• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller

    2021-12-10 11:54:16MohammadAladailehMohammedAnbarIznanHasbullahYousefSanjalaweandYungWeyChong
    Computers Materials&Continua 2021年10期

    Mohammad Aladaileh,Mohammed Anbar,*,Iznan H.Hasbullah,Yousef K.Sanjalawe,2 and Yung-Wey Chong

    1National Advanced IPv6 Centre of Excellence,Universiti Sains Malaysia,Penang,Malaysia

    2Department of Computer Sciences,Northern Border University,Ar’ar,Kingdom of Saudi Arabia

    Abstract:The Software-Defined Networking(SDN)technology improves network management over existing technology via centralized network control.The SDN provides a perfect platform for researchers to solve traditional network’s outstanding issues.However,despite the advantages of centralized control,concern about its security is rising.The more traditional network switched to SDN technology,the more attractive it becomes to malicious actors,especially the controller,because it is the network’s brain.A Distributed Denial of Service(DDoS)attack on the controller could cripple the entire network.For that reason,researchers are always looking for ways to detect DDoS attacks against the controller with higher accuracy and lower false-positive rate.This paper proposes an entropy-based approach to detect low-rate and high-rate DDoS attacks against the SDN controller,regardless of the number of attackers or targets.The proposed approach generalized the Rényi joint entropy for analyzing the network traffic flow to detect DDoS attack traffic flow of varying rates.Using two packet header features and generalized Rényi joint entropy,the proposed approach achieved a better detection rate than the EDDSC approach that uses Shannon entropy metrics.

    Keywords:Software-defined networking;DDoS attack;distributed denial of service;Rényi joint entropy

    1 Introduction

    Network security innovation is like a race between adversaries and the security communities to best each other in breaking and securing the network.Security researchers and practitioners have put much effort and made strides to overcome the threats posed by their adversaries.However,the rapid advancement of information and communication technologies,such as mobile devices and cloud computing virtualization,imposes an additional burden on network administrators in ensuring network security.Technology advancement also introduces new threats,attack methods,and attack vectors.

    Many new attack detection methods have taken advantage of the SDN paradigm that separates the control plane and the data plane[1].The separation simplifies network management by making the network programmable and the control centralized[2],allowing network administrators to manage and control the whole network via the controller[3].However,at the same time,the control layer becomes an attractive target for DDoS attacks[4].The exploitation of certain SDN features that makes the controller ineffective against spoofed network traffic exposes the SDN to various security issues[5].

    The centralized SDN controller controls the network by creating new routing instructions or updating the existing one in the flow table of OpenFlow switches to handle new incoming traffic[6].The OpenFlow switch inspects all incoming packets.A packet is sent to its intended destination if it matches any instructions in the switch’s flow table.Otherwise,the packet is sent to the controller for further processing.Attackers exploit this process by flooding the network with spoofed IP packets to trigger a DDoS attack against the controller.

    DDoS attack denies legitimate users’access to network resources by flooding the network with massive traffic comprising IP packets with spoofed sources IP addresses in a short amount of time.The sudden surge of traffic in the SDN network puts the controller into overdrive mode until its resources are exhausted[7–9].Although the DDoS attack mechanism is well understood,the task of distinguishing DDoS attack traffic from regular network traffic is challenging,especially when attempting an early detection with high accuracy and low false-positive rate[1].

    Entropy-based metrics can identify the variations in the network traffic behavior that have varying rates.This work generalized the Rényi joint entropy method to detect low-rate and high-rate DDoS attacks against the SDN controller that target single or multiple victims.The contributions of this paper are:

    (a)A comprehensive study of different security issues related to the SDN controller.

    (b)A generalized Rényi joint entropy metric to detect low-rate and high-rate DDoS attacks against the SDN controller regardless number of targets.

    (c)A comparison of the proposed approach results with the approach that adapted the Shannon entropy metric.

    We organize the rest of this paper as follows.Section 2 discusses the related work,while Section 3 elaborates the generalized Rényi joint entropy method.The discussion on the proposed detection scheme,experimental setup,and test cases are in Sections 4 to 6,respectively.Section 7 discusses the performance of the proposed approach.The result of the comparison between the proposed and existing detection approaches is in Section 8.Section 9 highlights the significance of the proposed approach’s enhancement,and the analysis of the results is in Section 10.Finally,Section 11 concludes the paper.

    2 Related Works

    The SDN technology’s adoption rate keeps trending upwards due to the popularity of big data that requires a programmable controller to configure new instructions or rules to deal with novel and diverse network traffic flows[10].At the same time,the attempts to disrupt online services and breach online systems are becoming more common from adversaries that resort to all kinds of methods to achieve their objectives.However,the most elusive and destructive threat to computer systems and networks is DDoS attacks with varying traffic rates.

    Several notable research on DDoS attack detection on SDN networks has been carried out in the past few years[11–13].Some of the existing approaches also include the mitigation of DDoS attacks[14,15].However,most existing detection approaches performed poorly against simultaneous low-rate and high-rate DDoS attacks.The detection accuracy severely degrades if both types of attacks occurred concurrently.Meanwhile,the detection approaches designed to detect DDoS attacks with varying attack rates suffer from low accuracy and high false-positive rate whenever multiple targets are involved.Therefore,any effort to create a new approach that could detect both low-rate and high-rate DDoS attacks regardless of the number of targets with high accuracy and low false-positive rate is a worthy endeavor.In this regard,integrating an efficient security mechanism with the controller has been shown to help address multiple SDN security challenges[16].

    Despite many innovative security approaches to detect DDoS attacks against the controller,most of the existing detection approaches have limitations(drawbacks),such as unable to detect DDoS attacks with varying traffic rates in an efficient manner.Consequently,the controller remains vulnerable to the attack that could potentially collapse the entire network and prevent legitimate users from accessing network resources or services[17].Therefore,the motivation of this research is to ensure the protection of the SDN controller from DDoS attacks with varying traffic rates(low and high),regardless of the number of attackers and victims targeted.Consequently,the proposed detection approach must achieve high detection accuracy and a low false-positive rate.

    As stated before,some existing DDoS attack detection approaches utilize some features of the SDN architecture.For example,a Shannon entropy method can identify the uncertainty associated with a random variable[18,19].An information theory-based method(joint-entropy)that depends on multiple packet header features(flow duration,source IP address,packet length,and destination port)can calculate the joint entropy value to detect DDoS attacks.Their method is effective in reducing the false-positive rate and increasing the detection accuracy.Since the jointentropy method could identify different types of DDoS attacks,the authors employ information theory in their approach to achieve scalability,lower complexity,and higher accuracy.However,it still suffers from several weaknesses,such as ineffective on unknown DDoS attack,high detection response time,controller overloaded with new packet_in,and unable to detect low-rate or high-rate DDoS attacks with high detection accuracy rate and low false-positive rate[20].

    An entropy metric is used in an approach that combines information distance with a generalized Rényi entropy for detecting low-rate DDoS attacks against the SDN controller.The probability distribution is used as the metric to detect the DDoS attack by setting a specific window size for the incoming packets and then periodically extracts the packet features from the flow table(switch table).The difference in the probability distributions indicates the existence of a DDoS attack in the network.The experiments carried out by the authors showed that the generalized entropy combined with the information distance is accurate in detecting low-rate DDoS attacks[1].However,there are several issues with the approach.

