• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Application of Self-Organizing Feature Map Neural Network Based on K- means Clustering in Network Intrusion Detection

    2019-11-07 03:12:44LingTanChongLiJingmingXiaandJunCao
    Computers Materials&Continua 2019年10期

    Ling Tan,Chong Li,Jingming Xia and Jun Cao

    Abstract:Due to the widespread use of the Internet,customer information is vulnerable to computer systems attack,which brings urgent need for the intrusion detection technology.Recently,network intrusion detection has been one of the most important technologies in network security detection.The accuracy of network intrusion detection has reached higher accuracy so far.However,these methods have very low efficiency in network intrusion detection,even the most popular SOM neural network method.In this paper,an efficient and fast network intrusion detection method was proposed.Firstly,the fundamental of the two different methods are introduced respectively.Then,the selforganizing feature map neural network based on K- means clustering(KSOM)algorithms was presented to improve the efficiency of network intrusion detection.Finally,the NSLKDD is used as network intrusion data set to demonstrate that the KSOM method can significantly reduce the number of clustering iteration than SOM method without substantially affecting the clustering results and the accuracy is much higher than K- means method.The Experimental results show that our method can relatively improve the accuracy of network intrusion and significantly reduce the number of clustering iteration.

    Keywords: K- means clustering,self-organizing feature map neural network,network security,intrusion detection,NSL-KDD data set.

    1 Introduction

    With the status improvement of Internet technologies in modern society,network security now has become a widespread concern.In addition,in pace with the constant upgrades of related industries brought by new technologies such as cloud computing,networking,big data and block-chain,a huge number of distributed users and ubiquitous access to the Internet make the enterprise data boundary no longer exist.Meanwhile,the amount of data is increasing,which leads to a higher value and more security challenges.Moreover,considering the openness of the Internet platform with diverse audiences and connection types,the Internet is vulnerable to external attacks and its security is bound to be greatly threatened[Lin(2015)].In view of these severe issues,intrusion detection technology is particularly important.Network intrusion detection is a research hot spot but also a difficulty in the field of network security and its essence is a clustering problem[Wang,Peng and Luo(2012)].

    As we can see,regardless of labeled supervised learning or unlabeled unsupervised learning,there are different network models and algorithms for data classification problems with the constant development of machine learning.However,due to the high dimension of intrusion feature data of these classification problems in the field of network security as well as small difference between different intrusion categories,many intrusion patterns cannot be accurately clustered.Li et al.[Li,Guan,Zan et al.(2003)]Proposed a network intrusion research based on fuzzy clustering generalized regression neural network(GRNN),in which the method was focus on specified types of intrusion action pattern with the combination of fuzzy clustering and GRNN analysis.Despite of its high classification accuracy and reliability,the method cannot reach the requirements in terms of the diversity of network intrusion.Yi et al.[Yi,Li and Wang(2009)]Proposed a network intrusion detection method based on support vector machine,in which the method still has some problems such as high false alarm,excessive demands data for building up detection models,and low detection performance in small sample conditions without enough training data.By comparing network intrusion detection methods with different network models and algorithms,intrusion detection method based on self-organizing feature map(SOM)neural network is better,which has a shorter training time and a higher detection efficiency[Wang(2007);Wu and Yan(1999);Wan,Wang,Feng et al.(2012)],and it is able to make up deficiencies of the above network models and algorithms,however,the accuracy of network intrusion detection still has room for further improvement,and there are also shortcomings in the application of unsupervised learning.Therefore,according to the advantages ofK-means clustering algorithm to local classification[Kohonen(1995);Jari and Kohonen(1996)]based on the above analysis,an intrusion detection algorithm based onK-means clustering selforganizing feature map neural network(KSOM)network is proposed in this paper.This method even has higher classification accuracy for network intrusion detection and supports unsupervised network anomaly detection.

    This paper is organized in four sections.In the second section,an improved net-work intrusion detection method based onK-means clustering self-organizing feature map neural network(KSON)is comprehensively introduced,as well as introduced respectively theoretical background of the related SOM network model andK-Means clustering algorithm.The third section gives the experimental process and result analysis.In this section,we introduce a new network intrusion detection database.In addition,we propose a new feature extraction method.The conclusion of this paper is drawn in the fourth section.

    2 KSOM theoretical backgrounds

    Due to the high dimensions of the network intrusion feature data,data differences among different intrusion classes are relatively small.Local optimal clustering result cannot be achieved if SOM neural network is simply adopted.And the corresponding learning rate will be low,which makes many intrusion modes unable to be accurately clustered.Note thatK-means clustering algorithm has high clustering performance in dealing with big data sets.And its time complexity is almost linear,whose clustering iteration time is significantly reduced with the advantage of local optimal clustering result.According to the above analysis,the feature of local optimum based onK-means clustering is adopted to improve the SOM neural network to cluster the network intrusion data in this paper.

