• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Application of Self-Organizing Feature Map Neural Network Based on K- means Clustering in Network Intrusion Detection

    2019-11-07 03:12:44LingTanChongLiJingmingXiaandJunCao
    Computers Materials&Continua 2019年10期

    Ling Tan,Chong Li,Jingming Xia and Jun Cao

    Abstract:Due to the widespread use of the Internet,customer information is vulnerable to computer systems attack,which brings urgent need for the intrusion detection technology.Recently,network intrusion detection has been one of the most important technologies in network security detection.The accuracy of network intrusion detection has reached higher accuracy so far.However,these methods have very low efficiency in network intrusion detection,even the most popular SOM neural network method.In this paper,an efficient and fast network intrusion detection method was proposed.Firstly,the fundamental of the two different methods are introduced respectively.Then,the selforganizing feature map neural network based on K- means clustering(KSOM)algorithms was presented to improve the efficiency of network intrusion detection.Finally,the NSLKDD is used as network intrusion data set to demonstrate that the KSOM method can significantly reduce the number of clustering iteration than SOM method without substantially affecting the clustering results and the accuracy is much higher than K- means method.The Experimental results show that our method can relatively improve the accuracy of network intrusion and significantly reduce the number of clustering iteration.

    Keywords: K- means clustering,self-organizing feature map neural network,network security,intrusion detection,NSL-KDD data set.

    1 Introduction

    With the status improvement of Internet technologies in modern society,network security now has become a widespread concern.In addition,in pace with the constant upgrades of related industries brought by new technologies such as cloud computing,networking,big data and block-chain,a huge number of distributed users and ubiquitous access to the Internet make the enterprise data boundary no longer exist.Meanwhile,the amount of data is increasing,which leads to a higher value and more security challenges.Moreover,considering the openness of the Internet platform with diverse audiences and connection types,the Internet is vulnerable to external attacks and its security is bound to be greatly threatened[Lin(2015)].In view of these severe issues,intrusion detection technology is particularly important.Network intrusion detection is a research hot spot but also a difficulty in the field of network security and its essence is a clustering problem[Wang,Peng and Luo(2012)].

    As we can see,regardless of labeled supervised learning or unlabeled unsupervised learning,there are different network models and algorithms for data classification problems with the constant development of machine learning.However,due to the high dimension of intrusion feature data of these classification problems in the field of network security as well as small difference between different intrusion categories,many intrusion patterns cannot be accurately clustered.Li et al.[Li,Guan,Zan et al.(2003)]Proposed a network intrusion research based on fuzzy clustering generalized regression neural network(GRNN),in which the method was focus on specified types of intrusion action pattern with the combination of fuzzy clustering and GRNN analysis.Despite of its high classification accuracy and reliability,the method cannot reach the requirements in terms of the diversity of network intrusion.Yi et al.[Yi,Li and Wang(2009)]Proposed a network intrusion detection method based on support vector machine,in which the method still has some problems such as high false alarm,excessive demands data for building up detection models,and low detection performance in small sample conditions without enough training data.By comparing network intrusion detection methods with different network models and algorithms,intrusion detection method based on self-organizing feature map(SOM)neural network is better,which has a shorter training time and a higher detection efficiency[Wang(2007);Wu and Yan(1999);Wan,Wang,Feng et al.(2012)],and it is able to make up deficiencies of the above network models and algorithms,however,the accuracy of network intrusion detection still has room for further improvement,and there are also shortcomings in the application of unsupervised learning.Therefore,according to the advantages ofK-means clustering algorithm to local classification[Kohonen(1995);Jari and Kohonen(1996)]based on the above analysis,an intrusion detection algorithm based onK-means clustering selforganizing feature map neural network(KSOM)network is proposed in this paper.This method even has higher classification accuracy for network intrusion detection and supports unsupervised network anomaly detection.

    This paper is organized in four sections.In the second section,an improved net-work intrusion detection method based onK-means clustering self-organizing feature map neural network(KSON)is comprehensively introduced,as well as introduced respectively theoretical background of the related SOM network model andK-Means clustering algorithm.The third section gives the experimental process and result analysis.In this section,we introduce a new network intrusion detection database.In addition,we propose a new feature extraction method.The conclusion of this paper is drawn in the fourth section.

    2 KSOM theoretical backgrounds

    Due to the high dimensions of the network intrusion feature data,data differences among different intrusion classes are relatively small.Local optimal clustering result cannot be achieved if SOM neural network is simply adopted.And the corresponding learning rate will be low,which makes many intrusion modes unable to be accurately clustered.Note thatK-means clustering algorithm has high clustering performance in dealing with big data sets.And its time complexity is almost linear,whose clustering iteration time is significantly reduced with the advantage of local optimal clustering result.According to the above analysis,the feature of local optimum based onK-means clustering is adopted to improve the SOM neural network to cluster the network intrusion data in this paper.

