• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Quantitative Security Metric Model for Security Controls: Secure Virtual Machine Migration Protocol as Target of Assessment

    2018-08-28 03:49:32TayyabaZebMuhammadYousafHumairaAfzalMuhammadRafiqMufti
    China Communications 2018年8期

    Tayyaba Zeb, Muhammad Yousaf, Humaira Afzal, Muhammad Rafiq Mufti*

    1 School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology, Islamabad, Pakistan

    2 Riphah Institute of Systems Engineering (RISE), Riphah International University, Islamabad, Pakistan

    3 Institute of Computing, Department of Computer Science, Bahauddin Zakariya University, Multan, Pakistan

    4 Department of Computer Sciences, COMSATS Institute of Information Technology, Vehari, Pakistan

    Abstract: Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the InfoSec Research Council’s hard problems list.Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time,with the maturity of the security industry,there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure (CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine (VM) migration protocol as the target of assessment. The virtualization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.

    Keywords: attack resiliency measure;cost-benefit measure; performance improvement factor; security assessment; formal verification, security controls; security metrics;virtual machine migration protocol

    I. INTRODUCTION

    Investments in thefield of information security have increased significantly since last decade,however, it has been a matter of concern that still there exists no way that exactly measures the performance of the security controls or mechanisms that are put to protect the information systems. A widely accepted principle states that if you cannot measure it then you cannot manage it. NIST IR 7564 “Directions in Security Metrics Research” provides the recommendations for designing the security metrics for measuring the performance of the information security mechanisms [1].

    A system is considered secure if no actual adversary can exploit it [2]. Generally, a system is made secure by deploying some security mechanisms that protect the system.Organizations in general and security designers often remain concerned about how much effective their security mechanisms are? Information security performance measurement is also gaining interest due to several regulatory requirements e.g. Government Performance and Results Act (GPRA) and Federal Information Security Management Act (FISMA)require measuring information security performance [3]. These factors are pushing security designers to develop metrics for assessing the security of the system. However, developing enterprise-level security metrics is a complex task and is listed as one of the hard problems in the Infosec Research Council’s Hard Problem List. So far, the efforts for developing enterprise level meaningful absolute security metrics have not been proved fruitful. However, some security metrics have been developed to measure the security of the specific attributes of the components of the security mechanisms [4].

    This paper presents a quantitative security metric model for measuring the performance of security controls. A security control is an arrangement that provides some security service. For example, encryption is a security control that provides the confidentiality service, digital signature is a security control that provides the authentication service, firewall is a security control that prevents unintended traffic from entering or exiting the network,and an antivirus tool is a security control that prevents malicious software to execute on the computer system. Sometimes the terminologies of the security controls and the security mechanisms are used interchangeably. This paper takes the security control as a set of one or more security mechanisms that collectively provides the desired security services. For example, networking security protocol TLS(Transport Layer Security) can be taken as a security control that uses the mechanisms of symmetric key encryption, digital certificates and secure hash functions for providing the services of confidentiality, authentication and integrity respectively.

    The approach presented in this paper has two dimensions. Initially, a security metric model is proposed which is used to devise three security metrics. These metrics have been named as i) attack resiliency measure, ii)performance improvement factor, and iii) cost/benefit measure. Although these measures are not new, how quantitatively measuring these metrics have been a challenging task. This paper quantitatively model and evaluate these metrics for the given security control. These metrics are generic in nature and can be used to measure security performance of different networking security protocol. A security protocol is a collection of one or more security controls intended for providing protection to the system. However, aggregation of multiple security controls in the name of security may result in the inherently less secure system,therefore, measuring the extent to which security controls are meeting their security objectives is a crucial factor. The proposed metrics provide efficiency of security controls in term of their resilience against several attempted attacks. Secondly, the absence of proper performance improvement metrics makes it hard to compare multiple security alternatives.The performance improvement metric provides the measure of the effectiveness of new security controls by comparing their current performance and previous performance of old security controls thus providing acomparative measure that whether the proposed security controls have increased/decreased the security performance or indicate if they had put no effect on the security performance of the security subsystem. Moreover, the cost-benefit measure (CBM) helps to identify that what cost is incurred for implementing the security control. These three metrics have been evaluated against two adversary models i.e. Dolev-Yao (DY) Attack Model and Key Compromise Impersonation (KCI) Attack model [5] [6].

    The second dimension of this paper elaborates the target of assessment for proposed security metric model. The security protocol taken as the target of assessment for the proposed security metric model is secure VM migration protocol [7]. Area of Virtual Machine (VM)migration has captured wide scale attention.The process includes the complete transfer of operating system and applications running on one physical machine to another physical machine. Many of the hypervisors that support this process do not include a comprehensive solution for securing this process [8] [9]. As VM migration involves sending critical infrastructural information over the network,therefore, VM migration involves many security challenges. For example, unencrypted traffic may result in exposing machine states,secret keys and passphrases [9]. In literature,a few protocols have been devised for secure VM migration, however, it still lacks any standardization. In this regard, we have designed a lightweight protocol for secure VM migration and performed its performance modeling in our previous work [7]. This paper first proposes a quantitative security metric model and then evaluates this model using a secure VM migration protocol. In literature, majority of the work either performed the performance measurements of VM migration or identified the security problems and devised their solutions to handle those security problems. To the best of our knowledge, no work has been done on evaluation of the effectiveness of the security controls for the secure VM migration protocols.

    Rest of the paper is structured as follows:Section 2 discusses the related work and their limitations. Section 3 discusses the need for security metrics. Section 4 presents the proposed relative security metric model. Section 5 describes the formal verification setup used to obtain the measurements for security metrics and section 6 discusses the results acquired from this setup. Finally, section 7 concludes the paper.

    II. RELATED WORK

    This section explores the work done in two dimensions. One is the area of developing quantitative security metrics in general and the other is the quantitative security assessment of secure virtual machine migration protocols.

    2.1 Quantitative security metrics for security evaluation

    Developing security metrics for the evaluation of security subsystems is an emerging domain and research community is putting emphasis on it. In literature, work has been done on qualitative metrics [10], however, they tend to be less precise as they only assign a ranking of bad, good or average to the system which can be misleading sometimes [11]. A lot of emphases has been put by standards and regulatory bodies to develop quantitative security metrics for the measurement of the security performance of security subsystems. For example,NIST Direction in Security Metrics Research[1] [3] recommends devising quantitative security metrics for measuring the efficiency and effectiveness of security controls.

