• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Using Event-Based Method to Estimate Cybersecurity Equilibrium

    2021-04-22 03:53:58ZhaofengLiuRenZhengWenlianLuandShouhuaiXu
    IEEE/CAA Journal of Automatica Sinica 2021年2期

    Zhaofeng Liu, Ren Zheng, Wenlian Lu, and Shouhuai Xu

    Abstract—Estimating the global state of a networked system is an important problem in many application domains. The classical approach to tackling this problem is the periodic (observation)method, which is inefficient because it often observes states at a very high frequency. This inefficiency has motivated the idea of event-based method, which leverages the evolution dynamics in question and makes observations only when some rules are triggered (i.e., only when certain conditions hold). This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity, where equilibrium is an important metric that has no closed-form solutions. More specifically, the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics, which has been proven globally convergent. The presented study proves that the estimated equilibrium from our trigger rule i) indeed converges to the equilibrium of the dynamics and ii) is Zeno-free,which assures the usefulness of the event-based method.Numerical examples show that the event-based method can reduce 98% of the observation cost incurred by the periodic method. In order to use the event-based method in practice, this paper investigates how to bridge the gap between i) the continuous state in the dynamics model, which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state, and ii) the discrete state that is often encountered in practice, dubbed sample-state because it is sampled from some nodes. This bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems.

    I. INTRODUCTION

    ESTIMATING the global state of a networked system at any point in time is of fundamental importance in many application domains. This is because the real-time global state allows an engine (or administrator) to make prompt decisions.The classical approach to obtaining the global state of a networked system is the periodic method, which observes the state of every node in the networked system at every point in time (at an appropriate time resolution). Fig.1 illustrates a networked system of n nodes and a time interval [t1,tm] at a certain time resolution. In order to estimate the global state of the networked system at time t1,...,tm, the periodic method requires the observation of every node’s state at every point in time, leading to nm observations (or operations) in total.

    Fig.1. Illustration of the advantage of the event-based method over the classical periodic (observation) method. The latter observes the state of every node at every point in time t1,...,tm (i.e., incurring nm observation events in total). The former only observes the state of some nodes at some points in time, which are highlighted with filled circles, meaning that the former incurs a much smaller (than nm) number of observations.

    The nm complexity mentioned above has motivated the event-based method [1], [2]. The key idea underlying this method is to leverage the state evolution dynamics. As illustrated in Fig.1, this method only observes the state of some nodes at some points in time, effectively achieving“observation on demand” and incurring a much smaller number (than nm) of observations. While intuitive, the eventbased method is not always effective because it may fall victim to the so-called Zeno behavior [3], which renders it useless by incurring infinitely many observations within a finite period of time. Therefore, an event-based method must be proven Zeno-free.

    A. Our Contributions

    This paper initiates the investigation of adapting the eventbased method to the cybersecurity domain. In this domain, the global cybersecurity state of a network is a basic input for making effective, if not optimal, cyber defense decisions, such as whether to impose new cybersecurity restrictions or not.The paper investigates how to estimate the cybersecurity equilibrium in the context of preventive and reactive cyber defense dynamics, which is a particular kind of cybersecurity dynamics (and will be reviewed later). The dynamics have been proven globally convergent in the entire parameter universe (i.e., the dynamics always converge to a unique equilibrium for any possible initial state) [4]. Despite this exciting progress, one important problem is left unaddressed:How to estimate the equilibrium efficiently without knowing the value of every model parameter? Since the periodic observation method is inefficient (especially for large networks), the presented paper proposes adapting the eventbased method to estimate the cybersecurity equilibrium in the preventive and reactive cyber defense dynamics.

    Specifically, this paper proposes an active event-based method for estimating the cybersecurity equilibrium and proves that the method is Zeno-free (i.e., it does not fall victim to the Zeno behavior). Numerical examples show that our eventbased method can reduce 98% of the observation cost when compared with the periodic method. In order to show how to use this event-based method in practice, we investigate how to bridge the gap between i) the continuous state in the dynamics model, which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state, and ii) the discrete state that is often encountered in practice, dubbed sample-state because it is sampled from some nodes at some points in time. This bridge may be of independent value because probability-state models have been widely used to approximate discrete state systems with exponentially-many discrete states (incurred by a state-space explosion [5], [6]).

    B. Related Work

    The event-based method has been investigated in many application settings other than cybersecurity, such as sampling for stochastic systems [7], stabilizing control [8], self-triggered control [9], and set-membership filtering (SMF) [10]. A core research problem is to show that the method does not fall victim to the Zeno behavior (see, for example, [8], [11]–[19]),which can render the event-based method useless by imposing infinitely many observation events within a finite period of time and can prevent the estimated dynamics from converging [3].

