• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Adaptive Anomaly Detection Algorithm Based on CFSFDP

    2021-12-11 13:30:46WeiwuRenXiaoqiangDiZhanweiDuandJianpingZhao
    Computers Materials&Continua 2021年8期

    Weiwu Ren,Xiaoqiang Di,Zhanwei Du and Jianping Zhao

    1School of Computer Science and Technology,Changchun University of Science and Technology,Changchun,130022,China

    2SRoom 657,J.T.Patterson Labs Bldg.(PAT),Austin,78712,TX,USA

    Abstract: CFSFDP (Clustering by fast search and find of density peak) is a simple and crisp density clustering algorithm.It does not only have the advantages of density clustering algorithm, but also can find the peak of cluster automatically.However,the lack of adaptability makes it difficult to apply in intrusion detection.The new input cannot be updated in time to the existing profiles, and rebuilding profiles would waste a lot of time and computation.Therefore,an adaptive anomaly detection algorithm based on CFSFDP is proposed in this paper.By analyzing the influence of new input on center,edge and discrete points, the adaptive problem mainly focuses on processing with the generation of new cluster by new input.The improved algorithm can integrate new input into the existing clustering without changing the original profiles.Meanwhile,the improved algorithm takes the advantage of multi-core parallel computing to deal with redundant computing.A large number of experiments on intrusion detection on Android platformand KDDCUP 1999 show that the improved algorithm can update the profiles adaptively without affecting the original detection performance.Compared with the other classical algorithms,the improved algorithm based on CFSFDP has the good basic performance and more room of improvement.

    Keywords: Anomaly detection; density clustering; original profiles;adaptive profiles

    1 Introduction

    Intrusion detection is an effective defense technology in network security.Since it was proposed in 1980, intrusion detection has been highly concerned by the industry and academia.In recent years, with the development of artificial intelligence, intrusion detection has also developed in the area of intelligence.Some new algorithms have been applied to the field of intrusion detection.Shone et al.[1] proposed a deep learning technique for intrusion detection, which addresses the feasibility and sustainability of current model for modern networks.Chawala et al.[2] proposed intrusion detection with combined CNN/RNN model, which described anomaly by RNN and improved anomaly IDS by CNN with GRUs.Alrawashdeh et al.[3] proposed an anomaly detection based on RBM and implemented a deep belief network.

    According to different principles, intrusion detection system can be divided into two categories:intrusion detection based on misuse and intrusion detection based on anomaly.Misuse detection can effectively detect known attacks, but not unknown attacks.Anomaly detection can detect unknown attacks, but it is often plagued by false alarm rate.In addition, intrusion detection usually needs to label the data before training.Labeling does not only need a great deal of expert knowledge, but also costs a large number of resources.At present, there is not enough fresh data set for training in the field of intrusion detection system.

    In order to reduce the false alarm rate of anomaly detection, it is necessary to design and implement the algorithms that have good profiles naturally, such as SVM, Adaboost and random forest.In order to reduce the dependence on labeling data, there are two main methods:one is to use easily extracted data such as normal behaviors as training data; the other is to use unsupervised or weak supervised algorithm for training.

    Clustering algorithm, as a natural high-precision, unsupervised machine learning method, has been widely introduced and applied to the field of the anomaly detection.Density clustering can find cluster of arbitrary shape, not just “quasi-circular” clustering.Therefore, density clustering has natural advantages in accurately describing profiles.Some improved algorithms [4] have the ability to resist noise.Shamshirband et al.[5] used a density-based clustering algorithm to form arbitrary cluster shapes for improving their proposed algorithm.However, compared with other clustering methods, density clustering has high storage and computational costs.The main reason is the lack of effective data structure to store and retrieve clustering information.Kalle et al.[6]proposed an anomaly detection algorithm based on hierarchical clustering.Two mechanisms for adaptive evolution are introduced:incremental extension with new elements of normal behavior,and a new feature that enables forgetting of outdated elements of normal behavior.In addition to incremental capacity, this algorithm not only guarantees detection performance, but also has good real-time performance.The principle of partitioning clustering is simple and easy to understand.But the detection performances of its improved algorithms are so different.Gargand et al.[7]used a combination of fuzzy K-means clustering algorithm, extended Kalman filter, and support vector machines to detect the anomalies.The best set of features is computed by fuzzy k-means algorithm.Gu et al.[8] proposed a semi-supervised clustering detection method using multiple features.The proposed Multiple-Features-Based Constrained-K-Means (MF-CKM) algorithm can solve three problems:large numbers of labeled data, the relatively low detection accuracy and convergence speed of unsupervised K-means algorithm.Additionally, Velea et al.[9] detected anomalous behavior in network traffic through parallel K-means clustering.This method does not need to inspect users’data package and can protect users’privacy.Zou et al.[10] used the K-means clustering algorithm of data mining for logs to construct the normal behavior library so as to distinguish between normal behavior and abnormal behavior.In general, the study of anomaly detection based on partition clustering gives rise to two main difficulties:one is the selection of parameter k, the other is enlarging the partition between normal and anomaly.In their methods, the above two problems must be handled at the same time so that the algorithm based on partition clustering can achieve good detection performance.The grid clustering divides the data space into a grid structure of finite cells, and organizes a series of adjacent high-density cells into profiles.This method does not store each feature points but store the cell, that is, the statistics of feature data.Later on, Dromard et al.[11] proposed an incremental grid clustering to detect rapidly the anomalies.But how to select the right cell granularity is a problem.At the same time, some other clustering methods are also applied to intrusion detection, such as graph clustering method [12].