    2.1 SOM neural network

    SOM neural network was first proposed by the Finnish mathematician Teuvo Kohonen in 1982[Teuvo(1982)].It is an unsupervised competitive learning network that simulates the working characteristics of human brain.By automatically searching the intrinsic and essential attributes of the sample,the parameters and structure of the network are changed with self-organization and self-adaption.It mainly implements the function of mapping similar sample points in the high dimensional space to the adjacent neurons in the network output.For a certain problem,a certain number of neurons are set,and each neuron corresponds to a weight vector.The different classes of data are clustered into different neurons for classification purpose through training[Bukka,Sivarama and Raju(2018)]as shown in Fig.1.

    Figure 1:The network topology of SOM neural network

    It is a feed forward neural network consisting of two layers of neurons,and Fig.1 is divided into the input layer and the competition layer,i.e.,the output layer.The explanation between the two layers is as follows:

    Input layer:The outside information is collected to each neuron of the output layer through the weight vector.

    Output layer:The winning neuron and the neighborhood are obtained through weight competition using competition algorithm.

    The neurons between the two layers are connected by bidirectional connections,and there is no hidden layer in this network.The basic thought of this network model is the corresponding competition opportunities of the competitive layer and the neuron competition to the input mode,and there exists a neuron that eventually becomes the winner of the competition,this winning neuron represents the classification of the input pattern,thus achieving the result of the clustering.The keywords of the SOM mainly include winning neuron,neighborhood and weight adjustment function.

    (1)Winning Neurons(WN)

    For input vectorX(x1,x2,…,xn)and competitive layer(output layer)neuronj,the network weight isWij(i=1,2,…,n;j=1,2,…,m).The distance between the input vector and the weight vector is calculated by Euclidean distance formula Eq.(1),and the minimum value of the distance corresponding to the neuron in the SOM is then obtained.

    The main approach is to promote competition among the output neurons of the network in an attempt to be activated.As a result,there is only one output neuron being activated at each moment,while the statuses of the other neurons are inhibited.This activated neuron is called winning neuron(WN).

    (2)Neighborhood

    For each WN,the input vectorXrepresented by its nearest neuron generally refers to the neuron near WN in SOM,i.e.,the neuron neighborhood(N).

    (3)Weight Adjustment Function

    This function describes the adjustment of WN and N that are changing with the number of iterationstrelative to input vectorX,which can be represented by(2),

    ,wheretis the number of iterations,andηis the learning rate.

    The training process of SOM neural network can be divided into four steps:

    Step 1:Initialize network weightWij,and set the maximum number of iterationsT;

    Step 2:Normalize each input vectorXin NSL-KDD network intrusion detection database,and calculate WN and N;

    Step 3:Update WN,N andWijaccording to the weight adjustment function;

    Step 4:Execute the above steps repeatedly until the number of iterations reaches the given maximum number of iterations.

    2.2 K-means clustering

    TheK-means clustering was proposed Johnson and Wichern in 2002,and then it is probably the most popular methods in the world[Capó,Pérez,Jose et al.(2017)].K-means clustering algorithm is also a most commonly used indirect clustering algorithm based on sample similarity.It belongs to an unsupervised learning method,and the cluster is divided by minimizing the clustering error[Yu,Chu,Wang et al.(2017)].In addition,it is a classic dynamic clustering algorithm on the basis of point wise modification iteration,the key point of which adopt the sum of square errors as criterion function.Its basic thought is to randomly select data objects as the initial center from the data set containing data objects first,then calculate the distance between each data object and each center.According to the nearest neighbor rule,all data objects will be partitioned into the clusters represented by the nearest center.Then the mean of the data objects in each cluster is calculated as the center of each cluster.By comparing the new center and the last center,it can be asserted that if the new center does not change,then the algorithm converges successfully and will output the result,otherwise all the data objects will be re-divided according to the new center until the convergence conditions of the algorithm are satisfied.However,the accuracy of theK-means procedure is very dependent upon the choice of the initial seeds.Thus,this paper presents the efficient strategy to improve theK-means performance which hybrid SOM neural network,the next section will explain in detail carefully.

    The concrete implementation steps are as follows:Given data setX={x1,x2,…xN},xn∈R d,(n=1,2,…N),K-means clustering algorithm will divide the data set intoMdisjoint clusters according to the optimal clustering criteria.The clustering algorithm needs to assign again cluster numberk and initial cluster centermi,and calculate the distance between the input vector of each point to the cluster center through different equations,then a new cluster centercan be obtained,later the training process will repeat until the change of the cluster center is smaller than a given valueε,which is the ending-criterion of the algorithm.

    2.3 KSOM algorithm

    KSOM algorithm proposed in this paper usesK-means clustering algorithm to cluster local data classified by SOM,so that the accuracy of the classification of the whole network intrusion data will reach its best level.The core idea of the KSOM network intrusion detection method proposed in this paper is that the winning neural has reached by SOM to merge byK-means clustering algorithm.Thus,the weight vector of SOM neural network is adopted as the input ofK-means clustering algorithm.Then the input data set is normalized to facilitate model training,and finally sent to the network for training and learning.Besides,in the local clustering process,the network weight of the SOM will be constantly adjusted along with the change of the iterations,and will gradually approximate to the input data.Therefore,we will not solve the SOM cluster center in KSOM algorithm,but only calculate its network weight vector.Then the network weight vector is adopted as the input of theK-means clustering algorithm for local clustering,and finally the result of clustering is achieved.

