• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Long Short Term Memory Networks Based Anomaly Detection for KPIs

    2019-11-26 06:47:30HaiqiZhuFanzhiMengSeungminRhoMohanLiJianyuWangShaohuiLiuandFengJiang
    Computers Materials&Continua 2019年11期

    Haiqi Zhu,Fanzhi Meng,Seungmin Rho,Mohan Li,Jianyu Wang,Shaohui Liu and Feng Jiang

    Abstract:In real-world many internet-based service companies need to closely monitor large amounts of data in order to ensure stable operation of their business.However,anomaly detection for these data with various patterns and data quality has been a great challenge,especially without labels.In this paper,we adopt an anomaly detection algorithm based on Long Short-Term Memory (LSTM)Network in terms of reconstructing KPIs and predicting KPIs.They use the reconstruction error and prediction error respectively as the criteria for judging anomalies,and we test our method with real data from a company in the insurance industry and achieved good performance.

    Keywords:LSTM,anomaly detection,KPIs.

    1 Introduction

    In real-world many internet-based service companies that have online presences need to closely monitor large amounts of data in order to ensure stable operation of their business.We call these data KPIs (Key Performance Indicators,e.g.,CPU usage or session logical reads per second)[Liu,Zhao,Xu et al.(2015)] of their applications and systems.Each company has thousands to millions of KPI curves from different server nodes or different applications.The KPI curves can show the current state of the server or applications data and reflect their state change to some extent.So we can infer whether the current system or application has anomalies based on the anomalies on the KPI curves,such as server down,servers overload,etc.Thus,anomaly detection techniques have been widely used to detect anomalous events timely to minimize the loss caused by such events.However,anomaly detection for these KPI curves with multiple shapes and patterns is a great challenge,especially for these unlabeled data [Xu,Feng,Chen et al.(2018)].

    At present,a lot of literature exist about anomaly detection [Beal (2003);Bishop,Bishop and Bishop (2006);Chandola,Banerjee and Kumar (2009);Chen,Mahajan,Sridharan et al.(2013)].We will talk about the challenges encountered in anomaly detection in later chapters.Facing these challenges,we propose an efficient LSTM-based anomaly detection system that includes anomaly detection algorithm,KPI curves trend predict,etc.Due to the extreme imbalance of the data,we did not follow most current methods of anomaly detection that based classification models.They usually train a classification model by learning the distribution of normal and anomalous data and need labeled data that will take a lot of manpower and material resources.We find an abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment [Cheng,Xu,Tang et al.(2018)] We are inspired by that.In conclusion,we decide to solve the problem of anomaly detection with reconstruction normal data.It is also kind of a prediction-based perspective.

    KPIs are streaming data aggregated at pre-defined time intervals (e.g.,one minute or three seconds),thus are essentially time series.Therefore,we choose to solve the problem of time series anomaly detection from the perspective of prediction,which can also be converted into the problem of time series prediction.The amount of load on a server node or an application at a time may be unknown or change very frequently,for example,the volume of business for a particular holiday.In this case,it becomes difficult to predict the time-series,even a very short future,lead some prediction-based time-series anomaly detection models to be invalid or ineffective,such as ones based on exponentially weighted moving average (EWMA)[Michèle and Nikiforov (1993)],support vector regression (SVR)[Ma and Perkins (2003)],or recurrent neural network (RNN)[Yadav,Malhotra,Vig et al.(2016)].

    Figure1:KPI curves in real world

    In this paper,we adopt an anomaly detection algorithm based on Long Short-Term Memory (LSTM)Network in terms of reconstructing.Recurrent Neural Networks(RNNs),which are commonly used to process sequential data,have achieved great success and wide application in many Natural Language Processing (NLP).In the traditional neural network model,from the input layer to the hidden layer to the output layer,layers are fully connected,and the nodes between each layer are unconnected.This kind of neural network structure has achieved great achievements in many yields,but due to its network structure problems,it fails to perform well when facing series problems or problems closely related to time.For example,if you want to predict what the next word in a sentence is,you usually need to use the previous word,because the words before and after in a sentence are not independent.RNNs are called cyclic neural networks,meaning that the current output of a sequence is also related to the previous output.The concrete manifestation is that the network will remember the previous information and apply it to the calculation of the current output,that is,the nodes between the hidden layer are no longer connected but connected,and the input of the hidden layer includes the output of the hidden layer at the previous time as well as the output of the hidden layer.In theory,RNNs can process any length of sequence data (not a variable length time series).In practice,however,to reduce complexity,it is often assumed that the current state is only related to the previous states.As a neural network model specially dealing with time series,LSTM solve the long-term dependence problem of RNNs to a certain extent and becomes the best choice of our method.

    2 Related work

    In this section,we will first introduce the background and the mainstream methods of anomaly detection.And then we will present the goals,challenges of our proposed method and some methods we tried.

    2.1 Background

    Traditional Statistic-based models.As a traditional method,quite a few statistic-based models have been proposed and applied.Traditional statistic-based models often need to assume that the data conform to a certain distribution.The statistical anomaly detection techniques are based on the key assumption:Normal data instances occur in high probability regions of a stochastic model,while anomalies occur in the low probability regions of the stochastic model [Chandola,Banerjee and Kumar (2009)].Statistical techniques fit a statistical model (usually for normal behavior)to the given data and then apply a statistical inference test to determine if an unseen instance belongs to this model or not.This method can only fit the data distribution through normal data,and can identify other abnormal data besides normal data,but it is often very demanding on data.If the assumptions regarding the underlying data distribution hold true,statistical-based models provide a statistically solution for anomaly detection.But this assumption often does not hold true,especially for high dimensional real data sets.Even when the statistical assumption can be reasonably justified,there are several hypothesis test statistics that can be applied to detect anomalies,choosing the best statistic is not an easy task.

