• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Hybrid Model for Anomalies Detection in AMI System Combining K-means Clustering and Deep Neural Network

    2019-07-18 01:58:46AssiaMaamarandKhelifaBenahmed
    Computers Materials&Continua 2019年7期

    Assia Maamar and Khelifa Benahmed

    Abstract: Recently, the radical digital transformation has deeply affected the traditional electricity grid and transformed it into an intelligent network (smart grid).This mutation is based on the progressive development of advanced technologies: advanced metering infrastructure (AMI) and smart meter which play a crucial role in the development of smart grid.AMI technologies have a promising potential in terms of improvement in energy efficiency, better demand management, and reduction in electricity costs.However the possibility of hacking smart meters and electricity theft is still among the most significant challenges facing electricity companies.In this regard, we propose a hybrid approach to detect anomalies associated with electricity theft in the AMI system, based on a combination of two robust machine learning algorithms; K-means and Deep Neural Network (DNN).K-means unsupervised machine learning algorithm is used to identify groups of customers with similar electricity consumption patterns to understand different types of normal behavior.DNN algorithm is used to build an accurate anomaly detection model capable of detecting changes or anomalies in usage behavior and deciding whether the customer has a normal or malicious consumption behavior.The proposed model is constructed and evaluated based on a real dataset from the Irish Smart Energy Trials.The results show a high performance of the proposed model compared to the models mentioned in the literature.

    Keywords: Anomaly detection, advanced metering infrastructure (AMI), smart grid, behavior, machine learning, deep neural network (DNN), cyber-security.

    1 Introduction

    In recent years, there has been a global trend to optimize the use of electrical networks by automating and transforming all parts of the traditional electrical power grid: from the user’s household electrical appliances to the power-generating stations into an interactive and intelligent grid.The need to improve reliability, increase efficiency, enhance flexibility and reduce losses in the conventional power grid has led to the development of smart meters and advanced metering infrastructure, which are the basis for smart grid and smart energy solutions.

    AMI is system that replaces traditional mechanical electric meters with a system that integrates electronic smart meters, communication networks, data centers and software to improve and automate meter data collection in order to improve customer service by providing better quality power, dynamic pricing, and billing accuracy.Additionally, the AMI system enables the improvement of power grid operations such as: remote meter reading, load management and demand response, power outage identification and equipment monitoring.

    However, digitization and automation of the AMI system exposed this system and even its components to cyber-security risks.Many cyber-security experts [Zetter (2015); Weaver (2015); Ayers (2017)] have proven that the smart meter, which is the foremost component of AMI system, has become a potential target of cyber-attacks and hacking attempts.These malicious attempts (on AMI system) usually aim to realize several outcomes: 1) data theft; 2) electricity theft; and 3) localized or widespread denial of electricity [Wilshusen (2015); Weaver (2017); Foreman and Gurugubelli (2015); Hansen, Staggs and Shenoi (2017)].Electricity theft is among the most dangerous and popular attacks on the AMI system.

    According to a recent study, global losses due to electricity theft in 2015 were estimated to around $89.3 billion [Sanders (2016)].Electricity companies have launched smart meters deployment to prevent electricity fraud.However, these digital devices have not proven to be effective defense measures against these phenomena.In May 2010, the federal bureau of investigation (FBI) reported what it considered to be the first case of widespread smart grid fraud.The event dates back to 2009: the puerto rico electric power authority (PREPA) discovered that about 10% of its smart meters were hacked, leading to electricity theft, which cost companies $400 million per year, according to estimates reported in Krebs [Krebs (2012)].In October 2014, BBC News claimed that smart meters in Spain were hacked; causing several fraudulent acts [Ward (2014)].In Quebec, the director of Physical Security estimates that the energy theft can reach up to 1% of the volume of electricity sales ($11.6 billion in 2015) [Boily (2016)].

    Experts have recently implemented various approaches to address this situation.These approaches can be categorized as: a) Game-theory based, b) State based, c) Artificialintelligence and machine learning (AI&ML) based

    The game-theory based approaches [Amin, Schwartz and Tembine (2012); Cardenas, Amin, Schwartz et al.(2013)], consist in modeling the energy theft detection issue as a game between the power company and the electricity thief.These techniques present a medium detection rate (DR) and medium false positive rate (FPR).The most challenging issue about these models is how to define and formulate interactions between individuals (called “players”) in the form of a utility function.

    State-based detection approaches used a monitoring paradigm which can be realized by means of a combination of information generated from advanced devices such as: AMI technologies [Kadurek, Blom, Cobben et al.(2010)], wireless sensors [McLaughlin, Holbert, Zonouz et al.(2012); Lo and Ansari (2013); Yerra, Bharathi, Rajalakshmi et al.(2011)], and RFID [Khoo and Cheng (2011)].State-based models are characterized by a high DR and low FPR.However the cost of implementing these models is very high due to the use of specific equipment.

    Artificial-intelligence and machine learning based approaches [Glauner, Meira, Valtchev et al.(2017); Messinis and Hatziargyriou (2018)] play a major role in detecting electricity theft.The main idea of these systems is to perform a behavioral analysis based on smart meters data.This analysis aims at extracting normal or usual energy consumption patterns and building typical consumption profiles.Any deviation from the expected behavior or pattern can be interpreted as a sign of fraudulent or malicious activity.

    This paper lays focus on the detection of anomalies in AMI systems as a result of electricity theft.AI & ML approaches are among the most used and efficient solutions in this regard.These approaches can be classified into four subcategories: classificationbased, load forecasting-based, clustering-based and hybrid-based.

    In the following part, we review the existing Electricity theft detection models in the literature, according to the AI & ML algorithms utilized.

    Supervised classification-based: This subcategory refers to the case where a model or classifier can be constructed only based on labeled dataset in order to classify consumers’ behavior into normal and fraudulent.

    Nizar et al.[Nizar, Dong and Wang (2008)] used an extreme learning machine (ELM) algorithm to build an energy theft detection model based on 48 smart meter readings per day.ELM algorithm refers to a type of neural network whose specificity is to have only one hidden layer neurons; the network weights connecting input with the hidden layer neurons are randomly assigned and never updated, while weights between the hidden and output layer neurons are calculated just in a single step.In addition, due to the possible changes in consumer characteristics for some applications (these changes are usually not presented in the current training set); the authors have developed an online version of ELM (OS-ELM) to solve this problem.An intelligent system proposed by Muniz et al.[Muniz, Figueiredo, Vellasco et al.(2009)].This system is composed of two modules: filtering and classification, each one comprises a set of five artificial neural networks.The features used by each neural network are calculated based on historical data and some pre-computed attributes specific to the customer.The filtering module was implemented to identify normal and suspect consumers for the classification module training.In order to improve the detection accuracy rate, this work is extended in [Muniz, Vellasco, Tanscheit et al.(2009)] by introducing a neuro-fuzzy hierarchical system in the classification step.In [Nagi, Yap,Tiong et al.(2010)], the authors used support vector machine (SVM) method to build a binary classifier by using historical data of energy consumption, which is able to detect anomalous consumption behavior, known to be highly associated with fraudulent acts.In addition to the calculation of daily average consumptions features per month, a credit worth ranking (CWR) was calculated to indicate whether a customer delays or evades the payment of bills.These features are usually implemented during the training process in the case of a SVM with a Gaussian kernel.This work is extended in Nagi et al.[Nagi, Yap, Tiong et al.(2011)] where authors combined SVM classifier with a fuzzy inference system-FIS in order to improve the detection hit-rate.The SVM model for energy theft detection was developed in Depuru et al.[Depuru, Wang and Devabhaktuni (2011)].The main idea of this model is to generate an approximation of electricity consumption patterns of customers based on historical consumption data.In the training phase, the SVM classifier was trained with both normal and theft samples.During the validation phase, new samples were classified by a parallel combination of the SVM model and three other rules into three classes: (a) genuine, (b) illegal, or (c) suspicious customers.An extended version of this work is presented in other studies.In Depuru et al.[Depuru, Wang and Devabhaktuni (2012)] a data encoding technique was utilized to minimize the complexity of the instantaneous energy consumption data for evaluation.Furthermore, Depuru et al.applied a system with high performance computing (HPC) algorithms in order to generate a simple and faster classification model for illegal consumers detection with a high accuracy rate [Depuru, Wang, Devabhaktuni et al.(2013)].

