• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Link Analysis Algorithm for Identifcation of Key Hidden Services

    2021-12-14 10:28:42AbdullahAlharbiMohdFaizanWaelAlosaimiHashemAlyamiMohdNadeemSuhelAhmadKhanAlkaAgrawalandRaeesAhmadKhan
    Computers Materials&Continua 2021年7期

    Abdullah Alharbi,Mohd Faizan,Wael Alosaimi,Hashem Alyami,Mohd Nadeem Suhel Ahmad Khan,Alka Agrawal and Raees Ahmad Khan,*

    1Department of Information Technology,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    2Department of Information Technology,Babasaheb Bhimrao Ambedkar University,Lucknow,226025,India

    3Department of Computer Science,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    4Department of Computer Science,Indira Gandhi National Tribal University,Amarkantak,84886,India

    Abstract:The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities.The network has unfortunately become a means to perpetuate crimes like illegal drugs and firearm trafficking,violence and terrorist activities among others.The government and law enforcement agencies are working relentlessly to control the misuse of Tor network.This is a study in the similar league,with an attempt to suggest a link-based ranking technique to rank and identify the influential hidden services in the Tor dark web.The proposed method considers the extent of connectivity to the surface web services and values of the centrality metrics of a hidden service in the web graph for ranking.The modified PageRank algorithm is used to obtain the overall rankings of the hidden services in the dataset.Several graph metrics were used to evaluate the effectiveness of the proposed technique with other commonly known ranking procedures in literature.The proposed ranking technique is shown to produce good results in identifying the influential domains in the tor network.

    Keywords: Dark web; Tor hidden services; ranking; link analysis

    1 Introduction

    The rapid growth of Internet technology and its outreach to the general public has made it easier to conduct a range of services.Along with this, the ever-growing technology has also been used to perform illegal and criminal activities.The dark web is a prime example of the abuse of Internet technology where unethical and illegal acts are predominantly present.The sale of forged documents, counterfeits, illegal drugs and firearm trafficking are some of the grey activities that are carried out on the dark web [1].TheOnion Router (Tor), Freenet and I2Pare the methods to access the dark web with the Tor being the most commonly used method [2].These methods ensure the anonymity of the users while surfing the dark web.The websites or the web services on the Tor dark web network are commonly referred to as thehidden services.

    The profound level of privacy and anonymity provided by the Tor dark web has increased the illegal activities on these anonymous platforms.The law enforcement agencies have been continuously monitoring the hidden services to track the criminals.Among all the hidden services in the Tor network, some of the influential or key hidden services that exclusively offer illegal products and services usually have a significant user base.Such hidden services need immediate and dedicated efforts by the law enforcement agencies to track them down.The identification of such hidden services could prove beneficial and to the initiatives being undertaken by the law enforcement agencies in monitoring the illegal activities over the Tor dark web network.

    Most of the studies on the Tor dark web network explore the attributes and working of the hidden services by scraping the data using a web crawler followed by its analysis to get insight into the hidden services and possible conclusions.However, the data collected could also be used to identify the prominent hidden services among others by using the graph theory and link analysis algorithms.The influential domain in a Tor network is the one on which the users end after surfing the network moving from one hidden service to the other.In this paper, we present a hyperlink based algorithm for ranking the Tor hidden services to identify the influential services in the Tor network.

    The government and law enforcement agencies could focus their efforts on the top-ranked hidden services for further surveillance and monitoring.Though the top-ranked websites identified by the proposed ranking algorithm represent the key hidden services, the other hidden services should not be left off, instead, the concerned authorities should devise strategies to appropriately divide their efforts in targeting the illicit content on the Tor dark web.The proposed ranking algorithm is shown to be performing better than the other link analysis algorithm for the dark web.The performance of the proposed ranking algorithm is evaluated on the metrics like the graph density, clustering coefficient, average shortest path length, giant component and diameter of the equivalent graph representing the Tor network.The dataset for the experiment was collected with the help of thecustomized Python crawler.

    The rest of the paper is divided as follows:Section 2 reviews the existing work on the link analysis algorithms.Section 3 describes the proposed ranking methodology.Section 4 provides the experimental setup followed by results and discussion in Section 5.Section 6 provides the conclusion of the work.

    2 Materials and Methods

    2.1 Pertinent Related Work

    The Tor dark web has experienced a considerable increase in the number of hidden services after the rise of the Silk Road marketplace that has reported the business of more than USD 150 million [3].Many of the studies on the Tor network have focused on the characteristics and working of the hidden services offering illicit products [4–7].One of the preliminary studies on the hidden services was conducted on the Silk Road marketplace [8].The author of the study meticulously collected the data over a period followed by its analysis.The data showed that drugs and psychoactive substances were the most popular choices among the users.Other studies have tried to find the operational style of the product vendors, the geographical distribution of customers and vendors, business environment on the Tor network, quality of product and services and advertising strategies [9–11].Additionally, the dark web forums have also been studied to get customers’feedback and reviews about the products and services based on their shopping experience [12].