    Supervised ensemble methods.Typical supervised ensemble methods,EGADS [Laptev,Amizadeh and Flint (2015)] and Opprentice [Liu,Zhao,Xu et al.(2015)],have been proposed in recent years.The approach also chooses train anomaly classifiers using the user feedbacks as labels and using anomaly scores output by traditional detectors as features to solve the problem for anomaly detection.These methods shown promising results,but they all rely heavily on good labels.Moreover,running multiple traditional classification detectors is bound to cause a lot of computing overhead,which is a practical concern.

    Unsupervised and deep learning methods.Recently,due to the lack of labels in data,there is an increasing trend to adopt unsupervised machine learning algorithm to solve the problem for anomaly detection,e.g.,one-class SVM [Amer,Goldstein and Abdennadher (2013);Erfani,Rajasegarar,Karunasekera et al.(2016)],clustering based methods [Fu,Hu and Tan (2005)] like K-Means [Münz,Li and Carle (2012)] and GMM [Laxhammar,Falkman and Sviestins (2009)],KDE [Heywood,Mcdermott,Castelli et al.(2016)],and VAE [An and Cho (2015)] and VRNN [S?lch,Bayer,Lundersdorfer et al.(2016)].These technologies focus on normal data rather than abnormal data,since KPI usually contain a large amount of normal data and lack abnormal data (unlabeled),and the model can be trained without labels.In general,we make the model recognize normal sequence patterns or their latent representations,and then calculate the anomaly score by measuring the distance between an observation and the normal pattern.

    2.2 Problem and goal

    Anomaly detection is an important issue in different research fields and application fields.Many anomaly detection techniques have been specially developed to deal with some problems in professional application fields.Anomaly detection refers to finding problems in the data that do not conform to the expected behavior pattern.These nonconforming patterns are called outliers or anomalous value in different application areas.Anomaly detection is widely used in fraud detection of credit card,insurance or medical insurance,network security intrusion detection,failure detection of security critical systems,and military surveillance of enemy activities.The key of anomaly detection is to transform the exception in data into the key information in the wide application field.For example,abnormal flow patterns in computer networks may mean that the hacked computer is sending sensitive data to unauthorized destinations,abnormal medical images may indicate the presence of malignant tumors,or abnormal readings of spacecraft sensors may indicate some missing fault on the spacecraft.

    In some sense,anomaly is defined as patterns that do not conform to expected normal behavior.Therefore,the intuitive anomaly detection method is to define a regional representation of normal behavior and declare any observation in the data that does not belong to the normal region as abnormal.But there are several factors that make this deceptively simple approach very challenging.

    In general,anomaly detection can be regarded as a classification problem of data imbalance.Therefore,if data conditions allow,the use of supervised anomaly detection is preferred.In the case of only a few labels,the semi-supervised anomaly detection model can also be adopted.For example,unsupervised learning is used as a feature extraction method to assist the supervised learning.This method can also be understood as feeding the supervised classification model after preprocessing the data through unsupervised feature engineering.However,in reality,anomaly detection problems are often unlabeled,and the data does not indicate which ones are abnormal.Therefore,more attention is currently focused on unsupervised learning.

    In addition to the problem of data imbalance,time series anomaly detection still has several great challenges.It is very difficult to define a region containing all possible normal behaviors.The boundary between normal and abnormal is usually not clear.In many areas,normal behavior is evolving,and the current concept or scope of normal behavior may not be representative in the future.And for different application areas,the concept of exception is different.Small fluctuations in medical temperature,for example,may be abnormal,but small fluctuations in stock prices in the stock market may be artificially normal.Therefore,applying mature methods from one domain to another is not an easy task.

    In view of the shortcomings of current time series anomaly detection algorithms,this paper proposes a time series anomaly detection method based on LSTM Encoder-Decoder,which is trained to reconstruct instances of normal data with the predict time-series being the input time-series itself.And the reconstruct error is used as a standard for anomaly detection.Our method avoids the manual annotation of data that requires a lot of manpower and material resources.The anomaly detection and prediction of KPI curves can be realized only by using normal time-series to ensure the stable operation of the business.

    2.3 Some methods

    In the actual problem of the KPI curves anomaly detection,we can be only provided with normal data,and there is no abnormal data or even any abnormal data that can be provided us.Therefore,we consider and try different approaches from multiple perspectives.Most anomaly detection problems are still solved by classification,which can not only detect anomalous,but also detect different types of anomalous.However,due to the particularity of KPI curves,this classification method can’t solve the problem of abnormal detection of KPI curves.Therefore,we choose the method based on the prediction to solve the problem.Firstly,we choose a traditional ARIMA model suitable for time series analysis and SVR regression method.