    The training data set logic chart as shown in Fig.2:

    Figure 2:Entire clustering process using the KSOM method

    The training process of KSOM algorithm can be divided into the following seven steps:

    Step 1:Use the network weights extracted from the training results of the SOM neural network as the input of theK-means clustering,and the input is processed with normalization;

    Step 2:Select k data elements m1,m2,…,mkrandomly as initial cluster center;

    Step 3:Calculate the Euclidean distance between each data point and the cluster center;

    Step 4:Cluster the data in accordance with the criterion that minimum clustering can be obtained when it reaches cluster center;

    Step 5:Adjust the cluster center to regulate Eq.(3),whereNjrepresents the number of data contained in classj,andCjrepresents the data sets of classj;

    Step 7:According to the clustering results of Step 6,cluster locally the original data represented by each network weight value and the algorithm ends.

    Through the above steps,the modification of training algorithm of SOM in this research affects neurons which are not close to the winner neuron on feature space,and the winner neuron pulls more neurons into the same cluster.Further,WN in competitive layer is clustered again by the improved KSOM based onK-means algorithm to ensure that the neurons are not being suppressed in the winning neighborhood(N)of the competitive layer of SOM during the competition.For each iteration,the local WN will lead the adjustment degree of the weight vector change greatly,which makes weight vector become smaller and smaller,and the number of iterations decreases.The final learning rate is significantly improved as well as the clustering accuracy.

    After training,the weight vectors of each neuron in the SOM neural network will separately cluster the input vectors to certain neurons,thus the classification result of different data is obtained.As mentioned above,network intrusion detection is essentially a clustering problem.Therefore,SOM neural network has a certain network intrusion detection effect.Although the intrusion detection method based on SOM neural network has the features of high detection rate,short training time and high versatility,there is still further room for improvement of its detection accuracy,and there are also shortcomings in unsupervised learning applications.Especially the choice of the learning rate makes it have to compromise between the learning rate and stability of the final weight vector,and sometimes the local neurons cannot converge precisely,which makes the initial weight vector of the neuron more distant from the input vector,so that it is unable to win in the competition.Therefore,according to the advantages ofK-means clustering algorithm in local clustering implementation as well as its significant learning rate performance,a KSOM intrusion detection algorithm based on SOM is proposed in this paper.

    3 Experiments procedure and result analysis

    3.1 Data description

    In this paper,NSL-KDD network intrusion detection database is adopted as the training and testing data set[Revathi and Malathi(2013)].Compared with KDD-CUP99 network intrusion detection data set,this data set is provided in CSV format,which has eliminated redundant data in KDD-CUP99 data set,and has overcome the shortcoming that the classifier is biased towards repeated records,and the performance of learning methods is vulnerable to be affected.Moreover,NSL-KDD data set has properly selected the proportion of normal and abnormal data and the volume of test set and training set data is more reasonable,therefore,it is very suitable for model algorithm validation and result evaluation analysis.NSL-KDD network intrusion detection database not only can reflect the structure of network traffic and intrusion conditions,but also can be modified,extended and duplicated.The record of NSL-KDD network intrusion detection database is as shown in Tab.1.

    Table 1:NSL-KDD network intrusion detection database record truncation table

    As shown in Tab.1,NSL-KDD network intrusion detection data set contains five types of data,that is,Normal,Probe,R2L,U2R and Dos,and consists of 125973 training data and 22544 test data sets,each record contains 41 features,such as duration,protocol,service,symbol,source byte and target byte.“attack”vs.“normal” labels as shown in Figs.3,and 4 different types of attacks as shown in Fig.4.

    Figure 3:The distribution of attack and normal

    Figure 4:The distribution of 4 different types of attack

    3.2 Data process

    In this paper,the NSL-KDD data sets are used as training sets and testing sets of our paper,the KSOM utilizes numerical values for the process of data training and testing.Further,the data preprocessing approaches are divided into feature extraction and feature transformation models based on working methodology over the big data processing[Kamei and Kawakami(2018)].Thus,in order to facilitate the next model training,first step in experiments is that turn the character values into numerical values and use the attribute ratio data feature extraction method which ascending feature according to its repeated time for data processing.For example,TCP protocol type have a greater number of repeated time,so we convert TCP protocol type into number 1,etc.as shown in Tab.2.

    Meanwhile,use the forward error correction(FEC)coding technology to encode the classification features into discrete features for the symbolic features of the 41 features,so that the one-dimensional vectors can be transformed into 3 dimensional vectors,such as TCP,UDP and ICMP.Similarly,several other features are mapped into different dimensions of vectors,as shown in Tab.3.

    Table 3:Different symbol feature vector dimensions before and after processing

    Then execute the normalization process of the numerical characteristics,the normalization Eq.(4)is given as follows:

    wherevalis the original value,valnewis the normalized data value,VminandVminare the maximum value and the minimum value of this specific data,respectively.When normalization process is done,each feature will be restricted to an interval of[0,1].After the data set is preprocessed and normalized,network training will start.