    First,it is difficult to set the dynamic threshold because of varying attack traffic rates in the traffic flow.Second,relying on the switch’s table instead of the SDN controller to extract the traffic statistics may result in some data loss.Third,the presence of DDoS attacks with varying traffic rates increases the false-positive rate of the approach.Furthermore,the proposed detection approach only depends on a single packet header feature to collect traffic flow statistics,which increases the false-positive rate.

    Furthermore,a support vector machine(SVM)is used to propose a DDoS attack detection approach to distinguish between normal and attack traffic.The flow status collected by the controller is used to build the proposed approach.Since the SVM method depends on the statistical theory to classify the network traffic using six features,the controller has an additional burden and strain to process all incoming traffic packets to detect or prevent any potential DDoS attack.Hence,a low false-positive rate is evidence of an improved DDoS attack detection ratio[21].However,this method demands more resources to compute and process network traffic flow that exhausts the SDN controller resources.

    A novel detection technique called SAFETY was proposed for early detection and mitigation of TCP SYN flooding attack by harnessing the programmability and comprehensive visibility of the SDN through an entropy method to determine the randomness of the flow[22].The entropy is calculated using the destination IP address and few attributes of the TCP flags.The authors performed extensive evaluation that shows significant improvement to the average response time and average attack detection time.However,this method is only suited to handle a single victim,and when multiple concurrent victims are involved,it destabilizes the network.

    Time-Based Detection and Defense Scheme Against DDoS(TDDAD)approach detects DoS attacks against the SDN controller based on time features using three modules:statistics collection module,feature extraction module,and attack detection module by BPNN.Attackers exploit the OpenFlow(OF)switch’s inability to control incoming packets after overwhelming the controller with many packets that deplete its resources.The objectives of TDDAD are to detect and defend against DDoS attacks in real-time effectively and swiftly since any detection approach that relies on the packet’s content feature to detect an attack will be incapacitated once the switch or controller loses control[23].However,not only is it difficult to predict the attacks,but it could also inadvertently exhaust the controller’s resources,especially when dealing with low-rate DDoS attacks targeting many victims.

    Authors in[24]proposed Safe-Guard Scheme(SGS)to mitigate DDoS attacks against the controller.It leverages DDoS attack detection’s behavior features that depend on the cooperation between the data plane and the control plane.The proposed approach consists of two stages.The first stage detects any abnormal traffic in the data plane,and the second stage provides a dynamic defense of the controller in the control plane.However,the scheme cannot detect low-rate DDoS attacks,and it also depends on multiple controllers,which increases detection time significantly.

    The literature studies showed that the studies on low-rate and high-rate DDoS attacks against SDN controllers that target single or multiple victims are very few and far between.No study has adopted a generalized Rényi method with joint entropy to detect DDoS attack traffic before.

    The motivation of this research is to protect the SDN controller detect both low-rate and high-rate DDoS attacks against the SDN controller regardless of the number of targets by using Rényi joint entropy generalization without adding overhead to the SDN controller.Also,it must not misclassify abnormal traffic behavior as normal behavior.

    3 Generalized Rényi Joint Entropy

    The presence of randomness in UDP traffic behavior is one of the telltale signs of DDoS attacks.Some of the existing detection approaches use the Shannon entropy method[25,26]to detect the UDP traffic behavior’s randomness.However,using the Shannon entropy method may result in a low detection rate and high false-positive rate,especially for low-rate DDoS attacks with multiple targets.It depends only on a single packet header feature as the input to calculate the entropy value.Furthermore,it relies on a static threshold to decide if the network traffic flow exhibits DDoS attack behavior.

    Two essential concepts in the Rényi joint entropy theory are joint entropy and Rényi.It was introduced to measure two random variables(i.e.,two packet header features,such as source IP address and destination IP address)represented by x and y,respectively.The probabilityp(x,y)defines the probability distribution of each source IP and destination IP.Furthermore,the Rényi joint entropy has been implemented with a dynamic threshold to calculate the selected features’probability values in the first stage.The dynamic threshold helps to accurately detect the randomness in the traffic behavior,leading to the detection of DDoS attacks.This stage consists of an important step that represents the core of the approach in Rényi joint entropy.

    This section demonstrates Rényi joint entropy’s generalized formula to detect low-rate and high-rate DDoS attacks against the SDN controller targeting a single or multiple hosts.The tradeoff between contributions from the distribution’s main mass and the tail is controlled by two parameterized Shannon entropy generalizations in this research.Indeed,the two parameters(Rényi and Tsallis)are derived from Kolmogorov–Nagumo’s[27]generalization of an average.The Kolmogorov-Nagumo generalization is represented by Eq.(1)[28].

    where ? denotes a function that satisfies the affine or exponential function.Due to affine transformation functionsφ(xi)→φγ(xi)=aφ(xi)+b.Wherea,bare real numbers,and the inverse of the affine function is defined by Eq.(2).

    Consequently,the Rényi entropy can be obtained from the Shannon entropy with the following transformations:

    Eq.(7)is a general formula for Rényi joint entropy for two random variables,whereαis a positive parameter that exposes the main mass,which reflects the concentration of events that often occurred.As stated before,the generalized Rényi joint entropyHRJα(x,y)is a statistical method for calculating the randomness of incoming network traffic flows to detect UDP DDoS attacks with varying traffic rates,which is the goal of this research.The Rényi joint entropy method depends on the probability calculation of each source IP and destination IP.

    4 Proposed Attack Detection Scheme

    In SDN,a low-rate DDoS attack is one of the most problematic security threats to the SDN controller.The difficulty in detecting the attack stems from the resemblance of the attack traffic to normal traffic behavior.It is even more challenging to achieve high accuracy and low false-positive rate when the target involves multiple hosts.Meanwhile,the high-rate DDoS attack poses its own challenge to any detection scheme,especially when involving multiple targets.Therefore,the proposed approach aims to detect DDoS attacks on the SDN controller regardless of attack traffic rates and the number of targets by passive monitoring of UDP packets in the SDN network.

    The presence of abnormal behavior in the SDN UDP traffic could be strong evidence of a DDoS attack.Several existing approaches can detect DDoS attacks by relying on certain packet header features[29–31].However,these existing approaches cannot accurately detect low-rate DDoS attacks when varying attack traffic rates are involved.Hence,there is a need to find significant features that contribute to detecting DDoS attacks regardless of the attack intensity(i.e.,low-rate or high-rate).The proposed approach assumes that leveraging a Rényi joint entropy method with significant features and dynamic threshold usage would positively affect the DDoS attack detection accuracy regardless of the attack traffic rates.

