• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Defense Against Poisoning Attack via Evaluating Training Samples Using Multiple Spectral Clustering Aggregation Method

    2019-06-12 01:23:14WentaoZhaoPanLiChengzhangZhuDanLiuandXiaoLiu
    Computers Materials&Continua 2019年6期

    Wentao Zhao,Pan Li, ,Chengzhang Zhu, ,Dan Liu and Xiao Liu

    Abstract:The defense techniques for machine learning are critical yet challenging due to the number and type of attacks for widely applied machine learning algorithms are significantly increasing.Among these attacks,the poisoning attack,which disturbs machine learning algorithms by injecting poisoning samples,is an attack with the greatest threat.In this paper,we focus on analyzing the characteristics of positioning samples and propose a novel sample evaluation method to defend against the poisoning attack catering for the characteristics of poisoning samples.To capture the intrinsic data characteristics from heterogeneous aspects,we first evaluate training data by multiple criteria,each of which is reformulated from a spectral clustering.Then,we integrate the multiple evaluation scores generated by the multiple criteria through the proposed multiple spectral clustering aggregation (MSCA)method.Finally,we use the unified score as the indicator of poisoning attack samples.Experimental results on intrusion detection data sets show that MSCA significantly outperforms the K-means outlier detection in terms of data legality evaluation and poisoning attack detection.

    Keywords:Poisoning attack,sample evaluation,spectral clustering,ensemble learning.

    1 Introduction

    In big data era,machine learning is becoming one of the most popular techniques in many applications because of its excellent performance.For example,in image recognition [Lingyun,Xiaobo,Jiaohua et al.(2018)],many machine learning algorithms have achieved higher recognition accuracy compared with human [Makili,Vega,Dormido-Canto et al.(2011)].Besides,those algorithms also show significant successes in other domains,such as speech recognition [Hinton,Deng,Yu et al.(2012)],intrusion detection system (IDS)[Tsai,Hsu,Lin et al.(2009)],financial prediction [Wei,Liang and Longbing (2015)],web content analysis [Lingyun,Yan,Wei et al.(2018)] and data analytics [Chengzhang,Longbing,Qiang et al.(2018);Lingyun,Guohan,Qian et al.(2018)],etc.

    However,recent researches indicate that many attacks can destroy the application of machine learning [Liu,Li,Zhao et al.(2018)].Basically,these attacks can be classified into two categories:exploratory attack and causative attacks [Barreno,Nelson,Sears et al.(2006)].Exploratory attack mainly destroys the learning model performance during the prediction stage.For example,the adversarial sample crafting methods proposed by [Nguyen,Yosinski and Clune (2015);Carlini,Mishra,Vaidya et al.(2016)] can easily manipulate a well-trained deep neural network (DNN).Causative attack mainly occurs in the model training stage.A typical causative attack method is the poisoning attack.Poisoning attack manipulates the learning model by modifying the features or labels of training data or injecting poisoning data that is similar yet has different distribution to training data.As evidenced by [Biggio,Fumera,Roli et al.(2012);Pan,Qiang,Wentao et al.(2018);Pan,Wentao,Qiang et al.(2018)],poisoning attack seriously destroys the performance of learning models that invalidates various applications in multiple scenarios.Recently,many efforts have been paid on the defense technologies for poisoning attack.Existing methods reduce the impact of poisoning attack by adopting data sanitization and introducing robust learning algorithms.Data sanitization improves the quality of training data via filtering suspicious poisoning data [Nelson,Barreno,Chi et al.(2008);Laishram and Phoha (2016);Paudice,Munozgonzalez and Lupu (2018)].In contrast,robust learning algorithms tolerant poisoning data through well-designated models.Although the above methods have achieved remarkable performance,they may fail to tackle the following challenges.First,most defense techniques may have a high false detection rate.These methods are sensitive to their hyper-parameters.Without well-tuned hyperparameters,they are likely to classify the legal samples as poisoning data,and thus,cause the high false detection rate.Second,most defense techniques only suit for a certain kind of attacks.Their scalability and generalization performance should be further improved.

    In this paper,we propose a novel poisoning attack defense technique.The proposed technique detects poisoning samples via a multiple spectral clustering aggregation (MSCA)method,which evaluates training samples from multiple views and provides a more robust solution.The main contributions of this paper are summarized as follows:

    ·We propose an evaluation method to quantify the legitimacy of training samples.This method combines spectral clustering with similarity metric to provide reliable results.

    ·We further integrate multiple spectral clustering results per different types of similarity metric and various number of clustering centers to form a robust sample evaluation method.

    ·The MCSA evaluation results can be used to implement a variety of poisoning attack defense technologies under different assumptions catering for specific data characteristics.

    The rest of this paper is organized as follows.Section 2 introduces the related knowledge about the adversarial model and the adversarial sample evaluation.Section 3 details the spectral clustering-based evaluation method.Section 4 introduces the proposed multiple spectral clustering aggregation method.Section 5 shows the simulation results by using the MSCA method to remove the suspicious poisoning samples.Section 6 concludes the paper.

    2 Preliminaries

    2.1 Adversary model

    Before studying a type of attack,we should make an assumption about the attacker.Wittel et al.[Wittel and Wu (2004)] first considered the attacker’s knowledge when studying the evasive attack of the spam filtering system.Later,some researchers suggested that it is necessary to consider the adversary goal and the adversary capability [Barreno,Nelson,Searset et al.(2006)].These three aspects further formed the concept of the adversary model,and its specific meaning is as follow:

    ·Adversary goal.Adversary goal is the final effect that the adversary wants to achieve.In this paper,the goal of the attacker is crafting poisoning data to destroy learning models.