    3.3 Experimental process

    In this paper,Python 3.6 environment is adopted to training and testing the NSL-KDD data sets.The implementation of the corresponding pseudo-code is shown in Fig.5.

    Figure 5:KSOM model algorithm pseudo code

    Firstly,data import and initialization processes of the NSL-KDD network intrusion detection data set are implemented as well as normalization.Secondly,the clustering algorithm is executed including the judgment of the end condition.Then the output is transferred to the next layer ofK-means clustering model.Similarly,the data normalization is first implemented,then clustering process starts,and finally the judgment of the end condition is implemented.When both of the two end conditions are satisfied,the clustering result is obtained.

    In this paper,we tested respectively SOM neural network,K-means and KSOM method with NSL-KDD set data.First approach is SOM,the learning rateηwas set to 0.01.Second approach isK-means.For over fitting not happen we set the kind numberskequal 8 and the initial point is chosen as far as possible.The proposed KSOM method the learning rateηwas also set to 0.01.But there is a difference that the initial point was chosen as the weight vectors of each neuron in the SOM neural network.

    3.4 Result analysis

    After repeated training and we have tested three different methods,as shown in Fig.6,the average error of SOM neural network clustering along with the increase of iterations.It can be seen from Fig.6,with the increase of iterations,the average error is gradually decreased,yet the update of the weight vector of SOM neural network in the process of training is not global optimal,thus the sum of the average error tends to be increased slightly,followed by the adjustment it begins to decline,hence it will show a saw tooth downward decline.And although the sum of the average error is small,the number of iterations takes 1600 times before it starts to stabilize.Compare the Fig.7 the average error ofK-means clustering along with the increase of iterations,the number of iterations have a substantial reduction which reached 10 times.Unfortunately this method is at the expensive of increased average error.And the proposed of KSOM method as shown in Fig.8,It can be seen that clustering ends after 80 iterations,the error of which stopped at a certain value,and there is also no saw tooth downward attenuation found.It means that the KSOM method is able to solve the problem that SOM neural network cannot achieve a local optimum,and the number of iterations is reduced to a large extent,which improves the clustering efficiency.Meanwhile,the KSOM method also deals with the problem of lower clustering result which happened in theK-Means method.

    Figure 6:The average error decay process of SOM clustering

    Figure 7:The average error decay process of K- Means clustering

    Figure 8:The average error decay process of KSOM clustering

    The next in this paper,accuracy(A C)is adopted as the criterion to evaluate the network intrusion accuracy.The calculation Eq.(5)is given as below:

    whereTPis the number of correct classified attack behavior samples,TNis the number of correct classified normal behavior samples,FPis the number of wrongly classified normal behavior samples,andFNis the number of wrongly classified attack behavior samples.

    In order to test the effect of the proposed KSOM network intrusion detection method based onK-means,NSL-KDD network intrusion detection data set was also trained and tested on other methods,and a comparison was made on the performances before and after the improvement of SOM neural network clustering method,as shown in Tab.3.

    Table 3:Comparison of clustering methods

    From Tab.3 we can see that the accuracy of the improved KSOM based onK-means algorithm is higher than that of the original counterpart under the same data set.In addition,the KSOM model proposed in this paper not only is the number of iterations better than other algorithms,it also has good results in accuracy.Thus,this paper also compares other existing network intrusion detection algorithms on the accuracy of intrusion detection under the same data set.The comparison results are shown in Tab.4.The result shows that the proposed KSOM based onK-means algorithm has a better performance in network intrusion detection.

    Table 4:Comparison of accuracy of intrusion detection in different method

    4 Conclusion

    To deal with the drawback of self-organizing neural network that it has a large number of iterations in network intrusion detection,a KSOM model was proposed in this paper by utilizing the characteristic thatK-means clustering algorithm has faster clustering speed.The experimental results showed that the iterations of the KSOM method was significantly reduced in comparing with self-organizing neural network model and the accuracy was significantly improved with respect to other methods of network intrusion.

    Meanwhile,our method achieved a higher efficiency relatively when implementing network intrusion detection.Thus,the KSOM method has high performance to provide more reliable data and support for the establishment of network security mechanism.

