• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Distributed Intrusion Detection Model via Nondestructive Partitioning and Balanced Allocation for Big Data

    2018-08-15 10:38:26XiaonianWuChuyunZhangRunlianZhangYujueWangandJinhuaCui
    Computers Materials&Continua 2018年7期

    Xiaonian Wu , Chuyun Zhang, Runlian Zhang, Yujue Wang and Jinhua Cui

    Abstract: There are two key issues in distributed intrusion detection system, that is,maintaining load balance of system and protecting data integrity. To address these issues,this paper proposes a new distributed intrusion detection model for big data based on nondestructive partitioning and balanced allocation. A data allocation strategy based on capacity and workload is introduced to achieve local load balance, and a dynamic load adjustment strategy is adopted to maintain global load balance of cluster. Moreover, data integrity is protected by using session reassemble and session partitioning. The simulation results show that the new model enjoys favorable advantages such as good load balance, higher detection rate and detection efficiency.

    Keywords: Distributed intrusion detection, data allocation, load balancing, data integrity,big data.

    1 Introduction

    Intrusion detection system (IDS) is an important tool in protecting network security[Denning (1987)]. With the fast development of network technology, big data age arrived[Gupta and George (2016)], which brings many challenges to traditional IDS. Due to the huge volume of data and potential attacks in big data, it is rather difficult to provide effective security support for traditional IDS. In fact, traditional IDS has many disadvantages such as delaying response, reducing detection rate, thus it cannot effectively complete the detection work in big data environment. To solve these issues,distributed instruction detection system (DIDS) was introduced [Konstantinos, Ioannis and Spiros (2006); Genge, Haller and Kiss (2016)]. Although many DIDS schemes have proposed with different approaches, they have many shortcomings and need to be improved. For instance, data integrity may be destroyed when data is inappropriately partitioned, and the imbalance of data allocation may affect performance. Therefore, it is an urgent task to improve the efficiency and detection rate of IDS.

    The challenge work in current IDS is to improve data processing speed so that it can successfully match the speed of network transmission and processing for massive data. In this case, the key point is to look for some appropriate data partition algorithms to partition data, and efficiently process data. Kruegel et al. [Kruegel, Valeur, Vigna et al.(2002)] used a slicing mechanism to process data in a parallel mode. Later, Charitakis et al. [Charitakis, Anagnostakis and Markatos (2003)] introduced an active traffic splitter based on hash algorithm. In 2005, an algorithm is presented by the idea of priority to partition and distribute the data to the lightest load node [Jiang, Song and Dai (2005)].Also, a hash mechanism is used to distribute network traffic load [Schaelicke, Wheeler and Freeland (2005)]. Recently, a distributed outlier detection algorithm for computing outliers is proposed [Wang, Shen and Mei (2016)]. Notice that data integrity in above methods could be destroyed when the traffic is inappropriately divided into subsets.Moreover, to ensure data integrity, a partition algorithm [Lai, Cai and Huang (2004)] is introduced to divide traffic into small slices by address, port and attack types. Furthermore,Liu et al. [Liu, Xin, Gang et al. (2008)] investigated the issue using the independent neural network. Recently, Cheng introduced an abnormal network flow feature sequence prediction approach to detect DDoS attacks in big data environment. However, the problem is still not well solved.

    On the other hand, data partitioning has been widely used in parallel computing and data processing in various fields, to raise throughput and provide load balancing [Soklic(2002); Rosas, Sikora and Jorba (2014); Wang, Chen, Li et al. (2016)]. Although the throughput of system is increased by data partition and load policy, there still exists a bottleneck in IDS system.

    In this paper, a new distributed intrusion detection model is proposed based on nondestructive partitioning and balanced allocation for big data (DIDS-NPBA).Specifically, a data allocation approach is introduced based on capacity and load to achieve local load balance, a dynamic load adjustment strategy is adopted to maintain global load balance of cluster and data integrity is protected by reassembling TCP session and session allocation policy.

    The rest of this paper is organized as follows. A brief introduction and overview of DIDS-NPBA model are given in Section 2. The process about session assembly and data classification are described in Session 3. Section 4 presents a data allocation approach and a nondestructive data partitioning algorithm. The experimental results of the proposed model are shown in Section 5. Finally, the conclusions and future work are discussed in Section 6.

    2 DIDS-NPBA system model

    In high-speed network, massive amount of data makes traditional IDS difficult to detect attacks. Hadoop is an open-source framework and is used for large scale data processing.In this paper, our DIDS-NPBA is built on Hadoop to detect big data. As shown in Fig. 1,DIDS-NPBA consists of data acquisition, control center, data storage and data detection,where control center contains system monitoring, task scheduler and alarm response.According to Hadoop framework, control center acts as the master node, whereas other components play as slave nodes and communicate with MapReduce, which will be described in Section 5.1.

    Figure 1: The DIDS-NPBA model

    The mechanism of DIDS-NPBA is as follows. In Fig. 1, data acquisition is to collect network packets using many independent sensors. Packets are reassembled and classified in sensors. The data storage nodes receive and store data from sensors and submit summarizing information to control center.

    System monitoring module monitors the state of detection nodes, including utilization ratio of node CPU/RAM/hard disk, and network bandwidth. Then the information is sent to task scheduler. According to the information and a data allocation strategy based on capacity and load (DAS-CL), task scheduler partitions and allocates data to detection nodes. Alarm response module receives and displays alarms coming from detection nodes.Data detection module is used to detect and analyze data, which consists of many distributed data detection nodes in parallel. Each detection node reads the allocated data files from the corresponding data storage node, analyses and detects data, and sends alarms to control center.