    In this step,the Rényi joint entropy equation will be used to overcome the limitations of the existing DDoS detection approaches that rely on the Shannon entropy method and its variants.There are several important reasons to use the Rényi joint entropy equation:(i)it uses a smaller number of packet header features to distinguish regular traffic from attack traffic,(ii)it uses a smaller number of packet header features to detect both low-rate and high-rate DDoS attacks,(iii)it detects DDoS attacks more accurately than other approaches,(iv)it reduces false-positive error rate,(v)it is usable at various scales,in terms of several instances taken per size window,and(iv)it can measure the randomness of network packets.These features are essential for detecting DDOS attacks on the SDN controller accurately.

    In this research,a generalized Rényi joint entropy is proposed based on combining two concepts:the joint entropy method and the Rényi method.The generalized Rényi joint entropy measures two random variables in the form of two packet header features,such as source IP address and destination IP address,represented by x and y,respectively.The formula for the proposed Rényi joint entropy method is as follow:

    whereHRJα(x,y)denotes a Rényi joint entropy,αdenotes a positive parameter,is the probability distribution between source IP(x)and destination(y)within the time intervalt.

    In the proposed GEADDDC approach,the Rényi joint entropy depends onαvalue that can improve the detection rate by calculating the incoming traffic packets probability.The probability distributions calculated for each source and destination based on the IP frequencies.A Rényi joint entropy’s maximum value occurred when each packet’s probability distribution is equally distributed among all the hosts’destinations.On the other hand,a minimum value of Rényi joint entropy occurred when the amount of probability to all packets within a particular time window skewed towards a distinct destination host.

    The Rényi joint entropy is based on the probability of each source IP(xi)and destination IP address(yj)recorded in the previous stage within a specific period.Eqs.(9)and(10)show the probability ofxiandyj,respectively.

    wherexidenotes the frequency of each distinct source IP withinw,andyidenotes the frequency of each distinct destination IP addresses withinw,andnrepresents the total number of n packets withinw.Regular traffic and attack traffic have different probability distributions.By calculating the probabilities for each source IP and destination IP of packet header features,which are considered variables of Rényi joint entropy,it will measure the uncertainty and randomness in both variables(IP source address and IP destination address).Thereby,the higher uncertainty will result in higher Rényi joint entropy,which is considered one factor contributing to the detection of DDoS attacks in the network.Fig.1 shows the flowchart of the Rényi joint entropy method.

    Figure 1:Joint Rényi entropy values aggregation

    This stage is the first step in identifying abnormal traffic behavior by observing the Rényi joint entropy value.Therefore,the output of this stage contributes to achieving one of the research objectives.

    5 Experimental Setup

    The experiment was conducted on a workstation with a 2.20 GHz Intel Core i5-5200U processor and an 8 GB RAM running Ubuntu Linux 14.04 operating system.The network consists of a POX controller,an OpenFlow(OF)switch,and 64 hosts connected to the OF switch,as illustrated in Fig.2.POX is a widely popular software-based SDN controller within academic research circles,and it is a lightweight,fast,and open-source platform running on Linux,Mac OS,and Windows.Also,Mininet version 3.7(32-bit)provides prototype network scenarios using the process virtualization concept to emulate network elements.UDP packets with spoofed source IP addresses were used as attack packets without any payload in this work.Python programming language was used to generate packets with random source IP addresses using a random function“randrange[1–255].” Additionally,python scripts were used for generating traffic.

    Figure 2:Experimental testbed SDN topology

    Eight simulation scenarios were used to validate the proposed GEADDDC approach.Different assumptions are made regarding the attack scenarios in terms of attack source quantity(single or multiple attack hosts)and the number of targets(single or multiple victim hosts).

    (a)In the single-source attack,one attacker generates spoofed attack packets with a unique source IP address.

    (b)In the multi-source attacks,three attackers generate spoofed attack packets with unique source IP addresses.

    (c)Attack traffic flows are launched towards the SDN controller.

    (d)Attack traffic uses UDP packets with spoofed source IP addresses to simulate attack traffic flows.

    (e)All network hosts are in working condition,and the network is stable throughout the attack.

    Each simulation scenario runs for 30 min The average result in terms of detection rate and the false-positive rate were reported every 5 min.The 5 min window size is divided into n time slots where each slot is equal to m s.Eq.(11)shows the calculation of the time slot.

    wheremis a configurable value,which indicates that the network traffic will be aggregated eachm,and then the proposed approach will check the aggregated traffic for the existence of a DDoS attack.In this research,mis equal to 5 s based on experimental observation.In general,the proposed approach will report the result in terms of detection rate and false-positive rate six times(30/5).

    6 Test Cases

    The experiment examines the proposed approach’s effectiveness in detecting low-rate and highrate DDoS attacks against the controller targeting single or multiple hosts using two simulation cases with four different scenarios.The first case simulates a DDoS attack on an SDN controller from a single source with four different scenarios:(i)Single-source attack on a Single victim host with Low-rate attacks(SSL),(ii)Single-source attack on a Single victim host with Highrate attacks(SSH),(iii)Single-source attack on Multiple victim hosts with Low-rate attacks(SML),and(iv)Single-source attack on multiple victim hosts with High-rate attacks(SMH).The second case simulates DDoS attack on SDN controller from multiple sources with four different scenarios:(i)Multi-source attack on Single victim host with Low-rate attacks(MSL),(ii)Multisource attack on Single victim host with High-rate attacks(MSH),(iii)Multi-source attack on Multiple victim hosts with Low-rate(MML),and(iv)Multi-source attack on Multiple victim hosts with High-rate attacks(MMH).

    All scenarios were simulated on the Mininet platform to cover all possible DDoS attack iterations against the SDN controller,including a different number of attack sources,attack targets,and attack rates.At the same time,evaluate the proposed GEADDDC approach’s efficiency to detect different types of attacks.Fig.3 depicts the evaluation scenarios used to evaluate the proposed approach.

    The first and second test scenarios also have different attack intensities.For single-source attacks,one host generates attack traffic while the rest generate regular traffic.In the case of multiple sources attack,three hosts are designated as attackers that generate attack traffic.Eq.(12)is used to calculate the intensity of attack traffic.

    whereAttackPacketrepresents the number of attack packets per second launched by the attacker within a specific window size.PacketTotalrepresents the total number of regular packets plus the total number of attack packets per second within a similar window size.

    Figure 3:Test strategy

    7 Results

    This work’s main objective is to increase the detection rate of DDoS attacks on the SDN controller and reduce the false-positive detection rate.Therefore,to quantify the proposed GEADDDC approach’s performance,it is compared with an existing DDoS attack detection approach,the Early Detection of DDoS Attacks in Software Defined Networks Controller(EDDSC)approach[26].The two approaches are compared in terms of average detection rate and falsepositive detection rate for low-rate and high-rate DDoS attacks on the SDN controller.EDDSC is selected as a comparison since it uses the Shannon entropy metric to detect DDoS attacks.Each simulation scenario depends on the number of traffic packets per second during a specific time periodt[32].For results representations,the packet distribution is reported every 5-min(300 s)window.Therefore,the simulation will report 60 traffic flows,where each flow is aggregated in a 5-s window size.The average detection rate and a false-positive rate of 60 traffic flows is reported every five minutes for 30 min duration.

