• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems

    2021-12-11 13:32:22JinxinZuoYuemingLuHuiGaoTongPengZiyvGuoTongAnandEnjieLiu
    Computers Materials&Continua 2021年8期

    Jinxin Zuo,Yueming Lu,*,Hui Gao,Tong Peng,Ziyv Guo,Tong An and Enjie Liu

    1School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing,100876,China

    2Key Laboratory of Trustworthy Distributed Computing and Service(BUPT),Ministry of Education,Beijing,100876,China

    3School of Information and Communication Engineering,Beijing University of Posts and Telecommunications,Beijing,100876,China

    4University of Bedfordshire,Institute for Research in Applicable Computing(IRAC),Luton,UK

    Abstract:With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems (CHISs).The development of CHIS calls for an ISQE model based on security-critical components to improve the efficiency of system security evaluation urgently.In this paper,we summarize the implication of critical components in different filed and propose a recognition algorithm of security-critical components based on threat attack tree to support the ISQE process.The evaluation model establishes a framework for ISQE of CHISs that are updated iteratively.Firstly, with the support of asset identification and topology data, we sort the security importance of each asset based on the threat attack tree and obtain the security-critical components(set)of the CHIS.Then,we build the evaluation indicator tree of the evaluation target and propose an ISQE algorithm based on the coefficient of variation to calculate the security quality value of the CHIS.Moreover,we present a novel indicator measurement uncertainty aiming to better supervise the performance of the proposed model.Simulation results show the advantages of the proposed algorithm in the evaluation of CHISs.

    Keywords: Complex heterogeneous information system; security-critical component; threat attack tree; information security quantitative evaluation

    1 Introduction

    With the development of emerging technologies such as edge computing, big data, internet of things [1-7], information systems are evolving constantly.The heterogeneity of information systems is also increasing.To continuously supervise the security status of information systems and improve the security capabilities and compliance of information systems, it often needs to repeat the process of information security quantitative evaluation (ISQE) by a monitoring system, iteratively [8].However, traditional ISQE targets have characteristics of strong independence and low coupling among the modules, so it can only be evaluated as a whole [9].With the establishment of information security certification and accreditation system, the scope of certification has gradually extended from IT products, network critical equipment, network security products to services, systems, etc.[10].The currently included evaluation targets are divided into more detailed modules, which have poor applicability to CHISs.

    Connecting humans and objects through public or private networks are gradually becoming the Cyber-Physical System (CPS) or the Internet of Things (IoT) Information System [11].The IoT information system is a combination of wireless sensor networks (WSNs), computer networks,and cloud computing networks.As a representation of CHISs, the IoT information system has the characteristics of limited terminal resources, low power consumption, high availability, and high connectivity.The growth of the number of IoT information systems is a future trend.It is predicted that the number of IoT devices will reach 125 billion in 2030 [11].The architecture of the IoT information systems is mainly divided into three levels:“cloud-edge-terminal,”however,the specific topology structure may change over time.Therefore, it is necessary to construct the network topology through asset mapping to clarify the asset archives of the information system.With the large-scale deployment and application of the IoT information systems as well as frequent attacks, the security privacy protection and security evaluation of the IoT information system is still the direction of high attention [12-20].The diversified application scenarios and complex topology of the IoT information system have brought challenges to its information security quantitative evaluation.

    1.1 Motivation

    To address the efficiency issues of ISQE in CHISs, numerous researchers devote themselves to the formalization of the evaluation target and risk evaluation of CHISs.The comprehensive information security quantitative security evaluation for CHISs is a theoretically expected solution.

    However, due to the complex network topology and diverse data sources of CHISs, selecting security-critical components of CHISs can improve the efficiency and real-time nature of ISQE.To enhance the applicability of the ISQE model and improve the efficiency and effectiveness of the ISQE process, it is necessary to investigate and analyze the security architecture of the evaluated target, construct its description method, and abstract its security-critical components(set) to improve information the efficiency of security quality evaluation.

    By investigating existing researches, we note that a recognition algorithm of security-critical components for evaluation targets is still missing.Motivated by this observation, we attempt to build a recognition algorithm of security-critical components for the CHIS, and then we establish a quantitative indicator with aim of quantifying the model validity.

    1.2 Related Works

    To evaluate the information security quality of CHISs more efficiently, it is necessary to deal with the prominent contradiction between the system status update and the security requirements increase.The security-critical components (set) are selected in the process of formalizing the security function of the evaluation object, and it can help realize the formalization of the target of evaluation (ToE).The formalization of the security function of the evaluation object is very important to the overall ISQE.In the ISQE of CHISs, the security-critical components (set) are defined as core components that have an important impact on the information system in terms of security and may cause security problems.Constructing the security-critical components (set)of the evaluation object is the basis for completing the formalization of the security target of the evaluation object.

    Among the current information security standards, the Common Criteria (CC) provides a solution based on the (Protection Profile (PP) module [21].It can use basic PP to describe the core security function requirements of a class of products and increase the deformation requirements and new requirements by compiling PP modules, and further improve the protection profile of the evaluation object.The specific construction process of the protection profile is shown in Fig.1.

    Figure 1:Specific construction process of the protection profile

    The traditional definition of critical components is mostly carried out from the perspective of functionality and reliability analysis.From the perspective of production, critical components are generally defined as parts that have a long production cycle, complex processing, occupy a lot of resources, and require separate and safe production.From the perspective of functionality, critical components generally refer to the main functional components of the product [22].From the perspective of information security, security-critical components are defined as core components that have an important impact on systems, products, and services in terms of security, and may cause security problems.