    To sum up, clustering is a very good non-supervised anomaly detection method.Every method has its advantages and disadvantages.Density clustering can find any shape of cluster, which has a natural advantage in the description of the profile.Therefore, density clustering has always been a hotspot in the application research of clustering in anomaly detection.However, anomaly detection based on density clustering has three kinds of problems [13]:the first is the difficulty of determining the neighborhood range due to the uniform density; the second is parameter modifications that would cause instability of the model; while the third is real-time problem caused by too much computing overhead.In addition, clustering, especially density clustering, is difficult to adapt profiles with new input.Such a tiny part of studies show positive results about the adaptive profiles, whereas most studies do not involve or have negative results.

    CFSFDP [14], i.e., Clustering by fast search and find of density peak is a simple and crisp density clustering algorithm.It can find possible clustering center itself by defining local density and distance.It can solve the difficult problem of determining the neighborhood range through one parameter.It is a very robust algorithm.However, CFSFDP is not designed for anomaly detection.CFSFDP can build a clustering, but if it is the new input after clustering, it is unable to be added to the existing clustering, and is not capable of changing the existing clustering.For intrusion detection, especially the model with network behavior as input, it needs to constantly modify its own model to adapt to the new attack detection, but there is no such theory or application at present.

    In this paper, an anomaly detection algorithm based on CFSFDP is proposed.It can solve the dynamic adaptation of anomaly detection model based on CFSFDP.New input may affect the shape of clustering, and then change the existing model.We consider the possible results of all the inputs, and build new behavior profiles based on these results.Under the setting that the existing model is not changed as far as possible, the generated new cluster is fused with the existing model to obtain the adaptive detection performance.Meanwhile, the complex computation of clustering information can also be optimized by parallel computation.

    2 Basic Concepts

    Definition 1.Support radiusdc:dc>0, is the support radius, ifd≤dc, is in the support radius,else is out of the support radius.

    Definition 2.Center pointCcl:the original center point of cluster, whereCis the identification of center point andclis the cluster identification.clsrepresents all clusters.

    Definition 3.Edge pointEcl:the points belong to cluster but not in the radius ofdcare edge of clusters, and they can be defined asEcl, whereEis the edge identification.

    Definition 4.Discrete pointD:the points that do not belong to any cluster are the discrete points, which can be defined asD.

    Definition 5.DistanceDT(i,Ccl):the distance between the new point I and the original center point is defined asDT(i,Ccl).The descending sequence ofDT(i,Ccl)is defined asDSC.DSis the descending sequence identification.

    Definition 6.DistanceDT(i,Ecl):the distance between the new point I and the edge point of cluster is defined asDT(i,Ecl).The descending sequence ofDT(i,Ecl)is defined asDSE.DSis the descending sequence identification.

    Definition 7.DistanceDT(i,D):the distance between the new point I and the edge point of cluster is defined asDT(i,D).The descending sequence ofDT(i,D)is defined asDSD.DSis the descending sequence identification.

    Definition 8.The robbing functionRob(i,cl):the robbing functionRob(i,cl)represents the weight between the currentiand the clustercl.The equation is

    Definition 9.The selecting factorγi:the equation ofγiis shown as follows:

    whereρirepresents the density of pointi,DTminis the minimum distance from the center point,andDTmaxis the maximum distance from the center point.θis the selecting factor.

    Definition 10.Center step degreeSTC:the equation ofSTCis

    where sgn is the unit-step function,κCis the factor of center step.

    Definition 11.Discrete step degreeSTD:the equation ofSTDis

    where sgn is the unit-step function,κDis the factor of discrete step.

    3 The Main Idea

    The main idea is to analyze the relationship between the new input and the existing clustering,that is, the possible results of adding new input to the existing clustering.There are three possible results:the first is that the new input may expand the boundary of the existing clustering; the second is that the new input may change the subordination of the edge points; the third is that the new input may generate new clusters.It will be very challenging to solve the model adaptability from these three possible results.

    Our basic idea is to decompose the complex adaptive problem into several three problems:one is the relationship between a new input and one known cluster; the second, the relationship between a new input and two known clusters; and the third, the relationship between a new input and multiple known clusters.As shown in Fig.1, it is the relationship between a new input and one known cluster.The red point represents the new input, the solid circle represents the radius dc of the known cluster, and the points within the solid circle belong to clustering, while in Fig.1a,the dark yellow point is within the cluster.The purple dashed circle represents the range controlled by the cluster, the edge point is between the solid circle and the dashed circle, andcl1represents the number of cluster.There are three possible scenarios for this problem:the first scenario is that the new input is within the radius of the known cluster, as Fig.1a depicts, the new input is within the radius of the cluster, which will directly affect the cluster.According to our definition of edge points, the density of the cluster center will lead to the increase of the density.The density increase of cluster leads to the expansion of cluster range, and some new edge points are added, which are the light yellow points in Fig.1a; the second scenario is that the new input is outside the radius of cluster, and will be the edge point of some cluster.Just as Fig.1b illustrates,according to the calculation, the new input, namely the red point, will become the edge point of cluster.It will not directly affect the clustering; the third scenario is that the new input is outside the radius of class, and will be the discrete point of the class.It will also not directly affect clustering.

    Figure 1:The relationship between a new input and one center (a) A new input in the cluster cl1(b) A new input on the edge of the cluster cl1 (c) A new input separated from the cluster cl1

    There are two representative scenarios of the relationship between a new input and two known clusters.One scenario is that the new input is the edge point of the current cluster.As shown in Fig.2a, the new input, namely the red point, falls into the edge range of clustercl1.It can be visualized in Fig.2, but in fact, we are directly incapable to judge which cluster the point belongs to.And it needs to be judged by calculating which cluster has more influence; the other is that the new input is within the radius of two clusters, as is shown in Fig.2b, the new input will increase the density of the current cluster, and more edge points will be included.

