is an important link in our approach, because the eventsequences which are used to build the HMM model are generated by this step. However,different numbers of clusters can have some performance impacts on the predicted accuracy. Fig. 8 shows the predicted accuracy comparison under different numbers of clusters. Furthermore, we perform 10 experiments for each number of clusters, and 120 malicious sessions in each experiment are generated. Additionally, the percentage of the forged data in the malicious packets is also about. From this figure we can see that,the predicted accuracy for each number of clusters holds the characteristic of fluctuation,and the average predicted accuracies under 15 clusters, 20 clusters and 25 clusters are 91.08%, 92.42% and 95.08%, respectively. That is, the larger the number of cluster is, the higher the predicted accuracy is. However, it is infeasible to enlarge the number of clusters without constraint, because the large number of clusters can consume excessive time for the data preprocessing, and increase the computational complexity of the eventbased HMM model. In short, we should carefully consider setting the number of clusters in accordance with actual experiences and network circumstances.

    Figure 8: Predicted accuracy comparison under different cluster numbers

    5.3 Performance comparison

    Based on the general idea of data preprocessing, we introduce two different anomaly detection approaches to perform the predicted accuracy comparison, and analyze the reasons for the adopted HMM model in this paper. Moreover, two other detection approaches are BP neural network and NB (Na?ve Bayes) detection algorithms,respectively. In these experiments, we still generate 120 malicious sessions in each experiment, and the percentage of the forged data in the malicious packets is also about. Differently, we carry out the cluster analysis for each malicious session to generate 15 cluster centers, because these two detection algorithms need the test samples which have the same dimension. Fig. 9 plots the predicted accuracies of 6 experiments, and Tab.2 depicts the comparison results of average predicted accuracies of these three anomaly detection approaches. From this table we can conclude that, the average predicted accuracies of BP and NB detection algorithms are 74.58% and 80.83% respectively, and the corresponding predicted accuracy of our approach is well above the ones of BP and NB detection algorithms. In conclusion, the proposed approach in this paper is more specifically suited to detecting abnormal behaviors for non-public industrial communication protocols, and two causes are related to this situation: one is that our approach can provide considerably better detection performance, and the other is that the event-based HMM model does not require the event sequences in all sessions to have the same dimension.

    Table 2: Comparison of different anomaly detection approaches

    Figure 9: Predicted accuracies of BP neural network and NB (Na?ve Bayes) detection algorithms

    6 Conclusion

    Based on the SDN technology, this paper first introduces the software defined security function model by using the architecture of logic control and data forwarding separation.After that, an event-based anomaly detection approach for non-public industrial communication protocols is proposed in SDN-based control systems, and the basic idea behind it is highly accessible. That is, identifying and diagnosing the anomalous communication behaviors for non-public industrial communication protocols by establishing the event-based HMM model. Actually, in order to overcome the difficultiesof the unknown protocol specification and message format, we first design the practicable data preprocessing, including session reconstruction, payload data merging, feature extraction and cluster analysis. By obtaining the event sequences of all sessions, the event-based hidden Markov model is built to identify the corresponding misbehaviors. At last, many experiments are completed to evaluate our approach. We show that, the proposed approach has obvious advantages of classification accuracy and detection efficiency. Due to its salient characteristics, we believe that our approach is serviceable.

    Acknowledgement: This work is supported by the Hainan Provincial Natural Science Foundation of China (618QN219), the National Natural Science Foundation of China(Grant No. 61501447) and the General Project of Scientific Research of Liaoning Provincial Department of Education (LYB201616). The authors are grateful to the anonymous referees for their insightful comments and suggestions.