    Many researchers have carried out selection and tracking studies of critical components in different fields.Xu [23] used RFID technology to track the key parts of the common rail pipe in the high-pressure common rail system, where the TOPSIS method was adopted to prioritize the replacement parts and then guided the production and management of the enterprise.According to the design parameters of the top drive system of a certain type of coalbed methane drilling rig,Lv [24] analyzed and designed the key components of the top drive system.Sun [25] studied the methods and procedures for identifying critical parts of reliability and quality in the identification of key parts of military-industrial enterprises and provided support for the model development process.To improve the overall safety level of military aircraft, Shi et al.[26] analyzed the management standards andstatus quoof the critical safety items of the US military aviation and then suggested that domestic management requirements and standards for the critical safety items of our military should be established.For the identification of key software components, Sheng et al.[27] proposed an identification method based on the characteristic index fault forest model.

    In the field of network security, there are some researches on the identification and tracking of critical components.In the process of information security certification and accreditation, Tao et al.[28] designed a threat tree-based identification algorithm for critical components of IT products in response to repeated evaluations and long evaluation cycles caused by IT product update iterations.The above algorithm provides a basis for product change control in information security certification.

    In terms of network equipment identification and spatial asset mapping, most of the existing cyberspace mapping systems use active or passive detection methods to draw device portraits in cyberspace and construct network topologies.For example, it is known that ZoomEye of Chuangyu Company [29], Qi’anxin Global Hawk System [30], Shodan cyberspace equipment search engine [31], etc., can detect infrastructure in some parts of the world, such as routing equipment, industrial networking equipment, IoT equipment, etc.Using search engine technology,users can use various filters to find specific types of devices connected to the Internet.The AMIT and MR-Net projects carried out by the ANT laboratory detect the current use of Internet resources, track the changing trends of topology and traffic, and mark relevant information on the network map to help researchers better improve network security and increase defensive ability.However, most of the current spatial mapping systems focus on the assets and open ports exposed in the public network of cyberspace, and there are fewer products for identifying and mapping specific information system assets.But the methods can be applied to enhance the breadth of basic data for ISQE.Aiming at the problem of device identification in virtual network space,Li [32] studied the network device identification system and realized the classification and identification of the network device system through network scanning, traffic collection, and decision tree algorithm.Yang et al.[33] proposed a method for identifying IoT devices based on traffic fingerprints, using the forest classification algorithm to identify and judge the types of devices newly connected to the Internet of Things.It provides support for the further construction of threat perception models.

    We can use asset mapping and threat modeling as the basis for the identification of securitycritical components (sets).By introducing the above technologies into the field of ISQE, the breadth of basic data for ISQE has been expanded.Based on the tracking and identification of security-critical components, we have simplified the tedious index combing process in the iterative evaluation process of the system and focused on important security-critical components.The model proposed in this paper can improve the efficiency of ISQE and verify the effectiveness of the proposed method in information security certification and accreditation through experiments.

    1.3 Our Contributions

    Although most of the work focuses on the formalization of ToE, selecting of security-critical components, and information evaluation algorithms.However, the work of formulating an efficient information evaluation model is not well studied.This paper proposes an ISQE model based on security-critical components (set) for CHISs, which is built upon analyzing and complementing the previous works.The main contributions of this paper are summarized as follows.

    1) We propose an ISQE model based on security-critical components (set).This model includes formalizing the ToE based on security-critical components (set), calculating information security quality value through quantitative evaluation algorithms, and determining security reinforcement strategy to make feedback adjustments.It can evaluate the information security quality of CHISs more efficiently.

    2) The proposed recognition algorithm of security-critical components based on threat attack tree can help the formalization process of ToE.It mainly contains four steps:Asset mapping, topology construction, threat modeling, and importance ranking based on threat attack tree.It can help formalize the ToE and improve the efficiency of ISQE.

    3) We consider the impact of different security-critical components (set) on ISQE.Moreover,we propose the measurement uncertainty to measure the model’s validity.These indicators address issues that the validity of evaluation models cannot be measured.

    The rest of this paper is organized as follows.Section 2 introduces the proposed ISQE model based on security-critical components (set).Section 3 explains the entire process of the evaluation model and verifies the validity of the algorithm using an example.Section 4 concludes and discusses the possible future research directions.

    2 Proposed Model

    Aiming at the problem of the lack of abstract description methods for CHISs, a recognition algorithm of security-critical components based on threat attack trees is proposed.Through formalization of security-critical components (set), an ISQE model based on security-critical components is proposed as shown in Fig.2.Under the conditions of dynamic changes in the information system, the applicability and evaluation efficiency of the ISQE model can be improved, providing support for the construction of the information system security reinforcement strategies.

    Figure 2:ISQE model based on security-critical components (set)

    In the process of formalizing the ToE, the protection profile of the ToE is constructed through the selected security-critical components (set).The information security quality value is calculated based on the quantitative evaluation model.Meantime, compared with the evaluation results of the original information system that has not formalized the security-critical components (set), a novel indicator of measurement uncertainty is presented to measure the effectiveness of the model proposed in this paper.

    2.1 The Recognition Algorithm of Security-Critical Components Based on Threat Attack Tree

    Through the asset mapping of the selected ToE, the network topology diagram of its information system is constructed.And then, the threats faced by each asset is conducted based on threat modeling.If the threat to the asset is more serious, and the higher probability of the threat realized, the more important the asset affected by the threat.We calculate the security importance of the asset based on the probability of the threat using the vulnerability to successfully implement the attack, combined with the loss and impact caused by the threat.Security importance [28] is an indicator that measures the importance of the assets of the ToE in terms of security.According to the ranking comparison of the security importance of assets, the security-critical components(sets) of the ToE is established.