    Al-Nabki et al.[13] leveraged the data collected by their customized crawler from the Tor domains to propose a novel hyperlink analysis algorithm called ToRank for ranking the Tor hidden services.The authors presented the dataset of Tor domains called DUTA-10K and implemented the ToRank algorithm on the dataset to evaluate the effectiveness of the proposed ranking algorithm.The performance of the ToRank algorithm was compared with the benchmark link analysis algorithm:PageRank, HITS, and Katz.The ToRank outperformed the benchmark algorithm with a significant margin on several graph robustness metrics like the graph density,clustering coefficient, etc.The rankings of the hidden services generated by the ToRank algorithm could be utilized to detect the influential domains.

    In another study, a content-based approach was proposed for ranking the Tor hidden services [14].However, the proposed approach specifically targeted illegal drug trafficking on the dark web cryptomarkets.The commonly available drugs on the Tor hidden services were assigned a harm score based on several criteria.A metric was proposed to calculate the overall harm score of a hidden service using the individual score of the drug substance present on that hidden service.The overall harm score reflects the amount of threat posed by the hidden service.The hidden services were then ranked based on their harm score to detect the most dangerous service among others.The efficacy of the proposed ranking approach was evaluated on the ground truth data by using the well-known ranking metrics.The content-based approach could easily detect even the isolated nodes (hidden services with no incoming or outgoing hyperlinks)that would otherwise have been skipped by the link-based approach.

    While only limited work has been performed to rank the Tor content for identifying key services, plenty of work has been done on the same ranking task for the surface web content.Both the link-based and content-based approaches were adopted including the hybrid approach for ranking the surface web services [15,16].Many studies in this context have proposed approaches for detecting influential users on social network platforms.A study has analyzed the distribution of followers of the users on the micro-blogging platform Twitter to identify the most influential user.The influence of the user was estimated by constructing the graph representing the follower’s network and then applying the PageRank algorithm [15].In another study, an algorithm was proposed for identifying the influence of nodes in the micro-blogging network.The algorithm considers the out-degree of the nodes and their neighbors to calculate the influence of the node.The identification of the influential nodes in the network could help in appropriately putting the advertisement in the network [16].A model was proposed to estimate the variation in the user’s influence by using thecontinuous-time Markov process.The nodes in the model represent the user,while the edges join the users having an interest in common topics [17].

    In yet another study, several graph metrics likedegree centrality, betweennessandcloseness centralitywere employed to track money laundering crimes [18].A modified PageRank algorithm called the User Rank algorithm was proposed to detect influential users in a network through the analysis of the message content and user’s attentiveness [19].The combination of content and link-based approaches could be employed to obtain a hybrid approach for identifying influential nodes in a network.A hybrid approach was proposed to identify radical users in the dark web discussion forums [20].The authors developed a metric to calculate the radical nature of a user in the forum.The radical score was incorporated into a modified PageRank algorithm to obtain a ranked list of radical users.

    The ToRank algorithm only considers the hyperlinks between the hidden services to rank them and to detect the influential domains.However, it has been found that most of the Tor hidden services also have connectivity to the surface web [21].The rise in the number of hyperlinks to the surface websites increases the chance of data theft and information leakage through the malicious hidden services [21].Therefore, the out-going links to the surface websites may indicate the influential nature of the hidden services in the Tor network.Therefore, identifying such hidden services could lead to a disruption in the network by law enforcement agencies.Hence, in our approach of ranking, we have also considered the significance of the out-going links with the surface web.

    2.2 Methodology

    The proposed ranking approach requires the generation of a web graph corresponding to the Tor hidden services in the dataset.The ranking algorithm is then applied on the graph to obtain a list of the hidden services in a ranking order.

    2.2.1 Construction of Web Graph

    The web graph is created by representing each of the hidden services in the dataset as the nodes or vertices of the dataset.The hyperlinks between the two hidden services are represented by a directed edge between their corresponding nodes in the graph.All the self-loops and parallel edges were removed from the graph.The out-going hyperlinks to the surface websites were recorded for each of the nodes.In case of several hyperlinks from a node to the different web pages of a surface website, only one hyperlink was considered for that node.A hyperlink is discarded if it points to a hidden service that does not exist in the dataset.The web graph thus obtained is used by the algorithm for ranking.

    2.2.2 Ranking Procedure

    The proposed ranking approach consists of three different components to measure the influence of nodes in the graph.The definition of the various symbols is given in Tab.1.

    Table 1:Definition of the symbols used

    2.2.3 Influence of Surface Web Hyperlinks

    In this paper, we have considered the significance of the out-going surface web links to the importance of a hidden service in the network.The hyperlinks to surface websites may indicate that the hidden service is willing to advertise its product and services over the open web where a relatively large number of users are present.The influence of the surface web hyperlinks of a node v_i isτ(v_i) which is defined as the ratio of the number of surface web hyperlinks to the degree centrality of v_i.τ(v_i) is given by Eq.(1), note that one is added in the denominator to avoid the indeterminate form.In the case of isolated nodes, theτ(v_i) will be the total number of out-going hyperlinks to the surface web.