    What Fig.3 displays is the relation between a new input and several known clusters.Since we have already discussed the situation about the new input becoming edge or discrete point, here we mainly discuss the new input and its surrounding points may be clustered as a new cluster, which is also the most complex situation.In Fig.3, with the black pot representing the discrete point,the blue pot representing the edge of clustercl2, and the yellow pot representing the edge of clustercl1.The new input, namely red pot, falls into the middle of the edge points and the discrete points.The density in the radius of new input is enough, in addition, the distances between the new input and the other center of clusters are enough, so it will generate a new cluster.It should not be intuitive and be judged by calculating density and distance.

    Figure 2:The relationship between a new input and two centers (a) A new input on the edge of the cluster cl1 (b) A new input in the cluster cl1

    Figure 3:The relationship between a new input and multiple-centers

    4 The Flow of Algorithm

    According to the analysis of Section 3, we can conclude that the key is to find the relationship between the new input and the original cluster, especially the relationship between the new input and the original cluster when it may be the new cluster.As shown in the Fig.4, the process of algorithm can be divided into three parts:the first, to calculate the distance and density and store all kinds of information between the new input and the original cluster; the second, to judge whether the new input to be the new cluster or not; the third, to assign the new input to its nature identity, whether it is the center, edge or discrete point.And the points which are affected by new input should be reassigned.The following logic is needed to judge whether the new input to be a new cluster or not:firstly, the new center must not be within the radius of the original cluster; secondly, the density of the new input in the radius should be enough; thirdly, the distance between the new input band the other original cluster center should be enough.Based on these logics, the following judgment is needed:the first is to judge whether the new input to be within the radius of the original cluster or not.If in the radius, the new input cannot be the center; the second is to calculate the density and the distance.The density is the number of points in the radius of new input.If the density is enough, then it should be calculated the distances between the new input and the center of the other clusters; the third is to judge the new input to be a new cluster or not.We defined a cluster center selection factor that includes two indicators:density and distance.Once the currentiof the new input is large than the original lowestγi?1and exceeds a certain threshold valueSTC, then the new input will generate a new cluster.

    In addition, for the new input which does not belong to the cluster and will also not be a new cluster, it is necessary to give priority to judge whether it be a discrete point or not.Because the discrete points are usually noise, they have great influence on the performance of detection.In this paper, we define the discrete points strictly.We consider that the discrete points are the same as the center points, and there are significant differences with other points.So the purpose of our definition is to distinguish the noise and the profile better.The new input is neither a cluster center nor a discrete point, hence it can be assigned to the edge point.The rob factor should be calculated, and the new input belongs to the cluster which has the largest the rob factor, that is,the cluster robs this new input.

    The following logic is needed to judge which nature identity the new input should be assigned to:the first logic is that when the new input generates a cluster, it will rob edge points from other clusters; the second, when the new input is a discrete point, it will have no influence on profiles and be marked as a discrete point; the third, when the new input is within the radius of center,it will increase the density of the current cluster and be marked as cluster identification.Although increasing the density continuously may lead to the change of center or even the profile, in fact,the profile has not changed too much.For simplicity and stability, our strategy of designing algorithm is to keep the original profiles as much as possible.Therefore, increasing the density in the original cluster is ignored; the fourth, when new input is an edge point, it will calculate the distances to other center points, then calculate the rob factors, and judge which cluster it belongs to.

    Here we do not discuss the algorithms of building normal profiles and anomaly detection,mainly because this part is proposed in another paper [15].The basis of anomaly detection is that the normal behaviors have certain regularity and similarity.In that paper, it is concluded that the clustering profiles are composed of the center points and their support radiuses.Within the profiles, it is considered as the normal, otherwise is anomaly.

    The pseudocode of generating profiles is as follows:

    Figure 4:The flow chart of adaptive CFSFDP algorithm

    Algorithm 1:Adaptive anomaly detection algorithm based on CFSFDP(new input i)1:Cluster 2:input(i)3:Calculate(DT(i,Ccl),DT(i,Ecl),DT(i,D))4:Ge nerate(DS ile DSC is if DT(i,i be C, DSE, DSD)5:wh not null do 6: Ccl)≤dc then 7: long to Ccl 8: ρcl+1 9: end if 10: if DT (i,Ccl)≥dc then 11: while DSE is not null do 12: if DT (i,Ecl)≤dc then 13: ρi+1 14: end if 15: end while 16: end if 17:end while 18:while DSD is not null do 19: if DT (i,Ecl)≤dc then 20: ρi+1 21: end if 22:end while 23:Calculate(γ i)24:Generate(DSR)25:if STC=1 then 26: i is the center of new cluster 27: while DSD; DSE is not null do 28: if DT(i;Ecl);DT (i;D)≤dc then 29: Mark points belong to new cluster 30: Save density of new cluster 31: end if 32: if DT(i,Ecl); DT (i,D)≥dc then 33: Calculate(Rob(pk,i))34: Calculate(Rob(pk,cl))35: end if 36: if Rob (pk,i)≥Rob(pk,cl)then 37: pk to be i’s edge.38: end if 39: end while 40:end if 41:if STC/=1 then 42: if STD=1 then 43: i is a new discrete point 44: end if 45: if STD /=1 then 46: Calculate Rob(i,cls)47: select the maxmimum of Rob(i,cls)48: i is the edge of cls 49: end if 50:end if

    5 Experiment Results

    5.1 Data Sources

    The experimental data includes two parts:one is from the open data set KDDCUP 1999 of intrusion detection; the other is from the data extracted by the mobile anomaly detection system based on Android that we developed.We will do two groups of experiments:one is the comparison between our improved algorithm and the other algorithms on the open data set, and the other is the comparison between our improved algorithm and other algorithms on data set that extracted by mobile anomaly detection system.The process of extracting the data set from the Android platform is introduced below.