    7.1 Single-Source Attack Test Scenarios

    Single-source attack test scenarios measure the proposed approach’s ability to detect both low and high-rate DDoS attacks against the SDN controller from a single host attack towards single or multiple victim hosts with a high detection rate and low false-positive rate.These scenarios are divided into four scenarios,as described in Section 7.Tab.1 summarizes the number of normal traffic,attack traffic,and attack proportion from the network traffic for these scenarios collected in a 5-min window.

    For the sake of results representations,the packet distribution is reported every five minutes(300 s)windows.Therefore,the proposed approach will report 60 traffic flows,where each flow is aggregated in a 5-s window size.The average detection rate and a false-positive rate of 60 traffic flows will be reported every five min.As shown in Tab.1,the number of normal traffic sent in five minutes is equal in all single host attack scenarios(18,900 packets).Meanwhile,the number of attack packets depends on the traffic rate,i.e.,a low-rate or high-rate attack traffic.Based on Tab.1,the number of attack packets in a low-rate DDoS attack is 1,500 packets within five min.Meanwhile,the number of attack packets in a high-rate DDoS attack is 10,000 packets.Thus,the attack traffic proportion for low-rate and high-rate attack traffic is 7% and 34%,respectively.

    Table 1:Single host’s attack scenarios characteristics

    7.2 Multi-Source Attack Scenarios

    Multi-source attack test scenarios measure the proposed approach’s ability to detect low-rate and high-rate DDoS attacks from multiple attackers that target single or multiple victims with a high detection rate and low false-positive rate.These scenarios are divided into four scenarios,as described in Section 7.Tab.2 summarizes the number of normal traffic,attack traffic,and attack traffic proportion from the network traffic for these scenarios collected in a 5-min window.

    Table 2:Multiple hosts attacks scenarios characteristics

    As shown in Tab.2,the number of normal traffic packets sent in 5 min is equal in all multiple host attack scenarios,which are 18,300 packets.These packets are collected from the simulated network as explained in Section 5.For the sake of result representation,the packet distribution is reported for each 5-min time window.Therefore,the proposed approach will report 60 traffic flows where each flow is aggregated in a 5-s window.The average detection rate and a false-positive rate of 60 traffic flows will be reported for each 5-min window.Meanwhile,the total number of normal packets in a 5-min window is 18300 packets.Furthermore,the size of the attack traffic will be fluctuating due to the diversity in the attack traffic rates(e.g.,low or high).The number of packets for a low-rate DDoS attack per second is 15 packets or 900 packets in one minute and 4,500 packets within five minutes.Meanwhile,the number of attack packets for a high-rate DDoS attack is 99 packets per second or 2,000 packets per minute and 30,000 packets per five minutes.Thus,the attack traffic proportion for low-rate and high-rate attacks are 19% and 62%,respectively.

    The approach’s main aim is to detect low-rate and high-rate DDoS attacks against the controller triggered by multiple attackers that target single or multiple victim hosts effectively with a high detection rate and low false-positive rate.Fig.4 shows the average detection rates and the average false-positive rates of the proposed GEADDDC approach for all scenarios.

    Figure 4:Summary of the average detection rates and false-positive rates using GEADDDC for all scenarios in 30 min

    Fig.4 shows the average detection rates and the average false-positive rates of the proposed GEADDDC approach for all eight test scenarios.The fluctuation of detection rates and falsepositive rates is due to the variation of each scenario’s attack traffic rates.The highest detection rate and lowest false-positive rate occurred when multiple attackers triggered a high-rate DDoS attack on single or multiple victims.Meanwhile,the lowest detection rate and the highest falsepositive rate occurred when a single attacker triggered a low-rate DDoS attack on single or multiple victims.The detection rates’difference is because of the different amount of attack traffic received by the victims.

    8 Comparison with Existing Approaches

    The GEADDDC approach’s performance has been compared with the EDDSC approach[26],which depends on the entropy method.Since entropy is the basis for all entropy variant approaches,it shares the common drawbacks of static threshold usage and single packet header feature usage.The comparison uses the simulation scenarios(refer to Section 7).The evaluation metrics used in the benchmarking are detection rate and false-positive rate,which are the same metrics used in the EDDSC approach.These evaluation metrics are also widely used to evaluate intrusion detection systems in detecting DDoS attacks.Tab.3 below summarizes the average evaluation metrics results for all simulation scenarios using the GEADDDC approach and the EDDSC approach.Furthermore,Fig.5 presents the enhancement of GEADDDC over the EDDSC approach regarding the detection rate and false-positive rate metrics.

    Fig.5 presents the improvements of GEADDDC over EDDSC in terms of average detection rate and average false-positive rate.GEADDDC approach enhances the average DDoS attack detection rates by 10.62%(SSL),1.78%(SSH),35.81%(SML),3.36%(SMH),5.72%(MSL),0.88%(MSH),9.49%(MML),and 0.73%(MMH).In addition,GEADDDC approach reduces the average false-positive rates by 90.20%,76.09%,92.07%,71.75%,90.73%,75.65%,94.01%,and 72.00% for SSL,SSH,SML,SMH,MSL,MSH,MML,and MMH,respectively.

    Table 3:Average performance metrics of GEADDDC approach vs.EDDSC approach

    Figure 5:Average detection rate and average false-positive rate enhancement of GEADDDC over EDDSC approach for eight simulation scenarios

    9 Significance of Enhancement

    In the previous section,GEADDDC was compared with EDDSC in terms of detection rate and false-positive rate.The results reveal that GEADDDC has enhanced the detection rate and false-positive rate compared with EDDSC.This section discusses whether the enhancement is significant or not using a T-test to measure the enhancement’s significance.According to[25],the T-test compares the significant variance among the means of two groups.It considers one of the statistical inferences by using the parametric method that observes distribution parameters’inferences by the variables’probability distributions.

    As mentioned,the T-test defines the variance’s significance among the means of two groups by calculating the probability of error by specifying the error value P-value.p<0.05 means there is a difference among two means groups(average detection rate and average false-positive rate)which is considered statistically significant.Otherwise,the difference between the means is not significant.Consequently,the hypothesis has been formulated for statistical significance as follows:

    ?H0:GEADDDC does not significantly enhance the DDoS attack detection in terms of average detection rate and average false-positive rate.

    ?H1:GEADDDC enhance the DDoS attack detection significantly in terms of average detection rate and average false-positive rate.

    Tab.4 summarizes the T-test findings,while Fig.3 above exhibits the enhancement proportion for the detection rate and false-positive rate using the GEADDDC approach compared with the EDDSC approach.

    Table 4:T-test findings

    As shown in Tab.4,the T-test results reveal that the GEADDDC approach has significantly improved the existing approach in terms of the detection rate and false-positive rate.

    10 Discussion

    GEADDDC was proposed as an approach to detect low and high-rate DDoS attacks against SDN controller regardless of attack sources(single or multi-source attacks)and targets(single or multiple victim hosts)with high detection rate and low false-positive rate.The proposed GEADDDC approach was evaluated using eight different simulation scenarios(experiment plans)to measure two metrics:average detection rate and average false-positive rate.Then,the results were compared with the EDDSC approach using the same configuration in all simulation scenarios to determine whether the proposed approach achieves the stated aims(i.e.,high detection rate and reduce false-positive rate).