    2.1 SOM neural network

    SOM neural network was first proposed by the Finnish mathematician Teuvo Kohonen in 1982[Teuvo(1982)].It is an unsupervised competitive learning network that simulates the working characteristics of human brain.By automatically searching the intrinsic and essential attributes of the sample,the parameters and structure of the network are changed with self-organization and self-adaption.It mainly implements the function of mapping similar sample points in the high dimensional space to the adjacent neurons in the network output.For a certain problem,a certain number of neurons are set,and each neuron corresponds to a weight vector.The different classes of data are clustered into different neurons for classification purpose through training[Bukka,Sivarama and Raju(2018)]as shown in Fig.1.

    Figure 1:The network topology of SOM neural network

    It is a feed forward neural network consisting of two layers of neurons,and Fig.1 is divided into the input layer and the competition layer,i.e.,the output layer.The explanation between the two layers is as follows:

    Input layer:The outside information is collected to each neuron of the output layer through the weight vector.

    Output layer:The winning neuron and the neighborhood are obtained through weight competition using competition algorithm.

    The neurons between the two layers are connected by bidirectional connections,and there is no hidden layer in this network.The basic thought of this network model is the corresponding competition opportunities of the competitive layer and the neuron competition to the input mode,and there exists a neuron that eventually becomes the winner of the competition,this winning neuron represents the classification of the input pattern,thus achieving the result of the clustering.The keywords of the SOM mainly include winning neuron,neighborhood and weight adjustment function.

    (1)Winning Neurons(WN)

    For input vectorX(x1,x2,…,xn)and competitive layer(output layer)neuronj,the network weight isWij(i=1,2,…,n;j=1,2,…,m).The distance between the input vector and the weight vector is calculated by Euclidean distance formula Eq.(1),and the minimum value of the distance corresponding to the neuron in the SOM is then obtained.

    The main approach is to promote competition among the output neurons of the network in an attempt to be activated.As a result,there is only one output neuron being activated at each moment,while the statuses of the other neurons are inhibited.This activated neuron is called winning neuron(WN).

    (2)Neighborhood

    For each WN,the input vectorXrepresented by its nearest neuron generally refers to the neuron near WN in SOM,i.e.,the neuron neighborhood(N).

    (3)Weight Adjustment Function

    This function describes the adjustment of WN and N that are changing with the number of iterationstrelative to input vectorX,which can be represented by(2),

    ,wheretis the number of iterations,andηis the learning rate.

    The training process of SOM neural network can be divided into four steps:

    Step 1:Initialize network weightWij,and set the maximum number of iterationsT;

    Step 2:Normalize each input vectorXin NSL-KDD network intrusion detection database,and calculate WN and N;

    Step 3:Update WN,N andWijaccording to the weight adjustment function;

    Step 4:Execute the above steps repeatedly until the number of iterations reaches the given maximum number of iterations.

    2.2 K-means clustering

    TheK-means clustering was proposed Johnson and Wichern in 2002,and then it is probably the most popular methods in the world[Capó,Pérez,Jose et al.(2017)].K-means clustering algorithm is also a most commonly used indirect clustering algorithm based on sample similarity.It belongs to an unsupervised learning method,and the cluster is divided by minimizing the clustering error[Yu,Chu,Wang et al.(2017)].In addition,it is a classic dynamic clustering algorithm on the basis of point wise modification iteration,the key point of which adopt the sum of square errors as criterion function.Its basic thought is to randomly select data objects as the initial center from the data set containing data objects first,then calculate the distance between each data object and each center.According to the nearest neighbor rule,all data objects will be partitioned into the clusters represented by the nearest center.Then the mean of the data objects in each cluster is calculated as the center of each cluster.By comparing the new center and the last center,it can be asserted that if the new center does not change,then the algorithm converges successfully and will output the result,otherwise all the data objects will be re-divided according to the new center until the convergence conditions of the algorithm are satisfied.However,the accuracy of theK-means procedure is very dependent upon the choice of the initial seeds.Thus,this paper presents the efficient strategy to improve theK-means performance which hybrid SOM neural network,the next section will explain in detail carefully.

    The concrete implementation steps are as follows:Given data setX={x1,x2,…xN},xn∈R d,(n=1,2,…N),K-means clustering algorithm will divide the data set intoMdisjoint clusters according to the optimal clustering criteria.The clustering algorithm needs to assign again cluster numberk and initial cluster centermi,and calculate the distance between the input vector of each point to the cluster center through different equations,then a new cluster centercan be obtained,later the training process will repeat until the change of the cluster center is smaller than a given valueε,which is the ending-criterion of the algorithm.

    2.3 KSOM algorithm

    KSOM algorithm proposed in this paper usesK-means clustering algorithm to cluster local data classified by SOM,so that the accuracy of the classification of the whole network intrusion data will reach its best level.The core idea of the KSOM network intrusion detection method proposed in this paper is that the winning neural has reached by SOM to merge byK-means clustering algorithm.Thus,the weight vector of SOM neural network is adopted as the input ofK-means clustering algorithm.Then the input data set is normalized to facilitate model training,and finally sent to the network for training and learning.Besides,in the local clustering process,the network weight of the SOM will be constantly adjusted along with the change of the iterations,and will gradually approximate to the input data.Therefore,we will not solve the SOM cluster center in KSOM algorithm,but only calculate its network weight vector.Then the network weight vector is adopted as the input of theK-means clustering algorithm for local clustering,and finally the result of clustering is achieved.

