• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    YATA:Yet Another Proposal for Traffic Analysis and Anomaly Detection

    2019-11-25 10:22:42YuWangYanCaoLianchengZhangHongtaoZhangRoxanaOhriniucGuodongWangandRuosiCheng
    Computers Materials&Continua 2019年9期

    YuWang,YanCaoLianchengZhangHongtaoZhang,RoxanaOhriniuc,GuodongWangandRuosiCheng

    Abstract:Network traffic anomaly detection has gained considerable attention over the years in many areas of great importance.Traditional methods used for detecting anomalies produce quantitative results derived from multi-source information.This makes it difficult for administrators to comprehend and deal with the underlying situations.This study proposes another method to yet determine traffic anomaly (YATA),based on the cloud model.YATA adopts forward and backward cloud transformation algorithms to fuse the quantitative value of acquisitions into the qualitative concept of anomaly degree.This method achieves rapid and direct perspective of network traffic.Experimental results with standard dataset indicate that using the proposed method to detect attacking traffic could meet preferable and expected requirements.

    Keywords:Anomaly detection,cloud model,forward cloud transformation,backward cloud transformation,quantitative data to qualitative concept.

    1 Introduction

    Network traffic analysis is one of the most interesting topics in the research of basic theory of computer network.With the rapid development of Internet services and improvement of network performance,network threats are becoming more and more significant.Many kinds of anomaly events are mixed with normal traffic,especially viruses/Trojans,Botnet,XSS/CSRF,DoS and other attacks emerge in an endlessly stream.In face of the traditional and newborn threats,traffic analysis and anomaly detection technology is facing severe challenges,notably on how to effectively identify and perceive potential unknown attacks [Cheang,Wang,Cai et al.(2018);Gokcesu and Kozat (2017);Zhao,Luo,Gan et al.(2018);Zu,Luo,Liu et al.(2018)].

    Anomaly detection has two main components:the model,and the algorithm.Existing detection methods mainly include signal processing and machine learning based technologies.The former includes statistical analysis [Hu,Xiao,Fu et al.(2006)],frequency spectrum analysis [Chen,Wang,Zhao et al.(2011);Ningrinla,Amar and Kumar (2018)],wavelet analysis [Sun and Tian (2014)] and principal component analysis[Xie,Li,Wang et al.(2018)].The latter’s representative methods cover data mining[Sukhanov,Kovalev and Styskala (2016)],neural network [Naseer,Saleem,Khalid et al.(2018)] and immunology theory [Jiang,Ling,Chan et al.(2012)].With the increase number of network applications,the overall complexity of network traffic characteristics has sharply raised.The key problem is with the subjective judgment differences between collected data and the analyzer perceptions.

    Traditionally,the major problem in network traffic analysis [Li,Sun,Hu et al.(2018);Zhou,Wang,Ren et al.(2018)] is the subjectivity of the analyzer when collecting and analyzing data,many and multidisciplinary experts are needed to analyze traffic anomalies and characteristics,and the final network analysis result is created by a team of experts not just individuals.The experts would like to utilize the threat ratings or levels[Treurniet (2011);Yao,Shu,Cheng et al.(2017)] to characterize the degree of potential damage that anomalous network traffic can bring.It is rated according to a fix number ordinal qualitative scale,like 5,or 10.The maximum number is considered to represent the most frequent and severe threat.

    Existing models have been considered as suffering from a lot of drawbacks.First,the threat ratings or levels are subjective and linguistic in nature,which could not be determined precisely using a scale from 1 to 5,or 1 to 10.Second,in view of different backgrounds and understanding levels to the identified abnormal traffic,experts usually have different perceptions and interpretations,hence,the same linguistic grade level always has different meanings from different experts.

    The Cloud Model [Li,Liu and Gan (2009);Wang,Xu and Li (2014)] proposed by Li Deyi has been proved to achieve bidirectional cognitive transformation between the qualitative concept and quantitative data.Because of its advantages,the Cloud Model has been widely used in unsupervised communities detection [Gao,Jiang,Zhang et al.(2013)],failure mode and effect analysis (FMEA) [Liu,Li,Song et al.(2017)],monocular visual odometry (MVO) [Yang,Jiang,Wang et al.(2017)] and other fields[Liu,Xue,Li et al.(2017);Peng and Wang (2018);Yang,Yan,Peng et al.(2014)].In this paper,we propose an anomaly traffic analysis method based on the cloud model.The cloud model theory is introduced to depict multiple assessment information given by experts who utilize qualitative concepts to describe the key characteristics of network traffic,so as to establish the gauge cloud.Based on that,we generate abnormal membership cloud and abnormal matrix for the traffic to be determined,in order to analyze and judge the underlying situation of network traffic.

    2 Cloud model

    The Cloud model proposed is based on probability theory and fuzzy mathematics,which can not only reflect the uncertainty of the concept of natural language,but also can depict the event relationship between the randomness and fuzziness.This model is implemented to make transformation between the qualitative concept and quantitative instantiation.

    The definition of the cloud is as follows.

    2.1 Definitions

    Suppose U is a quantitative domain described by numerical values,and C is a qualitative concept with U.Let x be a random instantiation of C,as well as x ∈ U.If μ(x)represents the certainty degree for C,i.e.,μ(x)∈ [0,1],and satisfy:

    Define the distribution of x on U to be a cloud,denoted as C(X),in which each x is called a cloud drop.