    The experiment results prove that the proposed GEADDDC approach performs better than the existing EDDSC approach in detecting DDoS attacks on the SDN controller.Consequently,GEADDDC has a higher detection rate and lower false-positive rate in detecting the attack than EDDSC.

    Tab.3 revealed the comparison proposed approach results that fulfill a high average detection rate and a less false-positive rate when using SSL,SSH,SML,SMH,MSL,MSH,MML,and MMH.For low and high-rate DDoS attacks against the SDN controller targeting a single victim or multiple victims,the proposed approach collects new incoming traffic flow statistics more efficiently than other existing approaches by using two packets header features.The use of two packet header features increases the network statistics available for decision-making.On the contrary,the reliance on a single packet header by the EDDSC approach limits network traffic statistics,which results in a lower DDoS attack detection rate of EDDSC.The following subsections discuss the results obtained in detail.

    10.1 Detection Rate

    The experiment results reveal that the GEADDDC approach has an accurate DDoS attack detection based on the detection rate;thus,it fulfills the requirement of a high detection rate of low/high-rate DDoS attacks against the SDN controller.GEADDDC approach is compared with the existing EDDSC approach,which uses the entropy method;and is considered the reference for entropy variant-based detection approaches.

    The comparison results reveal that the EDDSC approach has a moderate to high attack detection rate for low-rate and high-rate DDoS attacks against the SDN controller with multiple targets compared with the proposed approach for all simulation scenarios.The reasons are that the EDDSC approach uses an entropy method that depends on one packet header feature(i.e.,destination IP address)and relies on a static threshold to detect DDoS attacks.Furthermore,EDDSC fails to detect the presence of both low-rate and high-rate DDoS attacks with single or multiple targets in the network traffic flow.However,the detection rate is lower when the low-rate DDoS attack targeted multiple victim hosts(i.e.,72% and 90.82% for SML and MML scenarios,respectively.

    In contrast,the proposed approach depends on two packet header features(source IP and destination IP addresses),allowing it to collect more network statistics on incoming traffic flows.The extra information available provides more accurate attack detection by the generalized Rényi entropy method.The proposed method measures the network traffic randomness resulting from DDoS attacks.High traffic randomness is one of the symptoms of DDoS attacks that spoofed IP addresses.Also,the proposed approach uses a dynamic threshold to enhance the detection of both low-rate and high-rate DDoS attacks that target single and multiple victim hosts.The threshold depends on the number of incoming traffic flows towards the controller within a specific time,attack traffic rate toward the victim,and Rényi joint entropy value within a specific time by adapting the Exponentially Weighted Moving Average(EWMA)method.Consequently,a comparison of GEADDDC and EDDSC is necessary to evaluate the attack detection performance.Fig.6 shows the comparison of the GEADDDC approach and EDDSC approach in terms of average detection rate.

    Figure 6:Comparison of average detection rate of GEADDDC and EDDSC using simulation scenarios

    Fig.6 shows that the GEADDDC approach has higher detection rates in all scenarios compared to the EDDSC approach.The high detection rates highlight the proposed approach’s improved performance in terms of attack detection rate,especially in detecting low-rate DDoS attacks on multiple targets.

    10.2 False-Positive Rate

    EDDSC approach has high false-positive rates in all scenarios compared with the proposed approach in detecting both low-rate and high-rate DDoS attacks against the controller that targets single or multiple victim hosts.The comparison in Tab.3 reveals that GEADDDC approach had reduced the false-positive rates in all scenarios(1.39%,0.55%,2.22%,1.00%,0.55%,0.28%,0.55%,0.28%)compared to EDDSC approach.

    The reduction in the false-positive rate is due to dynamic threshold usage instead of a static threshold.A dynamic threshold is more flexible and improves DDoS attack detection significantly because it can detect low-rate and high-rate DDoS attack traffic.Furthermore,the proposed approach utilizes the Rényi Joint Entropy algorithm,which depends on two packet header features instead of one,to analyze incoming traffic flow statistics for the randomness of incoming traffic.Fig.7 shows the comparison between the GEADDDC approach and EDDSC approach in terms of average false-positive rates.

    Fig.7 clearly shows that the GEADDDC approach outperformed EDDSC with reduced average false-positive rates in all scenarios.The lowest average false-positive rate in this figure highlights the performance of the proposed approach for both low-rate and high-rate DDoS attacks that target single or multiple victims.The high average false-positive rate of EDDSC(i.e.,28 %)is mainly due to static threshold usage and reliance on a single packet header feature(i.e.,destination IP address).

    Figure 7:Comparison of average false-positive rate of GEADDDC and EDDSC using simulation scenarios

    11 Conclusion

    Centralized network management and programmable network control are possible in the SDN environment because of the network data plane’s decoupling from the control plane.However,a massive and sudden increase in incoming traffic from multiple sources at varying rates could overload the SDN controller that leads to resource exhaustion.Consequently,attackers could exploit certain SDN features to launch DDoS attacks towards the controller.DDoS attacks could severely affect the controller’s operation resulting in reduced performance or collapse of the whole SDN network.Therefore,finding an effective detection approach to detect DDoS attacks using traffic flow statistics must be considered.

    Unfortunately,most existing detection approaches to detect DDoS attacks against the controller with single or multiple targets have difficulties detecting low-rate and high-rate attacks with high accuracy and low false-positive rate.Therefore,there is a need for an effective approach to detect both low-rate and high-rate DDoS attacks against the SDN controller regardless of the number of targets and the number of attackers with high accuracy and low false-positive rate.

    Generalized Entropy-based Approach with a dynamic threshold to detect DDoS attacks against a software-defined networking Controller(GEADDDC)has been proposed in this research to address the need.GEADDDC has four main stages:(i)data collection and preprocessing,(ii)Rényi joint entropy calculation,(iii)dynamic threshold,and(iv)rule-based DDoS attack detection stages.The experiment results prove that the GEADDDC effectively detects low-rate and high-rate DDoS attacks against the SDN controller that targets single or multiple victims.GEADDDC achieved it by generalizing the Rényi joint entropy to calculate incoming traffic’s randomness using a statistic analyzer at the controller.Some potential future work includes exploring the feasibility of detecting additional types of DDoS attacks,such as TCP sync,ICMP,and HTTP flooding attacks;detecting DDoS attacks during flash crowd events;and integrating the proposed approach with other network security approaches.

    Acknowledgement:We would like to express our gratitude to Universiti Sains Malaysia(USM)for all the support and facilities that enable the completion of this research.

    Funding Statement:This work was supported by Universiti Sains Malaysia under external grant(Grant Number 304/PNAV/650958/U154).