    ·Adversary knowledge.Before launching attack,adversary needs some information related to the targeted learning models.In this paper,we suppose the adversary know the whole training data,or the algorithms,even the concrete parameters of targeted models.In this assumption,the attacker can craft various poisoning samples,which can further verify the performance of proposed defense method.

    ·Adversary capability.Besides the adversary knowledge,the adversary should have ability to launch attack.For the poisoning attack,previous works mainly contain two types.One assumes the adversary can change the labels or the features of training data [Zhao,An,Gao et al.(2017);Biggio,Nelson and Laskov (2012)].The other assumption is that the adversary can inject adversarial samples into training data when the learning models are retraining [Rubinstein,Nelson,Huang et al.(2009);Kloft and Laskov.(2010)].In this paper,we study the defense technology against the poisoning samples crafted by the latter assumption.

    2.2 Sample legitimacy evaluation

    2.2.1 Poisoning samples

    According to various adversary capabilities,the poisoning samples are mainly crafted by two ways.The first kind of poisoning sample is generated by modifying the features or the labels of existing training data.The second kind of poisoning sample is from the new injecting samples during the model retraining process.Both of the two kinds of poisoning samples have the same attack goal of drifting the initial distribution of training data.Referring to [Pan,Qiang,Wentao et al.(2018)],the poisoning samples have two features.

    ·The sample should be recognized as legal sample by the classifier.This means that the poisoning samples are not easily identified as abnormal points.

    ·The sample can change the original training data distribution,which can further affect the performance of the model trained from the training data.

    In general,the poisoning samples can cause data drifting of the training data without arousing the suspicion of the classifier.Besides,it can also affect the performance of the targeted learning model.

    2.2.2 Sample legitimacy evaluation

    Using the poisoned training data without any distinction can seriously decrease the performance of learning model.So,it is critical to properly evaluate the training data.From above introduction,the poisoning data can be defined as the data which can destroy the distribution of training data.In the contrary,legal data represents the initial training data without any contamination by the poisoning data.

    Therefore,the sample legitimacy evaluation can quantify the significance or confidence of the training data.So,we define a metric,namedLegitimacy Coefficient(LC),to measure the legality of training samples.HigherLCrepresents that the sample is more closed to the true sample distribution,while lowerLCshows that the sample is farer away from the true sample distribution.

    3 Single spectral clustering for sample evaluation

    Combining with the above description of the poisoning samples’ characteristics,we first design a single spectral clustering evaluation method to evaluate theLCvalue of training samples.Furthermore,we use the ensemble strategy to integrate multiple spectral clustering learners and then propose a multiple spectral clustering aggregation method,which can be used to evaluate the legitimacy of training data.In this section,we detail the single spectral clustering evaluation method.

    3.1 Spectral clustering

    Spectral clustering is a clustering algorithm developed from graph theory.The main idea is treating all samples as points in high-dimensional space and connecting them with edges to form an undirected weight map.The weightwijof each edge in the graph can be used to represent the distance relationship between sample pointixand sample pointxj.The edge weight of the two sample points will be high if the distance of the two samples is far,and vice versa.The clustering can be realized by cutting the undirected graph,which can ensure the sum of edge weights between two independent sub graphs is as low as possible,and the sum of edge weights inside the sub graph is as high as possible.

    The initial spectral clustering can achieve good clustering performance,and the clustering result can provide a benchmark reference for evaluating the training sample.According to [Yu and Shi (2003)],the spectral clustering result is decided by three aspects:

    ·The computation way of adjacency metricW.In spectral clustering,the edge weightwijcan be used to measure the relationship between two samples.Considering the edge weights of all training samples,we can get the adjacency metricW.As for a data set withnsamples,Wcan be represented by Eq.(1).

    wherewijrefers to the edge weight betweenith sample andjth sample.

    ·The standard graph laplace metric=-L W D,whereWis adjacency metric andDrefers to degree metric,which can be formulated as Eq.(2).

    ·The clustering way.The last step in spectral clustering is using clustering method such as K-means to deal with the standard feature metricF.

    3.2 Single spectral clustering sample rating method

    Based on spectral clustering method,we further utilize the clustering result and similarity metricWto realize the evaluation of training data.The specific process of evaluating on each sample is shown in Algorithm 1,vxirepresents theLCvalue of samplexi.

    Algorithm 1:Single spectral clustering for sample evaluation Input:Sample set 1 2={,,...,}nXx xx with label p,The generating way of similarity metric G,Class number k Output: Rating scores 1 2{,,...,}=xxxnV v vv 1.Initialize:=?synX 2.According to G,generate similarity metric W 3.Divide X into k groups of samples 1 2{,,...}kD D D using spectral clustering 4.ChooseiD as the legal sample set {,...,}=normalimDxx,other class Dj(j≠i) as the candidate sample sets,iD is the closest class to the centre of all samples 5.for 1=i to n do 6.Compute=∑miij j1=Sw,where wij is the similarity between ix and xj 7.end for 8.Sort 1{,...,}=xxnS SS in descending order,the index of ix is the score for ix

    Higher value represents higher confidence of sample’s legitimacy.In the contrary,lower score refers to lower confidence of sample’s legitimacy.The score for each sample is determined by two factors.First,the selection of similarity measure for spectral clustering can be a gaussian kernel function,polynomial kernel function or sigmoid kernel function.Different kernel functions can fit different data distributions.Second,the selection of legal samples class decides the benchmark of basic legitimacy evaluating,which further affect theLCvalue of samples.Besides,the way generating adjacency matrix and the basic clustering way determine the clustering results,which further affect the legal class selection.