    Clustering-based methods consist of unsupervised machine learning techniques.Clustering is used to perform an exploratory analysis of unlabeled input data in order to identify hidden patterns in the data or to assemble the similar data into clusters.

    In Angelos et al.[Angelos, Saavedra, Cortes et al.(2011)], five features were extracted from historical data of energy consumption of over a period of six months: average consumption, maximum consumption, standard deviation, number of inspections and average consumption of the residential area.These features are used in a fuzzy c-means clustering algorithm to group customers with similar electricity usage profiles.Then, a fuzzy membership matrix and the euclidean distance measure were used to classify normal and irregular customers.Density-based spatial clustering of application with noise (DBSCAN) algorithm was used in Badrinath Krishna et al.[Badrinath Krishna, Weaver and Sanders (2015)] to detect and mitigate electricity theft attempts by detecting abnormal electricity consumption patterns.This approach includes two steps; in the first step, dimensionality reduction is applied using the principal component analysis (PCA) on electricity smart meters readings, where each point refers to a week of consumption readings for a single customer in a 2D space.Afterwards, DBSCAN algorithm is applied to irregular point detection that are far from the dense cluster and represent weeks with anomalous patterns of electricity consumption, which imply the existence of potential electricity theft attempts.Density clustering method is used in Zheng et al.[Zheng, Wang, Chen et al.(2018)] to detect irregular electricity patterns.This method depends on the calculation of two values for each data sample ρi: its local density and its distance δifrom samples with high density.In the majority of cases, the data samples with large γi=ρi?δiare considered as cluster centers and those with small ρiand large δiare considered as abnormal points.Electricity consumption data of 391 users for a period of one month are used to test and validate this method.The load profiles of 100 users are processed by five types of attacks to evaluate the performance of density clustering method according to the assumed scenarios.

    The load forecasting-based techniques can be used to realize an electricity load forecasting model during a specific period of time followed by a comparison of the forecast value of electricity consumption of customer with the one measured in reality.

    An auto regressive moving average (ARMA) model is used by Mashima et al.[Mashima and Cardenas (2012)] for the sake of modeling the probability distributions for both normal and abnormal consumption electricity patterns, they also applied the generalized likelihood ratio (GLR) test to detect electricity theft attacks, assuming that the probability distribution applied by the attacker decreases the average value of real consumption.In Krishna et al.[Krishna, Iyer and Sanders(2016)], the authors used an auto-regressive integrated moving average (ARIMA) model to build an electricity theft detection model which consists in comparing the measured and predicted values, assuming that the prediction model has been trained solely with normal samples.The possibility of fraudulent behavior increases with the rise of the difference between the real and the predicted values.In Ford et al.[Ford, Siraj and Eberle (2014); Cody, Ford and Siraj (2015)], authors used respectively a neural network and decision tree algorithm to build a predicting model by learning the electricity consumption behavior of the consumer using historical data.Afterwards, the model will be able to predict future electricity consumption measurements.The root mean squared error (RMSE) is used to detect any deviation between predicted and measured values in order to indentify fraudulent activities.

    Hybrid-based methods: researchers designed hybrid methods by combining the different algorithms and techniques described above.In Jokar et al.[Jokar, Arianpoo and Leung (2016); Jindal, Dua, Kaur et al.(2016)] the authors combined an SVM classifier respectively with K-means and the decision tree algorithm to build an electricity theft detection model with a higher detection performance.

    According to the above discussion, the proposed machine learning models for electricity theft detection have several shortcomings that can be summed up as follows:

    · In most study cases, available datasets are unlabeled; in fact, it is hard to obtain theft samples, which leads to limitations in the DR.

    · In the majority of the abovementioned approaches, only electricity consumption data are utilized as inputs.

    · Many non-malicious factors such as the number of residents, seasonality and different usage habits during weekdays were not taken into consideration during the development of those models.These factors can alter the electricity consumption patterns and therefore generate false alarms.

    This paper is interested in anomaly detection within the AMI data, which is the result of electricity theft.In this context, we suggest a novel hybrid approach based on a combination of two robust machine learning algorithms; K-means and deep neural network algorithm.

    The principal idea behind the proposed approach is to model the normal consumption behavior of customers based on electricity consumption data and looking for eventual deviations from this model.

    The main contributions of this paper can be summarized as explained below:

    1.We present a novel and robust hybrid approach for anomaly detection in AMI data, by combining the advantages of both unsupervised clustering and supervised classification, K-means-DNN approach is particularly effective for anomaly detection in the case of unlabeled and large data sets.

    2.Introducing a new neural network model for electricity theft detection by incorporating specific features: residents number, season and day type as input elements.This model provides a practical solution to eliminate non-malicious factors effects and reduces the possibility of false alarms.

    3.We evaluate the performance of the K-means-DNN model with real data obtained from the Irish Smart Energy Trials.

    In order to assess our proposed model and perform a comparison with the best and most recent electricity theft detection solutions, we generate a synthetic attack dataset based on threat model that has already been defined and used in these solutions.The results obtained demonstrate that the proposed model is quite accurate and significantly effective in detecting electricity theft in comparison with the previous proposals.

    Besides the discussion of previous work performed in electricity theft detection, this paper comprises four sections; the first provides the description and preprocessing steps of the available data, the second describes the architecture of the proposed K-means-DNN electricity theft detection model, the following section is devoted to the results obtained, and in the next section we discuss our findings and compare them with the preceding ones, and the last section concludes the whole paper.

    2 Data

    In Ireland, CER started a process of installing thousands of smart meters in Irish residential consumers, small and medium enterprises (SMEs) buildings, as part of a trial that aimed at studying and adopting smart metering technologies.This experiment lasted eighteen months during which a dataset [Irish Social Science Data Archive (2012)] was generated by collecting readings of smart meters from consumers.In addition, pretrial and post-trial surveys have been contributed by consumers.A pre-trial survey was done with the purpose of getting residential consumers information about the following aspects:

    · Demographic profile of residents to provide information such as number of persons residing in each home and their age ranges, household revenue, age categories and employment status.

    · Physical features of the residence such as floor size, residence type, number of bedrooms.

    · Type and number of electrical devices in the residence.

    The smart metering data are stored in six different CSV files, each file has been formatted as follows: meter’s ID, the date and time of data collection, and the amount of consumed electricity in KW each 30 minutes.

    2.1 Data preprocessing

    The data preprocessing phase is relatively important.This phase determines the quality of the machine learning models generated since, the development of an effective machine learning model does not depend only on the algorithm used but also on the quality of the data with which the model is built and evaluated.Generally, real data are often incomplete (missing values, simplified data), noisy (errors and exceptions), inconsistent (naming, coding).Therefore, to achieve better results in energy theft detection, a variety of data pre-processing techniques were used before implementing any machine learning algorithm [Han, Kamber and Pei (2012)].Fig.1 describes the major data pre-processing methods utilized on the raw energy consumption data: data integration, data cleaning, missing values imputation and feature selection.