    2.1.1 Asset Mapping

    In the field of network security, the network infrastructure is the object to be protected, called assets.Assets are a highly abstract concept, referring to valuable objects, which may be tangible or intangible.Assets are not only the target of the attacker or the system resources that must be used to achieve the attack target, but also the things that the defender hopes to protect, such as passwords, personal identification information, data resources, and systems, software, firewalls,VPNs and other equipment that must be destroyed to achieve the goal.The model proposed in this paper mainly refers to tangible and valuable objects in the analysis.

    In the process of asset mapping, assets and opened services are automatically obtained through multiple data acquisition methods such as active scanning and flow monitoring.Characteristics like asset fingerprint information, equipment type, and manufacturer are identified to construct asset files.

    The asset file of CHIS covers four parts:Asset ownership, network asset type, asset attribute,and asset risk, as shown in Fig.3.Through the establishment of asset files, sort out the network topology and asset details of the CHIS.

    Figure 3:Asset file of complex heterogeneous information systems

    2.1.2 Threat Modeling

    The threat tree model is a graphical risk modeling method proposed by Schneire [34] in 1999, which is similar to the attack tree model.The threat tree model begins with a general abstract description of all threats for a given ToE.The STRIDE threat model proposed by KOHNFELDER L and GARG P defines six general threats, which can be used to identify the root threat (RT) of each asset [35].Among them, STRIDE stands for the acronym of six threats:spoofing identity, tampering with data, repudiation, data disclosure, denial of service (DoS), and elevation of privilege, respectively.The specific meaning of the STRIDE threat model is shown in Tab.1.

    Table 1:The STRIDE threat model

    We use the STRIDE threat model to analyze each asset in a complex heterogeneous information system, analyze its threat attack tree, and identify the faced root threat (RT).Perform the second-level analysis of the RT to identify the attack threats it faces and mark it as STi(i = 1,2,...,m;j= 1,2,...,n).Analyze the third-layer of attack threatSTij,identify the specific attack means to achieveSTij, and record it as a basic security eventEijk (i=1,2,...,m;j=1,2,...,n;k=1,2,...,s).The basic security events are defined as independent events, that is, the relationship between the child nodes is logical OR.Using the STRIDE threat model to analyze assets is shown in Fig.4.

    Figure 4:Threat modeling process

    2.1.3 Importance Ranking Based on Threat Attack Tree

    The security importance ranking based on the threat attack tree depends on the threat modeling of assets.Firstly, basic security events are determined based on the threat modeling situation.Then, we analyze the attack cost (AC) of the basic security eventEijkto calculate the probabilityP(Eijk)of its occurrence and then obtain the basic probability of the occurrence of the attack threatMoreover, we calculate the safety importance of the asset by analyzing the severity of the loss ofSTij.

    In the calculation process of the probabilityof the occurrence of basic security events, it refers to the calculation method of attack potential against general products proposed in the information technology security assessment method CEM [36].We evaluate theACof basic security events from four indicators:attack time, equipment and facilities, professional technical capabilities, and data and access location, i.e.,= 〈At,Eq,Pc,Al〉, whereAtrepresents the time consumed by the attack,Eqrepresents the implementation level of the equipment,Pcrepresents the professional technical capability, andAlrepresents the data and access location.The efficiency numerical value of different indicators is shown in Tab.2.

    The weight vectorW=(w1,w2,w3,w4)of the above indicators is calculated by the Delphi method.It can also be calculated with other objective quantitative algorithms like the analytic hierarchy process (AHP) [37].And then, theACcan be calculated by the following equation.

    Table 2:The efficiency numerical values of different indicators

    The probability of occurrence of a basic security event is inversely proportional to its attack cost, that is, the lower the attack cost, the higher the probability of its occurrence.The calculation formula is as follows:

    According to the occurrence probability of basic security events, the occurrence probabilityofSTijin the above-mentioned threat attack tree analysis is calculated.Due to the logical OR relationship between basic security events, the calculation formula for the probability of the occurrence threatSTijis as follows:

    Analyze the severity of losscaused by the threatSTij, and it also needs to be evaluated and assigned according to the Delphi method.The assignment range is 1 to 5.And then,for each asset, according to the probability of occurrence of the threatSTijand the severity of the loss, the security importance is calculated.The formula is as follows:

    According to the sorting of the security importance degreeMi, the security-critical components (set) are identified.

    2.2 Information Security Quantitative Evaluation Algorithm Based on the Coefficient of Variation

    In order to better verify the effectiveness of the security-critical components (set) selection,it is reflected through the comparison of the ISQE results of the CHIS.We choose the information security quantitative evaluation algorithm based on coefficient variation to calculate the evaluation value.

    Under the guidance of our country’s information security standards, the specific indicator tree of ISQE for CHISs is made as shown in Fig.5.

    Figure 5:The specific indicator tree of ISQE for complex heterogeneous information systems

    Where first-level indicators contain asset monitoring, log collection, attack detection, and network traffic detection, and second-level indicator marks asXi={Xi1,Xi2,...,Xin}(i=1,2,...,4).The secondary indicators subordinate to asset monitoring include the number of security devices in the subnet, the types of services provided by each host in the subnet, and the types of operating systems of each host in the subnet.The secondary indicators of log collection include the number of alerts, frequency of bandwidth usage, and frequency of security incidents within the subnet.The secondary indicators of attack detection include four types of attack identification, which are port scan attack, distributed denial of service attack, brute force attack, and unknown attacks,respectively.The secondary indicators subordinate to network traffic detection include the average length of traffic, the average size of packets, the stream byte rate, the stream packet rate, and the proportion of abnormal traffic.

    Step 1:Indicator normalization processing

    Since the value ranges and dimensions of the collected assets, flow, vulnerability and other evaluation indicators are completely different.Then, we choose to use the more commonly dispersion standardization method to normalize indicators, the formula is shown below.

    Wherexiis thei-th secondary indicator,r1is the minimum value of the evaluation indicator,andr2is the maximum value of the evaluation indicator.Therefore, we can get a new sequencey1,y2,...,yn∈[0,1].