    A cloud drop is one of the instantiation of qualitative concept C in the form of numerical value,and there is no orderly relationship between them.However,the overall status of cloud drops will reflect the characteristics of the e qualitative concept.The certainty degree of cloud drop indicates the extent of characterizing this qualitative concept,the greater occurrence probability of cloud drop,the higher certainty degree.

    The cloud model describes the overall qualitative concept by three numerical characteristics including:

    ·Ex (Expectation).It is the expectation of the cloud drops,which is considered to be the most representative and typical sample of concept C.

    ·En (Entropy).It is used to represent the uncertainty measurement of concept C.On the one hand,En indicates the dispersing extent of cloud drops which measures the degree of randomness;on the other hand,En reflects the range of the universe that concept C can accept,which measures the degree of fuzziness.

    ·He (Hyper Entropy).It is the entropy of En,namely the uncertain degree of En,reflecting the degree of condensation of cloud drops,which is expressed as the dispersion and thickness of cloud.

    Figure1:The normal cloud model

    As shown in Fig.1,the normal cloud is a cloud model that has been frequently used by researchers,in which x is one of the cloud drops which randomly realizes the concept C,and μ is the certaint y degree of x on concept C.The thickness of the e normal cloud is uneven demonstrating the randomness and fuzziness.More than this,each cloud model probably owns different degree of distribution and degree of discreteness,reflecting the randomness and fuzziness features of specific cloud model.This indicates the following:the greater the value of En,the wider the distribution range;the greater the value of He,the larger the degree of discrete.

    2.2 Cloud generator algorithms

    Algorithm 1:Forward Cloud Transformation (FCT).Transform the qualitative concepts into quantitative representations,that is,to use Ex,En and He to generate cloud drops which satisfy the current network situation.

    Figure2:Forward cloud generator

    Input:Ex,En,He

    Output:Cloud drops

    Steps:

    1.TakeEnas the expectation,and takeHeas the standard deviation,to produce normal random value |En'|.

    2.TakeExas the expectation,and take |En'| as the standard deviation,to produce normal random value x,which is denoted as a cloud drop within this domain.

    3.Based onExand |En'|,μ could be calculated as follows:

    Here,μis defined as the degree of certainty thatxbelongs to the qualitative concept of C.4.Iterations from Step 1 to Step 3 are preformed to generate n cloud drops,and every drop could be represented asdropi=(xi,μi).

    Algorithm 2:Backward Cloud Transformation (BCT).Conduct uncertainty transformation from the quantitative numeric value into qualitative concepts.

    Figure3:Backward cloud generator

    Input:Set of cloud drops with total amount ofN,namely D={drop1…dropn}.

    Output:Ex,EnandHe,which corresponds to the qualitative concepts represented by the cloud.

    Steps:

    1.Calculate the mean value of the input value based onX:

    Also,the first order absolute central moment is:

    Besides,the sample variance is:

    2.ThereforeEx,EnandHecould be obtained:

    By utilizing BCT and FCT,the cloud model could implement reciprocal conversion between qualitative concept and quantitative value based on the interaction between probability theory and fuzzy mathematics.

    3 Traffic analysis and anomaly detection model based on cloud model

    3.1 Analytical characteristicsoftraffic

    Considering the potential differences among the characteristics of network traffic,the anomalies and normal traffic could be identified accordingly.Under usual circumstances,the anomaly traffic characteristics caused by non-human factors are more significant and easy to detect.Oppositely,the abnormal traffic generated by malicious attackers is obvious in termsoftraffic flow rate,average packet length,and the distribution of different protocol packets.

    The key characteristics,which mainly reflect the security degree of network traffic,could generally be divided into three levels including strong,weak and neutral according to the given network environment.In the light of above analysis,the characteristicsoftraffic volume,the average packet length of different applications,the average packet arrival interval,the number of connection requests,the number of port pairs in a single flow,are regarded as especially important.According to the division of anomaly levels,7 characteristics are selected to depict the security state of target traffic qualitatively.

    Table1:Characteristicsoftraffic

    In this manner,the anomaly state of network traffic could be described and depicted combined with one or multiple characteristics,so as to indicate the traffic qualitatively.For instance,a qualitative description of the characteristics of traffic include:per unit time (assuming 10 minutes,mainly for the TCP) accounted for the rate of change of 5%,the average connection duration is 15 minutes,the failed connection accounted is 2%,the error segment accounted for 0.03%,the same service (assuming WWWis the main access) accounted for 55%,the flow rate is 0.8M Pkt/Min,and the average packet length is 800 Byte.

    3.2 Membership degree of traffic characteristics

    After characteristic of traffic have been qualitatively described,each characteristic will have three anomaly levels:Low,Medium,and High.These levels are evaluated based on expert evaluations of the e ranges of values of each characteristic.That is,there are three gauge clouds corresponding to each characteristic,and the gauge clouds are taken as the criterion of anomaly determination.In face of given target traffic,the characteristic will be compared with the gauge cloud,and the degree of anomaly membership(High/M iddle/Low) of different characteristics could be obtained.

    Anomaly membership cloud for each characteristic is established to describe the distribution of membership values of qualitative concepts,which should also be a normal cloud.Each degree of membership is a random value that follows the normal distribution in order to reflect the uncertainty of the qualitative concept and quantitative values.Suppose the number of experts is n,the expert set is P={ p1,p2,…,pn},expert pievaluates the anomaly membership of one characteristic to be three levels,as hi,mi,lirespectively,and satisfying the condition that 0≤hi,mi,li≤1.Based on this,three membership evaluation results could be processed using the backward cloud generator,to obtain digital features of Ex,En,and He,which reflect the anomaly level(High/Medium/Low) of the qualitative concept.