    The training data set logic chart as shown in Fig.2:

    Figure 2:Entire clustering process using the KSOM method

    The training process of KSOM algorithm can be divided into the following seven steps:

    Step 1:Use the network weights extracted from the training results of the SOM neural network as the input of theK-means clustering,and the input is processed with normalization;

    Step 2:Select k data elements m1,m2,…,mkrandomly as initial cluster center;

    Step 3:Calculate the Euclidean distance between each data point and the cluster center;

    Step 4:Cluster the data in accordance with the criterion that minimum clustering can be obtained when it reaches cluster center;

    Step 5:Adjust the cluster center to regulate Eq.(3),whereNjrepresents the number of data contained in classj,andCjrepresents the data sets of classj;

    Step 7:According to the clustering results of Step 6,cluster locally the original data represented by each network weight value and the algorithm ends.

    Through the above steps,the modification of training algorithm of SOM in this research affects neurons which are not close to the winner neuron on feature space,and the winner neuron pulls more neurons into the same cluster.Further,WN in competitive layer is clustered again by the improved KSOM based onK-means algorithm to ensure that the neurons are not being suppressed in the winning neighborhood(N)of the competitive layer of SOM during the competition.For each iteration,the local WN will lead the adjustment degree of the weight vector change greatly,which makes weight vector become smaller and smaller,and the number of iterations decreases.The final learning rate is significantly improved as well as the clustering accuracy.

    After training,the weight vectors of each neuron in the SOM neural network will separately cluster the input vectors to certain neurons,thus the classification result of different data is obtained.As mentioned above,network intrusion detection is essentially a clustering problem.Therefore,SOM neural network has a certain network intrusion detection effect.Although the intrusion detection method based on SOM neural network has the features of high detection rate,short training time and high versatility,there is still further room for improvement of its detection accuracy,and there are also shortcomings in unsupervised learning applications.Especially the choice of the learning rate makes it have to compromise between the learning rate and stability of the final weight vector,and sometimes the local neurons cannot converge precisely,which makes the initial weight vector of the neuron more distant from the input vector,so that it is unable to win in the competition.Therefore,according to the advantages ofK-means clustering algorithm in local clustering implementation as well as its significant learning rate performance,a KSOM intrusion detection algorithm based on SOM is proposed in this paper.

    3 Experiments procedure and result analysis

    3.1 Data description

    In this paper,NSL-KDD network intrusion detection database is adopted as the training and testing data set[Revathi and Malathi(2013)].Compared with KDD-CUP99 network intrusion detection data set,this data set is provided in CSV format,which has eliminated redundant data in KDD-CUP99 data set,and has overcome the shortcoming that the classifier is biased towards repeated records,and the performance of learning methods is vulnerable to be affected.Moreover,NSL-KDD data set has properly selected the proportion of normal and abnormal data and the volume of test set and training set data is more reasonable,therefore,it is very suitable for model algorithm validation and result evaluation analysis.NSL-KDD network intrusion detection database not only can reflect the structure of network traffic and intrusion conditions,but also can be modified,extended and duplicated.The record of NSL-KDD network intrusion detection database is as shown in Tab.1.

    Table 1:NSL-KDD network intrusion detection database record truncation table

    As shown in Tab.1,NSL-KDD network intrusion detection data set contains five types of data,that is,Normal,Probe,R2L,U2R and Dos,and consists of 125973 training data and 22544 test data sets,each record contains 41 features,such as duration,protocol,service,symbol,source byte and target byte.“attack”vs.“normal” labels as shown in Figs.3,and 4 different types of attacks as shown in Fig.4.

    Figure 3:The distribution of attack and normal

    Figure 4:The distribution of 4 different types of attack

    3.2 Data process

    In this paper,the NSL-KDD data sets are used as training sets and testing sets of our paper,the KSOM utilizes numerical values for the process of data training and testing.Further,the data preprocessing approaches are divided into feature extraction and feature transformation models based on working methodology over the big data processing[Kamei and Kawakami(2018)].Thus,in order to facilitate the next model training,first step in experiments is that turn the character values into numerical values and use the attribute ratio data feature extraction method which ascending feature according to its repeated time for data processing.For example,TCP protocol type have a greater number of repeated time,so we convert TCP protocol type into number 1,etc.as shown in Tab.2.

    Meanwhile,use the forward error correction(FEC)coding technology to encode the classification features into discrete features for the symbolic features of the 41 features,so that the one-dimensional vectors can be transformed into 3 dimensional vectors,such as TCP,UDP and ICMP.Similarly,several other features are mapped into different dimensions of vectors,as shown in Tab.3.

    Table 3:Different symbol feature vector dimensions before and after processing

    Then execute the normalization process of the numerical characteristics,the normalization Eq.(4)is given as follows:

    wherevalis the original value,valnewis the normalized data value,VminandVminare the maximum value and the minimum value of this specific data,respectively.When normalization process is done,each feature will be restricted to an interval of[0,1].After the data set is preprocessed and normalized,network training will start.

    3.3 Experimental process

    In this paper,Python 3.6 environment is adopted to training and testing the NSL-KDD data sets.The implementation of the corresponding pseudo-code is shown in Fig.5.