    Step 2:Indicator weight determination

    We choose the coefficient of variation algorithm to calculate the weight of the primary indicator and secondary indicator.Assuming there arekpieces of test data in total, each piece of data hasnevaluation indicators, and then ak×nmatrix is constructed, which is recorded as:

    Firstly, the formula to calculate the average ˉyjof each indicator is as follows.

    Then, calculate the standard deviationSjof each indicator, as shown in Eq.(7).

    Therefore, the calculation formula of the coefficient of variation is as follows.

    where the larger the value, the greater the degree of differentiation of thej-th indicator between different evaluation orders, and the greater the amount of information it can provide, so the indicator with violent fluctuations has a greater weight.So, the weightwjof thej-th indicator is:

    Step 3:Building the indicator correlation function

    According to the ISQE requirements and the actual situation of each evaluation indicator, we construct the corresponding correlation function [38].All indicators can be roughly divided into three categories:positive indicator, negative indicator, and median indicator.The positive indicator refers to the indicator that the larger value indicates a safer system, and the reverse indicator is the opposite.The median indicator refers to the indicator that takes the middle value to indicate that the system is safer.

    Therefore, the correlation function of the positive indicator is Eq.(10).

    The correlation function of the negative indicator is as follows.

    The correlation function of the median indicator is as follows.

    whereαandσare determined according to the actual situation of specific evaluation indicators.

    Step 4:Calculating the information security quality value

    Under the condition of obtaining sufficient test data, we use the linear weighting algorithm to calculate the comprehensive information security quality value of the ToE.The calculation formula is as follows.

    2.3 Evaluation Indicators

    According to the comparison of information security evaluation quality results, the novel indicator of measurement uncertainty is proposed to measure the effectiveness of the proposed evaluation model based on security-critical components.The calculation formula of measurement uncertainty is shown below.

    whereScoreISQE-allindicates ISQE results calculated from the data of all the components of the information system,ScoreISQE-criticalindicates ISQE results calculated from the data of securitycritical components (set) of the information system, andtrepresents the running time of the system test.The closer the value of the above formula is to 0, the better.

    3 Experimental Target and Results

    We evaluate the proposed model through an example of the experimental environment we built in the laboratory and get the evaluation results.

    3.1 Experimental Target

    The experimental environment settings of the CHIS we constructed are shown in Fig.6,including a managed node, a web server, a file server, a data server, a firewall, an attack machine,an intrusion detection system, and legitimate users.

    Figure 6:The experimental environment

    The experiment uses the SYN Flood attack as the attack method to establish a large number of incomplete TCP connections with the server, making it unable to respond to normal service requests from legitimate users, thereby achieving denial of service.During the attack process, the information security quality value of the information system is gradually reduced by increasing the attack intensity.Threats are dealt with by deploying security management and control strategies.The information security quality value of the information system is evaluated according to the relevant indicator data obtained in each link of the system operation.

    Specifically, we enter into two comparative trials.In the first set of experiments, we attacked the security-critical parts (sets) of the CHIS.In the other set of experiments, we attacked the non-security-critical parts (sets) of the CHIS.Compare the differences between the global ISQE results and the partial evaluation results with security-critical components in the two experiments.

    3.2 Experimental Results

    3.2.1 Identify the Assets and Build the Topology of ToE

    The simulation experiment focuses on the impact of the selection and construction of securitycritical components (set) on the evaluation of information security quality.Due to the network topology and asset identification of the CHIS have been completed based on the establishment of an experimental environment, the asset list has been formed.The asset identification granularity of CHISs is determined by the analyst, and this paper only focuses on the device level.A total of eight assets are identified, which are system entrance gateway, system entrance firewall,management node server, data server, web server, file system server, and terminals.

    3.2.2 Construct the Security-Critical Components

    We perform threat tree attack analysis for each asset.Root threats are identified using the STRIDE model among them.It further identified the attack threatsSTagainst the CHIS, namely access control destructionST1, semi-invasive attacksST2, invasive attacksST3, and environmental attackST4.Then, in terms of the attack threatST, we further identify the 14 basic security events that realize the attack and draw a threat attack tree for each asset, as shown in Figs.7, 8.

    Figure 7:Threat attack tree analysis of gateway and terminals

    Figure 8:Threat attack tree analysis of managed node, web server, data server, and file system server

    When analyzing the attack cost (AC) of basic security events, we mark and assign weights to the four elements 〈At,Eq,Pc,Al〉 based on the Delphi method firstly.According to Eqs.(1)and (2), we calculate the probability of occurrence of basic security events as shown in Tab.3.

    The basic security events under the threat of spoofing and denial of service have higher requirements for equipment and professionals, so the weight is assigned towEq=0.3,wPc=0.3,wAt= 0.2 andwAl= 0.2.The basic security events under the threat of elevation of privilege and tampering with data are highly dependent on professionals and access locations, so in terms of weight assignment,wPc=0.3,wAl=0.3,wAt=0.2 andwEq=0.2.As for the basic security events under information disclosure, the requirements for professionals are the highest.Under this condition, we set the weight of the quadruple aswPc=0.4,wAl=0.3,wEq=0.2 andwAt=0.1.

    Table 3:The list of basic security events and the probability of occurrence

    Based on Eq.(3), we can calculate the probability of threatSTij.Through analyzing the severity of lossc aused by the threatSTij, the security importance degreeMiof different assets can be calculated by Eq.(4).The security importance ranking result is shown in Tab.4.

    Table 4:The security importance ranking result

    We choose 4 as the threshold for the security importance ranking.So, the content of constructed security-critical components (set) is management node server, file system server, web server, data server, system entrance gateway, and system entrance firewall.