    3 The work of data assembly and classification detection

    The TCP session assembly is to assemble and restore session from the interrelated network packets. A TCP link is determined uniquely by a tuple . The hash value calculated from such tuple can be used as a unique identification of TCP link. Combining the hash value with linking number in packet, each TCP session can be restored from the captured packets. Then in sensors,each TCP session is stored into a data file named after its hash value. To protect data integrity, each session file would not be permitted to be split out when files is partitioned.In IDS, more feature rules would be helpful to raise the detection rate. However, the growth of feature rules increases detection time. Thus, we introduce a classification detection method to reduce detection time by cutting down feature rules of IDS, without affecting the detection rate of IDS.First, the session files are classified according to application protocols. For example,assuming there are k class protocols, the files would be divided into k data groups. Then,all detection nodes are divided into k node groups in the same way, and the feature rules corresponding to the protocol are retained in each node group and the other rules are cut down. Finally, each data group is assigned to a node group with the same protocol. In this way, the feature rules can be reduced, which hardly affect the detection rate of IDS since these feature rules meet the pending data.

    4 Data allocation strategy and data partition algorithm

    4.1 Capacity evaluation for detection nodes

    The capacity of nodes is determined by many performance indexes, which can be collected by the system monitoring module. Assume the evaluation indexes for node capacity mainly include node CPU, memory and network bandwidth, since the work focuses on computation and data transmission. We only evaluate the detection nodes which are used to detect data. Let CAP(i) represent the capacity of node i, which is defined as follows:

    where CPUiis the product of CPU number and CPU frequency of node i, Miis the memory capacity, Niis network bandwidth, and a1, a2, a3are the weighting factors on node capacity with a1+a2+a3=1.

    To evaluate the diversity of memory among heterogeneous nodes, Miis computed by memory size, frequency and CAS latency (CL) of memory, where these parameters are normalized by using Min-max linear function conversion method. The computation of Miavoids the influence from the discrete value of different indexes. Similarly, CPUi, Niin formula (1) are normalized with the same linear method.

    The heterogeneity of detection node capacity makes it difficult to control the data granularity allocated to each node when big data is split. If all nodes are assigned datasets with the same size, the nodes with weak capacity would be bottleneck. Here, we introduce a concept about node capacity factor (CF) to measure the capacity relationship of nodes as follows.

    Definition 1. CF is mainly used to measure or weigh capacity ratio of a node in cluster.Assume there are n nodes in a cluster, CAP(i) is the capacity of node i, and node j (1≤j≤n)has the lowest capacity CAP(j) in all nodes. The CF of node i can be computed as follows:

    The node with the lowest capacity is used as a benchmark to measure or weigh other node in cluster. Moreover, CF reflects the ratio among nodes in cluster, which can be helped to calculate the weight for data allocation.

    4.2 Load evaluation for detection nodes

    The load of nodes is another important factor affecting the data processing efficiency. The heavier load of a node, the more time is needed for data detection. In order to evaluate node load, the utilization of CPU, memory and network bandwidth of nodes are collected by the system monitoring module in real time. Suppose L(i) is the load of node i at a certain moment, we define:

    where U(CPUi), U(Mi), U(Ni) are the CPU, memory and network bandwidth utilization of node i, and b1, b2, b3are the weight factors satisfying b1+b2+b3=1.

    If the load of some node is changed, then the data granularity allocated to this node should be changed accordingly. For instance, the overload nodes will no longer be assigned data. Here, we give another definition about the load factor (LF) to estimate the load degree of heterogeneous nodes.

    Definition 2. LF is mainly used to measure the degree of node load. Suppose the lightload threshold of a node is α and its overload threshold is β. The LF of node i can be computed as follows:

    where LF is a piecewise function such that its value changes along with the node load.Thus, LF is the other key factor to evaluate data allocation.

    4.3 Data allocation strategy in a node group

    In the proposed DAS-CL, the contribution of each node is quantified in a node group.Assuming there are m nodes in node group k, and the total GDBkdata are submitted to node group k. The weight factor R(i) of node i in group k can be computed as follows:

    From Eq. (5), the stronger capacity and the lighter load of node i, it has the greater weight or contribution in node group k.

    Suppose D(i) is the assigned data size to node i from GDBk, which can be computed as follows:According to formula (6), each node will be allocated a data set conforming to its capacity and load. Thus, the resource utilization is raised and the bottleneck can be avoided, which means that a better local load balance can be achieved in node group.

    4.4 Data partition

    In the process of data partition, files allocated to node i may be roughly D(i), but does not equal to D(i), since the size of each file is uncertain. If a file is split out to meet D(i), the data integrity would be undermined. Thus, each file would not be permitted to be split out,as discussed in Section 3.

    An approximate allocation way is used to partition data. A fluctuation range closed to D(i)is set to 5 MB, it has little influence on node load when compared with the massive data.Then a file or many files from GDBkwith size closed to D(i) will be allocated to node i,and the file information including the address of data storage node (i.e. the real location of storing data file), file directory and file name, etc. will be sent to node i by the task scheduler. Node i will read the assigned data files from the data storage node, detect the data, and send alarms to the alarm node.