    2.1.1 Data integration

    During the integration phase, we have combined smart metering files and demographic data into a single structure in order to set up single formatted dataset.

    2.1.2 Data cleaning

    Data in the dataset can comprise several types of errors such as missing information, inaccuracies, and so on.The improper part of the processed data can be replaced, modified or deleted.Data cleansing refers to the operation of detecting, identifying and removing errors that are present within the data stored in the dataset.Electricity consumption data are processed as time series data, so to find the missing values; it suffices to find the missing timestamps.When the percentage of missing values is high for a particular consumer, the data related to this consumer will be eliminated.However, if the missing values for a particular consumer for a specific day and time are scarce, they will be replaced by the average electricity consumption for that particular day and time.

    2.1.3 Feature extraction and selection

    These are two major methods of pre-processing that directly impact the accuracy of the model.Feature selection is a method of selecting some features out of the dataset and leaving out the irrelevant ones, while the extraction feature consists in transforming, calculating, and combining the original features, to construct a new set of features according to the specific requirements of the ML algorithm.In Section 3, more details about this process will be provided.

    3 Proposed methodology

    Figure 1: Essential pre-processing steps of data before applying machine learning techniques

    This section describes the proposed methodology for the detection of eventual anomalies in AMI system.K-means-DNN methodology has two principal stages, as shown in Fig.2.In the first stage, K-means algorithm is implemented to group customers with similar electricity consumption patterns to understand different types of normal behavior.The second stage utilizes an accurate deep neural network algorithm, besides using electricity consumption data our proposed DNN incorporates specific variables as inputs such as: residents number, season and day type in order to build an accurate detection model capable of classifying customers as a normal or abnormal (malicious) based on consumption patterns.Fig.2 exemplifies the principle idea behind the proposed methodology.The two major steps composing this methodology are explained in the subsequent sections in detail.

    3.1 The k-means clustering method

    The clustering procedure is an essential step to identify the different normal types of customers.It generates homogeneous clusters from a heterogeneous population of customers, according to their electricity usage behavior.The k-means algorithm is probably the most commonly used clustering method in this context, on the one hand due to its simplicity of implementation and on the other hand because it can provide a good approximation of the desired segmentation.The k-means method groups customers into separate clusters.Thus K-means algorithm serves to construct a typical pattern of electricity consumption by observing different customers clusters.Before starting the clustering process, it is necessary to define or extract a set of features that describes the consumption behavior of each customer.Such features are then used to group customers into k clusters.The features set is constructed by computing the following average and percentage measurements for each customer.

    Figure 2: Illustration of the proposed K-means-DNN methodology

    · The percentages of electricity consumed during each week day (from Monday through Sunday).

    · The percentage of electricity consumed during six different day segments: early morning (7 h-9 h), morning (9 h-13 h), early afternoon (13 h-17 h), late afternoon (17 h-21 h), night (21 h-1 h) and late night (1 h-7 h).

    · The total electricity consumed over the test period in KW.

    · The average yearly, monthly, weekly, daily, and hourly consumed electricity in KW.· The percentages of electricity consumed over the weekend (WE) and over business days (BD).

    The different steps of k-means clustering process are demonstrated in Fig.3.The initial phase consists in performing features extraction from the previously processed data.The extracted features are then used to run k-means clustering.In general, during the k-means clustering process, it is necessary to choose an optimal number of clusters that will highlight the interesting patterns of energy consumption within the dataset.Therefore, the final phase in this process is to assess the k-means clustering process by using the clustering validity indices: silhouette, dunn and davies-bouldin.Afterward, we eliminate groups with a limited number of members.In the next step, only the remaining groups are used for the training of the DNN classifier.Using k-means in this level aims at enhancing classification and reducing false positives.

    3.2 Deep neural network methodology

    Figure 3: The three Steps of the K-means process

    Deep learning is a sub-domain of machine learning which utilizes algorithms inspired from the brain’s neural networks structure and function.For this reason, the models used in the deep learning process are the artificial neural networks (ANNs).An artificial neural network is a computational system that includes many small processing-units called neurons that are arranged in several layers of input, hidden, and output neurons.Their immense capability to learn from massive and complex data has made them the best alternative for machine learning experts.It is worth mentioning that different ANN structures are used to solve machine learning problems.The ANN structure chosen in this paper is a multi-layer neural network (MLNN) that contains multiple hidden layers, also called a deep neural network.A multi-layer neural network is an oriented network of artificial neurons organized into several layers in which information flows from the input layer to the output layer.Neurons are interconnected by weighted connections.The implementation of a multilayer neural network to solve a specific problem requires the determination of the most appropriate weights for each inter-neuronal connection.This determination is carried out through a back-propagation algorithm [Kim (2017)].MLNN consists of a variable number of neurons and layers.A single-layer neural network is the simple architecture of a neural network with single input and output layers.A multilayer neural network is produced by adding hidden layers to a single-layer neural network; therefore, the multi-layer neural network is composed of an input layer, one or more hidden layers, and an output layer.A multi-layer neural network that contains two or more hidden layers is called a deep neural network [Kim (2017)].Fig.4 shows a descriptive representation indicating the mathematical model of an artificial neuron and the structure of a multi-layer neural network with L hidden layers.

    In Haykin [Haykin (1999)] the author states that the neuron process can be described mathematically by the following equations:

    where, x1, x2...xmare the m input elements.

    wi,1, wi,2,..., wi,mare the corresponding weights of the connections.

    bi is the bias.

    Figure 4: The Multi-layer Neural Network (MLNN) structure with L hidden layers.

    fi is called the activation function of the ith neuron.

    yi is the output of the ith neuron.

    In this study, DNN is used to build an anomaly detection model that is able to detect changes or anomalies in usage behavior and identify whether the customer has a normal or malicious consumption behavior.

    It is well known that electricity consumption patterns differ according to several factors such as the number of residents, seasonality, and different consumption habits of the users during weekdays (BD and WE).If these factors are not addressed in an appropriate way, they will increase significantly the FPR.In order to reduce false positives, and unlike most of the previous electricity theft detection systems which were based solely on consumption data, our proposed DNN structure incorporates specific input features: residents number, season and day type.The proposed DNN structure consists of three different types of layers.The first layer (or input layer) includes various features, 24 measurements of electricity consumption per a day, residents number, season and day type (BD or WE).Consequently, 27 is the total number of neurons in the input layer.The second layer usually comprises a few hidden layers having a varied number of neurons.The ultimate layer is an output layer which represents the classification result of the DNN; it consists of two normal or abnormal (malicious) classes.The DNN classifier is trained with scaled conjugate gradient back propagation.The main structure of the proposed DNN is shown in Fig.5, with parameters described in Tab.1.

    Table 1: Parameters of DNN

    Figure 5: Deep neural network architecture

    3.3 Performance metrics

    In order to evaluate the performance of the DNN classifier, the detection rate (DR) the false positive rate (FPR) and the accuracy rate were used.These performance evaluation metrics can be calculated from the confusion matrix and defined as explained below.The confusion matrix severs the entire dataset into four (04) parts: true positive (TP), false positive (FP), false negative (FN) and true negative (TN).TP, FP, FN, and TN refer to the numbers of positives correctly predicted as positives, negatives falsely predicted as positives, positives falsely predicted as negatives, and negatives correctly predicted as negatives respectively.