    The experiment data is collected from a red mi Note1 phone, which is configured with four cores 1.6 GHz, memory 2.0 GB, and operating system MIUI8.0.1.0 (root).Normal behaviors are collected from the user’s daily behavior, such as normal use of phones and its apps.Anomaly behaviors are mainly collected from the virus behaviors of Android Malware Genome Project APK samples [16] and KaFan forum APK samples [17] in the specific period.We selected useful features by referring to three literatures [18-20].And as a result of the Android platform version change, some new features have been added; the data contains 106 features, mainly divided into 8 categories:CPU, memory, network, SIM, phone, SMS, battery, app, etc.Some features are listed in Tab.1.A piece of data is the cumulative value or average value over a time slice, and the time slice takes a value of 500 ms.As is shown in Tab.1, it is part of 106 features we collected.

    Table 1:The enumeration of some features

    The experimental environment of this paper is DELL precision T1700 workstation, the main parameters are Inter Xeon CPU E3-1220 v3@3.10 GHz, 8 GB RAM, and the operating system is Windows 7 Ultimate.The algorithm is implemented by python 3.6.The PCA dimension reduction is implemented by PCA library function in the package of sklearn.decomposition.

    5.2 Evaluation Criteria

    In order to evaluate the performance of the anomaly detection algorithm, three main indicators in this paper are used as performance indicators to measure the anomaly detection model,which are defined as follows:

    In the above equations, TP represents the number of correctly judging anomaly records.TN represents the number of correctly judging normal records.FP represents the number of incorrectly judging anomaly records.FN represents the number of incorrectly judging normal records.DR is the detection rate, FAR is the false alarm rate, and AC is the accuracy rate.In the application of anomaly detection, FAR is more important.

    5.3 Result Analysis

    The first group of experiments is to compare the performance of our algorithm and other algorithms on mobile data.Both the original CFSFDP algorithm and our improved algorithm are basically trained by using 50000 data.And then the training data increases from 10000 to 50000 by 10000 at a time.The original algorithm is trained by rebuilding profiles.The improved algorithm is adaptively trained by self-incremental learning

    As vividly shown in Fig.5, it is the comparison between the improved algorithm and the original algorithm.There are two main aspects:Training time and the training profiles.These two aspects correspond to two kinds of problems, which need to be verified by experiments:the first is whether adaptive incremental learning can improve the speed of building the profiles, that is, whether building profiles by incremental learning is faster than rebuilding profiles or not; the second is whether the profiles built by incremental learning is basically the same as the original profiles.The first problem can be verified by the comparison experiment of training time.The second problem can be verified by the comparison experiment of the number of clustering center points.In Fig.5a, the data size increases gradually from 10000 to 50000 by 10000 at one time.It can be seen that the training time of the improved algorithm is lower than the original algorithm.There are two reasons for this phenomenon, one is that the computation of building profiles by the improved algorithm is less than rebuilding profiles by the original algorithm; the other is that the improved algorithm compute a large number of distances in parallel.As depicted in Fig.5b, the number of clustering center points generated by the improved algorithm is more than the number of clustering center points generated by the original algorithm.This may be caused by the strategy of our improved algorithm.For avoiding the fluctuation of detection performance,our strategy is designed to keep the original profile as much as possible.And this strategy will not merge the cluster centers, only increase the cluster centers.

    Detection rates of different algorithms are compared in Fig.6a.It can be seen that ADWICE,as the classical anomaly detection algorithm, is far superior to CFSFDP and its improved algorithm, while the improved algorithm and the original algorithm have no obvious difference in detection rate.This is mainly because CFSFDP algorithm as a new anomaly detection algorithm,lack of the improvement for applying in anomaly detection, the profiles of normal behavior is not as accurate as ADWICE.In Fig.6b, false alarm rates of different algorithms are compared.In the process of data size increment from 10000 to 20000, the false alarm rate of the improved algorithm is lower than that of the original algorithm.When incremental data size is more than 30000, the false alarm rate of the improved algorithm is higher than that of the original algorithm.The reason for this phenomenon is that the profiles of the improved algorithm only increases and does not decrease, and the expansion of the profiles leads to the decrease of precision.Meanwhile, ADWICE has the lowest false alarm rate.

    Figure 5:Performance comparison of building profiles (a) time of building profiles (b) number of center points

    Fig.7 illustrates the accuracy of different algorithms under different quantities.It can be seen that ADWICE is better than CFSFDP algorithm and its derivative algorithm, and the accuracy of the improved algorithm fluctuates, while the original algorithm has been relatively stable, and the improved algorithm is not as stable as the original algorithm in terms of stability.From Figs.6 and 7, we can see that the adaptive improvement is achieved at the expense of the stability of some algorithms.

    As we can see in Fig.8, it is a detection rate comparison between the full feature dimensions and the partial feature dimensions.By PCA methods, the full 106 dimensions are reduced to 34 dimensions.It can be seen that the reduction of dimensions does not lead to a significant reduction in detection rates.In addition, ADWICE has the best detection rate in the full dimensions or the partial dimensions.

    Figure 6:Performance comparison of detecting anomalies (a) time of building profiles (b) number of center points

    Figure 7:AC comparison of different data sizes

    Figure 8:DR comparison of different algorithms

    Figure 9:FAR comparison of different algorithms

    Obviously in Fig.9, it is a false alarm rate comparison between the full feature dimensions and the partial feature dimensions.It can be seen that the improved algorithm has a higher false alarm rate than the original algorithm in 34 dimensions, and the improved algorithm has a lower false alarm rate than the original algorithm in 106 dimensions.In the 34 or 106 dimensions,ADWICE has the lowest false alarm rate, and the CNN has the highest false alarm rate.For anomaly detection, false alarm rate is an important performance indicator.Combined with detection rate and false alarm rate, the overall performance of the improved algorithm is good.

