• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Application of Self-Organizing Feature Map Neural Network Based on K- means Clustering in Network Intrusion Detection

    2019-11-07 03:12:44LingTanChongLiJingmingXiaandJunCao
    Computers Materials&Continua 2019年10期

    Ling Tan,Chong Li,Jingming Xia and Jun Cao

    Abstract:Due to the widespread use of the Internet,customer information is vulnerable to computer systems attack,which brings urgent need for the intrusion detection technology.Recently,network intrusion detection has been one of the most important technologies in network security detection.The accuracy of network intrusion detection has reached higher accuracy so far.However,these methods have very low efficiency in network intrusion detection,even the most popular SOM neural network method.In this paper,an efficient and fast network intrusion detection method was proposed.Firstly,the fundamental of the two different methods are introduced respectively.Then,the selforganizing feature map neural network based on K- means clustering(KSOM)algorithms was presented to improve the efficiency of network intrusion detection.Finally,the NSLKDD is used as network intrusion data set to demonstrate that the KSOM method can significantly reduce the number of clustering iteration than SOM method without substantially affecting the clustering results and the accuracy is much higher than K- means method.The Experimental results show that our method can relatively improve the accuracy of network intrusion and significantly reduce the number of clustering iteration.

    Keywords: K- means clustering,self-organizing feature map neural network,network security,intrusion detection,NSL-KDD data set.

    1 Introduction

    With the status improvement of Internet technologies in modern society,network security now has become a widespread concern.In addition,in pace with the constant upgrades of related industries brought by new technologies such as cloud computing,networking,big data and block-chain,a huge number of distributed users and ubiquitous access to the Internet make the enterprise data boundary no longer exist.Meanwhile,the amount of data is increasing,which leads to a higher value and more security challenges.Moreover,considering the openness of the Internet platform with diverse audiences and connection types,the Internet is vulnerable to external attacks and its security is bound to be greatly threatened[Lin(2015)].In view of these severe issues,intrusion detection technology is particularly important.Network intrusion detection is a research hot spot but also a difficulty in the field of network security and its essence is a clustering problem[Wang,Peng and Luo(2012)].

    As we can see,regardless of labeled supervised learning or unlabeled unsupervised learning,there are different network models and algorithms for data classification problems with the constant development of machine learning.However,due to the high dimension of intrusion feature data of these classification problems in the field of network security as well as small difference between different intrusion categories,many intrusion patterns cannot be accurately clustered.Li et al.[Li,Guan,Zan et al.(2003)]Proposed a network intrusion research based on fuzzy clustering generalized regression neural network(GRNN),in which the method was focus on specified types of intrusion action pattern with the combination of fuzzy clustering and GRNN analysis.Despite of its high classification accuracy and reliability,the method cannot reach the requirements in terms of the diversity of network intrusion.Yi et al.[Yi,Li and Wang(2009)]Proposed a network intrusion detection method based on support vector machine,in which the method still has some problems such as high false alarm,excessive demands data for building up detection models,and low detection performance in small sample conditions without enough training data.By comparing network intrusion detection methods with different network models and algorithms,intrusion detection method based on self-organizing feature map(SOM)neural network is better,which has a shorter training time and a higher detection efficiency[Wang(2007);Wu and Yan(1999);Wan,Wang,Feng et al.(2012)],and it is able to make up deficiencies of the above network models and algorithms,however,the accuracy of network intrusion detection still has room for further improvement,and there are also shortcomings in the application of unsupervised learning.Therefore,according to the advantages ofK-means clustering algorithm to local classification[Kohonen(1995);Jari and Kohonen(1996)]based on the above analysis,an intrusion detection algorithm based onK-means clustering selforganizing feature map neural network(KSOM)network is proposed in this paper.This method even has higher classification accuracy for network intrusion detection and supports unsupervised network anomaly detection.

    This paper is organized in four sections.In the second section,an improved net-work intrusion detection method based onK-means clustering self-organizing feature map neural network(KSON)is comprehensively introduced,as well as introduced respectively theoretical background of the related SOM network model andK-Means clustering algorithm.The third section gives the experimental process and result analysis.In this section,we introduce a new network intrusion detection database.In addition,we propose a new feature extraction method.The conclusion of this paper is drawn in the fourth section.

    2 KSOM theoretical backgrounds

    Due to the high dimensions of the network intrusion feature data,data differences among different intrusion classes are relatively small.Local optimal clustering result cannot be achieved if SOM neural network is simply adopted.And the corresponding learning rate will be low,which makes many intrusion modes unable to be accurately clustered.Note thatK-means clustering algorithm has high clustering performance in dealing with big data sets.And its time complexity is almost linear,whose clustering iteration time is significantly reduced with the advantage of local optimal clustering result.According to the above analysis,the feature of local optimum based onK-means clustering is adopted to improve the SOM neural network to cluster the network intrusion data in this paper.