    To the best of the authors’ knowledge, the presented study is the first to introduce the idea of event-based sampling into the cybersecurity domain. This is made possible by a recent breakthrough showing that a certain class of cybersecurity dynamics is globally convergent in the entire parameter universe [4], a characterization that was not proven until 10 years after the model was first introduced in [20]. The notion of cybersecurity dynamics [5], [6] was introduced to model and analyze cybersecurity from a whole-network perspective.This notion, as discussed in [5], [6], has roots in earlier studies in biological epidemiology (e.g., [21]–[25]) and its variants in cyber epidemiology (e.g., [26]–[36]), interacting particle systems [37], and microfoundation in economics [38]. This notion has opened the door to a new research field with many results (e.g., [39]–[50]).

    However, the previous studies leave one important question unaddressed: How can one quantify the equilibrium in the real-world when the values of some model parameters are not known? This paper will fill the lacuna by showing that the event-based method can be naturally adapted to tackle this problem in the context of preventive and reactive cyber defense dynamics, which is globally convergent in the entire parameter universe [4]. Special cases of this dynamic are(partially) characterized in previous studies such as [33]–[36],[48], which mostly focus on the epidemic threshold, namely a condition under which the dynamics will converge to the equilibrium zero (i.e., a special equilibrium that does not need to be estimated). In the cybersecurity domain, the notion of epidemic threshold is less relevant because the dynamics rarely “die out”, which is inherent to the nature of the dynamics (e.g., computers can become compromised by means other than infection, contrary to biological dynamics).

    The estimation of equilibrium has been explored in a smaller parameter regime [48], within which the dynamics were known to be convergent while certain parameters were specified (i.e., the structure of the global attack-defense graph,which will be elaborated later). In contrast, the presented paper investigates how to estimate the cybersecurity equilibrium in the entire parameter universe, making results applicable to broader scenarios. This is made possible by the theoretical result that the dynamics are globally convergent in the entire parameter universe [4].

    It is worth mentioning that the preventive and reactive cyber defense dynamics are particular kinds of cybersecurity dynamics for quantifying cybersecurity from a holistic perspective [51]–[55]. There are other kinds of cybersecurity dynamics, which aim to accommodate adaptive defenses [45],active defenses [56]–[58], and proactive defenses [43].Adapting the event-based method to these kinds of dynamics is an important open problem for future research.

    C. Paper Outline

    In Section II, the paper briefly reviews the preventive and reactive cyber defense dynamics model and its global convergence in the entire parameter universe [4]. In Section III, an event-based method for estimating the equilibrium is presented. Section IV involves a discussion on how to apply this event-based method in practice by bridging the gap between the probability-state in the theoretical model and the sample-state in practice. Section V concludes the paper with open problems and further research topics.

    II. PROBLEM STATEMENT

    A. Review of Preventive and Reactive Defense Dynamics

    The idea of a preventive and reactive cyber defense dynamics model was first introduced in [20] and partially analyzed in [48], while noting that its special cases were studied earlier in [33]–[35]. However, all these studies only contribute a partial understanding of the dynamics corresponding to a special parameter regime rather than the entire parameter universe. Very recently, it is proven that these dynamics are globally convergent in the entire parameter universe, meaning that there is always a unique equilibrium[4], whose exact value (or position) depends on the parameter values rather than the initial state of the dynamics.

    In the dynamics model, the defender employs two classes of defenses:

    1) Preventive Defenses: These correspond to the use of intrusion prevention tools to block cyber attacks before they reach a target or before they can cause any damage.

    2) Reactive Defenses: These correspond to the use of antimalware tools to detect compromised computers and then clean them up.

    On the other hand, the attacker wages two kinds of attacks:

    1) Push-based Attacks: These correspond to the use of computer malware to spread across the network.

    2) Pull-based Attacks: These correspond to the use of compromised or malicious websites to attack browsers when vulnerable browsers visit those malicious websites.

    The model abstracts the attack-defense interaction taking place over an attack-defense graph structure G=(V,E), where V is the vertex set representing computers and (u,v)∈E means computer u can wage push-based attacks against computer v directly (i.e., the communication from u to v is allowed by the security policy). This means that G is, in general, different from the underlying physical network structure because(u,v)∈E may represents a variety of communication paths(rather than a single physical link), and that G can be derived from the security policy of a networked system and the physical network in question. The presented study does not make any restrictions on the structure of G; for example, G may be directed or undirected. Let A=[avu]n×ndenote the adjacency matrix of G, where avu=1 if and only if (u,v)∈E.Since the model aims to describe the attacks between computers, we set avv=0. Let deg(v) be the degree of node v ∈V when G is undirected or the in-degree of v when G is directed,where deg(v)=|Nv| with Nv={u ∈V: (u,v)∈E}.