    美女高潮的动态| 永久免费av网站大全| 99久久中文字幕三级久久日本| 日韩精品青青久久久久久| 国产av码专区亚洲av| 美女高潮的动态| 天堂影院成人在线观看| 欧美极品一区二区三区四区| 国产视频内射| 色视频www国产| 久久久久性生活片| 国产精品嫩草影院av在线观看| 亚洲精品国产av成人精品| 美女内射精品一级片tv| 亚洲精品影视一区二区三区av| 视频中文字幕在线观看| 九色成人免费人妻av| 亚洲熟妇中文字幕五十中出| 久久精品久久久久久噜噜老黄| 亚洲精品乱码久久久久久按摩| 日本黄大片高清| 肉色欧美久久久久久久蜜桃 | 午夜激情欧美在线| 成人av在线播放网站| 97热精品久久久久久| 精品久久久精品久久久| 国产免费视频播放在线视频 | 国产黄色视频一区二区在线观看| 一边亲一边摸免费视频| 九九久久精品国产亚洲av麻豆| 黄片wwwwww| 看非洲黑人一级黄片| 日本与韩国留学比较| 国产精品福利在线免费观看| 人人妻人人澡欧美一区二区| 三级国产精品欧美在线观看| 身体一侧抽搐| 人人妻人人澡人人爽人人夜夜 | 91久久精品电影网| 两个人的视频大全免费| 中文天堂在线官网| 1000部很黄的大片| 人妻夜夜爽99麻豆av| 一级毛片黄色毛片免费观看视频| 欧美日韩一区二区视频在线观看视频在线 | 亚洲精品,欧美精品| 在线观看av片永久免费下载| 午夜福利在线观看免费完整高清在| 成年版毛片免费区| 熟妇人妻久久中文字幕3abv| 亚洲欧美日韩东京热| 免费大片黄手机在线观看| 尾随美女入室| 天天一区二区日本电影三级| 高清视频免费观看一区二区 | eeuss影院久久| 日日啪夜夜撸| 日韩一本色道免费dvd| 日韩av在线免费看完整版不卡| 成人毛片a级毛片在线播放| 国产女主播在线喷水免费视频网站 | 国产免费一级a男人的天堂| 日本免费在线观看一区| 国产免费一级a男人的天堂| 亚洲精品aⅴ在线观看| 成人毛片60女人毛片免费| 男的添女的下面高潮视频| 91午夜精品亚洲一区二区三区| 国产三级在线视频| 精华霜和精华液先用哪个| 中文欧美无线码| 亚洲成人中文字幕在线播放| 日本色播在线视频| 日本色播在线视频| 精华霜和精华液先用哪个| 欧美bdsm另类| 日本wwww免费看| 97超视频在线观看视频| 国产国拍精品亚洲av在线观看| 国产精品日韩av在线免费观看| 男女国产视频网站| 最近视频中文字幕2019在线8| 深爱激情五月婷婷| 视频中文字幕在线观看| 亚洲国产最新在线播放| 亚洲va在线va天堂va国产| 国产在视频线精品| 成年人午夜在线观看视频 | a级一级毛片免费在线观看| 夜夜爽夜夜爽视频| 成年女人在线观看亚洲视频 | 成人美女网站在线观看视频| 天堂影院成人在线观看| 国产激情偷乱视频一区二区| 久久久久久久久中文| 国产成人一区二区在线| 日本一本二区三区精品| 真实男女啪啪啪动态图| 久久久久久久亚洲中文字幕| 一级毛片aaaaaa免费看小| 久久久欧美国产精品| 亚洲最大成人中文| 人人妻人人澡人人爽人人夜夜 | 深夜a级毛片| eeuss影院久久| 日韩欧美三级三区| 国产av不卡久久| 18禁在线播放成人免费| 国产成人a∨麻豆精品| 国产精品久久久久久av不卡| 综合色丁香网| 乱人视频在线观看| 我的女老师完整版在线观看| 亚洲国产av新网站| 国产成人免费观看mmmm| 亚洲精品国产成人久久av| 激情五月婷婷亚洲| 免费观看性生交大片5| 亚洲国产最新在线播放| 亚洲国产色片| 亚洲欧美一区二区三区国产| 