    Table2:Scope of characteristics value

    It is a great number of cloud drops that could effectively reflect the relationship between the qualitative concept and quantitative numerical value,therefore the digital characteristics obtained from many experts are merged and taken to produce the cloud diagram based on forward cloud generator.The cloud diagram corresponds to the three anomaly levels of qualitative concept,namely High,M iddle and Low.Considering the fair randomness of different opinions from experts,the fused characteristics are good at depicting the fuzziness degree of qualitative concept and the randomness degree of cloud drops.

    3.3 Anomaly detection and determ ination

    The fundamental process of anomaly detection and determination algorithm based on the cloud model is shown in Fig.4.

    Stage 1.Compare a specific characteristic of the traffic with corresponding gauge cloud in order to obtain expectations of the is specific characteristic including three levels as High,M iddle and Low,taken as the membership degrees (md) to depict the anomaly situation.

    Stage 2.Calculate all the membership degrees of characteristics within target traffic based on Stage 1 respectively.Suppose the number of traffic characteristics is n,and every characteristic corresponds to three values of membership degrees,thus the Matrix(n×3) could be composed and represented as formula (9).

    Stage 3.According to the differences among anomaly levels of High,Medium,Low,different weights are given to mdH,mdM,mdL,and the proportion is α:β:γ.Besides,in view of the difference in mapping and depicting the anomalies,each characteristic is given a different weight,Wmd1:Wmd2:…:Wmdn=κ1:κ2:…:κn,and the WM(Weighted-Matrix,n×3) could be denoted as formula (10).

    Figure4:Flowchart of anomaly detection and determination algorithm

    Stage 4.BCT is utilized to pursue digital features of Ex,En,and He corresponding to the anomaly degree memberships of High/Medium/Low respectively based on WM.Later,the Evaluation Cloud will be created from above Ex,En,and He with FCT algorithm,which covers three sub-clouds referring to the anomaly degrees of High/Medium/Low levels,ensuring that full information originated from traffic characteristics will be fused under these circumstances.

    Stage 5.Considering expectation value (Ex) is the most representative indicator of “anomaly”,the determination process abides by the following criterion:(1) when detecting a specific traffic,the expectation values of High,Medium and Low will be compared to select the maximum referring to the maximal membership degree of the qualitative concept.When multiple samplesoftraffic need to be compared,the expectation of High cloud from samples could be directly selected and compared,the larger value means the higher degree of anomaly.When two expectations are the same incidentally,the smaller entropy value (En) of qualitative concept will be decided.In addition,if both the value of expectation pairs and the entropy pairs are the same,the smaller hyper entropy (He) has to be chosen to find the better qualitative concept.

    4 Simulation

    Experiments to verify the YATA method are carried out by using a standard dataset through two phases:the preparation part is to generate the gauge clouds for follow-up work,and the Implementation part is to demonstrate the proposed method in two logically progressive sections.

    4.1 Preparation

    In order to verify the effectiveness of proposed method,the simulation process takes advantage of the kddcup_data_10_percent.zip in the benchmark data sets of KDD Cup 1999.Because there are totally 494021 itemsoftraffic records in the kddcup.data_10_percent.txt after decompression,to simplify the simulation,we had selected 6648 items to run experiments,involving normal traffic and three sorts of attacks,including denial of service attack (DoS),scan and sniffing (Probe),unauthorized access from a remote machine (R2L),as the anomaly detection dataset for simulation.Among the 6648 records,almost 2/3 of them are chosen for the generation of gauge cloud,denoted as DB-Gauge,and the remainder 1/3 are kept for the YATA verification,named as DB-VEF.Besides,both of DB-Gauge data set and DB-VEF data set include normal,DoS,Probe and R2L traffic.

    It is significant to generate the gauge clouds for all the characteristicsoftraffic,which is prepared for the next stage,namely,anomaly detection and determination.On the basis of classifications towards attack and normal traffic within DB-Gauge,all the numeric selections of 7 traffic characteristics would be estimated by analogue experts,770 for each.In this way,the membership degrees of High/Medium/Low levels of every characteristic could have been obtained.

    Figure5:Process of gauge cloud generation for one characteristic

    Taking the characteristic flow rate of traffic for instance,three sets including{H1,H2,…,H770},{M 1,M 2,…,M 770} and {L1,L2,…,L770} will be acquired by the assessments of analogue experts,which produces numerical values including {ExH,EnH,HeH},{ExM,EnM,HeM},{ExL,EnL,HeL} based on BCT algorithm.Subsequently,FCT is utilized to generate the gauge clouds corresponding to different anomaly levels as High,Medium,and Low for the characteristic of flow rate of traffic.Therefore,the gauge clouds of other six characteristics would be built the same way.

    4.2 Implementation

    Section 1:Single Traffic Analysis of DoS.

    In this section,certain traffic within the DoS category from DB-VEF is selected to demonstrate the YATA method to check it could determine the degree of anomaly for this traffic.

