• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Intrusion Detection Algorithm Based on Feature Graph

    2019-11-07 03:12:40XiangYuZhihongTianJingQiuShenSuandXiaoranYan
    Computers Materials&Continua 2019年10期

    Xiang YuZhihong TianJing QiuShen Su and Xiaoran Yan

    Abstract:With the development of Information technology and the popularization of Internet,whenever and wherever possible,people can connect to the Internet optionally.Meanwhile,the security of network traffic is threatened by various of online malicious behaviors.The aim of an intrusion detection system(IDS)is to detect the network behaviors which are diverse and malicious.Since a conventional firewall cannot detect most of the malicious behaviors,such as malicious network traffic or computer abuse,some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches.However,there are very few related studies focusing on both the effective detection for attacks and the representation for malicious behaviors with graph.In this paper,a novel intrusion detection approach IDBFG(Intrusion Detection Based on Feature Graph)is proposed which first filters normal connections with grid partitions,and then records the patterns of various attacks with a novel graph structure,and the behaviors in accordance with the patterns in graph are detected as intrusion behaviors.The experimental results on KDD-Cup 99 dataset show that IDBFG performs better than SVM(Supprot Vector Machines)and Decision Tree which are trained and tested in original feature space in terms of detection rates,false alarm rates and run time.

    Keywords:Intrusion detection,machine learning,ids,feature graph,grid partitions.

    1 Introduction

    With the development of Information technology and the popularization of Internet,whenever and wherever possible,people can connect to the Internet optionally.Meanwhile,the security of network traffic is threatened by various of online malicious behaviors.Although some corresponding techniques,such as firewalls,data encryption and user authentication,have been developed to protect the security of computer and network traffic,it is still hard to prevent a wide range of intrusion behaviors.The aim of intrusion detection system is to detect malicious intrusion behaviors timely and further identify the sources where the attacks are from.And then attack warnings are sent to the network administrators by IDS[Milenkoski,Vieira,Kounev et al.(2015);Ganapathy,Kulothungan,Muthurajkumar et al.(2013);Wu,Zhang,Zhang et al.(2018)].According to the survey,most IDS are based on anomaly detection and signature detection[Shin,Lee,Kim et al.(2013);Venkatesan,Ganesan and Selvakumar(2012)].Anomaly detection justi fies whether an observed behavior is malicious or not by comparing it with the behavior patterns.Other than anomaly detection,signature detection focuses on mapping the contents of logs or packets to the recorded sequences of attack events or commands.However,the results of conventional intrusion detection largely depend on the attacks recorded in signature databases,which lead to high false alarm rates in most cases.Recently,some innovative approaches,such as data mining and machine learning,have been employed to train the model for anomaly detection[Upadhyaya,Jain,HOD et al.(2012);Kang and Oh(2012)].The paper is also inspired by Tian et al.[Tian,Su,Shi et al.(2019);Wang,Liu,Qiu et al.(2018);Cheng,Xu,Tang et al.(2018)],as the notion of the Internet of things[Yu,Tian,Qiu et al.(2018);Qiu,Xing,Zhu et al.(2019);Wang,Tian,Zhang et al.(2018);Tian,Cui,An et al.(2018);Tan,Gao,Shi et al.(2018);Chen,Tian,Cui et al.(2018);Tian,Shi,Wang et al.(2019);Tian,Gao,Su et al.(2019);Du,Xiao,Guizani et al.(2007)],sensor[Wang,Gu and Yan(2018);Wang,Gu,Ma et al.(2017);Li,Sun,Jiang et al.(2018)],and big data[Qiu,Chai,Liu et al.(2018);Qiu,Qi,Wang et al.(2017)]are no longer limited to its own scope.

    As shown in recent studies,lots of advanced approaches based on machine learning have been integrated with intrusion detection model to improve the performance of malicious behavior detection[Depren,Topallar,Anarim et al.(2005);Agarwal,Purwar,Biswas et al.(2017);Modi and Patel(2013)].According to the related literature,several common methods,such as detection rate,false positive,false negative,etc.,are employed to evaluate the performance of intrusion detection model[Shiravi,Shiravi,Tavallaeeetal.(2012);Nasr,Abou-El Kalam and Fraboul(2012);Chen,Abraham and Yang(2007)].

    In this paper,we present IDBFG(Intrusion Detection Based on Feature Graph),an intrusion detection model based on feature graph,which can detect malicious network traffic effectively.In IDBFG,a graph structure with grid partitions on each dimension is adopted to represent network traffic behaviors,and then the patterns of network traffic behaviors are obtained by matching the features of each behavior to the grid partitions.Based on the partitions,a graph of malicious network traffic behaviors is formed.Further,whether a network traffic behavior is malicious or not can be identi fied by comparing the features of the behavior with the nodes in the graph of the intrusion detection model.

    The remainder of this paper is organized as follows.First,the previous related work on intrusion detection are introduced in Section 2.Second,together with the corresponding partition method,matching and decision algorithms,the IDBFG model is presented in Section 3.In Section 4,the experiments conducted to evaluate the performance of IDBFG on KDD-CUP’99 dataset are discussed.Finally,we conclude the paper and discuss the directions of our future work.

    Figure 1:Basic architecture of IDS

    2 Related work

    In this section,we review the conventional and the advanced intrusion detection approaches which are integrated with supervised learning and unsupervised learning respectively.