    There are four commonly used time series models:Autoregressive model AR(p),Moving average model MA(q),Autoregressive moving average model ARMA(p,q)and ARIMA(p,d,q).It can be said that the first three are all special forms of ARIMA(p,d,q)models.ARIMA model,Auto Regressive Integrated Moving Average model,is built on the basis of stable time series,so the stability of time series is an important prerequisite for modeling.Generally,ADF unit root test model is used to test the stability of time series model.Of course,if the time sequence is not stable,but can be by some action to make the stable time series (such as the exponential difference),then the ARIMA model prediction,the stability of time series prediction results,and then the predicted results are

    Figure2:The first row is the original KPI curves,the second row is the comparison between the original and the rolling mean and the rolling std,the last row is the data after the difference before make the sequence of the stable operation of the inverse operation(index,differential inverse operation),can get the original data of predicted results

    In the ARIMA model method,we selected a continuous time series with a length of 6 days and a frequency of 1 minute.The ARIMA model requires a stationary time series.In our observation,the KPI curves is not a stationary time series.So,the first thing we need to do is to make the difference of the time series until we get a stationary time series.We made one difference on the KPI curves to obtain a relatively stable sequence,and then determined the d (difference times)of the parameters in the ARIMA model.

    After obtaining the stationary sequence,we need to obtain the autocorrelation coefficient ACF and partial autocorrelation coefficient PACF for the stationary sequence respectively to determine the parameters p and q of the model.

    Figure3:the autocorrelation coefficient ACF and partial autocorrelation coefficient PACF for the stationary sequence

    After the differential processing of the data and the selection of other parameters,we get a more appropriate ARIMA model.And we also got a relatively good result that can well predict the normal trend of KPI curves (refer Fig.4).But as we can see from the figure,the results predicted by this method are the same almost every day,and they cannot adopt to the changes in the normal pattern of data.For example,in the position circled in the figure,these two spikes are caused by a large number of people logging into the system when the working hours begin in the morning,but on the rest day,no one or a small number of people logging in,this spike will not occur,which is not an abnormal situation.But this method results suggest that there will be a spike here.

    As the same time,we found that not all kinds of KPI curves can be processed into a stable time series.However,the ARIMA model can only deal with stable time series or those that are stable after differentiation.Moreover,the ARIMA model is inherently intelligent in capturing linear relationships,but not non-linear ones (in KPI curves,many trends are non-linear).Many KPI curves are not only influenced by themselves,but also by many external factors that we can’t collect.They will fluctuate randomly with these influences.

    Figure4:The prediction results of three KPI curves obtained by the ARIMA model

    According to the observation of historical data,KPI curves has certain regularity to follow.It is usually related to the business of the company.Every day,there will be two big peaks in the morning and afternoon working hours,one trough in the lunch break,and a stable minimum state in the midnight.Therefore,it is reasonable to think that such a possibility,there are some ways to find out what the pattern is and to describe it in a complex function,exists.So,we choose the method of regression to try to find out whether there are some fixed rules in the historical data for us to predict the data of the next time point,and describe the trend and slight changes of the whole time series.

    In the traditional regression method,the prediction is only considered correct iff(x)is completely equal toy.For example,in linear regression,the mean square error is often used to calculate the loss.However,SVR (Support Vector Regression)believes that as long as the deviation betweenf(x)andyis not too large,it can be considered that the prediction is correct and the loss is not calculated.Specifically,the threshold valuea,is set to calculate the loss of data points that meet the requirements,such as |f(x)- y| >a.We all believe that model is accurate in predicting the data points in the shaded part,and only calculate the loss of data points outside the shaded part (refer Fig.5).

    Figure5:Principle of SVR

    In the regression method,we choose three kernel functions which are commonly used:‘RBF’,‘Linear’,‘Poly’.The results of three different kernel functions are shown in the Fig.6.Among them,the RBF and Linear kernel functions can only describe the basic trend of KPI curves and the results of Poly function deviate greatly from the real data.But it cannot be used as the basis of anomaly detection.And when making predictions about one of the KPI curves,you need as much information about all the other dimensions as possible.However,in the process of data processing,we find that there is no direct correlation between each curve,that is to say,it is not a simple relationship between variables and independent variables,and there are also many variables that we cannot collect and will have an impact on the result variable.In addition,when there is abnormality in one of the dimensions,the results we calculated will also produce abnormality,which violates the rule that we describe the normal data pattern and use the mutation of indicators as the detection condition.

    Figure6:Prediction results of three KPI curves obtained by SVR

    3 LSTM-based anomaly detection

    In this section,we will first present the architecture of LSTM,and then describe our design details.

    In order to solve the problem of long-term dependence,LSTM units have been developed to replace hidden layer neurons in traditional RNN.A typical LSTM cell contains one or more memory cells with internal state,an input gate,a forgetting gate,and an output gate,as shown in Fig.7.Assuming thatis the state of the memory cell at time t,the calculation process of this LSTM unit at time t is as follows:

    Figure7:LSTM cell structure

    We collected data from the company’s server nodes and application nodes with a frequency of 60 Hz through the mature Zabbix software currently on the market.The KPI curves is different from other time-series.They usually reflect the running state of the server nodes or application nodes and the business level of the company,which have some special laws,and they have some kind ofperiodicity.So simple ways to set thresholds are inaccurate.Consider a time-series of length L,where each pointis an m-dimensional vector of readings for m variables at time-instance.We consider that such time-series are available and can be obtained by taking a window of length L over a larger time-series.We considered two experimental schemes.First,we train the basic LSTM to learn the normal time-series and predict the next time point.The predict error are used to determine abnormal.Second,we choose LSTM Encoder-Decoder as the basic model,train the model to reconstruct the normal time-series.The reconstruction errors are then used to be the anomaly score of a point.A higher error indicates a higher likelihood of the point being anomalous.