    The dynamics can equally be described with either a continuous-time model or a discrete-time model [4]. The presented paper focuses on the continuous-time model. At any point in time, a node v ∈V is in one of two states: “0” means secure but vulnerable, whereas “1” means compromised. Let sv(t) denote the probability that v is secure at time t and iv(t)denote the probability that v is compromised at time t. Note that sv(t)+iv(t)=1 for v ∈V and for t ≥0; thus, these terms interchangeably describe the probability-state of a given computer.

    Fig.2 describes the state-transition diagram for a node v ∈V at time t, where θv,1→0(t) abstracts the effectiveness of the reactive defenses and θv,0→1(t) abstracts the capability of attacks against the preventive defenses. Let β ∈(0,1] be the probability that a compromised computer changes to the secure state because the attacks are detected and mitigated up by the reactive defenses. Then, θv,1→0(t)=β. On the other hand, θv,0→1(t) is more inclusive because it accommodates both push-based and pull-based attacks. In order to model the power of pull-based attacks against the preventive defenses,let α ∈[0,1] denote the probability that a secure computer becomes compromised despite the presence of the preventive defenses (i.e., the preventive defenses are penetrated by the pull-based attacks). In order to model the power of push-based attacks against the preventive defenses, let γ ∈(0,1] denote the probability that a compromised computer u wages a successful attack against a secure computer v despite the preventive defenses (i.e., the preventive defenses are penetrated by push-based attacks), where (u,v)∈E. Under the assumption that the attacks are waged independently of each other, it holds that

    Fig.2. The state-transition diagram of any v ∈V that leads to a nonlinear Dynamical System with the nonlinear term θv,0→1(t), as shown in (1).

    The preceding discussion leads to the following continuoustime nonlinear dynamical system for v ∈V:

    The dynamics can be rewritten as a system of n nonlinear equations for v ∈V

    The global convergence of system (2) presented in [4] can be summarized as follows:

    1) If the attacker wages both push-based and pull-based attacks (i.e., α>0), system (2) is globally convergent in the entire parameter universe and the dynamics converge to a unique nonzero equilibrium exponentially.

    2) If the attacker only wages push-based attacks (i.e.,α=0), system (2) is still globally convergent in the parameter universe but the convergence speed depends on the model parameters and the largest eigenvalue λA,1of adjacency matrix A is as follows:

    a) If λA,1<β/γ, the dynamics converge to equilibrium 0 exponentially (see also [35], [48]).

    b) If λA,1=β/γ, the dynamics converge to equilibrium 0 polynomially.

    c) If λA,1>β/γ, the dynamics converge to a unique nonzero equilibrium exponentially.

    This leads to:

    Lemma 1 [4]: System (2) converges exponentially when α>0 and when α=0 and λA,1≠β/γ.

    It is worth mentioning that the results also hold for the more general setting with node-dependent parameters αvand βvand e dge-dependent parameter γuv[4].

    B. Problem Statement: Estimating Cybersecurity Equilibrium

    Even though system (2) has been proven globally convergent in the entire parameter universe, there is no analytic result on the value of the equilibrium, which remains a hard

    TABLE I NOTATIONS USED THROUGHOUT THE PAPER

    problem (except for special cases, such as the aforementioned equilibrium 0). As discussed previously, the periodic method may be used to estimate the equilibrium, but in many cases,this is too costly. This observation reiterates the purpose of this paper, which is to investigate the use of an event-based method as an alternative. This paper focuses on estimating the equilibrium in the parameter regime where System (2)converges exponentially, namely when α>0 (i.e., there are pull-based attacks) or when α=0 (i.e., there are no pull-based attacks) but λA,1≠β/γ, as shown in Lemma 1. The paper leaves it to future works to address the special parameter regime α=0 and λA,1=β/γ, where the dynamics converge polynomially; as the techniques used in the presented paper are applicable to exponential convergence but not polynomial convergence.

    C. Notations

    III. AN EVENT-BASED METHOD

    In this section, the paper proposes an event-based method for estimating the cybersecurity equilibrium of system (2) and analyzes its properties, including Zeno-freeness. Then, the method is adapted to accommodate the practical case where state observations are not conducted arbitrarily but conducted at predetermined points in time.

    A. Designing Event-based Trigger Rule

    Fig.7. Correlation between the false-negative rate in the sample-state observation and the bias of the equilibrium estimation.