    2.1 SOM neural network

    SOM neural network was first proposed by the Finnish mathematician Teuvo Kohonen in 1982[Teuvo(1982)].It is an unsupervised competitive learning network that simulates the working characteristics of human brain.By automatically searching the intrinsic and essential attributes of the sample,the parameters and structure of the network are changed with self-organization and self-adaption.It mainly implements the function of mapping similar sample points in the high dimensional space to the adjacent neurons in the network output.For a certain problem,a certain number of neurons are set,and each neuron corresponds to a weight vector.The different classes of data are clustered into different neurons for classification purpose through training[Bukka,Sivarama and Raju(2018)]as shown in Fig.1.

    Figure 1:The network topology of SOM neural network

    It is a feed forward neural network consisting of two layers of neurons,and Fig.1 is divided into the input layer and the competition layer,i.e.,the output layer.The explanation between the two layers is as follows:

    Input layer:The outside information is collected to each neuron of the output layer through the weight vector.

    Output layer:The winning neuron and the neighborhood are obtained through weight competition using competition algorithm.

    The neurons between the two layers are connected by bidirectional connections,and there is no hidden layer in this network.The basic thought of this network model is the corresponding competition opportunities of the competitive layer and the neuron competition to the input mode,and there exists a neuron that eventually becomes the winner of the competition,this winning neuron represents the classification of the input pattern,thus achieving the result of the clustering.The keywords of the SOM mainly include winning neuron,neighborhood and weight adjustment function.

    (1)Winning Neurons(WN)

    For input vectorX(x1,x2,…,xn)and competitive layer(output layer)neuronj,the network weight isWij(i=1,2,…,n;j=1,2,…,m).The distance between the input vector and the weight vector is calculated by Euclidean distance formula Eq.(1),and the minimum value of the distance corresponding to the neuron in the SOM is then obtained.

    The main approach is to promote competition among the output neurons of the network in an attempt to be activated.As a result,there is only one output neuron being activated at each moment,while the statuses of the other neurons are inhibited.This activated neuron is called winning neuron(WN).

    (2)Neighborhood

    For each WN,the input vectorXrepresented by its nearest neuron generally refers to the neuron near WN in SOM,i.e.,the neuron neighborhood(N).

    (3)Weight Adjustment Function

    This function describes the adjustment of WN and N that are changing with the number of iterationstrelative to input vectorX,which can be represented by(2),

    ,wheretis the number of iterations,andηis the learning rate.

    The training process of SOM neural network can be divided into four steps:

    Step 1:Initialize network weightWij,and set the maximum number of iterationsT;

    Step 2:Normalize each input vectorXin NSL-KDD network intrusion detection database,and calculate WN and N;

    Step 3:Update WN,N andWijaccording to the weight adjustment function;

    Step 4:Execute the above steps repeatedly until the number of iterations reaches the given maximum number of iterations.

    2.2 K-means clustering

    TheK-means clustering was proposed Johnson and Wichern in 2002,and then it is probably the most popular methods in the world[Capó,Pérez,Jose et al.(2017)].K-means clustering algorithm is also a most commonly used indirect clustering algorithm based on sample similarity.It belongs to an unsupervised learning method,and the cluster is divided by minimizing the clustering error[Yu,Chu,Wang et al.(2017)].In addition,it is a classic dynamic clustering algorithm on the basis of point wise modification iteration,the key point of which adopt the sum of square errors as criterion function.Its basic thought is to randomly select data objects as the initial center from the data set containing data objects first,then calculate the distance between each data object and each center.According to the nearest neighbor rule,all data objects will be partitioned into the clusters represented by the nearest center.Then the mean of the data objects in each cluster is calculated as the center of each cluster.By comparing the new center and the last center,it can be asserted that if the new center does not change,then the algorithm converges successfully and will output the result,otherwise all the data objects will be re-divided according to the new center until the convergence conditions of the algorithm are satisfied.However,the accuracy of theK-means procedure is very dependent upon the choice of the initial seeds.Thus,this paper presents the efficient strategy to improve theK-means performance which hybrid SOM neural network,the next section will explain in detail carefully.

    The concrete implementation steps are as follows:Given data setX={x1,x2,…xN},xn∈R d,(n=1,2,…N),K-means clustering algorithm will divide the data set intoMdisjoint clusters according to the optimal clustering criteria.The clustering algorithm needs to assign again cluster numberk and initial cluster centermi,and calculate the distance between the input vector of each point to the cluster center through different equations,then a new cluster centercan be obtained,later the training process will repeat until the change of the cluster center is smaller than a given valueε,which is the ending-criterion of the algorithm.

    2.3 KSOM algorithm

    KSOM algorithm proposed in this paper usesK-means clustering algorithm to cluster local data classified by SOM,so that the accuracy of the classification of the whole network intrusion data will reach its best level.The core idea of the KSOM network intrusion detection method proposed in this paper is that the winning neural has reached by SOM to merge byK-means clustering algorithm.Thus,the weight vector of SOM neural network is adopted as the input ofK-means clustering algorithm.Then the input data set is normalized to facilitate model training,and finally sent to the network for training and learning.Besides,in the local clustering process,the network weight of the SOM will be constantly adjusted along with the change of the iterations,and will gradually approximate to the input data.Therefore,we will not solve the SOM cluster center in KSOM algorithm,but only calculate its network weight vector.Then the network weight vector is adopted as the input of theK-means clustering algorithm for local clustering,and finally the result of clustering is achieved.