    Several approaches are proposed for measuring the security in thefield of network security [12], application security [13], control systems [14] and code safety inspection [15][16] using quantitative metrics. However, to the best of our knowledge, so far no metrics are devised that quantitatively measure the security performance of the security protocols and specifically secure VM migration protocols. A well-understood classification, taxonomy, and nomenclature are presented in the literature for security metrics [17] [18] such as technical vs. management level metrics,component vs. enterprise level, efficiency and effectiveness metrics. For example, Vaughn et al. [17] provided a classification of different information assurance and security metrics.Metrics that measure that how much a technical security control (referred as Technical Target of Assessment) is capable of detection,protection and response to attacks are termed as TTOA metrics. Authors further categorized TTOA metrics into metrics for strength assessment and metrics for weakness assessment.The former metrics consider two scenarios where security is assessed with and without the presence of an adversary.

    Regarding the formulation of security metrics for network security, M. S. Ahmed et al. [12] made use of three measures such as existing vulnerabilities measure, historic vulnerabilities from National Vulnerability Database (NVD) and probabilistic vulnerability measure to evaluate the network security.An attack-propagation metric is devised using vulnerabilities measure to assess that how an attacker can cause an attack to propagate through the network by exploiting services vulnerabilities. However, the approach assigns a protection level of one to firewalls and between 0-1 to IDS (Intrusion Detection System)qualitatively as opposed to claimed quantitative metrics.

    Lemay et al. [19] provided a model-based approach for the generation of security metrics. The approach takes adversary information, system information and desired security metrics as input. The proposed model assumes that a system is already aware of types of adversaries and their capabilities. Moreover, H.Wang et al. [13] has proposed security metrics for software systems. The measures for formulated metrics are taken from CVE (Common vulnerability Exposures) and CVSS (Common Vulnerability Score System). The results are taken against three different web browser applications. The author concluded that more the number of vulnerabilities, a software application has the lesser security it provides.Similarly, Wayne Boyer et al. [14] presented technical security metrics for control systems using ideal based approach.

    Although most the work regarding security metrics emphasized on defining quantitative security metrics, however, comparatively little work is done on formulating the security metrics, performing experimentation and relating the outcomes with the objectives of the security metrics. The contribution of this paper is that it formulates the security metrics of attack resiliency measure for measuring the efficiency of the security control, performance improvement factor for measuring the effectiveness of new security controls and cost/benefit measure of security control.

    2.2 Existing security metrics for secure vm migration protocols

    This paper takes the secure VM migration protocol as the technical target of assessment(TTOA).In literature, a few approaches are proposed for secure VM migration but only performance evaluations have been performed in terms of migration delay, response time,downtime, etc. No work has been done on measuring the security performance of security controls adopted for secure VM migration.For example, William et al. [20] evaluated the cost of virtual machine migration in the cloud.A cost-benefit analysis using cloud computing along with the local datacenter is performed in [21]. Authors performed the assessment of performance gain of using cloud infrastructure by considering many of parameters including Job Slowdown time, Average Weighted Response Time, Average Number of Virtual Machines required by a task, Number of deadline violations, Performance Cost, etc.

    Fig. 1. Security controls, effectiveness, and relationship with business objectives.

    Similarly, the parameter of performance degradation during cold virtual machine migration for CPU and memory intensive applications was evaluated in [22]. Authors studied the effect of migrating multiple virtual ma-chines at the same time. Performance parameters of downtime and total migration delay for live migration was quantitatively measured in[23]. Application downtime during virtual machine migrations over WAN with 1Gbps dedicated link was evaluated in [24]. Also, application slowdown time and downtime for live migrations within datacenterwere quantitatively measured in [20]. Authors considered the application response time during the migration process for measuring the performance. Virtual machine migration delay with respect to increasing bandwidth and propagation delay over WAN link is modeled in [7]. Authors also modeled the initial response time of migration protocol with respect to several handshake messages over WAN and compared the initial response time of proposed protocol with IPsec Internet Key Exchange (IKEv2) and Transport Layer Security (TLSv1.2).

    A set of interfaces has been defined in [30]for the secure migration of virtual machines.Two computing nodes use public key cryptographic techniques to establish a secure session and then symmetric key cryptographic techniques are used to encrypt the virtual machine data. A descriptive analysis of the secure virtual machine migration on the basis of X.509 was presented in [31]. Different issues of live virtual machine migration have been presented in [32, 33, and 35]. In [32], authors also attempted to model the migration delay,service disruption time and the number of memory pages transferred. Also, authors presented some security requirements for the VM migration; however, security effectiveness has not been modelled. Similarly, in [35], authors modelled and evaluated the migration time and the throughput at the source node the migrating machine. In [36], the authors introduced a new metric called the eviction time which is used to model the migration delay of the VMs.The eviction time is still a performance metric and not the security metric.

    These studies emphasized on the performance metrics of the virtual machine migration process and evaluation of security metrics for the migration process is largely neglected.This paper bridges this gap by presenting the security metrics and performs experimentation for assigning the quantitative values to the proposed security metrics.

    III. SECURITY METRICS

    This section briefly describes the basic concepts related to the security metrics, their requirements, benefits and fundamental types.It also describes that why absolute security metrics are hard to develop and why this paper proposes the relative security metric model.

    3.1 Requirement of security metrics

    With the significantly increased rate of security breaches, organizations in general and security designers often remain concerned about how much their system is secure. Information security performance measurement is also gaining attention due to several regulatory requirements e.g. Government Performance and Results Act (GPRA) and Federal Information Security Management Act (FISMA) require measuring information security performance[3]. Potential benefits of using security metrics are i) increased accountability, ii) fulfillment of compliance requirements, iii) improved the effectiveness of security subsystem, iv) quantitative values for resource allocation decision making, etc. These factors are pushing security designers to develop metrics for assessing the security of the system. However, developing enterprise-level security metrics is a complex process and meaningful security measures for this level could not get maturity. However,some security metrics have been defined to measure the security of the specific attributes of security subsystem [4].

    Information security measures help to monitor the accomplishment of goals and objectives by quantifying the implementation,efficiency and performance improvement of security controls and identify possible improvements. Figure 1 shows the relationship of security metrics with business objectives.Security metrics are defined for the security evaluation of the security controls. These eval-uations help to determine the effectiveness of security controls and justify the investment in the security controls. Security controls are the safeguards to business operations. If there are attackers out there that may or have been attacking the business assets, then there arises the need to invest in the security controls so that the business operations may proceed smoothly. Measuring effectiveness of the security controls contributes towards determining the Return on Investment in the security controls.