    4.5 Dynamic adjustment for load balancing among node groups

    The data produced by the Internet applications is varying with time. For instance, during some period, an application may be used frequently, thus the produced data would be increased, whereas other data may be reduced. This changing could be able to affect the load of node groups, even cause load imbalance among node groups. Therefore, we present a dynamic load adjustment method among node groups to maintain global balance in the cluster.

    We need to evaluate the load of different node groups. In each node group, each node may have different capacity and load. We introduce a new concept regarding the load of node group (GL) to smooth the differences.

    Definition 3. GL is used to measure the average load of all nodes in a node group, which can be computed by the load and capacity of nodes. Suppose there are m nodes in node group k, the load GL(k) of node group k is defined as follows:

    The load dynamic adjustment method among node groups is as follows:

    Step 1. Compute GL of each node group. The light-load threshold of node group is α' and its overload threshold is β’. All the overload node groups are lined in an overload queue,and all the light-load node groups are lined in a light-load queue.

    Step 2. The task scheduler counts up the classified data coming from data storage nodes,and assigns each dataset to a node group by protocols.

    Step 3. Set a light dataset threshold δ, which is considered to have less impact on the load of node group even if the node group is overload. Assuming a node group is assigned data of size GDB, if GDB≤δ, then it will be removed from the overload queue.

    Step 4. Suppose two queues are all not empty. From the first node group A in the lightload queue, node i is searched, who has completed detection tasks and has lighter load,and its CAP(i) is not the largest in the group. Node i is migrated to the first node group B in the overload queue, and the feature rules of IDS in the migrated node i are changed conforming to the new node group. Then, node groups A and B are removed from two queues, respectively.

    Step 5. If the light-load queue is empty and the overload queue is not empty, then the assigned data of all node groups in the overload queue are split out such that half data will be processed in the current round and the remaining will be processed in the next round. Then all node groups are removed from the overload queue.

    5 Experimental result analysis

    5.1 Experiment environment

    Based on Hadoop, a prototype of DIDS-NPBA model is implemented with Java. Nodes running above function are deployed in campus network. For instance, sensors are distributed in different subnet and near switches. The system monitor unit uses open source tool Sigar to collect run-time information of each detection node. DAS-CL strategy and data partitioning are implemented and embedded in task scheduler in control center. The alarm response unit is used to count alarm results. In order to ensure the consistency and validity of data detection, all detection nodes equip with Snort system after detection nodes are grouped, feature rules in each detection node are configured to conform to protocols of its node group. In Hadoop cluster, control center plays as a Master node, which communicates with the slave nodes including data storage nodes and detection nodes using MapReduce.

    In this section, we test the DIDS-NPBA model in the above environment in terms of load balancing, detection time and detection rate, and compare with two data allocation methods, that is, consistency hash algorithm [Karger, Lehman, Leighton et al. (1997)]and Rosas algorithm [Rosas, Sikora and Jorba (2014)].

    The parameters in DIDS-NPBA model are set as follows:

    (1) In formula (1) and (3), the computing power plays a major role in data detection, thus a1, b1are set to 0.6, a2, b2are set to 0.3, and a3, b3are 0.1.

    (2) In formula (4), according to the empirical data, the rated output of nodes is about 0.7~0.8, and referring to the experimental data of node load, α and β are set to 0.23 and 0.77, respectively.

    (3) In Section 4.4, α' and β' are set to 0.3 and 0.7, respectively, which are different from α and β, since the average load of a node group can be impacted by more factors. And δ is set to 200 MB.

    (4) The detection nodes count up to 20 heterogeneous nodes, whose capacities are computed as in Tab. 1.

    5.2 Data preprocessing and grouping for detection nodes

    We use DARPA2000 data set to conduct testing in this paper. Since the DARPA2000 data set is small, the data in inside, outside and DMZ environments from different dates are extended to 3 GB to simulate data acquisition in high-speed network. The extended 3 GB data set is reassembled and processed in sensors, and each session is stored in a file named after its hash value.

    Through analyzing the above 3 GB data set, the total number of attacks is 15659.Moreover, the data components are as follows: The http protocol data is 1782 MB, the ftp data is 233 MB, and the telnet data is 522 MB. The rest 463 MB data are classified as

    mixed data. Thus, the total data set is divided into four categories, that is, HTTP, FTP,TELNET, and mixed data.

    Accordingly, detection nodes are also divided into four node groups. The feature rules of Snort in each node are configured according to its group, except the mixed node group is with all original feature rules of Snort.

    Initially, detection nodes are grouped as follows. HTTP node group is assigned 10 nodes(S1~S10), FTP node group has 2 nodes (S11~S12), TELNET node group has 4 nodes(S13~S16), and the mixed node group contains the resting 4 nodes (S17~S20). The capacity of nodes is shown in Tab. 1.

    5.3 Validity test and analysis for the DIDS-NPBA model

    In this section, the load balancing, detection time and detection rate of DIDS-NPBA model are investigated. The results are compared with that of consistency hash [Karger,Lehman, Leighton et al. (1997)] and Rosas et al. [Rosas, Sikora and Jorba (2014)]algorithm, which are listed in Tab. 1.

    Table 1: The results of data allocation and detection with different methods

    In Tab. 1, nodes are listed by grouping in turn, and each group has different background color. CAP represents node capacity, L is node load, CF is the node capacity factor, Data size is the partitioned and assigned data to each node, Detection time is the time spent by each node to detect the assigned data, and Alarm number is the attack number detected by each node.