    3.2.3 Comparison of ISQE Results

    In the first set of experiments, we attacked the web server.And in the other set of experiment,we attaced the terminal B of the CHIS to get the experimental results as shown in Figs.9 and 10.

    The measurement uncertainty can be calculated by Eq.(14), i.e., Δθ1= 3.6413 and Δθ2=7.875.

    Through the analysis of the experimental results, it can be known that when attacking different parts of the CHIS, the information security evaluation model based on security-critical components (set) proposed in this paper can perform better system security quality evaluation.

    Figure 9:Comparison of the results of attacking security-critical components (set)

    Figure 10:Comparison of the results of attacking non-security-critical components (set)

    4 Conclusion

    The efficiency of ISQE hinders the update of security reinforcement strategies for CHISs.To solve the problem that there is a lack of an efficient evaluation model, this paper proposes an ISQE model based on security-critical components (set) to quantify theScoreISQEof the CHIS.The evaluation model includes three modules, (1) the core security-critical components (set)identification process based on threat attack tree, (2) the quantitative evaluation process based on the coefficient of variation algorithm, (3) the evaluation indicator of measurement uncertainty to supervise the validity of the proposed model.Also, our research provides ideas for the efficient implementation of information security certification and accreditation for information systems.

    Acknowledgement:The authors would like to thank anonymous reviewers who read drafts and made many helpful suggestions.