    2.2.4 Influence of Node Connectivity

    The influence of the node connectivity is defined by the significance of the location of the node in the Tor web graph.A user arriving at a node with a good location in the network would have a better probability of moving to other regions of the network through the neighboring nodes, a neighbor of the neighboring nodes and so on until the user reaches the desired node.Therefore, such nodes hold an influential position in the Tor ecosystem and identification of the same may be fruitful in terms of law enforcement perspective.

    The centrality metrics used in the graph theory indicates the relative significance of a node in the graph.The different centrality measures reflect the importance of the node’s location in the graph.The centrality value can indicate the ability of the node to bypass a large number of users because it has several paths passing through them [22].Closeness, degree and betweenness centrality are three metrics for obtaining the centrality of the node.

    In the Tor web graph, a node with a high degree centrality would facilitate the movement of a higher number of users through it than the node with a low degree centrality.If the node has a greater closeness centrality value, it would better control the movement of the user and allows the rapid dispersal of the users.The greater value of the betweenness centrality of the node would enable a quicker movement of the users to the entire web graph through a few intermediate nodes.The influence of the connectivity of the node v_i in the network is represented byμ(v_i) and is defined by Eq.(2).

    2.2.5 Calculating Overall Influence

    The ranking metric presented here is used to assign an influence score to a node based on the influence value of the node’s surface web links and its connectivity in the graph.The influence metric that measures the overall influence of the node differs from the centrality metrics in the sense that it considers the ability of the node in facilitating the movement of the users through the entire Tor network.Each of the nodes in the graph has a different ability to propagate the users and hence have a different influence score.The influence score of the node v_(i) is given byδ(v_i) and is defined by Eq.(3).

    In the Tor network, each of the hidden services has a different influence and significance as compared to the other services.Thus the procedure of identifying the key hidden services is equivalent to the ranking problem where the top-ranked service would be the most influential one among others.The influential nature of a hidden service is governed by other hidden services to which the former has out-going hyperlinks along with its characteristics.If a hidden service has outgoing connections with the highly influential hidden services, then it would positively contribute to its influence.The PageRank algorithm is appropriate in such scenarios for incorporating the influence of the neighboring nodes [23].

    The proposed ranking algorithm is based on a modified PageRank algorithm to detect the influential hidden services from the Tor web graph.Each of the nodes in the Tor web graph is assigned an initial value reflecting the influence score and is updated iteratively according to the Eq.(4) until the convergence is achieved.

    In Eq.(4), a ∈[0, 1] is the damping factor and is set to 0.85 [24], Q_i is the set of all nodes having an incoming hyperlink from the node v_(i).The logarithm of the product of r(v_j) andδ(v_i) is used to obtain the cumulative influence of v_(i) and its immediate neighbors.Moreover,one is added to the product to avoid getting zero in the argument (whenδ(v_i) is zero) for which the log function is undefined.

    The final rank of the node v_i is governed by two factors:A.) the influence scoreδ(v_i), and B.) r(v_j) which represents the effect of connections to other nodes.If Q_i = {?} for a node v_i,then r (v_i) will be equal to 0.15.Thus the node v_i is influential only if it provides the gateway for the users to move to other nodes in the network through it.The removal of a node with no outgoing connectivity would not cause much disruption in the Tor network, also the removal of only a single hidden service has proved to be a costly and time-consuming operation [25].Therefore, the proposed ranking approach would identify the influential nodes whose elimination would cause much disruption in the Tor network.

    2.3 Experimental Setup

    2.3.1 Dataset

    The dataset for the study was created using a customized Python web crawler for scraping the Tor hidden services.The web crawler was designed to connect to the hidden services using the SOCKS proxy [25].Initially, the web crawler was provided with a small list of onion domains calledseedsfrom the publicly available Tor directories [26,27].The crawler connects with each of the seeds, upon successful connection the crawler scrapes the hidden service and searches for the new onion domains.Once all the seeds have been explored by the crawler, the newly found domains from the initial seeds were saved for subsequent operations.The above procedure is repeated on the newly discovered links.Finally, the crawler was able to found 4041 active hidden services, the content of the home page of each of the active hidden services including the HTML tags was stored in the individual files.

    For our ranking procedure, the content of each of the hidden services needs to be parsed to extract only the hyperlinks and discard other textual content.A parser based on regular expressions was utilized to extract the hyperlinks to the surface web and Tor dark web.The hyperlinks to other dark web networks, internet relay chat addresses and sub-domains were eliminated.

    2.3.2 Evaluation Metrics

    The performance of the proposed ranking algorithm is compared with that of the PageRank [28] and ToRank [13] algorithm.In line with the earlier studies [28–31], several graph metrics that evaluate the graph structure shall be used to test the effectiveness of our proposed ranking algorithm.Graph density indicates the connectedness of the graph, a high graph density value refers to the strong connectivity of the graph.The graph density is given by Eq.(5).

    The graph density curve could be used to measure the robustness of the graph [29].The top-ranked nodes and the associated edges are eliminated from the graph one by one and the graph density is calculated at every removal.The removal process is terminated when the density becomes zero.Following the method of Al-Nabki et al.[13], the ranking algorithm that covers the smallest area under the graph density curve shall be the most effective in identifying the influential nodes in the Tor network graph.If the ranking algorithm has correctly ranked the influential nodes, the removal of the top-ranked nodes would result in a dramatic reduction in the graph density.This is because the influential nodes hold the key location in the network with good connectivity and their removal should disintegrate the graph.

