• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fraud detection on payment transaction networks via graph computing and visualization①

    2020-10-09 07:38:14SunQuan孫權(quán)TangTaoZhengJianbinLinJialeZhaoJintaoLiuHongbao
    High Technology Letters 2020年3期
    關(guān)鍵詞:孫權(quán)

    SunQuan(孫權(quán)),TangTao②,ZhengJianbin**,LinJiale***,ZhaoJintao**,LiuHongbao**

    (*School of Computer Science, Fudan University, Shanghai 200433, P.R.China) (* *China UnionPay Research Institute of Electronic Payment, Shanghai 201201, P.R.China) (* * *School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, P.R.China)

    Abstract

    Key words: payment fraud detection, graph computing, graph embedding, machine learning

    0 Introduction

    Payment has been evolving to a new era whereby the mobile Apps have taken a dominant role in many emerging areas. There are multiple big giants for payment in China including Alipay, UnionPay, etc. With the propensity of the payment mobile Apps, more and more individual users, merchants, and other players have entered this area, many persons are benefiting from the advanced and convenient mobile payment technology and business.

    As a matter of fact, the payment giants have spent large amounts of investment in promoting their payment tools and one of the main promoting ways is to give discount or back cash to individuals who use their payment Apps when do purchase. The payment can either be fulfilled by online and offline, while the online especially mobile Apps are becoming the major channel to attract the public to get used to the new payment habit. The promotion naturally incurs the attackers including both individual users and merchants that take advantage of the promotion events to obtain extra rewards in an unjustified way. For example, the users may intentionally repeat 10 purchase on the same goods in a merchant, which can, in turn, get back cash from the payment service provider, and the user may share this reward with the merchant. In fact, such fraud has become the major concern for payment campaign, which can cause significant loss to payment service providers. As a result, how to effectively detect the underlying fraud makers (including both individual users and merchants) has been a hot research topic in literature, though many focused on other relevant but different domains. This work also focuses on this important problem, and conducts the empirical study on a major payment service provider in China, to verify the idea and the proposed technical approach. In general, this paper aims to make the following highlights:

    ? A graph computing-based approach is proposed for payment fraud detection, particularly in the setting of mobile Apps payment tools. The proposed approach is unsupervised and can work on large-scale transaction networks, whereby the nodes denote both individual users and merchants, and the edges denote the transaction records.

    ? Specifically, the proposed approach consists of the 2 main steps: the first step is to use graph computing to break the giant network into small communities, and the second step is to adopt data visualization to help the investigators pinpoint the risk nodes and edges in a certain time period.

    ? Case study with preliminary experimental results is provided on the real-world dataset from a major payment player in China. The results show that the proposed approach can effectively detect suspicious frauds on large-scale payment networks.

    The rest of the paper is organized as follows. This paper discusses the related work in Section 1. The major technical approach based on network analysis is presented in Section 2. Case study and preliminary experiments are given in Section 3. Conclusion is in Section 4.

    1 Related work

    In this section, related work on fraud detection is presented. In particular, the review will cover different business area for fraud detection as well as the technical approaches including both supervised and unsupervised learning-based methods.

    1.1 Fraud detection business requirements

    Fraud detection has been a long standing task in financial related business. It ranges across multiple industry sectors and researchers from different disciplines have devoted considerable efforts.

    One major business scenario is credit card fraud detection, whereby unlawful transactions by credit cards need be timely detected. Ref.[1] studied the fraudulent credit card transactions occurring among the retail companies in Chile whereby the association rule method is employed. In Ref.[2], the fraud detection score was specially focused to transform it to a probability, which is important for decision making in credit card risk management. Another typical and important sector is automobile. Ref.[3] proposed an expert detection system against the group of collective automobile insurance fraudulent activities. The entities involved in the car insurance fraud can be drivers, chiropractors, garage mechanics, lawyers, police officers, insurance workers and others. In the more recent Ref.[4] showed the fraud detection experience on large-scale e-commerce platforms, based on Alibaba’s large-scale computing system called Open Data Processing Service (ODPS). An anti-fraud system has been developed and verified on 2 large e-commerce datasets with the size of tens of millions of users and items, which is further deployed to Alibaba’s online business Taobao. Fraud can also happen in the online customer reviews, which are assumed to be unbiased opinion of other consumers’ experiences with the items or services. In fact, it is possible that the publishers, writers and vendors consistently manipulate online consumer reviews. And these manipulations can incur significant bias to the potential buyers such that the customers may purchase goods under misleading. To address this issue, Ref.[5] analyzed typical patterns of review manipulation and provided an empirical study on the real-world data from Amazon and Barnes & Noble. For telecom fraud detection, it has been a serious problem in many developing countries, e.g. China, and it is rather difficult to coordinate multiple agencies to avoid fraudulent activities thoroughly. Thus machine learning methods are applied in Ref.[6] to detect the fraudsters. More specifically, they proposed to use generative adversarial network (GAN)[7]based model to estimate the likelihood of a fraud transaction, as such the bank can take some measures to prevent monetary loss. The GAN based model shows promising results against traditional supervised learning models. In the setting of healthcare service, fraud detection has also been a central issue especially given the trend that more and more online payment channels are becoming available. For instance, Ref.[8] disclosed the typical online healthcare service delivery process in China. The fraudsters i.e. third party agents use software robots and script to obtain hospital appointments from the authorized platforms, and then the agents ask for unjustified high price to resell them to the true clients. To tackle this problem, they first use clustering based models to discover the potential user groups from agents, then the profile of user groups are extracted from the event sequence of the users to provide evidence for fraud detection. Moreover, a case study is deployed in a real-world hospital to show its effectiveness and reliability.