    4 Multiple spectral clustering aggregation for sample evaluation

    For a data set,kernel function type (gaussian kernel,polynomial kernel,sigmoid kernel)and the number of cluster results can influence the evaluation of sample legitimacy.In order to reduce the parameters sensitivity of the algorithm,we combine spectral clustering with ensemble learning to achieve more robust sample legitimacy evaluation.

    4.1 Ensemble strategy

    The main idea of ensemble learning is integrating multiple base learners into a strong learner through some combination strategies.The performance of the integrated strong learner is more robust than that of each base learner.In ensemble learning,the combination strategy of the base learners directly affects the performance of the integrated strong learner.We simply describe three common combination strategies [Dietterich (2000)] as follows:

    ·Averaging strategy:This is the most common combination strategy for basic learners,including the simple average method and the weighted average method.

    ·Voting strategy:Assuming that the output of each sample is predicted fromnlearners,the voting method judges the output of the sample by counting the labels predicted by these learners.There are three main ways:the majority of voting methods,the relative majority voting method and the weighted voting method.

    ·Learning strategy:The averaging strategy and voting strategy may not be suitable in some cases.Therefore,it is necessary to construct a nonlinear relationship through learning method to integrate the base learners.

    4.2 Average ensemble strategy for multiple spectral clustering aggregation

    In this section,we used the averaging strategy as an example to design an aggregation method.The specific process is shown in algorithm 2,MSCA uses the sum of all scores rated by various spectral clustering learners as theLCvalue of the sample evaluated by MSCA.After that,the defender can properly combine theLCvalue with specific defense method to defense against poisoning attack.For example,the defender can adopt the idea of data sanitization.A simple method is removing the samples with the lowerLCvalues,which are classified as suspicious poisoning data by MSCA.Besides,based on the value of sample legitimacy provided by MSCA,the defender can further adopt bagging or boosting strategy to ensemble various learners.TheLCvalue can be used to adjust the weights of the samples in the training process,which can reduce the impact of poisoning data and achieve more robust machine learning algorithm.

    Algorithm 2:Multiple spectral clustering aggregation (MSCA)Input:Sample set 1 2={,,...,}NXx xx with label p,the set of generating way of similarity metric 1 2{,,...,}mG GG,the set of clustering number 1 2{,,...,}nk kk Output: Rating scores 1 2{,,...,}=xxxNV v vv 1.Initialize:=?synX 2.for 1=i to n do 3.Choose the number of clustering kj 4.Input,,ijG k X to algorithm 1,get the score ijV 5.end for 6.Compute the sum of scores 1 1==∑∑mnij xpxpijVv for sample ( 1,...,)=px pN 7.1{,...,}=xxNV vv

    5 Experiment

    In this section,we evaluate the performance of the proposed defense method by extensive experiments described as follows:Firstly,we introduce the experimental setting in this paper,including the targeted poisoning samples crating methods and the specific parameters setting of proposed MSCA method.Then we visually show the performances of various methods defense against BEBP poisoning method on synthetic data set.Finally,we compare the proposed method with other defense methods on two real data sets to further demonstrate its stability and effectiveness in the assessment of training data.

    5.1 Experimental setting

    5.1.1 Poisoning methods

    For the poisoning sample crafting methods,we chose two typical poisoning methods,i.e.,Batch-EPD Boundary Pattern (BEBP)[Pan,Qiang,Wentao et al.(2018)] and Centredrifting Boundary Pattern (CBP)[Pan,Wentao,Qiang et al.(2018)].They can effectively craft boundary pattern data,which can serve as poisoning data to seriously destroy the performance of six different machine learning models.

    BEBPThis method first randomly divides the training data set into several groups,and then calculates the edge pattern data and corresponding normal vectors of each group data using edge pattern detection algorithm.After that,by pushing the edge pattern data towards their normal vectors,we can get pushed data,which can be further selected by boundary pattern detection algorithm to get the boundary pattern data.

    CBPSimilar to BEBP,CBP also use the boundary pattern detection method to select the pushed data.The difference is that CBP pushes the whole training data toward the same center vector to get pushing data.And the center vector can be easily obtained by calculating the vector between the two class centres.

    Besides,the method in Pan et al.[Pan,Wentao,Qiang et al.(2018)] can launch poisoning attack with weak adversary model,while the attacker should have a strong adversary model in Pan et al.[Pan,Qiang,Wentao et al.(2018)].For this paper mainly study the defense technology,we suppose that targeted models are in worse case,which means that the attacker has enough knowledge about targeted learning models.

    5.1.2 Parameters setting

    For the parameters setting of BEBP and CBP,we kept the setting in [Pan,Qiang,Wentao et al.(2018);Pan,Wentao,Qiang et al.(2018)],wherein the poisoning ratio and the poisoning round are set as 0.07 and 5,respectively.

    As for the proposed MSCA,we selected six base spectral clustering learners with different kernel types and clustering centers.Specifically,we set the numbers of clustering centre as three and six,and each clustering centre number is combined with three kernel types as follows:

    ·Gaussian kernel:

    ·Sigmoid kernel:

    ·Polynomial kernel:

    To focus on evaluation method itself,we simply used the default kernel parameters in the sklearn tool.

    5.2 Experiment on synthetic data set

    In order to visualize the defense performance of proposed method,we compared the proposed MSCA method with K-means.Meanwhile,the assess result of each base spectral clustering learner is also performed on the synthetic data set.

    As shown in the Fig.1,we can see that the detection results of suspicious poisoning data using various defense methods regarding the poisoning points caused by BEBP method.Obviously,the MSCA method performs better than K-means method and its performance is more stable and effective than single spectral clustering method on the assessment of samples’ legitimate.