    Figure 5:KSOM model algorithm pseudo code

    Firstly,data import and initialization processes of the NSL-KDD network intrusion detection data set are implemented as well as normalization.Secondly,the clustering algorithm is executed including the judgment of the end condition.Then the output is transferred to the next layer ofK-means clustering model.Similarly,the data normalization is first implemented,then clustering process starts,and finally the judgment of the end condition is implemented.When both of the two end conditions are satisfied,the clustering result is obtained.

    In this paper,we tested respectively SOM neural network,K-means and KSOM method with NSL-KDD set data.First approach is SOM,the learning rateηwas set to 0.01.Second approach isK-means.For over fitting not happen we set the kind numberskequal 8 and the initial point is chosen as far as possible.The proposed KSOM method the learning rateηwas also set to 0.01.But there is a difference that the initial point was chosen as the weight vectors of each neuron in the SOM neural network.

    3.4 Result analysis

    After repeated training and we have tested three different methods,as shown in Fig.6,the average error of SOM neural network clustering along with the increase of iterations.It can be seen from Fig.6,with the increase of iterations,the average error is gradually decreased,yet the update of the weight vector of SOM neural network in the process of training is not global optimal,thus the sum of the average error tends to be increased slightly,followed by the adjustment it begins to decline,hence it will show a saw tooth downward decline.And although the sum of the average error is small,the number of iterations takes 1600 times before it starts to stabilize.Compare the Fig.7 the average error ofK-means clustering along with the increase of iterations,the number of iterations have a substantial reduction which reached 10 times.Unfortunately this method is at the expensive of increased average error.And the proposed of KSOM method as shown in Fig.8,It can be seen that clustering ends after 80 iterations,the error of which stopped at a certain value,and there is also no saw tooth downward attenuation found.It means that the KSOM method is able to solve the problem that SOM neural network cannot achieve a local optimum,and the number of iterations is reduced to a large extent,which improves the clustering efficiency.Meanwhile,the KSOM method also deals with the problem of lower clustering result which happened in theK-Means method.

    Figure 6:The average error decay process of SOM clustering

    Figure 7:The average error decay process of K- Means clustering

    Figure 8:The average error decay process of KSOM clustering

    The next in this paper,accuracy(A C)is adopted as the criterion to evaluate the network intrusion accuracy.The calculation Eq.(5)is given as below:

    whereTPis the number of correct classified attack behavior samples,TNis the number of correct classified normal behavior samples,FPis the number of wrongly classified normal behavior samples,andFNis the number of wrongly classified attack behavior samples.

    In order to test the effect of the proposed KSOM network intrusion detection method based onK-means,NSL-KDD network intrusion detection data set was also trained and tested on other methods,and a comparison was made on the performances before and after the improvement of SOM neural network clustering method,as shown in Tab.3.

    Table 3:Comparison of clustering methods

    From Tab.3 we can see that the accuracy of the improved KSOM based onK-means algorithm is higher than that of the original counterpart under the same data set.In addition,the KSOM model proposed in this paper not only is the number of iterations better than other algorithms,it also has good results in accuracy.Thus,this paper also compares other existing network intrusion detection algorithms on the accuracy of intrusion detection under the same data set.The comparison results are shown in Tab.4.The result shows that the proposed KSOM based onK-means algorithm has a better performance in network intrusion detection.

    Table 4:Comparison of accuracy of intrusion detection in different method

    4 Conclusion

    To deal with the drawback of self-organizing neural network that it has a large number of iterations in network intrusion detection,a KSOM model was proposed in this paper by utilizing the characteristic thatK-means clustering algorithm has faster clustering speed.The experimental results showed that the iterations of the KSOM method was significantly reduced in comparing with self-organizing neural network model and the accuracy was significantly improved with respect to other methods of network intrusion.

    Meanwhile,our method achieved a higher efficiency relatively when implementing network intrusion detection.Thus,the KSOM method has high performance to provide more reliable data and support for the establishment of network security mechanism.