    The training data set logic chart as shown in Fig.2:

    Figure 2:Entire clustering process using the KSOM method

    The training process of KSOM algorithm can be divided into the following seven steps:

    Step 1:Use the network weights extracted from the training results of the SOM neural network as the input of theK-means clustering,and the input is processed with normalization;

    Step 2:Select k data elements m1,m2,…,mkrandomly as initial cluster center;

    Step 3:Calculate the Euclidean distance between each data point and the cluster center;

    Step 4:Cluster the data in accordance with the criterion that minimum clustering can be obtained when it reaches cluster center;

    Step 5:Adjust the cluster center to regulate Eq.(3),whereNjrepresents the number of data contained in classj,andCjrepresents the data sets of classj;

    Step 7:According to the clustering results of Step 6,cluster locally the original data represented by each network weight value and the algorithm ends.

    Through the above steps,the modification of training algorithm of SOM in this research affects neurons which are not close to the winner neuron on feature space,and the winner neuron pulls more neurons into the same cluster.Further,WN in competitive layer is clustered again by the improved KSOM based onK-means algorithm to ensure that the neurons are not being suppressed in the winning neighborhood(N)of the competitive layer of SOM during the competition.For each iteration,the local WN will lead the adjustment degree of the weight vector change greatly,which makes weight vector become smaller and smaller,and the number of iterations decreases.The final learning rate is significantly improved as well as the clustering accuracy.

    After training,the weight vectors of each neuron in the SOM neural network will separately cluster the input vectors to certain neurons,thus the classification result of different data is obtained.As mentioned above,network intrusion detection is essentially a clustering problem.Therefore,SOM neural network has a certain network intrusion detection effect.Although the intrusion detection method based on SOM neural network has the features of high detection rate,short training time and high versatility,there is still further room for improvement of its detection accuracy,and there are also shortcomings in unsupervised learning applications.Especially the choice of the learning rate makes it have to compromise between the learning rate and stability of the final weight vector,and sometimes the local neurons cannot converge precisely,which makes the initial weight vector of the neuron more distant from the input vector,so that it is unable to win in the competition.Therefore,according to the advantages ofK-means clustering algorithm in local clustering implementation as well as its significant learning rate performance,a KSOM intrusion detection algorithm based on SOM is proposed in this paper.

    3 Experiments procedure and result analysis

    3.1 Data description

    In this paper,NSL-KDD network intrusion detection database is adopted as the training and testing data set[Revathi and Malathi(2013)].Compared with KDD-CUP99 network intrusion detection data set,this data set is provided in CSV format,which has eliminated redundant data in KDD-CUP99 data set,and has overcome the shortcoming that the classifier is biased towards repeated records,and the performance of learning methods is vulnerable to be affected.Moreover,NSL-KDD data set has properly selected the proportion of normal and abnormal data and the volume of test set and training set data is more reasonable,therefore,it is very suitable for model algorithm validation and result evaluation analysis.NSL-KDD network intrusion detection database not only can reflect the structure of network traffic and intrusion conditions,but also can be modified,extended and duplicated.The record of NSL-KDD network intrusion detection database is as shown in Tab.1.

    Table 1:NSL-KDD network intrusion detection database record truncation table

    As shown in Tab.1,NSL-KDD network intrusion detection data set contains five types of data,that is,Normal,Probe,R2L,U2R and Dos,and consists of 125973 training data and 22544 test data sets,each record contains 41 features,such as duration,protocol,service,symbol,source byte and target byte.“attack”vs.“normal” labels as shown in Figs.3,and 4 different types of attacks as shown in Fig.4.

    Figure 3:The distribution of attack and normal

    Figure 4:The distribution of 4 different types of attack

    3.2 Data process

    In this paper,the NSL-KDD data sets are used as training sets and testing sets of our paper,the KSOM utilizes numerical values for the process of data training and testing.Further,the data preprocessing approaches are divided into feature extraction and feature transformation models based on working methodology over the big data processing[Kamei and Kawakami(2018)].Thus,in order to facilitate the next model training,first step in experiments is that turn the character values into numerical values and use the attribute ratio data feature extraction method which ascending feature according to its repeated time for data processing.For example,TCP protocol type have a greater number of repeated time,so we convert TCP protocol type into number 1,etc.as shown in Tab.2.

    Meanwhile,use the forward error correction(FEC)coding technology to encode the classification features into discrete features for the symbolic features of the 41 features,so that the one-dimensional vectors can be transformed into 3 dimensional vectors,such as TCP,UDP and ICMP.Similarly,several other features are mapped into different dimensions of vectors,as shown in Tab.3.

    Table 3:Different symbol feature vector dimensions before and after processing

    Then execute the normalization process of the numerical characteristics,the normalization Eq.(4)is given as follows:

    wherevalis the original value,valnewis the normalized data value,VminandVminare the maximum value and the minimum value of this specific data,respectively.When normalization process is done,each feature will be restricted to an interval of[0,1].After the data set is preprocessed and normalized,network training will start.