    3.1 LSTM-based predict model

    In this method,we consider a prediction model learns to predict the next values for the input variable.We first learn a prediction model using LSTM networks,and then compute the prediction error using which we detect anomalies.We establish an LSTM prediction model for each KPI curve.We use stacked LSTM architecture to predict our KPI curves.We consider the following LSTM network architecture:We take one unit in the input layer for each of dimensions,one unit in the output layer.The LSTM units in a hidden layer are fully connected through recurrent connections.We stack LSTM layers s.t.each unit in a lower LSTM hidden layer is fully connected to each unit in the LSTM hidden layer above it through feedforward connections (refer Fig.8).The prediction model is learned using the normal time-series.

    Figure8:The Stacked Architecture

    3.2 LSTM Encoder-Decoder based reconstruct model

    On the basic of the LSTM-based predict model,we train an LSTM Encoder-Decoder to reconstruct the normal time-series.The encoder is used to learn a stable length vector representation of the input normal time-series that is used to reconstruct the time-series using the current hidden state and the value predicted at the previous time-step.Given X,is the hidden state of encoder at timefor eachwherec is the number of LSTM units in the hidden layer of the encoder.We train the encoder and decoder jointly to reconstruct the time-series in reverse order,i.e.,the target time-series isWe use a linear layer on the top of the LSTM decoder layer to predict the target,while the final stateof encoder is used as the initial state for the decoder.During the state of training,we useas the input to obtain the decoder’s previous hidden stateand then predictcorresponding to the targetSimilarly,in the derivation,the predict valueis used as input to obtain the decoder’s hidden stateand predictOur model’s objection is minimizingwhile theis the set of normal training time-series.

    In the Fig.9,we depict the inference steps in the LSTM Encoder-Decoder reconstruction model for a sequence withAt timethe valueand the hidden statetimeare used to obtain the hidden stateof encoder.The hidden stateof the encoder at the end of the input sequence is used as the initial stateof the decoder s.t.We compute the predictionIn the decoder,we useand the predictionto obtain the next hidden state

    In the two methods mentioned above,reconstruction error and prediction error are used as the criteria for anomaly detection.of

    Figure9:LSTM Encoder-Decoder inference steps for a sequence with L=3

    4 Experiments

    Our data comes from an insurance industry company,which has thousands of KPI curves and lacks abnormal data.We selected four KPI curves as our experimental data according to the needs of the current company’s business.The time span is three months continuous time series.

    First,we preprocess our data.It is common that KPIs have missing value.However,according to our observation,the percentage of missing value of each KPI curve is very small.We simply use linear interpolation to fill them based on their adjacent data point.Another important preprocessing step is data normalization:whereis the raw data,andis the maximum and minimum ofThere is another way we can do this with data standardizationwhereis the raw data,is the mean of data,andis the standard deviation ofAs discussed in Erfani et al.[Erfani,Rajasegarar,Karunasekera et al.(2016)],time-series must be normalized in order to make meaningful comparison between them.KPI curves are mostly concentrated in a small range.If we do not normalize the data,the result we get in the prediction-based model may be a fixed value,which is not what we expect.

    We divided the data of three months into one day and one week respectively.We can observe from the data of one day and one week that the KPI curve really has this kind of cyclical rule.(As the Fig.10)And these indicators are in line with people’s normal schedule,they have a high value at work time and a low value at midnight when the business is not running.We select four curves in the KPI to conduct our experiment in the stack LSTM-based model.We calculate the average of predict error and the mean of predict error.The point with high prediction error is considered abnormal.We can see the results in the Fig.11.

    Figure10:Compared data per day with data per week.The top is data per week,and the below is data per day

    Figure11:Stack LSTM-based predict model results.On the three figures,green line is the predict value and red line is the raw value

    We chose the same four KPI curves to verify our experiment in the LSTM Encoder-Decoder reconstruction model.This time,we calculated the reconstruction error and anomaly score (according to the distribution of reconstruction error,the high anomaly score represents the high possibility of the anomaly of this point).We can see the results in Fig.12.

    Figure12:LSTM Encoder-Decoder based reconstruction model results.In the first line of Fig.(a),we show the ground truth,and the second is the reconstruction time-series.The third and fourth lines present the reconstruction error and anomaly score.The figure(b)(c)(d)is similar

    From the perspective of test results alone,both methods can achieve the desired effect to some extent.We are satisfied with the result of prediction model and reconstruction model.We also compared mean squared error,mean absolute error and R2-score of two methods as criteria for evaluating the two models (Since the methods approach the problem from the perspective of prediction,the three standards can reflect the quality of the two kind of model.We calculate these standards using normal data as a test set).Show in Tab.1 (We use the normalized data,because the actual value are millions,and the calculated results will be very large).

    Table1:Compare model

    5 Conclusion

    In this paper,we propose a LSTM-based anomaly detection method for KPI curves.We show that stack LSTM based prediction model predicted the normal KPI curves and LSTM Encoder-Decoder based reconstruction model learnt over normal KPI curves can be the viable approaches to detect anomalies in KPI curves.However,many existing models for anomaly detection rely on the fact that the work need favorable label,effective assumption for data,a clear understanding of the data and so on.Our method is shown to detect anomalies any KPI curves,and hence may be more rapid and robust compared to exiting models.

