• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    MalDetect:A Structure of Encrypted Malware Traffic Detection

    2019-08-13 05:55:06JiyuanLiuYingzhiZengJiangyongShiYuexiangYangRuiWangandLiangzhongHe
    Computers Materials&Continua 2019年8期

    Jiyuan Liu,Yingzhi Zeng,Jiangyong Shi,Yuexiang Yang,Rui Wangand Liangzhong He

    Abstract:Recently,TLS protocol has been widely used to secure the application data carried in network traffic.It becomes more difficult for attackers to decipher messages through capturing the traffic generated from communications of hosts.On the other hand,malwares adopt TL S protocol adopt TLS protocol when accessing to internet, which makes most malware traffic detectionmethods, such as DPI (Deep Packet Inspection), ineffective. Some literatures use statistical methods,such as DPI(Deep Packet Inspection),ineffective.Some literatures use statistical method with extracting the observable data fields exposed in TLS connections to train machine learning classifiers so as to infer whether a traffic flow is malware or not.However,most of them adopt the features based on the complete flow,such as flow duration,but seldom consider that the detection result should be given out as soon as possible.In this paper,we propose MalDetect,a structure of encrypted malware traffic detection.MalDetect only extracts features from approximately 8 packets(the number varies in different flows)at the beginning of traffic flows,which makes it capable of detecting malware traffic before the malware behaviors take practical impacts.In addition,observing that it is inefficient and time-consuming to re-train the offline classifier when new flow samples arrive,we deploy Online Random Forest in MalDetect.This enables the classifier to update its parameters in online mode and gets rid of the re-training process.MalDetect is coded in C++language and open in Github.Furthermore,MalDetect is thoroughly evaluated from three aspects:effectiveness,timeliness and performance.

    Keywords:Network intrusion detection,encrypted traffic,online learning.

    1 Introduction

    Traffic encryption is a practical way to protect the security and privacy of application data,including credit card details,passwords and sensitive personal information.It is claimed that HTTPS(SSL/TLS encrypted)traffic grew over 90%year over year.NSS Labs predicted 75%of traffic was going to be encrypted by 2019[Austin(2016)].At the same time,HTTPS is found to be utilized in 37%malwares[Arna(2017)].In our dataset,23.35%of malwares use TLS protocol to secure their communication.Security products use TLS inspection to ’look inside’the secure tunnel so as to protect their users from treats which try to sneak past defenses.However,most businesses are not doing TLS inspection and leaving the door wide open for malwares[Arna(2017)].TLS inspection firstly decrypts TLS traffic,then checks for threats,finally re-encrypts and sends it on its way.This MITM(Man-In-The-Middle)method results in lots of drawbacks.For instance,the TLS parameters used in end hosts are required to be stored in security products,which violates the privacy of legitimate traffic.Additionally,decryption and re-encryption processes are time-consuming,causing visible delays in data transmission.

    Fortunately,some observable data fields,exposed in TLS connections,can be used to build a specific malware traffic classifier with statistical methods.Anderson et al.[Anderson,Paul and McGrew(2016)]thoroughly analyzed the building process of TLS connections and compared the preferences of TLS protocol parameters of legitimate traffic and malware traffic.They proved it is an efficient and effective way to use TLS protocol parameters to predict whether a traffic flow is generated by malware or not.In order to establish a TLS connection,several formatted flow packets will be transmitted between two hosts,such asClient Hellopacket andServer Hellopacket.They are not encrypted and contain observable data fields mentioned above.In our implementation,Libpcap[Jacobson and McCanne(2009)]is used to capture these packets.

    It is worth to mention that the captured packets are distributed in the beginning part of traffic flows.Fig.1 shows the building process of TLS connection between client and server.We can see that the capturing time ranges from the starting time of connection to an epoch before the transmission of application data.Additionally,the captured packets contain the ones of none-TLS handshake process,includingSYNpacket,SYN ACKpacket,ACKpacket and a few data packets in some occasions.They are not removed,because several traffic features,such as the duration of capturing,are designed with information in them.Technically,packet capturing is done right after the arriving time ofChange Cipher Specpacket.In this period,no TLS encrypted application data is transferred.This guarantees that all features extracted as the input of machine learning classifiers can be gathered before malicious malware data is exchanged.We assign TLS-APP time to the consuming time between the last packet captured for feature extraction and the first packet of application data transferring process.In Section 5.3,we compare TLS-APP time,Tain Fig.1,with the time which MalDetect needs to handle with a traffic flow.The result shows that the former time is much longer than the latter one in magnitudes.As a result,MalDetect can give out the traffic flow detection result before the flow transfers malware data.That is to say,MalDetect is able to detect the malware traffic before it carries out illegal actions.This offers the opportunity to completely prevent malicious behaviors.

    Figure1:Time epochs and periods

    The features extracted from above packets can be separated into three classes.The first class is derived from classical flow features,including the duration of capturing,inbound/outbound packet number,etc.The second class mainly contains TLS related features.For example,a set of cipher suites,which are the methods of encrypting application data,are offered inClient Hellopacket for a server to choose.The occurrences of various cipher suites are formatted as a feature vector.Additionally,the server chooses one cipher suite and responses the client withServer Hellopacket.Then the cipher suite value appeared inServer Hellopacket is considered as a feature.The field values of certificates transmitted in TLS handshake process are classified as an independent category.The technique of transforming certificate field values into features is similar to that of second class.

    MalDetect adopts an Online Random Forest model to classify malware flows apart from legitimate flows.The model,proposed by Saffari et al.[Saffari,Leistner,Santner et al.(2009)],is constructed in online mode and updates its parameters when new samples arrive.This,comparing with adopting offline model,is beneficial when MalDetect handles with new threats,for there is no need to re-train and re-deploy the new model.It saves labor cost and improves quality of service.

    MalDetect supports binary classification(LegitimateandMalware Generated)and multiclassification(Legitimateand various types of network flows generated by different malware families).We evaluated the FNR and FDR of MalDetect in the two modes using public datasets.The result shows MalDetect can effectively distinguish malware traffic flows.At the same time,the ability of learning new threats was also tested.In addition,we got the response time of MalDetect and thoroughly analyzed the benefits of a quick response.At last,we tested the throughput,for it is critical when deploying MalDetect into highspeed network devices.

    The main contributions of this paper are summarized as following:

    ·We propose MalDetect,a structure of encrypted malware traffic detection.It is experimentally shown to have low FNR,FDR and high throughput.In addition,MalDetect can learn new malware traffic fast and effectively improve the detection rate of unknown threats if new samples are given.

    ·We only use approximately 8 packets at the beginning of traffic flows to extract features.This enables MalDetect to determine whether a flow is generated by malware before illegal behaviors are taken,which can better protect network users from malwares.This point is seldom considered in current intrusion detection methods.The Features are carefully selected and can be referred in the context of TLS traffic real-time classification.

    ·MalDetect is programed in C++language and the source code is released in Github3https://github.com/IsaacLJY/MalDetect.

    The rest of the paper is organized as following.Section 2 overviews several closely related works and points out MalDetect’s advantages over them.Section 3 introduces the deployment scenarios in three categories.Section 2 thoroughly describes the structure of MalDetect.In Section 5,MalDetect is evaluated from three aspect:effectiveness,timeliness and performance.Section 6 states the conclusion.