    On the other hand, unsupervised models are developed and used for fraud detection, partly due to the lack of labeled samples for training an effective supervised model. Among them, clustering[9,10]is a mainly used technique. The clustering is usually performed on the user profiles to help identify the abnormal users, and the recent advance of deep network-based clustering techniques[11]can be of more help in this direction.

    There are also some technically relevant work on abnormal detection and prediction. For temporal data, Ref.[12]showed a dictionary learning-based model for robust time series anomaly detection. While a more recent work[13]showed failure prediction using both event sequence and time series data. However, this technique can be difficult to be applied in the setting. The main reason is that fraudulent transactions at the individual level are a rare event, which can hardly form a long sequence of events across a long-time period, and so for time series. In addition, it is useful to predict fraud detection rather than detection after fraudulent transactions have happened. In this sense, the early risk prediction model of fraudulent transactions are needed, and there are also a line of work[14-17]on event prediction over time, based on statistical learning models. These directions involving more complicated models are left for future study, given more data can be collected as the business spans.

    1.2 Fraud detection technologies

    From the technical perspective, fraud detection has been a challenging task partly due to the fact that the supervised learning-based models call for enough positive samples including transactions, client individuals and merchants, in comparison with the normal samples. However, in fact, many frauds may happen without being detected hence the positive samples are often a subset of the true whole fraud samples set. This leads to the following problems: 1) the distribution of the positive samples (fraud) and negative samples can be biased; 2) the number of positive samples becomes even smaller as some are not detected, especially compared with those unlimited number of normal samples.

    In literature, different methods are adopted for fraud detection in both supervised and unsupervised learning based ways. When supervision is given, as 2 rather popular machine learning methods, support vector machine (SVM) and Logistic regression (LR) have been applied in fraud detection. While in reality, supervision information is often difficult to acquire, in such cases, unsupervised methods have attracted lots of attention whereby clustering methods have been the dominant techniques.

    1.3 Remarks

    As discussed above, though fraud detection has been a long-standing problem in different financial areas while the study in the context of mobile payment Apps has not been fully explored. In particular, it is an emerging area and China has been one of the major countries for payment tools promotion. Hence it is motivated to take an in-depth study based on real-world business need (as one of the biggest payment players in the world) and rich transaction-related data. In the subsequent sections, a model based on network analysis whereby graph computing has been applied is proposed and case studies are given in detail.

    2 Graph computing based approach for fraud detection

    In this section, the graph computing based pipeline for fraud detection for unjustified profits will be discussed. The deployed method for building the transaction graph will be first described, whereby the graph computing procedure can be performed. This section also briefly discusses other alternative techniques that have been tried while not really adopted for stability and computational tractability issues.

    2.1 Transaction network construction and processing

    In the approach, the transaction network for the payments on a daily basis is built. An overview working flow of the transaction network processing and visualization is shown in Fig.1. The input transaction data is used to build the transaction network first, which is followed by filtering to remove some unimportant edges and nodes. Then community detection e.g. fast-unfolding (Fig.2) is performed to narrow down the study on relatively small communities. In the final stage, there are multiple ways of further analysis, including graph embedding (Fig.3), and rule driven community visualization (Fig.4) for fraud detection.

    Fig.1 Working flow of the transaction network processing and visualization

    2.1.1 Transaction network construction

    Specifically, when there are multiple transactions in one day for a pair of nodes, e.g. between a user and a merchant, these transactions will be aggregated into one edge (or 2 directed edges if the direction is considered), whose attributes store the average transaction amount, mean transaction time, mean transaction between time, and the total number of transactions (in one direction). Note the above statistics can also be conducted on a longer period than one day, e.g. one week or month, which can be applied dependently.

    Fig.2 Illustration for network community detection e.g. via FastUnfolding[18]. The input raw network has been divided by the 3 detected communities by the FastUnfolding method

    Fig.3 Network embedding on the detected community using node2vec[19] for merchants’ transaction networks

    Fig.4 Network visualization and rule checking based on the detected community from the raw networks

    2.1.2 Transaction network filtering

    Then filtering is performed on the formed (aggregated) transaction network, whereby the typical filtering criterion includes the total transaction count, amount, discount, and the between time. The purpose of filtering is to reduce the size of the network by sparsifying its edges and removing some less important nodes. As such the whole network can be cut into a collection of sub-networks, each of which is of a reasonable size for further processing. The filtering mainly involves 2 steps: the first step is to remove the edges whose attributes as stated above are smaller than given thresholds. The nodes with a very limited number of out/in degrees will also be removed in the second step.