    Conflict of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    大话2 男鬼变身卡| 国精品久久久久久国模美| 欧美久久黑人一区二区| 一边摸一边抽搐一进一出视频| 中文字幕亚洲精品专区| 欧美黄色片欧美黄色片| 国产免费福利视频在线观看| 成人亚洲欧美一区二区av| 中国国产av一级| √禁漫天堂资源中文www| 男女国产视频网站| 亚洲美女搞黄在线观看| 国产精品免费大片| 在线观看免费午夜福利视频| 久久天躁狠狠躁夜夜2o2o | 国产亚洲av片在线观看秒播厂| 欧美 日韩 精品 国产| 国产亚洲av高清不卡| 女性被躁到高潮视频| 99久国产av精品国产电影| 一本大道久久a久久精品| 五月天丁香电影| 丝袜脚勾引网站| a级毛片黄视频| 免费看av在线观看网站| 久久久欧美国产精品| 亚洲七黄色美女视频| 免费不卡黄色视频| 午夜91福利影院| 狠狠精品人妻久久久久久综合| 深夜精品福利| 欧美亚洲 丝袜 人妻 在线| 国产精品三级大全| 国产日韩欧美视频二区| 人人妻人人爽人人添夜夜欢视频| 欧美日韩视频精品一区| 亚洲,一卡二卡三卡| 另类精品久久| 19禁男女啪啪无遮挡网站| 在线观看免费日韩欧美大片| 校园人妻丝袜中文字幕| 精品国产超薄肉色丝袜足j| 热99久久久久精品小说推荐| 大香蕉久久成人网| 啦啦啦视频在线资源免费观看| 婷婷成人精品国产| 美女高潮到喷水免费观看| 欧美日韩福利视频一区二区| 王馨瑶露胸无遮挡在线观看| 91成人精品电影| 夫妻性生交免费视频一级片| 各种免费的搞黄视频| 日韩欧美精品免费久久| 搡老岳熟女国产| 免费观看人在逋| 99热网站在线观看| 咕卡用的链子| 美女午夜性视频免费| 亚洲欧美精品自产自拍| 久久久久国产一级毛片高清牌| 日韩免费高清中文字幕av| 精品人妻一区二区三区麻豆| 久久精品国产亚洲av高清一级| 777米奇影视久久| 色婷婷久久久亚洲欧美| 亚洲视频免费观看视频| 亚洲色图 男人天堂 中文字幕| 亚洲情色 制服丝袜| 韩国av在线不卡| 热99久久久久精品小说推荐| 亚洲一卡2卡3卡4卡5卡精品中文| 91精品国产国语对白视频| 三上悠亚av全集在线观看| 亚洲国产日韩一区二区| 国产成人91sexporn| 黄色毛片三级朝国网站| 高清在线视频一区二区三区| 你懂的网址亚洲精品在线观看| 国产97色在线日韩免费| 亚洲综合精品二区| 久久精品熟女亚洲av麻豆精品| 亚洲欧美一区二区三区黑人| 一级毛片电影观看| 在线免费观看不下载黄p国产| 免费看不卡的av| 天天躁夜夜躁狠狠久久av| 夫妻午夜视频| 亚洲精品中文字幕在线视频| 久久久久久久久久久免费av| 国产精品人妻久久久影院| 夜夜骑夜夜射夜夜干| 欧美精品高潮呻吟av久久| 99精国产麻豆久久婷婷| 熟女少妇亚洲综合色aaa.| 9热在线视频观看99| 精品视频人人做人人爽| 久久天躁狠狠躁夜夜2o2o | 国产精品一区二区精品视频观看| 国产午夜精品一二区理论片| 日韩精品有码人妻一区| 国产免费一区二区三区四区乱码| 国产色婷婷99| 在线观看免费日韩欧美大片| 国产免费视频播放在线视频| 国产日韩欧美在线精品| 亚洲精品aⅴ在线观看| √禁漫天堂资源中文www| 国产日韩欧美视频二区| 亚洲av电影在线进入| 操美女的视频在线观看| 国产黄色视频一区二区在线观看| 国产在线免费精品| av又黄又爽大尺度在线免费看| 国产老妇伦熟女老妇高清| 日韩视频在线欧美| 国产黄频视频在线观看| 王馨瑶露胸无遮挡在线观看| 亚洲人成网站在线观看播放| 久久久久精品久久久久真实原创| 免费日韩欧美在线观看| 成人午夜精彩视频在线观看| 别揉我奶头~嗯~啊~动态视频 | 黑人欧美特级aaaaaa片| 精品亚洲成a人片在线观看| 男女之事视频高清在线观看 | 最近中文字幕高清免费大全6| 丝瓜视频免费看黄片| 美女脱内裤让男人舔精品视频| 可以免费在线观看a视频的电影网站 | 午夜影院在线不卡| 天天躁夜夜躁狠狠久久av| 黄片播放在线免费| 伊人久久大香线蕉亚洲五| 国产伦人伦偷精品视频| www.精华液| 欧美黑人精品巨大| 亚洲国产欧美一区二区综合| 两个人看的免费小视频| 亚洲欧美一区二区三区久久| 一边摸一边做爽爽视频免费| 丝袜脚勾引网站| 飞空精品影院首页| 青春草国产在线视频| 无遮挡黄片免费观看| 国产精品.久久久| 男女免费视频国产| 亚洲欧美一区二区三区黑人| 国产极品天堂在线| 一级毛片 在线播放| 综合色丁香网| 免费在线观看视频国产中文字幕亚洲 | av有码第一页| 一级片免费观看大全| 菩萨蛮人人尽说江南好唐韦庄| 免费av中文字幕在线| 国产1区2区3区精品| 水蜜桃什么品种好| 18禁动态无遮挡网站| 久久鲁丝午夜福利片| 国产精品成人在线| 观看av在线不卡| 欧美变态另类bdsm刘玥| 一本一本久久a久久精品综合妖精| 你懂的网址亚洲精品在线观看| 日韩不卡一区二区三区视频在线| 青青草视频在线视频观看| 99久国产av精品国产电影| 蜜桃国产av成人99| 久热这里只有精品99| 国产精品av久久久久免费| 日本av免费视频播放| 国产精品女同一区二区软件| 99久国产av精品国产电影| 国产老妇伦熟女老妇高清| 一边摸一边做爽爽视频免费| 国产乱人偷精品视频| 在线观看一区二区三区激情| 免费看不卡的av| 亚洲一码二码三码区别大吗| 免费在线观看黄色视频的| 综合色丁香网| 狂野欧美激情性bbbbbb| videos熟女内射| 欧美日本中文国产一区发布| 天天躁夜夜躁狠狠久久av| 精品午夜福利在线看| 毛片一级片免费看久久久久| 欧美成人精品欧美一级黄| 国产成人系列免费观看| 国产野战对白在线观看| 国产一区二区三区av在线| 亚洲人成77777在线视频| 久久精品久久久久久噜噜老黄| 啦啦啦在线观看免费高清www| 国产高清国产精品国产三级| 国产成人免费观看mmmm| 亚洲av福利一区| 免费av中文字幕在线| 免费观看性生交大片5| 嫩草影院入口| av不卡在线播放| 