    (1) Result analysis for load balancing experiments

    In parallel computing, the data assigned to each node in cluster should be proportionate to node performance [Soklic (2002)] to maximize resource utilization.

    In Tab. 1, it can be seen that the difference of capacity (CAP) among nodes is great,whereas the load (L) among nodes are close. This can be evaluated by the standard deviation (SD). SD of CAP and L of 20 nodes are 335 and 0.076, respectively. In Tab. 1,SD of the data assigned to each node group by DIDS-NPBA, hash and Rosas, are computed. For HTTP, FTP, TELNET and mixed node group, there are 29.2, 30.4, 31,23.4 in DIDS-NPBA, 6.3, 9.2, 9.9, 8.4 in hash, and 31.6, 20.5, 27.9, 24.9 in Rosas.

    The above results show that, the capacity difference of nodes is great, whereas the difference of the data assigned to each node is small in consistency hash, which means that a node with weak capacity has to deal with the same data set like a strong node. In fact, the consistency hash partitions data without considering node capacity and load.Rosas algorithm adjusts the allocated data amount dynamically by the computing time that the node dealt with the allocated data, which matches the performance of nodes. For DIDS-NPBA, it can be seen that the data assigned to each node is proportionate to its capacity and load, which improves resource utilization and throughput of system, and the load balance of cluster system can also be maintained well.

    (2) Analysis of experimental results for detection time

    In Tab. 1, SD of detection time for DIDS-NPBA, Hash and Rosas, are 0.72, 1.19, 0.75,respectively. The results show that the difference of detection time spent by each node in DIDS-NPBA is smallest and its parallelism is the best. Consistency hash requires the longest detection time (12.3 s) for a single detection node due to imbalance data allocation, thus the parallelism is worst. Due to the balanced data allocation, the parallelism of Rosas is roughly the same to DIDS-NPBA. Note that the sum of detection time spent in DIDS-NPBA is the least, which shows that the system performance is improved.

    (3) Analysis of experimental results for detection rate

    DR is defined as the ratio between number D of the detected intrusion behaviors and number T of all intrusion behaviors, that is, DR=D/T.

    It is shown in Tab. 1, DR of the hash is the lowest, i.e. 89%, which mainly lies in that the data integrity is damaged heavily when data is partitioned by mapping relationship between packets and virtual nodes. DR of the Rosas and DIDS-NPBA are near to 99%,because the data integrity is protected by TCP session assembly and balanced data allocation. Moreover, the original data that have not to be assembled based on TCP session, DR of the Rosas and DIDS-NPBA are near to 93%.

    5.4 Experimental test for the dynamic load balancing adjustment among node groups

    To evaluate the efficiency of our proposed algorithms, we construct experiments on five datasets, where each date set is about 3 GB as in Section 5.2. The components of five data sets are as follows: The first data set is same as that used in Section 5.2, and other four data sets are http data of 1382 MB, ftp data of 633 MB, telnet data of 522 MB, and the mixed data of 522 MB, respectively, with the total alarm 15590.

    In the experiments, the 3 GB data set is allocated and detected by 20 nodes in parallel based on the DIDS-NPBA model, and the average detection time is about 10 seconds.Thus, the processing of a data set including partition, allocation and detect data is 10 seconds. Note that 20 detection nodes are still used, and the initial group and experimental results for the first data set are shown in Tab. 1. The experimental results for the other four data sets are summarized in Tab. 2, where the titles, L, Data, Time and Alarm, have same meaning as in Tab. 1.Compared the second data set with the first one, it is easy to see that http data are decreased, whereas ftp data are increased. After the second data set has been split and allocated, the nodes in ftp node group were assigned with more data than the first time.As shown in Tab. 2, node S12 is overloaded at 0.87, and ftp node group is also overloaded at 0.79. However, the load of nodes in http node group is decreased, and the http node group has light load at 0.26. According to the dynamic load adjustment strategy,node S2 in http node group is migrated to ftp node group. Then, in ftp node group, node

    Table 2: The experimental results of the dynamic load balancing adjustment strategy

    S2 and S11 are assigned data for the third and fourth data sets, but node S12 is ignored since it has been overloaded. When the fifth data set is processed, node S12 is monitored.It is assigned data according to its capacity and load, in this way to return to normal. And the load of all nodes is also monitored after the fifth data set has been processed as shown at the most right column in Tab. 2.

    With network data sharply changes, some problems would inevitably occur for IDS, such as the imbalance of system load, and the system performance and detection rate are degraded. The global load imbalance due to the sharp change of data component can be overcome in time following the dynamic load adjustment strategy, and the data processing efficiency, load balance and detection rate of the system are relatively stable during the process of continuous operation.

    6 Conclusion

    In view of the issue that data processing speed of existing IDS cannot match the speed of network transmission and processing for massive data, a novel distributed intrusion detection model DIDS-NPBA is proposed. More precisely, feature rules are decreased by classification detection method. The data integrity can be protected by session reassembly and nondestructive partitioning based on session files. Furthermore, the load balance of system is achieved by the dynamic load adjustment strategy and DAS-CL strategy. The simulation results demonstrate that our model has favorable advantages in providing better load balance, reducing detection time, and raising detection rate and throughput.