    2 Related work

    Traditional network IDSs(Intrusion Detection System)detect if a traffic flow carries an attack with DPI method.But they are becoming useless when the traffic adopts encryption protocol.Erlacher et al.[Erlacher,Woertz and Dressler(2016)]built a TLS interception proxy with real-time Libpcap in order to provide DPI embedded IDS with decrypted application data.Sherry et al.[Sherry,Lan,Popa et al.(2015)]constructed a system called Blindbox.It can perform DPI directly on the encrypted traffic and simultaneously provide the functionality of middle-boxes.However,these packet inspection-based methods increase the probability of exposing TLS application data.

    Malware traffic detection is an important field of traffic classification with restricting traffic classes intoLegitimateandMalware Generated.Nguyen et al.[Nguyen and Armitage(2008)]conducted a survey of traffic classification techniques using machine learning.They thoroughly analyzed the limitations ofport-basedand packet inspection methods and highlighted the advantages of statistical methods.Statistical methods are more effective and efficient than the other two when applications adopt encryption techniques to secure their network data.Velan et al.[Velan,ˇCermák,ˇCeleda et al.(2015)]described several most widely used encryption protocols and then presented an overview of current approaches for the classification and analysis of encrypted traffic.They claimed that the initial stage of encryption protocols,including TLS,provides abundant information which can be used to classify different types of traffic.

    Moore et al.[Moore,Zuev and Crogan(2013)]collected a large set of flow features which can be used in traffic classification.They provided reference for the selection of our features,although encrypted traffic was not taken into account.Kumano et al.[Kumano,Ata,Nakamura et al.(2014)]used the beginning packets of connections to calculated flow features.However,they only considered the classical flow features,such as average packet size,but ignored the details of encryption protocols.Chen et al.[Chen,Li,Tseng et al.(2017)]built a deep learning model named TSDNN to detect malware flows.However,we argue that the model building and detecting processes require a relatively long time,which makes TSDNN hard to deploy in high speed network.Cheng et al.[Cheng,Xu,Tang et al.(2018)]proposed an abnormal network flow feature sequence prediction approach,which focus on the DDoS attack detection.This deviates from our aim to build a structure for general malware traffic detection.

    Anderson et al.[Anderson,Paul and McGrew(2016)]proposed a method to detect encrypted malware traffic without decryption.They reviewed the building process of SSL/TLS connections in detail and extracted flow features from data fields exposed in the packets of this process.Then the features were quantified into binary vectors which were used to train a L1 Logistic Regression model.In their further research,an open source project named Joy was released[McGrew and Anderson(2016)].Joy adopted a large collection of flow features,including TLS related data,byte distribution,sequence of packet length and time,etc.At the same time,they noticed two problems,inaccurate ground truth and non-stationarity,and solved them in Anderson et al.[Anderson and McGrew(2017)].Additionally,various machine learning classifiers were compared in Anderson et al.[Anderson and McGrew(2017)].Random Forest model was considered as the most robust classif ier in the domain of encrypted malware traffic detection.Compared with Anderson et al.[Anderson,Paul and McGrew(2016);McGrew and Anderson(2016);Anderson and Mc-Grew(2017)],we redesign features extracted from flow packets.Instead of using packets of the complete flows,we only extracted features from packets before the end of TLS handshake process.This enables MalDetect to detect malware flows before illegal behaviors are taken.Additionally,MalDetect utilizes Online Random Forest[Saffari,Leistner,Santner et al.(2009)]model,which trains the classifier in online mode and avoids re-training and re-deploying when new samples arrive.Anderson et al.[Anderson and McGrew(2016)]also integrated contextual flow data,i.e.HTTP and DNS information,into their features.We give up doing so for the extraction and quantification processes are RAM-consuming and time-consuming.

    3 Deployment scenarios

    Before describing the structure of MalDetect,we illustrate three deployment scenarios.But the use of MalDetect is not restricted to the three.

    3.1 Malware detection helper

    MalDetect is able to help the detection of malwares in personal computers.Most of malwares,such as Trojans,Adware,Botnets,etc.stay in contact with their master hosts or communicate with other infected machines and there is a tendency that they are more likely to adopt TLS protocol in their communications.MalDetect is capable of distinguishing whether a TLS encrypted flow is generated by these malwares or not.That is to say,MalDetect can provide the network ports which the malware is currently using.This way,the infected machine can locate the malware more easily.For example,Alice deployed MalDetect in her Windows computer and noticed the warning-the flow,[170.20.10.3,12115,202.108.23.152,443,TLS],was detected as a malware flow.Then she opened the Task Manager to look up which process was using port 12115.She scanned the source executable file of this process with antivirus application and finally found thefile was a malware.In a smarter way,we do not need to check the malware manually,but utilize MalDetect into antivirus applications.Almost antivirus applications,such as Avast,McAfee etc.provide the functionality of real-time malware detection.They can directly use the results of MalDetect and take the operations Alice did in the example.

    3.2 Malicious domain name detection helper

    MalDetect can help the detection of malicious domain name.Some malwares,especially botnets,use a large amount of domain names in their illegal behaviors.Most of current methods use DNS traffic to detect malicious domains by looking at spatial characteristics.MalDetect exploits information in malware communication traffic rather than DNS traffic.If MalDetect discovered a malware flow,we can look up the domain name corresponding to the IP addresses in the flow and record it in a list.The domain names inside are much more likely to be malicious,which can provide additional information to help current techniques improve detection rate.

    3.3 Intrusion prevention in SDN(Software Defined Network)

    SDN enables programmatically network configuration so as to improve network performance and monitoring[Benzekki,El Fergougui and Elbelrhiti Elalaoui(2016)].It disassociates the data plane(forwarding network packets)and the control plane(routing process).One functionality we concern here is SDN controller of control plane can enable and terminate the communication of two hosts.When deploying in SDN environment,MalDetect is able to report its detection results to SDN controller.This way,SDN controller can cut off the malware flow,which benefits a lot especially when SDN is in a DDoS attack.

    4 Structure design

    The structure of MalDetect is shown in Fig.2.MalDetect does not act as a middle box which blocks the traffic flow.Instead,it is constructed beside the traffic road and keeps an eye on the packets.When a packet arrives,it duplicates the packet content from network card for further steps.This enables MalDetect to detect malware traffic without causing extra delay in the communication between client and server.Libpcap,a C++library,is invoked in MalDetect to capture the network traffic constantly.After capturing the network packets,MalDetect handles them through two relatively separated modules,i.e.,Feature Extraction and Training&Detecting.Feature Extraction requires the captured packets from Libpcap as input.Then it selects some informative bytefields to represent the target flow.Finally,the values of thesefields are quantified into numeric vectors,the output of this module.The numeric vectors are sent to next module,Training&Detecting,so as to train a machine learning classifier or be detected by the well-trained classifier.The two modules are thoroughly introduced in the following.

    4.1 Feature extraction

    In this module,a set of pre-defined features,i.e.the values of byte fields in packet content,are extracted and the quantification of these features are performed in order to output the formatted numeric vectors for next module.