    Figure 1:The comparison of various defense methods on synthetic data set (The Fig.(a)represents the poisoning effect caused by BEBP,the red round points refer to the boundary poisoning data.The Figs.(b)-(i)represent the defense performance of various defense methods,where the red round points refer to the illegal points detected by various defense methods.)

    5.3 Experiments on intrusion detection data sets

    Referring to previous work [Pan,Wentao,Qiang et al.(2018)],poisoning attack via injecting poisoning data always occurs in the retraining process of learning model.Network intrusion detection system is a typical domain whose model needs be retrained.So in this section,we evaluate the performance of proposed method by simulating defense experiment on two network intrusion detection data sets.

    5.3.1 Performance metric

    Regarding an IDS system,accuracy is the primary performance metric.Hence,we adopt accuracy in this paper to evaluate the performance reduction of machine learning-based IDSs under the previous poisoning attack methods.The accuracy (ACC)is defined by Eq.(3):

    where true positive (TP)is the number of truly abnormal samples that are classified as abnormal ones by IDSs,true negative (TN)means the number of truly normal samples that are treated as normal ones,false positive (FP)refers to the number of truly normal samples classified as abnormal ones,and false negative (FN)represents the number of truly abnormal samples classified as normal ones.

    Table 1:Sample distribution of the randomly selected data regarding the NSL-KDD

    5.3.2 Data sets

    To demonstrate the performance of the proposed defense method,we chose two public intrusion detection data sets.

    NSL-KDDThis data set is a revised version of KDDCUP99,which is a well-known benchmark data set for evaluating the performance of IDSs.NSL-KDD contains five categories of samples (one normal and four abnormal).Moreover,each sample has 41 features.

    Kyoto 2006+This data set proposed in Song et al.[Song,Takakura,Okabe et al.(2011)] is another famous intrusion detection data set.This data set has been collected from honeypots and regular servers that are deployed at the Kyoto University since 2006.Moreover,Kyoto 2006+contains three types of samples,i.e.,normal,known attack and unknown one,and each sample has 24 features.

    Referring to Pan et al.[Pan,Qiang,Wentao et al.(2018);Pan,Wentao,Qiang et al.(2018)],we randomly selected training samples and evaluation samples from NSL-KDD and Kyoto 2006+.The sample distribution of training data and evaluating data selected from NSL-KDD shows in Tab.1.Similarly,we randomly selected 13292 samples from the traffic data collected during 27-31,August 2009 regarding the Kyoto 2006+data set,including 6472 samples as training data and 6820 samples as evaluating data.

    Targeted ModelsFrom the previous work we can know that the SVM algorithms were fragile facing the boundary pattern poisoning samples [Pan,Qiang,Wentao et al.(2018)].Therefore,we focus on the defense methods towards SVM algorithms.Specifically,we select three typical SVM algorithms,including SVM with a radial basis function kernel (SVM-RBF),SVM with a linear kernel (SVM-linear)and SVM with a sigmoid kernel (SVM-Sigmoid).

    5.3.3 Experimental results

    According to above experimental setting,we evaluated theACCof various defense methods,includingK-means clustering with outlier removal,the proposed MSCA method and its base spectral clustering with outlier removal,respectively.Meanwhile,the targeted poisoning samples are generated by BEBP and CBP,and both of the two kinds of poisoning methods are performed on NSL-KDD and Kyoto 2006+.

    Fig.2 and Fig.3 describe theACCchanging with no defense,K-means and MSCA method under 5 round poisoning attack using BEBP and CBP on NSL-KDD data set.The No defense method represents the model performance without any defense measure,whileK-means refers to theACCof model using theK-means method to remove the outlier data.

    Figure 2:The comparison of ACC with various methods defensing against poisoning data crafted by BEBP on NSL-KDD data set

    Tab.2 and Tab.3 show the results of different methods defensing against 5 round poisoning attack using BEBP and CBP on Kyoto 2006+data set.Specially,we used Means,Best and Worst in Tab.2 and Tab.3 to represent the averageACC,the bestACCand the worstACCamong the six base spectral clustering with outlier removal,respectively.

    Figure 3:The comparison of ACC with various methods defensing against poisoning data crafted by CBP on NSL-KDD data set

    From the above experimental results,we can see that proposed MSCA method can effectively defense the poisoning attack.Specifically,we can compare the defense performance from three aspects.

    ·As for the performance of defense against different poisoning samples,MSCA can improve the performance of targeted models under poisoning attack of BEBP and CBP both on NSL-KDD and Kyoto 2006+.It is noteworthy that MSCA performs better with the increasing of poisoning rounds.This means that the proposed method can keep the stable and effective performance of targeted models in their long-term retraining process under the disturbance of poisoning attack.

    ·Compared with K-means defense method in Fig.2 and Fig.3,MSCA performs better in defensing against the poisoning samples crafted by BEBP and CBP on NSL-KDD data set.Relatively speaking,MSCA can better defense against the poisoning samples crafted by BEBP,but the experimental results using MSCA and K-means both perform less effective in defensing against the CBP poisoning method.

    Table 2:Comparative results of ACC on Kyoto 2006+under 5 round poisoning attack using BEBP

    Table 3:Comparative results of ACC on Kyoto 2006+under 5 round poisoning attack using CBP

    SVM- linear No defense 98.39% 97.08% 94.67% 92.78% 91.30% MSCA 97.54% 96.48% 95.45% 94.20% 93.23% Mean 97.46% 96.37% 95.23% 93.98% 92.97% Best 97.87% 96.52% 95.41% 94.26% 93.29% Worse 96.67% 96.17% 95.00% 93.44% 92.45% SVM- Sigmoid No defense 97.30% 96.34% 94.17% 91.71% 89.93% MSCA 97.00% 95.54% 95.06% 94.21% 93.06% Mean 96.82% 95.33% 94.66% 93.97% 92.65% Best 97.00% 95.49% 94.85% 94.29% 93.21% Worse 96.57% 95.23% 94.21% 93.61% 91.96%

    ·From Tab.2 and Tab.3 we can see that MSCA with the average ensemble strategy is more stable than the single spectral clustering method.Although it is difficult to use average ensemble strategy achieving better performance than the best spectral clustering learner,MSCA can achieve the comparable performance with the best one among all base spectral clustering learners.Moreover,MSCA performs significantly better than the worst one as well slightly better than the averageACCof all base learners.