    The detection rate (DR) is also referred to as recall, true positive rate, or hit rate in the literature.This evaluation metric indicates the ratio of samples classified as abnormal to the total number of abnormal samples in the dataset.DR is defined as:

    FPR is the ratio of the number of samples incorrectly classified as positives (false alarms) to the total number of negatives.FPR is one of the most significant metrics due to the fact that false positives lead to important operational costs to organizations working on electricity theft detection as a result of unnecessary smart meter inspections.FPR is defined as:

    The accuracy (ACC) of the classifier refers to the percentage of the correct predictions.

    A good classifier has to present high detection and accuracy rates, as well a low false positive rate.

    4 Evaluation results

    In this section, we present the evaluation results of our hybrid model for electricity theft detection in AMI system.We build and evaluate our proposed model based solely on the data of residential consumers.As a first step, we identify groups of customers with similar electricity consumption patterns to understand different types of normal behavior.With this aim, we execute k-means algorithm based on the features set described in section 3 and vary the number of clusters K from 3-10.The determination of the most appropriate number of clusters k is performed using clustering validity indices; i.e., silhouette, dunn and davies-bouldin.A number k of clusters is considered to be the optimal number if at least two indexes reach their optimal values with it.In the case of an optimal number of clusters, silhouette and dunn indexes must attain their highest values whereas davies-bouldin index must attain its minimum value.Tab.2 describes the value of each clustering validity index obtained after using the k-means algorithm with a number of K clusters varying from 3 to 10.We can observe that the optimal value of the three validity indexes correspond to the number of clusters K=10.Consequently, the optimal number of clusters is considered equal to 10 (k=10).

    Table 2: Values of different cluster validity indexes with varying numbers of clusters

    In order to lessen the contamination of the benign dataset by non-detected threats, we eliminate groups with few members.Clusters that group a large number of customers with similar consumption behaviors are used as benign sample to train and test the DNN classifier.As a second step, we evaluate the DDN anomaly detection model.For this purpose, we use a dataset representing the clusters that group a large number of customers with similar behaviors, obtained by K-means clustering.The dataset consists of only the benign samples which belong to customers with normal behavior.Based on dataset and the pre-trial survey described in Section 2, we generate samples in the appropriate format.For each customer, we create a file that includes 535 samples where each sample is a vector of 27 features representing the detailed 24-hour electricity consumption of the respective day, day type, season and residents number.Then, based on these benign samples, for each sample x = {x1, ..., x27}, we take only features x1.......x24representing the detailed 24-hour electricity consumption to generate a set of six genres of malicious samples as defined in Jokar et al.[Jokar, Arianpoo and Leung (2016)] as explained below:

    For t = 1,........., 24:

    ?1(xt)=αxt, α = random (0.1, 0.8);

    ?2(xt)=βxt

    ?3(xt)=γtxt, γt= random (0.1, 0.8);

    ?4(xt)=γtmean(x), γt= random (0.1, 0.8);

    ?5(xt)=mean(x);

    ?6(xt)=x24-t.

    In the remaining part of this section, we present the evaluation results of DNN anomaly detector.We perform the evaluation process in two experimental scenarios according to the type of attacks; the fixed type and combined ones.

    Figure 6: Ratios of benign and malicious samples in training and testing sets

    The two experimental scenarios are performed on the basis of data related to approximately 3000 customers, in which each dataset has been divided into a training set (72%) and a testing set (28%) as shown in Fig.6.

    4.1 Scenario1- fixed attack

    In scenario 1, the performance of DNN classifier in detecting each attack is evaluated and tested separately.For this reason we have generated different datasets for each customer based on the six types of attacks mentioned above.Dataset separation into training and testing sets is an essential part in the evaluation process.This procedure is performed in as follows: within 535 samples of the benign dataset, 383 are used for training and 152 are utilized for testing.During each seven successive days two samples are selected in a random way for the testing set and the other five are selected for the training set.In the same way, for the selected attack type, 535 malicious samples are generated.383 samples are utilized for training and the other 152 samples are used for the testing phase.

    Tab.3 describes in detail the statistics of benign and malicious samples utilized in each experiment (i) where i vary from 1 to 6 according to the type of malicious samples used.

    Table 3: Statistics of benign and malicious samples used in scenario 1

    Tab.4 and Tab.5 present the evaluation results for a certain number of customers in terms of DR and FPR, respectively.

    Table 4: Performance results in terms of DR according to scenario 1

    Table 5: Performance results in terms of FPR according to scenario 1.

    The evaluation results displayed that the DNN classifier achieved a significantly satisfactory detection performance.Fig.7, Fig.8 and Fig.9 illustrate the ROC curve according to scenario 1, showing the detection performance of three customers: the best, intermediate and worst.

    Figure 7: ROC curves for a customer with the best detection performance according to scenario 1

    Figure 8: ROC curves for a customer with average detection performance according to scenario 1

    4.2 Scenario 2-Combination of six types of attacks

    In this scenario, we test and evaluate the efficiency of the DNN classifier in detecting several types of attacks at the same time.The classifier is trained and tested using benign and malicious samples of six types.Tab.6 describes in detail the statistics of benign and malicious samples used in scenario 2.In order to avoid biased results of the classifier towards class of attacks, we have duplicated members of the class comprising benign samples.

    Table 6: Statistics of benign and malicious samples used in scenario 2

    Figure 9: ROC curves for a customer with the worst detection performance according to scenario 1

    Table 7: The Performance results in terms of DR, FPR and ACC according to scenario 2 with elimination of specific features

    Table 8: The Performance results in terms of DR, FPR and ACC according to scenario 2

    For this experimental scenario, the average value of DR and FPR reached 95.38% and 8.86%, respectively, which is very good detection performance.We have re-implemented scenario 2 for a certain number of customers, with one difference that we removed the features related to type of day, season, and residents number.The input features of the classifier in this modified scenario consist solely of consumption data.The evaluation results for this experiment in addition to scenario 2 are classified in terms of DR, FPR and ACC as presented in Tab.7 and Tab.8 respectively.

    By comparing the results presented in Tab.7 and Tab.8, we notice that with the elimination of specific features, the DR values decrease and FPR values increase, which limits the detection performance.The results obtained prove the utility of using these features as input variables to enhance the detection performance of DDN anomaly detector.

    Fig.10 illustrates the ROC curve for three customers with best, average and worst detection performances.

    5 Discussion and comparison

    Generally, the normal behavior of electricity consumption varies from one customer to another.(Normal electricity consumption behavior is not the same for every customer).Therefore, it is necessary to identify and extract different normal patterns of electricity consumption especially when dealing with a large and unlabeled electricity consumption dataset.For this reason, the K-means algorithm is used to identify groups of customers with similar electricity consumption patterns to understand different types of normal behavior before training the classifier on these clusters.The aim of the clustering step at this level is to improve the classification process and reduce false positives.

    Figure 10: ROC curves for three customers with the best, intermediate, and worst detection performance according to scenario 2

    Moreover, several factors can alter the normal consumption pattern of customers such as the number of residents, seasonality and different consumption habits of the customer during weekdays knowing that such factors can cause more false positives.In order to reduce the impact of these factors, we utilized DNN, which is considered as the most successful ML algorithm for classification purposes and trained it with specific and suitable features so as to achieve high classification performance in terms of DR, FPR and ACC.

    In Tab.9 and Tab.10 we compare the proposed model with the most recent and best electricity theft detection systems mentioned in the available literature.

    Table 9: Comparison among electricity theft detection models

    Table 10: Comparison of the proposed model with Density Clustering method in terms of ACC

    6 Conclusions

    In this paper, we have proposed a novel hybrid approach for detecting electricity theft in AMI system known as the K-means-DNN.This approach consists in modeling the normal consumption behavior patterns of customers.Any significant deviation from this model is identified as malicious patterns.