    V. CONCLUSION

    This paper has shown how to use the event-based method to estimate the equilibrium of preventive and reactive cyber defense dynamics. Numerical examples confirmed that the event-based method can estimate the equilibrium while reducing 98% of the state observation cost incurred by the periodic method. The paper also spots an empirical phenomenon that the slower the convergence of the dynamics, the more observation cost is saved by the event-based method.Moreover, the presented study probed into the practical use of the event-based method, by bridging the gap between the probability-state in the theoretical model and the sample-state in practice, which may be of independent value.

    There are many open problems for future research, such as:What is the lower-bound observation cost of an event-based method? Do there exist better, or even optimal, forms of event-based methods? How can the aforementioned empirical phenomenon (that the slower the convergence, the more observation cost is saved) be rigorously proven (or disproven)? Can other models cope with the case of polynomial convergence speed of a system (2)? Can other models handle situations where the observation errors are indeterminate (e.g.,when only the upper or lower bound of the false negative rate are known)? Can the presented method be applied to other dynamics under different event-trigger scenarios? Can other event-based methods be designed for cybersecurity dynamics models [41], [44], [47] that do not make the current assumption of dynamics independence?

    ACKNOwLEDGMENT

    We thank Zongzong Lin for his constructive advice on improving the proof of this paper. We thank Eric Ficke and Yihan Xu for proofreading the paper.