    The clustering coefficient [29] and the average shortest path length [30] could also be used to measure the robustness of the graph structure.A decrease in the clustering coefficient after removing the top-ranked nodes indicates a significant breakdown in the graph structure [31].On the other hand, an increase in the average shortest path upon removal of the top-ranked nodes reflects the good ranking of the nodes [29].The removal of top-ranked nodes one by one is a costly affair due to the high computation complexity of the clustering coefficient at every step,hence the clustering coefficient is calculated only at the removal of the top 1st, 5th, 10th and 20th percentile as in earlier study [13].

    2.3.3 Parameter Settings

    The Python NetworkX library was used to construct the graph from the corresponding hidden services in the dataset.The proposed ranking algorithm iteratively computes the score of each of the nodes until convergence is achieved.The algorithm is supposed to achieve convergence when the error between the score of a node in the current iteration and the preceding iteration is less than 0.0001.The parameter value of the PageRank and ToRank were set according to as in previous work [13].All the experiments were performed on a machine running on Intel i5 CPU with 4 GB of RAM and Windows 8.1 operating system.

    3 Data Interpretations and Results

    The Tor web graph generated from the dataset consists of 4041 nodes representing the corresponding hidden services and 14059 edges.The influential score returned by the ranking algorithm is used to rank the nodes in descending order.The top-ranked nodes were repeatedly removed and the graph density was calculated at every iteration.The graph density curve of the PageRank, ToRank and the proposed ranking algorithm are shown in Fig.1.The proposed ranking algorithm obtains the smallest area under the graph density curve which is 0.013.The ToRank algorithm achieves the second smallest area of 0.015 which is very close to the proposed algorithm.On the other hand, the PageRank algorithm covers a relatively large area under the curve and is the largest among the three approaches.

    Figure 1:Graph density curves of the three algorithms

    The performance of the proposed ranking algorithm on the other graphs’robustness is shown in Tab.2.The values of the metrics are shown after the removal of top-ranked nodes at different percentiles and the value of metrics for the full web graph with all the nodes and edges intact is shown.The proposed algorithm produces a significant decrease in the clustering coefficient of the graph.The average shortest path also experienced an increase in its length after the removal of the top-ranked nodes.Moreover, the diameter of the graph has increased to 26 after the removal of the top 20% influential nodes.The results indicate the better performance of the proposed algorithm over the other two algorithms.

    Table 2:Comparison of the proposed ranking technique with the other algorithms

    The proposed ranking algorithm is based on an iterative calculation of the influence score depending on the connectivity of the node with its immediate neighbors.Initially, a small influence score is assigned to each of the nodes, once the algorithm achieves convergence, the node that has connections to the other influential nodes in the network will have a much better score than the other.However, being a link analysis algorithm, it cannot evaluate the influence of isolated nodes with zero outgoing and incoming hyperlinks.

    4 Conclusions

    An iterative algorithm is proposed in this work to calculate the influence of a hidden service in the Tor network.The influence of a hidden service depends upon its location and connectivity in the Tor network as well as its connectivity to the surface web.Moreover, the influential nature of the hidden service is also determined by its connection to the other services in the network.All these factors are incorporated into an algorithm to determine the overall influence of a hidden service.The proposed algorithm is implemented on a dataset of Tor hidden services and is compared with other link analysis algorithm from the existing literature.The proposed algorithm achieves better performance than the other algorithms measured in terms of various graphs’robustness metrics.

    Acknowledgement:This research was supported by Taif University Researchers Supporting Project Number (TURSP-2020/231), Taif University, Taif, Saudi Arabia.

    Funding Statement:Funding for this study was granted by Taif University Research Supporting Projects at Taif University, Kingdom of Saudi Arabia under the Grant No.TURSP-2020/231.

    Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产在线视频一区二区| 精品国产国语对白av| a级毛片在线看网站| 每晚都被弄得嗷嗷叫到高潮| 亚洲精品国产一区二区精华液| 狠狠狠狠99中文字幕| 日韩电影二区| 天堂俺去俺来也www色官网| 久久 成人 亚洲| 在线观看免费午夜福利视频| 久久人妻福利社区极品人妻图片| 日韩 欧美 亚洲 中文字幕| 亚洲三区欧美一区| 丝袜美足系列| svipshipincom国产片| 欧美成狂野欧美在线观看| 中文字幕人妻丝袜制服| 国产亚洲精品第一综合不卡| 91麻豆av在线| 免费在线观看完整版高清| 精品一区二区三区四区五区乱码| 精品国产超薄肉色丝袜足j| 在线永久观看黄色视频| av天堂久久9| 久热这里只有精品99| 日日摸夜夜添夜夜添小说| 少妇裸体淫交视频免费看高清 | 热99re8久久精品国产| 国产精品影院久久| 亚洲av男天堂| 久久精品熟女亚洲av麻豆精品| 欧美精品啪啪一区二区三区 | 99热国产这里只有精品6| 69av精品久久久久久 | 中文字幕精品免费在线观看视频| 一区二区av电影网| 中文字幕另类日韩欧美亚洲嫩草| 啦啦啦免费观看视频1| 中文字幕av电影在线播放| 日本vs欧美在线观看视频| 黄频高清免费视频| 久久久欧美国产精品| 亚洲国产成人一精品久久久| 亚洲精品第二区| 久久午夜综合久久蜜桃| 91国产中文字幕| 啦啦啦免费观看视频1| 欧美97在线视频| 天天躁日日躁夜夜躁夜夜| 一级,二级,三级黄色视频| 狠狠精品人妻久久久久久综合| 各种免费的搞黄视频| 99国产精品免费福利视频| 91麻豆精品激情在线观看国产 | av不卡在线播放| 亚洲第一欧美日韩一区二区三区 | 一区二区三区激情视频| 国产成人免费观看mmmm| 免费高清在线观看日韩| 亚洲国产av新网站| 亚洲欧美一区二区三区黑人| 日韩视频一区二区在线观看| 最近中文字幕2019免费版| 亚洲人成77777在线视频| 国产欧美日韩精品亚洲av| 亚洲国产看品久久| 精品少妇久久久久久888优播| 国产亚洲精品久久久久5区| 亚洲国产毛片av蜜桃av| 国产精品免费视频内射| 欧美另类一区| 一本—道久久a久久精品蜜桃钙片| 十八禁网站网址无遮挡| 欧美性长视频在线观看| 日本vs欧美在线观看视频| 男女下面插进去视频免费观看| 在线精品无人区一区二区三| 啦啦啦 在线观看视频| 精品视频人人做人人爽| 国产在线一区二区三区精| 999精品在线视频| 老汉色∧v一级毛片| 侵犯人妻中文字幕一二三四区| 在线十欧美十亚洲十日本专区| 啦啦啦在线免费观看视频4| 亚洲五月色婷婷综合| tube8黄色片| 久久中文字幕一级| √禁漫天堂资源中文www| 丁香六月欧美| 97在线人人人人妻| 51午夜福利影视在线观看| 最新在线观看一区二区三区| 欧美精品啪啪一区二区三区 | 精品少妇黑人巨大在线播放| 后天国语完整版免费观看| 9色porny在线观看| 亚洲精品国产av蜜桃| 国产91精品成人一区二区三区 | 美女扒开内裤让男人捅视频| 午夜两性在线视频| 国产三级黄色录像| 菩萨蛮人人尽说江南好唐韦庄| 亚洲精品av麻豆狂野| 丝袜在线中文字幕| 日韩视频一区二区在线观看| 国产精品免费大片| 亚洲欧美精品综合一区二区三区| 黄片小视频在线播放| 18在线观看网站| 久久人人爽av亚洲精品天堂| 亚洲国产欧美日韩在线播放| 最近中文字幕2019免费版| 欧美黄色淫秽网站| 王馨瑶露胸无遮挡在线观看| 女人精品久久久久毛片| 久久人人爽人人片av| 欧美日韩成人在线一区二区| av在线老鸭窝| 午夜免费成人在线视频| 久久 成人 亚洲| 欧美大码av| www.熟女人妻精品国产| 爱豆传媒免费全集在线观看| 久久久久国产一级毛片高清牌| 日本一区二区免费在线视频| 伊人亚洲综合成人网| 久久九九热精品免费| 视频在线观看一区二区三区| 青草久久国产| 中亚洲国语对白在线视频| 最新的欧美精品一区二区| 叶爱在线成人免费视频播放| 亚洲欧美成人综合另类久久久| 窝窝影院91人妻| 婷婷色av中文字幕| 国产亚洲精品久久久久5区| 视频区图区小说| 免费一级毛片在线播放高清视频 | 亚洲中文av在线| 亚洲第一青青草原| 精品亚洲乱码少妇综合久久| 在线 av 中文字幕| a 毛片基地| 国产精品熟女久久久久浪| 国产成人a∨麻豆精品| 久久99热这里只频精品6学生| 欧美精品av麻豆av| 日本撒尿小便嘘嘘汇集6| √禁漫天堂资源中文www| 人人妻人人添人人爽欧美一区卜| 日韩中文字幕视频在线看片| 日本撒尿小便嘘嘘汇集6| 老司机福利观看| 色婷婷av一区二区三区视频| 涩涩av久久男人的天堂| 久久久国产一区二区| 免费观看人在逋| 国产男女超爽视频在线观看| 十八禁网站免费在线| 久久精品熟女亚洲av麻豆精品| 国产av一区二区精品久久| 亚洲精品一二三| 亚洲,欧美精品.