    The numerical results according to the two experimental scenarios demonstrate the effectiveness of the proposed approach for detecting anomalies associated with electricity theft, cascading two machine learning algorithms K-means and DNN anomaly detector provide a high detection performance and make the detection model robust against contamination threats.

    Furthermore, the incorporation of specific features such as type of day, residents number, and season as inputs in addition to electricity consumption data reduces the generation of false alarms generated by non- malicious factors.

    Moreover, this approach is considered as an initial step towards using deep learning for the sake of electricity theft detection; the results are quite encouraging and pave the way for the use of other deep learning techniques in the future.

    In this paper, the proposed model for electricity theft detection can be categorized as entirely data-oriented model because it relies heavily on customer-related data (for example electricity consumption, consumer type etc.).

    As a perspective work, we intend to integrate new features such as a weather conditions, number of available appliances and their usage pattern, etc.

    Moreover, this model can be hybridized with network oriented models by means of electricity grid data such as network topology or network measurements to achieve higher detection performances.

    References

    Amin, S.; Schwartz, G.A.; Tembine, H.(2012): Incentives and security in electricity distribution networks.Proceeding of International Conference on Decision and Game Theory for Security, vol.7638, pp.264-280.

    Angelos, E.; Saavedra, O.R.; Cortes, O.A.; de Souza, A.N.(2011): Detection and identification of abnormalities in customer consumptions in power distribution systems.IEEE Transactions on Power Delivery, vol.26, no.4, pp.2436-2442.

    Ayers, C.E.(2017): The cyber/smart grid tech threat to the integrated north american critical electric infrastructure.https://skyvisionsolutions.files.wordpress.com/2017/03/ayers-testimony-for-mi-housecommittee-7-march-2017.pdf.

    Badrinath Krishna, V.; Weaver, G.A.; Sanders, W.H.(2015): PCA-based method for detecting integrity attacks on advanced metering infrastructure.Proceedings of the 12th International Conference on Quantitative Evaluation of Systems, vol.9259, pp.70-85.

    Boily, Y.H.(2016): Electricity theft.http://plus.lapresse.ca/screens/2557411e-22c9-4465-97a8-5e52c68add38__7C__BI33naXblYl-.html.

    Cardenas, A.A.; Amin, S.; Schwartz, G.; Dong, R.; Sastry, S.(2013): A game theory model for electricity theft detection and privacy-aware control in AMI systems.Proceedings of IEEE Allerton Conference Communication, Control, and Computing, pp.1830-1837.

    Cody, C.; Ford, V.; Siraj, A.(2015): Decision tree learning for fraud detection in consumer energy consumption.Proceedings of IEEE, 14th International Conference on Machine Learning and Applications, pp.1175-1179.

    Depuru, S.; Wang, L.; Devabhaktuni, V.(2011): Support vector machine based data classification for detection of electricity theft.Proceedings of Power Systems Conference and Exposition, pp.1-8.

    Depuru, S.; Wang, L.; Devabhaktuni, V.(2012): Enhanced encoding technique for identifying abnormal energy usage pattern.Proceedings of IEEE North American Power Symposium, pp.1-6.

    Depuru, S.; Wang, L.; Devabhaktuni, V.; Green, R.C.(2013): High performance computing for detection of electricity theft.International Journal of Electrical Power & Energy Systems, vol.47, pp.21-30.

    Ford, V.; Siraj, A.; Eberle, W.(2014): Smart grid energy fraud detection using artificial neural networks.Proceedings of IEEE Symposium on Computational Intelligence Applications in Smart Grid.

    Foreman, J.C.; Gurugubelli, D.(2015): Identifying the cyber attack surface of the advanced metering infrastructure.Electricity Journal, vol.28, no.1, pp.94-103.

    Glauner, P.O.; Meira, J.A.; Valtchev, P.; State, R.; Bettinger, F.(2017): The challenge of nontechnical loss detection using artificial intelligence.International Journal of Computational Intelligence Systems, vol.10, no.1, pp.760-775.

    Han, J.; Kamber, M.; Pei, J.(2012): Data Preprocessing.Data Mining: Concepts and Techniques.Elsevier, Kaufmann, M., USA.

    Hansen, A.; Staggs, J.; Shenoi, S.(2017):Security analysis of an advanced metering infrastructure.International Journal of Critical Infrastructure Protection, vol.18, pp.3-19.

    Haykin, S.(1999): Neural Networks and Learning Machines.Prentice Hall, Ontario.

    Irish Social Science Data Archive(2012):Irish social science data archive.http://www.ucd.ie/issda/data/commissionforenergyregulationcer.

    Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.et al.(2016): Decision tree and SVM-based data analytics for theft detection in smart grid.IEEE Transactions on Industrial Informatics, vol.12, no.3, pp.1005-1016.

    Jokar, P.; Arianpoo, N.; Leung, V.C.M.(2016): Electricity theft detection in AMI using customers’ consumption patterns.IEEE Transactions on Smart Grid, vol.7, no.1, pp.216-226.

    Kadurek, P.; Blom, J.; Cobben, J.; Kling, W.(2010): Theft detection and smart metering practices and expectations in the Netherlands.Proceedings of IEEE/PES Innovative Smart Grid Technologies Conference Europe, pp.1-6.

    Khoo, B.; Cheng, Y.(2011): Using RFID for anti-theft in a Chinese electrical supply company: A cost-benefit analysis.Proceedings of IEEE Wireless Telecommunications Symposium, pp.1-6.

    Kim, P.(2017): Neural Networks and Artificial Intelligence.MATLAB Deep Learning with Machine Learning.Apress, New York.

    Krebs, B.(2012): FBI: smart meter hacks likely to spread.http://krebsonsecurity.com /2012/04/fbi-smart-meter-hackslikely-to-spread.

    Krishna, V.B.; Iyer, R.K.; Sanders, W.H.(2016): ARIMA-based modeling and validation of consumption readings in power grids.Proceedings of International Conference on Critical Information Infrastructures Security, vol.9578, pp.199-210.

    Lo, C.H.; Ansari, N.(2013): CONSUMER: A novel hybrid intrusion detection system for distribution networks in smart grid.IEEE Transactions on Emerging Topics in Computing, vol.1, no.1, pp.33-44.

    Mashima, D.; Cardenas, A.A.(2012): Evaluating electricity theft detectors in smart grid networks.Proceeding of Research in Attacks, Intrusions, and Defenses, vol.7462, pp.210-229.

    McLaughlin, S.; Holbert, B.; Zonouz, S.; Berthier, R.(2012): AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures.Proceedings of IEEE Third International Conference on Smart Grid Communications, pp.354-359.

    Messinis, G.M.; Hatziargyriou, N.D.(2018): Review of non-technical loss detection methods.Electric Power Systems Research, vol.158, pp.250-266.

    Muniz, C.; Figueiredo, K.; Vellasco, M.; Chavez, G.; Pacheco, M.A.C.(2009): Irregularity detection on low tension electric installations by neural network ensembles.Proceedings of IEEE - INNS - ENNS International Joint Conference on Neural Networks, pp.2176-2182.

    Muniz, C.; Vellasco, M.; Tanscheit, R.; Figueiredo, K.A.(2009): Neuro-fuzzy system for fraud detection in electricity distribution.Proceedings of IFSA/EUSFLAT Conference, pp.1096-1101.

    Nizar, A.H.; Dong, Z.Y.; Wang, Y.(2008): Power utility nontechnical loss analysis with extreme learning machine method.IEEE Transactions on Power Systems, vol.23, pp.946-955.

    Nagi, J.; Yap, K.S.; Tiong, S.K.; Ahmed, S.K.; Mohamad, M.(2010): Nontechnical loss detection for metered customers in power utility using support vector machines.IEEE Transactions on Power Delivery, vol.25, no.2, pp.1162-1171.