    Acknowledgement:This article is supported in part by Guangxi Key Laboratory of Trusted Software of China (No. kx201622), Guangxi Key Laboratory of Cryptography and Information Security of China (No. GCIS201623, GCIS201705), Guangxi Key Lab of Wireless Wideband Communication and Signal Processing of China (No.GXKL061510, GXKL0614110), Guangxi Colleges and Universities Key Laboratory of cloud computing and complex systems of China (No. YF16205), and Innovation Project of Guangxi Graduate Education (No. YCSW2018138, 2017YJCX26).

    女警被强在线播放| 色综合婷婷激情| 日韩欧美精品免费久久 | 亚洲精品成人久久久久久| 不卡一级毛片| 全区人妻精品视频| 亚洲中文字幕日韩| 亚洲国产高清在线一区二区三| 亚洲av五月六月丁香网| 内射极品少妇av片p| 怎么达到女性高潮| 国产色婷婷99| 丁香六月欧美| 色综合婷婷激情| 国产亚洲精品一区二区www| 久久久久久久久中文| 日韩大尺度精品在线看网址| 精品人妻一区二区三区麻豆 | 日本a在线网址| 亚洲性夜色夜夜综合| 18禁黄网站禁片免费观看直播| 国产一区二区在线观看日韩 | 超碰av人人做人人爽久久 | 美女 人体艺术 gogo| 欧美xxxx黑人xx丫x性爽| 性色avwww在线观看| 久久久久国内视频| 亚洲国产精品成人综合色| 日韩av在线大香蕉| 一个人观看的视频www高清免费观看| 午夜亚洲福利在线播放| 日本免费a在线| 亚洲av第一区精品v没综合| 天天添夜夜摸| 亚洲国产精品合色在线| 久久精品国产综合久久久| 精品久久久久久久人妻蜜臀av| 高潮久久久久久久久久久不卡| xxx96com| 啦啦啦韩国在线观看视频| 免费人成在线观看视频色| a级一级毛片免费在线观看| 人人妻人人看人人澡| 亚洲中文日韩欧美视频| 日韩欧美在线乱码| 欧美日本视频| 一本综合久久免费| 少妇熟女aⅴ在线视频| 免费av不卡在线播放| 日本黄色视频三级网站网址| 欧美三级亚洲精品| 国产一区二区三区视频了| 国产午夜精品久久久久久一区二区三区 | 亚洲精华国产精华精| 十八禁人妻一区二区| 俺也久久电影网| 成人性生交大片免费视频hd| 亚洲人与动物交配视频| 夜夜夜夜夜久久久久| 亚洲精品456在线播放app | 男女午夜视频在线观看| 欧美+亚洲+日韩+国产| 波多野结衣高清无吗| 日韩精品青青久久久久久| 亚洲乱码一区二区免费版| 国产男靠女视频免费网站| 中文字幕人成人乱码亚洲影| 99久久精品热视频| 99在线人妻在线中文字幕| 午夜福利高清视频| 日本五十路高清| www日本黄色视频网| 国产精品久久久久久精品电影| 亚洲18禁久久av| 一二三四社区在线视频社区8| 九九热线精品视视频播放| 天天躁日日操中文字幕| 国产亚洲精品久久久com| 亚洲欧美激情综合另类| 国产麻豆成人av免费视频| 免费在线观看成人毛片| 夜夜夜夜夜久久久久| 黄色丝袜av网址大全| 成人一区二区视频在线观看| 欧美乱码精品一区二区三区| 欧美乱色亚洲激情| h日本视频在线播放| 老熟妇乱子伦视频在线观看| 99视频精品全部免费 在线| 嫩草影视91久久| 欧美在线黄色| 他把我摸到了高潮在线观看| 国产高清视频在线观看网站| 成年女人永久免费观看视频| 俄罗斯特黄特色一大片| 99久久无色码亚洲精品果冻| 久久久色成人| 女人被狂操c到高潮| 一本精品99久久精品77| 成人欧美大片| 香蕉久久夜色| 久久久久国产精品人妻aⅴ院| 三级男女做爰猛烈吃奶摸视频| 九九在线视频观看精品| 亚洲国产高清在线一区二区三| 97碰自拍视频| 亚洲欧美日韩无卡精品| 男女做爰动态图高潮gif福利片| АⅤ资源中文在线天堂| or卡值多少钱| 夜夜爽天天搞| 亚洲最大成人手机在线| 日韩有码中文字幕| 国产v大片淫在线免费观看| 久久久久久久亚洲中文字幕 | av视频在线观看入口| 久久久久久久精品吃奶| 给我免费播放毛片高清在线观看| 国产v大片淫在线免费观看| 丁香六月欧美| 国产乱人伦免费视频| 欧美又色又爽又黄视频| 日本 av在线| 久久精品影院6| 日本免费a在线| 男人和女人高潮做爰伦理| 精品电影一区二区在线| 熟女电影av网| 人人妻,人人澡人人爽秒播| 精品久久久久久,| 在线观看一区二区三区| 亚洲精品色激情综合| 乱人视频在线观看| 欧美激情在线99| 午夜免费激情av| 亚洲成人久久爱视频| 久久久久精品国产欧美久久久| 亚洲av中文字字幕乱码综合| 黄色日韩在线| 在线天堂最新版资源| 国产亚洲精品久久久久久毛片| 亚洲,欧美精品.