    Apparently in Fig.10, there is an accuracy rate comparison between the full feature dimensions and the partial feature dimensions.The improved algorithm has lower accuracy rate than the original algorithm in 34 or 106 dimensions.The improved algorithm in 34 dimensions has the lower accuracy rate than that in 106 dimensions.Compared with other algorithms, the improved algorithm has lowest accuracy rate.

    Figure 10:AC comparison of different algorithms

    Tab.2 is a comparison of detection performance of different algorithms using the open data set KDDCUP 1999.It is pretty easy to tell that ADWICE has a great advantage in the classic data set.Compared with other algorithms, CFSFDP and its improved algorithm do not have any advantage in accuracy, but the profiles stability of the algorithm is better when judging normal behavior and anomaly behavior.

    Table 2:Detection performance comparison using KDDCUP 1999

    6 Conclusions

    In this paper, we propose an adaptive anomaly detection algorithm based on CFSFDP, the algorithm can learn the incremental data adaptively without changing the original profiles.It can not only avoid rebuilding profiles, but also reduce the computation and computing time.However,the strategy of the improved algorithm is not to modify the existing profiles, so the number of cluster center point only increases but not decreases.By the experimental analysis, it can be seen that the improved algorithm is to obtain the adaptability at the expense of the stability of original algorithm.In addition, the improved algorithm fail to improve the detection performance, even in some cases, the detection performance may decline.The next work will focus on two aspects:(1) the anomaly detection based on CFSFDP needs to be further improved for higher detection performance; (2) the stability of the adaptive anomaly detection based on CFSFDP needs to be further improved.