    精品少妇黑人巨大在线播放| 日本a在线网址| 九色亚洲精品在线播放| 午夜免费鲁丝| 欧美国产精品一级二级三级| 免费在线观看日本一区| 精品欧美一区二区三区在线| 50天的宝宝边吃奶边哭怎么回事| 午夜日韩欧美国产| 高清不卡的av网站| 在现免费观看毛片| 亚洲三区欧美一区| 久久久久久久国产电影| 啦啦啦视频在线资源免费观看| 日韩电影二区| 免费黄频网站在线观看国产| 五月天丁香电影| 婷婷丁香在线五月| 18禁裸乳无遮挡动漫免费视频| 国产97色在线日韩免费| 国产精品一国产av| 欧美日韩一级在线毛片| 久久免费观看电影| 国产三级黄色录像| 亚洲国产成人一精品久久久| 99国产精品99久久久久| 亚洲国产中文字幕在线视频| 在线观看免费午夜福利视频| 免费观看人在逋| 精品少妇黑人巨大在线播放| 新久久久久国产一级毛片| 亚洲欧美日韩另类电影网站| av电影中文网址| 国产片内射在线| xxxhd国产人妻xxx| 亚洲欧美中文字幕日韩二区| 婷婷成人精品国产| 亚洲精品久久成人aⅴ小说| 国产91精品成人一区二区三区 | 中文字幕人妻丝袜制服| 在线观看免费日韩欧美大片| 国产97色在线日韩免费| 黑人欧美特级aaaaaa片| www日本在线高清视频| 激情视频va一区二区三区| 精品人妻1区二区| 久久毛片免费看一区二区三区| 国产精品一区二区在线观看99| 国产精品二区激情视频| 看免费成人av毛片| 男的添女的下面高潮视频| 国产一区二区在线观看av| 欧美精品av麻豆av| 99九九在线精品视频| 国产老妇伦熟女老妇高清| 亚洲 国产 在线| 国产又爽黄色视频| 叶爱在线成人免费视频播放| 久9热在线精品视频| 国产成人啪精品午夜网站| 国产男人的电影天堂91| 好男人视频免费观看在线| 国产精品国产三级国产专区5o| av在线老鸭窝| 亚洲av电影在线进入| 久久久国产精品麻豆| 中国美女看黄片| 国产精品秋霞免费鲁丝片| 欧美国产精品一级二级三级| 手机成人av网站| 久久久久久人人人人人| 尾随美女入室| 久久久亚洲精品成人影院| 免费不卡黄色视频| 久久国产亚洲av麻豆专区| 一级黄片播放器| 国产精品麻豆人妻色哟哟久久| 亚洲国产成人一精品久久久| 免费在线观看完整版高清| 亚洲国产精品一区二区三区在线| 国产精品亚洲av一区麻豆| 看免费av毛片| 国产高清视频在线播放一区 | 悠悠久久av| 青春草视频在线免费观看| 国产男女超爽视频在线观看| 欧美成狂野欧美在线观看| 午夜激情久久久久久久| 欧美 亚洲 国产 日韩一| 午夜视频精品福利| 亚洲,欧美,日韩| 免费高清在线观看日韩| 99久久人妻综合| 两个人免费观看高清视频| 国产精品一二三区在线看| 咕卡用的链子| 热re99久久国产66热| 成人18禁高潮啪啪吃奶动态图| 777米奇影视久久| 亚洲精品久久久久久婷婷小说| 色网站视频免费| 九草在线视频观看| 亚洲成av片中文字幕在线观看| 日韩,欧美,国产一区二区三区| 久久青草综合色| 亚洲情色 制服丝袜| 日韩中文字幕欧美一区二区 | 久久精品久久久久久噜噜老黄| 亚洲欧洲精品一区二区精品久久久| 国产高清国产精品国产三级| 亚洲专区中文字幕在线| 天堂中文最新版在线下载| 一级片'在线观看视频| netflix在线观看网站| 悠悠久久av| 欧美黄色片欧美黄色片| 久久性视频一级片| 两个人看的免费小视频| 一边摸一边抽搐一进一出视频| 天天躁狠狠躁夜夜躁狠狠躁| 丝袜美腿诱惑在线| 亚洲国产av影院在线观看| 黄色 视频免费看| 精品亚洲成国产av| 一级毛片黄色毛片免费观看视频| e午夜精品久久久久久久| 日日摸夜夜添夜夜爱| 一级黄片播放器| 久久天堂一区二区三区四区| 男女边摸边吃奶| 中文字幕色久视频| 欧美性长视频在线观看| 男女无遮挡免费网站观看| 欧美激情高清一区二区三区| 午夜老司机福利片| 国产1区2区3区精品| 亚洲熟女毛片儿| 久久精品aⅴ一区二区三区四区| 久久99一区二区三区| 少妇人妻久久综合中文| 午夜福利影视在线免费观看| 国产一级毛片在线| videosex国产| 精品国产乱码久久久久久小说| xxxhd国产人妻xxx| 国产精品一二三区在线看| 国产不卡av网站在线观看| 一级,二级,三级黄色视频| 婷婷丁香在线五月| 九色亚洲精品在线播放| 18禁国产床啪视频网站| 制服诱惑二区| av国产精品久久久久影院| 97精品久久久久久久久久精品| 