| 国产一区二区激情短视频| 一个人免费在线观看电影| 亚洲五月天丁香| 国内精品久久久久久久电影| 国产精品一区二区免费欧美| 亚洲无线观看免费| 国语自产精品视频在线第100页| 国产一区二区三区视频了| 精品久久久久久,| 宅男免费午夜| 免费看美女性在线毛片视频| a在线观看视频网站| 国产精品美女特级片免费视频播放器| 欧美一级毛片孕妇| 最近最新中文字幕大全电影3| netflix在线观看网站| 亚洲色图av天堂| 欧美日本亚洲视频在线播放| 美女免费视频网站| 99热只有精品国产| 欧美一区二区国产精品久久精品| 免费人成视频x8x8入口观看| 欧美日韩一级在线毛片| 国产v大片淫在线免费观看| 可以在线观看毛片的网站| 国产免费男女视频| 女同久久另类99精品国产91| 国产精品久久久久久亚洲av鲁大| 宅男免费午夜| 最近最新中文字幕大全免费视频| 亚洲国产色片| 日本在线视频免费播放| 午夜免费男女啪啪视频观看 | 亚洲成人免费电影在线观看| 成年免费大片在线观看| 成人av在线播放网站| 日韩国内少妇激情av| 午夜免费男女啪啪视频观看 | 国产一区二区三区视频了| av国产免费在线观看| 噜噜噜噜噜久久久久久91| 男人的好看免费观看在线视频| 美女高潮的动态| svipshipincom国产片| 国产熟女xx| 日本免费一区二区三区高清不卡| 午夜a级毛片| 欧美日韩乱码在线| 久久久久性生活片| 国产伦精品一区二区三区四那| 在线观看66精品国产| 亚洲精品一区av在线观看| 床上黄色一级片| 俺也久久电影网| www.熟女人妻精品国产| 欧美日韩瑟瑟在线播放| 大型黄色视频在线免费观看| 十八禁网站免费在线| 午夜老司机福利剧场| 亚洲欧美精品综合久久99| 国产成人a区在线观看| 精品不卡国产一区二区三区| 精品久久久久久,| 九九热线精品视视频播放| 精品一区二区三区视频在线 | 欧美av亚洲av综合av国产av| 久久精品综合一区二区三区| 国产亚洲av嫩草精品影院| 中文字幕人妻熟人妻熟丝袜美 | 丝袜美腿在线中文| 女人被狂操c到高潮| 香蕉久久夜色| 女人高潮潮喷娇喘18禁视频| 久久久久久久午夜电影| 欧美乱妇无乱码| 久久人妻av系列| 99久久九九国产精品国产免费| 青草久久国产| 久久久久国内视频| 中出人妻视频一区二区| 国产av麻豆久久久久久久| 精品福利观看| 少妇人妻一区二区三区视频| 色综合站精品国产| 男人和女人高潮做爰伦理| 亚洲天堂国产精品一区在线| 国产乱人伦免费视频| 美女免费视频网站| 在线观看美女被高潮喷水网站 | 国产精品,欧美在线| 美女cb高潮喷水在线观看| 国产成人啪精品午夜网站| 好看av亚洲va欧美ⅴa在| 亚洲欧美日韩无卡精品| 色综合站精品国产| 在线观看免费午夜福利视频| 国产欧美日韩精品一区二区| 精品国产超薄肉色丝袜足j| 欧美午夜高清在线| 两个人视频免费观看高清| 中出人妻视频一区二区| 欧美日韩国产亚洲二区| 久久欧美精品欧美久久欧美| 丰满乱子伦码专区| 欧美日韩福利视频一区二区| 欧美大码av| 黄色日韩在线| 少妇人妻一区二区三区视频| 欧美性猛交黑人性爽| 别揉我奶头~嗯~啊~动态视频| 亚洲不卡免费看| 天天一区二区日本电影三级| 久久国产乱子伦精品免费另类| 欧美日韩中文字幕国产精品一区二区三区| 成年人黄色毛片网站| 在线播放国产精品三级| 国产精品98久久久久久宅男小说| 91av网一区二区| 免费观看人在逋| 亚洲成a人片在线一区二区| 亚洲午夜理论影院| 国产亚洲精品久久久久久毛片| 婷婷六月久久综合丁香| 国产黄色小视频在线观看| 美女 人体艺术 gogo| 免费观看精品视频网站| 日本成人三级电影网站| 亚洲美女视频黄频| 日韩欧美精品免费久久 | 亚洲第一欧美日韩一区二区三区| 欧美激情久久久久久爽电影| 啦啦啦免费观看视频1| 超碰av人人做人人爽久久 | 老司机深夜福利视频在线观看| 国产不卡一卡二| 日韩欧美免费精品| 欧美黄色淫秽网站| 国语自产精品视频在线第100页| 草草在线视频免费看| 高清毛片免费观看视频网站| 亚洲天堂国产精品一区在线| 每晚都被弄得嗷嗷叫到高潮| 久久精品影院6| 日韩有码中文字幕| 久久久久久久久中文| 国产av在哪里看| 麻豆国产97在线/欧美| 欧美日韩一级在线毛片| 