    3.3 Experimental process

    In this paper,Python 3.6 environment is adopted to training and testing the NSL-KDD data sets.The implementation of the corresponding pseudo-code is shown in Fig.5.

    Figure 5:KSOM model algorithm pseudo code

    Firstly,data import and initialization processes of the NSL-KDD network intrusion detection data set are implemented as well as normalization.Secondly,the clustering algorithm is executed including the judgment of the end condition.Then the output is transferred to the next layer ofK-means clustering model.Similarly,the data normalization is first implemented,then clustering process starts,and finally the judgment of the end condition is implemented.When both of the two end conditions are satisfied,the clustering result is obtained.

    In this paper,we tested respectively SOM neural network,K-means and KSOM method with NSL-KDD set data.First approach is SOM,the learning rateηwas set to 0.01.Second approach isK-means.For over fitting not happen we set the kind numberskequal 8 and the initial point is chosen as far as possible.The proposed KSOM method the learning rateηwas also set to 0.01.But there is a difference that the initial point was chosen as the weight vectors of each neuron in the SOM neural network.

    3.4 Result analysis

    After repeated training and we have tested three different methods,as shown in Fig.6,the average error of SOM neural network clustering along with the increase of iterations.It can be seen from Fig.6,with the increase of iterations,the average error is gradually decreased,yet the update of the weight vector of SOM neural network in the process of training is not global optimal,thus the sum of the average error tends to be increased slightly,followed by the adjustment it begins to decline,hence it will show a saw tooth downward decline.And although the sum of the average error is small,the number of iterations takes 1600 times before it starts to stabilize.Compare the Fig.7 the average error ofK-means clustering along with the increase of iterations,the number of iterations have a substantial reduction which reached 10 times.Unfortunately this method is at the expensive of increased average error.And the proposed of KSOM method as shown in Fig.8,It can be seen that clustering ends after 80 iterations,the error of which stopped at a certain value,and there is also no saw tooth downward attenuation found.It means that the KSOM method is able to solve the problem that SOM neural network cannot achieve a local optimum,and the number of iterations is reduced to a large extent,which improves the clustering efficiency.Meanwhile,the KSOM method also deals with the problem of lower clustering result which happened in theK-Means method.

    Figure 6:The average error decay process of SOM clustering

    Figure 7:The average error decay process of K- Means clustering

    Figure 8:The average error decay process of KSOM clustering

    The next in this paper,accuracy(A C)is adopted as the criterion to evaluate the network intrusion accuracy.The calculation Eq.(5)is given as below:

    whereTPis the number of correct classified attack behavior samples,TNis the number of correct classified normal behavior samples,FPis the number of wrongly classified normal behavior samples,andFNis the number of wrongly classified attack behavior samples.

    In order to test the effect of the proposed KSOM network intrusion detection method based onK-means,NSL-KDD network intrusion detection data set was also trained and tested on other methods,and a comparison was made on the performances before and after the improvement of SOM neural network clustering method,as shown in Tab.3.

    Table 3:Comparison of clustering methods

    From Tab.3 we can see that the accuracy of the improved KSOM based onK-means algorithm is higher than that of the original counterpart under the same data set.In addition,the KSOM model proposed in this paper not only is the number of iterations better than other algorithms,it also has good results in accuracy.Thus,this paper also compares other existing network intrusion detection algorithms on the accuracy of intrusion detection under the same data set.The comparison results are shown in Tab.4.The result shows that the proposed KSOM based onK-means algorithm has a better performance in network intrusion detection.

    Table 4:Comparison of accuracy of intrusion detection in different method

    4 Conclusion

    To deal with the drawback of self-organizing neural network that it has a large number of iterations in network intrusion detection,a KSOM model was proposed in this paper by utilizing the characteristic thatK-means clustering algorithm has faster clustering speed.The experimental results showed that the iterations of the KSOM method was significantly reduced in comparing with self-organizing neural network model and the accuracy was significantly improved with respect to other methods of network intrusion.

    Meanwhile,our method achieved a higher efficiency relatively when implementing network intrusion detection.Thus,the KSOM method has high performance to provide more reliable data and support for the establishment of network security mechanism.