    3.2 Measurements and metrics

    Measurement is referred to the process of data collection, analysis and reporting [3]. Information security measures must yield quantifiable information for comparison purposes.Although absolute metrics are often useful and desirable, however, in practice, relative measures such as percentages or averages are effective and achievable [3].

    Measurements provide a single point in time view of specific factors. An example of measurement is a number of high severity vulnerabilities detected on a server by some vulnerability scanning process [25]. Metrics are derived by comparing to a predetermined baseline of two or more measurements taken over time. An example of metric is the change in a number of high severity vulnerabilities detected on a server this year as compared to the previous year’s value [25]. Therefore, metrics is a term used to denote a measure based on a reference and involves, at least, two points:the measure and the reference. Security metrics should tell us about the state or degree of safety relative to a reference point [26].

    Effective metrics are often referred to as SMART, i.e. specific, measurable, attainable,repeatable, and time-dependent. Metrics should also indicate the degree to which security goals are being met and should drive possible actions taken to improve the security program [25]. Security metrics can be obtained at different levels within an organization [18] i.e.i) Business Level Security Metrics, ii) Information Security Management Level Metrics,and iii) Systems and Services Level Security Metrics.

    Security metrics can be quantitative or qualitative, absolute or relative, and direct or indirect in nature [17] [18]. Qualitative metrics are based on the quality of some attribute of the system. Quantitative metrics are the results that can be presented as numbers. Absolute metrics use numeric values to represent the value of the measure in an absolute sense. Information security domain is full of many unknown quantities. As unknown quantities cannot be measured deterministically, therefore,it is hard to develop absolute security metrics[2]. Making comparisons of different attributes of a system is a basic process for deriving relative metrics [27]. Relative metrics are normally represented in terms of percentages or comparisons. Direct metrics are based on the values that can be measured independent of the other parameters of the system. Indirect metrics are based on the values that cannot be measured directly. They depend on the values of other parameters.

    3.3 System and security subsystem

    Let a system ‘S’ having some security subsystem ‘C’. If we change or enhance the security subsystem to mitigate some weakness or to provide some new security services, then the changed security subsystem is presented by C’≠C. As C or C’ are an integral part of the system S so, with changed C’ the system in the new state will be termed as S’≠S. S’ is considered a completely new system with a new set of weaknesses. When we apply some security control C it mitigates some weaknesses. However, there would still be some weaknesses that may not have been mitigated by the control C [2]. From the point of view of some viewer, some of the weaknesses will be known to the viewer and some will be left unknown to the viewer. Examples of these viewers range from the system owner to the adversary.

    Fig. 2. Categories of weaknesses.

    A realistic adversary is often modeled by considering its knowledge and resources with some realistic bound [2]. Set of exploitable weaknesses by an adversary is the intersection of the set of weaknesses known to that adversary and the set of unmitigated weaknesses as shown in figure 2. Weaknesses that are either unknown or mitigated are often of least concern. The fundamental goal of the security program is to reduce the set of exploitable weakness to zero. In absolute terms, this security goal is not achievable, because we don’t know the number of adversaries and their capabilities [2]. Therefore, this paper proposes a relative security metric model that can be used to quantitatively assess the relative attack resiliency, performance improvement and cost/benefit measure of the security subsystem.

    IV. PROPOSED RELATIVE SECURITY METRIC MODEL

    This paper presents a relative security metric model that is used to derive and formulate three security metrics i.e. i) Attack Resiliency Measure, ii) Performance Improvement Factor, and iii) Cost/Benefit Measure.

    Fig. 3. Model for measuring attack resiliency measure and performance improvement factor of security controls.

    4.1 security metric model

    Proposed model depicted in figure 3, gives the relative security metric of attack resilience of the security subsystem against the attempted attacks. In order to state that how much system B is secure; we cannot give any absolute value. However, using the proposed model,relative security measure can be obtained to state that how much system B is secure as compared to the system A. To compare two systems, following conditions must be true:

    ? Two systems in comparison are of the same type

    ? Attack instrument is same

    ? Context is same

    More often system A and B represent two different states of the same system i.e. system A may represent the previous state of the system with old security controls and system B may represent the new state of the same system with improved security controls and potentially may be less number of successful attacks.

    Attack instrument is an instrument that is used to test the security strength of the security subsystem. Attack instrument does not enhance the security of the system rather; it is used to test and measure the resilience and performance improvement of the security control against attempted attacks. Different attack instruments can be used at different stages of the life cycle of the security controls i.e. at the design stage, the implementation stage, and the deployment stage. Attack instruments used at the design stage and the implementation stage represent the lab testing. An example of attack instrument that can be used at the design stage is formal adversary models and the example of the attack instrument that can be used at implementation stage is penetration-testing tools. Attack instruments used at the deployment stage represent thefield testing with some real-life adversaries.

    4.2 Attack resiliency metric (ARM)

    Attack Resiliency Metric measures the resilience or efficiency of the security control against the launched attacks. Efficiency generally describes the extent to which a factor is well used for the intended purpose. Let thenumber of all attempted attacks is the sum of the number of attacks blocked by the security subsystem and number of attacks successfully bypassing the security subsystem. Then attack resiliency measure of the security subsystem is the ratio of the number of blocked attacks by the number of all attempted attacks.

    For number of attempted attacks > 0, following formula is used for calculating the attack resiliency measure of the security control:

    Here, the impact of all successful attacks is taken as equal. However, the impact of different security attacks is not always equal.In most cases, it cannot be measured in an absolute sense. They are normally ranked with respect to their severity level i.e. low, medium, high. There is no consensus on how many numbers of low-impact attacks are equal to a medium or high impact attack. If such equivalence would have existed then a weighted average ARM formula would have been more appropriate and realistic.

    As the total number of attempted attacks is relatively harder to calculate directly, therefore, it is estimated by the sum of the number of blocked attacks and number of successful attacks. Many of blocked attacks can be estimated from the alerts generated by the security subsystem such asfirewall, IDS, and antivirus programs. Similarly, many of attacks successfully bypassing the security controls can be estimated from the sum of anomalies detected by the systems, reported by the users and sometimes claimed by the attackers.

    4.3 Performance improvement factor (PIF)

    Performance Improvement Factor helps to quantitatively measure the improvement in the performance of new security control as compared to the old security control. Performance improvement factor allows comparing alternative security solutions by taking their efficiencies in terms of attack resiliency as input thus aids in decision making for the adoption of security control. The metric is calculated as:

    Here, ARMnew= Attack Resiliency Measure of security subsystem with new security control in place, and ARMold= Attack Resiliency Measure of the security subsystem with existing security controls.