午夜精品一区二区三区免费看| 欧美日韩黄片免| 有码 亚洲区| 午夜激情福利司机影院| 欧美+日韩+精品| 18禁黄网站禁片免费观看直播| 美女cb高潮喷水在线观看| 国产av麻豆久久久久久久| 欧美av亚洲av综合av国产av| 丝袜美腿在线中文| 在线播放国产精品三级| 精品一区二区三区视频在线观看免费| 亚洲熟妇中文字幕五十中出| 老司机午夜十八禁免费视频| 精品福利观看| 一二三四社区在线视频社区8| av片东京热男人的天堂| 两性午夜刺激爽爽歪歪视频在线观看| 国产一区在线观看成人免费| 欧美成人a在线观看| 成人欧美大片| 亚洲精品在线观看二区| 欧美zozozo另类| 欧美大码av| 国产高清视频在线播放一区| 少妇裸体淫交视频免费看高清| 亚洲国产精品久久男人天堂| 国产亚洲精品久久久久久毛片| 亚洲精品色激情综合| 午夜激情福利司机影院| 熟妇人妻久久中文字幕3abv| 国产精品香港三级国产av潘金莲| 亚洲aⅴ乱码一区二区在线播放| 99热这里只有精品一区| 国产高清视频在线播放一区| 天天添夜夜摸| 日本在线视频免费播放| 国产精品久久久久久久电影 | 怎么达到女性高潮| 最好的美女福利视频网| 久久6这里有精品| 最新美女视频免费是黄的| 伊人久久大香线蕉亚洲五| 国产黄色小视频在线观看| 国产av一区在线观看免费| 12—13女人毛片做爰片一| av视频在线观看入口| 两个人看的免费小视频| 身体一侧抽搐| 天美传媒精品一区二区| 精品人妻一区二区三区麻豆 | 激情在线观看视频在线高清| 国产成年人精品一区二区| 精品无人区乱码1区二区| 两性午夜刺激爽爽歪歪视频在线观看| 婷婷六月久久综合丁香| 精品一区二区三区视频在线 | 亚洲av第一区精品v没综合| 国内久久婷婷六月综合欲色啪| 99久久久亚洲精品蜜臀av| 欧美一区二区亚洲| 丰满人妻熟妇乱又伦精品不卡| 国内少妇人妻偷人精品xxx网站| 中文字幕熟女人妻在线| 免费看日本二区| 国产老妇女一区| 亚洲精品粉嫩美女一区| aaaaa片日本免费| 老熟妇乱子伦视频在线观看| 免费电影在线观看免费观看| 成人性生交大片免费视频hd| 欧美乱色亚洲激情| 国产免费av片在线观看野外av| 俺也久久电影网| 免费av观看视频| av国产免费在线观看| 在线观看午夜福利视频| 国产激情欧美一区二区| 精品人妻偷拍中文字幕| 亚洲欧美一区二区三区黑人| 欧美大码av| 亚洲专区中文字幕在线| av视频在线观看入口| 久久久精品大字幕| 欧美又色又爽又黄视频| 老鸭窝网址在线观看| 中文字幕久久专区| 女人高潮潮喷娇喘18禁视频| 国模一区二区三区四区视频| 一级毛片高清免费大全| www日本黄色视频网| 日本一二三区视频观看| 国产亚洲精品av在线| 色综合亚洲欧美另类图片| 少妇人妻精品综合一区二区 | 国产一区二区亚洲精品在线观看| 熟女少妇亚洲综合色aaa.| 国内精品美女久久久久久| 中文字幕熟女人妻在线| 欧美日韩亚洲国产一区二区在线观看| 精品国产超薄肉色丝袜足j| 久久久久久久午夜电影| 亚洲国产中文字幕在线视频| 日韩免费av在线播放| av视频在线观看入口| 精品国内亚洲2022精品成人| 999久久久精品免费观看国产| 俄罗斯特黄特色一大片| 国产高清videossex| 91字幕亚洲| 久久精品91无色码中文字幕| 精品久久久久久久人妻蜜臀av| 久久精品国产自在天天线| 麻豆国产av国片精品| 成年版毛片免费区| 成人特级av手机在线观看| 日韩欧美国产在线观看| 啦啦啦免费观看视频1| 99热6这里只有精品| 不卡一级毛片| 中国美女看黄片| 国产精品一区二区免费欧美| 2021天堂中文幕一二区在线观| 国模一区二区三区四区视频| 韩国av一区二区三区四区| 中文字幕人妻丝袜一区二区| 免费看日本二区| 成人国产一区最新在线观看| 性色avwww在线观看| 亚洲一区二区三区不卡视频| 国产黄a三级三级三级人| 欧美国产日韩亚洲一区| 国产精品影院久久| 日本一二三区视频观看| 国产成+人综合+亚洲专区| 中文字幕人妻丝袜一区二区| 欧美中文日本在线观看视频| 麻豆久久精品国产亚洲av| 国产黄色小视频在线观看| 国产激情欧美一区二区| 18禁国产床啪视频网站| 免费在线观看成人毛片| 国产精品久久久久久久电影 | 亚洲国产日韩欧美精品在线观看 | 丰满人妻熟妇乱又伦精品不卡| 人人妻,人人澡人人爽秒播| 久久性视频一级片| 一二三四社区在线视频社区8| 国产精品 国内视频| 国产激情欧美一区二区| 日韩 欧美 亚洲 中文字幕| 国产成人av教育| 精品国产亚洲在线| 少妇裸体淫交视频免费看高清| 久久人妻av系列| 丁香欧美五月| 午夜精品久久久久久毛片777| 国产精品98久久久久久宅男小说| 深爱激情五月婷婷| 国产精品电影一区二区三区| 国产高清激情床上av| 亚洲人成伊人成综合网2020| 两个人的视频大全免费| 欧美成人a在线观看| 又黄又粗又硬又大视频| 久久久久久久午夜电影| 国产综合懂色| 国产一区二区在线观看日韩 | 人人妻人人看人人澡| 99热只有精品国产| 熟女少妇亚洲综合色aaa.