好男人视频免费观看在线| netflix在线观看网站| 嫩草影院入口| 午夜日韩欧美国产| 亚洲婷婷狠狠爱综合网| 毛片一级片免费看久久久久| 在线观看免费高清a一片| 国产免费视频播放在线视频| 日日摸夜夜添夜夜爱| 一区二区三区四区激情视频| 人人妻人人添人人爽欧美一区卜| 国产男女内射视频| 无限看片的www在线观看| 久久久久久人人人人人| 国产在线免费精品| 精品久久久久久电影网| 大片免费播放器 马上看| 国产无遮挡羞羞视频在线观看| 精品人妻在线不人妻| 亚洲精品aⅴ在线观看| 国产成人欧美在线观看 | 亚洲精品国产一区二区精华液| 国产精品一区二区精品视频观看| 一区福利在线观看| 国产成人精品无人区| 一级毛片 在线播放| 午夜91福利影院| 精品亚洲乱码少妇综合久久| 精品国产一区二区三区久久久樱花| bbb黄色大片| 天堂8中文在线网| 一二三四在线观看免费中文在| 一个人免费看片子| 成人国语在线视频| av电影中文网址| www.自偷自拍.com| 19禁男女啪啪无遮挡网站| 大话2 男鬼变身卡| 最近最新中文字幕免费大全7| 久久青草综合色| 麻豆精品久久久久久蜜桃| 国产又爽黄色视频| 人人妻人人澡人人爽人人夜夜| 日本色播在线视频| 日韩成人av中文字幕在线观看| 亚洲精品第二区| 成年动漫av网址| 免费观看av网站的网址| 亚洲精品乱久久久久久| 国产一区二区 视频在线| 日韩中文字幕欧美一区二区 | 精品国产超薄肉色丝袜足j| 亚洲 欧美一区二区三区| 啦啦啦中文免费视频观看日本| 国语对白做爰xxxⅹ性视频网站| 国产无遮挡羞羞视频在线观看| 精品一区二区三卡| 午夜福利在线免费观看网站| 亚洲欧美成人综合另类久久久| 黑人欧美特级aaaaaa片| 老汉色∧v一级毛片| 99re6热这里在线精品视频| 大话2 男鬼变身卡| 日韩一本色道免费dvd| 如日韩欧美国产精品一区二区三区| 别揉我奶头~嗯~啊~动态视频 | 成人影院久久| 亚洲欧美日韩另类电影网站| 久久精品国产亚洲av涩爱| 国产熟女午夜一区二区三区| 黄色怎么调成土黄色| 午夜精品国产一区二区电影| 丝袜美腿诱惑在线| 美女扒开内裤让男人捅视频| 久久精品久久久久久久性| 国产成人一区二区在线| 久久久久精品久久久久真实原创| 欧美国产精品va在线观看不卡| 97精品久久久久久久久久精品| 在现免费观看毛片| 国产精品av久久久久免费| 中文欧美无线码| 制服人妻中文乱码| 久久久欧美国产精品| 777米奇影视久久| 丝瓜视频免费看黄片| 制服诱惑二区| 亚洲av综合色区一区| 天堂中文最新版在线下载| 丝袜美足系列| 国产成人精品福利久久| 久久久久久久精品精品| 91精品三级在线观看| 亚洲欧洲精品一区二区精品久久久 | 天天影视国产精品| 色婷婷av一区二区三区视频| 男人舔女人的私密视频| 欧美人与性动交α欧美精品济南到| 97人妻天天添夜夜摸| 人体艺术视频欧美日本| 女人爽到高潮嗷嗷叫在线视频| 亚洲精品美女久久av网站| 在线观看国产h片| 一级爰片在线观看| 精品午夜福利在线看| 精品亚洲乱码少妇综合久久| 少妇人妻久久综合中文| 极品少妇高潮喷水抽搐| 人人妻人人澡人人看| 在线观看www视频免费| 久久久亚洲精品成人影院| 色婷婷久久久亚洲欧美| 男女下面插进去视频免费观看| 99久久99久久久精品蜜桃| 精品少妇黑人巨大在线播放| 国产精品女同一区二区软件| 国产毛片在线视频| 天堂8中文在线网| 亚洲精华国产精华液的使用体验| 男女高潮啪啪啪动态图| 久久久精品免费免费高清| 成人三级做爰电影| 在线观看免费视频网站a站| e午夜精品久久久久久久| 午夜精品国产一区二区电影| 国产极品粉嫩免费观看在线| 日韩制服丝袜自拍偷拍| 精品久久久久久电影网| 国产日韩欧美亚洲二区| 一本色道久久久久久精品综合| 伊人久久国产一区二区| 亚洲免费av在线视频| 亚洲国产精品国产精品| 亚洲免费av在线视频| 久久精品国产a三级三级三级| 欧美日韩一级在线毛片| 中文字幕制服av| 两性夫妻黄色片| 青春草国产在线视频| 亚洲精品日韩在线中文字幕| 亚洲欧美日韩另类电影网站| 免费人妻精品一区二区三区视频| 亚洲熟女毛片儿| 一级,二级,三级黄色视频| 久久久久网色| 纵有疾风起免费观看全集完整版| 欧美精品亚洲一区二区| 最新的欧美精品一区二区| 少妇人妻精品综合一区二区| 亚洲一区二区三区欧美精品| 在线免费观看不下载黄p国产| 日韩人妻精品一区2区三区| 黄色视频在线播放观看不卡| a级毛片在线看网站| 亚洲一区中文字幕在线| 日韩一本色道免费dvd| 亚洲欧美精品综合一区二区三区| 亚洲精品aⅴ在线观看| 美女国产高潮福利片在线看| 精品福利永久在线观看| 精品少妇一区二区三区视频日本电影 | 日韩中文字幕视频在线看片| 青春草视频在线免费观看| 爱豆传媒免费全集在线观看| 青春草视频在线免费观看| 欧美日韩亚洲国产一区二区在线观看 | 精品亚洲乱码少妇综合久久| 久久久精品国产亚洲av高清涩受| 国产亚洲精品第一综合不卡| 18禁裸乳无遮挡动漫免费视频| 女人高潮潮喷娇喘18禁视频| 大码成人一级视频| 国产淫语在线视频| 欧美精品av麻豆av| 精品少妇黑人巨大在线播放| 91精品国产国语对白视频| 久久久久久久久久久免费av| 午夜福利影视在线免费观看| 午夜福利网站1000一区二区三区| 免费黄色在线免费观看| 免费人妻精品一区二区三区视频| 老司机靠b影院| 中文字幕人妻熟女乱码| 人人妻,人人澡人人爽秒播 | 中文字幕高清在线视频| 天天添夜夜摸| 免费日韩欧美在线观看| 久久免费观看电影| 精品国产超薄肉色丝袜足j| 午夜av观看不卡| 国产精品蜜桃在线观看| 亚洲欧美成人综合另类久久久| 亚洲av成人不卡在线观看播放网 | 制服诱惑二区| 国产精品蜜桃在线观看| 99热网站在线观看| 国产xxxxx性猛交| 啦啦啦在线观看免费高清www| 在线观看免费视频网站a站| 欧美另类一区| 久久av网站| 久久99热这里只频精品6学生| 精品人妻熟女毛片av久久网站| av在线播放精品| videosex国产| 日本欧美国产在线视频| 