    In the case when ARMold=100%, there is no need of investing in new security controls.Similarly, when ARMold=0, then above mentioned PIF formula will produce infinite value. Therefore, for the calculation of PIF,following bound should exist:

    with these ranges, performance improvement factor can be expressed as follows:

    4.4 Cost/benefit measure (CBM)

    Cost/benefit measure indicates that how much cost is incurred for providing the security service. Here, the cost can be taken in general e.g. cost of implementation, local resource utilization in terms of computation and memory, network resource utilization in terms of transmission overhead of extra messages for authentication and key exchange, etc. In this work, we considered only the local resource utilization cost that we modelled as the number of encryptions used to implement the security control. In our case, the security control does not significantly add additional network utilization therefore we took its value as negligible. Similarly, the benefit is taken as the efficiency with which a security control blocks the attempted attacks. In this sense,cost/benefit measure is the ratio of number of encryptions used by the security control to the attack resiliency measure of the security control against particular attack instrument. Although resource utilization cost of symmetric and public key encryption is different and also depends very much on the implementation,however, for the sake of simplicity, we took symmetric encryptions, public key encryptions and cryptographic hashes with equal weights.

    As shown in table 1, ARM, PIF and CBM are Quantitative, Relative and Indirect measures in nature. Quantitative in terms that we calculate these metrics and assign numeric values to them. All three metrics are relative because they do not provide absolute sense. As we don’t have complete knowledge of weaknesses and number of adversaries and their capabilities, therefore, absolute security metric cannot be measured. ARM depends on upon the number of attacks attempted which can be computed only from the known and available attack instruments that is the incomplete set.PIF is relative because it is a kind of ratio of two ARM values. Similarly, CBM is relative because it is the ratio of cost to the efficiency measure. All three metrics are indirect. ARM is derived from the ratio of the blocked attacks to the number of all the attempted attacks and PIF is derived from the ARM values.

    Table I. Summary of nature of metrics used in the proposed security metric model.

    V. EXPERIEMTNAL SETUP

    For the evaluation of the metrics presented in this paper, the proposed relative security metric model needs two components. One is the security subsystem as Target of Assessment(ToA) and other is the attack instrument. We took secure virtual machine migration protocol as the target of assessment and took a formal security verification tool as the attack instrument.

    5.1 Secure virtual machine migration protocol as target of assessment

    We took a secure virtual machine migration protocol as the target of assessment [7]. Virtual machine migration is an important feature of the virtualized computing environments in which virtual machine running on one computing node can be physically migrated to some other computing node without disturbing the services on the migrated virtual machine. At one side virtual machine migration provides many advantages like load balancing and fault tolerance in the virtualized environments,however, at the other side it also poses some security risks [30, 34]. In literature many security mechanisms have been proposed to mitigate these security issues [31], however, none of these modelled and quantitatively measure the effectiveness or the overhead of these solutions. This paper attempts to model and measure the effectiveness and the overhead of the security solution of the secure virtual machine migration protocol. The protocol is taken and evaluated in three different states of security controls using security metrics. These states are termed as the i) migration protocol with no security control, ii) migration protocol with the initial level of security controls, and iii) migration protocol with improved security controls.

    5.1.1 With no security control

    Virtual machine migration protocol with no security control represents the protocol state when no security is provided to the virtual machine migration process. We used this state to identify the number of threats to which migration protocol is vulnerable. In this state,migration protocol exchanges two initial control messages of migration request message and the migration response message. After a positive response message, the virtual machine migration data is sent and in response to this,the recipient sends back the acknowledgment.This process continues until all the data is transmitted at the destination end.

    5.1.2 With initial security control

    We took the secure virtual machine migration protocol presented in [7] as the migration protocol with initial security controls. The proposed secure VM migration protocol provides the security services of mutual authentication of two cloud domains, confidentiality of the VM data, the integrity of VM data, non-repudiation and identity protection. The content of the messages exchanged is given in table 2.We call it the VM migration protocol with initial security control because, during designed protocol analysis and formal verification, we found few unintended logical errors in protocol flow that may possibly result in many of security attacks. This methodology is generic and can be applied on any VM migration protocol proposed in the literature.

    Table II. Message contents of secure VM migration protocol as initial security control.

    where

    and B

    Table III. Message contents of secure VM migration protocol as improved security control.

    5.1.3 With improved security control

    The protocol vulnerabilities in the initial security controls state were mitigated by the modification of the protocol design. We call this modified security VM migration protocol as improved security protocol. These modifications include the addition of the service of the freshness of VM data, enforcement of order/symmetry of the messages exchanged and signature in the data and acknowledgment messages as shown in table 3. The lacking of these attributes or parameters was resulting in the introduction of new vulnerabilities in the protocol design which could be exploited by an attacker in future to launch some attack.

    5.2 Attack models

    We used the formal security verification tool scyther-w32-compromise-0.9.2 [28] as the attack instrument. Scyther is used for the automatic security verification of the network security protocols [38]. Three version of the secure VM migration protocol were modeled in scyther using SPDL (Security Protocol Description Language) and then two attack models i.e. DY attack model and KCI attack model are applied to the protocol. These attack models served as the attack instruments used to measure the values of the proposed security metrics.5.2.1 DY attack model

    Fig. 4. Number of attacks using DY and KCI attack models with different security controls.

    The first attack model used as attack instrument is Dolev-Yao model [5, 37]. This is a formal model to verify the properties of cryptography based security protocols. This model has two basic assumptions: i) network is under the control of attacker i.e. attacker can learn,intercept or spoof messages into the network,ii) second assumption which was later called as ‘Perfect Cryptography Assumption’ states that an intruder is only limited by the constraints imposed through use of cryptographic scheme and cannot decrypt any messages unless he has the decryption keys. In this model,conspiring agents or malicious insider/agent are those entities which conspire with the intruder and may provide him with some secret internal information. These abstractions are close to real time environment thus applying this attack model aids infinding out logical errors in protocol construction along with identification of various attacks that may possibly be launched.