    Nagi, J.; Yap, K.S.; Tiong, S.K.; Ahmed, S.K.; Nagi, F.(2011): Improving SVMbased nontechnical loss detection in power utility using the fuzzy inference system.IEEE Transactions on Power Delivery, vol.26, no.2, pp.1284-1285.

    Sanders, W.(2016): Theft detection algorithm thwarts electricity theft from smart Meters.http://www.siebelenergyinstitute.org/theft-detection-algorithm-developed-withsupport-from-the-siebel-energy-institute-helps-utilities-catch-electricity-thieves.

    Ward, M.(2014): Smart meters can be hacked to cut power bills.http://www.bbc.com/news/technology-29643276.

    Weaver, K.T.(2015):Investigation: US power grid and ‘smart’ meters vulnerable to hacks.https://smartgridawareness.org/2015/12/21/us-power-grid-vulnerable-to-hacks.

    Weaver, K.T.(2017): Smart meter deployments result in a cyber attack surface of “unprecedented scale”.https://smartgridawareness.org/2017/01/07/cyber-attack-surfaceof-unprecedented-scale.

    Wilshusen, C.(2015): Critical infrastructure protection: cyber security of the nation’s electricity grid requires continued attention; GAO-16-174T.https://skyvisionsolutions.files.wordpress.com/2015/10/gao-critical-infrastructureprotection-673245.pdf.

    Yerra, R.V.P.; Bharathi, A.K.; Rajalakshmi, P.; Desai, U.(2011): WSN based power monitoring in smart grids.Proceedings of IEEE Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp.401-406.

    Zetter, K.(2015): Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.Broadway Books, New York.

    Zheng, K.; Wang, Y.; Chen, Q.; Li, Y.(2018) Electricity theft detecting based on density-clustering method.Proceedings of IEEE PES Innovative Smart Grid Technologies-Asia.