    2.1 Conventional intrusion detection approaches

    As is well known,the objective of early approaches for securing computer systems is to design security mechanisms,which can protect computer systems from attacks by creating a shield around them.Nevertheless,these typical security mechanisms,including firewalls,virtual private networks and authentication mechanisms,cannot provide complete security,especially under continual attacks.Due to the vulnerabilities of security mechanisms,intrusion detection is introduced as a complement[Baig,Sait and Shaheen(2013);Shittu,Healing,Ghanea-Hercock et al.(2015)].

    Since Dorothy Denning proposed the first intrusion detection model in 1987[Jeya,Ravichandran and Ravichandran(2012)],lots of IDSs have been presented in both research and commercial fields[Pan,Morris and Adhikari(2015);Shon,Kovah and Moon(2006);Saad,Manickam and Ramadass(2013);Khan,Awad and Thuraisingham(2007)].Most of these conventional IDSs are based on a general architecture with five main components involved as shown in Fig.1[Sultana and Jabbar(2016)].

    From host-based to network-based,the focus of early intrusion detection research shifts from insider[Sarasamma,Zhu and Huff(2005);Ashraf and Habaebi(2015)]threats to the attacks which are from networks[Lin and Lee(2013);?zyer,Alhajj and Barker(2007)].However,neither the host-based IDS nor the network-based IDS can identify unknown network traffic behaviors effectively without the analysis of past network traffic activities.

    2.2 Advanced intrusion detection approaches

    In general,methods of machine learning are usually used to collect information and extract knowledge from the information autonomously.When integrated with intrusion detection approaches,machine learning methods learn from previous experiences and train the intrusion detection model for the detection of malicious network traffic behaviors.In addition,the model can be improved by autonomous learning when there exist additional training data or knowledge.In summary,machine learning methods can be classified into two types,the supervised learning and the unsupervised learning,which are described as follows.

    2.2.1 Intrusion detection with supervised learning

    In mostcases,the supervised learningtrains a model with priori knowledge,suchas training data.And the training data are generally represented as a set of vectors,each vector is composed of the values of condition attributes and decision attributes.When training model,the given training data are fed into a function,whose objective is to establish a approximate mapping model between the inputs and the outputs of training data.Based on the constructed model,the data with the values of condition attributes only,whose category is unknown,can be classified into the right category[Subaira and Anitha(2014)].

    After years of research,lots of well-known supervised learning methods have been integrated with intrusion detection approaches,which include support vector machines(SVM),decision tree(DT),artificial neural network(ANN),genetic algorithm(GA)and so on[Liu,Yi and Yang(2007)].Gisung Kim et al.present a novel hybrid intrusion detection model based on C4.5 decision tree in 2014.By analyzing packets,alarming system administrator and blocking attack connections,the IDS based on the model can effectively detect malicious network activities and prevent further damage from attacks[Kim,Lee and Kim(2014)].Eesa et al.propose a new feature selection approach on the basis of decision tree for intrusion detection systems in 2015[Islam,Seera and Loo(2017)].WY Feng et al.propose a classification algorithm which combines support vector machine with ant colony network to improve run-time efficiency and classification rate in 2013[Zhang,Jiang and Kamel(2005)].T Shon et al.propose a hybrid approach for intrusion detection,it employs genetic algorithm to extract features for SVM learning[Shon and Moon(2007)].HA Sonawane et al.evaluate the comparative performance of intrusion detection based on neural network and principal component analysis(PCA)in 2015[Lin,Ke and Tsai(2015)].In addition,there are also some intrusion detection approaches based on supervised learning,such as DT,GA,ANN,SVM[Sindhu,Geetha and Kannan(2012);Xiang,Yong and Meng(2008);Feng,Zhang,Hu et al.(2014);Tajbakhsh,Rahmati and Mirzaei(2009)].

    2.2.2 Intrusion detection with unsupervised learning

    Other than supervised learning,the unsupervised learning is a machine learning method which constructs model according to observations,such as clustering.Due to the absence of priori knowledge in unsupervised learning,the input data are not marked in advance and need to be processed or classified according to the similarity between each other.When the predefined objective function converges,the unsupervised learning process terminates and the learning results are identified as the outputs[Tong,Wang and Yu(2009)].

    After years of research,some well-known unsupervised learning methods have been integrated with intrusion detection approaches,among which the representatives arek-means,kNN,fuzzy clustering and so on[Peddabachigari,Abraham,Grosan et al.(2007)].Giorgio Giacinto et al.propose an intrusion detection approach based onk-means clustering,which can detect the attacks never observed before[Gaffney and Ulvila(2001)].Y Li et al.propose,TCM-KNN,an active learning algorithm for intrusion detection based onkNN,which performs well with high detection rate and low false positives[Li and Guo(2007)].G Wang et al.propose an intrusion detection approach using arti ficial neural networks and fuzzy clustering,which helps IDS achieve stronger stability,higher detection rate and less positive rate[Wang,Hao,Ma et al.(2010)].In addition,there are also some intrusion detection approaches based on unsupervised learning,such ask-means,kNN[Julisch(2003);Huang,Ye,Xiong et al.(2016)].

    2.3 Comparison of related work

    In general,the existing intrusion detection approaches based on machine learning can be classified into three categories,which consist of the intrusion detection approaches combining with unsupervised learning methods,supervised learning methods and hybrid methods respectively.