    5.2.2 KCi attack model

    The second attack model is KCI (Key Compromise Impersonation) attack model. It is reasonably advanced and strong adversary model than DY attack model. It is stated as strong adversary model because it captures the resilience against key compromise impersonation attacks and provides the scenario where an adversary can reveal session keys, random numbers and long-term secret keys of participating nodes.KCI revolves around the property called Actor Key Compromise (AKC) which states that if an attacker compromises an entity A’s secret key due to whatsoever reason, A should still be able to securely communicate with other nodes depending upon the protocol used for communication [29] i.e. attacker must not be able to infer session key from the compromised long-term secret key. In the case of successfully launched KCI attack, an adversary with secret key knowledge of A can impersonate as A to some other node B [6].

    VI. RESULTS

    Figure 4 presents the number of successful at-tacks launched by two different attack instruments against different states of the security controls of the security subsystem. No control represents the state of the system when no security subsystem is available. Initial control represents the state of the system when initial level of security is applied to security subsystem. Improved control represents the state of the system when improvements are made to the security subsystem to thwart some specific attacks. We implemented the proposed secure virtual machine migration protocol in Scyther formal verification tool and used DY attack model and KCI attack model as sample attack instrument for our security metric model.Total twenty-two security claims are taken as reference. These security claims served as objectives of the security subsystem.

    Figure 4 represents that with no security control in place, all the claims are compromised thus indicating that all the attacks launched by using DY and KCI attack models remained successful. With initial level security controls in place, some of the attacks are blocked while several attacks were still successful. With improved security control, all the attacks launched using the DY attack model are blocked, while some of the attacks launched by the KCI model are still successful.

    Figure 5 represents the efficiency of the security controls in terms of Attack Resiliency Measure (ARM) against the DY and KCI attack models. As expected, with no control in place, the ARM value of the security subsystem is 0%. Whereas, with improved security control in place, the ARM value of the security subsystem is 100% against the DY attack model. However, the value of ARM is 32%against the KCI attack model.

    Figure 6 represents the relative Performance Improvement Factor (PIF) of the improved security control with respect to the initial security controls against DY and KCI attack models. Positive values of PIF show that security of the system is increased with the improved controls of the security subsystem.PIF value corresponds to the effectiveness of the improved security controls.

    Fig. 5. Attack resiliency measure of different security controls against DY and KCI attack models.

    Fig. 6. Performance improvement factor of improved security controls with respect to initial security controls against different attack models.

    Figure 7 shows the total number of encryptions used for implementing different security controls. These number of encryptions are used for calculating the cost/benefit measure of different security controls.

    Fig. 7. Cost in terms of number of encryptions used in different security controls.

    Fig. 8. Cost/Benefit Measure (CBM) of different security controls.

    Figure 8 represents the cost/benefit measure of different security controls against DY and KCI attack models. The figure shows that CBM is high for the security controls provided to counter the attacks of the KCI attack model.The low value of CBM is always desirable. A high value indicates that cost of implementing the security control is higher as compared to the benefit gain of the security control against the attack model. In the figure, CBM is plotted as a percentage value to make it comparatively visible on the chart. Although the cost of“Improved Controls vs. DY” and the “Initial Control vs. KCI” is equal, however, proposed CBM measure tells that “Improved Control vs.DY” improvement results are better. Similarly,although the attack resiliency measure (ARM)is equal for both “Initial Control vs. DY” and“Improved Controls vs. KCI”, however, CBM measure tells that “Initial Control vs. DY” improvements resulted in better efficiency. This is the indication of the effectiveness of the proposed qualitative security metrics.

    VII. CONCLUSION

    This paper presented a n ovel approach for evaluating the security performance of communication and network security protocols through a relative quantitative security metric model. Three security metrics of attack resiliency measure (ARM), performance improvement factor (PIF), and cost-benefit measure(CBM) are formulated for the security evaluation of the security controls. As a case study,a secure VM migration protocol is taken as the target of assessment. Attack resiliency measure is calculated in terms of resilience of security control against several attempted attacks applied using two different adversary models. Performance improvement factor is a relative metric taking ratio of the difference of new and old ARM values to old ARM value.Moreover, CBM metric is the ratio of cost to benefit where cost is taken as a total number of encryptions required to implement the security controls and the benefit is ARM gain through the security controls. The results are given for three different security control states of secure VM migration protocol against two different adversary models. Results show that with improved security controls applied to VM migration protocol the ARM and PIF were increased against both DY and KCI attack models. However, cost-benefit measure value for KCI attack model (40%) shows that cost for implementing security controls against KCI attack model is more than the achieved ARM value (32%) whereas against DY attack model, CBM value was lesser (8%) showing that cost for implementing the security controls was smaller as compared to gain in ARM value (100%) in DY attack model.

    ACKNOWLEDGMENT

    The authors would like to thank the anonymous reviewers for their helpful and constructive comments that greatly contributed to improving thefinal version of the paper. They would also like to thank the Editors of this journal for their generous comments and sup-port during the review process.