    乱码一卡2卡4卡精品| 中文字幕免费在线视频6| 最近中文字幕高清免费大全6| 男女国产视频网站| 观看美女的网站| 春色校园在线视频观看| 下体分泌物呈黄色| 久久精品国产亚洲网站| 乱码一卡2卡4卡精品| 蜜桃在线观看..| 日韩熟女老妇一区二区性免费视频| 国产午夜精品一二区理论片| 内射极品少妇av片p| 日本黄色日本黄色录像| av.在线天堂| 久久99蜜桃精品久久| 色婷婷av一区二区三区视频| 在线观看国产h片| av在线播放精品| 亚洲婷婷狠狠爱综合网| 欧美xxxx性猛交bbbb| 99热这里只有精品一区| 色5月婷婷丁香| 伦理电影大哥的女人| 熟女电影av网| 久久精品国产自在天天线| 久久久国产一区二区| 国产av国产精品国产| 在现免费观看毛片| 国产精品久久久久久精品古装| 自线自在国产av| 99久久精品一区二区三区| 亚洲中文av在线| 欧美精品一区二区大全| 色婷婷av一区二区三区视频| 一级二级三级毛片免费看| 成人无遮挡网站| 少妇 在线观看| 内地一区二区视频在线| 久久亚洲国产成人精品v| 欧美日韩综合久久久久久| 亚洲精品自拍成人| 亚洲自偷自拍三级| 好男人视频免费观看在线| 婷婷色av中文字幕| 国产一区有黄有色的免费视频| av视频免费观看在线观看| 欧美激情极品国产一区二区三区 | 午夜久久久在线观看| 国产成人免费无遮挡视频| 2018国产大陆天天弄谢| 高清不卡的av网站| 欧美日韩av久久| 亚洲精品乱码久久久v下载方式| av专区在线播放| av福利片在线观看| 国产欧美日韩综合在线一区二区 | 国产精品久久久久久精品电影小说| 丝袜在线中文字幕| 在线观看免费视频网站a站| h日本视频在线播放| 这个男人来自地球电影免费观看 | 午夜视频国产福利| 久久99一区二区三区| 少妇被粗大猛烈的视频| 久久ye,这里只有精品| 亚洲欧美清纯卡通| 黑人巨大精品欧美一区二区蜜桃 | 日韩在线高清观看一区二区三区| 天天操日日干夜夜撸| 亚洲欧洲国产日韩| 亚洲色图综合在线观看| 少妇 在线观看| 乱人伦中国视频| 国产午夜精品一二区理论片| 国产欧美亚洲国产| 成年美女黄网站色视频大全免费 | 99热这里只有精品一区| 亚洲美女黄色视频免费看| 国产免费又黄又爽又色| 成人二区视频| 免费黄网站久久成人精品| 九九爱精品视频在线观看| 亚洲国产色片| 亚洲真实伦在线观看| 两个人免费观看高清视频 | 久热这里只有精品99| 国产欧美日韩一区二区三区在线 | 久久精品国产a三级三级三级| 在线观看免费视频网站a站| 三级经典国产精品| 亚洲av中文av极速乱| 精品一区二区免费观看| 黄色一级大片看看| 人人妻人人爽人人添夜夜欢视频 | 欧美成人精品欧美一级黄| 大香蕉97超碰在线| 亚洲av免费高清在线观看| 日韩欧美精品免费久久| 免费观看的影片在线观看| 久久精品久久精品一区二区三区| 成人影院久久| www.色视频.com| 18禁裸乳无遮挡动漫免费视频| 国产男人的电影天堂91| 一边亲一边摸免费视频| 亚洲一级一片aⅴ在线观看| 只有这里有精品99| 在线看a的网站| 久久国产精品大桥未久av | 亚洲国产欧美日韩在线播放 | 视频中文字幕在线观看| 亚洲欧洲日产国产| 亚洲精品乱久久久久久| 日本wwww免费看| 一个人看视频在线观看www免费| 国产色婷婷99| 欧美精品高潮呻吟av久久| 久久韩国三级中文字幕| 一级毛片久久久久久久久女| 亚洲自偷自拍三级| 国产成人免费观看mmmm| 欧美bdsm另类| 日韩一本色道免费dvd| 纵有疾风起免费观看全集完整版| 午夜福利,免费看| videos熟女内射| 成年av动漫网址| 亚洲第一av免费看| 成人免费观看视频高清| 国产有黄有色有爽视频| 这个男人来自地球电影免费观看 | 午夜福利,免费看| 亚洲第一区二区三区不卡| 只有这里有精品99| 十分钟在线观看高清视频www | 亚洲国产精品999| 国产淫语在线视频| 狠狠精品人妻久久久久久综合| 亚洲欧美一区二区三区国产| 狂野欧美白嫩少妇大欣赏| 最近的中文字幕免费完整| av国产久精品久网站免费入址| 国产精品久久久久久av不卡| 中国国产av一级| 亚洲精品国产色婷婷电影| 色哟哟·www| 九色成人免费人妻av| 69精品国产乱码久久久| 这个男人来自地球电影免费观看 | 精品久久国产蜜桃| 国产成人精品婷婷| 少妇人妻久久综合中文| 日本午夜av视频| 一本—道久久a久久精品蜜桃钙片| 日本vs欧美在线观看视频 | 69精品国产乱码久久久| 亚洲美女黄色视频免费看| 五月伊人婷婷丁香| 菩萨蛮人人尽说江南好唐韦庄| 一级毛片 在线播放| 国产精品国产三级专区第一集| 在线看a的网站| 国产永久视频网站| 人妻夜夜爽99麻豆av| 天天躁夜夜躁狠狠久久av| 男女免费视频国产| 免费观看在线日韩| 欧美精品人与动牲交sv欧美| 日本黄色日本黄色录像| 成人亚洲精品一区在线观看| .国产精品久久| 精品国产一区二区三区久久久樱花| 久久国产精品男人的天堂亚洲 | 久久国内精品自在自线图片| 日日摸夜夜添夜夜爱| videossex国产| 老司机影院成人| 国产淫片久久久久久久久| 黑人猛操日本美女一级片| 少妇丰满av| 日韩精品有码人妻一区| 日韩熟女老妇一区二区性免费视频| 成人美女网站在线观看视频| 插阴视频在线观看视频| av卡一久久| 免费看光身美女| 欧美bdsm另类| 99久国产av精品国产电影| 纵有疾风起免费观看全集完整版| 国产一区二区三区综合在线观看 | 女的被弄到高潮叫床怎么办| 国产精品99久久99久久久不卡 | 亚洲成人手机| 亚洲,一卡二卡三卡| 日韩欧美精品免费久久| 国产精品久久久久久精品电影小说| 丰满饥渴人妻一区二区三| 久久久久久久久久久丰满| 黑人巨大精品欧美一区二区蜜桃 | 蜜桃久久精品国产亚洲av| 女的被弄到高潮叫床怎么办| 日日啪夜夜爽| 久久精品熟女亚洲av麻豆精品| 另类亚洲欧美激情| 夫妻性生交免费视频一级片| 国产女主播在线喷水免费视频网站| 中文天堂在线官网| 欧美丝袜亚洲另类| 一级av片app| 国产精品99久久99久久久不卡 | a级一级毛片免费在线观看| av黄色大香蕉| 久久狼人影院| 在线观看免费视频网站a站| 亚洲av成人精品一区久久| 欧美老熟妇乱子伦牲交| 欧美区成人在线视频| 亚洲无线观看免费| 你懂的网址亚洲精品在线观看| 国产伦在线观看视频一区| 久久久亚洲精品成人影院| 国产亚洲一区二区精品| av在线播放精品| 国产 精品1| 一级黄片播放器| 国产精品99久久99久久久不卡 | 丰满迷人的少妇在线观看| 男男h啪啪无遮挡| 插逼视频在线观看| 久久久国产欧美日韩av| 久久影院123| 男的添女的下面高潮视频| 新久久久久国产一级毛片| 人人妻人人看人人澡| 夜夜骑夜夜射夜夜干| 日韩欧美精品免费久久| 99久久综合免费| 毛片一级片免费看久久久久| 91精品伊人久久大香线蕉| 久久ye,这里只有精品| 欧美亚洲 丝袜 人妻 在线| 日韩精品免费视频一区二区三区 | 一区二区av电影网| 免费在线观看成人毛片| 成年美女黄网站色视频大全免费 | 国产亚洲一区二区精品| 寂寞人妻少妇视频99o| 日本爱情动作片www.在线观看| 乱码一卡2卡4卡精品| 久久99精品国语久久久| 99久国产av精品国产电影| 伦精品一区二区三区| 搡女人真爽免费视频火全软件| 99久国产av精品国产电影| 亚洲,欧美,日韩| 亚洲精品乱久久久久久| 成年av动漫网址| 男的添女的下面高潮视频| av国产精品久久久久影院| 国产免费又黄又爽又色| 99热国产这里只有精品6| 成年人午夜在线观看视频| 亚洲久久久国产精品| 久久久久视频综合| 99久久人妻综合| 日日啪夜夜撸| 大香蕉97超碰在线| 欧美最新免费一区二区三区| 色视频在线一区二区三区| 午夜影院在线不卡| 少妇人妻 视频| 国产成人aa在线观看| 午夜福利,免费看| 亚洲av.av天堂| 国产日韩欧美视频二区| 在线看a的网站| 少妇猛男粗大的猛烈进出视频| 日韩欧美一区视频在线观看 | 亚洲三级黄色毛片| av免费在线看不卡| 欧美成人午夜免费资源| av免费观看日本| 国产精品一区www在线观看| .