    First,gain the Matrix.The sample of DoS traffic extracted from DB-VEF is denoted as F1 and has the following characteristics:average rate is 9.6M Pkt/Min,average duration of single connection lasts for 70.4 ms,failure connections ratio per unit time is up to 25.1%,and average length of packet is 51 Bytes,etc.Next,each of the 7 characteristics is compared with the corresponding gauge cloud respectively,to obtain the decision matrix following the process which is illustrated in Fig.4.Because there are 7 characteristics and 3 levels (H,M,L),the 7×3 Matrix-F1 is calculated as follows.

    Secondly,gain the WD-F1 based on Matrix-F1.According to the importance and influence of every characteristic as well as the different levels of anomaly,we have the weight specifications as shown in Tab.3 and Tab.4.

    Table3:Weight Specifications for Levels

    Table4:Weight Specifications for Characteristics

    Therefore,the WD-F1 shown below would be obtained through formula (10):

    Thirdly,BCT algorithm would be used to calculate Expectation,Entropy and Hyper Entropy according to the different levels of High/Medium/Low based on WD-F1.

    ·ExH= 0.708,EnH= 0.113,HeH= 0.035

    ·ExM= 0.336,EnM= 0.056,HeM= 0.026

    ·ExL= 0.118,EnL= 0.026,HeL= 0.009

    Finally,FCT algorithm would be adopted to generate evaluation clouds combined with the above parameters.

    Figure6:Evaluation clouds of F1 including three anomaly levels

    As depicted in Fig.6,three peaks correspond to the evaluation clouds of High/Medium/Low levels.In each area every dot represents a cloud drop,namely dropi=(xi,μi) where μiindicates the degree of certainty that xibelongs to the qualitative concept of anomaly traffic.

    It can be seen from the diagram that the majority of the cloud evaluations have a level of High which represents the highest degree of membership.Therefore,the evaluation cloud of level High should be focused on to reflect the current situation of traffic,compared with Medium and Low levels.

    The sample traffic F1 whose average rate is up to 9.6M Pkt/Min,significantly indicating a DoS attack.Moreover,considering that the failure connections ratio is 25.1% and the single connection average duration lasts for 70.4 ms both fall into the high gauge level estimated by experts.Therefore,the evaluation cloud of High level preferably reflects the anomaly degree of the F1.

    Section 2:Single Normal Traffic Analysis.

    At this time,certain normal traffic from DB-VEF would be selected to demonstrate the ability of YATA method to distinguish whether the traffic is suspected anomalous or not.The normal traffic marked as F2 covers the following characteristics:average rate is 3.4K Pkt/Min,average duration of single connection lasts for 175.2 s,failure connections ratio per unit time is less than 0.3%,and average length of packet is 684 Bytes,etc.The decision matrix of F2,together with WD-F2 could be obtained as follows.

    WD-F2 and evaluation clouds would be calculated based on BCT and FCT algorithms consequently.Therefore,the Ex,En and He values are:

    ·ExH= 0.082,EnH= 0.022,HeH= 0.008

    ·ExM= 0.196,EnM= 0.061,HeM= 0.152

    ·ExL= 0.244,EnL= 0.031,HeL= 0.136

    Figure7:Evaluation clouds of F2 including three anomaly levels

    In Fig.7,there exist three areas respectively indicating the evaluation clouds of High/Medium/Low levels for traffic F2.It is quite different from Fig.6,because here the Low evaluation cloud and Medium evaluation cloud are partly overlapping.At the same time,they are both cluster to the right of the High evaluation cloud,which means that the F2 sample traffic is very probably normal.

    Section 3:Multiple Traffic Analysis.

    In order to implement comparisons between different typesoftraffic,a sample of Probe traffic is extracted from DB-VEF denoted as F3,which has the following characteristics:average rate is 0.8K Pkt/Min,average duration of single connection lasts for 89.7 ms,failure connections ratio per unit time is up to 4.1%,and average length of packet is 135 Bytes,etc.The decision matrix of F3,together with WD-F3 could be obtained as follows:

    Then,WD-F3 and evaluation clouds would be calculated based on BCT and FCT algorithms consequently.

    ·ExH= 0.708,EnH= 0.113,HeH= 0.035

    ·ExM= 0.336,EnM= 0.056,HeM= 0.026

    ·ExL= 0.118,EnL= 0.026,HeL= 0.009

    Similarly in Fig.8,there are three areas describing the evaluation clouds of High/Medium/Low levels for sample F3.Still the evaluation cloud of High level is moved prominently to the right which means it is the most persuasive indicator of underlying situation.Because evaluation cloud of High level locates on the right side of the middle,showing that it is in a slightly invaded situation,and generally in conformity with the situation of Probe attack.

    Figure8:Evaluation clouds of F3 including three anomaly levels

    Figure9:Comparison of F1 and F3

    In aspect of the High level cloud from Fig.9,it is obvious that F1 is grouped to the right of F3,which means F1 behaves more anomalous than F3.Since F1 comes from DoS traffic part of DB-VEF,while F3 comes from the Probe,the result illustrated in Fig.9 shows good consistency with the varied sortsoftraffic,and verifies the effectiveness of YATA,which could reveal the extent of anomaly from a qualitative point of viewin a convenient and intuitive way.

    5 Conclusion

    To protect the network from being exploited by malicious traffic,we propose an anomaly traffic detection and determination method named YATA.In virtue of the Cloud Model,this method is capable of transforming quantitative data to the qualitative concept rapidly and directly,which improves the expressivenessoftraffic situation for the security administrators to take further measures.We deploy and demonstrate the feasibility of this method based on KDD Cup 1999.