    欧美成人a在线观看| 国产成人福利小说| 黄片wwwwww| 亚洲av免费在线观看| 亚洲熟妇熟女久久| 久久久久久大精品| 丝袜美腿在线中文| 精品人妻熟女av久视频| 亚洲四区av| 免费观看的影片在线观看| 51国产日韩欧美| 久久久久久久久久久丰满 | 91在线观看av| 亚洲人成网站在线播放欧美日韩| 伦理电影大哥的女人| 国产一级毛片七仙女欲春2| 日本黄色视频三级网站网址| 久久精品91蜜桃| 亚洲成人精品中文字幕电影| 丰满人妻一区二区三区视频av| 国产av不卡久久| 亚洲aⅴ乱码一区二区在线播放| 久久久久九九精品影院| 一边摸一边抽搐一进一小说| 国产淫片久久久久久久久| 欧美成人免费av一区二区三区| 老女人水多毛片| 在线看三级毛片| 99在线视频只有这里精品首页| av女优亚洲男人天堂| 中文字幕精品亚洲无线码一区| 很黄的视频免费| 一级av片app| 亚洲av不卡在线观看| 日韩欧美在线二视频| 精品一区二区三区av网在线观看| 尤物成人国产欧美一区二区三区| a级一级毛片免费在线观看| 国产精品人妻久久久久久| 国产精品一区二区三区四区免费观看 | 啦啦啦韩国在线观看视频| av.在线天堂| 久久婷婷人人爽人人干人人爱| 一区二区三区四区激情视频 | 熟女人妻精品中文字幕| 欧美最黄视频在线播放免费| 不卡一级毛片| 精品久久国产蜜桃| 国内精品久久久久久久电影| 亚洲无线观看免费| 一a级毛片在线观看| 免费大片18禁| 精品午夜福利视频在线观看一区| 天天一区二区日本电影三级| 日本 av在线| 一级毛片久久久久久久久女| 又爽又黄无遮挡网站| 久久久久久久久久成人| 国产一区二区在线观看日韩| 中亚洲国语对白在线视频| 国产中年淑女户外野战色| 国产真实乱freesex| 91久久精品国产一区二区三区| 免费电影在线观看免费观看| 国产精品av视频在线免费观看| 精品久久久久久久久亚洲 | 欧美另类亚洲清纯唯美| 啦啦啦韩国在线观看视频| 免费看光身美女| 中文资源天堂在线| 日日夜夜操网爽| 91狼人影院| 两性午夜刺激爽爽歪歪视频在线观看| 黄色配什么色好看| 999久久久精品免费观看国产| 亚洲精品日韩av片在线观看| АⅤ资源中文在线天堂| 免费大片18禁| 久久久色成人| 狂野欧美白嫩少妇大欣赏| 久久久久性生活片| 国内久久婷婷六月综合欲色啪| 久久人妻av系列| 99久久成人亚洲精品观看| 日韩一区二区视频免费看| 成人综合一区亚洲| 精品99又大又爽又粗少妇毛片 | 毛片女人毛片| 极品教师在线免费播放| 午夜亚洲福利在线播放| 最近最新免费中文字幕在线| 午夜亚洲福利在线播放| 露出奶头的视频| 精品午夜福利在线看| 欧美bdsm另类| 精品国产三级普通话版| 中文字幕熟女人妻在线| 91麻豆精品激情在线观看国产| 亚洲成人精品中文字幕电影| 一区二区三区高清视频在线| 久久香蕉精品热| 亚洲精品一卡2卡三卡4卡5卡| 国产精品99久久久久久久久| 亚洲电影在线观看av| 欧美日韩黄片免| 国产高清视频在线播放一区| 大型黄色视频在线免费观看| 免费看a级黄色片| 悠悠久久av| 国语自产精品视频在线第100页| 色5月婷婷丁香| 又黄又爽又免费观看的视频| 亚洲人成网站在线播| 啦啦啦啦在线视频资源| 非洲黑人性xxxx精品又粗又长| 国产淫片久久久久久久久| 午夜精品在线福利| 成人无遮挡网站| 久久天躁狠狠躁夜夜2o2o| 最后的刺客免费高清国语| 少妇的逼好多水| 欧美bdsm另类| 少妇丰满av| 精品人妻1区二区| 身体一侧抽搐| .国产精品久久| 伊人久久精品亚洲午夜| 成年版毛片免费区| 精品国内亚洲2022精品成人| 国产成人a区在线观看| 麻豆av噜噜一区二区三区| 亚洲一区高清亚洲精品| 久久精品国产亚洲网站| 久久九九热精品免费| 91久久精品国产一区二区成人| 国产精品自产拍在线观看55亚洲| 久久人人爽人人爽人人片va| 久久久久久久久大av| 一a级毛片在线观看| 深夜a级毛片| av在线观看视频网站免费| 日韩欧美 国产精品| 国产午夜福利久久久久久| 亚洲经典国产精华液单| 亚洲va日本ⅴa欧美va伊人久久| 中文字幕av在线有码专区| 中文字幕久久专区| 老师上课跳d突然被开到最大视频| 91麻豆av在线| 麻豆av噜噜一区二区三区| 很黄的视频免费| 无人区码免费观看不卡| 亚洲欧美日韩高清专用| 亚洲va在线va天堂va国产| 性插视频无遮挡在线免费观看| 精品无人区乱码1区二区| 国产麻豆成人av免费视频| 久久午夜亚洲精品久久| 97热精品久久久久久| 日本欧美国产在线视频| 淫妇啪啪啪对白视频| 尤物成人国产欧美一区二区三区| 一卡2卡三卡四卡精品乱码亚洲| 色视频www国产| 久久99热6这里只有精品| 在线免费观看不下载黄p国产 | 欧美精品啪啪一区二区三区| 一个人看视频在线观看www免费| 欧美激情国产日韩精品一区| 在线观看舔阴道视频| 国产亚洲精品av在线| 亚洲国产日韩欧美精品在线观看| 人人妻人人看人人澡| 看片在线看免费视频| av专区在线播放| 国产精品电影一区二区三区| 可以在线观看毛片的网站| 成人综合一区亚洲| 大又大粗又爽又黄少妇毛片口| 啦啦啦观看免费观看视频高清| 大又大粗又爽又黄少妇毛片口| 啦啦啦韩国在线观看视频| 日日摸夜夜添夜夜添小说| 国产色婷婷99| 成人二区视频| 麻豆av噜噜一区二区三区| 国产精品久久久久久久久免| 老司机福利观看| 亚洲国产精品久久男人天堂| 免费黄网站久久成人精品| 亚洲男人的天堂狠狠| 日本三级黄在线观看| 国产aⅴ精品一区二区三区波| 亚洲在线自拍视频| 窝窝影院91人妻| 国产精品人妻久久久久久| 91狼人影院| 国产精品一区二区三区四区免费观看 | 美女cb高潮喷水在线观看| 国内精品宾馆在线| 可以在线观看的亚洲视频| 久久精品国产亚洲网站| 91精品国产九色| 免费黄网站久久成人精品| 天堂影院成人在线观看| 久久国产精品人妻蜜桃| 大又大粗又爽又黄少妇毛片口| 天堂av国产一区二区熟女人妻| 中文资源天堂在线| 看免费成人av毛片| 日本成人三级电影网站| 免费观看在线日韩| 在线观看av片永久免费下载| 国产av在哪里看| 午夜福利欧美成人| www.