    亚洲狠狠婷婷综合久久图片| 久久中文看片网| 亚洲成人国产一区在线观看| 国产成人精品久久二区二区91| 91国产中文字幕| 欧美日韩亚洲国产一区二区在线观看| 黄片播放在线免费| 午夜激情av网站| 男人舔女人的私密视频| 19禁男女啪啪无遮挡网站| 18美女黄网站色大片免费观看| 性欧美人与动物交配| 欧美最黄视频在线播放免费 | 1024香蕉在线观看| 在线看a的网站| 国产成人一区二区三区免费视频网站| 精品国内亚洲2022精品成人| 日本黄色视频三级网站网址| 亚洲精品一二三| 高清黄色对白视频在线免费看| 精品一区二区三区四区五区乱码| 日韩欧美在线二视频| 国产亚洲精品一区二区www| 777久久人妻少妇嫩草av网站| av天堂在线播放| 一二三四社区在线视频社区8| 国产一区二区在线av高清观看| 这个男人来自地球电影免费观看| 在线播放国产精品三级| 九色亚洲精品在线播放| 亚洲片人在线观看| a级毛片在线看网站| 亚洲成国产人片在线观看| 国产精品野战在线观看 | 成人黄色视频免费在线看| 久久久久精品国产欧美久久久| 午夜日韩欧美国产| 久久久久久免费高清国产稀缺| 日韩欧美一区视频在线观看| 大型av网站在线播放| 亚洲免费av在线视频| 两个人看的免费小视频| 中文亚洲av片在线观看爽| 啦啦啦免费观看视频1| 99国产综合亚洲精品| 在线观看免费午夜福利视频| 天堂影院成人在线观看| 亚洲中文字幕日韩| 亚洲久久久国产精品| www.www免费av| 欧美日韩亚洲国产一区二区在线观看| 亚洲一区中文字幕在线| 一区福利在线观看| 国产精品久久久久久人妻精品电影| 丝袜人妻中文字幕| 在线播放国产精品三级| 亚洲国产精品合色在线| av中文乱码字幕在线| 亚洲精品国产精品久久久不卡| 久久九九热精品免费| 夜夜爽天天搞| 成熟少妇高潮喷水视频| 水蜜桃什么品种好| 精品国产美女av久久久久小说| 男女下面插进去视频免费观看| 女人被狂操c到高潮| 久久久久久久久中文| 亚洲国产欧美日韩在线播放| 国产亚洲欧美在线一区二区| aaaaa片日本免费| 久久国产亚洲av麻豆专区| 丰满饥渴人妻一区二区三| 在线永久观看黄色视频| 国产成人影院久久av| 国产片内射在线| 97人妻天天添夜夜摸| 国产一区在线观看成人免费| 母亲3免费完整高清在线观看| 大码成人一级视频| 亚洲精品一卡2卡三卡4卡5卡| 国产又色又爽无遮挡免费看| 欧美在线一区亚洲| 天堂影院成人在线观看| 免费在线观看影片大全网站| 国产精品九九99| 久久久国产成人免费| 高潮久久久久久久久久久不卡| 激情视频va一区二区三区| 亚洲精品一二三| 丝袜人妻中文字幕| 窝窝影院91人妻| 国产精品综合久久久久久久免费 | 亚洲欧美精品综合久久99| 香蕉久久夜色| 久久人人精品亚洲av| 淫秽高清视频在线观看| 国产精品亚洲av一区麻豆| 亚洲欧美一区二区三区久久| 99久久人妻综合| 露出奶头的视频| 国产熟女午夜一区二区三区| 久久伊人香网站| 成人精品一区二区免费| 欧洲精品卡2卡3卡4卡5卡区| 最近最新中文字幕大全电影3 | 亚洲人成77777在线视频| 国产成人精品久久二区二区91| 一区在线观看完整版| 欧美一级毛片孕妇| 亚洲色图综合在线观看| 香蕉久久夜色| 亚洲精品国产区一区二| 欧美av亚洲av综合av国产av| 欧美黑人欧美精品刺激| 久久人妻熟女aⅴ| 制服诱惑二区| 亚洲欧美精品综合久久99| 啦啦啦在线免费观看视频4| 97人妻天天添夜夜摸| 久久久国产欧美日韩av| 免费高清视频大片| 国产成人精品久久二区二区91| 很黄的视频免费| 国产精品电影一区二区三区| 日本黄色视频三级网站网址| 男女做爰动态图高潮gif福利片 | 在线观看免费视频日本深夜| 国产精品影院久久| a级片在线免费高清观看视频| 黑丝袜美女国产一区| 青草久久国产| 国产精品秋霞免费鲁丝片| 亚洲精品国产一区二区精华液| 日日摸夜夜添夜夜添小说| 一级a爱视频在线免费观看| 男人舔女人的私密视频| 国产欧美日韩一区二区三| 亚洲九九香蕉| 午夜精品久久久久久毛片777| 欧洲精品卡2卡3卡4卡5卡区| 不卡av一区二区三区| 悠悠久久av| 午夜福利欧美成人| 深夜精品福利| 精品欧美一区二区三区在线| 精品国内亚洲2022精品成人| av电影中文网址| 亚洲熟女毛片儿| 在线观看一区二区三区| 18禁美女被吸乳视频| 国产麻豆69| 夜夜躁狠狠躁天天躁| 美女福利国产在线| 高潮久久久久久久久久久不卡| 免费日韩欧美在线观看| 国产深夜福利视频在线观看| 