    As shown in Tab.1,most of the proposed intrusion detection approaches select SVM,DT andkNN as the benchmarks,and KDD-CUP99 is the most commonly used data set for simulation.In addition,a significant part of related work put focus on advanced approaches in order to improve the performance of intrusion detection.Some of the advanced approaches tend to extract more representative features to improve the efficiency,however,it is hard to verify the effectiveness of feature selection on intrusion detection.In this paper,we use a graph structure to record the features of malicious behaviors which has never been mentioned before.

    The indicators,which include detection rate(DR),false Alarm Rate(FAR),false negative(FN),false positive(FP)and true positive(TP),are the most commonly employed in evaluating the performance of intrusion detection approaches.However,the run time indicator,which is ignored frequently,is also important especially for online detection.Hence,when evaluating the performance of our approach,not only DR,FAR but also run time are considered simultaneously.

    Based on the discussion above,we propose the approach described below,which takes all features into account,and further records the features of malicious behaviors as a graph structure.Since DT and SVM are conveniently used as benchmarks for all the other classifiers and are likely to provide reasonable classification performance in most applications,they are also adopted in the paper.

    3 IDBFG model

    The proposed approach,IDBFG,consists of two phases,the training phase and the detection phase,and the training phase is further divided into two steps.In the first step of trainingphase,the data space is partitioned into grid cells where each network traffic behavior can be recorded according to the value of each feature on the corresponding dimension.After all network traffic behaviors are recorded,including both the malicious behaviors and the normal ones,the grid partitions of malicious behaviors which differ from the normal behaviors are extracted and further form the feature graph in the second step of training phase.A network traffic behavior whose corresponding values of features are involved in the nodes of the graph,is identified as malicious behavior.Whenever there exist malicious behaviors of new type,the nodes of corresponding grid cells which record new malicious behaviors are added to the graph.

    Table 1:Comparison of intrusion detection approaches

    Figure 2:The structure of grid cells on each dimension

    3.1 The first step of training phase

    Generally,a network traffic behavior can be represented as a vector in feature space.For each vector,the value on each dimension denotes the magnitude of the corresponding feature of the behavior.Thus,the vector of a network traffic behavior is described in definition 1,whereVidenotes the value onith dimension of the vector anddis the total number of features.

    Definition 3.1.The vector of a network traffic behavior:

    Vector_of_Behavior={V1,V2,...,Vd}is the vector whose value on each dimension denotes the magnitude of the corresponding feature in a network traffic behavior.

    In the first phase,a strategy based on grid partition is adopted which is commonly employed in a kind of grid based clustering algorithms in data mining.The feature space is first partitioned into grid cells on each dimension,and then the vector of network traffic behavior can be mapped into the grid cells according to the dimensional values involved in the vector as shown in Fig.2.After all training network traffic behavior vectors are mapped into the grid cells on each dimension,a graph of malicious network traffic behaviors can be extracted from the grid structure.

    Figure 3:The feature graph

    3.2 The second step of training phase

    Based on the work of the first step,the grid cells,which are on the path of malicious vector,together with the malicious path are extracted.And the extracted grid cells serve as the nodes of the feature graph,the path between two nodes serves as the edge of the feature graph.As shown in Fig.3,a graph of malicious network traffic behaviors can be obtained by extracting the grid cells which includes most malicious network traffic behaviors at a certain proportion.Similarly,the graph of normal network traffic behaviors or all network traffic behaviors can also be obtained in the same way.

    To the graph of malicious network traffic behaviors,if a network traffic behavior to be detected can be mapped into a path which is from the top level(feature 1)to the bottom level(feature n),then it is detected as malicious.

    3.3 Detection of malicious network traffic behaviors

    Based on the training phase of IDBFG,a security model consists of training phase and detection phase is proposed as shown in Fig.4.To justify whether a network traffic behavior is malicious or not,the network traffic behavior,represented as a vector,is first mapped into the corresponding grid cells on each dimension according to its value in the vector.Since a vector has only one value on each dimension,the behavior vector can be further represented as a series of grid cells according to the dimensional values.If the grid cells involved in a behavior vector can be exactly matched to the pattern of a malicious behavior which is represented as a chain of connected nodes at different levels in the feature graph,the behavior vector is identified as malicious network traffic behavior.The procedure of IDBFG is as described in Algorithm 1.

    Figure 4:The security model

    4 Experiments

    4.1 The dataset

    The experiments in the paper are based on the KDD-CUP’99 dataset,which is popular and widely used as standard dataset for intrusion detection.In KDD-CUP’99 dataset,494020 samples are involved,each of which represents a network connection and each network connection is represented as a 41 dimensional feature vector.The 41 features are of various types,which include content type,intrinsic type and traffic type.Besides the normal network traffic behaviors,the remaining classes are of four different types of attacks,such as denial of service(Dos),user to root(U2R),probe and remote to local(R2L).

    4.2 The baseline classifiers

    Decision Tree is a widely used model for classification and prediction in machine learning,which can deal with not only numerical attribute but also the attribute of other types such as nominal attribute,binary attribute,etc.In addition,when processing large amount of data,it is reliable to get the feasible results with DT in a short period of time.The support vector machine is also one of the most widely used classification methods which applies the statistics of support vectors to categorize unlabeled data with high accuracy and efficiency.Since SVM and DT have been proved to be excellent classifiers with high accuracy and have been widely employed as the baseline algorithms in lots of comparison tasks,we compare the performance of IDBFG,SVM and DT in the scenario that all malicious network traffic behaviors to be detected have already appeared in the training set.

