• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Network Log-Based SSH Brute-Force Attack Detection Model

    2021-12-14 10:28:44JeonghoonParkJinsuKimGuptaandNamjePark
    Computers Materials&Continua 2021年7期

    Jeonghoon Park,Jinsu Kim,B.B.Gupta and Namje Park,*

    1Department of Convergence Information Security,Graduate School,Jeju National University,Jeju,63243,Korea

    2Department of Computer Engineering,National Institute of Technology Kurukshetra,Kurukshetra,136119,India

    Abstract: The rapid advancement of IT technology has enabled the quick discovery,sharing and collection of qualityinformation,but has also increased cyberattacks at a fast pace at the same time.There exists no means to block these cyberattacks completely, and all security policies need to consider the possibility of external attacks.Therefore,it is crucial to reduce external attacks through preventative measures.In general,since routers located in the upper part of a firewall can hardly be protected by security systems,they are exposed to numerous unblocked cyberattacks.Routers block unnecessary services and accept necessary ones while taking appropriate measures to reduce vulnerability,block unauthorized access, and generate relevant logs.Most logs created through unauthorized access are caused by SSH brute-force attacks, and therefore IP data of the attack can be collected through the logs.This paper proposes a model to detect SSH brute-force attacks through their logs,collect their IP address, and control access from that IP address.In this paper, we present a model that extracts and fragments the specific data required from the packets of collected routers in order to detect indiscriminate SSH input attacks.To do so,the model multiplies a user’s access records in each packet by weights and adds them to the blacklist according to a final calculated result value.In addition,the model can specify the internal IP of an attack attempt and defend against the first 29 destination IP addresses attempting the attack.

    Keywords: SSH brute-force attack; ELK Stack; IT infra; log; access control

    1 Introduction

    In recent years, IT technology has been making rapid progress at an unprecedented pace.This has enabled us to quickly find, collect, and share quality data; but it has also brought to us a growing number of cyberattacks that snatch and forge data during data communication [1–4].Cyberattacks come in a variety of forms.In a general attack, data are first collected from the target, and this is followed by invasion into a system based on the collected data [5–8].Continuous intrusions into the system and attacks against other systems connected to the target system take place [9–11].Numerous security systems are being installed on IT infrastructure to decrease the number of cyberattacks to an allowable level and protect important data assets through intensified security.Security systems are built redundantly with multiple devices, such as IPS (Intrusion Preventing System), to more comprehensively analyze the traffic authorized by the firewall, which serves the most basic role in security [12–15].Security systems are installed in the user’s PC with security software in case security accidents occur [16–19].Despite the extensive security systems of IT infrastructure, Internet routers located close to the Internet are often not protected by a separate device.Routers connect different networks, and designate and transfers optimal paths of packets [20–22].Through ICMP or IP Scanning, router or network information can be easily identified, based on which malicious attacks may occur [23–25].Some cyberattacks, such as worms, viruses, and distributed denial of service (DDos), are mainly aimed to destroy the systems on a network while other cyberattacks pretend to be normal packets and persistently attempt intrusion into a certain system [26–29].In particular, attack systems that evolve along with increasingly enhanced security systems are becoming more intelligent, using machine learning and deep learning to carry out more sophisticated attacks [30–33].Deep learning (DL) is one of the technologies most frequently applied to defend against these network attacks.By adding the concept of learning to existing methods, research continues to be carried out to collect and defend a variety of information, such as the record of packet flows or access, and the usage patterns of access requesters.In particular, blacklists organized for collected IPs are generally based on collected logs, and studies have been conducted on reducing incorrect blacklist settings and controlling access through learning IP data for blacklists [34–38].This research proposes a model to detect SSH brute-force attacks against the Internet router through logs, collect their IP address, and control access from that IP address.