    6 Conclusions

    In this paper,we have proposed a novel sample evaluation method using spectral clustering and ensemble strategy.Firstly,we propose using spectral clustering algorithm to evaluate training samples and rate theirLCvalues.To address the drawback of single spectral clustering,we further present the MSCA method to realize more robust evaluation for training sample.Experiments on real intrusion detection data sets demonstrate the proposed sample evaluation method can effectively defense against poisoning sample crafted by different methods.

    In future,it is worthwhile to do more in-depth studies on the scalability of the proposed sample evaluation method.Moreover,designing more robust algorithms using the result of sample evaluation will be a worthwhile work as well.

    别揉我奶头~嗯~啊~动态视频| 听说在线观看完整版免费高清| 久久久久国产一级毛片高清牌| 深夜精品福利| 亚洲成人久久性| 三级男女做爰猛烈吃奶摸视频| 久久久久免费精品人妻一区二区| 精品久久蜜臀av无| 成年人黄色毛片网站| 黄色视频,在线免费观看| 午夜福利欧美成人| 成人av一区二区三区在线看| 在线观看免费视频日本深夜| 波多野结衣巨乳人妻| 精品久久久久久成人av| 美女 人体艺术 gogo| 好男人在线观看高清免费视频| 99riav亚洲国产免费| 露出奶头的视频| 久久中文字幕一级| 国产精品av视频在线免费观看| 1000部很黄的大片| 夜夜看夜夜爽夜夜摸| 丁香六月欧美| 色av中文字幕| 很黄的视频免费| 精品一区二区三区视频在线 | 啦啦啦观看免费观看视频高清| a级毛片a级免费在线| 很黄的视频免费| 国内少妇人妻偷人精品xxx网站 | 日本黄色片子视频| 18禁观看日本| 中文字幕av在线有码专区| 国产高清videossex| 欧美中文日本在线观看视频| 一本久久中文字幕| 99国产精品一区二区蜜桃av| 听说在线观看完整版免费高清| 免费电影在线观看免费观看| 18禁黄网站禁片免费观看直播| 亚洲av成人不卡在线观看播放网| 麻豆成人av在线观看| 老司机在亚洲福利影院| 特级一级黄色大片| 国产成人精品久久二区二区免费| 男女那种视频在线观看| 亚洲在线自拍视频| 在线播放国产精品三级| 国产v大片淫在线免费观看| 精品熟女少妇八av免费久了| 亚洲aⅴ乱码一区二区在线播放| 性色av乱码一区二区三区2| 久久香蕉国产精品| 美女高潮喷水抽搐中文字幕| 国产精品免费一区二区三区在线| avwww免费| 啦啦啦免费观看视频1| 成人国产一区最新在线观看| 久久国产乱子伦精品免费另类| 国产精品av视频在线免费观看| 日本 av在线| 黑人欧美特级aaaaaa片| 中文在线观看免费www的网站| 看免费av毛片| 国产伦精品一区二区三区四那| 在线观看舔阴道视频| 亚洲国产日韩欧美精品在线观看 | 高清毛片免费观看视频网站| 国产69精品久久久久777片 | 国产精品98久久久久久宅男小说| 亚洲av五月六月丁香网| 国产精品久久久久久久电影 | 亚洲 国产 在线| 亚洲激情在线av| 久久亚洲真实| 亚洲五月婷婷丁香| 日韩欧美国产在线观看| 精品久久久久久久人妻蜜臀av| 香蕉久久夜色| 我要搜黄色片| 欧美黑人巨大hd| 最近在线观看免费完整版| 在线看三级毛片| 久久伊人香网站| 亚洲一区二区三区不卡视频| 国产精品久久久久久久电影 | 日韩欧美 国产精品| 国内精品一区二区在线观看| 不卡av一区二区三区| 成人高潮视频无遮挡免费网站| 一个人看视频在线观看www免费 | 久久精品亚洲精品国产色婷小说| 99热这里只有是精品50| 午夜精品一区二区三区免费看| 91老司机精品| 久久久久久久久免费视频了| 日日夜夜操网爽| 久久久精品大字幕| 国产在线精品亚洲第一网站| 欧美中文综合在线视频| 色尼玛亚洲综合影院| 高潮久久久久久久久久久不卡| 精品久久久久久久久久免费视频| 麻豆一二三区av精品| 