    2.2 Fast community detection

    Community detection can be applied on the filtered network as shown in Fig.2, to further break down the large-scale network into small sub networks. As such, more sophisticated measurements can be computed within a reasonable time period to quickly detect the risks. There are many available community detection algorithms, of which one popular method is FastUnfolding[18]. Here is a detailed description of FastUnfolding, whereby the modularity scoreQis defined as follows:

    (1)

    whereiandjindicate the 2 nodes in the network, andAi, jdenotes the weight between the 2 nodes. Whilecijdenotes the community ID that a node is tagged, and the delta functionδ(ci,cj) returns 1 if the 2 nodes are assigned to the same community; otherwise it is set 0.

    ? Initialization: label each node to different communities;

    ? For each node, label it to the community that one of its neighboring nodes belongs to, such that the corresponding modularity score by Eq.(1) is maximized. Then the differenceΔQcompared with the original modularity score is calculated;

    ? IfΔQ>0, accept the latest community division; otherwise, keep the original division;

    ? Repeat the above steps until the modularity scoreQcannot be improved anymore.

    2.3 Detected community embedding and visualization

    One popular method is to embed the community network into vectorized feature representation, for which the scalability issue need be particularly addressed for real-world applications. In fact, there are many new network embedding methods[19-21]which can convert graph vertex into a vectorized feature points in the new space. As such, traditional machine learning methods such as support vector machine, logistic regression and decision tree can be easily reused.

    Another direct and powerful method for fraud detection based on the detected communities is visualization as will also be shown in the case studies. In general, in the detected community, the scale of the graph as well as the edge density is relatively small, hence it is easier to do graph visualization, whereby the bank card accounts and merchants can be shown in different colors to help the investigators quickly discern the abnormal patterns.

    3 Experiments and case study

    In this section, case study and preliminary experimental results on real-world payment data are provided. The data is collected from the major payment service player in China whose registered users have surpassed the number for 2 billion, and every day there are around 3 million transactions. In the proposed approach, the large-scale transaction network has been formed and graph based computing methods are used to detect the potential fraudsters. In consequence, subsequent followups can be taken to further verify the illness of the detected fraudsters.

    3.1 Platform infrastructure

    As the platform needs to support large-scale and efficient (sometimes even real-time) computing and storage, distributed system is used based on popular tools including Hadoop, HIVE, etc. The general overview of the infrastructure system is shown in Fig.5. The data is updated on a daily basis, whereby the daily records are stored on their respective nodes to ensure fast access and consistency. In addition, because the HIVE data warehouse is not friendly to interactive SQL query, the tool Impala is used for the more efficient query, which can achieve a speedup about 10 times.

    3.2 Protocol

    The proposed heterogeneous network involves individual users, merchants, as well as bank card for redistribution of the earned unjustified (monetary) credits.

    3.3 Preliminary qualitative results

    The network has been built by the definition of entities and their relationships. Then some particular sub networks can be visualized. Fig.6 shows 4 typical cases for fraudulent conspiracy among the merchants, individual users with their payment account and the bank card for monetary redistribution. More specifically:

    ? In Fig.6(a), there are 2 central merchants (in light color) to which many payment transactions have been conducted from a large number of individual users (in dark color), and it can be easily discovered that these 2 merchants have high risk for fraudulent behavior and appropriate measures can be taken to perform further investigation on the 2 merchants and the relevant individual accounts.

    ? In Fig.6(b), many individual users pay to the merchant at the promotion period, such that they receive discount or backcash from the payment service provider. And the merchant gets back the unjustified fraud money from the users by a certain ratio, e.g. 50 percentages.

    Fig.5 Overview of the infrastructure system for graph computing based fraud detection on the transaction network

    (a) Two fraudulent merchants (in light color) and their associated users(in deep color), best viewed in color

    (b) Fraudulent patterns by the suspect single bank card for money redistribution (in light color), the users (in deep color) and the merchant (in black)

    (c) Fraudulent patterns by the suspect multiple bank cards for money redistribution (in right nodes), the users (in midnodes) and the merchant (in left nodes)

    (d) Group fraudulent patterns formed by the suspect redistribution bank cards (in left nodes), the users (in midnodes) and the merchant (in right nodes)

    ? While in the example of Fig.6(c), there is no explicit merchant in the network, while the bank cards have an active link with many shared users in a short time period. This suggests the potential fraud group among these entities, such that the earned backcash may be redistributed through this network.