    Acknowledgement:We would like to present our thanks to any anonymous reviewers for their helpful suggestions.This work is supported in part by National Natural Science Foundation of China (No.61802115),Henan province science and technology projects(Nos.182102310925,192102310445),Key Scientific Research projects of Henan Province Education Department (Nos.18A520004,19A520008).

    大话2 男鬼变身卡| av国产久精品久网站免费入址| 一级毛片我不卡| 韩国av在线不卡| 大又大粗又爽又黄少妇毛片口| 久久鲁丝午夜福利片| 男女啪啪激烈高潮av片| 一级a做视频免费观看| 高清欧美精品videossex| 欧美 日韩 精品 国产| 日日摸夜夜添夜夜添av毛片| 这个男人来自地球电影免费观看 | 亚洲精品亚洲一区二区| 欧美国产精品一级二级三级 | 观看免费一级毛片| 欧美xxⅹ黑人| 国产国拍精品亚洲av在线观看| 国产成人免费无遮挡视频| 少妇人妻精品综合一区二区| 在线播放无遮挡| 日韩一本色道免费dvd| 日韩中文字幕视频在线看片 | av福利片在线观看| 国产成人免费观看mmmm| 热99国产精品久久久久久7| 新久久久久国产一级毛片| 黄色一级大片看看| 美女主播在线视频| 亚洲色图综合在线观看| 女的被弄到高潮叫床怎么办| 国产精品99久久久久久久久| 26uuu在线亚洲综合色| 天美传媒精品一区二区| 香蕉精品网在线| 欧美+日韩+精品| av在线观看视频网站免费| 男女国产视频网站| 啦啦啦啦在线视频资源| 国产精品一区二区三区四区免费观看| 少妇被粗大猛烈的视频| 天天躁日日操中文字幕| 99热这里只有精品一区| 三级经典国产精品| 亚洲欧洲国产日韩| 午夜福利影视在线免费观看| 国产淫语在线视频| 日韩欧美 国产精品| xxx大片免费视频| 毛片女人毛片| 日韩一区二区视频免费看| 成人毛片60女人毛片免费| 精品午夜福利在线看| 99久国产av精品国产电影| tube8黄色片| 国产有黄有色有爽视频| 一边亲一边摸免费视频| 国产中年淑女户外野战色| 成人午夜精彩视频在线观看| 日产精品乱码卡一卡2卡三| 日韩强制内射视频| 欧美成人精品欧美一级黄| 日韩国内少妇激情av| 亚洲欧美日韩无卡精品| 国产精品久久久久久av不卡| 亚洲精品乱码久久久v下载方式| 欧美+日韩+精品| 国产精品无大码| 久久久久久久精品精品| 欧美 日韩 精品 国产| 黄色一级大片看看| 免费不卡的大黄色大毛片视频在线观看| 国产成人a∨麻豆精品| 欧美成人午夜免费资源| 免费av不卡在线播放| 久久久久精品久久久久真实原创| 亚洲aⅴ乱码一区二区在线播放| 热re99久久精品国产66热6| 在线播放无遮挡| 亚洲精品日韩在线中文字幕| 亚洲欧美日韩卡通动漫| 国产色爽女视频免费观看| 日本-黄色视频高清免费观看| 色婷婷av一区二区三区视频| 简卡轻食公司| 成人午夜精彩视频在线观看| 国产黄频视频在线观看| 欧美日韩国产mv在线观看视频 | 麻豆乱淫一区二区| 欧美激情国产日韩精品一区| 美女国产视频在线观看| 欧美精品亚洲一区二区| 亚洲国产日韩一区二区| 国产欧美另类精品又又久久亚洲欧美| 亚洲精品日本国产第一区| 久久婷婷青草| 国产精品国产三级专区第一集| a级毛片免费高清观看在线播放| av女优亚洲男人天堂| 免费人成在线观看视频色| 日韩人妻高清精品专区| av在线播放精品| 国产久久久一区二区三区| 免费av不卡在线播放| 亚洲一级一片aⅴ在线观看| 大香蕉97超碰在线| kizo精华| 亚洲天堂av无毛| 少妇猛男粗大的猛烈进出视频| 中文字幕免费在线视频6| 久久久久久久久久久免费av| 97超视频在线观看视频| 最近的中文字幕免费完整| 中国美白少妇内射xxxbb| 免费观看a级毛片全部| 久久韩国三级中文字幕| 久久久久久久国产电影| 伊人久久国产一区二区| 亚洲欧美一区二区三区黑人 | 精品一区二区三区视频在线| 久久亚洲国产成人精品v| 亚洲欧美日韩无卡精品| 王馨瑶露胸无遮挡在线观看| 成人一区二区视频在线观看| 亚洲美女黄色视频免费看| 啦啦啦视频在线资源免费观看| 在线亚洲精品国产二区图片欧美 | 国产毛片在线视频| 少妇人妻久久综合中文| 