    4.3 The evaluation

    Table 2:Confusion matrix

    In this paper,we choose the rates of detection,false alarm rate and run time as the evaluation index,which are widely employed for the experiments of intrusion detection.The rates of detection,false alarm can be calculated by Eq.(1)to Eq.(2),where TN(true negatives)denotes the number of normal behaviors correctly classified as normal,FN(false negatives)denotes the number of malicious behaviors falsely classified as normal,TP(true positives)denotes the number malicious behaviors correctly classified as malicious and FP(false positives)denotes the number of normal behaviors falsely classified as malicious as shown in Tab.2.In addition,the scale of the grid granularity,which indirectly influences the performance of detection,is also evaluated.

    4.4 Performance comparison with 19-dimensional features

    Figure 5:ROC performance of IDBFG,SVM and DT with 19 features

    In the experiments,we first compare the DR(detection rate)and FAR(false alarm rate)of IDBFG,SVM and DT with 19-dimensional features,which are based on the information gain ratio values of various features.As shown in Fig.5,we evaluate the DR and FAR of the approaches in this paper with ROC curve,and our goal is to maximize DR and minimize FAR concurrently.In addition,the run time of IDBFG,SVM and DT is evaluated next.As the results shown in Fig.5,when dealing with the KDD dataset with 19 dimensions involved,IDBFG and DT perform better than SVM.The results show that IDBFG provides higher detection rate and lower false alarm rate than SVM,and compared to IDBFG,DT provides nearly the same performance of DR and FAR.The results may be because SVM depends much on its statistics nature instead of the features of behavior when justifying a network traffic behavior is malicious or not,however,to IDBFG and DT,whether a network traffic behavior is detected as malicious just depends on the models they build.

    Although having the similar performance of DR and FAR,IDBFG is more efficient than DT as shown in Fig.6,which can be explained as that the nodes in feature graph of IDBFG are far less than the nodes in the DT,which may lead to low computational effort.In addition,the run time of both IDBFG and DT are lower than that of SVM.

    4.5 Performance comparison with all features

    We next compare the DR,FAR and run time of IDBFG,SVM and DT with all features.As shown in Fig.7,the DR and FAR of the approaches are evaluated by ROC curve respectively,and our goal is to maximize DR and minimize FAR concurrently.As the results shown in Fig.7,when dealing with the KDD dataset with all features involved,the performance of IDBFG,DT and SVM deteriorate slightly.And the results show that both IDBFG and DT provide higher detection rate and lower false alarm rate than SVM,and DT provides nearly the same performance of DR and FAR as IDBFG does.The results are mainly because SVM depends much on its statistics nature instead of the features of behavior.Other than SVM,IDBFG and DT put more focus on the models they build.

    Figure 6:Run time of IDBFG,SVM and DT with 19 features

    Figure 7:ROC performance of IDBFG,SVM and DT with all features

    Figure 8:Run time of IDBFG,SVM and DT with all features

    Similar to the experimental results with 19-dimensional features,the run time of both IDBFG and DT with all features are lower than that of SVM,and IDBFG is more efficient than DT as shown in Fig.8.The results can be explained as that only the nodes on the pathes of malicious behaviors are extracted to build feature graph which are far less than the nodes in the DT.Consequently,IDBFG needs lower computational effort than DT does.

    4.6 Comparison of different grid granularity

    Since the number of partitions on each dimension is determined by the partition parameterδ,which has great in fl uence on the performance of IDBFG,in this experiment,the in fl uence of partition parameterδis discussed according to the performance of IDBFG with different partition parameter.

    In this experiment,the number of partitions on each dimension,δ,is initially set to be the square root ofn,wherendenotes the total number of samples in training set andThen,we adjustδby increasing or decreasing it at a certain ratioη,which is set to be 10%.Whenδchanges,the DR and FAR performance of IDBFG also change.As shown in Fig.(9),the performance of IDBFG is optimal at the point aroundδ=0.7δ0,where DR and FAR have almost the highest and lowest value respectively.

    Figure 9:The DR and FAR performance of IDBFG with different grid granularity

    5 Conclusion and future work

    Up to now,very few intrusion detection approaches are based on graph structure.In this paper,we propose a new approach for intrusion detection which is based on IDBFG model,and the advantages of the approach are as follows:

    1.Compared to normal network traffic behaviors,the proportion of malicious behaviors is relatively small,which leads to the high efficiency of building the graph of malicious behaviors.

    2.The graph can be updated conveniently by extracting the grid cells involving malicious behaviors from the grid structure.

    3.When detecting malicious behaviors,the proposed approach is efficient and effective according to the results of experiments in different scenarios.

    Since malicious network traffic behaviors are of various,it is impossible to identify all malicious behaviors.Actually,the malicious network traffic behaviors,which have not been recorded or have not even appeared before,still threaten the security of various systems.Once this kind of malicious network traffic behaviors appear,it is necessary to detect them timely and take corresponding measures.

    Hence,our future work will focus on intrusion detection in two directions.First,try to improve the efficiency and effectiveness of IDBFG on malicious network traffic behaviors detection.Second,try to detect the malicious network traffic behaviors that have never appeared before.