    ? In the 4th example as shown in Fig.6(d), there are also only 4 merchants which have attracted many transactions within a group of users. In addition, there are multiple bank cards for redistribution of the money, this scenario is often more difficult to detect as more entities are involved.

    The network embedding using the node2vec method[19]on a segmented network of merchants is also used. In this way, each merchant is represented by a feature vector. For the convenience and effect of the display, 50 merchants and their associated users project their feature representation further into the 2D plane. The edges in the projected network are created by certain means of the common clients shared by the 2 merchants (when the number exceeds a certain threshold). As shown in Fig.7, on the left, the raw network shows multiple clustering pattern regarding connected components, and such clustering behavior is well preserved in the projected 2D space on the right. This result shows the effectiveness of the adopted node2vec method.

    (a) The input networks with 10 connected components in different colors

    (b) The projection on 2D plane from the embedded feature

    3.4 Summary and discussion

    This paper gives 4 typical cases of fraud pattern which are extracted from a series of network processing including raw transaction network construction based on daily records aggregation, transaction network decomposition based on edge and node filtering and community detection to focus on suspicious networks based on data visualization.

    4 Conclusions

    This paper proposes a principled and effective approach for automatic payment fraud detection in the context of individuals and merchants, whereby a payment transaction network can be established for further analysis of the payment behavior to find suspicious fraud transactions and their latent individuals and merchants in an unsupervised learning manner.

    Specifically, this paper develops a network analysis method to discover the abnormal patterns of transactions over the network in a certain period of time. The design is based on the fact that little labeled data samples are available and there also lacks systematic rules for summarizing the behavior of fraud.

    There are many possible directions for future work. First, in this paper, an unsupervised approach is mainly adopted due to the lack of labels for fraud merchants and individuals. While as the data accumulates, more labels can be obtained and then it is possible to develop supervised learning methods such as decision tree and deep neural networks. Second, fusing multiple networks with different definitions to form a more effective detection pipeline is future direction. For this need, graph matching, especially for multiple graph matching[22,23], and online graph matching[24], can be a possible solution infusing networks with corresponding structures. Third, recently there are many temporal models for behavioral modeling, and one of the promising technique is the so-called temporal point process[25]. A variety of temporal point process models has been witnessed, ranging from classic parametric models[14]to nonparametric models[26]and to deep network based approaches[27-29]. What’s more, combining two-way exploration[30], GAN[31]with the proposed method is one of the future directions. Last but not least, how to learn an interpretable behavioral model[32,33]over time is also the immediate interest.