久久久久网色| 熟女av电影| 久久99蜜桃精品久久| 亚洲欧美日韩卡通动漫| 一级爰片在线观看| 精品人妻视频免费看| 嫩草影院入口| 日韩视频在线欧美| 亚洲第一区二区三区不卡| 日韩精品有码人妻一区| 最近手机中文字幕大全| 日日啪夜夜爽| 亚洲av欧美aⅴ国产| 丰满迷人的少妇在线观看| 特大巨黑吊av在线直播| 高清黄色对白视频在线免费看 | 日韩 亚洲 欧美在线| 91狼人影院| 少妇人妻 视频| 日本欧美国产在线视频| 一个人看视频在线观看www免费| 少妇丰满av| 亚洲va在线va天堂va国产| 久久这里有精品视频免费| 日本av免费视频播放| 18禁在线无遮挡免费观看视频| 老师上课跳d突然被开到最大视频| 91狼人影院| 亚洲精品aⅴ在线观看| 在线观看一区二区三区| 自拍欧美九色日韩亚洲蝌蚪91 | 欧美日韩在线观看h| 我的女老师完整版在线观看| 日韩成人av中文字幕在线观看| 卡戴珊不雅视频在线播放| 亚洲精品第二区| 欧美老熟妇乱子伦牲交| 一个人看视频在线观看www免费| 三级国产精品欧美在线观看| 亚洲欧美成人综合另类久久久| 精品久久久久久久久av| 麻豆成人午夜福利视频| 直男gayav资源| 久久久久久久久久成人| 亚洲精品自拍成人| 激情 狠狠 欧美| 国产精品一区www在线观看| 伊人久久国产一区二区| 九九在线视频观看精品| 国产一区亚洲一区在线观看| 麻豆成人午夜福利视频| 在线播放无遮挡| 看非洲黑人一级黄片| 多毛熟女@视频| 成人漫画全彩无遮挡| 视频中文字幕在线观看| 免费黄色在线免费观看| 国产色婷婷99| 午夜福利高清视频| 伦理电影免费视频| 日韩 亚洲 欧美在线| 又爽又黄a免费视频| 天堂中文最新版在线下载| 多毛熟女@视频| 最近的中文字幕免费完整| av在线app专区| h日本视频在线播放| 日本vs欧美在线观看视频 | 一区二区三区乱码不卡18| 在线观看人妻少妇| 久久久久国产网址| av国产免费在线观看| 欧美zozozo另类| 下体分泌物呈黄色| 国产在线男女| 亚洲一区二区三区欧美精品| 亚洲国产欧美在线一区| 高清不卡的av网站| 精品亚洲成a人片在线观看 | 国国产精品蜜臀av免费| 亚洲高清免费不卡视频| 亚洲人成网站高清观看| av天堂中文字幕网| 久久久久久伊人网av| 亚洲综合精品二区| 久久久久久九九精品二区国产| av播播在线观看一区| 免费久久久久久久精品成人欧美视频 | 欧美日韩视频精品一区| 十分钟在线观看高清视频www | 亚洲精品久久久久久婷婷小说| 天堂中文最新版在线下载| 精品人妻视频免费看| 爱豆传媒免费全集在线观看| 国产成人a∨麻豆精品| 超碰97精品在线观看| 国产亚洲av片在线观看秒播厂| 免费少妇av软件| 99精国产麻豆久久婷婷| 欧美精品一区二区免费开放| 激情五月婷婷亚洲| 熟女人妻精品中文字幕| 18禁动态无遮挡网站| 18+在线观看网站| 日韩欧美 国产精品| 国产精品免费大片| 久久人人爽人人片av| 插逼视频在线观看| 一级毛片久久久久久久久女| 亚洲人成网站在线观看播放| 欧美精品国产亚洲| 老师上课跳d突然被开到最大视频| 日韩av在线免费看完整版不卡| 国产av国产精品国产| 在线观看免费视频网站a站| 日韩不卡一区二区三区视频在线| a级毛色黄片| 日本-黄色视频高清免费观看| 丰满迷人的少妇在线观看| 国产精品麻豆人妻色哟哟久久| 免费高清在线观看视频在线观看| 日本欧美国产在线视频| 国产精品.久久久| 激情五月婷婷亚洲| 亚洲av成人精品一区久久| 亚洲熟女精品中文字幕| 黄色视频在线播放观看不卡| 午夜福利在线观看免费完整高清在| 99九九线精品视频在线观看视频| av在线app专区| 国产 一区精品| 亚洲国产色片| 国产黄片美女视频| 亚洲,一卡二卡三卡| av视频免费观看在线观看| 日日撸夜夜添| 高清毛片免费看| 一区二区三区精品91| 国产精品熟女久久久久浪| 亚洲欧美日韩东京热| 免费av中文字幕在线| 涩涩av久久男人的天堂| 免费观看a级毛片全部| 51国产日韩欧美| av.在线天堂| 亚洲欧美日韩卡通动漫| 不卡视频在线观看欧美| 18禁在线播放成人免费| kizo精华| 91久久精品国产一区二区三区| 国产久久久一区二区三区| 一区二区三区精品91| 国产精品久久久久久精品电影小说 | 99久久中文字幕三级久久日本| 午夜激情福利司机影院| 国产爱豆传媒在线观看| 在线免费十八禁| 人体艺术视频欧美日本| 好男人视频免费观看在线| 国产成人一区二区在线| 亚洲国产欧美人成| h视频一区二区三区| 99久久中文字幕三级久久日本| 亚洲成人一二三区av| 国内少妇人妻偷人精品xxx网站| 欧美zozozo另类| 尾随美女入室| 在线观看国产h片| 精品一品国产午夜福利视频| 久久人人爽人人爽人人片va| 黄色欧美视频在线观看| 国产男人的电影天堂91| 精品久久久噜噜| www.