亚洲成人一二三区av| 秋霞在线观看毛片| 免费看av在线观看网站| 亚洲四区av| 午夜激情福利司机影院| 久久精品久久久久久久性| 久久精品久久久久久久性| 国产中年淑女户外野战色| 99久国产av精品国产电影| 69人妻影院| 国产精品女同一区二区软件| 国精品久久久久久国模美| 天天躁日日操中文字幕| 一区二区三区免费毛片| 国内精品宾馆在线| 一级黄片播放器| 欧美3d第一页| 老师上课跳d突然被开到最大视频| 中文字幕人妻熟人妻熟丝袜美| 国产日韩欧美在线精品| 中文资源天堂在线| 人妻一区二区av| 亚洲最大成人中文| 麻豆久久精品国产亚洲av| 免费高清在线观看视频在线观看| 精品国产三级普通话版| 久久久成人免费电影| 国产男人的电影天堂91| 欧美日韩视频高清一区二区三区二| 亚洲国产精品成人综合色| 少妇猛男粗大的猛烈进出视频 | 搡老乐熟女国产| 特大巨黑吊av在线直播| 欧美高清性xxxxhd video| 观看免费一级毛片| 成人欧美大片| 久久久久免费精品人妻一区二区| 国产精品一区二区在线观看99 | 神马国产精品三级电影在线观看| 日韩一本色道免费dvd| freevideosex欧美| 久久精品夜夜夜夜夜久久蜜豆| 亚州av有码| 欧美另类一区| av卡一久久| 国产精品一区www在线观看| 欧美 日韩 精品 国产| 欧美97在线视频| 亚洲最大成人中文| 日韩av不卡免费在线播放| 亚洲综合色惰| 精品久久久久久久末码| 亚洲av电影不卡..在线观看| 亚洲三级黄色毛片| 秋霞伦理黄片| 91狼人影院| 国产男女超爽视频在线观看| 男女边摸边吃奶| 美女主播在线视频| 日韩欧美三级三区| 国产成人福利小说| 91久久精品国产一区二区成人| 亚洲国产最新在线播放| 在线免费观看不下载黄p国产| 亚洲一区高清亚洲精品| 亚洲精品一区蜜桃| 联通29元200g的流量卡| 赤兔流量卡办理| 看免费成人av毛片| 国产成人精品久久久久久| 蜜臀久久99精品久久宅男| 婷婷色综合大香蕉| 国产成人精品婷婷| 国产精品女同一区二区软件| 国产av国产精品国产| 日韩欧美精品免费久久| 秋霞在线观看毛片| 午夜福利成人在线免费观看| 亚洲精华国产精华液的使用体验| 国产伦一二天堂av在线观看| 18+在线观看网站| 国产黄片美女视频| 91午夜精品亚洲一区二区三区| 亚洲欧洲国产日韩| 一级二级三级毛片免费看| 99久国产av精品国产电影| 三级毛片av免费| 内地一区二区视频在线| 午夜免费男女啪啪视频观看| 国产毛片a区久久久久| 永久网站在线| 国产三级在线视频| 草草在线视频免费看| 国产高清国产精品国产三级 | 精品一区二区三卡| 97超碰精品成人国产| 成年女人看的毛片在线观看| 午夜福利在线在线| 色综合亚洲欧美另类图片| 国产精品日韩av在线免费观看| 日本av手机在线免费观看| 在现免费观看毛片| 特大巨黑吊av在线直播| 成人一区二区视频在线观看| 免费无遮挡裸体视频| 亚洲av中文av极速乱| 亚洲18禁久久av| 中国国产av一级| 最后的刺客免费高清国语| 天堂俺去俺来也www色官网 | 色网站视频免费| 日本色播在线视频| 欧美性感艳星| 好男人视频免费观看在线| 国产黄色视频一区二区在线观看| videos熟女内射| 亚洲最大成人中文| 久久久久久久久久人人人人人人| 欧美三级亚洲精品| 男女下面进入的视频免费午夜| 色综合站精品国产| 国模一区二区三区四区视频| 女的被弄到高潮叫床怎么办| 成人欧美大片| 欧美区成人在线视频| 亚洲欧美日韩无卡精品| 一级毛片电影观看| 