色视频.com| 国产国拍精品亚洲av在线观看| 亚洲无线在线观看| 我要搜黄色片| 日本 欧美在线| 男人和女人高潮做爰伦理| 午夜激情福利司机影院| 成人二区视频| 精品久久久久久久久久久久久| 久久久精品大字幕| 窝窝影院91人妻| 欧美人与善性xxx| 精品福利观看| 午夜福利在线观看免费完整高清在 | 久久久久久久久大av| 哪里可以看免费的av片| 俄罗斯特黄特色一大片| 国产精品久久久久久av不卡| 毛片女人毛片| 在线看三级毛片| 九九爱精品视频在线观看| 国产成人a区在线观看| 欧美高清成人免费视频www| 伊人久久精品亚洲午夜| 欧美区成人在线视频| 亚洲专区中文字幕在线| 搡老岳熟女国产| 久久久久久久久久黄片| 露出奶头的视频| 99久久无色码亚洲精品果冻| 午夜福利视频1000在线观看| 一进一出抽搐动态| 亚洲欧美精品综合久久99| 久久久久精品国产欧美久久久| 日日夜夜操网爽| 日本熟妇午夜| 亚洲成人免费电影在线观看| 国产爱豆传媒在线观看| 无遮挡黄片免费观看| 亚洲av.av天堂| 欧美日韩中文字幕国产精品一区二区三区| 日本爱情动作片www.在线观看 | 99国产精品一区二区蜜桃av| 久久久色成人| 免费看日本二区| 成人美女网站在线观看视频| 国产亚洲精品av在线| 亚洲专区国产一区二区| 日韩一本色道免费dvd| 久久精品国产自在天天线| 国产亚洲91精品色在线| 欧美性猛交╳xxx乱大交人| 欧美成人a在线观看| 亚洲成人久久爱视频| 亚洲avbb在线观看| 国产av麻豆久久久久久久| 国产精品国产高清国产av| 国产午夜福利久久久久久| 日韩欧美精品v在线| 日韩欧美三级三区| 超碰av人人做人人爽久久| 国产精华一区二区三区| 亚洲人与动物交配视频| 校园春色视频在线观看| 99久久精品一区二区三区| 网址你懂的国产日韩在线| 国内少妇人妻偷人精品xxx网站| 色噜噜av男人的天堂激情| 国产av不卡久久| 日韩av在线大香蕉| 少妇人妻精品综合一区二区 | 亚洲国产高清在线一区二区三| 久久久久久九九精品二区国产| 免费av毛片视频| 中国美女看黄片| 狂野欧美白嫩少妇大欣赏| 亚洲精品456在线播放app | 美女免费视频网站| 波多野结衣高清作品| 日本a在线网址| 久99久视频精品免费| 日日夜夜操网爽| 国产精品98久久久久久宅男小说| 老熟妇仑乱视频hdxx| 午夜福利欧美成人| 91久久精品国产一区二区三区| 性色avwww在线观看| 老司机午夜福利在线观看视频| 啦啦啦观看免费观看视频高清| 少妇高潮的动态图| 日韩欧美国产一区二区入口| 国产精品一及| 国产伦人伦偷精品视频| 国产淫片久久久久久久久| 亚洲美女搞黄在线观看 | 日韩大尺度精品在线看网址| 日本熟妇午夜| 嫩草影视91久久| 免费不卡的大黄色大毛片视频在线观看 | 日韩 亚洲 欧美在线| 午夜久久久久精精品| 日本熟妇午夜| 久久久午夜欧美精品| 亚洲自偷自拍三级| 亚洲黑人精品在线| 麻豆精品久久久久久蜜桃| 亚洲三级黄色毛片| 国产白丝娇喘喷水9色精品| 99国产极品粉嫩在线观看| 国产亚洲91精品色在线| 国模一区二区三区四区视频| 国产高清三级在线| 老司机深夜福利视频在线观看| 成人毛片a级毛片在线播放| 色综合亚洲欧美另类图片| 国产精品一区www在线观看 | 亚洲精品国产成人久久av| 在线看三级毛片| 国产在线精品亚洲第一网站| 人妻制服诱惑在线中文字幕| 久久欧美精品欧美久久欧美| 国产男人的电影天堂91| 成年人黄色毛片网站| 日韩欧美在线二视频| 国产免费男女视频| 神马国产精品三级电影在线观看| 深夜精品福利| 嫩草影院入口| 成人亚洲精品av一区二区| 国产成人一区二区在线| 国产乱人视频| 天堂√8在线中文| 日本一二三区视频观看| 国产精品永久免费网站| 国产精品乱码一区二三区的特点| 99国产极品粉嫩在线观看| 有码 亚洲区| 精品欧美国产一区二区三| 国产又黄又爽又无遮挡在线| 国产精品98久久久久久宅男小说| 搡老岳熟女国产| 亚洲av一区综合| 桃色一区二区三区在线观看| 日日摸夜夜添夜夜添小说| 人妻夜夜爽99麻豆av| 亚洲精品色激情综合| 性色avwww在线观看| 黄色丝袜av网址大全| 亚洲精品一卡2卡三卡4卡5卡| 色噜噜av男人的天堂激情| 最近中文字幕高清免费大全6 | 国产av麻豆久久久久久久| 国内精品美女久久久久久| 日韩欧美三级三区| 俺也久久电影网| 午夜久久久久精精品| 国产高清不卡午夜福利| 国产免费av片在线观看野外av| 国产成人影院久久av| 亚洲国产精品久久男人天堂| 看十八女毛片水多多多| 欧美bdsm另类| 乱人视频在线观看| 麻豆精品久久久久久蜜桃| 日韩在线高清观看一区二区三区 | 免费不卡的大黄色大毛片视频在线观看 | 欧美中文日本在线观看视频| 国产精品98久久久久久宅男小说| 国产精品久久久久久精品电影| 国模一区二区三区四区视频| 精品久久久久久久久久久久久| 中国美白少妇内射xxxbb| 欧美一区二区精品小视频在线| 十八禁网站免费在线| 日韩亚洲欧美综合| 啦啦啦韩国在线观看视频| 日韩欧美 国产精品| 国产成人福利小说| 乱系列少妇在线播放| 中文字幕高清在线视频| 亚洲精品在线观看二区| 亚洲性夜色夜夜综合| 欧美丝袜亚洲另类 | 午夜日韩欧美国产| 日本-黄色视频高清免费观看| 亚洲18禁久久av| 别揉我奶头~嗯~啊~动态视频| 99久久精品一区二区三区| 大型黄色视频在线免费观看| 欧美日韩中文字幕国产精品一区二区三区| 可以在线观看的亚洲视频| 在线国产一区二区在线| 自拍偷自拍亚洲精品老妇| 国产黄色小视频在线观看| 成人亚洲精品av一区二区| 