色视频.com| 午夜精品国产一区二区电影| 免费观看a级毛片全部| 久久人人爽人人片av| 国产女主播在线喷水免费视频网站| av卡一久久| 亚洲久久久国产精品| 男女国产视频网站| 赤兔流量卡办理| 又粗又硬又长又爽又黄的视频| 熟妇人妻不卡中文字幕| 26uuu在线亚洲综合色| 国产精品久久久久久精品古装| 边亲边吃奶的免费视频| 男人爽女人下面视频在线观看| 国产精品.久久久| 亚洲精品久久午夜乱码| 久久精品国产亚洲av涩爱| 国产精品一区二区在线不卡| 久久久欧美国产精品| 少妇的逼好多水| 国产一区有黄有色的免费视频| 在线观看一区二区三区| 内地一区二区视频在线| 亚洲美女视频黄频| 久久精品国产a三级三级三级| 亚洲美女黄色视频免费看| 麻豆乱淫一区二区| 国产精品偷伦视频观看了| 午夜激情福利司机影院| 亚洲精品日韩在线中文字幕| 韩国av在线不卡| 亚洲精品乱码久久久久久按摩| 夜夜骑夜夜射夜夜干| 夫妻性生交免费视频一级片| 能在线免费看毛片的网站| 国产白丝娇喘喷水9色精品| 亚洲欧美日韩卡通动漫| 性高湖久久久久久久久免费观看| 免费观看性生交大片5| 色5月婷婷丁香| 青春草亚洲视频在线观看| 国产伦精品一区二区三区四那| 中国三级夫妇交换| 国产一区有黄有色的免费视频| 视频区图区小说| 中文字幕制服av| 欧美日韩精品成人综合77777| 久久精品国产亚洲网站| 中文欧美无线码| 国产视频内射| 街头女战士在线观看网站| a级毛色黄片| 汤姆久久久久久久影院中文字幕| 亚洲欧美日韩另类电影网站 | 毛片一级片免费看久久久久| 老司机影院毛片| 好男人视频免费观看在线| 人人妻人人澡人人爽人人夜夜| 少妇裸体淫交视频免费看高清| 国产伦精品一区二区三区四那| 亚洲精品乱久久久久久| 国产免费又黄又爽又色| 亚洲精品色激情综合| 中文字幕人妻熟人妻熟丝袜美| 日韩av在线免费看完整版不卡| 人人妻人人添人人爽欧美一区卜 | 国产真实伦视频高清在线观看| 啦啦啦视频在线资源免费观看| 日韩在线高清观看一区二区三区| 欧美少妇被猛烈插入视频| 中文字幕制服av| 欧美精品一区二区免费开放| 国产69精品久久久久777片| 亚洲真实伦在线观看| 天堂俺去俺来也www色官网| 国产极品天堂在线| 免费看av在线观看网站| 观看av在线不卡| 国产欧美日韩一区二区三区在线 | 中文字幕av成人在线电影| 久久久久精品性色| 亚洲国产高清在线一区二区三| 国产精品久久久久久av不卡| 精品国产露脸久久av麻豆| 最近手机中文字幕大全| 亚洲精品aⅴ在线观看| 黄色视频在线播放观看不卡| av在线观看视频网站免费| 建设人人有责人人尽责人人享有的 | 亚洲伊人久久精品综合| 国产一区有黄有色的免费视频| 99久久精品热视频| 少妇精品久久久久久久| 久久人人爽人人爽人人片va| 人人妻人人看人人澡| 中国国产av一级| 人人妻人人爽人人添夜夜欢视频 | 成人无遮挡网站| 久久女婷五月综合色啪小说| 中文字幕精品免费在线观看视频 | a级毛色黄片| 91aial.com中文字幕在线观看| 三级国产精品片| 亚洲精品,欧美精品| 免费看日本二区| 少妇被粗大猛烈的视频| 涩涩av久久男人的天堂| 一级片'在线观看视频| 亚洲丝袜综合中文字幕| 亚洲av电影在线观看一区二区三区| av视频免费观看在线观看| 舔av片在线| 99re6热这里在线精品视频| 一区二区三区四区激情视频| 欧美区成人在线视频| 国产亚洲精品久久久com| 国产女主播在线喷水免费视频网站| 女性被躁到高潮视频| 中文字幕av成人在线电影| 久久精品国产亚洲网站| 久久精品国产自在天天线| 精品亚洲乱码少妇综合久久| 久久人人爽人人爽人人片va| 欧美日本视频| 女人十人毛片免费观看3o分钟| 国产欧美亚洲国产| 一本久久精品| 欧美精品人与动牲交sv欧美| 色视频www国产| 欧美日韩在线观看h| 中文字幕免费在线视频6| 久久久久久久久大av| 在线观看一区二区三区激情| 一级毛片电影观看| 一个人看视频在线观看www免费| 久久青草综合色| 成人亚洲精品一区在线观看 | 日韩国内少妇激情av| 91精品伊人久久大香线蕉| 欧美日韩亚洲高清精品| 日本wwww免费看| 亚洲av成人精品一区久久| 精品久久久久久久久av| 伦精品一区二区三区| 在线观看免费高清a一片| 熟女电影av网| 人妻少妇偷人精品九色| 国产精品无大码| 丝瓜视频免费看黄片| 日韩三级伦理在线观看| 国产精品人妻久久久久久| 