    av卡一久久| 欧美激情 高清一区二区三区| 美女脱内裤让男人舔精品视频| 久久性视频一级片| 久久久久人妻精品一区果冻| 在线免费观看不下载黄p国产| 欧美av亚洲av综合av国产av | 黑人猛操日本美女一级片| 99九九在线精品视频| 热re99久久精品国产66热6| 80岁老熟妇乱子伦牲交| 亚洲av欧美aⅴ国产| 狂野欧美激情性xxxx| 国产成人免费无遮挡视频| 热re99久久精品国产66热6| 宅男免费午夜| 制服诱惑二区| av国产精品久久久久影院| 99热全是精品| 99国产精品免费福利视频| 婷婷色麻豆天堂久久| 国产精品免费大片| 欧美日韩精品网址| 久久国产精品男人的天堂亚洲| 黑丝袜美女国产一区| 少妇被粗大猛烈的视频| 热re99久久国产66热| 女人被躁到高潮嗷嗷叫费观| 亚洲中文av在线| 成人黄色视频免费在线看| 9色porny在线观看| 晚上一个人看的免费电影| 赤兔流量卡办理| 色精品久久人妻99蜜桃| 夫妻午夜视频| 亚洲三区欧美一区| 免费在线观看完整版高清| 亚洲精品日韩在线中文字幕| 国产视频首页在线观看| 日韩一区二区三区影片| 国产探花极品一区二区| 午夜老司机福利片| 热99国产精品久久久久久7| tube8黄色片| 国产有黄有色有爽视频| 成人三级做爰电影| 少妇 在线观看| 国产成人午夜福利电影在线观看| 如日韩欧美国产精品一区二区三区| 中国国产av一级| 亚洲精品第二区| 久久婷婷青草| 美女高潮到喷水免费观看| 黄色一级大片看看| 亚洲av综合色区一区| 少妇精品久久久久久久| 国产精品国产av在线观看| 啦啦啦 在线观看视频| 永久免费av网站大全| 麻豆av在线久日| 电影成人av| 久久久久精品久久久久真实原创| 久久久久精品久久久久真实原创| 国产精品人妻久久久影院| 成人影院久久| 看免费av毛片| 国产片特级美女逼逼视频| 啦啦啦啦在线视频资源| 在线观看人妻少妇| 亚洲男人天堂网一区| 最近最新中文字幕大全免费视频 | 美女脱内裤让男人舔精品视频| 欧美人与性动交α欧美精品济南到| 精品少妇久久久久久888优播| 久久久久久免费高清国产稀缺| 亚洲国产精品999| 国产精品成人在线| 91精品伊人久久大香线蕉| 丝瓜视频免费看黄片| 99精国产麻豆久久婷婷| 一级片'在线观看视频| 丝袜脚勾引网站| 国产淫语在线视频| 街头女战士在线观看网站| 看免费av毛片| 免费黄频网站在线观看国产| 亚洲av国产av综合av卡| 丰满迷人的少妇在线观看| 精品国产超薄肉色丝袜足j| a级片在线免费高清观看视频| 91国产中文字幕| 久久久久久久精品精品| 国产乱人偷精品视频| 丝袜美腿诱惑在线| 欧美另类一区| 中文字幕亚洲精品专区| 制服丝袜香蕉在线| 人人澡人人妻人| 国产精品蜜桃在线观看| 免费观看人在逋| 啦啦啦在线观看免费高清www| 日本欧美国产在线视频| 免费在线观看完整版高清| 欧美人与性动交α欧美精品济南到| 91精品国产国语对白视频| 亚洲美女搞黄在线观看| 男女之事视频高清在线观看 | 精品第一国产精品| 伊人久久国产一区二区| 永久免费av网站大全| 久久久久精品国产欧美久久久 | 色视频在线一区二区三区| 悠悠久久av| 国产精品.久久久| 色婷婷av一区二区三区视频| 热99国产精品久久久久久7| 人妻 亚洲 视频| 免费高清在线观看视频在线观看| 亚洲国产最新在线播放| 热99久久久久精品小说推荐| 菩萨蛮人人尽说江南好唐韦庄| 亚洲国产最新在线播放| 国产欧美日韩一区二区三区在线| 亚洲国产精品国产精品| 老司机影院毛片| 精品视频人人做人人爽| 美女高潮到喷水免费观看| 最近最新中文字幕大全免费视频 | 日本黄色日本黄色录像| 亚洲精品视频女| 国产精品人妻久久久影院| 国产免费一区二区三区四区乱码| 国产成人系列免费观看| 91aial.com中文字幕在线观看| 久久 成人 亚洲| 国产日韩欧美亚洲二区| 1024视频免费在线观看| 91老司机精品| 国产又爽黄色视频| 国产熟女午夜一区二区三区| 国产精品嫩草影院av在线观看| 久久久精品免费免费高清| 成人手机av| 国产成人免费无遮挡视频| 亚洲国产精品国产精品| 超色免费av| 国产精品 欧美亚洲| 亚洲欧美一区二区三区久久| a级片在线免费高清观看视频| 久久人妻熟女aⅴ| 日日撸夜夜添| 天堂俺去俺来也www色官网| 不卡视频在线观看欧美| 色综合欧美亚洲国产小说| 一级黄片播放器| 