| 一二三四社区在线视频社区8| 久久国产精品大桥未久av| 亚洲欧美精品自产自拍| 久久99一区二区三区| 成年人黄色毛片网站| 精品国产一区二区久久| 丰满人妻熟妇乱又伦精品不卡| 秋霞在线观看毛片| 精品久久久久久久毛片微露脸 | 美女福利国产在线| 精品一品国产午夜福利视频| 欧美日韩福利视频一区二区| 9热在线视频观看99| 久热这里只有精品99| 香蕉国产在线看| 男男h啪啪无遮挡| 国产野战对白在线观看| 欧美精品人与动牲交sv欧美| 国产成人a∨麻豆精品| 国产日韩欧美在线精品| 国产一区二区三区av在线| 色播在线永久视频| av视频免费观看在线观看| 成人黄色视频免费在线看| 亚洲成人手机| 精品视频人人做人人爽| 99热国产这里只有精品6| 咕卡用的链子| 欧美黑人欧美精品刺激| 男女下面插进去视频免费观看| 亚洲精品国产精品久久久不卡| 少妇的丰满在线观看| 欧美日韩成人在线一区二区| av网站免费在线观看视频| 久久久水蜜桃国产精品网| 欧美黑人精品巨大| 国产伦理片在线播放av一区| 欧美日韩中文字幕国产精品一区二区三区 | 老司机在亚洲福利影院| 亚洲av男天堂| 黄色视频,在线免费观看| 国产又爽黄色视频| 久久女婷五月综合色啪小说| 最新的欧美精品一区二区| 精品国产乱码久久久久久小说| 国产欧美日韩综合在线一区二区| 亚洲美女黄色视频免费看| 最新在线观看一区二区三区| 亚洲av电影在线观看一区二区三区| 又黄又粗又硬又大视频| 97精品久久久久久久久久精品| 搡老岳熟女国产| 亚洲九九香蕉| 免费女性裸体啪啪无遮挡网站| 女人被躁到高潮嗷嗷叫费观| 女人高潮潮喷娇喘18禁视频| tube8黄色片| 窝窝影院91人妻| 我的亚洲天堂| 久久久久网色| 国产在线一区二区三区精| 欧美日本中文国产一区发布| 中亚洲国语对白在线视频| 婷婷丁香在线五月| 一区二区三区乱码不卡18| 老司机靠b影院| 国产精品国产av在线观看| av超薄肉色丝袜交足视频| 人妻久久中文字幕网| 人妻人人澡人人爽人人| 动漫黄色视频在线观看| 久久av网站| 亚洲激情五月婷婷啪啪| 丝袜喷水一区| 在线永久观看黄色视频| 久久这里只有精品19| 亚洲欧美日韩另类电影网站| 国产精品自产拍在线观看55亚洲 | www.999成人在线观看| 色精品久久人妻99蜜桃| 日本五十路高清| av欧美777| 国产精品九九99| 如日韩欧美国产精品一区二区三区| 亚洲欧洲精品一区二区精品久久久| 亚洲中文日韩欧美视频| 国产成人欧美| 青春草亚洲视频在线观看| 人妻人人澡人人爽人人| 丝袜喷水一区| 久久女婷五月综合色啪小说| 99久久国产精品久久久| 丰满少妇做爰视频| 亚洲国产毛片av蜜桃av| 精品国产乱码久久久久久男人| 色婷婷av一区二区三区视频| 热99国产精品久久久久久7| 欧美av亚洲av综合av国产av| 亚洲第一青青草原| 一级a爱视频在线免费观看| 十八禁高潮呻吟视频| 人妻一区二区av| 在线观看免费午夜福利视频| 黑人猛操日本美女一级片| 国内毛片毛片毛片毛片毛片| 桃红色精品国产亚洲av| 久久青草综合色| 午夜精品国产一区二区电影| 99re6热这里在线精品视频| 亚洲一区二区三区欧美精品| 日本猛色少妇xxxxx猛交久久| 欧美日韩精品网址| 国产不卡av网站在线观看| 国产色视频综合| 国产av国产精品国产| 午夜免费成人在线视频| 男女之事视频高清在线观看| 国产男女内射视频| 久久人人爽人人片av| 男女床上黄色一级片免费看| 操出白浆在线播放| 国产成人精品久久二区二区免费| 成年av动漫网址| 大陆偷拍与自拍| 午夜老司机福利片| 99热全是精品| 精品福利永久在线观看| 中文字幕精品免费在线观看视频| 日韩熟女老妇一区二区性免费视频| 两个人看的免费小视频| 久久亚洲精品不卡| 亚洲综合色网址| 十八禁高潮呻吟视频| 久久久国产成人免费| 久久人人爽人人片av| 大型av网站在线播放| 色播在线永久视频| 深夜精品福利| 伦理电影免费视频| 日韩电影二区| 99热网站在线观看| 成年av动漫网址| 欧美成狂野欧美在线观看| 国产精品一区二区精品视频观看| 中文字幕另类日韩欧美亚洲嫩草| 国产av精品麻豆| 亚洲欧洲日产国产| 在线十欧美十亚洲十日本专区| 国产熟女午夜一区二区三区| 黄色毛片三级朝国网站| 亚洲 国产 在线| 中文字幕人妻丝袜一区二区| 亚洲国产av影院在线观看| 精品卡一卡二卡四卡免费| 一边摸一边抽搐一进一出视频| 精品亚洲成a人片在线观看| 国产亚洲精品久久久久5区| 色婷婷av一区二区三区视频| 丝袜脚勾引网站| 精品乱码久久久久久99久播| 亚洲精品日韩在线中文字幕| www.