婷婷六月久久综合丁香| 日韩欧美免费精品| 久久久国产成人免费| 国产激情久久老熟女| 精品卡一卡二卡四卡免费| 精品少妇一区二区三区视频日本电影| 午夜免费成人在线视频| 免费av毛片视频| 91av网站免费观看| 久久久国产成人免费| √禁漫天堂资源中文www| 一本综合久久免费| 亚洲专区中文字幕在线| 男女下面进入的视频免费午夜 | 少妇被粗大的猛进出69影院| 日本黄色日本黄色录像| 久久99一区二区三区| 中文字幕人妻熟女乱码| 久久草成人影院| 脱女人内裤的视频| 手机成人av网站| 精品人妻1区二区| 天堂√8在线中文| 最近最新免费中文字幕在线| 99久久精品国产亚洲精品| 黑人欧美特级aaaaaa片| 成年版毛片免费区| 女人高潮潮喷娇喘18禁视频| 国产精品免费一区二区三区在线| 午夜精品久久久久久毛片777| 亚洲国产欧美网| 无遮挡黄片免费观看| 69av精品久久久久久| 黑人欧美特级aaaaaa片| 日韩成人在线观看一区二区三区| 高清毛片免费观看视频网站 | 18禁国产床啪视频网站| 99在线视频只有这里精品首页| 在线观看免费高清a一片| 国产精品久久久av美女十八| 欧美成狂野欧美在线观看| 在线观看免费高清a一片| 波多野结衣av一区二区av| 人成视频在线观看免费观看| 高潮久久久久久久久久久不卡| 亚洲专区中文字幕在线| 中亚洲国语对白在线视频| 黄片播放在线免费| 大陆偷拍与自拍| 国产色视频综合| 日日摸夜夜添夜夜添小说| 国产三级在线视频| 18美女黄网站色大片免费观看| 国产高清国产精品国产三级| 亚洲av成人不卡在线观看播放网| 视频在线观看一区二区三区| 国产1区2区3区精品| 亚洲少妇的诱惑av| 亚洲黑人精品在线| 看片在线看免费视频| 午夜影院日韩av| www.www免费av| 一级毛片精品| 国产精品久久久av美女十八| a在线观看视频网站| 久久久久久久久中文| 日韩 欧美 亚洲 中文字幕| 香蕉国产在线看| 国产成人精品久久二区二区免费| 亚洲精品一二三| 一进一出抽搐动态| 超碰成人久久| 久久精品国产清高在天天线| 老司机午夜福利在线观看视频| 欧美不卡视频在线免费观看 | 欧美最黄视频在线播放免费 | 操出白浆在线播放| 黄色成人免费大全| 久久久精品欧美日韩精品| 高清av免费在线| 天堂俺去俺来也www色官网| 黑丝袜美女国产一区| 亚洲欧洲精品一区二区精品久久久| 日本免费一区二区三区高清不卡 | 国产精品亚洲av一区麻豆| 变态另类成人亚洲欧美熟女 | 在线观看日韩欧美| 日韩精品中文字幕看吧| av在线播放免费不卡| 国产有黄有色有爽视频| 欧美乱妇无乱码| 美女扒开内裤让男人捅视频| www.熟女人妻精品国产| 久久久久国产精品人妻aⅴ院| www.自偷自拍.com| 色婷婷久久久亚洲欧美| 国产免费男女视频| 色在线成人网| 欧美激情高清一区二区三区| 日本vs欧美在线观看视频| 亚洲国产欧美网| 老熟妇仑乱视频hdxx| 免费高清视频大片| 99在线视频只有这里精品首页| 国产成人av激情在线播放| 日本黄色视频三级网站网址| 国产精品免费一区二区三区在线| 超色免费av| 国产av一区在线观看免费| 国产乱人伦免费视频| av视频免费观看在线观看| 99精品久久久久人妻精品| 亚洲国产精品合色在线| 19禁男女啪啪无遮挡网站| 欧洲精品卡2卡3卡4卡5卡区| 91成人精品电影| 在线观看午夜福利视频| 老司机深夜福利视频在线观看| 深夜精品福利| 国产亚洲欧美精品永久| 亚洲精品在线观看二区| a在线观看视频网站| 国产精品久久久久成人av| av视频免费观看在线观看| 国产精品秋霞免费鲁丝片| 在线观看免费视频日本深夜| 久久久国产精品麻豆| 成人影院久久| 国产亚洲精品第一综合不卡| 视频区图区小说| 又紧又爽又黄一区二区| 久久中文字幕人妻熟女| 在线观看免费高清a一片| 欧美一区二区精品小视频在线| av有码第一页| 久9热在线精品视频| 真人做人爱边吃奶动态| 亚洲欧美日韩另类电影网站| 午夜福利欧美成人| 亚洲欧美一区二区三区黑人| 亚洲第一欧美日韩一区二区三区| 成年版毛片免费区| 久久精品aⅴ一区二区三区四区| 亚洲精华国产精华精| 久久热在线av| 国产99白浆流出| 国产一区二区在线av高清观看| 国产精品美女特级片免费视频播放器 | 精品午夜福利视频在线观看一区| 欧美日韩国产mv在线观看视频| www.