    Figure2:Structure design of MalDetect

    4.1.1 Feature

    The effectiveness and performance of MalDetect is closely related to the selection of flow features.Therefore,we analyzed the specifics of packet exchanged between two hosts in detail.Fig.3 shows the typical building process of a TLS connection.We define client as the host who sends thefirst packet and the other one is server.From epoch 1 to epoch 2,client and server are trying to build a TCP connection through a three-way handshake.Next,client sendsClient Hellopacket in which there are a set of alternativefield values,such as cipher suites and extensions,for server to choose.Server responses with theServer Hellopacket to inform the chosenfield values.Together withServer Hellopacket,Certificatepacket,which contains the server certificate assigned by authorities,andServer Hello Donepacket,which indicates serverfinishes transferring it messages,are sent.Then,client tells server the key to encrypt content of further packets viaClient Key Exchangepacket.Additionally,Change Cipher Specpacket andFinishedpacket are exchangedbetweenclientandserver.Sofar,theTLSconnectionhasbeenbuilt,andthetwo hosts begin to transferApplication Datapackets,the encrypted data.MalDetect extracts thefield values in the unencrypted packets mentioned above as features.It is worth to mention that all the packets used in MalDetect are transmitted before epoch 3 and no information which malwares want to exchange are transferred.This provides the basis of detecting malware traffic before malwares take out their illegal actions.

    Wefirstly extracted a large range of features from network flows and tested them in our experiment setting.At last,23 most robust features are selected and used in MalDetect.The features are collected from each flow independently and can be separated into three classes as following.

    Packet feature

    This class of features are not related with TLS protocol.They macroscopically describe flows from three dimensions:size,number and time.In this way,7 features are listed.

    Inbound Bytes:It refers to sum of the sizes of transmitted packets from server to client in capturing time.

    Outbound Bytes:It is similar to Inbound Bytes but the considered packet direction is from client to server.

    Inbound Packets:It counts the number of transmitted packets from server to client in capturing time.

    Outbound Packets:It is similar to Inbound Packets but the considered packet direction is from client to server.

    Duration:It describes the length of capturing time.

    SPL:It refers to the sequence of packet length.For a specific flow packet,we discretized its length into 11 equally sized bins.The packet whose length is in range[0,150)goes into the first bin,the packet whose length is in range[150,300)goes into the second bin,and so on.The packet goes into the last bin if its length is greater than 1500 bytes.For instance,the vector of bins is[0,0,0,0,0,0,0,0,0,0,0]at the initial stage.MalDetect captures a packet and its length is 200,then the vector of bins is updated into[0,1,0,0,0,0,0,0,0,0,0].

    SPT:It refers to the sequence of packet time.When capturing a flow packet,MalDetect calculates the time interval since the last flow packet.Then the time interval is discretized into 11 equally sized bins,which is similar to the calculation of SPL.The size of the bins is set to 50 ms.

    TLS protocol feature

    The TLS protocol details,such as TLS version and cipher suite,are discussed between client and server in the initial stage of TLS connections.They are transferred in several formatted flow packets without encryption.We mainly analyzed the byte fields ofClient Hellopacket andServer Hellopacket.At last,8 features are selected and listed below.

    TLS Version:Client designates the TLS protocol version used in further packet exchange.In MalDetect,four most widely used TLS versions,i.e.SSL 3.0,TLS 1.0,TLS 1.1 and TLS 1.2,are concerned.

    Offered Cipher Suites:Cipher suite is a set of algorithms,including a key exchange algorithm,a bulk encryption algorithm and a message authentication code algorithm,and helps secure a network connection.At the beginning of discussion of TLS protocol details,client sendsClient Hellopacket.This packet contains a set of cipher suites,which indicates client supports these cipher suites in further information exchange.Therefore,the byte values of these cipher suites are extracted as a feature.

    Selected Cipher Suite:When receiving theClient Hellopacket,server always responses withServer Hellopacket in which a cipher suite is specified.This cipher suite should be one of Offered Cipher Suites.Server and client will use it in further packet transmission.Offered Compression Methods:Client Hellopacket provides a list of lossless compression methods to compress the application data.The field values are extracted as a feature.

    Selected Compression Method:InServer Hellopacket,a compression method in Offered Compression Methods is selected for further packet transmission.

    Offered Extensions:There are various TLS extensions which provides additional information about the TLS connection.Extension type is always at the beginning of extension bytes,while extension details are closely followed.For example,Server Name,one of the most common extension,specifies the name of server which client is attempting to connect.The first two bytes is 0x0000,indicating the following bytes areServer Namefields.Additionally,the bytes are well formatted and can be easily extracted.In MalDetect,we only consider the appearance of extension types.

    Selected Extensions:Server responses to several extensions mentioned inClient Hellopacket in some occasions.MalDetect also analyzes the corresponding fields inServer Hellopacket and records the appearance of extension types.

    TLS Packet Ratio:There are some packets carrying no TLS protocol information in capturing time,such as the packets for TCP connection building and ACK packets.The other packets,such asClient Hellopacket,are closely related to TLS protocol.MalDetect calculates the ratio of the later packets.

    Certificate feature

    Typically,certificates are transferred in the building process of TLS connection.They are formatted in X.509 and consist of abundant information which is able to help client identify the server.8 features are extracted inCertificatepacket.

    Certificate Number:Usually,multiple certificates are contained inCertificatepacket.

    BadCertificateNumber:Certificateisassignedbytrustedauthoritiesandcriticaltoidentify the server.The badly formatted certificate is probably self-signed.So,the bad certificate number is extracted as a feature in MalDetect.

    Certificate Version Ratio:In a signed certificate,the version is firstly declared.Because most of flows have more than one certificates,the ratio of certificate version is calculated.Certificate Extension Ratio:There are a list of extensions in certificate.Each extension has itsownID,expressedasObjectIdentification,togetherwitheitheracriticalandnon-critical indication.MalDetect extracts the byte values of extension IDs as features.

    Certificate Validity Mean:In a signed certificate,13 bytes indicate a UTC time before which the certificate is not valid.We call itnotBeforetime.FollowingnotBeforetime,there is anotAftertime,meaning the certificate is not valid after the time epoch.Therefore,MalDetect calculates the difference ofnotBeforetime andnotAftertime as certificate validity.The mean of validities of certificates are computed as a feature.

    Certificate Public Key Length Mean:A public key is used together with the matching private key to prove the identity of the peer(authentication).The mean of public key lengths is calculated.

    Certificate Public Key Algorithm Ratio:It refers to algorithm to generate the public key inside the certificate.The bytes value is extracted.

    Certificate Signature Algorithm Ratio:It refers to the signature of the certificate created by the issuer.This signature proves that the claimed issuer of the certificate is the real issuer since the signature can be verified by using the public key from the issuer’s certificate.

    4.1.2 Technique

    Network flows are processed separately in MalDetect.A flow is uniquely identified by five elements:source IP,source port,destination IP,destination port and protocol.A filter of TLS network traffic is applied when MalDetect captures packets via Libpcap.Therefore,the vector,[source IP,source port,destination IP,destination port],is used to represent a flow.MalDetect records this vector in an array and allocates independent RAM space,which consists of multiple counters and variables,corresponding to each flow.The moment MalDetect captures the first packet of a new flow,counters and variables are initialized.When new packets arrive,it updates them according to the extracted byte field values.The end time of a specific flow capturing should be carefully selected,for there are two common TLS connection building processes actually.