手机成人av网站| 亚洲精品在线美女| 日本黄色视频三级网站网址| 国产99白浆流出| 精品国产亚洲在线| 夜夜看夜夜爽夜夜摸| 欧美又色又爽又黄视频| av国产免费在线观看| 国产精品av视频在线免费观看| 国产精品香港三级国产av潘金莲| av欧美777| 精品国产美女av久久久久小说| 91麻豆精品激情在线观看国产| 五月玫瑰六月丁香| 亚洲av日韩精品久久久久久密| 长腿黑丝高跟| 19禁男女啪啪无遮挡网站| 俄罗斯特黄特色一大片| 亚洲国产欧美一区二区综合| 久久久久九九精品影院| 国产亚洲av嫩草精品影院| 国产欧美日韩一区二区精品| 亚洲色图 男人天堂 中文字幕| 在线看三级毛片| www国产在线视频色| 99久久综合精品五月天人人| 欧美中文综合在线视频| 99热6这里只有精品| 又爽又黄无遮挡网站| 欧美另类亚洲清纯唯美| 成熟少妇高潮喷水视频| 黑人欧美特级aaaaaa片| 中文字幕av在线有码专区| 757午夜福利合集在线观看| 又紧又爽又黄一区二区| 日本成人三级电影网站| 精品国产超薄肉色丝袜足j| ponron亚洲| 日韩成人在线观看一区二区三区| 亚洲欧美日韩无卡精品| 国产真人三级小视频在线观看| 亚洲成人中文字幕在线播放| 亚洲av美国av| 琪琪午夜伦伦电影理论片6080| 亚洲七黄色美女视频| 99国产精品一区二区蜜桃av| 嫁个100分男人电影在线观看| 99热6这里只有精品| 亚洲av电影不卡..在线观看| 中文在线观看免费www的网站| 麻豆一二三区av精品| 激情在线观看视频在线高清| 中文亚洲av片在线观看爽| 成人国产一区最新在线观看| 欧美在线黄色| 黄片小视频在线播放| 国产一区二区三区在线臀色熟女| 欧美成人性av电影在线观看| 午夜福利在线观看吧| 成人av在线播放网站| 久久久国产成人精品二区| 丰满人妻熟妇乱又伦精品不卡| 国产精品乱码一区二三区的特点| 亚洲精品456在线播放app | 久久天躁狠狠躁夜夜2o2o| 久久久色成人| 精品久久蜜臀av无| 男女那种视频在线观看| 免费一级毛片在线播放高清视频| 欧美绝顶高潮抽搐喷水| 在线观看免费视频日本深夜| 神马国产精品三级电影在线观看| 三级男女做爰猛烈吃奶摸视频| 日韩欧美在线乱码| 亚洲国产精品合色在线| 午夜福利在线观看免费完整高清在 | 中国美女看黄片| a在线观看视频网站| 国产精品美女特级片免费视频播放器 | 精品久久久久久久久久久久久| 亚洲在线自拍视频| 天堂av国产一区二区熟女人妻| 成年版毛片免费区| 久久精品91蜜桃| 午夜福利高清视频| 九九久久精品国产亚洲av麻豆 | 国产精华一区二区三区| 欧美日韩一级在线毛片| 亚洲欧美精品综合久久99| 久久久久久久久免费视频了| 岛国在线观看网站| 好男人电影高清在线观看| 欧美在线黄色| 久久香蕉国产精品| 久久久久国内视频| 老司机午夜福利在线观看视频| xxx96com| 国产视频一区二区在线看| 国产蜜桃级精品一区二区三区| 欧美性猛交╳xxx乱大交人| 国产精品女同一区二区软件 | 国产亚洲av嫩草精品影院| 性欧美人与动物交配| 国产 一区 欧美 日韩| 亚洲国产欧美网| 日本黄大片高清| 亚洲熟女毛片儿| 亚洲专区中文字幕在线| 久久久久久人人人人人| 97人妻精品一区二区三区麻豆| 亚洲av美国av| 我要搜黄色片| 俺也久久电影网| 成熟少妇高潮喷水视频| 无限看片的www在线观看| 国产高清视频在线播放一区| 色综合亚洲欧美另类图片| 国内毛片毛片毛片毛片毛片| 99精品久久久久人妻精品| 一卡2卡三卡四卡精品乱码亚洲| 色综合婷婷激情| 日本黄色视频三级网站网址| 亚洲成人中文字幕在线播放| 成人特级av手机在线观看| 国产精华一区二区三区| 欧美国产日韩亚洲一区| 在线十欧美十亚洲十日本专区| 国产高清视频在线播放一区| avwww免费| 国产伦人伦偷精品视频| 99精品久久久久人妻精品| 亚洲国产精品久久男人天堂| 亚洲av成人一区二区三| 欧美日韩精品网址| 波多野结衣高清无吗| 日本精品一区二区三区蜜桃| 午夜亚洲福利在线播放| 国产成人av教育| 午夜精品一区二区三区免费看| 精品福利观看| 18禁黄网站禁片免费观看直播| 俄罗斯特黄特色一大片| 在线看三级毛片| 日日摸夜夜添夜夜添小说| 一个人看的www免费观看视频| 在线视频色国产色| 国产成人福利小说| 十八禁人妻一区二区| 婷婷丁香在线五月| 欧美精品啪啪一区二区三区| 伊人久久大香线蕉亚洲五| 欧美黑人欧美精品刺激| 成人午夜高清在线视频| 很黄的视频免费| 精品久久久久久久人妻蜜臀av| 日本黄色视频三级网站网址| 国产高清激情床上av| 俄罗斯特黄特色一大片| 桃红色精品国产亚洲av| 精品久久久久久久久久久久久| 国产精品99久久久久久久久| 2021天堂中文幕一二区在线观| 女生性感内裤真人,穿戴方法视频| 亚洲aⅴ乱码一区二区在线播放| 国产视频内射| 在线观看舔阴道视频| 精品人妻1区二区| 精品久久久久久久毛片微露脸| 在线免费观看不下载黄p国产 | 欧美日韩国产亚洲二区| 嫩草影视91久久| 99精品欧美一区二区三区四区| 一边摸一边抽搐一进一小说| www.