    猜你喜歡
    孫權(quán)
    三十六計(jì)之反間計(jì)
    任用拆臺的人
    任用拆臺的人
    孫權(quán):“包郵”好有說服力
    七擒孟獲
    任用拆臺的人
    今日文摘(2017年17期)2017-09-28 20:43:56
    孫權(quán)用人,忠誠為先
    PHOTO FINISH
    漢語世界(2017年2期)2017-07-05 14:54:46
    任用拆臺的人
    妙筆繪華章——東吳大帝孫權(quán)紀(jì)念館
    大眾考古(2014年9期)2014-06-21 07:11:08
    欧美高清性xxxxhd video| 白带黄色成豆腐渣| 国产69精品久久久久777片| 日日啪夜夜撸| 色在线成人网| 国产黄a三级三级三级人| 一夜夜www| 桃色一区二区三区在线观看| 波多野结衣巨乳人妻| av天堂中文字幕网| 成人国产麻豆网| 狂野欧美激情性xxxx在线观看| 精品欧美国产一区二区三| 久久精品国产99精品国产亚洲性色| 人妻丰满熟妇av一区二区三区| 一级黄色大片毛片| 国产蜜桃级精品一区二区三区| 嫩草影院新地址| 久久久久性生活片| 欧美潮喷喷水| 国产高清视频在线播放一区| 国产精品一区二区三区四区久久| 最近在线观看免费完整版| 精品人妻一区二区三区麻豆 | 午夜精品一区二区三区免费看| 三级男女做爰猛烈吃奶摸视频| 一a级毛片在线观看| 国产一区二区激情短视频| 在现免费观看毛片| 成人欧美大片| 日韩精品青青久久久久久| 99在线人妻在线中文字幕| 久久久久国内视频| 中文在线观看免费www的网站| 亚洲经典国产精华液单| 最新中文字幕久久久久| 国产精品久久久久久精品电影| 国产乱人伦免费视频| 中文字幕免费在线视频6| 国产精品久久视频播放| 在线观看午夜福利视频| 麻豆国产av国片精品| 日韩欧美免费精品| 亚洲国产精品成人综合色| 男插女下体视频免费在线播放| 亚洲aⅴ乱码一区二区在线播放| 久久6这里有精品| 天天躁日日操中文字幕| 欧美黑人巨大hd| 毛片女人毛片| av女优亚洲男人天堂| 精品无人区乱码1区二区| 麻豆av噜噜一区二区三区| 真实男女啪啪啪动态图| 黄色日韩在线| 美女高潮喷水抽搐中文字幕| av女优亚洲男人天堂| 窝窝影院91人妻| 国产高清视频在线播放一区| 狂野欧美激情性xxxx在线观看| 一进一出抽搐动态| av在线亚洲专区| 国产精品久久久久久亚洲av鲁大| 欧美性感艳星| 久久精品国产99精品国产亚洲性色| 亚洲,欧美,日韩| 国产精品无大码| 日本免费a在线| 啦啦啦啦在线视频资源| 国产精品亚洲美女久久久| 国产精品福利在线免费观看| 日日干狠狠操夜夜爽| 国产69精品久久久久777片| 特级一级黄色大片| 搡老岳熟女国产| 女人十人毛片免费观看3o分钟| 麻豆av噜噜一区二区三区| 亚洲性久久影院| 国产av在哪里看| 深爱激情五月婷婷| 亚洲美女搞黄在线观看 | 在线观看免费视频日本深夜| 国产真实伦视频高清在线观看 | 白带黄色成豆腐渣| 精品乱码久久久久久99久播| 国产真实乱freesex| 国产av麻豆久久久久久久| 日韩人妻高清精品专区| 国产精品女同一区二区软件 | 国产主播在线观看一区二区| 一本久久中文字幕| 十八禁国产超污无遮挡网站| 一个人看的www免费观看视频| 日本与韩国留学比较| 搡老岳熟女国产| 国产精品av视频在线免费观看| 淫秽高清视频在线观看| 成人午夜高清在线视频| 久久九九热精品免费| 色av中文字幕| 联通29元200g的流量卡| 欧美高清成人免费视频www| 波多野结衣巨乳人妻| 欧美最新免费一区二区三区| 成人特级黄色片久久久久久久| 日日啪夜夜撸| 欧美+亚洲+日韩+国产| 一进一出好大好爽视频| 国产国拍精品亚洲av在线观看| 一个人免费在线观看电影| 噜噜噜噜噜久久久久久91| 美女cb高潮喷水在线观看| 国产真实乱freesex| 日本三级黄在线观看| 国产成人一区二区在线| 国产女主播在线喷水免费视频网站 | 在线观看免费视频日本深夜| 91在线精品国自产拍蜜月| 人妻少妇偷人精品九色| 干丝袜人妻中文字幕| 国产亚洲精品综合一区在线观看| 久久精品91蜜桃| 深夜a级毛片| 亚洲18禁久久av| 欧美性猛交╳xxx乱大交人| 国产成人av教育| 美女被艹到高潮喷水动态| 日本黄色视频三级网站网址| www日本黄色视频网| 88av欧美| www.www免费av| 尤物成人国产欧美一区二区三区| 一个人看的www免费观看视频| 他把我摸到了高潮在线观看| 在线观看午夜福利视频| 成人二区视频| 九色国产91popny在线| 