    Figure3:Typical building process of TLS connection

    Fig.3 shows a typical flow packet exchange process of TLS connection.Before epoch 3,Client Hellopacket,Server Hellopacket andCertificatepacket,together with TCP handshake packets,are used to update the counters and variables kept in RAM space.MalDetect does not finish capturing packet whenCertificatepacket arrives,because of the existence of the other type of TLS connection building process which requires noCertificatepacket.Once client builds a TLS connection with server successfully,they store the symmetric key,which is used to encrypt application data,in their caches.Client and server perform session resumption without transferring certificates,when they want to exchange data again.Therefore,MalDetect finishes capturing after receivingChange Cipher Specpacket which shows up in two types of TLS connection.

    There are some differences between the updating of counters and variables of three parts of features introduced in Section 4.1.1.For Flow features,all captured packets are helpful if the flow is currently recorded in MalDetect.However,the information of TLS protocol features is only included inClient Hellopacket andServer Hellopacket.At the same time,allCertificate Featurescan be inferred fromCertificatepacket.Therefore,the packet type is distinguished and non-related ones,such asServer Hello Donepacket,are ignored in the extraction of later two parts of features so as to speed up MalDetect.

    Most of features collected in the beginning are field values,and they are not able to be inputted into Online Random Forest model.Therefore,quantification is performed the moment MalDetect finishes capturing required packets of a flow.For counters,we use their direct values.For example,Inbound Bytes in Packet features counts sizes of captured packets.Its value is numeric and directly used.For variables of a flow,we use the appearance of field values.For instance,four TLS versions,TLS 1.0,TLS 1.1,TLS 1.2 and TLS 1.3,are concerned in MalDetect,so a vector with four 0 or 1 are used to represents the appearance of TLS versions.If MalDetect observes a flow adopts TLS 1.2,it quantifies TLS Version feature into[0,0,1,0].Because a flow may contain multiple certificate,the numeric vectors of Certificate features are the average values of vectors generated from single certificate.If a flow contains tree certificates,A,B and C.The Certificate Version vectors of them are[0,1,0],[1,0,0]and[0,1,0]respectively.Then the final vector for Certificate Version is[0.33333,0.66666,0]([(0+1+0)/3,(1+0+1)/3,(0+0+0)/3]).

    The implementation of feature extraction module is presented in Algorithm 1.

    4.2 Training and detecting

    The input of Training&Detecting module is the numeric vector generated in Feature Extraction module.This module consists of two modes-training and detecting.In training mode,labels are required.How to label the flows captured from network card is critical.Since the training dataset is known in advance,a special mark can be made in the flows to distinguish the flow types before training.InClient Hellopacket,there is a field calledRandom Bytesgenerated by client randomly.We use the last byte of this field to indicate the type of a flow and set the rest bytes to 0.Random Bytesoccupies 28 bytes,which means it is in a separately low probability,that the assigned value conflicts with previous value.The value ofRandom Bytesis set according to the types of flow in dataset pre-processing.We also developed a tool named PcapEditor to help label the network flows.The required input of this tool is malware traffic flows(currently support.pcapformat)and corresponding label.The number of labels is not restricted into two types(LegitimateandMalware Generated).PcapEditor maintains a label list which is pre-defined in configuration file.The configuration file is editable,and users can write their own labels in it.But it should be noticed that sequence and number of these labels must be same as the ones in MalDetect,because MalDetect uses the label list to distinguish flow types.The source code of PcapEditor is also open in Github4The link of the source code is https://github.com/IsaacLJY/PcapEditor.

    Algorithm 1 Feature extraction module Input:Packet bytes Output:Quantified vector 1:filter out non-TLS traffic 2:get flow ID(src.ip,src.port,dest.ip,dest.port)3:if flow ID not in list then 4:if the packet is SYN then 5:create counters and variables of this flow 6:end if 7:else 8:find the counters and variables of this flow 9:end if 10:update packet features 11:if the packet contains Client Hello or Server Hello content then 12:update TLS protocol features 13:else if the packet contains Certificate content then 14:update certificate features 15:else if the packet contains Change Cipher Spec content then 16:quantify features of this flow 17:remove the counters and variables of this flow 18:return quantified vector 19:else if the packet contains Application Data content then 20:remove counters and variables of this flow 21:end if

    In detecting mode,MalDetect captures the traffic from assigned network card.When extracting the value ofRandom Bytes,it is going to find out the value is randomly generated by client and performs detecting the types of flow,rather than training the classifier.In order to show detecting results,MalDetect prints the flow ID,[source IP,source port,destination IP,destination port,protocol],and the flow type prediction.Actually,MalDetect can be integrated into threats warning system or threats handling system,such as IDS,instead of operating as an independent tool,which is going to be a part of our future work.

    In this module,MalDetect adopts Online Random Forest model as the classifier.Usually,random forest is trained in offline mode,which requires the entire training data in advance.However,training data is generated continuously in practice.Especially for malware traffic detection,new types of network traffic are emerging continuously.Online Random Forest keeps the previous knowledge about threats but also learns new threats incrementally.Besides,this model combines online bagging and extremely randomized forests,and has comparable performance with common Random Forest model,claimed by Saffari et al.[Saffari,Leistner,Santner et al.(2009)].Meanwhile,it builds and tests each tree independently,hence the training and testing is able to be performed in parallel.This accelerates MalDetect’s training procedure and shortens the response time of detecting.Additionally,MalDetect is designed to support multiple flow labels.For common binary classification,binary decomposition,e.g.,one-vs-all,is deployed in order to solve multi-class classif i-cation.But such decomposition leads to higher computational burden for the building of several binary classifiers,and very unbalanced data distribution where the majority of the samples are from negative class.The model is naturally built in multi-class mode without the decomposition mentioned above and satisfies the need of our problem maximum.

    5 Evaluation

    When assessing MalDetect,we aim to answer three questions.First,can MalDetect detect malware traffic flows precisely?Second,is MalDetect able to detect malware traffic before illegal actions are taken?Third,what are the performance overheads of MalDetect?Therefore,we measured MalDetect in three aspects:effectiveness,timeliness and performance.Additionally,the dataset used in evaluation is introduced at the beginning.

    5.1 Dataset

    Most researchers use their own private traffic dataset in evaluation.However,the credibility of results is closely related to the dataset.So,we use two public datasets in our research,i.e.,CTU-13 dataset and MCFP dataset.

    ·CTU-13 dataset[Garcia,Grill,Stiborek et al.(2014)]-This dataset contains thirteen scenarios and was captured in the CTU University,Czech Republic,in 2011.On each scenario,a specific malware which used several protocols and performed different actions,was executed.It consists of three types of traffic i.e.,malware traffic,legitimate traffic and background traffic.They are clearly labeled at the level of flow.In our research,background traffic was ignored.