精品酒店卫生间| 99久久精品国产亚洲精品| 老司机在亚洲福利影院| 啦啦啦 在线观看视频| 一级毛片 在线播放| a 毛片基地| 一本一本久久a久久精品综合妖精| bbb黄色大片| 免费在线观看视频国产中文字幕亚洲 | 午夜日韩欧美国产| 国产精品国产av在线观看| 免费在线观看黄色视频的| 亚洲欧美清纯卡通| a级片在线免费高清观看视频| 又大又黄又爽视频免费| 久热爱精品视频在线9| 日韩,欧美,国产一区二区三区| e午夜精品久久久久久久| 97人妻天天添夜夜摸| 精品少妇黑人巨大在线播放| 777米奇影视久久| 国产日韩欧美视频二区| 欧美激情高清一区二区三区 | 看十八女毛片水多多多| 伦理电影免费视频| 国产无遮挡羞羞视频在线观看| 国产午夜精品一二区理论片| 亚洲欧洲国产日韩| 欧美成人午夜精品| 人人妻人人澡人人爽人人夜夜| 色综合欧美亚洲国产小说| 国产无遮挡羞羞视频在线观看| 99精国产麻豆久久婷婷| 日韩成人av中文字幕在线观看| 十八禁高潮呻吟视频| 日韩一本色道免费dvd| 丁香六月欧美| 日韩 欧美 亚洲 中文字幕| 香蕉国产在线看| 午夜福利影视在线免费观看| 在线天堂中文资源库| 在线观看三级黄色| 建设人人有责人人尽责人人享有的| 色94色欧美一区二区| 多毛熟女@视频| 熟妇人妻不卡中文字幕| 欧美精品人与动牲交sv欧美| 久久精品国产综合久久久| 两个人免费观看高清视频| 99精品久久久久人妻精品| 2021少妇久久久久久久久久久| 欧美激情 高清一区二区三区| e午夜精品久久久久久久| 麻豆精品久久久久久蜜桃| 精品国产一区二区三区久久久樱花| 搡老乐熟女国产| av线在线观看网站| 黄片无遮挡物在线观看| 欧美人与性动交α欧美软件| 亚洲av日韩精品久久久久久密 | 久久久久久久精品精品| 久久毛片免费看一区二区三区| 人人妻人人澡人人看| 9热在线视频观看99| 国产欧美亚洲国产| av天堂久久9| 精品亚洲成国产av| 街头女战士在线观看网站| 我要看黄色一级片免费的| 亚洲,欧美精品.| 一级毛片 在线播放| 丰满饥渴人妻一区二区三| 一级毛片黄色毛片免费观看视频| 久久 成人 亚洲| 国产av一区二区精品久久| 少妇人妻 视频| 亚洲精品成人av观看孕妇| 美女脱内裤让男人舔精品视频| 久久综合国产亚洲精品| 午夜福利乱码中文字幕| 日韩中文字幕视频在线看片| www.自偷自拍.com| 香蕉国产在线看| 亚洲精品日本国产第一区| 19禁男女啪啪无遮挡网站| 午夜久久久在线观看| 在线亚洲精品国产二区图片欧美| 久久精品亚洲av国产电影网| 黄色视频在线播放观看不卡| 免费女性裸体啪啪无遮挡网站| 精品一区二区三区av网在线观看 | 少妇人妻 视频| 亚洲精品成人av观看孕妇| 精品国产露脸久久av麻豆| 欧美久久黑人一区二区| 免费少妇av软件| 操出白浆在线播放| 国产精品一二三区在线看| 男女免费视频国产| 最近手机中文字幕大全| 看免费成人av毛片| 91老司机精品| a级片在线免费高清观看视频| 国产精品人妻久久久影院| 国产欧美日韩一区二区三区在线| 如日韩欧美国产精品一区二区三区| 美女国产高潮福利片在线看| 一级毛片黄色毛片免费观看视频| 亚洲婷婷狠狠爱综合网| 黄色一级大片看看| 亚洲精品久久午夜乱码| 欧美激情 高清一区二区三区| 在线观看三级黄色| 国产野战对白在线观看| 久久精品久久久久久噜噜老黄| 亚洲欧美日韩另类电影网站| 亚洲精品aⅴ在线观看| 午夜91福利影院| 男女床上黄色一级片免费看| 国产视频首页在线观看| 欧美变态另类bdsm刘玥| 亚洲欧洲日产国产| 美女中出高潮动态图| 亚洲国产av影院在线观看| 性色av一级| 亚洲一码二码三码区别大吗| 无限看片的www在线观看| 亚洲国产日韩一区二区| 人人澡人人妻人| 日韩欧美一区视频在线观看| 在线观看三级黄色| 亚洲欧美色中文字幕在线| 亚洲欧洲国产日韩| 亚洲精品国产av蜜桃| 国产极品天堂在线| 久热爱精品视频在线9| 中文字幕另类日韩欧美亚洲嫩草| 精品久久久精品久久久| 亚洲成人av在线免费| 国产av国产精品国产| 久久天堂一区二区三区四区| 男女国产视频网站| 另类亚洲欧美激情| 夫妻午夜视频| 午夜免费观看性视频| 成人国语在线视频| 男女午夜视频在线观看| 菩萨蛮人人尽说江南好唐韦庄| 如何舔出高潮| 国产精品一国产av| 999精品在线视频| 丝袜人妻中文字幕| 国产亚洲av高清不卡| 国产女主播在线喷水免费视频网站| 