网址你懂的国产日韩在线| 香蕉av资源在线| 国产亚洲av嫩草精品影院| 大又大粗又爽又黄少妇毛片口| 国产精品综合久久久久久久免费| 精品久久国产蜜桃| 久久精品国产亚洲网站| 一个人看视频在线观看www免费| 少妇丰满av| 亚洲av免费高清在线观看| 啦啦啦韩国在线观看视频| 91午夜精品亚洲一区二区三区 | 国产色婷婷99| av中文乱码字幕在线| 午夜亚洲福利在线播放| 色av中文字幕| 国产视频一区二区在线看| 亚洲自偷自拍三级| 无人区码免费观看不卡| 两性午夜刺激爽爽歪歪视频在线观看| 五月伊人婷婷丁香| 欧美xxxx黑人xx丫x性爽| 99热这里只有是精品50| 身体一侧抽搐| 我要看日韩黄色一级片| 精品午夜福利视频在线观看一区| 亚洲专区国产一区二区| 天堂动漫精品| 无人区码免费观看不卡| 一个人看视频在线观看www免费| 国产伦精品一区二区三区视频9| 99久久精品国产国产毛片| 国产欧美日韩精品一区二区| 国产av在哪里看| 夜夜爽天天搞| 99热这里只有是精品50| 国产三级中文精品| 国产精品自产拍在线观看55亚洲| 欧美成人免费av一区二区三区| 国产人妻一区二区三区在| 日日摸夜夜添夜夜添av毛片 | 韩国av在线不卡| 成年版毛片免费区| 国产亚洲91精品色在线| 最新在线观看一区二区三区| 婷婷精品国产亚洲av| 波多野结衣高清作品| 久久99热6这里只有精品| 国产亚洲精品久久久久久毛片| 色哟哟·www| 免费黄网站久久成人精品| 久久久久久九九精品二区国产| 亚洲av熟女| av专区在线播放| 精品国产三级普通话版| 国产成人aa在线观看| 一个人看的www免费观看视频| 色综合站精品国产| 久久精品国产鲁丝片午夜精品 | 成人二区视频| ponron亚洲| 久久国内精品自在自线图片| 黄色配什么色好看| 中文字幕熟女人妻在线| 精品久久久噜噜| 久久久久久伊人网av| 免费看av在线观看网站| 黄色日韩在线| 女生性感内裤真人,穿戴方法视频| 亚洲美女搞黄在线观看 | 久久久久国产精品人妻aⅴ院| 国产黄a三级三级三级人| 国产亚洲欧美98| 欧美一区二区精品小视频在线| 最近视频中文字幕2019在线8| 国产综合懂色| 人人妻,人人澡人人爽秒播| 岛国在线免费视频观看| 国产av麻豆久久久久久久| 亚洲成人精品中文字幕电影| 国产淫片久久久久久久久| 亚洲国产日韩欧美精品在线观看| 我的女老师完整版在线观看| 麻豆精品久久久久久蜜桃| h日本视频在线播放| 舔av片在线| 久久久久久久久久久丰满 | 精品午夜福利在线看| 日本撒尿小便嘘嘘汇集6| 成年女人看的毛片在线观看| 国产精品爽爽va在线观看网站| 淫妇啪啪啪对白视频| 2021天堂中文幕一二区在线观| 男人和女人高潮做爰伦理| 国产探花极品一区二区| 美女黄网站色视频| 精品久久久久久成人av| 免费在线观看影片大全网站| 亚洲精品久久国产高清桃花| 联通29元200g的流量卡| 久久中文看片网| 久久99热6这里只有精品| av在线蜜桃| 国产黄色小视频在线观看| 天堂网av新在线| 亚洲美女视频黄频| 亚洲成人久久爱视频| 999久久久精品免费观看国产| 日韩欧美免费精品| 国产亚洲精品综合一区在线观看| 3wmmmm亚洲av在线观看| 日本撒尿小便嘘嘘汇集6| 国产精品亚洲一级av第二区| а√天堂www在线а√下载| 真人做人爱边吃奶动态| 丰满的人妻完整版| 国产v大片淫在线免费观看| 日本黄大片高清| 成人无遮挡网站| 日日摸夜夜添夜夜添av毛片 | 一级av片app| 久久久午夜欧美精品| 久久久久国内视频| 国产精品福利在线免费观看| 国产精品久久视频播放| 99久久九九国产精品国产免费| 久久久久久久午夜电影| 亚洲三级黄色毛片| 日本 av在线| 老司机午夜福利在线观看视频| 悠悠久久av| 日韩欧美精品免费久久| 国产毛片a区久久久久| 露出奶头的视频| 美女被艹到高潮喷水动态| 免费av毛片视频| 欧洲精品卡2卡3卡4卡5卡区| 神马国产精品三级电影在线观看| 能在线免费观看的黄片| 国产精品1区2区在线观看.| 免费搜索国产男女视频| 免费一级毛片在线播放高清视频| 我的女老师完整版在线观看| 成年女人毛片免费观看观看9| 日韩一本色道免费dvd| 成年人黄色毛片网站| 亚洲av二区三区四区| 成人午夜高清在线视频| 午夜免费男女啪啪视频观看 | 精品国产三级普通话版| 国内精品久久久久久久电影| 日韩一本色道免费dvd| 高清毛片免费观看视频网站| 亚洲av二区三区四区| 日韩欧美免费精品| 中国美白少妇内射xxxbb| 国产av不卡久久| 久久久久久久亚洲中文字幕| 国产精品久久久久久精品电影| 婷婷丁香在线五月| 成人三级黄色视频| 韩国av在线不卡| 神马国产精品三级电影在线观看| 精品欧美国产一区二区三| 国产午夜福利久久久久久| 亚洲精品影视一区二区三区av| 少妇高潮的动态图| 日本免费a在线| 一个人看视频在线观看www免费| 丰满乱子伦码专区| 国产伦精品一区二区三区四那| 精品乱码久久久久久99久播| 亚洲天堂国产精品一区在线| 3wmmmm亚洲av在线观看| 成人亚洲精品av一区二区| 亚洲美女黄片视频| 女人被狂操c到高潮| 嫩草影视91久久| 国产日本99.免费观看| 国产爱豆传媒在线观看| 亚洲人与动物交配视频| av在线蜜桃| 国产美女午夜福利| 1000部很黄的大片| 人妻少妇偷人精品九色| 日本黄大片高清| 成人av在线播放网站| 国产精品久久久久久久电影| 毛片女人毛片| 亚洲中文字幕日韩| 男人和女人高潮做爰伦理| 全区人妻精品视频| 午夜精品在线福利| 日本-黄色视频高清免费观看| 男人和女人高潮做爰伦理| 动漫黄色视频在线观看| 欧美色视频一区免费| 日本黄大片高清| 成人性生交大片免费视频hd| 人妻夜夜爽99麻豆av| 国产人妻一区二区三区在| 在线观看av片永久免费下载| 欧美xxxx性猛交bbbb| 日韩欧美国产一区二区入口| 国产美女午夜福利|