精华液| 国产精品久久久久成人av| 欧美日韩亚洲高清精品| 亚洲av美国av| 这个男人来自地球电影免费观看| 黑人猛操日本美女一级片| 国产亚洲一区二区精品| 一个人免费在线观看的高清视频 | 高清黄色对白视频在线免费看| 亚洲精品中文字幕一二三四区 | 亚洲色图综合在线观看| 久久久久网色| 久久综合国产亚洲精品| 一边摸一边抽搐一进一出视频| 三上悠亚av全集在线观看| 在线观看www视频免费| 丝袜喷水一区| 啦啦啦 在线观看视频| 99国产精品一区二区蜜桃av | a级毛片黄视频| 777米奇影视久久| 亚洲va日本ⅴa欧美va伊人久久 | 两个人免费观看高清视频| 黑丝袜美女国产一区| 中文精品一卡2卡3卡4更新| 老熟妇乱子伦视频在线观看 | 成人黄色视频免费在线看| 啦啦啦视频在线资源免费观看| 99久久人妻综合| 纵有疾风起免费观看全集完整版| 国产片内射在线| av线在线观看网站| 人成视频在线观看免费观看| 亚洲情色 制服丝袜| 啦啦啦免费观看视频1| 麻豆av在线久日| 亚洲九九香蕉| 大码成人一级视频| 老熟妇仑乱视频hdxx| 岛国毛片在线播放| 日韩三级视频一区二区三区| 国产男人的电影天堂91| 国产欧美日韩一区二区三区在线| 国产欧美日韩一区二区三 | av有码第一页| 久久久久久亚洲精品国产蜜桃av| 亚洲国产成人一精品久久久| 考比视频在线观看| 一区在线观看完整版| 一本久久精品| 考比视频在线观看| 免费女性裸体啪啪无遮挡网站| 777米奇影视久久| 国产日韩欧美视频二区| 成人亚洲精品一区在线观看| 国产97色在线日韩免费| 男人爽女人下面视频在线观看| 另类亚洲欧美激情| 精品一区二区三区四区五区乱码| 一本大道久久a久久精品| 国产免费av片在线观看野外av| 最新的欧美精品一区二区| 热re99久久国产66热| 精品亚洲成国产av| 性色av乱码一区二区三区2| xxxhd国产人妻xxx| 黑人巨大精品欧美一区二区蜜桃| 美女高潮到喷水免费观看| av超薄肉色丝袜交足视频| 午夜激情久久久久久久| 亚洲精品国产av成人精品| 下体分泌物呈黄色| 亚洲精品在线美女| 性色av乱码一区二区三区2| 中文欧美无线码| 久久香蕉激情| 欧美日韩中文字幕国产精品一区二区三区 | 精品国内亚洲2022精品成人 | 一区二区三区四区激情视频| avwww免费| 精品人妻1区二区| 日韩一卡2卡3卡4卡2021年| 天天躁夜夜躁狠狠躁躁| 国产一区二区三区在线臀色熟女 | 久久99一区二区三区| 五月开心婷婷网| 欧美日韩精品网址| 女人精品久久久久毛片| 伊人久久大香线蕉亚洲五| 如日韩欧美国产精品一区二区三区| 在线观看免费视频网站a站| 黑人操中国人逼视频| 国产成人精品无人区| 99久久人妻综合| 男女下面插进去视频免费观看| 欧美成人午夜精品| 伦理电影免费视频| 最新的欧美精品一区二区| 中文字幕制服av| 亚洲国产中文字幕在线视频| 亚洲激情五月婷婷啪啪| 少妇 在线观看| 成人国产av品久久久| 亚洲免费av在线视频| 黄色视频不卡| 老司机亚洲免费影院| 中文精品一卡2卡3卡4更新| 国产一区有黄有色的免费视频| 亚洲欧洲日产国产| 亚洲精品久久久久久婷婷小说| 亚洲视频免费观看视频| 日本wwww免费看| 欧美日本中文国产一区发布| 丝袜脚勾引网站| 久久久久久亚洲精品国产蜜桃av| 亚洲第一青青草原| 国产亚洲av高清不卡| 久久青草综合色| 国产xxxxx性猛交| 久久人人97超碰香蕉20202| 久久亚洲精品不卡| 大陆偷拍与自拍| 最新的欧美精品一区二区| 两人在一起打扑克的视频| 十分钟在线观看高清视频www| 亚洲av男天堂| 亚洲国产精品一区三区| 国产亚洲欧美精品永久| 欧美精品人与动牲交sv欧美| 日韩有码中文字幕| 50天的宝宝边吃奶边哭怎么回事| 国产精品久久久久久精品古装| a级片在线免费高清观看视频| 美女大奶头黄色视频| 满18在线观看网站| 男男h啪啪无遮挡| 