熟女人妻精品国产| 白带黄色成豆腐渣| 欧美av亚洲av综合av国产av| av在线天堂中文字幕| 午夜激情福利司机影院| 99久久99久久久精品蜜桃| 婷婷精品国产亚洲av在线| 色综合站精品国产| 国产真实乱freesex| 亚洲av成人精品一区久久| 国内精品美女久久久久久| 亚洲熟妇中文字幕五十中出| 欧美成狂野欧美在线观看| 日本一本二区三区精品| 国产一级毛片七仙女欲春2| 97超视频在线观看视频| 男插女下体视频免费在线播放| 亚洲人成网站高清观看| 精品不卡国产一区二区三区| 欧美黑人欧美精品刺激| 午夜精品久久久久久毛片777| 国产激情欧美一区二区| 日韩欧美 国产精品| 国产精品日韩av在线免费观看| 精品熟女少妇八av免费久了| 高潮久久久久久久久久久不卡| 三级国产精品欧美在线观看 | 亚洲第一电影网av| 全区人妻精品视频| 黄片小视频在线播放| 操出白浆在线播放| 成人精品一区二区免费| 亚洲美女黄片视频| 欧美激情在线99| 法律面前人人平等表现在哪些方面| 国产黄片美女视频| 一进一出好大好爽视频| 久9热在线精品视频| 中文字幕高清在线视频| 免费看a级黄色片| 欧美性猛交╳xxx乱大交人| 又爽又黄无遮挡网站| 不卡av一区二区三区| 村上凉子中文字幕在线| 岛国在线免费视频观看| 国内久久婷婷六月综合欲色啪| 99视频精品全部免费 在线 | 亚洲成人久久爱视频| 丁香六月欧美| 精品人妻1区二区| 欧美激情在线99| 欧洲精品卡2卡3卡4卡5卡区| 午夜两性在线视频| 国产一区二区激情短视频| 精品无人区乱码1区二区| 无限看片的www在线观看| 一级a爱片免费观看的视频| 国产精品久久久久久人妻精品电影| 成人av在线播放网站| 天堂影院成人在线观看| 国内精品一区二区在线观看| 国内精品美女久久久久久| 欧美日韩中文字幕国产精品一区二区三区| 欧美色欧美亚洲另类二区| 九色国产91popny在线| 国产综合懂色| 18禁观看日本| av在线天堂中文字幕| 特大巨黑吊av在线直播| 国产亚洲精品久久久久久毛片| 亚洲av成人av| av女优亚洲男人天堂 | 国产高清激情床上av| 久久久久九九精品影院| 可以在线观看毛片的网站| av国产免费在线观看| 天天躁日日操中文字幕| 国产av麻豆久久久久久久| 欧美av亚洲av综合av国产av| 色精品久久人妻99蜜桃| 久久热在线av| 日韩欧美国产一区二区入口| 亚洲精品中文字幕一二三四区| 级片在线观看| 久久精品91蜜桃| 国产一区二区三区在线臀色熟女| 成年免费大片在线观看| 成人国产综合亚洲| 日韩欧美三级三区| 国产成人aa在线观看| 欧美日本视频| 最新中文字幕久久久久 | 国产成人啪精品午夜网站| 亚洲精品在线美女| 欧美性猛交╳xxx乱大交人| 狂野欧美激情性xxxx| 日本成人三级电影网站| 国产精品日韩av在线免费观看| 色av中文字幕| 亚洲电影在线观看av| 偷拍熟女少妇极品色| av黄色大香蕉| 神马国产精品三级电影在线观看| 欧美激情在线99| 午夜精品一区二区三区免费看| 亚洲成人精品中文字幕电影| 18美女黄网站色大片免费观看| 淫妇啪啪啪对白视频| 2021天堂中文幕一二区在线观| 啪啪无遮挡十八禁网站| 国产综合懂色| 男人舔女人的私密视频| 国产伦人伦偷精品视频| 制服人妻中文乱码| 一进一出抽搐gif免费好疼| 18禁美女被吸乳视频| 91老司机精品| 日韩欧美精品v在线| 成人无遮挡网站| 欧美国产日韩亚洲一区| 97碰自拍视频| a级毛片在线看网站| 国产1区2区3区精品| 搡老岳熟女国产| 国产亚洲精品久久久com| 天堂av国产一区二区熟女人妻| 啦啦啦免费观看视频1| 毛片女人毛片| 欧美高清成人免费视频www| 少妇人妻一区二区三区视频| 成人无遮挡网站| 9191精品国产免费久久| 男女下面进入的视频免费午夜| 久久九九热精品免费| 午夜日韩欧美国产| 色噜噜av男人的天堂激情| 麻豆国产av国片精品| 中文资源天堂在线| 在线观看一区二区三区| 午夜精品在线福利| 亚洲va日本ⅴa欧美va伊人久久| 波多野结衣高清作品| 久久草成人影院| 中文亚洲av片在线观看爽| 中文字幕熟女人妻在线| www.