午夜精品一区二区三区免费看| 精品久久久久久久人妻蜜臀av| 日韩,欧美,国产一区二区三区 | 午夜福利在线观看免费完整高清在 | 免费观看的影片在线观看| 无人区码免费观看不卡| 成人综合一区亚洲| 国产精品亚洲美女久久久| 身体一侧抽搐| ponron亚洲| av国产免费在线观看| 欧美日韩乱码在线| 成人二区视频| 内射极品少妇av片p| 亚洲精品在线观看二区| 欧美区成人在线视频| 校园人妻丝袜中文字幕| 国产精品久久久久久精品电影| 全区人妻精品视频| 日本黄大片高清| 亚洲国产欧洲综合997久久,| 国产亚洲91精品色在线| av在线蜜桃| 人妻制服诱惑在线中文字幕| 小蜜桃在线观看免费完整版高清| 日韩 亚洲 欧美在线| 中文在线观看免费www的网站| 久久久久久久久久成人| 99久久久亚洲精品蜜臀av| 精品一区二区免费观看| or卡值多少钱| 啪啪无遮挡十八禁网站| 两人在一起打扑克的视频| 中文在线观看免费www的网站| 不卡视频在线观看欧美| 波多野结衣高清无吗| 美女黄网站色视频| 国产黄a三级三级三级人| 美女cb高潮喷水在线观看| 三级毛片av免费| 欧美一级a爱片免费观看看| 中文亚洲av片在线观看爽| 亚洲精品亚洲一区二区| 精品国产三级普通话版| 国产精品国产高清国产av| 联通29元200g的流量卡| 亚洲中文字幕日韩| 久久精品国产清高在天天线| 在现免费观看毛片| 欧美极品一区二区三区四区| 欧美日韩国产亚洲二区| 91久久精品电影网| 黄色日韩在线| 在线观看一区二区三区| 久久久久久久午夜电影| 91久久精品国产一区二区成人| 国产亚洲欧美98| 亚洲精华国产精华液的使用体验 | 听说在线观看完整版免费高清| 精品欧美国产一区二区三| 国产大屁股一区二区在线视频| 熟女电影av网| 天堂√8在线中文| 午夜精品久久久久久毛片777| 国产 一区 欧美 日韩| 久久久久国产精品人妻aⅴ院| 午夜福利18| 99久久中文字幕三级久久日本| 最新中文字幕久久久久| 日韩av在线大香蕉| 日本撒尿小便嘘嘘汇集6| 成人永久免费在线观看视频| 久久久午夜欧美精品| 免费看美女性在线毛片视频| aaaaa片日本免费| 搞女人的毛片| 免费在线观看影片大全网站| eeuss影院久久| 中国美女看黄片| 女人被狂操c到高潮| 亚洲av中文字字幕乱码综合| 亚洲成人免费电影在线观看| 欧美区成人在线视频| 亚洲自拍偷在线| 欧美色欧美亚洲另类二区| 在线观看av片永久免费下载| 精品不卡国产一区二区三区| 亚洲人成网站在线播放欧美日韩| 午夜福利在线在线| 国产亚洲91精品色在线| 日本一二三区视频观看| 日本在线视频免费播放| 男女那种视频在线观看| 亚洲欧美日韩东京热| 波多野结衣高清无吗| 色哟哟·www| 亚洲最大成人手机在线| 91麻豆av在线| 国产毛片a区久久久久| 亚洲精品成人久久久久久| 久久精品综合一区二区三区| 欧美3d第一页| 久久精品国产亚洲网站| 亚洲无线在线观看| 亚洲狠狠婷婷综合久久图片| 午夜激情福利司机影院| 老师上课跳d突然被开到最大视频| 成人永久免费在线观看视频| 国产 一区精品| 少妇裸体淫交视频免费看高清| 男插女下体视频免费在线播放| 日韩欧美国产在线观看| 三级男女做爰猛烈吃奶摸视频| 久久久成人免费电影| 我要看日韩黄色一级片| 在线看三级毛片| 国产伦一二天堂av在线观看| av国产免费在线观看| 欧美黑人巨大hd| 99热这里只有是精品50| 欧美一区二区精品小视频在线| 日韩强制内射视频| 国产69精品久久久久777片| 黄色配什么色好看| 精品人妻视频免费看| 久久6这里有精品| 国产精品久久久久久久久免| 在线观看免费视频日本深夜| 美女高潮喷水抽搐中文字幕| 日韩 亚洲 欧美在线| 波多野结衣巨乳人妻| 无遮挡黄片免费观看| 九九热线精品视视频播放| 狂野欧美白嫩少妇大欣赏| 国产成人一区二区在线| av国产免费在线观看| 亚洲五月天丁香| 久久久精品大字幕| 日本免费一区二区三区高清不卡| 日本免费a在线| 欧美国产日韩亚洲一区| 久久香蕉精品热| 深夜精品福利| 国产69精品久久久久777片| 亚洲性久久影院| 欧美日本亚洲视频在线播放| 国产极品精品免费视频能看的| 人妻久久中文字幕网| 欧美精品国产亚洲| 久久精品国产清高在天天线| 美女xxoo啪啪120秒动态图| 成年人黄色毛片网站| 国产在线精品亚洲第一网站| 天天一区二区日本电影三级| 欧美日韩瑟瑟在线播放| 久久人人精品亚洲av| 亚洲最大成人中文| 成人国产综合亚洲| 国产精品一区二区性色av| 日本与韩国留学比较| 国产91精品成人一区二区三区| 国模一区二区三区四区视频| 