精品一区二区三卡| 又大又爽又粗| 黄色怎么调成土黄色| 亚洲三区欧美一区| 十八禁网站网址无遮挡| 美女主播在线视频| 一级毛片女人18水好多 | 精品福利永久在线观看| 国产极品粉嫩免费观看在线| av网站在线播放免费| 欧美 亚洲 国产 日韩一| 国产一区有黄有色的免费视频| www.av在线官网国产| 一区在线观看完整版| 两个人看的免费小视频| 五月天丁香电影| 精品国产超薄肉色丝袜足j| 午夜免费男女啪啪视频观看| 成人手机av| 色视频在线一区二区三区| netflix在线观看网站| 少妇 在线观看| cao死你这个sao货| 久久人人97超碰香蕉20202| 纯流量卡能插随身wifi吗| 麻豆乱淫一区二区| 丝袜在线中文字幕| 每晚都被弄得嗷嗷叫到高潮| 亚洲专区国产一区二区| 国产日韩欧美视频二区| 亚洲熟女毛片儿| 国产日韩欧美视频二区| av不卡在线播放| 丰满少妇做爰视频| 欧美性长视频在线观看| 亚洲成人手机| 美女福利国产在线| 老司机在亚洲福利影院| 国产真人三级小视频在线观看| 你懂的网址亚洲精品在线观看| 少妇的丰满在线观看| 国产精品一区二区在线不卡| 日韩中文字幕欧美一区二区 | 在线看a的网站| 两人在一起打扑克的视频| 午夜福利影视在线免费观看| av欧美777| 男女边摸边吃奶| 久久国产精品人妻蜜桃| 韩国精品一区二区三区| 国产三级黄色录像| 色网站视频免费| 欧美 亚洲 国产 日韩一| 精品免费久久久久久久清纯 | 中文字幕另类日韩欧美亚洲嫩草| 成人黄色视频免费在线看| 黄色片一级片一级黄色片| 欧美少妇被猛烈插入视频| 国语对白做爰xxxⅹ性视频网站| 国产日韩欧美视频二区| 精品国产一区二区三区四区第35| 老司机影院毛片| 日韩大码丰满熟妇| 日本猛色少妇xxxxx猛交久久| 欧美日韩亚洲高清精品| 亚洲精品久久久久久婷婷小说| 99九九在线精品视频| 亚洲视频免费观看视频| 国产男人的电影天堂91| 久久精品国产a三级三级三级| 一级片免费观看大全| 国产成人a∨麻豆精品| avwww免费| av福利片在线| 久久久久国产精品人妻一区二区| 美女脱内裤让男人舔精品视频| 欧美大码av| 精品亚洲成国产av| 亚洲欧美成人综合另类久久久| 午夜激情av网站| 波野结衣二区三区在线| 久久精品久久精品一区二区三区| 久久久精品免费免费高清| 国产一区二区在线观看av| 秋霞在线观看毛片| 精品福利永久在线观看| 国产精品久久久久成人av| 午夜福利,免费看| 777米奇影视久久| 久久久久久人人人人人| 成人手机av| 天堂8中文在线网| 午夜精品国产一区二区电影| 天天操日日干夜夜撸| 精品少妇内射三级| 免费在线观看完整版高清| 少妇的丰满在线观看| 久久人人爽人人片av| 99精国产麻豆久久婷婷| 丁香六月欧美| 一本一本久久a久久精品综合妖精| 大码成人一级视频| 精品亚洲乱码少妇综合久久| 久久精品久久久久久噜噜老黄| 久久国产精品影院| 在线看a的网站| 热re99久久国产66热| 宅男免费午夜| 多毛熟女@视频| 亚洲精品一区蜜桃| 人人妻人人澡人人看| 97精品久久久久久久久久精品| 你懂的网址亚洲精品在线观看| 久久精品久久精品一区二区三区| 人妻一区二区av| 国产男女内射视频| 久久国产精品男人的天堂亚洲| 美女主播在线视频| 婷婷成人精品国产| 青草久久国产| 黄网站色视频无遮挡免费观看| 久久精品国产亚洲av高清一级| 中文字幕av电影在线播放| 日韩欧美一区视频在线观看| 国产一区亚洲一区在线观看| 日本五十路高清| 两性夫妻黄色片| a 毛片基地| 亚洲人成77777在线视频| 亚洲国产精品一区三区| 亚洲国产看品久久| 性少妇av在线| 久久精品国产a三级三级三级| 视频在线观看一区二区三区| 亚洲,一卡二卡三卡| 午夜福利视频在线观看免费| 国产97色在线日韩免费| 亚洲 国产 在线| 制服诱惑二区| 热re99久久精品国产66热6| 国产女主播在线喷水免费视频网站| 午夜91福利影院| 久久精品国产亚洲av涩爱| 久久久精品94久久精品| av欧美777| 少妇的丰满在线观看| 国产深夜福利视频在线观看| 日韩伦理黄色片| 久久久久久免费高清国产稀缺| 老鸭窝网址在线观看| 免费在线观看视频国产中文字幕亚洲 | 国产一卡二卡三卡精品| 亚洲国产中文字幕在线视频| 久久精品熟女亚洲av麻豆精品| 最黄视频免费看| 