    亚洲激情在线av| 黄片大片在线免费观看| 老司机午夜福利在线观看视频| 国产精品野战在线观看| 亚洲精品中文字幕在线视频| 男女午夜视频在线观看| 视频区欧美日本亚洲| 亚洲人成电影观看| 国产高清videossex| 久久精品亚洲熟妇少妇任你| 精品电影一区二区在线| 亚洲精品美女久久久久99蜜臀| 一进一出好大好爽视频| 黄色丝袜av网址大全| www.熟女人妻精品国产| 看片在线看免费视频| 免费无遮挡裸体视频| 在线国产一区二区在线| 岛国在线观看网站| 亚洲欧美日韩另类电影网站| 精品久久久久久久人妻蜜臀av | 国产av在哪里看| 国产三级黄色录像| 99精品久久久久人妻精品| 国产aⅴ精品一区二区三区波| 激情在线观看视频在线高清| 婷婷六月久久综合丁香| 国产亚洲av嫩草精品影院| 丰满人妻熟妇乱又伦精品不卡| 激情在线观看视频在线高清| 国产私拍福利视频在线观看| av超薄肉色丝袜交足视频| 亚洲av电影不卡..在线观看| 在线十欧美十亚洲十日本专区| 亚洲自拍偷在线| 亚洲九九香蕉| 成人三级做爰电影| 国产精品99久久99久久久不卡| 国产不卡一卡二| 黄频高清免费视频| 99久久精品国产亚洲精品| 亚洲中文日韩欧美视频| 亚洲欧美日韩无卡精品| 啪啪无遮挡十八禁网站| 最近最新中文字幕大全电影3 | 亚洲专区中文字幕在线| 久久中文字幕人妻熟女| 欧美黄色淫秽网站| 老司机深夜福利视频在线观看| 波多野结衣高清无吗| 亚洲久久久国产精品| 在线观看免费日韩欧美大片| 丁香六月欧美| 日本免费一区二区三区高清不卡 | 欧美 亚洲 国产 日韩一| 天天躁狠狠躁夜夜躁狠狠躁| 中亚洲国语对白在线视频| 日韩欧美在线二视频| 一边摸一边抽搐一进一出视频| 巨乳人妻的诱惑在线观看| 一夜夜www| 在线av久久热| 9热在线视频观看99| 欧美在线黄色| 大型av网站在线播放| 色av中文字幕| 亚洲人成网站在线播放欧美日韩| 亚洲成人国产一区在线观看| 久久久水蜜桃国产精品网| 18美女黄网站色大片免费观看| 夜夜夜夜夜久久久久| 99精品在免费线老司机午夜| 美女免费视频网站| 精品国产一区二区三区四区第35| 国产精品二区激情视频| 亚洲精华国产精华精| 老司机福利观看| 99国产精品99久久久久| 成人av一区二区三区在线看| 在线免费观看的www视频| 亚洲七黄色美女视频| 国产成人av教育| 中文字幕av电影在线播放| 亚洲国产高清在线一区二区三 | 久久婷婷成人综合色麻豆| 亚洲国产精品999在线| 美女高潮到喷水免费观看| 18美女黄网站色大片免费观看| 精品欧美一区二区三区在线| 波多野结衣巨乳人妻| 黑人巨大精品欧美一区二区mp4| 天天躁狠狠躁夜夜躁狠狠躁| 天天添夜夜摸| 高清毛片免费观看视频网站| 可以免费在线观看a视频的电影网站| 极品人妻少妇av视频| 国产人伦9x9x在线观看| 我的亚洲天堂| 国产精品亚洲美女久久久| 又黄又爽又免费观看的视频| ponron亚洲| 成人免费观看视频高清| www国产在线视频色| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲狠狠婷婷综合久久图片| 精品久久久久久成人av| 无限看片的www在线观看| 亚洲精品一区av在线观看| 91成年电影在线观看| 中文字幕人妻熟女乱码| 国产精品永久免费网站| 欧美乱色亚洲激情| 涩涩av久久男人的天堂| 国产亚洲欧美在线一区二区| 国产精品久久视频播放| 亚洲男人的天堂狠狠| 黄色毛片三级朝国网站| 亚洲成人久久性| 亚洲第一青青草原| 亚洲国产精品成人综合色| 99久久综合精品五月天人人| 亚洲色图综合在线观看| 久久久久久免费高清国产稀缺| 久久婷婷人人爽人人干人人爱 | 在线十欧美十亚洲十日本专区| 久久久国产欧美日韩av| 黄色视频不卡| 国产色视频综合| 国产av一区在线观看免费| 国产精品亚洲美女久久久| 夜夜看夜夜爽夜夜摸| 日本免费一区二区三区高清不卡 | 一区在线观看完整版| 色综合欧美亚洲国产小说| 怎么达到女性高潮| 久久国产亚洲av麻豆专区| 亚洲专区国产一区二区| 黄色 视频免费看| 久久婷婷人人爽人人干人人爱 | 悠悠久久av| 国产精品自产拍在线观看55亚洲| 成人亚洲精品av一区二区| 亚洲五月色婷婷综合| 亚洲av美国av| 国产成人av教育| 亚洲va日本ⅴa欧美va伊人久久| 一区二区日韩欧美中文字幕| 国产极品粉嫩免费观看在线| 国产精品1区2区在线观看.