    Funding Statement:This work was supported in part by the National Key R&D Program of China under Grant 2019YFB2102400, 2016YFF0204001, and in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2019117.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    日韩一卡2卡3卡4卡2021年| 韩国精品一区二区三区| 丁香六月欧美| 国产欧美日韩一区二区精品| 日韩三级视频一区二区三区| 午夜视频精品福利| 99精品在免费线老司机午夜| 欧美色视频一区免费| 嫩草影院精品99| 韩国精品一区二区三区| 欧美日韩瑟瑟在线播放| 国产片内射在线| 午夜老司机福利片| 久久中文看片网| 欧美黑人精品巨大| 97碰自拍视频| 不卡av一区二区三区| 精品久久久久久久毛片微露脸| www.自偷自拍.com| 国产免费男女视频| 国产aⅴ精品一区二区三区波| 亚洲五月婷婷丁香| 一二三四社区在线视频社区8| 国产精品影院久久| 亚洲中文日韩欧美视频| 国产激情久久老熟女| a在线观看视频网站| 精品国产美女av久久久久小说| 少妇 在线观看| 久久青草综合色| 国产亚洲欧美98| 久久久精品欧美日韩精品| 国产主播在线观看一区二区| 亚洲精品中文字幕在线视频| 91精品国产国语对白视频| 自拍欧美九色日韩亚洲蝌蚪91| 国产精华一区二区三区| 国产精品自产拍在线观看55亚洲| 国产精品二区激情视频| 久久久国产欧美日韩av| 亚洲熟女毛片儿| 午夜福利影视在线免费观看| 级片在线观看| 禁无遮挡网站| 久久久久久国产a免费观看| 男人舔女人下体高潮全视频| 女人被躁到高潮嗷嗷叫费观| 亚洲色图av天堂| 又黄又爽又免费观看的视频| 中文字幕av电影在线播放| 精品久久蜜臀av无| 一边摸一边抽搐一进一小说| 19禁男女啪啪无遮挡网站| 亚洲avbb在线观看| 桃红色精品国产亚洲av| 91精品三级在线观看| 午夜a级毛片| 丝袜在线中文字幕| 亚洲欧美激情在线| 欧美乱色亚洲激情| 成人亚洲精品av一区二区| tocl精华| 大型av网站在线播放| 99在线人妻在线中文字幕| 91成人精品电影| 色老头精品视频在线观看| 50天的宝宝边吃奶边哭怎么回事| 黄色片一级片一级黄色片| 一夜夜www| 欧美激情极品国产一区二区三区| 欧美成人性av电影在线观看| 久久久精品欧美日韩精品| 99精品欧美一区二区三区四区| 美女免费视频网站| 激情视频va一区二区三区| 欧美绝顶高潮抽搐喷水| 国产成人av激情在线播放| 人妻久久中文字幕网| 大香蕉久久成人网| 亚洲精品国产精品久久久不卡| 久久狼人影院| 精品国产超薄肉色丝袜足j| 中文字幕精品免费在线观看视频| 真人做人爱边吃奶动态| 多毛熟女@视频| 国产亚洲欧美98| 久久性视频一级片| www.www免费av| 这个男人来自地球电影免费观看| 国产av精品麻豆| 色综合站精品国产| 欧美黄色片欧美黄色片| 国产蜜桃级精品一区二区三区| 男女午夜视频在线观看| 神马国产精品三级电影在线观看 | 变态另类成人亚洲欧美熟女 | 国产亚洲欧美在线一区二区| 美女高潮喷水抽搐中文字幕| 999久久久国产精品视频| 少妇粗大呻吟视频| 丁香六月欧美| 18禁观看日本| 曰老女人黄片| 侵犯人妻中文字幕一二三四区| 亚洲自偷自拍图片 自拍| 窝窝影院91人妻| 脱女人内裤的视频| 精品国内亚洲2022精品成人| 久久人妻av系列| 久久久久久久久免费视频了| 精品第一国产精品| 欧美成人免费av一区二区三区| 91麻豆av在线| 久久草成人影院| 国产亚洲欧美98| 亚洲人成电影免费在线| 日韩高清综合在线| 叶爱在线成人免费视频播放| 亚洲熟妇中文字幕五十中出| 日韩欧美一区二区三区在线观看| 久久人人精品亚洲av| 此物有八面人人有两片| 国产视频一区二区在线看| 欧美乱色亚洲激情| 亚洲专区国产一区二区| 国产亚洲精品一区二区www| 欧美中文综合在线视频| 欧美丝袜亚洲另类 | 日韩大码丰满熟妇| 成人亚洲精品av一区二区| 久久精品亚洲精品国产色婷小说| 日韩精品青青久久久久久| АⅤ资源中文在线天堂| 久久精品成人免费网站| 操美女的视频在线观看| 中文字幕高清在线视频| 久久婷婷成人综合色麻豆| 日韩欧美一区二区三区在线观看| 视频区欧美日本亚洲| 久久亚洲真实| 女警被强在线播放| 亚洲男人的天堂狠狠| 精品国产乱子伦一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看 | 日本精品一区二区三区蜜桃| 在线观看66精品国产| 9色porny在线观看| 欧美成人免费av一区二区三区| 最新在线观看一区二区三区| 欧美色欧美亚洲另类二区 | av天堂久久9| 麻豆国产av国片精品| 热99re8久久精品国产| 国产aⅴ精品一区二区三区波| 777久久人妻少妇嫩草av网站| 波多野结衣av一区二区av| 午夜免费观看网址| 叶爱在线成人免费视频播放| 日本一区二区免费在线视频| 欧美中文综合在线视频| 亚洲欧洲精品一区二区精品久久久| 免费一级毛片在线播放高清视频 | 成人亚洲精品一区在线观看| 一个人观看的视频www高清免费观看 | 精品电影一区二区在线| 午夜影院日韩av| 丰满的人妻完整版| 日韩欧美免费精品| 69精品国产乱码久久久| 亚洲一区高清亚洲精品| 人人澡人人妻人| 亚洲国产欧美网| 免费无遮挡裸体视频| 国产高清视频在线播放一区| 久久狼人影院| 亚洲av日韩精品久久久久久密| 一个人观看的视频www高清免费观看 | 老熟妇仑乱视频hdxx| 最好的美女福利视频网| 一a级毛片在线观看| 变态另类丝袜制服| 18禁美女被吸乳视频| 亚洲色图 男人天堂 中文字幕| 免费看美女性在线毛片视频| 亚洲人成电影观看| 免费观看人在逋| 国产精品av久久久久免费| 免费高清视频大片| 99国产精品一区二区蜜桃av| 大香蕉久久成人网| 在线播放国产精品三级| 成年人黄色毛片网站| 亚洲人成电影免费在线| 一边摸一边抽搐一进一小说| 