    At present our approach is aimed at a KPI curve and train a model.We first test version contains only 12 KPI curves.The calculation level also in our hardware to withstand range,but the fact that any one server node of an enterprise has hundreds or even thousands of KPI curves,and the number of enterprise’s application nodes and sever nodes is immeasurable.Such calculation amount is far beyond our estimation,which is also beyond our current calculation level.For such problem,we need to further study the general model to reduce calculation amount and cost.It is a good choice to greatly reduce the number of models by classifying KPI curves.

    Acknowledgement:This work was supported by Harbin Institute of Technology,China Academy of Engineer Physics,College of Software and Convergence Technology of Sejong University and Guangzhou University.

    久热爱精品视频在线9| 亚洲熟女精品中文字幕| 免费观看av网站的网址| 亚洲视频免费观看视频| 丝瓜视频免费看黄片| 女人被躁到高潮嗷嗷叫费观| 九色亚洲精品在线播放| 国产成人免费无遮挡视频| 久久ye,这里只有精品| 亚洲人成电影观看| 51午夜福利影视在线观看| 99在线人妻在线中文字幕 | 精品国产乱子伦一区二区三区| 午夜激情久久久久久久| 十分钟在线观看高清视频www| 日本wwww免费看| 国产黄色免费在线视频| 黄频高清免费视频| 丝袜美腿诱惑在线| 国产精品一区二区在线观看99| 老汉色av国产亚洲站长工具| 蜜桃在线观看..| 在线永久观看黄色视频| 成人av一区二区三区在线看| 亚洲欧美激情在线| www日本在线高清视频| 99九九在线精品视频| 啦啦啦视频在线资源免费观看| 免费av中文字幕在线| 法律面前人人平等表现在哪些方面| 国产亚洲欧美精品永久| 中文字幕色久视频| 精品熟女少妇八av免费久了| 欧美精品一区二区免费开放| 两性夫妻黄色片| 母亲3免费完整高清在线观看| 中文字幕另类日韩欧美亚洲嫩草| 国产午夜精品久久久久久| 1024香蕉在线观看| h视频一区二区三区| 人人妻,人人澡人人爽秒播| 超碰97精品在线观看| 亚洲欧美日韩另类电影网站| 老熟妇乱子伦视频在线观看| a级毛片黄视频| 欧美精品啪啪一区二区三区| 岛国在线观看网站| www日本在线高清视频| av电影中文网址| 看免费av毛片| 天堂8中文在线网| 久久ye,这里只有精品| 夫妻午夜视频| 国产亚洲欧美精品永久| 亚洲免费av在线视频| 日本撒尿小便嘘嘘汇集6| 欧美精品一区二区免费开放| 国产福利在线免费观看视频| 18禁美女被吸乳视频| 黄色视频,在线免费观看| 久久av网站| 他把我摸到了高潮在线观看 | 一个人免费看片子| 男女午夜视频在线观看| 极品少妇高潮喷水抽搐| 男人舔女人的私密视频| 免费在线观看影片大全网站| 国产视频一区二区在线看| 黑人巨大精品欧美一区二区mp4| a级毛片黄视频| 高清在线国产一区| 久久香蕉激情| 操出白浆在线播放| 久9热在线精品视频| 青草久久国产| 超色免费av| 日韩大码丰满熟妇| 午夜福利在线观看吧| 色精品久久人妻99蜜桃| 男女免费视频国产| 精品福利永久在线观看| 90打野战视频偷拍视频| 欧美日韩中文字幕国产精品一区二区三区 | 久久久久久免费高清国产稀缺| 高清欧美精品videossex| 夜夜骑夜夜射夜夜干| 中文字幕高清在线视频| 精品少妇内射三级| 9191精品国产免费久久| 真人做人爱边吃奶动态| 男女高潮啪啪啪动态图| 国产精品 欧美亚洲| 法律面前人人平等表现在哪些方面| 最新在线观看一区二区三区| 亚洲成国产人片在线观看| 少妇的丰满在线观看| e午夜精品久久久久久久| 精品熟女少妇八av免费久了| 亚洲人成伊人成综合网2020| 69av精品久久久久久 | 成年女人毛片免费观看观看9 | 91老司机精品| 一级毛片女人18水好多| 国产成人av激情在线播放| 精品国内亚洲2022精品成人 | 欧美日本中文国产一区发布| 久久精品aⅴ一区二区三区四区| 激情视频va一区二区三区| 99久久99久久久精品蜜桃| 国产一区二区 视频在线| 青青草视频在线视频观看| 久久久久久久久免费视频了| 国产aⅴ精品一区二区三区波| 亚洲 欧美一区二区三区| 久久精品亚洲精品国产色婷小说| 久久久精品区二区三区| 国产日韩欧美亚洲二区| 一进一出好大好爽视频| 成人亚洲精品一区在线观看| 国产免费福利视频在线观看| 欧美亚洲 丝袜 人妻 在线| 黄色片一级片一级黄色片| www.