    Acknowledgement:This research was funded in part by the National Natural Science Foundation of China(61871140,61872100,61572153,U1636215,61572492,61672020),the National Key research and Development Plan(Grant No.2018YFB0803504),and Open Fund of Beijing Key Laboratory of IOT Information Security Technology(J6V0011104).

    巨乳人妻的诱惑在线观看| 久久精品久久久久久噜噜老黄| 午夜福利乱码中文字幕| 一级爰片在线观看| 久久人人97超碰香蕉20202| 18禁观看日本| 高清毛片免费看| 亚洲国产精品国产精品| 亚洲国产毛片av蜜桃av| 亚洲国产看品久久| 日韩成人伦理影院| 欧美+日韩+精品| 久久鲁丝午夜福利片| 插逼视频在线观看| 免费女性裸体啪啪无遮挡网站| 成人毛片a级毛片在线播放| 大话2 男鬼变身卡| 只有这里有精品99| 最新中文字幕久久久久| 免费不卡的大黄色大毛片视频在线观看| 亚洲综合色网址| av天堂久久9| 久久热在线av| 国产不卡av网站在线观看| 久久久精品免费免费高清| 免费在线观看完整版高清| 尾随美女入室| 欧美最新免费一区二区三区| 国产熟女欧美一区二区| 肉色欧美久久久久久久蜜桃| 午夜福利在线观看免费完整高清在| 欧美精品一区二区大全| 男人操女人黄网站| av福利片在线| 女人精品久久久久毛片| √禁漫天堂资源中文www| 久久ye,这里只有精品| 日韩成人av中文字幕在线观看| 免费观看无遮挡的男女| 精品卡一卡二卡四卡免费| 美女国产高潮福利片在线看| 亚洲国产色片| 99热这里只有是精品在线观看| 欧美日韩av久久| 国产精品国产三级国产专区5o| 黄色 视频免费看| 国产乱人偷精品视频| 国产高清三级在线| 少妇被粗大的猛进出69影院 | 欧美日本中文国产一区发布| 日韩熟女老妇一区二区性免费视频| 成年人免费黄色播放视频| 免费看光身美女| 亚洲久久久国产精品| 国产在线免费精品| 日本黄大片高清| 午夜av观看不卡| 99久久中文字幕三级久久日本| 亚洲综合色网址| 国产日韩一区二区三区精品不卡| 美女福利国产在线| 国产精品久久久久成人av| 亚洲欧美一区二区三区国产| 国产成人欧美| 91成人精品电影| 97超碰精品成人国产| 欧美激情极品国产一区二区三区 | 久久国产亚洲av麻豆专区| www日本在线高清视频| 春色校园在线视频观看| 黄色视频在线播放观看不卡| 亚洲成人一二三区av| 伊人久久国产一区二区| 久久精品aⅴ一区二区三区四区 | 国产日韩欧美亚洲二区| 国产亚洲精品第一综合不卡 | 色哟哟·www| 高清不卡的av网站| 成年人午夜在线观看视频| 飞空精品影院首页| 极品少妇高潮喷水抽搐| 久热这里只有精品99| kizo精华| 亚洲成av片中文字幕在线观看 | 国产无遮挡羞羞视频在线观看| 午夜精品国产一区二区电影| 九九爱精品视频在线观看| 亚洲精品久久成人aⅴ小说| 亚洲成av片中文字幕在线观看 | 国产精品国产av在线观看| 亚洲国产精品999| 国产av精品麻豆| 天天躁夜夜躁狠狠久久av| 一区在线观看完整版| 精品午夜福利在线看| 久久99热这里只频精品6学生| 夜夜骑夜夜射夜夜干| 亚洲精品中文字幕在线视频| 天天影视国产精品| av视频免费观看在线观看| 捣出白浆h1v1| 免费观看av网站的网址| 91aial.com中文字幕在线观看| 一区二区av电影网| 亚洲精品国产色婷婷电影| 大片免费播放器 马上看| 狂野欧美激情性bbbbbb| av线在线观看网站| 亚洲精华国产精华液的使用体验| 免费高清在线观看日韩| 午夜福利在线观看免费完整高清在| 午夜av观看不卡| 国产欧美另类精品又又久久亚洲欧美| 亚洲 欧美一区二区三区| 春色校园在线视频观看| 国产69精品久久久久777片| 欧美精品高潮呻吟av久久| 捣出白浆h1v1| 成年美女黄网站色视频大全免费| 国产精品.