自偷自拍.com| 亚洲av电影在线进入| 亚洲欧美精品综合久久99| 亚洲一区二区三区色噜噜 | 色婷婷av一区二区三区视频| 午夜视频精品福利| 99国产精品一区二区蜜桃av| 欧美人与性动交α欧美软件| 国产精品爽爽va在线观看网站 | 欧美在线一区亚洲| 一本大道久久a久久精品| 在线天堂中文资源库| 国产精品 欧美亚洲| 波多野结衣av一区二区av| 午夜精品久久久久久毛片777| 国产视频一区二区在线看| 国产精品自产拍在线观看55亚洲| 搡老乐熟女国产| 久久国产乱子伦精品免费另类| 99热国产这里只有精品6| 成人特级黄色片久久久久久久| 亚洲av第一区精品v没综合| 久久久久久久久中文| 国产成年人精品一区二区 | 免费在线观看完整版高清| 老司机午夜福利在线观看视频| 午夜精品国产一区二区电影| 男人操女人黄网站| 天堂俺去俺来也www色官网| 老鸭窝网址在线观看| 美女国产高潮福利片在线看| 性色av乱码一区二区三区2| 久久 成人 亚洲| 岛国视频午夜一区免费看| 老司机午夜福利在线观看视频| 一区二区三区激情视频| 日韩大码丰满熟妇| 亚洲欧美一区二区三区久久| 1024香蕉在线观看| 欧美日韩亚洲国产一区二区在线观看| 精品一区二区三卡| 亚洲第一欧美日韩一区二区三区| 欧美日本亚洲视频在线播放| 亚洲成a人片在线一区二区| 免费在线观看影片大全网站| 国产熟女午夜一区二区三区| 亚洲精品国产区一区二| 两性夫妻黄色片| 国产视频一区二区在线看| 男女下面插进去视频免费观看| 91在线观看av| 亚洲中文av在线| 亚洲在线自拍视频| av视频免费观看在线观看| 亚洲第一欧美日韩一区二区三区| 亚洲第一av免费看| 久久草成人影院| 日本五十路高清| 人人妻人人澡人人看| 精品少妇一区二区三区视频日本电影| 亚洲国产欧美一区二区综合| 精品福利观看| 在线看a的网站| 午夜福利影视在线免费观看| 丝袜美腿诱惑在线| 精品国产国语对白av| 亚洲av日韩精品久久久久久密| 9色porny在线观看| 日韩欧美三级三区| 黄色怎么调成土黄色| 午夜福利一区二区在线看| 91麻豆av在线| 亚洲国产精品sss在线观看 | 老熟妇仑乱视频hdxx| 久久九九热精品免费| 激情视频va一区二区三区| 中亚洲国语对白在线视频| 久久精品亚洲精品国产色婷小说| 久久人妻福利社区极品人妻图片| 国产熟女xx| 俄罗斯特黄特色一大片| 美国免费a级毛片| 国产亚洲欧美在线一区二区| 99久久99久久久精品蜜桃| 99在线人妻在线中文字幕| 91大片在线观看| 在线永久观看黄色视频| 国产高清国产精品国产三级| 男人舔女人下体高潮全视频| 水蜜桃什么品种好| 日本欧美视频一区| 久久久久久久久久久久大奶| 久久人妻av系列| 国产深夜福利视频在线观看| 夜夜爽天天搞| 91精品国产国语对白视频| 巨乳人妻的诱惑在线观看| 男人的好看免费观看在线视频 | 精品少妇一区二区三区视频日本电影| 啦啦啦 在线观看视频| 久久久国产一区二区| 亚洲成人久久性| 日韩av在线大香蕉| 黑人猛操日本美女一级片| 黑人巨大精品欧美一区二区蜜桃| 国产精品久久久久久人妻精品电影| 亚洲精品av麻豆狂野| 久久狼人影院| 一级作爱视频免费观看| 亚洲午夜理论影院| 亚洲久久久国产精品| 精品欧美一区二区三区在线| 精品一区二区三卡| 国产av一区在线观看免费| av视频免费观看在线观看| 国产精品 欧美亚洲| 亚洲片人在线观看| www.熟女人妻精品国产| 99精品欧美一区二区三区四区| 亚洲情色 制服丝袜| 国产真人三级小视频在线观看| 国产成人欧美在线观看| 国产高清激情床上av| 黑人猛操日本美女一级片| 亚洲激情在线av| 欧美中文综合在线视频| 久久精品国产清高在天天线| 老司机午夜福利在线观看视频| 国产一区二区三区视频了| 国产有黄有色有爽视频| 亚洲在线自拍视频| 欧美日本亚洲视频在线播放| 一边摸一边抽搐一进一小说| 免费一级毛片在线播放高清视频 | 欧美日韩亚洲综合一区二区三区_| 精品久久久久久成人av| 国产av一区二区精品久久| 丰满人妻熟妇乱又伦精品不卡| 在线观看一区二区三区激情| 国产单亲对白刺激| 美女大奶头视频| 亚洲第一欧美日韩一区二区三区| 久久精品aⅴ一区二区三区四区| 欧美中文日本在线观看视频| 久久国产精品男人的天堂亚洲| 大码成人一级视频| 国产高清激情床上av| 欧美大码av| 国产蜜桃级精品一区二区三区| 在线播放国产精品三级| 国产欧美日韩精品亚洲av| 亚洲色图综合在线观看| av在线天堂中文字幕 | 91精品三级在线观看| av国产精品久久久久影院| 亚洲av成人av| 亚洲av片天天在线观看| 国产成人精品久久二区二区91| 岛国在线观看网站| 