熟女人妻精品国产| av国产精品久久久久影院| 夜夜骑夜夜射夜夜干| 757午夜福利合集在线观看| 美女国产高潮福利片在线看| 久热爱精品视频在线9| 精品一区二区三区视频在线观看免费 | 青草久久国产| 亚洲国产av影院在线观看| 别揉我奶头~嗯~啊~动态视频| 一进一出抽搐动态| 波多野结衣一区麻豆| 三级毛片av免费| 自拍欧美九色日韩亚洲蝌蚪91| 国产精品久久电影中文字幕 | 波多野结衣av一区二区av| 在线观看人妻少妇| 日韩制服丝袜自拍偷拍| 丰满饥渴人妻一区二区三| 另类精品久久| 亚洲国产成人一精品久久久| www.自偷自拍.com| 国产男靠女视频免费网站| 黄色 视频免费看| 12—13女人毛片做爰片一| 久热爱精品视频在线9| 三上悠亚av全集在线观看| 黑人巨大精品欧美一区二区蜜桃| 新久久久久国产一级毛片| 久热这里只有精品99| 99re6热这里在线精品视频| kizo精华| 欧美激情极品国产一区二区三区| 99精国产麻豆久久婷婷| 日本a在线网址| 这个男人来自地球电影免费观看| 国产av又大| 99久久精品国产亚洲精品| 成人三级做爰电影| 成人三级做爰电影| 黄色丝袜av网址大全| 黑人欧美特级aaaaaa片| 精品卡一卡二卡四卡免费| 黑人操中国人逼视频| a级毛片黄视频| 免费日韩欧美在线观看| 水蜜桃什么品种好| 激情视频va一区二区三区| 99国产极品粉嫩在线观看| 国产日韩欧美在线精品| 欧美午夜高清在线| 啦啦啦 在线观看视频| 国产精品.久久久| 久久中文字幕一级| 最近最新免费中文字幕在线| 日韩有码中文字幕| 一本—道久久a久久精品蜜桃钙片| 国产亚洲午夜精品一区二区久久| 一级毛片女人18水好多| 精品高清国产在线一区| 一边摸一边抽搐一进一出视频| 建设人人有责人人尽责人人享有的| www.自偷自拍.com| 一区二区日韩欧美中文字幕| 欧美日本中文国产一区发布| 中文字幕人妻丝袜制服| 超色免费av| 免费在线观看黄色视频的| 热99re8久久精品国产| 日本wwww免费看| 欧美一级毛片孕妇| 在线av久久热| 国产亚洲午夜精品一区二区久久| 亚洲欧美日韩高清在线视频 | 欧美国产精品va在线观看不卡| 欧美激情久久久久久爽电影 | 国产高清视频在线播放一区| 老司机靠b影院| 国产亚洲精品第一综合不卡| 日韩欧美一区视频在线观看| av在线播放免费不卡| 日韩成人在线观看一区二区三区| 亚洲美女黄片视频| 亚洲精品久久成人aⅴ小说| 在线观看免费视频网站a站| 日本精品一区二区三区蜜桃| 在线天堂中文资源库| 捣出白浆h1v1| 五月开心婷婷网| 91成年电影在线观看| 国产免费福利视频在线观看| 午夜福利在线观看吧| 国产成人精品久久二区二区91| av超薄肉色丝袜交足视频| 欧美日韩成人在线一区二区| 99精品久久久久人妻精品| 国产成人av教育| 亚洲成国产人片在线观看| 一本色道久久久久久精品综合| 日本wwww免费看| 久久久国产一区二区| 怎么达到女性高潮| 水蜜桃什么品种好| 波多野结衣av一区二区av| 午夜福利免费观看在线| 国产精品偷伦视频观看了| 高清在线国产一区| 久久久久网色| tube8黄色片| 90打野战视频偷拍视频| 亚洲天堂av无毛| 国产日韩一区二区三区精品不卡| 成年版毛片免费区| 国产在线观看jvid| 亚洲中文av在线| 最黄视频免费看| 久久久久久久久免费视频了| 变态另类成人亚洲欧美熟女 | 亚洲专区中文字幕在线| 亚洲精品粉嫩美女一区| tocl精华| 人人澡人人妻人| 妹子高潮喷水视频| 一本一本久久a久久精品综合妖精| 久久久久国内视频| 正在播放国产对白刺激| 亚洲欧美日韩另类电影网站| 国产欧美日韩一区二区三| 久久免费观看电影| 亚洲精品国产色婷婷电影| 欧美亚洲日本最大视频资源| 精品少妇黑人巨大在线播放| 99精品久久久久人妻精品| 真人做人爱边吃奶动态| 乱人伦中国视频| 国产免费现黄频在线看| bbb黄色大片| 精品久久久精品久久久| 少妇精品久久久久久久| 国产有黄有色有爽视频| 精品欧美一区二区三区在线| 欧美激情久久久久久爽电影 | 久久精品成人免费网站| 免费av中文字幕在线| 麻豆成人av在线观看| 在线观看www视频免费| 日韩欧美三级三区| 午夜精品久久久久久毛片777| 美女福利国产在线| 丝瓜视频免费看黄片| 