热99re8久久精品国产| 非洲黑人性xxxx精品又粗又长| 国产激情久久老熟女| 女人爽到高潮嗷嗷叫在线视频| 成人特级黄色片久久久久久久| 亚洲国产精品999在线| 久久精品影院6| 亚洲七黄色美女视频| 日本一区二区免费在线视频| 色尼玛亚洲综合影院| 搡老熟女国产l中国老女人| 国产亚洲av高清不卡| 97人妻精品一区二区三区麻豆 | 欧美乱码精品一区二区三区| 成年版毛片免费区| 国产精品免费视频内射| 亚洲精品久久成人aⅴ小说| 国产伦人伦偷精品视频| 很黄的视频免费| xxx96com| 热re99久久国产66热| 91成人精品电影| 亚洲av日韩精品久久久久久密| 久99久视频精品免费| 国产在线精品亚洲第一网站| 天天一区二区日本电影三级 | 黄片大片在线免费观看| 99久久精品国产亚洲精品| 亚洲精品国产一区二区精华液| 久久久久久久久免费视频了| 天天一区二区日本电影三级 | 色精品久久人妻99蜜桃| bbb黄色大片| 亚洲欧美日韩高清在线视频| 国产亚洲精品一区二区www| 亚洲av五月六月丁香网| 国产主播在线观看一区二区| 久久久久久久久久久久大奶| 法律面前人人平等表现在哪些方面| 久久青草综合色| 色老头精品视频在线观看| 色哟哟哟哟哟哟| 中文字幕人成人乱码亚洲影| 亚洲第一青青草原| 午夜福利免费观看在线| 久久精品成人免费网站| 精品一区二区三区四区五区乱码| 免费久久久久久久精品成人欧美视频| 国产精品亚洲av一区麻豆| 成人18禁高潮啪啪吃奶动态图| 精品国产国语对白av| 亚洲一区中文字幕在线| 亚洲精品中文字幕在线视频| 欧美av亚洲av综合av国产av| 亚洲av美国av| cao死你这个sao货| 亚洲男人的天堂狠狠| 侵犯人妻中文字幕一二三四区| 无遮挡黄片免费观看| 亚洲性夜色夜夜综合| 国产精品亚洲av一区麻豆| 亚洲国产欧美网| 亚洲国产欧美日韩在线播放| 美女午夜性视频免费| 香蕉丝袜av| 可以在线观看的亚洲视频| 亚洲欧美日韩高清在线视频| 变态另类成人亚洲欧美熟女 | 欧美人与性动交α欧美精品济南到| 亚洲精品国产色婷婷电影| 亚洲午夜精品一区,二区,三区| 此物有八面人人有两片| 久久精品影院6| 久久久久久久久久久久大奶| 国产成人av教育| 人人澡人人妻人| 变态另类成人亚洲欧美熟女 | x7x7x7水蜜桃| 两个人看的免费小视频| 亚洲一区中文字幕在线| 亚洲国产精品sss在线观看| 极品教师在线免费播放| 很黄的视频免费| 亚洲av片天天在线观看| ponron亚洲| 国产三级黄色录像| 别揉我奶头~嗯~啊~动态视频| 正在播放国产对白刺激| 老司机在亚洲福利影院| 久久亚洲精品不卡| 国产高清有码在线观看视频 | 中文字幕色久视频| 亚洲男人的天堂狠狠| 无限看片的www在线观看| 一边摸一边抽搐一进一出视频| 欧美在线黄色| 亚洲成人国产一区在线观看| 亚洲五月天丁香| 如日韩欧美国产精品一区二区三区| 亚洲avbb在线观看| www日本在线高清视频| 男人舔女人的私密视频| 中文字幕人妻丝袜一区二区| 亚洲成av人片免费观看| 欧美一级a爱片免费观看看 | 国产色视频综合| 制服人妻中文乱码| 国产精品98久久久久久宅男小说| 欧美成人午夜精品| 黑人巨大精品欧美一区二区蜜桃| 国产精品日韩av在线免费观看 | 老司机深夜福利视频在线观看| 涩涩av久久男人的天堂| 日本a在线网址| 成熟少妇高潮喷水视频| 99久久99久久久精品蜜桃| 99久久久亚洲精品蜜臀av| 亚洲无线在线观看| 18禁黄网站禁片午夜丰满| 中文字幕久久专区| 国产成人欧美| 岛国视频午夜一区免费看| 亚洲精华国产精华精| 成熟少妇高潮喷水视频| 咕卡用的链子| 亚洲精品在线观看二区| 久久久国产精品麻豆| 中文字幕人妻熟女乱码| 啦啦啦观看免费观看视频高清 | 最近最新中文字幕大全免费视频| 免费在线观看亚洲国产| 波多野结衣巨乳人妻| 欧美亚洲日本最大视频资源| 欧美日本中文国产一区发布| 十八禁人妻一区二区| 亚洲国产中文字幕在线视频| 亚洲最大成人中文| 久久国产精品男人的天堂亚洲| 成在线人永久免费视频| 国产欧美日韩综合在线一区二区| 淫妇啪啪啪对白视频| 在线观看免费视频日本深夜| 亚洲片人在线观看| 国产成人精品久久二区二区91| 最新在线观看一区二区三区| 精品高清国产在线一区| 午夜视频精品福利| 欧美黑人欧美精品刺激| 亚洲精品久久国产高清桃花| 黄色丝袜av网址大全| 麻豆成人av在线观看| 两个人免费观看高清视频| 欧美成人性av电影在线观看| 久久久精品国产亚洲av高清涩受| netflix在线观看网站| av天堂在线播放| 亚洲av成人av| 在线观看日韩欧美| 欧美性长视频在线观看| 国产av一区二区精品久久| 久久中文字幕人妻熟女| 国产高清videossex| 999精品在线视频| 国产精品九九99| 日本vs欧美在线观看视频| 欧美绝顶高潮抽搐喷水| 国产av一区二区精品久久| 99香蕉大伊视频| 在线观看舔阴道视频| 国产男靠女视频免费网站| 久久人妻熟女aⅴ| 久久久久国产一级毛片高清牌| 成年版毛片免费区| 亚洲成av片中文字幕在线观看| 免费在线观看黄色视频的| 亚洲一区二区三区不卡视频| 国产xxxxx性猛交| 中亚洲国语对白在线视频| 最新美女视频免费是黄的| 纯流量卡能插随身wifi吗| 欧美日韩亚洲综合一区二区三区_| 欧美一级毛片孕妇| 亚洲成人免费电影在线观看| 亚洲精品国产精品久久久不卡| 亚洲欧美激情综合另类| 久久久久国产精品人妻aⅴ院| 1024香蕉在线观看| 欧美色视频一区免费| 可以在线观看毛片的网站| 亚洲欧美日韩无卡精品| 亚洲aⅴ乱码一区二区在线播放 | 老熟妇乱子伦视频在线观看| 欧美+亚洲+日韩+国产| 啦啦啦 在线观看视频| 亚洲五月婷婷丁香| 伦理电影免费视频| 亚洲午夜精品一区,二区,三区| 男女午夜视频在线观看| 午夜福利免费观看在线| 精品欧美国产一区二区三| 啦啦啦观看免费观看视频高清 | 久久九九热精品免费| 亚洲精品av麻豆狂野| 国产亚洲精品第一综合不卡| 色播亚洲综合网| 9色porny在线观看| www.