| 亚洲男人天堂网一区| 国产国语露脸激情在线看| 欧美性长视频在线观看| 岛国视频午夜一区免费看| 一进一出抽搐动态| 国产精品一区二区精品视频观看| 午夜福利免费观看在线| 久久久久精品国产欧美久久久| 一区二区三区高清视频在线| 一个人观看的视频www高清免费观看 | 午夜两性在线视频| 香蕉丝袜av| 黄色丝袜av网址大全| 成人av一区二区三区在线看| 老鸭窝网址在线观看| 黄色a级毛片大全视频| 乱人伦中国视频| 亚洲一码二码三码区别大吗| 日日摸夜夜添夜夜添小说| 午夜影院日韩av| 啪啪无遮挡十八禁网站| 一区二区三区国产精品乱码| 丰满的人妻完整版| 国产亚洲av嫩草精品影院| 狂野欧美激情性xxxx| 黑丝袜美女国产一区| 大香蕉久久成人网| 国产aⅴ精品一区二区三区波| 女同久久另类99精品国产91| 日韩欧美一区二区三区在线观看| 久久精品国产亚洲av高清一级| 免费在线观看黄色视频的| 精品高清国产在线一区| 亚洲美女黄片视频| 亚洲精品中文字幕一二三四区| 亚洲成国产人片在线观看| 99国产精品99久久久久| 亚洲国产精品999在线| 一个人观看的视频www高清免费观看 | 免费观看人在逋| 在线观看免费午夜福利视频| 亚洲七黄色美女视频| 久久人妻福利社区极品人妻图片| 午夜精品久久久久久毛片777| 淫妇啪啪啪对白视频| 亚洲熟女毛片儿| 国产精品久久久久久精品电影 | 亚洲成av片中文字幕在线观看| 久久久久久久精品吃奶| 精品国产一区二区久久| 黄片播放在线免费| 黑人巨大精品欧美一区二区mp4| 欧美日韩中文字幕国产精品一区二区三区 | 国产亚洲精品一区二区www| 丰满的人妻完整版| 美女 人体艺术 gogo| 一边摸一边抽搐一进一出视频| 久久久水蜜桃国产精品网| 婷婷丁香在线五月| 乱人伦中国视频| 日韩高清综合在线| 精品卡一卡二卡四卡免费| 国产精品久久久久久精品电影 | 亚洲一区二区三区不卡视频| 19禁男女啪啪无遮挡网站| 亚洲av电影不卡..在线观看| 人人妻人人澡欧美一区二区 | 亚洲伊人色综图| 国内毛片毛片毛片毛片毛片| 欧美成人免费av一区二区三区| 免费无遮挡裸体视频| 他把我摸到了高潮在线观看| 亚洲色图 男人天堂 中文字幕| 免费观看精品视频网站| 好男人电影高清在线观看| 亚洲人成77777在线视频| 久久久久国产一级毛片高清牌| 日韩国内少妇激情av| 亚洲伊人色综图| 国产一区二区激情短视频| 桃红色精品国产亚洲av| 欧洲精品卡2卡3卡4卡5卡区| 久久久久久久久中文| 男女午夜视频在线观看| 精品熟女少妇八av免费久了| 亚洲欧美日韩另类电影网站| 久久久久久久精品吃奶| 成人永久免费在线观看视频| 国产亚洲欧美在线一区二区| 正在播放国产对白刺激| 国产不卡一卡二| 可以在线观看的亚洲视频| 国产精品99久久99久久久不卡| 亚洲av电影在线进入| 中文字幕最新亚洲高清| 丁香欧美五月| 亚洲人成伊人成综合网2020| 国产成人欧美| 久久性视频一级片| 777久久人妻少妇嫩草av网站| 精品久久久久久久毛片微露脸| 午夜久久久久精精品| 久久久久久人人人人人| 中文字幕另类日韩欧美亚洲嫩草| 两个人看的免费小视频| 一级a爱片免费观看的视频| 国产亚洲精品久久久久5区| 在线播放国产精品三级| 美女午夜性视频免费| 国产精品秋霞免费鲁丝片| 一区二区三区激情视频| 亚洲五月天丁香| 香蕉久久夜色| 黄色视频不卡| 日韩欧美在线二视频| 两性午夜刺激爽爽歪歪视频在线观看 | 18禁黄网站禁片午夜丰满| 久久久久精品国产欧美久久久| 又紧又爽又黄一区二区| 亚洲精品中文字幕一二三四区| 免费一级毛片在线播放高清视频 | 久久青草综合色| 精品人妻在线不人妻| 很黄的视频免费| 妹子高潮喷水视频| 亚洲精品久久国产高清桃花| 亚洲一区中文字幕在线| 制服丝袜大香蕉在线| 国产成人免费无遮挡视频| 丰满的人妻完整版| svipshipincom国产片| 亚洲少妇的诱惑av| 国产欧美日韩一区二区精品| 久久久久久免费高清国产稀缺| 久久久久久久久久久久大奶| 欧美激情久久久久久爽电影 | 老司机在亚洲福利影院| 18禁美女被吸乳视频| 国产成人精品久久二区二区免费| 久久久久久国产a免费观看| 亚洲精品国产色婷婷电影| 亚洲国产精品sss在线观看| 免费在线观看黄色视频的| 成人特级黄色片久久久久久久| 欧美在线一区亚洲| 久久久久国产精品人妻aⅴ院| 国产成人精品在线电影| 热re99久久国产66热| 亚洲久久久国产精品| 久久久久精品国产欧美久久久| 国产又爽黄色视频| 在线av久久热| 久久国产乱子伦精品免费另类| 免费在线观看黄色视频的| 精品国产超薄肉色丝袜足j| 免费人成视频x8x8入口观看| 曰老女人黄片| 最近最新中文字幕大全免费视频| 日韩国内少妇激情av| 日韩视频一区二区在线观看| 一级毛片高清免费大全| 女生性感内裤真人,穿戴方法视频| 国产av一区在线观看免费| 午夜福利欧美成人| 欧美日韩亚洲国产一区二区在线观看| 亚洲美女黄片视频| 成人国语在线视频| 日韩成人在线观看一区二区三区| 欧美丝袜亚洲另类 | 久久久久久亚洲精品国产蜜桃av| 久久欧美精品欧美久久欧美| 99久久国产精品久久久| 韩国精品一区二区三区| 人人妻人人澡人人看| 国产一级毛片七仙女欲春2 | 久久青草综合色| 亚洲,欧美精品.