人妻人人澡人人爽人人| 亚洲成色77777| 午夜免费鲁丝| 亚洲成人国产一区在线观看 | 久久久久国产精品人妻一区二区| 久久天躁狠狠躁夜夜2o2o | 亚洲精品久久成人aⅴ小说| 日日撸夜夜添| 日本91视频免费播放| 久久这里只有精品19| 韩国av在线不卡| 美女高潮到喷水免费观看| 亚洲国产中文字幕在线视频| 黄色 视频免费看| 亚洲精品视频女| 亚洲欧美中文字幕日韩二区| 国产成人精品久久二区二区91 | 看十八女毛片水多多多| 毛片一级片免费看久久久久| 女人久久www免费人成看片| 青青草视频在线视频观看| kizo精华| 国产日韩一区二区三区精品不卡| 欧美激情 高清一区二区三区| 久久久精品94久久精品| 国产精品国产av在线观看| www.精华液| 国产xxxxx性猛交| 七月丁香在线播放| 久久久国产欧美日韩av| 亚洲国产av新网站| 新久久久久国产一级毛片| 又大又黄又爽视频免费| 亚洲图色成人| 桃花免费在线播放| av在线老鸭窝| 亚洲国产欧美在线一区| 日韩精品免费视频一区二区三区| 午夜久久久在线观看| 久久狼人影院| 色综合欧美亚洲国产小说| 国产精品久久久av美女十八| 国产男人的电影天堂91| 日韩精品免费视频一区二区三区| 色视频在线一区二区三区| 一本一本久久a久久精品综合妖精| 制服人妻中文乱码| 国产伦理片在线播放av一区| 国产成人av激情在线播放| 欧美激情 高清一区二区三区| 亚洲欧洲精品一区二区精品久久久 | 成年美女黄网站色视频大全免费| 女性被躁到高潮视频| 国产免费福利视频在线观看| 亚洲欧美中文字幕日韩二区| 亚洲精品自拍成人| 啦啦啦啦在线视频资源| 中文字幕人妻熟女乱码| 熟妇人妻不卡中文字幕| 国产成人免费观看mmmm| 免费少妇av软件| 色综合欧美亚洲国产小说| 国产色婷婷99| 国产精品三级大全| 久久亚洲国产成人精品v| 青春草亚洲视频在线观看| 久久久欧美国产精品| av天堂久久9| 久久亚洲国产成人精品v| 成人漫画全彩无遮挡| 亚洲,欧美精品.| 黄片播放在线免费| 国产成人精品福利久久| av国产久精品久网站免费入址| 精品国产一区二区三区久久久樱花| 精品久久久精品久久久| 国产成人精品久久二区二区91 | 美女脱内裤让男人舔精品视频| 人妻人人澡人人爽人人| 国产成人精品无人区| 丝袜脚勾引网站| 久久天躁狠狠躁夜夜2o2o | 久久av网站| 黄片播放在线免费| 伦理电影大哥的女人| 99久久综合免费| 99国产综合亚洲精品| 又黄又粗又硬又大视频| 大话2 男鬼变身卡| 男人爽女人下面视频在线观看| 天天操日日干夜夜撸| 亚洲欧美精品综合一区二区三区| 欧美亚洲 丝袜 人妻 在线| 亚洲精品在线美女| 视频区图区小说| 亚洲图色成人| 777米奇影视久久| 午夜福利乱码中文字幕| 黄片播放在线免费| 久久精品人人爽人人爽视色| 我要看黄色一级片免费的| 亚洲一码二码三码区别大吗| 欧美成人午夜精品| 99精品久久久久人妻精品| 黑人巨大精品欧美一区二区蜜桃| 国产97色在线日韩免费| 久久精品aⅴ一区二区三区四区| 黑人猛操日本美女一级片| 国产又色又爽无遮挡免| xxxhd国产人妻xxx| 国产精品一区二区在线观看99| 一本久久精品| 老鸭窝网址在线观看| 少妇人妻精品综合一区二区| 欧美精品一区二区免费开放| 欧美 日韩 精品 国产| 亚洲国产av新网站| 精品一区二区三卡| 啦啦啦在线观看免费高清www| 亚洲图色成人| 色婷婷av一区二区三区视频| 男女无遮挡免费网站观看| 最近最新中文字幕免费大全7| 女的被弄到高潮叫床怎么办| bbb黄色大片| 精品亚洲成国产av| 欧美另类一区| 捣出白浆h1v1| 国产在视频线精品| 久久免费观看电影| 欧美亚洲日本最大视频资源| 极品人妻少妇av视频| 一个人免费看片子| 久久久久精品国产欧美久久久 | 中文字幕亚洲精品专区| 18禁裸乳无遮挡动漫免费视频| 日韩精品免费视频一区二区三区| 久久综合国产亚洲精品| 国产精品一区二区在线观看99| 亚洲四区av| 亚洲精品视频女| 国产精品久久久久久久久免| 极品人妻少妇av视频| 巨乳人妻的诱惑在线观看| svipshipincom国产片| 99国产精品免费福利视频| 毛片一级片免费看久久久久| 国产成人精品无人区| 麻豆乱淫一区二区| 精品国产一区二区久久| 国产一区亚洲一区在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 