    Funding Statement:This work was supported in part by the National Key Research and Development Program of China under Grant No.2018YFB1800303,the Science and Technology Planning Project of Jilin Province under Grant No.20190302070GX, and the Science and Technology Projects of Jilin Provincial Education Department (the 13th five year plan) under Grant Nos.JJKH20190593KJ, JJKH20190546KJ, and JJKH20200795KJ.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品一区二区免费观看| 可以在线观看的亚洲视频| 桃色一区二区三区在线观看| 99精品在免费线老司机午夜| 91久久精品电影网| 亚洲一级一片aⅴ在线观看| 我要搜黄色片| 国产精品一二三区在线看| 亚洲欧美日韩高清在线视频| 亚洲欧美日韩东京热| 久久欧美精品欧美久久欧美| 欧美性猛交╳xxx乱大交人| 精品一区二区三区视频在线| 成人一区二区视频在线观看| 久久久久久九九精品二区国产| 我的女老师完整版在线观看| 日本一二三区视频观看| 午夜福利成人在线免费观看| 色综合色国产| 国产伦精品一区二区三区视频9| 在线观看美女被高潮喷水网站| 欧美xxxx性猛交bbbb| 免费黄网站久久成人精品| 久久久久久久久久成人| 亚洲成人中文字幕在线播放| 搡老妇女老女人老熟妇| 人妻久久中文字幕网| 国产午夜精品论理片| 大型黄色视频在线免费观看| 国产精品三级大全| 国产精品嫩草影院av在线观看| 午夜久久久久精精品| 九草在线视频观看| 18禁黄网站禁片免费观看直播| 噜噜噜噜噜久久久久久91| 国产人妻一区二区三区在| 中文字幕人妻熟人妻熟丝袜美| 亚洲精华国产精华液的使用体验 | 午夜免费激情av| 国产精品伦人一区二区| 亚洲,欧美,日韩| 最近手机中文字幕大全| 日韩高清综合在线| 国产在线精品亚洲第一网站| 国产成人精品久久久久久| 亚洲av男天堂| 一边摸一边抽搐一进一小说| 亚洲欧美日韩高清在线视频| 亚洲激情五月婷婷啪啪| 观看美女的网站| 久久精品夜色国产| 久久精品国产亚洲av涩爱 | 日本黄色片子视频| 两性午夜刺激爽爽歪歪视频在线观看| 色噜噜av男人的天堂激情| 狠狠狠狠99中文字幕| 婷婷色av中文字幕| 成年版毛片免费区| 美女黄网站色视频| 亚洲最大成人手机在线| 精品国内亚洲2022精品成人| 久久热精品热| 激情 狠狠 欧美| 国产中年淑女户外野战色| 午夜视频国产福利| 国产精品无大码| 综合色丁香网| 成年av动漫网址| 久久鲁丝午夜福利片| 国内精品一区二区在线观看| 国产成人91sexporn| 午夜福利在线观看吧| 麻豆精品久久久久久蜜桃| 成年av动漫网址| 内射极品少妇av片p| 亚洲国产精品合色在线| 久久久久久久久大av| 亚洲高清免费不卡视频| 精品国内亚洲2022精品成人| 久久欧美精品欧美久久欧美| 我要搜黄色片| 久久精品国产鲁丝片午夜精品| 日韩国内少妇激情av| 蜜臀久久99精品久久宅男| 亚洲最大成人av| 亚洲人与动物交配视频| 人人妻人人看人人澡| 亚洲av中文av极速乱| a级毛片a级免费在线| 午夜激情福利司机影院| 国产成人freesex在线| 男女下面进入的视频免费午夜| 一个人观看的视频www高清免费观看| 91精品国产九色| 亚洲欧美日韩东京热| 久久精品夜夜夜夜夜久久蜜豆| av视频在线观看入口| 99热这里只有精品一区| 久久精品91蜜桃| 久久中文看片网| 最后的刺客免费高清国语| 国产综合懂色| 日韩精品青青久久久久久| 91久久精品国产一区二区三区| 国产麻豆成人av免费视频| 午夜免费男女啪啪视频观看| 高清午夜精品一区二区三区 | 91麻豆精品激情在线观看国产| 看黄色毛片网站| 青春草视频在线免费观看| 久久久久免费精品人妻一区二区| 女同久久另类99精品国产91| 亚洲精品乱码久久久久久按摩| 久久99蜜桃精品久久| 男人舔奶头视频| 草草在线视频免费看| 91av网一区二区| 哪里可以看免费的av片| 久久综合国产亚洲精品| 免费观看人在逋| 精品人妻熟女av久视频| 久久人妻av系列| 亚洲欧美成人精品一区二区| 国产亚洲精品久久久久久毛片| eeuss影院久久| 国产精品三级大全| 日韩强制内射视频| 亚洲精品亚洲一区二区| 久久精品久久久久久噜噜老黄 | 最新中文字幕久久久久| 国产一区二区在线av高清观看| 亚洲最大成人手机在线| 国产人妻一区二区三区在| 亚洲四区av| 国产av一区在线观看免费| 黄色欧美视频在线观看| 夜夜看夜夜爽夜夜摸| 日日撸夜夜添| 亚洲五月天丁香| 日本免费a在线| 欧美丝袜亚洲另类| 日本一本二区三区精品| 免费无遮挡裸体视频| 国产高清激情床上av| 岛国在线免费视频观看| 少妇熟女欧美另类| 天堂影院成人在线观看| 搞女人的毛片| 一区二区三区高清视频在线| 少妇被粗大猛烈的视频| 嫩草影院新地址| 麻豆乱淫一区二区| 天堂网av新在线| 99久久九九国产精品国产免费| av天堂在线播放| 亚洲欧美成人综合另类久久久 | 免费看美女性在线毛片视频| 精品人妻熟女av久视频| 真实男女啪啪啪动态图| 看十八女毛片水多多多| 国产午夜福利久久久久久| 最新中文字幕久久久久| 97在线视频观看| 国产亚洲av嫩草精品影院| 国产精品永久免费网站| 天天一区二区日本电影三级| 亚洲精品自拍成人| 91麻豆精品激情在线观看国产| av卡一久久| 蜜桃亚洲精品一区二区三区| 欧美激情久久久久久爽电影| 不卡一级毛片| 国产一区二区在线观看日韩| 听说在线观看完整版免费高清| 国产淫片久久久久久久久| 亚洲不卡免费看| 国产精品一区二区在线观看99 | 欧美3d第一页| 日韩欧美国产在线观看| 午夜精品一区二区三区免费看| 