| 国产三级中文精品| 日本一二三区视频观看| 成人国产综合亚洲| 乱人视频在线观看| 真人做人爱边吃奶动态| 午夜免费观看网址| 狂野欧美激情性xxxx| 亚洲专区中文字幕在线| 18禁裸乳无遮挡免费网站照片| 日韩欧美在线乱码| 亚洲精品美女久久久久99蜜臀| 国产成人欧美在线观看| 精品电影一区二区在线| 午夜福利视频1000在线观看| 国内精品一区二区在线观看| 露出奶头的视频| 制服人妻中文乱码| 久久这里只有精品中国| 桃色一区二区三区在线观看| 91久久精品电影网| 精品久久久久久久末码| 国产亚洲精品一区二区www| 亚洲内射少妇av| 色噜噜av男人的天堂激情| 国产欧美日韩一区二区精品| 免费av不卡在线播放| 性色av乱码一区二区三区2| 啦啦啦观看免费观看视频高清| 99久久精品热视频| 欧美另类亚洲清纯唯美| 免费看a级黄色片| 女警被强在线播放| 国产99白浆流出| 日韩欧美精品免费久久 | 757午夜福利合集在线观看| 国产一区二区三区在线臀色熟女| 99久久成人亚洲精品观看| 男女下面进入的视频免费午夜| 国产69精品久久久久777片| 波多野结衣高清无吗| 熟女人妻精品中文字幕| 国产99白浆流出| 成人无遮挡网站| 国产毛片a区久久久久| 国产精品女同一区二区软件 | 琪琪午夜伦伦电影理论片6080| 最新美女视频免费是黄的| 九九久久精品国产亚洲av麻豆| www国产在线视频色| 国产男靠女视频免费网站| 少妇人妻精品综合一区二区 | 一本久久中文字幕| 免费av不卡在线播放| 51午夜福利影视在线观看| 在线国产一区二区在线| АⅤ资源中文在线天堂| 色尼玛亚洲综合影院| 91av网一区二区| 中文字幕精品亚洲无线码一区| 成年女人看的毛片在线观看| 69av精品久久久久久| 香蕉久久夜色| 成年女人永久免费观看视频| 欧美国产日韩亚洲一区| 国产三级在线视频| 国产精品美女特级片免费视频播放器| 亚洲中文字幕日韩| 免费搜索国产男女视频| 中文资源天堂在线| 长腿黑丝高跟| 两个人看的免费小视频| 亚洲美女视频黄频| 亚洲精品456在线播放app | 国产精品自产拍在线观看55亚洲| 中文字幕久久专区| 国产精品一及| 人妻久久中文字幕网| av中文乱码字幕在线| 热99re8久久精品国产| 亚洲一区二区三区色噜噜| 黄片大片在线免费观看| 麻豆成人av在线观看| 亚洲欧美日韩卡通动漫| 99久久99久久久精品蜜桃| 黄片小视频在线播放| 在线播放国产精品三级| 亚洲美女视频黄频| 丰满人妻熟妇乱又伦精品不卡| 最新中文字幕久久久久| www国产在线视频色| 国产男靠女视频免费网站| 午夜激情福利司机影院| 中文字幕av成人在线电影| 国产欧美日韩一区二区精品| 成人特级黄色片久久久久久久| 亚洲精华国产精华精| 老司机深夜福利视频在线观看| 露出奶头的视频| 亚洲av中文字字幕乱码综合| 99精品欧美一区二区三区四区| 亚洲不卡免费看| 国产精品香港三级国产av潘金莲| 国产v大片淫在线免费观看| 欧美bdsm另类| 高清在线国产一区| 亚洲美女视频黄频| 欧美成人免费av一区二区三区| 国产成人系列免费观看| 国产单亲对白刺激| 午夜福利18| 国产单亲对白刺激| 日韩成人在线观看一区二区三区| 午夜激情欧美在线| 国产三级中文精品| 久久久色成人| 午夜福利在线观看免费完整高清在 | 一进一出好大好爽视频| 国产 一区 欧美 日韩| 99热只有精品国产| 日韩大尺度精品在线看网址| 国产精品三级大全| 国产亚洲精品av在线| 嫩草影院精品99| 中文资源天堂在线| 51午夜福利影视在线观看| 老熟妇乱子伦视频在线观看| 亚洲精品影视一区二区三区av| 中文亚洲av片在线观看爽| 国产亚洲精品久久久com| 免费在线观看影片大全网站| 国产真实乱freesex| 91久久精品电影网| 欧美色欧美亚洲另类二区| 久久国产乱子伦精品免费另类| 波多野结衣高清作品| 国产高清视频在线观看网站| 久久午夜亚洲精品久久| 成人特级黄色片久久久久久久| 日本一二三区视频观看| 午夜福利高清视频| 美女 人体艺术 gogo| 91av网一区二区| 国内久久婷婷六月综合欲色啪| 久久久久久久久久黄片| 窝窝影院91人妻| 99国产综合亚洲精品| 久久精品国产亚洲av涩爱 | 欧美乱码精品一区二区三区| 丝袜美腿在线中文| 欧美三级亚洲精品| 久久九九热精品免费| 此物有八面人人有两片| 99久国产av精品| 一区福利在线观看|