    ·MCFP dataset[Erquiaga,García and García Garino(2017)]-This dataset has been collected by a group of researchers in CTU University since January,2017.The malware traffic is generated by executing the malware for long terms,up to three weeks or even months,and it keeps a variety of captures from different types of malwares,such as Trojans,Adware,Botnets,etc.Currently,over two hundred of scenarios are captured and open to the public.

    In our datasets,76.65%malwares do not adopt TLS protocol.Therefore,we only use traffic of the rest 23.35%malwares.Then we submit the malwares into VirusTotal[Total(2012)]to get the detection results of various security vendors.The results of Avast company are used as malware traffic labels in our evaluation.In addition,we searchRandom Bytesfields of flows for MalDetect training mode and set their values according to the types of malwares.Finally,we get 319152 malware flows and 63998 legitimate flows.Tab.1 shows the traffic flow information of different types.

    5.2 Effectiveness

    Six types of network traffic,as shown in Tab.1,are concerned in our test.At the beginning,we ignored the different types of malware flows and treated all of them as one type.Thebinary classification was performed by setting the labels toLegitimateandMalware Generated.We selected105flows,104forfive malware types each and5×104forLegitimate,as training set,while2×104flows were randomly selected as test set with the same proportion.Then we used Tcpreplay[Turner(2011)]to replay the traffic flows and deployed MalDetect in the assigned network card to capture the flow packets and start to train and detect.The detecting result shows the FNR was 0.8%,which means 8 out of 1000 flows generated were considered as legitimate flows.At the same time,the FDR was 0.09%,meaning only 9 out of 10000 flows,which MalDetect reported asMalware Generated,were legitimate.

    Table1:Malware flow information

    Figure4:Confusion matrix

    Question:Do the FNR and FDR mentioned above satisfy the requirement of malware traffic detection?

    Some viewers may argue that it is not good enough misclassifying 8 out of 1000 malware traffic flows.But it is fairly important to know that FNR presented is achieved in balanced samples with about 50%malware flows.In real network environment,the ratio of malware traffic is completely low.Additionally,almost all infected machines have more than one flow,which makes detecting infected machine easier.

    Figure5:New threat training and detecting

    MalDetect is able to give out the malware types.This requires MalDetect to be trained by flows which are clearly labeled with malware types.Tab.1 presents the information of flows used in our test.But the number of each type of traffic flows are unbalanced.Therefore,we duplicated the less and made the numbers of all types almost equal.Then we randomly selected 133567 flows as training set,while 66000 flows were chosen as test set.Fig.4 shows the confusion matrix.FNRs ofSusp,Leg(Legitimate),TrjandRtkare relatively low,accounting for 0.02%,0.34%,0.68%and 3.90%respectively,whileAdwandDrphave high FNRs,18.5%and 52.97%.This results from that a large number of flow samples generated byAdwandDrpare misclassified intoTrjandRtk.This does not mean MalDetect cannot detect the two types of malware traffic.We should notice the labels of network flows come from Avast company and may be inaccurate.This problem is called inaccurate ground truth,which is usually met in supervised machine learning task,and we will discuss it in further work.Additionally,there is no need to get the accurate malware type,for the type only provides a vague guide for further threat handling.After all,we know there is a malware traffic and can trace it to find the malware.In most cases,the malware type does not take a critical position.

    Another important aspect of MalDetect is the ability to learn new treats.In this test case,we left out the traffic flows generated bySuspmalware and used the rest to train MalDetect.Then MalDetect was trained incrementally withSuspmalware traffic flows.we calculated the FDR when every 100 flows were input.Fig.5 shows the FNR change of MalDetect.It can be seen that the FNR drop from 100%to 3.35%dramatically with the number ofSuspflows ranging from 0 to 300.When 1000Suspflows were input,the FNR slightly decreased to 3.1%.This illustrates that MalDetect can effectively detect new threats when training with new types of malware flows in online mode.

    5.3 Timeliness

    Figure6:Time lengths comparison

    Fig.1 shows several critical time epochs and periods of a flow in the process of detecting.Eais the epoch when detecting starts.In the following is a period named capturing time in which MalDetect collects required information of this flow.The moment,Eb,information collecting finishes,MalDetect performs classification with well-trained model.It is going to consume timeTb,also called MalDetect response time.Client and host start to exchange data only after TLS connection is built.Connection building time in the figure,the period fromEatoEd,represents the time length MalDetect takes to build this flow.We assign TLS-APP time to the period fromEbtoEd.

    In this test case,we aim to compare Ec with Ed.IfEc<Ed,MalDetect gives out detecting result before the flow transfers data packets.This helps a lot when the network flow is generated by malwares,for we can cut off the exchange of illegal information totally.This problem can be transformed into the length comparison of TLS-APP time and response time.We used 133567 flows mentioned in Subsection 5.1 to train MalDetect.Then we performed detecting with 105 flows and calculated the capturing time,response time and TLS-APP time,shown in Fig.6.It can be seen that TLS-APP time ranges from 120 ms to 2500 ms,with most values distributed around 400 ms.At the same time,response time ranges from 0.7 ms to 2.5 ms and MalDetect requires about 1ms to classify for the majority of network flows.Therefore,there is 117.5 ms(120 ms-2.5 ms),left at least to take operations when a flow is distinguished asMalware Generated.Additionally,connection building time for most flows,the sum of capturing time median and TLS-APP time median,is approximately 1400 ms.Therefore,about 28.5%((400 ms-1 ms)/1400 ms)of TLS connection building time can be used for further operations,such as sending warnings to hosts,terminating the traffic flow if MalDetect is deployed in SDN,etc.

    5.4 Performance

    ItisnotenoughforMalDetecttodetectmalwaretrafficwithlowFNRandresponsequickly.MalDetect should be capable of handling with a large amount of flows at a time,for it may be deployed in highspeed network.In this case,we deployed MalDetect in a laptop operating Ubuntu 16.04.3.The laptop is embedded with Intel Core i7-6700HQ@2.56 GHz.

    Table2:MalDetect throughput

    First,133567 flows mentioned in Subsection 5.2 were used to train MalDetect.There are not only TLS encrypted flows in real network environment,so we tested the throughput of MalDetect using the traffic with various ratio of TLS flows.The throughput of MalDetect broke the limitation of our network card,so we temporarily revised the flow capturing method to using Libpcap offline mode in order to measure the boundary of MalDetect.This way,flows are inputted from previous stored PCAP files.As a consequence,we got the throughput in Tab.2.It can be seen that the throughput of MalDetect varies a lot with different ratios of TLS traffic.According to a white paper of NSS Lab,40%-50%of enterprise traffic is encrypted[Lab(2018)].In this setting,MalDetect are expected to have a throughput of about 700 Mbps.However,the through is highly affected by machine hardware.Therefore,we suggest to evaluate MalDetect’s throughput before deploying it into network.

    6 Conclusion

    With the widely use of TLS protocol,an increasing number of malwares adopts TLS encryption method to secure their network traffic.This makes most DPI techniques ineffective.In order to tackle this problem,we promote MalDetect,a structure of encrypted malware traffic detection.It improves the current statistical methods in three aspects.First,23 robust and easily extracted features are selected.Second,MalDetect is capable of distinguish a malware flow before malwares begin exchanging information.This helps a lot,for we can cut off the communications between malwares totally,which is advanced than the other techniques.Third,MalDetect adopts Online Random Forest as its classifier.This gets rid of the re-training and re-deploying procedures.As a result,it improves the quality of service and saves the labor cost.In our experiments,MalDetect was shown effective,timely and of high throughput to distinguish malware flows with low FNR.We opened the source code in Github.Finally,we suggest that using MalDetect independently cannot make the most of it.It is better to utilize it into threat handling system,such as IDS.