亚洲欧美精品综合久久99| 午夜日韩欧美国产| 亚洲第一区二区三区不卡| 九色成人免费人妻av| 无人区码免费观看不卡| 国产免费男女视频| 亚洲av.av天堂| 久久久久九九精品影院| 国产在线精品亚洲第一网站| 日韩欧美 国产精品| 在线观看一区二区三区| 亚洲va在线va天堂va国产| 亚洲在线自拍视频| 久久精品人妻少妇| а√天堂www在线а√下载| 蜜桃久久精品国产亚洲av| 我的老师免费观看完整版| 久久久久久久午夜电影| 精品99又大又爽又粗少妇毛片 | 美女高潮喷水抽搐中文字幕| 美女 人体艺术 gogo| 国产亚洲精品综合一区在线观看| av中文乱码字幕在线| 校园人妻丝袜中文字幕| 久久草成人影院| 国产探花极品一区二区| 热99在线观看视频| 欧美日韩乱码在线| 老司机福利观看| 国产黄片美女视频| 久久亚洲精品不卡| 精品人妻熟女av久视频| 中文资源天堂在线| 精品一区二区免费观看| 久久久久九九精品影院| 亚洲中文日韩欧美视频| 亚洲成人中文字幕在线播放| 午夜福利在线观看吧| 国产精品综合久久久久久久免费| 欧美性猛交╳xxx乱大交人| 久久精品国产鲁丝片午夜精品 | 午夜老司机福利剧场| 免费在线观看日本一区| 免费看a级黄色片| 色精品久久人妻99蜜桃| 日韩欧美在线二视频| 免费观看在线日韩| 丰满的人妻完整版| av天堂在线播放| 一级毛片久久久久久久久女| 夜夜夜夜夜久久久久| 中国美白少妇内射xxxbb| 深夜a级毛片| 亚洲欧美日韩高清专用| 天天一区二区日本电影三级| 免费不卡的大黄色大毛片视频在线观看 | 国产黄片美女视频| 麻豆国产97在线/欧美| 男人狂女人下面高潮的视频| 国产免费一级a男人的天堂| 天美传媒精品一区二区| 成人美女网站在线观看视频| 日韩中字成人| 午夜精品久久久久久毛片777| 人妻制服诱惑在线中文字幕| 99在线人妻在线中文字幕| 成人性生交大片免费视频hd| av在线蜜桃| 1024手机看黄色片| av在线蜜桃| 男人和女人高潮做爰伦理| 日韩中文字幕欧美一区二区| 搡老妇女老女人老熟妇| 嫩草影院入口| 亚洲经典国产精华液单| 日韩欧美精品免费久久| 波野结衣二区三区在线| 18禁裸乳无遮挡免费网站照片| 国产视频一区二区在线看| 最近中文字幕高清免费大全6 | 欧美精品国产亚洲| 啦啦啦韩国在线观看视频| 天堂√8在线中文| 黄色欧美视频在线观看| 波多野结衣高清作品| 观看免费一级毛片| 精品午夜福利在线看| 精品久久久久久久久久免费视频| 97超视频在线观看视频| 国产精品永久免费网站| 男女下面进入的视频免费午夜| 欧美另类亚洲清纯唯美| 人人妻,人人澡人人爽秒播| 免费在线观看成人毛片| 97碰自拍视频| 日本黄色片子视频| 欧美bdsm另类| 欧美日韩亚洲国产一区二区在线观看| 欧美日韩精品成人综合77777| 欧美成人免费av一区二区三区| 亚洲欧美日韩无卡精品| 成熟少妇高潮喷水视频| 成人国产麻豆网| 国产精品久久电影中文字幕| 99久久精品热视频| 亚洲人成网站高清观看| АⅤ资源中文在线天堂| 国产精品电影一区二区三区| 久久久久久国产a免费观看| 亚洲午夜理论影院| 舔av片在线| 日日摸夜夜添夜夜添av毛片 | 一级黄色大片毛片| 中国美女看黄片| 一个人看的www免费观看视频| 精品久久久久久久末码| av福利片在线观看| 男人和女人高潮做爰伦理| 久久久久久九九精品二区国产| 精品一区二区三区视频在线| 嫩草影视91久久| 午夜激情欧美在线| 日韩欧美精品v在线| 亚洲av不卡在线观看| 少妇人妻一区二区三区视频| 蜜桃亚洲精品一区二区三区| 国内揄拍国产精品人妻在线| 国产av一区在线观看免费| 亚洲av免费在线观看| 国产色爽女视频免费观看| 亚州av有码| 亚洲欧美日韩高清在线视频| 国产精品三级大全| 尾随美女入室| 欧美成人性av电影在线观看| 亚洲专区国产一区二区| 男人的好看免费观看在线视频| 日本-黄色视频高清免费观看| 一个人观看的视频www高清免费观看| av天堂中文字幕网| 久久国内精品自在自线图片| 91久久精品电影网| 日本黄色片子视频| 国产不卡一卡二| 内地一区二区视频在线| 色综合亚洲欧美另类图片| 国产大屁股一区二区在线视频| 免费不卡的大黄色大毛片视频在线观看 | 美女被艹到高潮喷水动态| 男女边吃奶边做爰视频| 国产精品不卡视频一区二区| av在线天堂中文字幕| 婷婷亚洲欧美| 日本一二三区视频观看| 成人高潮视频无遮挡免费网站| 99视频精品全部免费 在线| 国产精品国产三级国产av玫瑰| 蜜桃亚洲精品一区二区三区| 老熟妇仑乱视频hdxx| 色精品久久人妻99蜜桃| 欧美日韩国产亚洲二区| 