| 法律面前人人平等表现在哪些方面| 亚洲成人精品中文字幕电影| 国内精品久久久久久久电影| 乱人伦中国视频| 18禁黄网站禁片午夜丰满| 悠悠久久av| 真人一进一出gif抽搐免费| 成人特级黄色片久久久久久久| 视频在线观看一区二区三区| 欧美精品啪啪一区二区三区| 色播亚洲综合网| 亚洲一区中文字幕在线| 亚洲av熟女| 欧美国产精品va在线观看不卡| 日本欧美视频一区| 中亚洲国语对白在线视频| 亚洲一区中文字幕在线| 亚洲一码二码三码区别大吗| 欧美精品啪啪一区二区三区| 亚洲国产精品成人综合色| 欧美国产精品va在线观看不卡| 少妇裸体淫交视频免费看高清 | av片东京热男人的天堂| 午夜影院日韩av| 日本撒尿小便嘘嘘汇集6| 自线自在国产av| 在线观看日韩欧美| 欧美一区二区精品小视频在线| 国产熟女午夜一区二区三区| 18禁观看日本| 欧美色欧美亚洲另类二区 | 母亲3免费完整高清在线观看| 欧美另类亚洲清纯唯美| 免费在线观看视频国产中文字幕亚洲| 成人三级黄色视频| 久久天躁狠狠躁夜夜2o2o| 国产精品电影一区二区三区| 国产一级毛片七仙女欲春2 | 国产精品av久久久久免费| 黄色丝袜av网址大全| 亚洲精品久久成人aⅴ小说| 美女扒开内裤让男人捅视频| 色综合亚洲欧美另类图片| 欧美国产日韩亚洲一区| 色综合亚洲欧美另类图片| 国产片内射在线| 久久天堂一区二区三区四区| 91大片在线观看| 久久中文看片网| 国产在线精品亚洲第一网站| 国产黄a三级三级三级人| 亚洲 欧美一区二区三区| 99国产精品免费福利视频| 久久人妻av系列| 亚洲av美国av| 可以在线观看毛片的网站| 亚洲中文av在线| 看黄色毛片网站| 国产精品自产拍在线观看55亚洲| 两性午夜刺激爽爽歪歪视频在线观看 | 国产三级在线视频| 亚洲成国产人片在线观看| 丁香欧美五月| 日本三级黄在线观看| 精品国产一区二区三区四区第35| 国产精品永久免费网站| 99精品欧美一区二区三区四区| 国内精品久久久久精免费| 啦啦啦 在线观看视频| 看片在线看免费视频| 一个人免费在线观看的高清视频| 欧美乱色亚洲激情| 夜夜爽天天搞| 国产视频一区二区在线看| 午夜福利视频1000在线观看 | 在线av久久热| 在线观看免费视频网站a站| 日本三级黄在线观看| 亚洲视频免费观看视频| 精品一区二区三区av网在线观看| 黄色视频不卡| 亚洲一区二区三区不卡视频| 色播亚洲综合网| 又紧又爽又黄一区二区| 99在线视频只有这里精品首页| 999久久久国产精品视频| 国产精品秋霞免费鲁丝片| 男女午夜视频在线观看| 一卡2卡三卡四卡精品乱码亚洲| av欧美777| 亚洲精品国产色婷婷电影| 亚洲男人天堂网一区| 欧美最黄视频在线播放免费| 国产亚洲精品综合一区在线观看 | 两个人免费观看高清视频| 亚洲天堂国产精品一区在线| 久久亚洲精品不卡| 最新美女视频免费是黄的| 91麻豆精品激情在线观看国产| 亚洲在线自拍视频| 色综合站精品国产| 不卡av一区二区三区| av网站免费在线观看视频| 在线观看免费视频日本深夜| 欧美人与性动交α欧美精品济南到| 成人国产一区最新在线观看| 欧美中文日本在线观看视频| 色综合亚洲欧美另类图片| 精品一区二区三区av网在线观看| 一个人免费在线观看的高清视频| 女性被躁到高潮视频| 视频在线观看一区二区三区| 午夜视频精品福利| 性欧美人与动物交配| 亚洲精品久久成人aⅴ小说| 最近最新中文字幕大全电影3 | а√天堂www在线а√下载| 国语自产精品视频在线第100页| 高清毛片免费观看视频网站| 久久人人97超碰香蕉20202| 亚洲成a人片在线一区二区| 日韩 欧美 亚洲 中文字幕| 天堂影院成人在线观看| 国产午夜精品久久久久久| 国产亚洲精品综合一区在线观看 | 亚洲性夜色夜夜综合| 亚洲最大成人中文| 日韩高清综合在线| 亚洲 国产 在线| www国产在线视频色| 