    Acknowledgement:We would like to thank the developers of VirusTotal,Tcpreplay and Libpcap Library.Without them,we cannot accomplish our work.This research is supportedbyEducationMinistry-ChinaMobileResearchFundingunderGrantNo.MCM20170404.

    身体一侧抽搐| 亚洲成人中文字幕在线播放| av女优亚洲男人天堂| 亚洲自拍偷在线| 精品国内亚洲2022精品成人| 亚洲人成网站高清观看| 国国产精品蜜臀av免费| 色综合色国产| 免费看av在线观看网站| 国产亚洲午夜精品一区二区久久 | 三级国产精品片| 亚洲av福利一区| 亚洲国产精品合色在线| 国产精品国产三级国产专区5o | 精品免费久久久久久久清纯| 最近中文字幕2019免费版| 如何舔出高潮| 日本免费a在线| 久久精品夜夜夜夜夜久久蜜豆| www.av在线官网国产| 日本三级黄在线观看| 国内精品宾馆在线| 欧美性猛交黑人性爽| 国产熟女欧美一区二区| 如何舔出高潮| 精品免费久久久久久久清纯| 亚洲乱码一区二区免费版| 久久久精品大字幕| 成人无遮挡网站| 亚洲av成人精品一二三区| 国产探花极品一区二区| 国产精品国产三级国产专区5o | 日本免费a在线| 国产av码专区亚洲av| 晚上一个人看的免费电影| 国产精品女同一区二区软件| 国产精品久久久久久久电影| 国产精品国产三级国产专区5o | 春色校园在线视频观看| 亚洲欧美成人综合另类久久久 | 国产免费一级a男人的天堂| 九九爱精品视频在线观看| 国产一区二区在线av高清观看| 小说图片视频综合网站| 成年av动漫网址| 少妇裸体淫交视频免费看高清| 日韩欧美 国产精品| 亚洲人成网站高清观看| 久久国内精品自在自线图片| 亚洲一级一片aⅴ在线观看| 一级黄色大片毛片| 欧美另类亚洲清纯唯美| 日本av手机在线免费观看| 美女脱内裤让男人舔精品视频| 精品欧美国产一区二区三| 成人二区视频| 亚洲伊人久久精品综合 | 欧美极品一区二区三区四区| 免费大片18禁| 日本五十路高清| 熟女电影av网| 国产精品99久久久久久久久| 能在线免费观看的黄片| 七月丁香在线播放| 国内精品一区二区在线观看| 超碰97精品在线观看| 视频中文字幕在线观看| 国产亚洲5aaaaa淫片| 久久久久久久久中文| 日韩欧美精品免费久久| 日韩精品有码人妻一区| 久久久久久久亚洲中文字幕| 亚洲综合精品二区| 亚洲综合色惰| av天堂中文字幕网| 桃色一区二区三区在线观看| 亚洲欧洲日产国产| 成人高潮视频无遮挡免费网站| 国产亚洲av片在线观看秒播厂 | 亚洲av熟女| 一本久久精品| 精品欧美国产一区二区三| 桃色一区二区三区在线观看| 啦啦啦啦在线视频资源| 简卡轻食公司| 亚洲一级一片aⅴ在线观看| 色综合亚洲欧美另类图片| 久久精品影院6| 久久久精品94久久精品| 国产精品女同一区二区软件| 亚洲aⅴ乱码一区二区在线播放| 国产成人91sexporn| 2021天堂中文幕一二区在线观| 国产女主播在线喷水免费视频网站 | 欧美97在线视频| 国产老妇伦熟女老妇高清| 亚洲欧美日韩卡通动漫| 男女国产视频网站| 久久99热这里只有精品18| 日韩精品青青久久久久久| 午夜福利在线观看免费完整高清在| av福利片在线观看| 精品人妻一区二区三区麻豆| 99久久人妻综合| 欧美性猛交黑人性爽| 人人妻人人澡欧美一区二区| 国产午夜福利久久久久久| 国产成人freesex在线| 看片在线看免费视频| 精品久久久久久久久久久久久| 三级国产精品片| 麻豆成人午夜福利视频| 18禁在线无遮挡免费观看视频| 我要看日韩黄色一级片| 久久精品影院6| 七月丁香在线播放| 国产不卡一卡二| 亚洲精品久久久久久婷婷小说 | 婷婷色综合大香蕉| 中文字幕av成人在线电影| 国产精品久久久久久久电影| 黄色一级大片看看| 尾随美女入室| 精品国内亚洲2022精品成人| videos熟女内射| 蜜桃亚洲精品一区二区三区| 最近的中文字幕免费完整| 亚洲综合精品二区| av卡一久久| 久久精品久久精品一区二区三区| 国产精品爽爽va在线观看网站| 亚洲av福利一区| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲综合色惰| 亚洲欧美成人综合另类久久久 | 久久人人爽人人片av| 日本一二三区视频观看| 色吧在线观看| 男的添女的下面高潮视频| 国产探花极品一区二区| av在线亚洲专区| 亚洲人成网站在线观看播放| 久久久精品大字幕| 国产 一区 欧美 日韩| 精品99又大又爽又粗少妇毛片| 一级av片app| 三级国产精品片| 中文字幕精品亚洲无线码一区| 国产精品嫩草影院av在线观看| 午夜福利在线观看吧| 一个人免费在线观看电影| 成年女人永久免费观看视频| 97超视频在线观看视频| 亚洲av成人精品一二三区| 只有这里有精品99| 在线观看av片永久免费下载| 1000部很黄的大片| 一个人看的www免费观看视频| 欧美激情国产日韩精品一区| 日韩视频在线欧美| 欧美97在线视频| 大又大粗又爽又黄少妇毛片口| 国产91av在线免费观看| 午夜爱爱视频在线播放| 国产亚洲精品久久久com| 色播亚洲综合网| 久久99热这里只频精品6学生 | 精品一区二区三区视频在线| 老司机影院成人| 日本欧美国产在线视频| 国内精品宾馆在线| 久久久色成人| 中文乱码字字幕精品一区二区三区 | 国产乱人视频| 久久久久久九九精品二区国产| 国产精品一区二区性色av| 日本-黄色视频高清免费观看| 国产午夜福利久久久久久| 国产极品精品免费视频能看的| 亚洲av二区三区四区| 在线a可以看的网站| 插逼视频在线观看| 你懂的网址亚洲精品在线观看 | 99国产精品一区二区蜜桃av| 欧美性猛交╳xxx乱大交人| 一级二级三级毛片免费看| 99九九线精品视频在线观看视频| 嫩草影院精品99| 亚洲欧洲日产国产| 九九热线精品视视频播放| 丰满乱子伦码专区| 久久久精品欧美日韩精品| 