国产男女超爽视频在线观看| 女警被强在线播放| 免费一级毛片在线播放高清视频 | 天堂动漫精品| 精品国产乱码久久久久久小说| 黄色毛片三级朝国网站| 男人舔女人的私密视频| 成人亚洲精品一区在线观看| 午夜老司机福利片| 久久精品国产综合久久久| 国产日韩欧美亚洲二区| 亚洲九九香蕉| 久久久久久亚洲精品国产蜜桃av| 精品高清国产在线一区| 女人高潮潮喷娇喘18禁视频| 国产精品自产拍在线观看55亚洲 | 久久精品国产99精品国产亚洲性色 | 日本av免费视频播放| 怎么达到女性高潮| 成人av一区二区三区在线看| 成人免费观看视频高清| 国产精品偷伦视频观看了| 91老司机精品| 日韩免费av在线播放| 大香蕉久久网| 波多野结衣一区麻豆| 搡老乐熟女国产| 亚洲精品在线美女| 捣出白浆h1v1| 精品国产乱码久久久久久小说| 黄色毛片三级朝国网站| 国产野战对白在线观看| 亚洲七黄色美女视频| 国产精品免费大片| 国产精品98久久久久久宅男小说| 一二三四社区在线视频社区8| 国产成人一区二区三区免费视频网站| 91九色精品人成在线观看| 日韩精品免费视频一区二区三区| 高清毛片免费观看视频网站 | 日本黄色视频三级网站网址 | av网站免费在线观看视频| 国产人伦9x9x在线观看| 欧美成人午夜精品| 国产欧美亚洲国产| 大码成人一级视频| 午夜日韩欧美国产| 在线亚洲精品国产二区图片欧美| 亚洲熟妇熟女久久| 人成视频在线观看免费观看| 制服人妻中文乱码| 女人被躁到高潮嗷嗷叫费观| 久久人妻熟女aⅴ| 伦理电影免费视频| 欧美 日韩 精品 国产| 性色av乱码一区二区三区2| 亚洲精品国产一区二区精华液| 黄网站色视频无遮挡免费观看| 岛国毛片在线播放| 中文字幕色久视频| 国产精品一区二区精品视频观看| 亚洲久久久国产精品| 极品人妻少妇av视频| 黑人操中国人逼视频| 少妇精品久久久久久久| 麻豆av在线久日| 国产一区二区 视频在线| 老司机在亚洲福利影院| 18禁国产床啪视频网站| 桃红色精品国产亚洲av| 搡老乐熟女国产| 狠狠精品人妻久久久久久综合| 亚洲中文av在线| 在线天堂中文资源库| 国产精品偷伦视频观看了| 国产aⅴ精品一区二区三区波| 丝袜在线中文字幕| 午夜福利免费观看在线| 操美女的视频在线观看| 美女国产高潮福利片在线看| 欧美黄色片欧美黄色片| 一区在线观看完整版| 大片免费播放器 马上看| tube8黄色片| 中亚洲国语对白在线视频| 精品少妇内射三级| 久久精品aⅴ一区二区三区四区| 日本一区二区免费在线视频| 真人做人爱边吃奶动态| avwww免费| 麻豆国产av国片精品| 成年版毛片免费区| 久久久欧美国产精品| 国产精品秋霞免费鲁丝片| 亚洲精品一卡2卡三卡4卡5卡| 亚洲精品粉嫩美女一区| 成年女人毛片免费观看观看9 | 免费一级毛片在线播放高清视频 | 亚洲黑人精品在线| 日日夜夜操网爽| 国产成人系列免费观看| 如日韩欧美国产精品一区二区三区| 日日爽夜夜爽网站| 日韩精品免费视频一区二区三区| 后天国语完整版免费观看| 欧美人与性动交α欧美软件| 一进一出好大好爽视频| 免费在线观看黄色视频的| a级毛片黄视频| 女性生殖器流出的白浆| 欧美另类亚洲清纯唯美| 欧美日韩亚洲高清精品| 少妇裸体淫交视频免费看高清 | 亚洲av欧美aⅴ国产| 少妇猛男粗大的猛烈进出视频| 人妻 亚洲 视频| aaaaa片日本免费| 久久久久视频综合| 激情在线观看视频在线高清 | 欧美变态另类bdsm刘玥| 午夜福利在线观看吧| 久久 成人 亚洲| 黄色 视频免费看| 在线看a的网站| 亚洲欧洲精品一区二区精品久久久| 中文字幕高清在线视频| 久久国产精品男人的天堂亚洲| 这个男人来自地球电影免费观看| 久久99热这里只频精品6学生| 亚洲成人免费av在线播放| 电影成人av| 国产精品偷伦视频观看了| 老司机深夜福利视频在线观看| 国产欧美日韩一区二区三| 久久这里只有精品19| 自拍欧美九色日韩亚洲蝌蚪91| 悠悠久久av| 天堂中文最新版在线下载| 久久国产精品人妻蜜桃| 亚洲成人免费av在线播放| 极品教师在线免费播放| 精品国内亚洲2022精品成人 | av片东京热男人的天堂| 热99国产精品久久久久久7| 下体分泌物呈黄色| 国产精品一区二区在线观看99| 国产色视频综合| 丝袜美足系列| 久久毛片免费看一区二区三区| 大码成人一级视频| 国产精品电影一区二区三区 | 男女无遮挡免费网站观看| 制服诱惑二区| 麻豆成人av在线观看| 18禁美女被吸乳视频| 成人精品一区二区免费| 免费少妇av软件| 两人在一起打扑克的视频| 国产亚洲一区二区精品| 黄频高清免费视频| 国产av国产精品国产| 黄片小视频在线播放| 亚洲国产欧美在线一区| 久久久久视频综合| 韩国精品一区二区三区| 中文字幕另类日韩欧美亚洲嫩草| 国产免费视频播放在线视频| 在线观看舔阴道视频| 老汉色av国产亚洲站长工具| 久久久国产一区二区| 丁香六月欧美| 久久天堂一区二区三区四区| 日韩中文字幕视频在线看片| 无限看片的www在线观看| 十八禁网站免费在线| www.