少妇被粗大的猛进出69影院| 窝窝影院91人妻| 久久中文字幕人妻熟女| 一级a爱视频在线免费观看| 制服诱惑二区| 色在线成人网| 级片在线观看| 亚洲无线在线观看| 激情在线观看视频在线高清| tocl精华| 91成人精品电影| 性欧美人与动物交配| 久久婷婷人人爽人人干人人爱 | 制服丝袜大香蕉在线| 在线观看66精品国产| 久9热在线精品视频| 午夜免费成人在线视频| 欧洲精品卡2卡3卡4卡5卡区| 啦啦啦 在线观看视频| 欧美乱色亚洲激情| 一本久久中文字幕| 亚洲av成人不卡在线观看播放网| 婷婷丁香在线五月| 国产精品二区激情视频| 精品久久久精品久久久| 一级片免费观看大全| 免费在线观看影片大全网站| 亚洲成国产人片在线观看| 精品国产美女av久久久久小说| 可以在线观看毛片的网站| 男女之事视频高清在线观看| 精品不卡国产一区二区三区| 人人妻人人澡人人看| 国产又色又爽无遮挡免费看| 精品国产乱子伦一区二区三区| 亚洲狠狠婷婷综合久久图片| 国产精品免费视频内射| 国产麻豆成人av免费视频| 中文字幕人成人乱码亚洲影| xxx96com| 久久人妻福利社区极品人妻图片| 一边摸一边做爽爽视频免费| x7x7x7水蜜桃| 在线观看一区二区三区| 免费在线观看日本一区| 国产高清有码在线观看视频 | 亚洲 欧美一区二区三区| 免费女性裸体啪啪无遮挡网站| 久久国产精品影院| 非洲黑人性xxxx精品又粗又长| av欧美777| 国产99久久九九免费精品| 久久中文字幕人妻熟女| 国产亚洲av高清不卡| 精品无人区乱码1区二区| 久久亚洲精品不卡| 免费一级毛片在线播放高清视频 | 丝袜在线中文字幕| 中出人妻视频一区二区| 亚洲男人天堂网一区| 亚洲一区二区三区不卡视频| 桃红色精品国产亚洲av| 午夜福利18| 高清在线国产一区| 国产亚洲精品久久久久久毛片| 国产极品粉嫩免费观看在线| 国产精品香港三级国产av潘金莲| 日日夜夜操网爽| 日日干狠狠操夜夜爽| 999精品在线视频| 亚洲第一欧美日韩一区二区三区| 亚洲熟妇中文字幕五十中出| 无限看片的www在线观看| 一区二区三区精品91| 国产亚洲精品第一综合不卡| 国产人伦9x9x在线观看| 俄罗斯特黄特色一大片| 亚洲三区欧美一区| 最新在线观看一区二区三区| 国产精品,欧美在线| 精品卡一卡二卡四卡免费| 18美女黄网站色大片免费观看| 亚洲av成人不卡在线观看播放网| 在线播放国产精品三级| 成在线人永久免费视频| 一区二区三区激情视频| 中文字幕色久视频| 亚洲精品美女久久av网站| 色老头精品视频在线观看| 在线观看日韩欧美| 日韩欧美一区视频在线观看| 精品卡一卡二卡四卡免费| 丝袜人妻中文字幕| 亚洲av成人不卡在线观看播放网| 日韩欧美国产在线观看| av在线天堂中文字幕| 夜夜看夜夜爽夜夜摸| 欧美中文日本在线观看视频| 一二三四社区在线视频社区8| 国产免费男女视频| 青草久久国产| 在线视频色国产色| 免费观看精品视频网站| av网站免费在线观看视频| 嫩草影视91久久| 国产精品永久免费网站| 极品教师在线免费播放| 妹子高潮喷水视频| 人妻久久中文字幕网| 国产三级黄色录像| 一级黄色大片毛片| 欧美黄色淫秽网站| 国产精品免费一区二区三区在线| av电影中文网址| 成年人黄色毛片网站| 午夜福利欧美成人| 热re99久久国产66热| 午夜免费激情av| 亚洲国产精品999在线| 国产99久久九九免费精品| 母亲3免费完整高清在线观看| 神马国产精品三级电影在线观看 | 人妻久久中文字幕网| 国产精品日韩av在线免费观看 | 欧美日韩福利视频一区二区| 在线视频色国产色| 久久午夜综合久久蜜桃| 色综合站精品国产| 色婷婷久久久亚洲欧美| 一级,二级,三级黄色视频| 黄网站色视频无遮挡免费观看| 日韩高清综合在线| 亚洲成人免费电影在线观看| 久久久久九九精品影院| 亚洲国产高清在线一区二区三 | 亚洲一码二码三码区别大吗| 精品不卡国产一区二区三区| 久9热在线精品视频| 午夜影院日韩av| 国产精品永久免费网站| 亚洲,欧美精品.| 看片在线看免费视频| 亚洲七黄色美女视频| 欧美成人午夜精品| 在线观看免费午夜福利视频| 亚洲成人精品中文字幕电影| 久久伊人香网站| 99精品欧美一区二区三区四区| 精品高清国产在线一区| 久久精品国产亚洲av高清一级| 国产亚洲精品久久久久久毛片| 日韩有码中文字幕| 搡老岳熟女国产| xxx96com| 天天添夜夜摸| 亚洲欧美精品综合一区二区三区| 午夜精品久久久久久毛片777| 亚洲成人精品中文字幕电影| 在线播放国产精品三级|