久久久| 婷婷色麻豆天堂久久| av免费在线看不卡| 久久热在线av| 国产精品久久久久成人av| 在线亚洲精品国产二区图片欧美| 国产精品不卡视频一区二区| 国产成人欧美| 人妻系列 视频| videos熟女内射| 久久av网站| 91午夜精品亚洲一区二区三区| 日韩三级伦理在线观看| 男男h啪啪无遮挡| 亚洲欧美日韩另类电影网站| 久久精品国产亚洲av天美| 不卡视频在线观看欧美| 国产精品久久久久久久电影| 日韩伦理黄色片| 中文字幕最新亚洲高清| 老司机亚洲免费影院| 成人无遮挡网站| 大陆偷拍与自拍| 国产毛片在线视频| 国产无遮挡羞羞视频在线观看| 免费av中文字幕在线| 天美传媒精品一区二区| 亚洲欧美中文字幕日韩二区| 老女人水多毛片| 久久精品国产亚洲av涩爱| 日韩av不卡免费在线播放| 最近最新中文字幕免费大全7| 国精品久久久久久国模美| 青春草国产在线视频| 久久婷婷青草| 亚洲第一区二区三区不卡| 我的女老师完整版在线观看| 久久99热这里只频精品6学生| 亚洲五月色婷婷综合| h视频一区二区三区| 插逼视频在线观看| 精品一区二区三区四区五区乱码 | 精品一区二区三区四区五区乱码 | 成人影院久久| 老司机亚洲免费影院| 十八禁高潮呻吟视频| 免费大片黄手机在线观看| 汤姆久久久久久久影院中文字幕| 五月玫瑰六月丁香| 男男h啪啪无遮挡| 久久久久国产精品人妻一区二区| 亚洲少妇的诱惑av| 精品少妇黑人巨大在线播放| 久久久亚洲精品成人影院| 十分钟在线观看高清视频www| 高清不卡的av网站| 蜜桃国产av成人99| 亚洲欧美成人精品一区二区| 亚洲欧美一区二区三区黑人 | 日韩中文字幕视频在线看片| 中文字幕av电影在线播放| 国产精品一二三区在线看| 欧美精品高潮呻吟av久久| 免费高清在线观看日韩| 久久99精品国语久久久| 亚洲精品aⅴ在线观看| 夫妻性生交免费视频一级片| 91aial.com中文字幕在线观看| 日本av免费视频播放| 久久久精品94久久精品| 中文乱码字字幕精品一区二区三区| 日本91视频免费播放| 免费高清在线观看日韩| 欧美日韩精品成人综合77777| 黑人欧美特级aaaaaa片| 99热6这里只有精品| 亚洲精品久久成人aⅴ小说| 国产成人精品久久久久久| 人人妻人人澡人人看| 91在线精品国自产拍蜜月| 一边摸一边做爽爽视频免费| 日韩视频在线欧美| 香蕉丝袜av| 日韩伦理黄色片| 综合色丁香网| 欧美成人午夜精品| 秋霞伦理黄片| 亚洲欧美一区二区三区黑人 | 久久久久久伊人网av| 国产精品女同一区二区软件| 日韩 亚洲 欧美在线| 巨乳人妻的诱惑在线观看| 欧美人与善性xxx| 国产永久视频网站| 中文精品一卡2卡3卡4更新| 99九九在线精品视频| 18禁观看日本| 五月开心婷婷网| 免费在线观看黄色视频的| 国产精品一区二区在线不卡| 国产成人aa在线观看| 男女无遮挡免费网站观看| 精品国产一区二区三区久久久樱花| 又大又黄又爽视频免费| 综合色丁香网| 久久精品久久久久久久性| 亚洲,欧美精品.| 日韩不卡一区二区三区视频在线| 高清不卡的av网站| 九九爱精品视频在线观看| 性高湖久久久久久久久免费观看| 99热国产这里只有精品6| 一本久久精品| 男人舔女人的私密视频| 最近最新中文字幕大全免费视频 | 大片电影免费在线观看免费| 午夜老司机福利剧场| 中文字幕免费在线视频6| 伦理电影大哥的女人| 精品久久久久久电影网| 卡戴珊不雅视频在线播放| 三上悠亚av全集在线观看| 少妇高潮的动态图| 久久久久精品久久久久真实原创| 热re99久久国产66热| 亚洲美女搞黄在线观看| 免费女性裸体啪啪无遮挡网站| 欧美精品国产亚洲| 亚洲国产色片| 久久精品aⅴ一区二区三区四区 | 久久av网站| 成人黄色视频免费在线看| 黄色怎么调成土黄色| 婷婷色av中文字幕| 久久久久久久久久成人| 哪个播放器可以免费观看大片| 在线观看www视频免费| 少妇精品久久久久久久| 九九在线视频观看精品| 国产精品无大码| 欧美日韩视频高清一区二区三区二| 天堂俺去俺来也www色官网| 亚洲在久久综合| 婷婷色综合大香蕉| 美女内射精品一级片tv| 精品人妻一区二区三区麻豆| 精品国产露脸久久av麻豆| 久久久久视频综合| 国内精品宾馆在线| 国产一区有黄有色的免费视频| 精品国产露脸久久av麻豆| 午夜激情久久久久久久| 免费日韩欧美在线观看| 日日啪夜夜爽| 亚洲av日韩在线播放| 日韩大片免费观看网站| 丰满少妇做爰视频| 日韩视频在线欧美| 亚洲精品日韩在线中文字幕| 青青草视频在线视频观看| 婷婷色av中文字幕| 大香蕉久久网| 亚洲欧美成人综合另类久久久| 午夜福利视频精品| 极品少妇高潮喷水抽搐| 国产成人精品久久久久久| 国产精品免费大片| 建设人人有责人人尽责人人享有的| 久久鲁丝午夜福利片| 搡女人真爽免费视频火全软件| 国产在视频线精品| videos熟女内射| 天天躁夜夜躁狠狠久久av| 亚洲情色 制服丝袜| 91成人精品电影| 精品福利永久在线观看| 