哪里可以看免费的av片| 亚洲久久久久久中文字幕| 午夜影院日韩av| 给我免费播放毛片高清在线观看| 人妻制服诱惑在线中文字幕| 久久久久久大精品| 国产在线精品亚洲第一网站| 国产高清激情床上av| 啦啦啦啦在线视频资源| 色哟哟哟哟哟哟| 一区二区三区免费毛片| 国产成人一区二区在线| 国产成人福利小说| 直男gayav资源| 国内揄拍国产精品人妻在线| 欧美中文日本在线观看视频| 91久久精品电影网| 99久久精品国产国产毛片| 欧美日韩精品成人综合77777| 亚洲av不卡在线观看| 国产免费av片在线观看野外av| 久久国产精品人妻蜜桃| 九色成人免费人妻av| 日日摸夜夜添夜夜添av毛片 | 老熟妇乱子伦视频在线观看| 啪啪无遮挡十八禁网站| 国内精品美女久久久久久| 国产视频内射| 国产主播在线观看一区二区| av黄色大香蕉| АⅤ资源中文在线天堂| 免费看光身美女| 嫩草影院入口| 动漫黄色视频在线观看| 精品无人区乱码1区二区| 午夜a级毛片| 国产大屁股一区二区在线视频| 国产av不卡久久| 真实男女啪啪啪动态图| 免费不卡的大黄色大毛片视频在线观看 | 国产成人a区在线观看| 99在线人妻在线中文字幕| netflix在线观看网站| 成人午夜高清在线视频| 亚洲中文字幕一区二区三区有码在线看| 午夜激情福利司机影院| 国产一区二区在线观看日韩| 精品人妻一区二区三区麻豆 | 精品久久久久久久久av| 国产精品99久久久久久久久| 色精品久久人妻99蜜桃| 12—13女人毛片做爰片一| 免费看av在线观看网站| 国产伦精品一区二区三区视频9| 国产色婷婷99| 国产一区二区三区在线臀色熟女| 国产黄片美女视频| 亚洲人与动物交配视频| 欧美日韩精品成人综合77777| 国产色爽女视频免费观看| 极品教师在线免费播放| 国产老妇女一区| 成年人黄色毛片网站| 一区二区三区高清视频在线| 国产麻豆成人av免费视频| 人人妻人人看人人澡| 亚洲一区二区三区色噜噜| 性插视频无遮挡在线免费观看| 成人永久免费在线观看视频| 亚洲av一区综合| 亚洲国产日韩欧美精品在线观看| 国产精品一区二区免费欧美| 免费电影在线观看免费观看| 内地一区二区视频在线| 欧美+亚洲+日韩+国产| 亚洲成人久久爱视频| 免费在线观看影片大全网站| 成年人黄色毛片网站| 国产一区二区三区视频了| 精品欧美国产一区二区三| 我的老师免费观看完整版| 国产精品嫩草影院av在线观看 | 熟女电影av网| 男人的好看免费观看在线视频| 亚洲第一区二区三区不卡| 久久午夜亚洲精品久久| av在线蜜桃| 亚洲人与动物交配视频| 2021天堂中文幕一二区在线观| 国产亚洲欧美98| 大型黄色视频在线免费观看| 国产中年淑女户外野战色| 欧美+亚洲+日韩+国产| 久99久视频精品免费| 亚洲精品日韩av片在线观看| 国产色爽女视频免费观看| 99九九线精品视频在线观看视频| 国产精品亚洲一级av第二区| 国产日本99.免费观看| 亚洲av.av天堂| 中文资源天堂在线| 男插女下体视频免费在线播放| 国产真实伦视频高清在线观看 | 国产精品爽爽va在线观看网站| 亚洲精品一卡2卡三卡4卡5卡| 午夜激情福利司机影院| 国内揄拍国产精品人妻在线| 麻豆一二三区av精品| 最近最新免费中文字幕在线| 国内少妇人妻偷人精品xxx网站| 特大巨黑吊av在线直播| 亚洲自偷自拍三级| 婷婷亚洲欧美| 狂野欧美白嫩少妇大欣赏| 久久99热这里只有精品18| 久久久久免费精品人妻一区二区| 色精品久久人妻99蜜桃| 男女啪啪激烈高潮av片| 久久久久久久久久久丰满 | 亚洲在线观看片| 欧美成人性av电影在线观看| 国产高清视频在线播放一区| 色av中文字幕| 久久久成人免费电影| 真实男女啪啪啪动态图| 久久久久久国产a免费观看| 免费看av在线观看网站| 无遮挡黄片免费观看| 欧美另类亚洲清纯唯美| 久久中文看片网| 人妻丰满熟妇av一区二区三区| 国产精品日韩av在线免费观看| netflix在线观看网站| 观看美女的网站| 亚洲va日本ⅴa欧美va伊人久久| 亚洲aⅴ乱码一区二区在线播放| 熟女电影av网| 国产精品嫩草影院av在线观看 | 老司机深夜福利视频在线观看| 99久久久亚洲精品蜜臀av| 麻豆国产av国片精品| 日韩一本色道免费dvd| 国产美女午夜福利| 波多野结衣高清无吗| 人妻久久中文字幕网| 久久婷婷人人爽人人干人人爱| 中文字幕人妻熟人妻熟丝袜美| 搡女人真爽免费视频火全软件 | 久久久久久久久大av| 免费大片18禁| 欧美日韩综合久久久久久 | 国产精品久久电影中文字幕| 国产精品免费一区二区三区在线| 大又大粗又爽又黄少妇毛片口| 变态另类丝袜制服|