亚洲精品国产成人久久av| 97在线视频观看| 听说在线观看完整版免费高清| 超碰av人人做人人爽久久| 一个人免费在线观看电影| 成人午夜高清在线视频| 亚洲av熟女| 日韩欧美精品免费久久| 日本欧美国产在线视频| 人妻少妇偷人精品九色| 亚洲人与动物交配视频| 建设人人有责人人尽责人人享有的 | 精品人妻偷拍中文字幕| 2022亚洲国产成人精品| 亚洲精品久久久久久婷婷小说 | 国产亚洲最大av| 亚洲av电影在线观看一区二区三区 | 亚洲av免费高清在线观看| av女优亚洲男人天堂| 久久久久性生活片| 欧美成人精品欧美一级黄| 中文字幕免费在线视频6| 日韩欧美国产在线观看| 亚洲av成人精品一区久久| 欧美变态另类bdsm刘玥| 国产伦在线观看视频一区| 日本熟妇午夜| 欧美最新免费一区二区三区| 在线a可以看的网站| 精品一区二区三区人妻视频| 人妻夜夜爽99麻豆av| 国产极品天堂在线| 人人妻人人澡欧美一区二区| 色噜噜av男人的天堂激情| 免费av毛片视频| 亚洲精品色激情综合| 淫秽高清视频在线观看| 最近视频中文字幕2019在线8| av视频在线观看入口| 久久午夜福利片| 男人和女人高潮做爰伦理| 熟女人妻精品中文字幕| 色视频www国产| 高清毛片免费看| 联通29元200g的流量卡| 国产伦理片在线播放av一区| 欧美不卡视频在线免费观看| 国产熟女欧美一区二区| 久久久亚洲精品成人影院| 国产午夜精品久久久久久一区二区三区| 精华霜和精华液先用哪个| 日韩大片免费观看网站 | 国内精品宾馆在线| 免费在线观看成人毛片| 特大巨黑吊av在线直播| 国产高清三级在线| 国产午夜精品一二区理论片| 亚洲国产精品合色在线| 国产午夜福利久久久久久| 蜜臀久久99精品久久宅男| 看非洲黑人一级黄片| 亚洲国产欧美在线一区| 免费看美女性在线毛片视频| 国模一区二区三区四区视频| 精品欧美国产一区二区三| 国产片特级美女逼逼视频| 国产黄色小视频在线观看| 欧美xxxx黑人xx丫x性爽| 能在线免费观看的黄片| 国产v大片淫在线免费观看| 中文在线观看免费www的网站| 午夜视频国产福利| 日本熟妇午夜| 三级国产精品欧美在线观看| 久久久午夜欧美精品| 午夜a级毛片| 国产一区二区亚洲精品在线观看| 女人十人毛片免费观看3o分钟| 1024手机看黄色片| 蜜桃亚洲精品一区二区三区| 亚洲在线观看片| 天天一区二区日本电影三级| av.在线天堂| 人人妻人人澡欧美一区二区| 国产私拍福利视频在线观看| 舔av片在线| 男人的好看免费观看在线视频| 午夜激情福利司机影院| 亚洲国产精品国产精品| 国产精品一区二区在线观看99 | 亚洲国产精品国产精品| 国产又色又爽无遮挡免| 小说图片视频综合网站| 免费看a级黄色片| 久久久久久久久久黄片| 日本av手机在线免费观看| 欧美色视频一区免费| 99热这里只有精品一区| 小蜜桃在线观看免费完整版高清| 99久久九九国产精品国产免费| 中文字幕av成人在线电影| 搡女人真爽免费视频火全软件| 99在线人妻在线中文字幕| 丝袜美腿在线中文| 中文字幕精品亚洲无线码一区| 又爽又黄a免费视频| 欧美日韩国产亚洲二区| 亚洲国产高清在线一区二区三| 国产精品无大码| 天堂√8在线中文| 一二三四中文在线观看免费高清| 少妇人妻精品综合一区二区| videos熟女内射| 不卡视频在线观看欧美| 午夜福利网站1000一区二区三区| 精品国产三级普通话版| 听说在线观看完整版免费高清| 日本欧美国产在线视频| 精品99又大又爽又粗少妇毛片| 18+在线观看网站| 国产免费福利视频在线观看| 在线观看一区二区三区| 丰满乱子伦码专区| 国产亚洲av嫩草精品影院| 一级av片app| 国产午夜精品一二区理论片| 亚洲第一区二区三区不卡| 看非洲黑人一级黄片| 中文字幕熟女人妻在线| 99久久精品国产国产毛片| 成人亚洲精品av一区二区| kizo精华| 日韩欧美 国产精品| 高清日韩中文字幕在线| 免费观看人在逋| 亚洲国产精品成人久久小说| 亚洲精品一区蜜桃| 特级一级黄色大片| 岛国毛片在线播放| 成年女人看的毛片在线观看| 91久久精品电影网| 久久99精品国语久久久| 变态另类丝袜制服| 春色校园在线视频观看| 高清毛片免费看| 亚洲最大成人中文| 婷婷色麻豆天堂久久 | 国产在线一区二区三区精 | 日本五十路高清| 国产亚洲午夜精品一区二区久久 | 老司机影院毛片| 少妇丰满av| 校园人妻丝袜中文字幕| 免费在线观看成人毛片| 欧美潮喷喷水| 三级国产精品欧美在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 在线免费十八禁| 丝袜喷水一区| 最近中文字幕2019免费版| 久久这里只有精品中国| 日日干狠狠操夜夜爽| 成人鲁丝片一二三区免费| 午夜免费男女啪啪视频观看| 欧美精品一区二区大全| 亚洲精品乱久久久久久| 日韩三级伦理在线观看| 六月丁香七月| 一级爰片在线观看| 在线观看av片永久免费下载| 日韩强制内射视频| 国产精品嫩草影院av在线观看| 九九热线精品视视频播放| 欧美丝袜亚洲另类| 成年av动漫网址| 国产成人精品久久久久久| 国产男人的电影天堂91| 午夜激情欧美在线| 国产黄片美女视频| 欧美性猛交╳xxx乱大交人| 精品久久久噜噜| 深夜a级毛片| 一区二区三区免费毛片| 99久国产av精品| 国产精品一区二区三区四区免费观看| 成人毛片60女人毛片免费| 国产成人a区在线观看| 亚洲国产高清在线一区二区三| 亚洲国产精品专区欧美| videossex国产| 直男gayav资源| 网址你懂的国产日韩在线| 亚洲av成人精品一二三区| 91精品伊人久久大香线蕉| 内地一区二区视频在线| 国产精品一区二区三区四区免费观看| 亚洲av免费在线观看| 亚洲欧美中文字幕日韩二区| 亚洲av成人精品一区久久| 夜夜看夜夜爽夜夜摸| 国产一区亚洲一区在线观看| 男人和女人高潮做爰伦理| 成人综合一区亚洲| 国内精品美女久久久久久| 高清av免费在线| 亚洲成人久久爱视频| 国产在线男女| 婷婷色麻豆天堂久久 | 级片在线观看| 日本黄色视频三级网站网址| 高清日韩中文字幕在线| 免费观看的影片在线观看| 久久久精品大字幕| 欧美精品一区二区大全| 