国产精品影院久久| 国产亚洲欧美在线一区二区| 国产国语露脸激情在线看| 国产片内射在线| 啦啦啦视频在线资源免费观看| 国产一级毛片在线| 欧美老熟妇乱子伦牲交| 狠狠婷婷综合久久久久久88av| 国产一区二区三区在线臀色熟女 | av线在线观看网站| 99国产精品免费福利视频| 电影成人av| 亚洲成国产人片在线观看| 免费一级毛片在线播放高清视频 | 91成年电影在线观看| 丝袜人妻中文字幕| 美女扒开内裤让男人捅视频| 免费av中文字幕在线| 青青草视频在线视频观看| 91九色精品人成在线观看| 国产淫语在线视频| 亚洲人成77777在线视频| 日韩中文字幕视频在线看片| 精品国产国语对白av| 18禁观看日本| 一二三四社区在线视频社区8| 亚洲精品久久久久久婷婷小说| 夫妻午夜视频| 国产成人免费观看mmmm| 国产精品一区二区免费欧美 | 免费少妇av软件| 成年美女黄网站色视频大全免费| 精品久久蜜臀av无| 中文字幕精品免费在线观看视频| 日本91视频免费播放| 久久久欧美国产精品| 久久九九热精品免费| 亚洲avbb在线观看| av免费在线观看网站| 99精品欧美一区二区三区四区| 制服诱惑二区| 亚洲国产精品一区三区| 亚洲精品第二区| 啦啦啦免费观看视频1| 狠狠婷婷综合久久久久久88av| 免费不卡黄色视频| 精品国产国语对白av| 18禁观看日本| 日本精品一区二区三区蜜桃| 天天操日日干夜夜撸| 免费看十八禁软件| 高清av免费在线| 精品久久久精品久久久| 纯流量卡能插随身wifi吗| 男女床上黄色一级片免费看| 高清黄色对白视频在线免费看| 色婷婷av一区二区三区视频| 免费一级毛片在线播放高清视频 | 国产一区有黄有色的免费视频| 国产又色又爽无遮挡免| 中亚洲国语对白在线视频| 熟女少妇亚洲综合色aaa.| 午夜福利影视在线免费观看| 精品视频人人做人人爽| 在线观看免费日韩欧美大片| 69av精品久久久久久 | 国产一区二区 视频在线| 不卡一级毛片| 国产高清视频在线播放一区 | 18禁观看日本| videosex国产| 极品人妻少妇av视频| 咕卡用的链子| 午夜福利视频在线观看免费| 国产高清视频在线播放一区 | 青青草视频在线视频观看| 精品卡一卡二卡四卡免费| 纯流量卡能插随身wifi吗| 久久精品人人爽人人爽视色| 在线观看免费午夜福利视频| 国产97色在线日韩免费| 我要看黄色一级片免费的| 国产在线观看jvid| 亚洲中文av在线| 99久久国产精品久久久| 色播在线永久视频| 极品少妇高潮喷水抽搐| videosex国产| 18禁裸乳无遮挡动漫免费视频| 一区二区av电影网| cao死你这个sao货| 黑人猛操日本美女一级片| 亚洲中文字幕日韩| 精品人妻一区二区三区麻豆| 叶爱在线成人免费视频播放| 国产极品粉嫩免费观看在线| 欧美人与性动交α欧美精品济南到| 99久久国产精品久久久| 丁香六月欧美| 日韩 亚洲 欧美在线| 一区二区日韩欧美中文字幕| 亚洲精品自拍成人| 亚洲欧美成人综合另类久久久| 爱豆传媒免费全集在线观看| 国产成+人综合+亚洲专区| 欧美久久黑人一区二区| 黄片播放在线免费| 成人18禁高潮啪啪吃奶动态图| 国产成人精品久久二区二区免费| 国产精品国产三级国产专区5o| 老司机靠b影院| 一区二区三区激情视频| 宅男免费午夜| 亚洲人成电影免费在线| netflix在线观看网站| 下体分泌物呈黄色| 精品少妇内射三级| videos熟女内射| 久久精品国产亚洲av高清一级| 高清av免费在线| 精品福利观看| 少妇精品久久久久久久| 热99久久久久精品小说推荐| 桃红色精品国产亚洲av| 国产免费视频播放在线视频| 18禁观看日本| 国产av精品麻豆| 中文字幕色久视频| 在线十欧美十亚洲十日本专区| 一级毛片女人18水好多| 好男人电影高清在线观看| 香蕉丝袜av| 欧美中文综合在线视频| 又紧又爽又黄一区二区| 久久久久久免费高清国产稀缺| 18禁国产床啪视频网站| 日本一区二区免费在线视频| 亚洲 欧美一区二区三区| 男人舔女人的私密视频| 午夜视频精品福利| 香蕉丝袜av| 国产欧美日韩综合在线一区二区| 啦啦啦视频在线资源免费观看| 无遮挡黄片免费观看| av网站免费在线观看视频| 丰满人妻熟妇乱又伦精品不卡| 飞空精品影院首页| 久久中文字幕一级| 嫁个100分男人电影在线观看| 日日摸夜夜添夜夜添小说| 波多野结衣av一区二区av| 这个男人来自地球电影免费观看| 精品国产乱子伦一区二区三区 | 免费在线观看影片大全网站|