精华液| 日韩人妻高清精品专区| 一级a爱片免费观看的视频| 美女cb高潮喷水在线观看 | 免费高清视频大片| 狂野欧美激情性xxxx| 国产精品久久久久久久电影 | 天天添夜夜摸| 在线播放国产精品三级| 好男人电影高清在线观看| 91久久精品国产一区二区成人 | 99热6这里只有精品| 一级黄色大片毛片| 亚洲av日韩精品久久久久久密| 黄色丝袜av网址大全| 日韩欧美国产一区二区入口| 男女视频在线观看网站免费| 成人一区二区视频在线观看| 国产又色又爽无遮挡免费看| 国产精品美女特级片免费视频播放器 | 精品一区二区三区视频在线观看免费| 欧美午夜高清在线| 成在线人永久免费视频| 最新美女视频免费是黄的| 2021天堂中文幕一二区在线观| 免费看十八禁软件| 国产午夜精品论理片| 美女黄网站色视频| 国产成人欧美在线观看| 欧美日韩黄片免| 色播亚洲综合网| 欧美乱码精品一区二区三区| 欧美午夜高清在线| 最新在线观看一区二区三区| 免费无遮挡裸体视频| a级毛片a级免费在线| 精品久久久久久久久久免费视频| 少妇丰满av| 99热6这里只有精品| 精品一区二区三区视频在线观看免费| 91久久精品国产一区二区成人 | 国产成人一区二区三区免费视频网站| 黄色成人免费大全| 久久久国产精品麻豆| av黄色大香蕉| 精华霜和精华液先用哪个| 国内精品久久久久久久电影| 亚洲 欧美 日韩 在线 免费| 欧美zozozo另类| 熟妇人妻久久中文字幕3abv| 久久久久久国产a免费观看| 国产久久久一区二区三区| 亚洲真实伦在线观看| 日韩有码中文字幕| 亚洲国产高清在线一区二区三| 91久久精品国产一区二区成人 | 欧美另类亚洲清纯唯美| 大型黄色视频在线免费观看| 青草久久国产| 免费av不卡在线播放| 一夜夜www| 人人妻人人看人人澡| 天堂动漫精品| 法律面前人人平等表现在哪些方面| 久久久国产欧美日韩av| 三级毛片av免费| 不卡一级毛片| a级毛片在线看网站| 又黄又粗又硬又大视频| 国产一区二区激情短视频| 蜜桃久久精品国产亚洲av| 人人妻人人澡欧美一区二区| 午夜精品久久久久久毛片777| 99视频精品全部免费 在线 | 国产成人精品久久二区二区免费| 亚洲,欧美精品.| av黄色大香蕉| 欧美在线黄色| 97超级碰碰碰精品色视频在线观看| 亚洲专区中文字幕在线| 欧美乱妇无乱码| 精品不卡国产一区二区三区| 成人午夜高清在线视频| 国产精品99久久久久久久久| 一个人免费在线观看的高清视频| 99久久精品一区二区三区| 岛国视频午夜一区免费看| 成年女人毛片免费观看观看9| 成人av一区二区三区在线看| 亚洲精品久久国产高清桃花| 又黄又爽又免费观看的视频| 午夜亚洲福利在线播放| 国产成人精品久久二区二区免费| 国产一区二区在线av高清观看| 亚洲人成网站高清观看| 久久婷婷人人爽人人干人人爱| 一卡2卡三卡四卡精品乱码亚洲| 亚洲成人中文字幕在线播放| 两人在一起打扑克的视频| av天堂在线播放| 免费在线观看成人毛片| 波多野结衣高清无吗| 99久久国产精品久久久| 久久久久久人人人人人| 久久久色成人| 999久久久精品免费观看国产| 麻豆av在线久日| 国产精品1区2区在线观看.| 69av精品久久久久久| 一个人看视频在线观看www免费 | 亚洲精品中文字幕一二三四区| 亚洲av成人一区二区三| 亚洲熟妇中文字幕五十中出| 午夜福利成人在线免费观看| 99久久久亚洲精品蜜臀av| а√天堂www在线а√下载| 午夜久久久久精精品| 亚洲专区中文字幕在线| 天天添夜夜摸| 欧美国产日韩亚洲一区| 1000部很黄的大片| 嫩草影院精品99| 校园春色视频在线观看| 美女大奶头视频| 免费看日本二区| 国产精品久久久久久亚洲av鲁大| 久久这里只有精品19| 久久久久亚洲av毛片大全| 老司机午夜十八禁免费视频| 无遮挡黄片免费观看| 亚洲第一欧美日韩一区二区三区| 中文字幕人成人乱码亚洲影| 国内久久婷婷六月综合欲色啪| 亚洲熟妇中文字幕五十中出| or卡值多少钱| 麻豆一二三区av精品| 18禁美女被吸乳视频| 久久香蕉精品热| 久久中文字幕人妻熟女| h日本视频在线播放| 免费大片18禁| 级片在线观看| 亚洲av五月六月丁香网| 后天国语完整版免费观看| 午夜福利在线在线| 一卡2卡三卡四卡精品乱码亚洲| 亚洲欧美日韩无卡精品| 日本在线视频免费播放| 国产精品一及| 国产成人欧美在线观看| 国产蜜桃级精品一区二区三区| 国产在线精品亚洲第一网站| 亚洲av电影在线进入| 天天一区二区日本电影三级| 18禁裸乳无遮挡免费网站照片| 999精品在线视频| 一本一本综合久久| 最好的美女福利视频网| 久久天躁狠狠躁夜夜2o2o| 欧美三级亚洲精品| 男人的好看免费观看在线视频| 国产乱人视频| 欧美日韩一级在线毛片| 亚洲美女黄片视频| 亚洲国产中文字幕在线视频| 国产精品一区二区三区四区久久| 91在线观看av| 久久久久久久精品吃奶| 99视频精品全部免费 在线 | 午夜亚洲福利在线播放| 色综合婷婷激情| 偷拍熟女少妇极品色| 日韩国内少妇激情av| 99国产精品一区二区蜜桃av| 一级黄色大片毛片| 美女cb高潮喷水在线观看 | 免费观看的影片在线观看| 免费在线观看影片大全网站| 黄色片一级片一级黄色片| 午夜福利在线在线| 国产单亲对白刺激| 日韩 欧美 亚洲 中文字幕| 天堂影院成人在线观看| 琪琪午夜伦伦电影理论片6080| 老司机深夜福利视频在线观看| 亚洲av熟女| 国产极品精品免费视频能看的| 1024香蕉在线观看| 中文字幕最新亚洲高清| 综合色av麻豆| 亚洲人成网站在线播放欧美日韩| 在线看三级毛片|