自偷自拍.com| 人成视频在线观看免费观看| 9色porny在线观看| 久久久久亚洲av毛片大全| 国产精品久久久久久人妻精品电影| 黑人欧美特级aaaaaa片| 日韩精品青青久久久久久| 男女下面插进去视频免费观看| 级片在线观看| 在线观看www视频免费| 久久精品影院6| 久久久久久亚洲精品国产蜜桃av| 女性被躁到高潮视频| 日韩欧美一区视频在线观看| 一区二区三区精品91| 99国产精品99久久久久| 国产又色又爽无遮挡免费看| 麻豆av在线久日| av天堂久久9| 一进一出抽搐gif免费好疼| 极品教师在线免费播放| 亚洲男人的天堂狠狠| 久久久久久免费高清国产稀缺| 90打野战视频偷拍视频| 人妻久久中文字幕网| 日本黄色视频三级网站网址| 91成年电影在线观看| 国产精品久久电影中文字幕| 国产视频一区二区在线看| 啦啦啦 在线观看视频| 可以免费在线观看a视频的电影网站| 老熟妇乱子伦视频在线观看| 女生性感内裤真人,穿戴方法视频| 国产精品 欧美亚洲| 国产精品久久久av美女十八| 免费在线观看黄色视频的| 国产精品一区二区精品视频观看| 国产亚洲精品av在线| 国产又爽黄色视频| 久久久久国内视频| 91在线观看av| 久久精品aⅴ一区二区三区四区| 国产精华一区二区三区| 国产1区2区3区精品| 国产成人系列免费观看| 欧美成人一区二区免费高清观看 | 99热只有精品国产| 国产精品香港三级国产av潘金莲| 亚洲精品中文字幕一二三四区| 人妻丰满熟妇av一区二区三区| 亚洲美女黄片视频| 亚洲人成电影观看| 9191精品国产免费久久| 国产精品久久久久久精品电影 | 午夜福利免费观看在线| 黄色丝袜av网址大全| 好男人电影高清在线观看| 日本a在线网址| 亚洲色图综合在线观看| 欧美在线黄色| 一级作爱视频免费观看| 国产精品国产高清国产av| 亚洲精品国产精品久久久不卡| 美女扒开内裤让男人捅视频| 亚洲全国av大片| 久久天躁狠狠躁夜夜2o2o| 丝袜美足系列| 亚洲视频免费观看视频| 日本一区二区免费在线视频| 亚洲精品一卡2卡三卡4卡5卡| 国产精品爽爽va在线观看网站 | 亚洲男人天堂网一区| 午夜老司机福利片| 欧美 亚洲 国产 日韩一| 亚洲精品美女久久av网站| 非洲黑人性xxxx精品又粗又长| 欧美精品啪啪一区二区三区| 午夜福利一区二区在线看| 青草久久国产| 无限看片的www在线观看| 亚洲精品久久成人aⅴ小说| 热99re8久久精品国产| 黄色成人免费大全| 欧美日韩亚洲综合一区二区三区_| 亚洲情色 制服丝袜| 国产在线观看jvid| 国产精品美女特级片免费视频播放器 | 后天国语完整版免费观看| 手机成人av网站| 叶爱在线成人免费视频播放| 国产99久久九九免费精品| 婷婷六月久久综合丁香| 欧美丝袜亚洲另类 | 久久性视频一级片| 淫妇啪啪啪对白视频| 成人三级黄色视频| 制服诱惑二区| 欧美不卡视频在线免费观看 | 午夜激情av网站| 一级a爱片免费观看的视频| 黄片大片在线免费观看| 久久精品亚洲精品国产色婷小说| 男女床上黄色一级片免费看| 久久久久国产一级毛片高清牌| 国产成人欧美| 啪啪无遮挡十八禁网站| 亚洲av片天天在线观看| 1024香蕉在线观看| 久久精品国产99精品国产亚洲性色 | 亚洲精品av麻豆狂野| 久久精品aⅴ一区二区三区四区| 国产97色在线日韩免费| 国产成人欧美| 黄片大片在线免费观看| 午夜激情av网站| 51午夜福利影视在线观看| 精品高清国产在线一区| 午夜免费观看网址| 国产激情久久老熟女| 欧美日本亚洲视频在线播放| 精品国产一区二区久久| 12—13女人毛片做爰片一| 久久性视频一级片| 久久香蕉精品热| 视频在线观看一区二区三区| 一级a爱视频在线免费观看| 又大又爽又粗| 丝袜美足系列| 国产亚洲欧美在线一区二区| 免费一级毛片在线播放高清视频 | 91在线观看av| 国产成人精品在线电影| 一本综合久久免费| 少妇裸体淫交视频免费看高清 | 亚洲精品粉嫩美女一区| svipshipincom国产片| 男女下面进入的视频免费午夜 | 在线观看免费视频网站a站| 国产97色在线日韩免费| 亚洲欧美日韩无卡精品| 免费在线观看亚洲国产| 久久久久久人人人人人| 91国产中文字幕| 亚洲专区国产一区二区| 男女下面插进去视频免费观看| 熟妇人妻久久中文字幕3abv| 啪啪无遮挡十八禁网站| 精品国产亚洲在线| 香蕉国产在线看| 一区二区三区激情视频| 桃红色精品国产亚洲av| 在线观看免费视频日本深夜| 最近最新免费中文字幕在线| 一级a爱视频在线免费观看| 午夜福利视频1000在线观看 | 日韩大码丰满熟妇| 精品一区二区三区视频在线观看免费| 18禁黄网站禁片午夜丰满| 韩国精品一区二区三区| 极品人妻少妇av视频| 久久久久亚洲av毛片大全| 色综合欧美亚洲国产小说| 黄色女人牲交| 两个人看的免费小视频| 国产一区二区激情短视频| 一级毛片女人18水好多| 午夜福利,免费看| 成人18禁在线播放| 日韩欧美一区视频在线观看| 午夜福利成人在线免费观看| 美女免费视频网站| 老司机午夜福利在线观看视频| 91成人精品电影| 桃色一区二区三区在线观看| 伊人久久大香线蕉亚洲五| 操出白浆在线播放| 欧美一区二区精品小视频在线| 午夜免费激情av| 国产精品亚洲一级av第二区| 久久精品成人免费网站| 少妇 在线观看| 中亚洲国语对白在线视频| 亚洲专区国产一区二区| 亚洲aⅴ乱码一区二区在线播放 | 久久精品人人爽人人爽视色| 麻豆一二三区av精品| 国产精品日韩av在线免费观看 | 欧美黑人欧美精品刺激| 欧美久久黑人一区二区| 岛国视频午夜一区免费看| 国产精品一区二区免费欧美| 欧美激情 高清一区二区三区| 国产人伦9x9x在线观看| 免费av毛片视频| 亚洲天堂国产精品一区在线| 黄片小视频在线播放| 亚洲情色 制服丝袜| 国产精品一区二区三区四区久久 | 18禁美女被吸乳视频| 两性午夜刺激爽爽歪歪视频在线观看 | 成年人黄色毛片网站| 亚洲一区二区三区色噜噜| 久久九九热精品免费| 国产一级毛片七仙女欲春2 | 亚洲精华国产精华精| 久热爱精品视频在线9| www.www免费av| 国产99白浆流出| 69精品国产乱码久久久| 日本免费一区二区三区高清不卡 | 成人特级黄色片久久久久久久| 久久性视频一级片| 丝袜在线中文字幕| 99久久国产精品久久久| 国产男靠女视频免费网站|