男人和女人高潮做爰伦理| 欧美高清性xxxxhd video| 熟妇人妻久久中文字幕3abv| 神马国产精品三级电影在线观看| 亚洲精品色激情综合| 国产免费视频播放在线视频 | 永久网站在线| 美女黄网站色视频| 亚洲aⅴ乱码一区二区在线播放| 久久久久性生活片| 亚洲精华国产精华液的使用体验| 插逼视频在线观看| 免费av毛片视频| 丝袜美腿在线中文| 免费黄色在线免费观看| 亚洲成色77777| 卡戴珊不雅视频在线播放| 老司机影院成人| 又爽又黄a免费视频| 久久久久免费精品人妻一区二区| 国产老妇女一区| 2021天堂中文幕一二区在线观| av又黄又爽大尺度在线免费看| 最后的刺客免费高清国语| 欧美 日韩 精品 国产| 亚洲丝袜综合中文字幕| 大陆偷拍与自拍| 国产 一区精品| 18禁在线播放成人免费| 51国产日韩欧美| 尤物成人国产欧美一区二区三区| 色综合色国产| 黄片wwwwww| 毛片一级片免费看久久久久| 欧美成人精品欧美一级黄| 亚洲人成网站在线观看播放| 大话2 男鬼变身卡| 日日撸夜夜添| 亚洲四区av| 精品久久久噜噜| 22中文网久久字幕| 日韩三级伦理在线观看| 亚洲国产最新在线播放| 99久久人妻综合| www.av在线官网国产| 日韩av在线免费看完整版不卡| 国产欧美另类精品又又久久亚洲欧美| 一二三四中文在线观看免费高清| 成人鲁丝片一二三区免费| 人妻一区二区av| 热99在线观看视频| 男女视频在线观看网站免费| 午夜精品国产一区二区电影 | 久久99热这里只频精品6学生| 女人十人毛片免费观看3o分钟| 韩国高清视频一区二区三区| 少妇的逼水好多| 91久久精品电影网| av又黄又爽大尺度在线免费看| 久久久久九九精品影院| 亚洲美女搞黄在线观看| 黄色配什么色好看| 日韩av在线免费看完整版不卡| 男女边吃奶边做爰视频| 午夜爱爱视频在线播放| 久久精品熟女亚洲av麻豆精品 | 久久久成人免费电影| 国产老妇伦熟女老妇高清| 国产午夜精品论理片| 神马国产精品三级电影在线观看| 久久久久久久午夜电影| 非洲黑人性xxxx精品又粗又长| 天堂av国产一区二区熟女人妻| 欧美精品一区二区大全| 国产一区二区亚洲精品在线观看| 春色校园在线视频观看| 成人美女网站在线观看视频| 麻豆久久精品国产亚洲av| 国产 亚洲一区二区三区 | 色综合站精品国产| 97精品久久久久久久久久精品| 成人欧美大片| 国产永久视频网站| 激情五月婷婷亚洲| 午夜激情福利司机影院| 99久久精品一区二区三区| 国产女主播在线喷水免费视频网站 | 99九九线精品视频在线观看视频| 韩国高清视频一区二区三区| 中文资源天堂在线| 免费看a级黄色片| 国产黄片视频在线免费观看| 一级av片app| 日本免费在线观看一区| 激情五月婷婷亚洲| 在线免费观看不下载黄p国产| 国产又色又爽无遮挡免| 亚洲精品日韩在线中文字幕| 黄片wwwwww| 又粗又硬又长又爽又黄的视频| 亚洲av一区综合| 最近2019中文字幕mv第一页| 国产精品99久久久久久久久| 亚洲精品日韩av片在线观看| 一二三四中文在线观看免费高清| 九九爱精品视频在线观看| 肉色欧美久久久久久久蜜桃 | 亚洲精品成人久久久久久| 搡老妇女老女人老熟妇| 亚洲av电影不卡..