麻豆av噜噜一区二区三区| 精品日产1卡2卡| 精品久久久久久久久久久久久| 中文字幕精品亚洲无线码一区| 国产大屁股一区二区在线视频| 国产免费男女视频| 色哟哟哟哟哟哟| 26uuu在线亚洲综合色| 国产视频首页在线观看| 亚洲精品粉嫩美女一区| 91午夜精品亚洲一区二区三区| 最新中文字幕久久久久| 一本久久精品| 成人永久免费在线观看视频| 久久婷婷人人爽人人干人人爱| 国产成人a∨麻豆精品| 狂野欧美白嫩少妇大欣赏| 欧美激情国产日韩精品一区| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 晚上一个人看的免费电影| 蜜桃亚洲精品一区二区三区| 少妇裸体淫交视频免费看高清| 成人午夜高清在线视频| 一本久久中文字幕| 国产真实乱freesex| 成年av动漫网址| 不卡视频在线观看欧美| 国产乱人视频| 菩萨蛮人人尽说江南好唐韦庄 | 亚洲欧洲国产日韩| 久久久久久国产a免费观看| 亚洲国产精品成人综合色| 久久精品国产99精品国产亚洲性色| 级片在线观看| 色综合色国产| 男人舔女人下体高潮全视频| 嫩草影院新地址| 国产视频内射| 老熟妇乱子伦视频在线观看| 欧美精品国产亚洲| 老司机福利观看| 三级国产精品欧美在线观看| 国产精品精品国产色婷婷| 99久久人妻综合| 亚洲av中文av极速乱| 中国美女看黄片| 91精品一卡2卡3卡4卡| 色吧在线观看| 麻豆精品久久久久久蜜桃| 亚洲国产高清在线一区二区三| 久久综合国产亚洲精品| 看黄色毛片网站| 久久精品国产清高在天天线| 国产精品伦人一区二区| 国产极品天堂在线| 成人无遮挡网站| 97超碰精品成人国产| 99热网站在线观看| 国产精品久久电影中文字幕| ponron亚洲| 国产精品久久视频播放| 国产毛片a区久久久久| 久久久久久国产a免费观看| 亚洲国产精品国产精品| 国产不卡一卡二| 人妻少妇偷人精品九色| 你懂的网址亚洲精品在线观看 | 久久精品国产99精品国产亚洲性色| 身体一侧抽搐| 中国美女看黄片| 国产伦一二天堂av在线观看| a级毛片a级免费在线| 国产色爽女视频免费观看| 18禁黄网站禁片免费观看直播| 亚洲av免费高清在线观看| 亚洲欧美日韩东京热| 色综合站精品国产| 亚洲在线自拍视频| 99久久中文字幕三级久久日本| 又爽又黄无遮挡网站| 日韩欧美 国产精品| 欧美xxxx黑人xx丫x性爽| 97超碰精品成人国产| 亚洲自偷自拍三级| 最近最新中文字幕大全电影3| av免费观看日本| 三级毛片av免费| 99视频精品全部免费 在线| 综合色丁香网| 久久亚洲国产成人精品v| 国产亚洲91精品色在线| 亚洲图色成人| 3wmmmm亚洲av在线观看| 久久精品国产99精品国产亚洲性色| av天堂在线播放| 99久久无色码亚洲精品果冻| 国产亚洲精品av在线| 亚洲自偷自拍三级| 久久久a久久爽久久v久久| 久久国产乱子免费精品| 国产麻豆成人av免费视频| 亚洲电影在线观看av| 卡戴珊不雅视频在线播放| 看黄色毛片网站| 亚洲国产欧洲综合997久久,| 国产成人a区在线观看| 26uuu在线亚洲综合色| 桃色一区二区三区在线观看| 午夜福利在线在线| 午夜激情福利司机影院| 91午夜精品亚洲一区二区三区| 99久久精品国产国产毛片| 三级经典国产精品| 狠狠狠狠99中文字幕| 小蜜桃在线观看免费完整版高清| 国产一区二区激情短视频| av在线老鸭窝| 国产成人91sexporn| 成熟少妇高潮喷水视频| 亚洲精品成人久久久久久| 少妇熟女欧美另类| 国产精品久久久久久亚洲av鲁大| 国产亚洲av嫩草精品影院| 亚洲经典国产精华液单| 日日摸夜夜添夜夜爱| 国产亚洲精品av在线| 久久久久久国产a免费观看| 国产成人精品一,二区 | 色尼玛亚洲综合影院| 欧美+亚洲+日韩+国产| 久久久色成人| 国产午夜福利久久久久久| 中国美女看黄片| 国产精品国产高清国产av| 综合色丁香网| 日韩国内少妇激情av| 听说在线观看完整版免费高清| 日韩一区二区视频免费看| 美女黄网站色视频| 国产高清三级在线| 日韩欧美三级三区| 国产高清三级在线| 国产精品一区二区三区四区久久| 级片在线观看| 美女黄网站色视频| 亚洲av成人精品一区久久| 婷婷六月久久综合丁香| 午夜精品国产一区二区电影 | 日韩 亚洲 欧美在线| 精品熟女少妇av免费看| 亚洲四区av| 亚洲中文字幕日韩| 亚洲最大成人手机在线| 国产精品一区二区性色av| 春色校园在线视频观看| 高清午夜精品一区二区三区 | 亚洲精品自拍成人| 麻豆乱淫一区二区| 久久99蜜桃精品久久| 精品无人区乱码1区二区| ponron亚洲| 国产片特级美女逼逼视频| 不卡一级毛片| 简卡轻食公司| 亚洲精品乱码久久久久久按摩| 乱系列少妇在线播放| 色哟哟哟哟哟哟| 久久九九热精品免费| av.在线天堂| 一边摸一边抽搐一进一小说| 成人特级黄色片久久久久久久| 嫩草影院入口| 欧美不卡视频在线免费观看| 亚洲aⅴ乱码一区二区在线播放| 国产精品99久久久久久久久| 嫩草影院精品99| 国产av麻豆久久久久久久| 五月玫瑰六月丁香| 成人综合一区亚洲| 久久久久久国产a免费观看| 国产精品野战在线观看| 丰满乱子伦码专区| 日韩在线高清观看一区二区三区| 欧美一区二区亚洲| 亚洲欧美日韩东京热| 亚洲七黄色美女视频| 天天一区二区日本电影三级| 99久久无色码亚洲精品果冻| 在线观看免费视频日本深夜| 午夜免费激情av| 国产精品久久久久久久电影| 久久久久网色| 一进一出抽搐gif免费好疼| 国产真实乱freesex| 国产精品综合久久久久久久免费| 国产人妻一区二区三区在| 91久久精品电影网| 久久人人爽人人片av| av天堂在线播放| 99热这里只有是精品在线观看| 免费看a级黄色片| 少妇熟女欧美另类| 亚洲真实伦在线观看| 夜夜夜夜夜久久久久| 蜜臀久久99精品久久宅男| a级毛色黄片| 99国产极品粉嫩在线观看| 亚洲成a人片在线一区二区| 国产午夜精品久久久久久一区二区三区| 亚洲成a人片在线一区二区| 日本与韩国留学比较| a级毛色黄片| 国产一区二区三区av在线 | 国产一区亚洲一区在线观看| 日韩大尺度精品在线看网址| 一级毛片电影观看 | .