免费观看性生交大片5| 成人亚洲欧美一区二区av| 日韩亚洲欧美综合| 蜜臀久久99精品久久宅男| 亚洲国产成人一精品久久久| 国产欧美另类精品又又久久亚洲欧美| 一级毛片aaaaaa免费看小| 成人影院久久| 国产成人精品福利久久| 久久久色成人| 国产精品偷伦视频观看了| 内地一区二区视频在线| 一级片'在线观看视频| 熟女av电影| 卡戴珊不雅视频在线播放| 亚洲电影在线观看av| 欧美xxxx性猛交bbbb| 日本午夜av视频| 精品亚洲成国产av| 国产精品爽爽va在线观看网站| 久久毛片免费看一区二区三区| 日韩强制内射视频| 五月开心婷婷网| 亚洲va在线va天堂va国产| 天天躁夜夜躁狠狠久久av| 男人狂女人下面高潮的视频| 七月丁香在线播放| 国产在线男女| 少妇猛男粗大的猛烈进出视频| 色网站视频免费| 精品人妻熟女av久视频| 黄片wwwwww| 一级爰片在线观看| 欧美一区二区亚洲| 成人亚洲精品一区在线观看 | 国产黄片美女视频| 精品一区二区三区视频在线| 久久国产乱子免费精品| 又黄又爽又刺激的免费视频.| 一级a做视频免费观看| 一个人看视频在线观看www免费| 少妇猛男粗大的猛烈进出视频| 欧美区成人在线视频| 国产黄色视频一区二区在线观看| 亚洲熟女精品中文字幕| 国产精品麻豆人妻色哟哟久久| 亚洲欧洲日产国产| 国产成人精品福利久久| 麻豆成人午夜福利视频| 亚洲精品日韩av片在线观看| 久久久久久久亚洲中文字幕| 超碰av人人做人人爽久久| 久久国产精品大桥未久av | 免费人成在线观看视频色| 天堂8中文在线网| 美女脱内裤让男人舔精品视频| av女优亚洲男人天堂| 少妇人妻一区二区三区视频| 在线观看人妻少妇| 欧美性感艳星| 国产熟女欧美一区二区| 国产精品一二三区在线看| 亚洲国产av新网站| 国产av一区二区精品久久 | 国产在线男女| 毛片一级片免费看久久久久| 日韩av不卡免费在线播放| 狠狠精品人妻久久久久久综合| 最近最新中文字幕免费大全7| 日韩一区二区视频免费看| 高清不卡的av网站| 男的添女的下面高潮视频| 亚洲国产成人一精品久久久| 亚洲内射少妇av| 看免费成人av毛片| 亚洲国产精品成人久久小说| 哪个播放器可以免费观看大片| 伊人久久国产一区二区| 国产精品一区二区在线不卡| 精品国产露脸久久av麻豆| 麻豆乱淫一区二区| 色吧在线观看| 伦精品一区二区三区| 99久久精品国产国产毛片| 亚洲美女黄色视频免费看| 亚洲国产毛片av蜜桃av| 亚洲精品久久午夜乱码| 国产免费一级a男人的天堂| 国产精品久久久久久精品古装| 亚洲av男天堂| 久久av网站| 免费观看的影片在线观看| 国产精品偷伦视频观看了| 一个人免费看片子| 日韩成人av中文字幕在线观看| 国产av码专区亚洲av| 色视频www国产| 亚洲一级一片aⅴ在线观看| 麻豆成人av视频| 国内精品宾馆在线| 精品久久久久久久久亚洲| 国产欧美日韩精品一区二区| 国产免费视频播放在线视频| 亚洲精品自拍成人| videos熟女内射| 天堂8中文在线网| 国产精品一区二区性色av| 婷婷色av中文字幕| 丰满人妻一区二区三区视频av| 人人妻人人看人人澡| 欧美日韩国产mv在线观看视频 | 高清毛片免费看| 国产视频首页在线观看| 最近中文字幕2019免费版| 美女高潮的动态| 精品午夜福利在线看| www.av在线官网国产| 简卡轻食公司| 精品一区二区免费观看| 伦精品一区二区三区| 国产老妇伦熟女老妇高清| 精品国产乱码久久久久久小说| 男女无遮挡免费网站观看| 久久6这里有精品| 久久久亚洲精品成人影院| 精品亚洲乱码少妇综合久久| 一级毛片久久久久久久久女| 成人毛片60女人毛片免费| 身体一侧抽搐| 欧美极品一区二区三区四区| a级毛片免费高清观看在线播放| 少妇高潮的动态图| 亚洲欧美日韩另类电影网站 | 国产精品久久久久久久久免| 有码 亚洲区| 国产高清不卡午夜福利| 免费看av在线观看网站| 日本猛色少妇xxxxx猛交久久| 五月开心婷婷网| 三级国产精品片| 自拍欧美九色日韩亚洲蝌蚪91 | 男女下面进入的视频免费午夜| 精品一区二区三卡| 六月丁香七月| 国产精品无大码| 久久这里有精品视频免费| 国模一区二区三区四区视频| 只有这里有精品99| 夜夜爽夜夜爽视频| 精品久久久久久久末码| 亚洲欧美精品专区久久| 在线观看免费视频网站a站| 精品久久久精品久久久| 少妇人妻一区二区三区视频| 80岁老熟妇乱子伦牲交| 中文字幕精品免费在线观看视频 | tube8黄色片| 亚洲aⅴ乱码一区二区在线播放| 久久久久久九九精品二区国产| 内地一区二区视频在线| 美女xxoo啪啪120秒动态图| 三级国产精品欧美在线观看|