久久久精品94久久精品| 国产视频内射| 日韩,欧美,国产一区二区三区 | 色视频www国产| 国产成人freesex在线| 欧美bdsm另类| 国产精品久久久久久精品电影小说 | 欧美成人a在线观看| 精品人妻一区二区三区麻豆| 欧美最新免费一区二区三区| 免费电影在线观看免费观看| 99久国产av精品国产电影| 日韩一区二区视频免费看| 亚洲精品久久久久久婷婷小说 | 日韩 亚洲 欧美在线| 人人妻人人看人人澡| 亚洲欧美精品专区久久| 女人十人毛片免费观看3o分钟| 国产久久久一区二区三区| 中文亚洲av片在线观看爽| 又粗又硬又长又爽又黄的视频| 成人性生交大片免费视频hd| 成人午夜精彩视频在线观看| av播播在线观看一区| 亚洲国产精品成人综合色| 精品人妻一区二区三区麻豆| 国产精品一区二区性色av| 国产精品爽爽va在线观看网站| 婷婷色av中文字幕| 三级经典国产精品| 高清日韩中文字幕在线| 亚洲欧美中文字幕日韩二区| 中文资源天堂在线| 久久精品久久久久久噜噜老黄 | 日韩国内少妇激情av| 久久久久精品久久久久真实原创| 美女内射精品一级片tv| 最后的刺客免费高清国语| 国产成人a区在线观看| 日韩一本色道免费dvd| 国产黄色小视频在线观看| 国产精品永久免费网站| 亚洲第一区二区三区不卡| 狂野欧美激情性xxxx在线观看| 99久国产av精品| 高清午夜精品一区二区三区| 国产一区二区亚洲精品在线观看| 国产单亲对白刺激| 99视频精品全部免费 在线| АⅤ资源中文在线天堂| 免费看av在线观看网站| 亚洲成人av在线免费| 长腿黑丝高跟| 久久精品久久久久久久性| 在线a可以看的网站| 国产亚洲午夜精品一区二区久久 | 欧美又色又爽又黄视频| 日韩av在线大香蕉| 国产色爽女视频免费观看| 汤姆久久久久久久影院中文字幕 | 日本色播在线视频| 亚洲精品国产av成人精品| 人人妻人人看人人澡| 日韩精品有码人妻一区| 精品一区二区三区视频在线| 伦精品一区二区三区| av免费在线看不卡| 日韩 亚洲 欧美在线| 黄色一级大片看看| av在线播放精品| 天堂影院成人在线观看| 又粗又爽又猛毛片免费看| 丝袜美腿在线中文| 可以在线观看毛片的网站| 精华霜和精华液先用哪个| 美女cb高潮喷水在线观看| 国产伦理片在线播放av一区| 亚洲av男天堂| 日韩一区二区三区影片| 小说图片视频综合网站| 久久久久久大精品| 国产91av在线免费观看| 国内少妇人妻偷人精品xxx网站| 两个人视频免费观看高清| 欧美一级a爱片免费观看看| 日韩欧美精品v在线| 男插女下体视频免费在线播放| 日日摸夜夜添夜夜添av毛片| 七月丁香在线播放| 国产亚洲一区二区精品| 99视频精品全部免费 在线| 欧美性感艳星| 国产色爽女视频免费观看| 欧美日韩在线观看h| 久久久色成人| 黄色一级大片看看| 国产精品三级大全| 亚洲av电影不卡..在线观看| 成人毛片60女人毛片免费| 99国产精品一区二区蜜桃av| av专区在线播放| 久久久成人免费电影| 久久久久性生活片| 国产精品久久久久久久电影| 日本免费a在线| 大又大粗又爽又黄少妇毛片口| 日韩中字成人| 欧美高清性xxxxhd video| 国产亚洲5aaaaa淫片| 2021少妇久久久久久久久久久| 国产探花极品一区二区| 欧美精品国产亚洲| 亚洲久久久久久中文字幕| 国产三级中文精品| 一区二区三区乱码不卡18| 国产精品99久久久久久久久| 99在线人妻在线中文字幕| av线在线观看网站| av在线观看视频网站免费| 精品欧美国产一区二区三| 三级经典国产精品| 美女xxoo啪啪120秒动态图| 欧美97在线视频| 精品久久久久久久久亚洲| 狂野欧美白嫩少妇大欣赏| 三级男女做爰猛烈吃奶摸视频| 乱人视频在线观看| 色尼玛亚洲综合影院| 国产老妇女一区| 欧美性猛交╳xxx乱大交人| 亚洲国产精品久久男人天堂| 亚洲成色77777| 色综合站精品国产| 99热这里只有是精品50| 热99在线观看视频| 男人狂女人下面高潮的视频| 男女啪啪激烈高潮av片| 欧美zozozo另类| 麻豆成人av视频| 国产高清视频在线观看网站| 精品久久久久久成人av| 日日啪夜夜撸| 春色校园在线视频观看| 国产精品国产高清国产av| 色综合站精品国产| 精品久久久噜噜| 久久精品夜夜夜夜夜久久蜜豆| 久久精品久久久久久久性| 国产乱人视频| 精品欧美国产一区二区三| 精品国产一区二区三区久久久樱花 | 欧美日本视频| 高清av免费在线| 老师上课跳d突然被开到最大视频| 男人舔女人下体高潮全视频| 超碰97精品在线观看| 亚洲精品久久久久久婷婷小说 | 久久人妻av系列| 精品久久久久久电影网 | av在线观看视频网站免费| 亚洲欧美一区二区三区国产| 国产一级毛片七仙女欲春2| 91精品伊人久久大香线蕉| 亚洲欧美日韩东京热| 乱人视频在线观看| 中文字幕av在线有码专区| 国产一区二区在线av高清观看| 天堂网av新在线| 亚洲一级一片aⅴ在线观看| 直男gayav资源| 亚洲欧洲国产日韩| 久久久久久久国产电影| 日韩中字成人| 99久国产av精品| 免费观看a级毛片全部| 免费在线观看成人毛片| 日韩人妻高清精品专区| 国产老妇伦熟女老妇高清| 午夜福利在线观看免费完整高清在| 久久午夜福利片| .国产精品久久| 一边摸一边抽搐一进一小说| 白带黄色成豆腐渣| 一二三四中文在线观看免费高清| 日韩,欧美,国产一区二区三区 | 欧美变态另类bdsm刘玥| 国产精品日韩av在线免费观看| 国产免费又黄又爽又色| 精品午夜福利在线看| 久久久久久久亚洲中文字幕| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产午夜精品一二区理论片| 欧美一区二区国产精品久久精品| 天堂av国产一区二区熟女人妻| 亚洲欧洲日产国产| 成人午夜精彩视频在线观看| 97在线视频观看| 欧美高清成人免费视频www| 成年女人永久免费观看视频| 麻豆一二三区av精品| 男女边吃奶边做爰视频| 一级毛片aaaaaa免费看小| 成年女人永久免费观看视频| 亚洲av中文字字幕乱码综合| 淫秽高清视频在线观看| 老女人水多毛片| 自拍偷自拍亚洲精品老妇| 99热6这里只有精品| 91久久精品电影网|