久久久久国产精品人妻一区二区| 男女边摸边吃奶| 国产片特级美女逼逼视频| 亚洲九九香蕉| 精品卡一卡二卡四卡免费| 九草在线视频观看| 亚洲,一卡二卡三卡| 国产成人一区二区在线| 国产成人av激情在线播放| 人妻 亚洲 视频| 一级片'在线观看视频| av在线老鸭窝| 国产精品人妻久久久影院| 国产深夜福利视频在线观看| 精品久久久久久电影网| 亚洲国产精品国产精品| 精品一区二区三区四区五区乱码 | 久久99精品国语久久久| 黄色视频在线播放观看不卡| 天天躁夜夜躁狠狠久久av| 成年人午夜在线观看视频| 国产精品av久久久久免费| 丝袜美足系列| 人体艺术视频欧美日本| 亚洲国产最新在线播放| 波野结衣二区三区在线| 咕卡用的链子| 少妇裸体淫交视频免费看高清 | 成年人午夜在线观看视频| 免费观看人在逋| 午夜91福利影院| 久久女婷五月综合色啪小说| 国产片内射在线| 精品人妻在线不人妻| 自拍欧美九色日韩亚洲蝌蚪91| 一个人免费看片子| 各种免费的搞黄视频| 日本五十路高清| 菩萨蛮人人尽说江南好唐韦庄| 狠狠精品人妻久久久久久综合| 午夜av观看不卡| 建设人人有责人人尽责人人享有的| 视频在线观看一区二区三区| 亚洲三区欧美一区| 成年人黄色毛片网站| 久久久精品区二区三区| 免费观看a级毛片全部| 国产无遮挡羞羞视频在线观看| 久久精品亚洲av国产电影网| 精品国产超薄肉色丝袜足j| 只有这里有精品99| 性色av一级| 国产精品国产三级专区第一集| 色播在线永久视频| 国产不卡av网站在线观看| 又大又黄又爽视频免费| 啦啦啦视频在线资源免费观看| 搡老岳熟女国产| 免费看十八禁软件| 精品高清国产在线一区| 国产xxxxx性猛交| 两性夫妻黄色片| 日韩免费高清中文字幕av| 午夜福利视频在线观看免费| 只有这里有精品99| 一本久久精品| 国产不卡av网站在线观看| 国产精品偷伦视频观看了| 精品久久久精品久久久| 久久亚洲国产成人精品v| 亚洲av男天堂| 麻豆乱淫一区二区| 51午夜福利影视在线观看| 亚洲色图综合在线观看| 亚洲精品一区蜜桃| 久久性视频一级片| 美国免费a级毛片| 97在线人人人人妻| 日韩人妻精品一区2区三区| 亚洲精品国产av成人精品| 19禁男女啪啪无遮挡网站| 看免费av毛片| 亚洲av电影在线进入| 欧美日韩国产mv在线观看视频| 精品久久久久久久毛片微露脸 | 下体分泌物呈黄色| 亚洲激情五月婷婷啪啪| 国产精品国产三级国产专区5o| 成人手机av| 悠悠久久av| 日本一区二区免费在线视频| 亚洲精品一区蜜桃| 亚洲国产欧美在线一区| 亚洲人成网站在线观看播放| 色视频在线一区二区三区| 啦啦啦 在线观看视频| 99国产精品99久久久久| 中文字幕人妻丝袜制服| 水蜜桃什么品种好| 嫁个100分男人电影在线观看 | 最新在线观看一区二区三区 | 少妇人妻 视频| av在线app专区| 国产97色在线日韩免费| avwww免费| 国产高清videossex| 亚洲av欧美aⅴ国产| 亚洲欧美日韩另类电影网站| 一区在线观看完整版| 91字幕亚洲| 国产一区二区在线观看av| 在线观看人妻少妇| 亚洲欧洲日产国产| 欧美激情 高清一区二区三区| xxxhd国产人妻xxx| 成在线人永久免费视频| netflix在线观看网站| 中文字幕人妻丝袜制服| 一二三四在线观看免费中文在| 亚洲精品日韩在线中文字幕| 韩国高清视频一区二区三区| 99香蕉大伊视频| 亚洲国产精品国产精品| 一边亲一边摸免费视频| 欧美黄色片欧美黄色片| 男男h啪啪无遮挡| 色网站视频免费| 我要看黄色一级片免费的| 国产亚洲精品久久久久5区| 国产精品久久久久久精品电影小说| 日韩人妻精品一区2区三区| 9热在线视频观看99| 99国产精品一区二区蜜桃av | 欧美亚洲 丝袜 人妻 在线| 国产精品一二三区在线看| 国产精品偷伦视频观看了| 国产亚洲av高清不卡| 只有这里有精品99| 精品少妇一区二区三区视频日本电影| 欧美精品一区二区大全| 国产亚洲一区二区精品| 亚洲一卡2卡3卡4卡5卡精品中文| 日韩制服丝袜自拍偷拍| 精品久久久久久电影网| 天天躁狠狠躁夜夜躁狠狠躁| 熟女少妇亚洲综合色aaa.