国产精品久久| 9色porny在线观看| 久热这里只有精品99| 草草在线视频免费看| 久久99热6这里只有精品| 精品99又大又爽又粗少妇毛片| 狂野欧美白嫩少妇大欣赏| 欧美 日韩 精品 国产| 国产午夜精品一二区理论片| 伦理电影大哥的女人| 黄色一级大片看看| 亚洲精品乱码久久久久久按摩| 女人精品久久久久毛片| 午夜久久久在线观看| 毛片一级片免费看久久久久| 老司机影院成人| 黄色视频在线播放观看不卡| 熟女人妻精品中文字幕| 欧美精品亚洲一区二区| 亚洲人与动物交配视频| 久久精品夜色国产| 国产乱来视频区| 妹子高潮喷水视频| 欧美成人精品欧美一级黄| 男人狂女人下面高潮的视频| 美女视频免费永久观看网站| 欧美日韩亚洲高清精品| 亚洲美女搞黄在线观看| 精品人妻一区二区三区麻豆| 少妇被粗大的猛进出69影院 | 大香蕉97超碰在线| 国产视频内射| videos熟女内射| 国产伦理片在线播放av一区| 大陆偷拍与自拍| 国产黄频视频在线观看| 各种免费的搞黄视频| 人人妻人人添人人爽欧美一区卜| 夜夜骑夜夜射夜夜干| 国产爽快片一区二区三区| 人人妻人人爽人人添夜夜欢视频 | 最近最新中文字幕免费大全7| 91久久精品国产一区二区三区| 日本av手机在线免费观看| 免费黄频网站在线观看国产| 国产成人免费观看mmmm| 国产精品伦人一区二区| 国产 一区精品| 久久人人爽人人片av| 欧美精品一区二区大全| 亚洲国产色片| 日韩欧美 国产精品| 一本大道久久a久久精品| h日本视频在线播放| 校园人妻丝袜中文字幕| 一个人看视频在线观看www免费| 伦理电影免费视频| 午夜免费观看性视频| 极品人妻少妇av视频| 中文字幕制服av| 黄片无遮挡物在线观看| 妹子高潮喷水视频| 国产一区二区三区av在线| 国语对白做爰xxxⅹ性视频网站| 成年人免费黄色播放视频 | 日韩电影二区| 国产男女内射视频| 日韩一区二区视频免费看| av又黄又爽大尺度在线免费看| 伊人久久国产一区二区| 美女国产视频在线观看| 国产日韩欧美亚洲二区| 美女国产视频在线观看| 乱码一卡2卡4卡精品| 久久久午夜欧美精品| 女人精品久久久久毛片| 亚洲欧洲精品一区二区精品久久久 | 午夜福利视频精品| 热re99久久精品国产66热6| 少妇的逼水好多| 国产免费福利视频在线观看| 日韩大片免费观看网站| av卡一久久| 国产69精品久久久久777片| 黄色日韩在线| 成人18禁高潮啪啪吃奶动态图 | 99热6这里只有精品| 肉色欧美久久久久久久蜜桃| 欧美性感艳星| 国产色婷婷99| 亚洲伊人久久精品综合| 韩国高清视频一区二区三区| 在线看a的网站| 久久午夜综合久久蜜桃| 久久久久久久久久久丰满| 欧美亚洲 丝袜 人妻 在线| 日日摸夜夜添夜夜爱| 国产中年淑女户外野战色| 99国产精品免费福利视频| 69精品国产乱码久久久| 国产片特级美女逼逼视频| 岛国毛片在线播放| 国产精品免费大片| 亚洲不卡免费看| 久久99精品国语久久久| 中文乱码字字幕精品一区二区三区| 精品酒店卫生间| av一本久久久久| 久久久国产欧美日韩av| 少妇人妻一区二区三区视频| 成年人午夜在线观看视频| 国产白丝娇喘喷水9色精品| 亚洲av电影在线观看一区二区三区| 国产一区有黄有色的免费视频| 亚洲天堂av无毛| 在线 av 中文字幕| 看十八女毛片水多多多| 中文精品一卡2卡3卡4更新| 亚洲美女搞黄在线观看| 日日啪夜夜撸| 亚洲av免费高清在线观看| 亚洲国产日韩一区二区| 最黄视频免费看| 熟女人妻精品中文字幕| 人妻一区二区av| 色吧在线观看| 女的被弄到高潮叫床怎么办| 22中文网久久字幕| 一级毛片我不卡| 亚洲精华国产精华液的使用体验| 草草在线视频免费看| 妹子高潮喷水视频| 午夜福利网站1000一区二区三区| 最近中文字幕高清免费大全6| 日韩一区二区视频免费看| 美女国产视频在线观看| 国产精品久久久久久久久免| 久久热精品热| 99久久精品国产国产毛片| 色94色欧美一区二区| 嫩草影院新地址| 成年女人在线观看亚洲视频| 国内揄拍国产精品人妻在线| 欧美精品亚洲一区二区| 国产有黄有色有爽视频| 久久久久久久精品精品| 亚洲人成网站在线观看播放| 国产男人的电影天堂91| 成人二区视频| 3wmmmm亚洲av在线观看| 观看免费一级毛片| 激情五月婷婷亚洲| 国产成人freesex在线| 啦啦啦视频在线资源免费观看| 欧美最新免费一区二区三区| 国产片特级美女逼逼视频| 婷婷色麻豆天堂久久| 国产一级毛片在线| 婷婷色综合大香蕉| 国产91av在线免费观看| 国产一区二区在线观看av| 老女人水多毛片| 又粗又硬又长又爽又黄的视频| 一级爰片在线观看| 国产精品一区二区在线不卡| 伊人久久精品亚洲午夜| 一级毛片我不卡| 亚洲国产精品一区二区三区在线| 三级国产精品片| 少妇丰满av| av在线老鸭窝| 日本猛色少妇xxxxx猛交久久| 欧美精品亚洲一区二区| 欧美三级亚洲精品| 亚洲欧美一区二区三区国产| 中文天堂在线官网| 亚洲国产色片| 男的添女的下面高潮视频| 日韩中字成人| 国产精品一区www在线观看| 在线看a的网站| 亚洲国产色片| 边亲边吃奶的免费视频| 日韩 亚洲 欧美在线| 国产男女超爽视频在线观看| av国产久精品久网站免费入址| 黄色配什么色好看| 国产黄片视频在线免费观看| 久久鲁丝午夜福利片| av国产精品久久久久影院| 日韩,欧美,国产一区二区三区| 亚洲精品久久午夜乱码| 中国美白少妇内射xxxbb| 99九九线精品视频在线观看视频| 亚洲国产精品999| 欧美日韩视频高清一区二区三区二| 伊人久久精品亚洲午夜| 中文字幕av电影在线播放| 少妇高潮的动态图| 久久99热这里只频精品6学生| 欧美激情国产日韩精品一区| 伦理电影免费视频| 少妇被粗大的猛进出69影院 | 国产乱来视频区| 国产成人精品无人区| 久久97久久精品| 尾随美女入室| 欧美少妇被猛烈插入视频| 久久狼人影院| 亚洲内射少妇av| 少妇被粗大的猛进出69影院 | 新久久久久国产一级毛片| 国产欧美日韩综合在线一区二区 | 国产一区二区三区综合在线观看 | 国产精品人妻久久久久久| 国产精品人妻久久久影院| 中文字幕人妻熟人妻熟丝袜美| 精品国产乱码久久久久久小说| 国产精品99久久99久久久不卡 | 九草在线视频观看| 日日摸夜夜添夜夜爱| 三级经典国产精品| 成人无遮挡网站| 国产av码专区亚洲av| 成人漫画全彩无遮挡| a级一级毛片免费在线观看| 在线观看www视频免费| 久久久亚洲精品成人影院| 下体分泌物呈黄色| 欧美精品一区二区大全| 亚洲国产精品成人久久小说| 制服丝袜香蕉在线| 色婷婷久久久亚洲欧美| 高清黄色对白视频在线免费看 | 亚洲欧美精品自产自拍| 春色校园在线视频观看| 成年美女黄网站色视频大全免费 | 久久人人爽人人片av| 日日啪夜夜撸| 妹子高潮喷水视频| 婷婷色综合大香蕉| 久久久久久久国产电影| 亚洲欧洲国产日韩| 午夜激情福利司机影院| 国产永久视频网站| 99久国产av精品国产电影| 人妻夜夜爽99麻豆av| 国产美女午夜福利| 欧美亚洲 丝袜 人妻 在线| 妹子高潮喷水视频| 少妇丰满av| 91成人精品电影| 一级片'在线观看视频| 欧美变态另类bdsm刘玥| av天堂久久9| 欧美+日韩+精品| 嫩草影院新地址| 国产高清不卡午夜福利| 在线 av 中文字幕| 日韩av在线免费看完整版不卡| av女优亚洲男人天堂| 国产欧美日韩综合在线一区二区 | 国产精品国产三级国产av玫瑰| 午夜福利,免费看| 99久久精品国产国产毛片| 深夜a级毛片| 乱码一卡2卡4卡精品| 一级a做视频免费观看| 成人午夜精彩视频在线观看| 18禁在线播放成人免费| 久久久久久久久久久免费av| 最后的刺客免费高清国语| 一级毛片黄色毛片免费观看视频| 在现免费观看毛片| 日韩av在线免费看完整版不卡| 99热全是精品| 蜜臀久久99精品久久宅男| 国产精品久久久久久精品古装| 日韩精品有码人妻一区| 91成人精品电影| 午夜久久久在线观看| 亚洲国产精品999| 亚洲,一卡二卡三卡| 国产av精品麻豆| 人妻少妇偷人精品九色| 汤姆久久久久久久影院中文字幕| 国产一级毛片在线| 国产伦精品一区二区三区视频9| 欧美精品高潮呻吟av久久| 国产精品欧美亚洲77777| 国产伦在线观看视频一区| 午夜福利视频精品| 肉色欧美久久久久久久蜜桃| 国产 精品1| 亚洲美女黄色视频免费看| 黑人巨大精品欧美一区二区蜜桃 | 人妻制服诱惑在线中文字幕| 国模一区二区三区四区视频| 我的老师免费观看完整版| 99热全是精品| 国内揄拍国产精品人妻在线| 99热这里只有是精品50| 久久影院123| 日本黄大片高清| 亚洲美女搞黄在线观看| 成人18禁高潮啪啪吃奶动态图 | 亚洲久久久国产精品| 国产精品欧美亚洲77777| 男人爽女人下面视频在线观看| 熟女电影av网| 狂野欧美激情性bbbbbb| 国产午夜精品久久久久久一区二区三区| 特大巨黑吊av在线直播| av免费在线看不卡| h视频一区二区三区| 青春草亚洲视频在线观看| 高清视频免费观看一区二区| 男女免费视频国产| 美女内射精品一级片tv| av天堂中文字幕网| 欧美日韩av久久| 免费高清在线观看视频在线观看| 久久久久久久大尺度免费视频| 十分钟在线观看高清视频www | 国产黄片美女视频| 一本一本综合久久| 在线观看免费日韩欧美大片 | 精品视频人人做人人爽| 一级毛片久久久久久久久女| 99视频精品全部免费 在线| 最近2019中文字幕mv第一页|