欧美精品人与动牲交sv欧美| 亚洲欧美精品综合一区二区三区| 国产精品无大码| 国产欧美日韩一区二区三区在线| 国产成人免费观看mmmm| 成年动漫av网址| 久久久久精品国产欧美久久久 | 午夜久久久在线观看| 十分钟在线观看高清视频www| 亚洲五月色婷婷综合| 国产成人精品无人区| 午夜日韩欧美国产| 欧美人与善性xxx| 久久ye,这里只有精品| 男人添女人高潮全过程视频| 精品一区二区三区四区五区乱码 | 国产免费福利视频在线观看| 国产精品三级大全| 国产亚洲一区二区精品| 午夜免费观看性视频| 欧美日韩一级在线毛片| 国产亚洲av片在线观看秒播厂| 国产男人的电影天堂91| 欧美老熟妇乱子伦牲交| 国产成人免费无遮挡视频| 国产在线免费精品| 久久影院123| 亚洲精品日本国产第一区| 午夜精品国产一区二区电影| 日韩一本色道免费dvd| 午夜福利影视在线免费观看| 在线天堂最新版资源| 男人爽女人下面视频在线观看| 午夜日本视频在线| 国产欧美日韩一区二区三区在线| 亚洲成国产人片在线观看| 亚洲精品久久成人aⅴ小说| 青春草亚洲视频在线观看| 亚洲精品美女久久久久99蜜臀 | 日日摸夜夜添夜夜爱| 精品国产露脸久久av麻豆| 一二三四中文在线观看免费高清| 亚洲av电影在线进入| 老司机亚洲免费影院| 一级片免费观看大全| 妹子高潮喷水视频| 亚洲欧美成人综合另类久久久| 亚洲国产毛片av蜜桃av| 搡老乐熟女国产| 中文字幕人妻丝袜一区二区 | 老鸭窝网址在线观看| 亚洲欧美日韩另类电影网站| 国产极品粉嫩免费观看在线| 亚洲欧美色中文字幕在线| 久久久精品94久久精品| 亚洲在久久综合| 91精品国产国语对白视频| 国产伦人伦偷精品视频| 国产精品国产三级国产专区5o| 黄片无遮挡物在线观看| 狠狠精品人妻久久久久久综合| 国产精品亚洲av一区麻豆 | 国产一区二区 视频在线| 亚洲av日韩精品久久久久久密 | 777久久人妻少妇嫩草av网站| 街头女战士在线观看网站| 黑人巨大精品欧美一区二区蜜桃| 亚洲av成人精品一二三区| 欧美97在线视频| 丰满乱子伦码专区| 女性生殖器流出的白浆| 亚洲国产精品成人久久小说| 欧美亚洲 丝袜 人妻 在线| 免费黄网站久久成人精品| 午夜老司机福利片| 亚洲伊人色综图| www.精华液| 欧美日本中文国产一区发布| 日本欧美国产在线视频| 亚洲美女黄色视频免费看| 丝瓜视频免费看黄片| 大片电影免费在线观看免费| 国产伦理片在线播放av一区| 亚洲国产欧美网| 中文字幕另类日韩欧美亚洲嫩草| 一级a爱视频在线免费观看| 99精品久久久久人妻精品| 国产精品麻豆人妻色哟哟久久| 国产高清国产精品国产三级| 欧美最新免费一区二区三区| 最近的中文字幕免费完整| 国产欧美日韩综合在线一区二区| 久久狼人影院| 国产av国产精品国产| 亚洲欧美一区二区三区黑人| 黄网站色视频无遮挡免费观看| 精品国产一区二区久久| 在线观看一区二区三区激情| 观看美女的网站| 黄色视频不卡| 国产精品久久久久久精品电影小说| 成人黄色视频免费在线看| 丝袜喷水一区| 人人澡人人妻人| 国产有黄有色有爽视频| 韩国高清视频一区二区三区| 十分钟在线观看高清视频www| 亚洲精品一二三| av国产久精品久网站免费入址| 日韩av在线免费看完整版不卡| 久久人人97超碰香蕉20202| 亚洲精品国产一区二区精华液| 亚洲精品美女久久av网站| 热99国产精品久久久久久7| 国产一区二区三区av在线| tube8黄色片| 人人澡人人妻人| av.在线天堂| 亚洲精品在线美女| 少妇的丰满在线观看| 亚洲,欧美,日韩| 国语对白做爰xxxⅹ性视频网站| 十八禁人妻一区二区| 新久久久久国产一级毛片| 久久午夜综合久久蜜桃| 久久国产精品大桥未久av| 精品少妇一区二区三区视频日本电影 | 久久久久久久精品精品| 亚洲av日韩在线播放| 飞空精品影院首页| 日韩av免费高清视频| 国产一区二区三区综合在线观看| 亚洲四区av| 亚洲美女黄色视频免费看| 午夜影院在线不卡| av国产精品久久久久影院| 男女下面插进去视频免费观看| 欧美日韩亚洲高清精品| 又粗又硬又长又爽又黄的视频| 99国产精品免费福利视频| www日本在线高清视频| 婷婷色综合大香蕉| 秋霞伦理黄片| 国产1区2区3区精品| 色精品久久人妻99蜜桃| 女人高潮潮喷娇喘18禁视频| 欧美久久黑人一区二区| 国产免费福利视频在线观看| 久久久久久久大尺度免费视频| 亚洲综合色网址| 伦理电影大哥的女人| 午夜福利影视在线免费观看| 男人操女人黄网站| 久久婷婷青草| 精品国产国语对白av| 久久精品亚洲av国产电影网| 乱人伦中国视频| av一本久久久久| 国产av码专区亚洲av| 国产精品久久久久久精品古装| 大片电影免费在线观看免费| 女人久久www免费人成看片| 国产 精品1| av女优亚洲男人天堂| 制服诱惑二区| 精品一品国产午夜福利视频| 一二三四中文在线观看免费高清| 亚洲av国产av综合av卡| 女人高潮潮喷娇喘18禁视频| 人人妻人人添人人爽欧美一区卜| 天天操日日干夜夜撸| 乱人伦中国视频| 久久人人爽av亚洲精品天堂| 国产精品av久久久久免费| 天堂俺去俺来也www色官网| 各种免费的搞黄视频| 黄色视频不卡| 国产亚洲av高清不卡| 日韩中文字幕视频在线看片| 黄色一级大片看看| 日韩 亚洲 欧美在线| 亚洲免费av在线视频| 日韩,欧美,国产一区二区三区| 九色亚洲精品在线播放| 极品人妻少妇av视频| 在线精品无人区一区二区三| 午夜激情av网站| 极品人妻少妇av视频| 91精品三级在线观看| 欧美精品亚洲一区二区| 色吧在线观看| 九草在线视频观看| 99热全是精品| 777米奇影视久久| 国产精品一区二区在线观看99| 啦啦啦啦在线视频资源| www.精华液| 午夜福利免费观看在线| 麻豆乱淫一区二区| 一本色道久久久久久精品综合| 国产成人精品福利久久| 黄网站色视频无遮挡免费观看| 一级片'在线观看视频| 亚洲av日韩精品久久久久久密 | 亚洲图色成人| 欧美日韩视频高清一区二区三区二| 美女大奶头黄色视频| 一个人免费看片子|