国产视频首页在线观看| 成人免费观看视频高清| 热99国产精品久久久久久7| 婷婷色麻豆天堂久久| 飞空精品影院首页| 亚洲精品乱久久久久久| 亚洲精品一二三| 国产免费视频播放在线视频| 久久人妻熟女aⅴ| 亚洲精品第二区| 欧美日韩福利视频一区二区| 国产一区有黄有色的免费视频| 精品一区在线观看国产| 亚洲av日韩精品久久久久久密 | 国产亚洲一区二区精品| 久久久久精品久久久久真实原创| 欧美在线黄色| 国产视频首页在线观看| 午夜福利免费观看在线| 下体分泌物呈黄色| 美女主播在线视频| 免费少妇av软件| 亚洲av电影在线观看一区二区三区| 啦啦啦 在线观看视频| 国产免费一区二区三区四区乱码| 女性生殖器流出的白浆| 中文字幕av电影在线播放| 国产精品蜜桃在线观看| 十八禁网站网址无遮挡| 青青草视频在线视频观看| 国产一卡二卡三卡精品 | 国产99久久九九免费精品| 亚洲国产精品999| 久久ye,这里只有精品| 免费在线观看完整版高清| 一区二区三区四区激情视频| 性高湖久久久久久久久免费观看| 一级毛片电影观看| 一本一本久久a久久精品综合妖精| 久久影院123| 十八禁网站网址无遮挡| 中国国产av一级| 99国产精品免费福利视频| 一二三四中文在线观看免费高清| 精品酒店卫生间| 中文字幕高清在线视频| 最近中文字幕2019免费版| 咕卡用的链子| 你懂的网址亚洲精品在线观看| av国产久精品久网站免费入址| 黑丝袜美女国产一区| 高清欧美精品videossex| 免费观看av网站的网址| av国产久精品久网站免费入址| 亚洲精品美女久久久久99蜜臀 | 99九九在线精品视频| 久久久久久久久久久久大奶| 女人被躁到高潮嗷嗷叫费观| 又粗又硬又长又爽又黄的视频| 亚洲精品美女久久久久99蜜臀 | 一个人免费看片子| 国产男人的电影天堂91| 久久精品aⅴ一区二区三区四区| 综合色丁香网| 免费观看av网站的网址| 欧美日韩精品网址| 汤姆久久久久久久影院中文字幕| 丝袜在线中文字幕| 成人三级做爰电影| 黄色一级大片看看| 午夜激情av网站| 视频区图区小说| 人妻 亚洲 视频| 黄色毛片三级朝国网站| 久久久久久久久久久久大奶| 丝瓜视频免费看黄片| 丰满乱子伦码专区| 成人亚洲欧美一区二区av| 国产亚洲av高清不卡| 亚洲av男天堂| 深夜精品福利| 夜夜骑夜夜射夜夜干| 一区二区三区精品91| 午夜福利视频在线观看免费| 青青草视频在线视频观看| 久久人妻熟女aⅴ| 国产一级毛片在线| 国产男人的电影天堂91| 国产在线免费精品| 九色亚洲精品在线播放| 精品一区二区三区四区五区乱码 | 18禁裸乳无遮挡动漫免费视频| 一本一本久久a久久精品综合妖精| 高清欧美精品videossex| 国产精品一国产av| 久久精品熟女亚洲av麻豆精品| 日日爽夜夜爽网站| 一级,二级,三级黄色视频| 久久精品国产a三级三级三级| 欧美国产精品一级二级三级| 黑丝袜美女国产一区| 亚洲三区欧美一区| 国产精品人妻久久久影院| 日韩,欧美,国产一区二区三区| 亚洲国产精品成人久久小说| 免费在线观看黄色视频的| 考比视频在线观看| 午夜91福利影院| 中文欧美无线码| 午夜影院在线不卡| 国产1区2区3区精品| 老鸭窝网址在线观看| 日日啪夜夜爽| 亚洲情色 制服丝袜| 人体艺术视频欧美日本| 亚洲成人一二三区av| 成人三级做爰电影| 久久久久久久久久久免费av| 国产日韩欧美视频二区| av又黄又爽大尺度在线免费看| 国产欧美亚洲国产| 免费黄色在线免费观看| 国产成人欧美在线观看 | 久久这里只有精品19| 亚洲,欧美精品.| 老司机亚洲免费影院| 国产国语露脸激情在线看| 赤兔流量卡办理| 亚洲欧美清纯卡通| 欧美日韩一级在线毛片| 国产又色又爽无遮挡免| 亚洲自偷自拍图片 自拍| 精品国产乱码久久久久久小说| 久久久欧美国产精品| 亚洲自偷自拍图片 自拍| 看非洲黑人一级黄片| 国产不卡av网站在线观看| 高清欧美精品videossex| 日韩伦理黄色片| 国产一卡二卡三卡精品 | 成人亚洲欧美一区二区av| 亚洲精品国产区一区二| 多毛熟女@视频| 免费观看人在逋| 午夜精品国产一区二区电影| 男女国产视频网站| 成年美女黄网站色视频大全免费| 18禁观看日本| av天堂久久9| 最近最新中文字幕大全免费视频 | 在线天堂最新版资源| 晚上一个人看的免费电影| 欧美精品av麻豆av| 满18在线观看网站|