国产精品久久| 日韩欧美精品免费久久| 插逼视频在线观看| 久久午夜亚洲精品久久| 日本黄色视频三级网站网址| 国产老妇伦熟女老妇高清| 午夜福利高清视频| 人妻系列 视频| 人人妻人人澡欧美一区二区| 一级av片app| 最新中文字幕久久久久| 最近最新中文字幕大全电影3| av又黄又爽大尺度在线免费看 | 亚洲,欧美,日韩| 狠狠狠狠99中文字幕| 久久久久久久久久久免费av| 国产成人影院久久av| 不卡一级毛片| 久久精品国产亚洲网站| 免费观看a级毛片全部| 国产v大片淫在线免费观看| 国内揄拍国产精品人妻在线| 男女那种视频在线观看| 亚洲精品粉嫩美女一区| 国产成人一区二区在线| 亚洲欧美日韩卡通动漫| 在线观看66精品国产| 好男人视频免费观看在线| 欧美日韩一区二区视频在线观看视频在线 | 一夜夜www| 久久久久久久久久久免费av| 给我免费播放毛片高清在线观看| 亚洲精品乱码久久久久久按摩| 色视频www国产| 少妇被粗大猛烈的视频| 午夜久久久久精精品| 久久精品国产清高在天天线| 成人一区二区视频在线观看| 一级毛片久久久久久久久女| 一个人看的www免费观看视频| 国产精品久久久久久av不卡| 不卡一级毛片| 在线免费观看不下载黄p国产| 午夜福利在线在线| 校园春色视频在线观看| 亚洲精品色激情综合| 看片在线看免费视频| 噜噜噜噜噜久久久久久91| 中文资源天堂在线| av视频在线观看入口| 亚洲av二区三区四区| 午夜福利在线观看吧| 身体一侧抽搐| 色视频www国产| 久久精品夜夜夜夜夜久久蜜豆| 丝袜喷水一区| 成年女人永久免费观看视频| 天天一区二区日本电影三级| 亚洲精品国产av成人精品| 国产成人精品久久久久久| 国产精品综合久久久久久久免费| 黄色视频,在线免费观看| 国产精品一区二区三区四区免费观看| 日本一二三区视频观看| 悠悠久久av| 熟女人妻精品中文字幕| 亚洲精品成人久久久久久| 午夜久久久久精精品| 亚洲内射少妇av| 久久久久久久久中文| 国产黄色小视频在线观看| 国产精品99久久久久久久久| 国产成人影院久久av| 在线观看av片永久免费下载| 国产一级毛片在线| 99热网站在线观看| 赤兔流量卡办理| 一区二区三区四区激情视频 | 三级毛片av免费| 亚洲精品成人久久久久久| 欧美丝袜亚洲另类| 日本黄大片高清| 欧美色欧美亚洲另类二区| 国产不卡一卡二| 国产日韩欧美在线精品| 久久综合国产亚洲精品| 欧美区成人在线视频| 国产美女午夜福利| 97人妻精品一区二区三区麻豆| 天堂影院成人在线观看| 97在线视频观看| 国内精品一区二区在线观看| 亚洲av免费高清在线观看| 国产av在哪里看| 中文字幕制服av| av免费在线看不卡| 97超碰精品成人国产| 99久久无色码亚洲精品果冻| 边亲边吃奶的免费视频| 成人鲁丝片一二三区免费| 国产高清激情床上av| 啦啦啦韩国在线观看视频| 黄色视频,在线免费观看| 国产精品1区2区在线观看.| 简卡轻食公司| 看非洲黑人一级黄片| 级片在线观看| 久久久精品欧美日韩精品| 人人妻人人澡人人爽人人夜夜 | 国产一区二区三区在线臀色熟女| 麻豆成人av视频| 午夜老司机福利剧场| 午夜福利高清视频| 欧美另类亚洲清纯唯美| 亚州av有码| 欧美高清成人免费视频www| 岛国在线免费视频观看| 1000部很黄的大片| 如何舔出高潮| 久久精品影院6| 亚洲最大成人中文| 亚洲最大成人手机在线| 精品人妻视频免费看| 男女那种视频在线观看| 免费观看人在逋| 亚洲国产高清在线一区二区三| 欧美色欧美亚洲另类二区| 丰满的人妻完整版| 日韩在线高清观看一区二区三区| 亚洲精品久久国产高清桃花| 久久久午夜欧美精品| 久久久久久久久久久丰满| 欧美性猛交黑人性爽| 一个人看的www免费观看视频| 精品人妻熟女av久视频| 亚洲欧美成人综合另类久久久 | 2022亚洲国产成人精品| 九九爱精品视频在线观看| 中文精品一卡2卡3卡4更新| 国产探花极品一区二区| 1024手机看黄色片| www日本黄色视频网| 联通29元200g的流量卡| 日韩av在线大香蕉| 永久网站在线| 欧美成人免费av一区二区三区| 久久精品影院6| 国内精品一区二区在线观看| 午夜爱爱视频在线播放| 精品国产三级普通话版| 人人妻人人看人人澡| videossex国产| 日本五十路高清| 免费黄网站久久成人精品| 国产成人福利小说| 国产黄片美女视频| 久久人人爽人人片av| 高清日韩中文字幕在线| 国产伦一二天堂av在线观看| 精品欧美国产一区二区三| 国产 一区精品| 国产乱人偷精品视频| 九九热线精品视视频播放| 三级男女做爰猛烈吃奶摸视频| 国产真实乱freesex| 久久精品夜夜夜夜夜久久蜜豆| 小蜜桃在线观看免费完整版高清| 亚洲精品久久国产高清桃花| 国产午夜精品久久久久久一区二区三区| 国产成人a区在线观看| а√天堂www在线а√下载| 男的添女的下面高潮视频| 久久精品国产亚洲av天美| 中文字幕熟女人妻在线| 欧美最新免费一区二区三区| 国产视频内射| 国产精品一区二区三区四区久久| 大香蕉久久网| 精品无人区乱码1区二区| 国产精品国产三级国产av玫瑰| 亚洲,欧美,日韩| 国产片特级美女逼逼视频| 成人国产麻豆网| 看片在线看免费视频| 亚洲精品久久国产高清桃花| 深夜a级毛片| av专区在线播放| av卡一久久| 免费看a级黄色片| 日韩视频在线欧美| 色播亚洲综合网| 国产三级中文精品| 国产高清三级在线| 欧美激情在线99| 国产精品久久久久久亚洲av鲁大| 国产色爽女视频免费观看| 日日干狠狠操夜夜爽| 国产三级中文精品| 日本一本二区三区精品| 欧美zozozo另类| 国产极品天堂在线| 精品久久久噜噜| 日日摸夜夜添夜夜爱| 99国产极品粉嫩在线观看| 久久久精品大字幕| 天天躁日日操中文字幕| av天堂在线播放| 日韩大尺度精品在线看网址| 美女内射精品一级片tv| 亚洲成人精品中文字幕电影| 国产av麻豆久久久久久久| 一级毛片我不卡| 哪个播放器可以免费观看大片| 麻豆一二三区av精品| 免费人成视频x8x8入口观看| 免费看a级黄色片| 免费人成在线观看视频色| 亚洲精品久久国产高清桃花| 18禁黄网站禁片免费观看直播|