久久ye,这里只有精品| 女人被躁到高潮嗷嗷叫费观| videosex国产| 777米奇影视久久| 韩国av在线不卡| 亚洲精品美女久久久久99蜜臀 | 国产亚洲最大av| 18禁动态无遮挡网站| 久久女婷五月综合色啪小说| 国产成人精品婷婷| 侵犯人妻中文字幕一二三四区| 精品少妇黑人巨大在线播放| 搡女人真爽免费视频火全软件| 99久久精品国产国产毛片| 久久精品aⅴ一区二区三区四区 | 90打野战视频偷拍视频| 亚洲成国产人片在线观看| 少妇人妻精品综合一区二区| 黄色一级大片看看| 中文精品一卡2卡3卡4更新| 亚洲av综合色区一区| 黑丝袜美女国产一区| 欧美精品国产亚洲| 久久久精品区二区三区| 国产男女超爽视频在线观看| 亚洲精品色激情综合| 亚洲人与动物交配视频| 欧美激情极品国产一区二区三区 | 国产日韩欧美在线精品| 免费人妻精品一区二区三区视频| 免费观看无遮挡的男女| 国产精品麻豆人妻色哟哟久久| 亚洲图色成人| 女性生殖器流出的白浆| 免费久久久久久久精品成人欧美视频 | av免费在线看不卡| 在线免费观看不下载黄p国产| 性高湖久久久久久久久免费观看| av又黄又爽大尺度在线免费看| 三级国产精品片| 精品国产一区二区三区久久久樱花| 国国产精品蜜臀av免费| 亚洲美女搞黄在线观看| 边亲边吃奶的免费视频| av在线播放精品| 国产又爽黄色视频| 超色免费av| 精品卡一卡二卡四卡免费| 日韩一区二区视频免费看| 久久99精品国语久久久| 国产1区2区3区精品| 久久精品aⅴ一区二区三区四区 | 欧美日韩综合久久久久久| 久久久国产一区二区| 三级国产精品片| 一级毛片黄色毛片免费观看视频| 免费久久久久久久精品成人欧美视频 | 久久精品夜色国产| 国产精品.久久久| 大码成人一级视频| 丰满饥渴人妻一区二区三| 久久久久久久久久人人人人人人| 大片电影免费在线观看免费| 在线观看www视频免费| 亚洲成人av在线免费| www.熟女人妻精品国产 | 搡女人真爽免费视频火全软件| 免费日韩欧美在线观看| 精品人妻熟女毛片av久久网站| 桃花免费在线播放| 亚洲五月色婷婷综合| 国产成人精品在线电影| 一级a做视频免费观看| 999精品在线视频| 亚洲欧美精品自产自拍| 综合色丁香网| 91成人精品电影| 成人手机av| 在现免费观看毛片| 国产在线视频一区二区| 国产成人精品婷婷| 亚洲国产成人一精品久久久| 国产成人精品久久久久久| 视频中文字幕在线观看| 久久久a久久爽久久v久久| av在线观看视频网站免费| 一本大道久久a久久精品| 欧美人与善性xxx| 十分钟在线观看高清视频www| 在线观看www视频免费| 国产av精品麻豆| 中国国产av一级| 乱码一卡2卡4卡精品| 国产黄频视频在线观看| av电影中文网址| 99re6热这里在线精品视频| 中国三级夫妇交换| 免费看av在线观看网站| 欧美日韩综合久久久久久| 黄色怎么调成土黄色| 在线观看免费视频网站a站| 免费观看a级毛片全部| 午夜激情av网站| 五月开心婷婷网| 亚洲av电影在线观看一区二区三区| tube8黄色片| 成人手机av| 熟女人妻精品中文字幕| 九草在线视频观看| 男女高潮啪啪啪动态图| 国产乱人偷精品视频| 欧美日韩成人在线一区二区| 丰满少妇做爰视频| 深夜精品福利| 一边亲一边摸免费视频| 精品人妻一区二区三区麻豆| 亚洲熟女精品中文字幕| 亚洲欧美中文字幕日韩二区| 色94色欧美一区二区| 亚洲精品,欧美精品| 婷婷色综合www| 在线精品无人区一区二区三| 亚洲一级一片aⅴ在线观看| 99热6这里只有精品| 免费观看在线日韩| 亚洲,一卡二卡三卡| 久久毛片免费看一区二区三区| 国产成人91sexporn| 香蕉精品网在线| 男女啪啪激烈高潮av片| 日韩欧美精品免费久久| 亚洲欧美成人精品一区二区| 成人国产av品久久久| 九九爱精品视频在线观看| 2022亚洲国产成人精品| 国产在视频线精品| 99re6热这里在线精品视频| 有码 亚洲区| av线在线观看网站| 制服诱惑二区| a级毛片黄视频| 欧美最新免费一区二区三区| 丰满乱子伦码专区| 精品亚洲成国产av| 国产欧美日韩综合在线一区二区| 国产 精品1| 九草在线视频观看| 91久久精品国产一区二区三区| av在线老鸭窝| 一区在线观看完整版| 亚洲精品第二区| 亚洲av日韩在线播放| 好男人视频免费观看在线| 国产探花极品一区二区| av一本久久久久| 成年女人在线观看亚洲视频| 色婷婷av一区二区三区视频| 免费看av在线观看网站| 伊人亚洲综合成人网| 中文字幕精品免费在线观看视频 | 综合色丁香网| 人妻 亚洲 视频| 