精华液| 午夜福利视频在线观看免费| 久久精品91无色码中文字幕| 免费在线观看视频国产中文字幕亚洲| 美女视频免费永久观看网站| 国产淫语在线视频| 日韩有码中文字幕| 色老头精品视频在线观看| 人人妻人人澡人人爽人人夜夜| 久久久久久亚洲精品国产蜜桃av| 水蜜桃什么品种好| 三上悠亚av全集在线观看| 久久精品国产亚洲av高清一级| 一区二区三区国产精品乱码| 久久久久久久国产电影| 欧美亚洲 丝袜 人妻 在线| 国产在视频线精品| 国产三级黄色录像| 满18在线观看网站| 欧美人与性动交α欧美软件| 啦啦啦免费观看视频1| 国产一区二区在线观看av| 两个人看的免费小视频| 午夜福利一区二区在线看| 777米奇影视久久| 亚洲国产欧美网| 黄片小视频在线播放| 中文字幕色久视频| 久热爱精品视频在线9| 国产免费av片在线观看野外av| 在线av久久热| 麻豆乱淫一区二区| 亚洲性夜色夜夜综合| 国产精品 欧美亚洲| 国产精品香港三级国产av潘金莲| 一进一出抽搐动态| 亚洲色图av天堂| 天堂中文最新版在线下载| 9色porny在线观看| 一区二区三区国产精品乱码| 欧美日本中文国产一区发布| 最黄视频免费看| 亚洲精品国产区一区二| 日韩视频一区二区在线观看| 亚洲中文日韩欧美视频| 国产精品二区激情视频| 国产激情久久老熟女| 久久 成人 亚洲| 久久久水蜜桃国产精品网| 成人18禁高潮啪啪吃奶动态图| 久久婷婷成人综合色麻豆| 久久午夜亚洲精品久久| 97人妻天天添夜夜摸| 性高湖久久久久久久久免费观看| 久久 成人 亚洲| 岛国毛片在线播放| 美女扒开内裤让男人捅视频| 欧美日韩亚洲高清精品| 久9热在线精品视频| 亚洲自偷自拍图片 自拍| 黄频高清免费视频| 欧美激情久久久久久爽电影 | 精品国产一区二区三区久久久樱花| 国产激情久久老熟女| av欧美777| 亚洲精品国产一区二区精华液| 999久久久精品免费观看国产| 91国产中文字幕| 丝袜在线中文字幕| 久久亚洲真实| 女人爽到高潮嗷嗷叫在线视频| 狠狠狠狠99中文字幕| 夜夜骑夜夜射夜夜干| 91国产中文字幕| 九色亚洲精品在线播放| 久久免费观看电影| 久热爱精品视频在线9| 午夜福利在线观看吧| 一边摸一边做爽爽视频免费| 久久中文字幕一级| 五月天丁香电影| 国产av精品麻豆| 一本大道久久a久久精品| 国产成人精品无人区| av免费在线观看网站| 精品少妇黑人巨大在线播放| 丁香六月欧美| 欧美日韩中文字幕国产精品一区二区三区 | 中文字幕人妻丝袜一区二区| cao死你这个sao货| 在线观看免费视频日本深夜| 亚洲五月婷婷丁香| 变态另类成人亚洲欧美熟女 | 亚洲av国产av综合av卡| 老熟妇乱子伦视频在线观看| 久久天躁狠狠躁夜夜2o2o| 亚洲精品成人av观看孕妇| 国产熟女午夜一区二区三区| 999久久久国产精品视频| 最新的欧美精品一区二区| 999久久久精品免费观看国产| 在线观看免费午夜福利视频| www.熟女人妻精品国产| 亚洲成av片中文字幕在线观看| 精品一区二区三区av网在线观看 | 免费观看人在逋| 757午夜福利合集在线观看| 99国产综合亚洲精品| 午夜福利免费观看在线| 最新美女视频免费是黄的| 高清视频免费观看一区二区| 性少妇av在线| 精品免费久久久久久久清纯 | 日韩一区二区三区影片| 亚洲精品美女久久av网站| 免费av中文字幕在线| 欧美变态另类bdsm刘玥| 亚洲av日韩在线播放| 欧美日韩av久久| 欧美老熟妇乱子伦牲交| 午夜久久久在线观看| 精品一区二区三区av网在线观看 | 亚洲av片天天在线观看| 成在线人永久免费视频| av一本久久久久| 午夜福利欧美成人| 亚洲七黄色美女视频| 丝袜美足系列| 国产一区二区三区在线臀色熟女 | 久久精品国产综合久久久| 日韩欧美一区二区三区在线观看 | 狂野欧美激情性xxxx| 亚洲专区中文字幕在线| 汤姆久久久久久久影院中文字幕| 黄色视频在线播放观看不卡| 久久天堂一区二区三区四区| 一级毛片女人18水好多| 午夜福利,免费看| 桃花免费在线播放| 999久久久精品免费观看国产| a在线观看视频网站| 欧美日韩av久久| 亚洲黑人精品在线| 久久婷婷成人综合色麻豆| 欧美人与性动交α欧美软件| 大型av网站在线播放| 一本大道久久a久久精品| 亚洲黑人精品在线| 老司机深夜福利视频在线观看| 丝袜美腿诱惑在线| 亚洲 欧美一区二区三区| 18禁国产床啪视频网站| av一本久久久久| av有码第一页| 欧美另类亚洲清纯唯美| 在线观看66精品国产| 国产成人精品无人区| 精品国产亚洲在线| 18在线观看网站| 又黄又粗又硬又大视频| 亚洲七黄色美女视频| 99久久99久久久精品蜜桃| 亚洲,欧美精品.| 精品国产乱子伦一区二区三区| 国产淫语在线视频| 成人18禁高潮啪啪吃奶动态图| 欧美日韩精品网址| 成人手机av|