国产精品久久久久久人妻精品电影| 精品少妇一区二区三区视频日本电影| 成年人黄色毛片网站| 国产高清视频在线播放一区| 午夜老司机福利片| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品永久免费网站| 黄片小视频在线播放| 免费在线观看日本一区| 久久久国产精品麻豆| 女人爽到高潮嗷嗷叫在线视频| 高清黄色对白视频在线免费看| 久久久久国产精品人妻aⅴ院| 国产精品 国内视频| 夜夜看夜夜爽夜夜摸 | 一区二区三区国产精品乱码| 欧美日韩亚洲综合一区二区三区_| а√天堂www在线а√下载| 亚洲欧美一区二区三区久久| 亚洲国产精品一区二区三区在线| 侵犯人妻中文字幕一二三四区| 亚洲五月天丁香| 亚洲中文字幕日韩| 日本wwww免费看| 欧美av亚洲av综合av国产av| 国产精品一区二区在线不卡| 国产又色又爽无遮挡免费看| 欧美成人免费av一区二区三区| 自线自在国产av| 真人一进一出gif抽搐免费| 成人精品一区二区免费| 另类亚洲欧美激情| 老司机福利观看| 国产精品综合久久久久久久免费 | 亚洲久久久国产精品| 免费av中文字幕在线| av中文乱码字幕在线| 欧美成人性av电影在线观看| 中文字幕av电影在线播放| 亚洲第一青青草原| 午夜老司机福利片| 国产精品亚洲一级av第二区| 美女大奶头视频| 国产欧美日韩综合在线一区二区| 久久精品91蜜桃| 久久精品91无色码中文字幕| 欧美 亚洲 国产 日韩一| 1024香蕉在线观看| 欧美黄色淫秽网站| 欧美成人午夜精品| 国产精品自产拍在线观看55亚洲| 看免费av毛片| 一进一出好大好爽视频| 免费久久久久久久精品成人欧美视频| 国产男靠女视频免费网站| 国产国语露脸激情在线看| 中文亚洲av片在线观看爽| 久久久水蜜桃国产精品网| av天堂久久9| 美女高潮喷水抽搐中文字幕| 91九色精品人成在线观看| 欧美在线一区亚洲| 老汉色∧v一级毛片| 夜夜夜夜夜久久久久| 男女做爰动态图高潮gif福利片 | 9191精品国产免费久久| 久久99一区二区三区| 亚洲精品在线美女| 免费不卡黄色视频| 91麻豆精品激情在线观看国产 | 亚洲一码二码三码区别大吗| 777久久人妻少妇嫩草av网站| tocl精华| 久久国产乱子伦精品免费另类| 高清在线国产一区| 一个人免费在线观看的高清视频| 不卡av一区二区三区| 久久午夜亚洲精品久久| 久久久久亚洲av毛片大全| 国产激情久久老熟女| 日本黄色日本黄色录像| 又黄又粗又硬又大视频| 国产成人精品久久二区二区91| 女性被躁到高潮视频| 亚洲av第一区精品v没综合| 亚洲av成人一区二区三| 日韩三级视频一区二区三区| 国产精品一区二区免费欧美| 他把我摸到了高潮在线观看| 久久久久国产一级毛片高清牌| 日韩免费av在线播放| 十八禁人妻一区二区| 热99国产精品久久久久久7| 国产精品自产拍在线观看55亚洲| 国产1区2区3区精品| 在线免费观看的www视频| 欧美黄色淫秽网站| 99久久人妻综合| 黄色片一级片一级黄色片| 纯流量卡能插随身wifi吗| 99精品久久久久人妻精品| 女人被躁到高潮嗷嗷叫费观| 电影成人av| 视频区图区小说| 伊人久久大香线蕉亚洲五| 欧美av亚洲av综合av国产av| 成人国语在线视频| 午夜福利影视在线免费观看| 人人妻人人爽人人添夜夜欢视频| 亚洲avbb在线观看| 在线永久观看黄色视频| 日本wwww免费看| 啦啦啦免费观看视频1| 国产成人啪精品午夜网站| 婷婷六月久久综合丁香| 国产成人一区二区三区免费视频网站| 午夜精品国产一区二区电影| 欧美人与性动交α欧美精品济南到| 国产av精品麻豆| 亚洲avbb在线观看| 亚洲国产精品sss在线观看 | 99久久国产精品久久久| 亚洲三区欧美一区| 最近最新中文字幕大全免费视频| 91九色精品人成在线观看| videosex国产| 脱女人内裤的视频| 亚洲精品一二三| 黑人猛操日本美女一级片| 欧美黑人精品巨大| av网站在线播放免费| 亚洲国产精品sss在线观看 | 亚洲一区高清亚洲精品| 久久久久久免费高清国产稀缺| 免费人成视频x8x8入口观看| 91九色精品人成在线观看| 欧美黑人欧美精品刺激| 国产精品 欧美亚洲| 欧美一区二区精品小视频在线| 视频区图区小说| 国产精品综合久久久久久久免费 | 免费av毛片视频| 亚洲欧洲精品一区二区精品久久久| 精品乱码久久久久久99久播| 91大片在线观看| 亚洲av成人av| 一级毛片高清免费大全| 五月开心婷婷网| 精品国产国语对白av| 91成年电影在线观看|