在线观看| 熟妇人妻久久中文字幕3abv| 午夜福利在线观看免费完整高清在| 少妇熟女aⅴ在线视频| 又爽又黄无遮挡网站| 777米奇影视久久| 国产高潮美女av| 精品酒店卫生间| 22中文网久久字幕| 免费观看a级毛片全部| 噜噜噜噜噜久久久久久91| 欧美丝袜亚洲另类| 国产激情偷乱视频一区二区| 亚洲成人精品中文字幕电影| 99久久中文字幕三级久久日本| 国产黄片视频在线免费观看| 国产精品一二三区在线看| 天堂网av新在线| 亚洲精品亚洲一区二区| 亚洲精品久久午夜乱码| av线在线观看网站| 身体一侧抽搐| 激情五月婷婷亚洲| 晚上一个人看的免费电影| 欧美最新免费一区二区三区| 搡女人真爽免费视频火全软件| 在现免费观看毛片| 亚洲欧美成人精品一区二区| 五月伊人婷婷丁香| 一级毛片我不卡| 一级毛片aaaaaa免费看小| 日产精品乱码卡一卡2卡三| 国产av国产精品国产| 乱码一卡2卡4卡精品| 天天躁夜夜躁狠狠久久av| 男女国产视频网站| 久热久热在线精品观看| av天堂中文字幕网| xxx大片免费视频| 天堂俺去俺来也www色官网 | 国产成人精品久久久久久| 国产一区二区亚洲精品在线观看| 成人二区视频| .国产精品久久| 久久人人爽人人爽人人片va| 青春草国产在线视频| 岛国毛片在线播放| 在线免费观看的www视频| av女优亚洲男人天堂| 国产伦一二天堂av在线观看| 久久久久精品久久久久真实原创| 春色校园在线视频观看| 国产激情偷乱视频一区二区| 国产精品无大码| 久久97久久精品| 日韩电影二区| av国产免费在线观看| 免费观看的影片在线观看| 日韩在线高清观看一区二区三区| 日韩制服骚丝袜av| 天天躁日日操中文字幕| 精品国内亚洲2022精品成人| 婷婷色麻豆天堂久久| 男女视频在线观看网站免费| 99久久精品一区二区三区| 久久精品国产自在天天线| 亚洲av免费高清在线观看| 18+在线观看网站| 国产成人91sexporn| 乱系列少妇在线播放| 日韩,欧美,国产一区二区三区| 亚州av有码| 少妇熟女欧美另类| 亚洲色图av天堂| 色哟哟·www| 别揉我奶头 嗯啊视频| 人妻夜夜爽99麻豆av| 69av精品久久久久久| 国产成人精品一,二区| 日韩欧美精品v在线| 亚洲va在线va天堂va国产| 久久久久久久久久成人| 国产男人的电影天堂91| 晚上一个人看的免费电影| 熟女电影av网| 日本av手机在线免费观看| 黄色欧美视频在线观看| 日韩伦理黄色片| 久久国内精品自在自线图片| 亚洲无线观看免费| 国产成年人精品一区二区| 啦啦啦啦在线视频资源| 永久网站在线| 国产免费视频播放在线视频 | 久久精品国产自在天天线| 男人和女人高潮做爰伦理| 国产探花极品一区二区| 国产一区亚洲一区在线观看| 欧美成人精品欧美一级黄| 日日啪夜夜撸| 美女大奶头视频| 女人十人毛片免费观看3o分钟| 如何舔出高潮| 亚洲av中文av极速乱| 欧美成人a在线观看| 免费看不卡的av| 日韩大片免费观看网站| 又爽又黄无遮挡网站| 成年女人看的毛片在线观看| 69av精品久久久久久| 午夜免费男女啪啪视频观看| 日本wwww免费看| 国产精品一二三区在线看| 免费观看av网站的网址| 综合色丁香网| 成年女人在线观看亚洲视频 | 欧美bdsm另类| 午夜激情欧美在线| 美女脱内裤让男人舔精品视频| 欧美性猛交╳xxx乱大交人| 又黄又爽又刺激的免费视频.| 国产极品天堂在线| 高清欧美精品videossex| 不卡视频在线观看欧美| 久久久久久国产a免费观看| videos熟女内射| 免费观看a级毛片全部| 午夜激情欧美在线| 免费观看av网站的网址| 亚洲aⅴ乱码一区二区在线播放| 久久久欧美国产精品| 色吧在线观看| 中文字幕亚洲精品专区| 亚洲av中文av极速乱| 国产亚洲av嫩草精品影院| 欧美激情久久久久久爽电影| 丰满乱子伦码专区| 又黄又爽又刺激的免费视频.