18禁裸乳无遮挡动漫免费视频| 日韩制服丝袜自拍偷拍| 免费人妻精品一区二区三区视频| 99九九在线精品视频| 亚洲国产成人一精品久久久| 国产黄色免费在线视频| 男人爽女人下面视频在线观看| 成人亚洲欧美一区二区av| 啦啦啦视频在线资源免费观看| 国产又色又爽无遮挡免| 五月玫瑰六月丁香| 亚洲av在线观看美女高潮| 美女主播在线视频| 国产精品久久久久久精品古装| freevideosex欧美| 国产精品一区www在线观看| 亚洲第一区二区三区不卡| 一区二区三区乱码不卡18| 日韩熟女老妇一区二区性免费视频| 久久99热这里只频精品6学生| a级片在线免费高清观看视频| 国产成人精品婷婷| 免费黄频网站在线观看国产| 99热网站在线观看| 久热久热在线精品观看| 中文欧美无线码| 99热6这里只有精品| 人成视频在线观看免费观看| 欧美人与性动交α欧美软件 | 午夜福利视频精品| 亚洲精品美女久久久久99蜜臀 | 三级国产精品片| 亚洲av国产av综合av卡| 午夜激情av网站| 日本黄大片高清| 国产亚洲精品久久久com| 你懂的网址亚洲精品在线观看| 在线观看免费高清a一片| 亚洲精品美女久久av网站| 国产视频首页在线观看| 久热这里只有精品99| 国产精品免费大片| 亚洲国产看品久久| 五月玫瑰六月丁香| 精品亚洲成a人片在线观看| 色婷婷av一区二区三区视频| 乱人伦中国视频| 国产国语露脸激情在线看| 中文字幕免费在线视频6| 日韩中字成人| 美女视频免费永久观看网站| 制服诱惑二区| 亚洲国产欧美日韩在线播放| 黄片无遮挡物在线观看| 另类精品久久| 国产精品无大码| 成人二区视频| 国产精品偷伦视频观看了| 婷婷色av中文字幕| 国产一区二区三区av在线| 妹子高潮喷水视频| av播播在线观看一区| 人妻系列 视频| 丝袜人妻中文字幕| 久久人人爽人人片av| 午夜日本视频在线| 侵犯人妻中文字幕一二三四区| 精品人妻偷拍中文字幕| 九色亚洲精品在线播放| 日韩av不卡免费在线播放| 曰老女人黄片| 国产精品 国内视频| 国产黄色视频一区二区在线观看| 男的添女的下面高潮视频| 成年人午夜在线观看视频| 永久免费av网站大全| 久久久久网色| 纵有疾风起免费观看全集完整版| 亚洲精品日本国产第一区| 最近最新中文字幕大全免费视频 | 久久精品国产亚洲av天美| 久久这里只有精品19| 精品亚洲乱码少妇综合久久| 日本wwww免费看| 高清在线视频一区二区三区| 色吧在线观看| 午夜影院在线不卡| 中文精品一卡2卡3卡4更新| 亚洲国产看品久久| 2018国产大陆天天弄谢| 成人午夜精彩视频在线观看| 一级a做视频免费观看| 国产午夜精品一二区理论片| 久久影院123| 亚洲在久久综合| 高清不卡的av网站| 国产免费现黄频在线看| 久久午夜福利片| 一级毛片黄色毛片免费观看视频| 欧美 亚洲 国产 日韩一| 国产免费福利视频在线观看| a 毛片基地| 亚洲一区二区三区欧美精品| 日韩一区二区三区影片| 久久99蜜桃精品久久| 999精品在线视频| 久久精品久久久久久噜噜老黄| 欧美成人午夜免费资源| 亚洲av男天堂| 少妇精品久久久久久久| 各种免费的搞黄视频| 国产精品麻豆人妻色哟哟久久| 国产成人精品婷婷| 欧美变态另类bdsm刘玥| 青春草亚洲视频在线观看| 亚洲在久久综合| 日日摸夜夜添夜夜爱| 久久国产精品大桥未久av| 国产精品久久久久成人av| 国产成人精品无人区| 少妇人妻精品综合一区二区| 亚洲精品乱码久久久久久按摩| 日韩一区二区三区影片| 观看av在线不卡| 亚洲国产精品国产精品| 免费不卡的大黄色大毛片视频在线观看| 亚洲三级黄色毛片| 欧美精品av麻豆av| 精品人妻熟女毛片av久久网站| 大片免费播放器 马上看| 免费观看av网站的网址| 亚洲人与动物交配视频| 丝袜人妻中文字幕| 亚洲国产欧美日韩在线播放| 亚洲伊人久久精品综合| 国产免费又黄又爽又色| 免费av中文字幕在线| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 日本与韩国留学比较| 香蕉精品网在线| 菩萨蛮人人尽说江南好唐韦庄| 日本欧美视频一区| 日本猛色少妇xxxxx猛交久久| kizo精华| 久久 成人 亚洲| 中文字幕另类日韩欧美亚洲嫩草| 97人妻天天添夜夜摸| 中文欧美无线码| 丝瓜视频免费看黄片| 一本色道久久久久久精品综合| 日本欧美视频一区| 成人18禁高潮啪啪吃奶动态图| 少妇高潮的动态图| 国产精品久久久久成人av| 亚洲精品乱码久久久久久按摩| 国产无遮挡羞羞视频在线观看| 亚洲国产av影院在线观看| 国产xxxxx性猛交|