| 无遮挡黄片免费观看| 亚洲欧美成人综合另类久久久| 另类精品久久| 岛国毛片在线播放| 十八禁高潮呻吟视频| 母亲3免费完整高清在线观看| 国产老妇伦熟女老妇高清| 丰满人妻熟妇乱又伦精品不卡| 汤姆久久久久久久影院中文字幕| 亚洲中文日韩欧美视频| 久热这里只有精品99| 黄色片一级片一级黄色片| 国产精品熟女久久久久浪| 熟女av电影| 婷婷丁香在线五月| 伊人久久大香线蕉亚洲五| 精品福利永久在线观看| 伦理电影免费视频| 少妇精品久久久久久久| 亚洲人成电影免费在线| 亚洲欧美激情在线| 最近最新中文字幕大全免费视频 | 一级毛片 在线播放| 国产黄色视频一区二区在线观看| 国产三级黄色录像| 久久ye,这里只有精品| 日本91视频免费播放| 又大又黄又爽视频免费| 免费看av在线观看网站| 国产成人精品无人区| 无限看片的www在线观看| 女性生殖器流出的白浆| 在线观看国产h片| 欧美亚洲日本最大视频资源| 51午夜福利影视在线观看| 久久久久久久久免费视频了| 青春草视频在线免费观看| 女人精品久久久久毛片| 久久久久久久国产电影| av网站免费在线观看视频| 亚洲情色 制服丝袜| 精品人妻在线不人妻| 日韩大片免费观看网站| 男人舔女人的私密视频| 老鸭窝网址在线观看| 欧美少妇被猛烈插入视频| 国产日韩欧美在线精品| av片东京热男人的天堂| 久久久久久人人人人人| 麻豆国产av国片精品| 久久久精品区二区三区| 亚洲美女黄色视频免费看| 麻豆乱淫一区二区| 亚洲人成电影观看| 亚洲三区欧美一区| 国产精品偷伦视频观看了| 啦啦啦啦在线视频资源| 国产一区二区三区av在线| 一边摸一边做爽爽视频免费| 汤姆久久久久久久影院中文字幕| 午夜激情av网站| 久久免费观看电影| 又紧又爽又黄一区二区| 亚洲精品日韩在线中文字幕| 日韩中文字幕欧美一区二区 | 亚洲精品一卡2卡三卡4卡5卡 | 人人妻人人澡人人爽人人夜夜| 丁香六月欧美| 久久精品人人爽人人爽视色| 99久久综合免费| 大陆偷拍与自拍| 美国免费a级毛片| 国产伦人伦偷精品视频| 又黄又粗又硬又大视频| 国产免费福利视频在线观看| 我要看黄色一级片免费的| 亚洲七黄色美女视频| 国产片特级美女逼逼视频| 欧美精品一区二区大全| 一二三四在线观看免费中文在| 1024视频免费在线观看| 国产精品一二三区在线看| 成年人黄色毛片网站| 美女视频免费永久观看网站| 亚洲天堂av无毛| 成年av动漫网址| 国产成人一区二区三区免费视频网站 | 国产黄色免费在线视频| 日韩 亚洲 欧美在线| 亚洲一区二区三区欧美精品| 日韩中文字幕欧美一区二区 | 国产精品一二三区在线看| 99香蕉大伊视频| 亚洲精品一区蜜桃| 18禁裸乳无遮挡动漫免费视频| 免费少妇av软件| 777米奇影视久久| 国产午夜精品一二区理论片| 青春草亚洲视频在线观看| 免费在线观看完整版高清| 亚洲 欧美一区二区三区| 国产三级黄色录像| av在线播放精品| 亚洲人成77777在线视频| 超碰成人久久| 一级,二级,三级黄色视频| 一区二区三区激情视频| 亚洲天堂av无毛| 嫩草影视91久久| 中文精品一卡2卡3卡4更新| 考比视频在线观看| 欧美大码av| 亚洲精品美女久久av网站| 亚洲中文日韩欧美视频| 性色av乱码一区二区三区2| 一边摸一边抽搐一进一出视频| 丝袜人妻中文字幕| 老汉色∧v一级毛片| 久9热在线精品视频| 自线自在国产av| 国产精品亚洲av一区麻豆| 国产真人三级小视频在线观看| 久久久久视频综合| 一区二区日韩欧美中文字幕| 国产片内射在线| 国产伦理片在线播放av一区| 国产一区二区 视频在线| 一二三四社区在线视频社区8| 欧美乱码精品一区二区三区| 99国产精品一区二区蜜桃av | 欧美在线黄色| av天堂久久9| av有码第一页| 婷婷色综合www| 一级片免费观看大全| 在线观看www视频免费| 亚洲一卡2卡3卡4卡5卡精品中文| 人人妻,人人澡人人爽秒播 | 精品少妇一区二区三区视频日本电影| 午夜av观看不卡| 午夜免费成人在线视频| 色综合欧美亚洲国产小说| 国产又色又爽无遮挡免| 亚洲精品av麻豆狂野| 中文字幕人妻丝袜制服| 97精品久久久久久久久久精品| 波多野结衣一区麻豆| 久久精品国产a三级三级三级| 国产精品人妻久久久影院| 国产av一区二区精品久久| 免费在线观看日本一区| 一级毛片黄色毛片免费观看视频| 亚洲一区中文字幕在线| 汤姆久久久久久久影院中文字幕| 久久久久久久大尺度免费视频| 18禁裸乳无遮挡动漫免费视频| 久久精品熟女亚洲av麻豆精品| 久久久久久久久免费视频了| 国产成人精品在线电影| 手机成人av网站|