| 亚洲av成人精品一二三区| 韩国高清视频一区二区三区| 中文字幕免费在线视频6| 国产黄色免费在线视频| 春色校园在线视频观看| av天堂中文字幕网| 日本爱情动作片www.在线观看| 可以在线观看毛片的网站| 最新中文字幕久久久久| 人妻系列 视频| 边亲边吃奶的免费视频| 成人无遮挡网站| 看十八女毛片水多多多| 天美传媒精品一区二区| 波多野结衣巨乳人妻| 亚洲国产欧美在线一区| 亚洲天堂国产精品一区在线| 国产不卡一卡二| 久久草成人影院| av在线观看视频网站免费| 精品欧美国产一区二区三| 少妇高潮的动态图| 听说在线观看完整版免费高清| 国产激情偷乱视频一区二区| 国产欧美另类精品又又久久亚洲欧美| av线在线观看网站| 97人妻精品一区二区三区麻豆| a级毛色黄片| 寂寞人妻少妇视频99o| 亚洲av一区综合| 久久久精品免费免费高清| 国产亚洲91精品色在线| 亚洲人成网站高清观看| 精品一区二区免费观看| 亚洲国产成人一精品久久久| 哪个播放器可以免费观看大片| 日本黄色片子视频| 人人妻人人澡欧美一区二区| 97精品久久久久久久久久精品| 成人毛片a级毛片在线播放| 99久久精品国产国产毛片| 精品熟女少妇av免费看| 亚洲va在线va天堂va国产| av福利片在线观看| 国产精品久久久久久av不卡| 亚洲色图av天堂| 欧美成人a在线观看| 国产白丝娇喘喷水9色精品| 亚洲aⅴ乱码一区二区在线播放| 成人高潮视频无遮挡免费网站| 一夜夜www| 黄色配什么色好看| av在线播放精品| 日韩成人伦理影院| 精华霜和精华液先用哪个| 男人狂女人下面高潮的视频| 日本与韩国留学比较| 一级黄片播放器| 国产av在哪里看| 色视频www国产| 黄片无遮挡物在线观看| 免费观看的影片在线观看| 天堂中文最新版在线下载 | 国产三级在线视频| 美女高潮的动态| 91av网一区二区| 蜜桃亚洲精品一区二区三区| 亚洲熟女精品中文字幕| 国产v大片淫在线免费观看| 美女主播在线视频| 中文字幕亚洲精品专区| 国产伦精品一区二区三区视频9| 成年av动漫网址| 久久这里只有精品中国| 精品99又大又爽又粗少妇毛片| 国产不卡一卡二| 内地一区二区视频在线| 国产精品av视频在线免费观看| 国产乱人偷精品视频| 亚洲成人中文字幕在线播放| 女的被弄到高潮叫床怎么办| 欧美日韩精品成人综合77777| 亚洲精品456在线播放app| 五月伊人婷婷丁香| 九九爱精品视频在线观看| av免费在线看不卡| 久久久久久久亚洲中文字幕| 2018国产大陆天天弄谢| 小蜜桃在线观看免费完整版高清| 91久久精品国产一区二区三区| 国产亚洲av片在线观看秒播厂 | 午夜福利视频1000在线观看| 寂寞人妻少妇视频99o| 国产美女午夜福利| 亚洲精品日韩在线中文字幕| 麻豆精品久久久久久蜜桃| 精华霜和精华液先用哪个| 久久精品国产亚洲av天美| 亚洲精品乱久久久久久| 成人一区二区视频在线观看| 激情五月婷婷亚洲| 麻豆成人av视频| 国产成人a∨麻豆精品| 美女脱内裤让男人舔精品视频| 午夜福利视频1000在线观看| 国产精品综合久久久久久久免费| 亚洲欧美一区二区三区国产| 国产亚洲5aaaaa淫片| 中文字幕制服av| 七月丁香在线播放| 中文字幕久久专区| 亚洲最大成人av| 国产成人freesex在线| 国精品久久久久久国模美| 亚洲最大成人中文| 久久6这里有精品| 女人久久www免费人成看片| 插阴视频在线观看视频| 精品一区二区三区人妻视频| 非洲黑人性xxxx精品又粗又长|