    2 Related Research

    2.1 SSH(Secure Shell)

    Known as one of the most important remote access protocols, Secure Shell (SSH) logs into another computer through communications or executes commands to a system, copies files, and performs various functions [28,29].In existing application programs and protocols without an encryption process, such as Telnet using plain-text communication, there is a high possibility that account information and execution commands are extorted.In contrast, SSH ensures safe management and confidentiality of communications by supporting remote system communications through strong authentication and encryption [30].

    In general, network systems should be directly connected using a console in the initial setting,but they are used by supporting remote access through SSH.While the user who remotely accesses the system allowing SSH service is typically a manager, it cannot be assumed that all access requests come from managers.Thus, permission of remote access requests from all origins may expose a system to threats, and it is important to allow manager IPs to access SSH only remotely and establish appropriate policies for the start and end points of the firewall [31].

    2.2 Brute-Force Attack

    In brute-force attacks, the attacker submits all possible values as account inputs and attempts to access the system’s account information.Methods employed in brute-force attacks are divided into dictionary attack methods, which try all strings in a pre-arranged listing, and random sequence methods, which try all possible string combinations in a sequence [32].A common way to defend against brute-force attacks is to control access when wrong passwords are entered more than a certain number of times.In the case of servers, the threshold for login failure is set through the account lock policy, and access to the account is restricted when the threshold is exceeded [33].Additionally, the complexity of the password, password usage duration, and minimum password length are set in the password policy to protect the system and its account from being snatched due to a simple password.While network systems do not block access following login failures exceeding the threshold, they do prevent unauthorized access through the ACL.Thus, Internet routers have logs on many attempts of unauthorized external access, and these can serve as a valuable reference for the access control policy.

    2.3 Related Research Trend

    Controlling accessing IPs by a blacklist prepared through security log analysis is useful to defend against random attacks.This section provides various study cases in which attackers are specified through a blacklist.

    Dooyong mentioned that a blacklist of IP addresses is an important element for IT system protection.While various aspects of data and their operation records must be thoroughly reviewed for the blacklisting of IP addresses, the majority of current IP blacklists rely on security monitoring by skilled experts in specific domains.To solve this problem, he designed and established a blacklist model adopting machine learning (ML), and arranged and sorted out data through logistic regression analysis and a random forest; this resulted in incorrectly set blacklists being decreased by 90% [34].

    Meanwhile, Dmytro warned that while blacklists of IP addresses and domains exist as components for various security systems, it is difficult for them to be applied to certain risks such as zero-day attacks.He estimated the accuracy of the model’s prediction by crossing IPs in the blacklists with a blacklist dataset containing about 270,200 unique blacklisted IPs.His method was more effective than another recent blacklist prediction method [35].

    Meanwhile, Rick emphasized the risk of brute-force attacks against web applications and their damage, and noted that the detection of attacks was based on the server’s log file analysis,host-based intrusion detection system, or firewall, indicating several relevant problems.Further,he investigated the feasibility of a network-based monitoring approach that detects brute-force attacks against web applications in an encrypted environment and their damage.Afterward, he analyzed brute-force attacks through histograms on data packet payload sizes based on IP Flow Information Export (IPFIX) [36].

    3 Structure of the Proposed SSH Brute-Force Attack Detection Model

    3.1 Setting a SSH Brute-Force Attack Detection Model

    This research designed an access control policy to detect IPs approaching a system maliciously through the logs generated from a router, one of the devices comprising IT infrastructure, and prepared a blacklist of IPs with higher risk levels to protect the system from malicious access.

    A blacklist refers to a specific problematic IP group and to the technology applied to block specific IPs.Fig.1 shows the proposed SSH brute-force attack detection model.

    To identify IP groups suspected of accessing the system through a brute-force attack, we needed to obtain SSH brute-force attack logs from the router, and fragment and analyze their content.The IPs that had a high frequency of attacks were listed to be used in the blocking policy of routers and other security equipment.The detection model proposed in this paper aims to collect logs, fragment the collected logs to analyze high-risk access IPs, detect SSH brute-force attacks, and defend against SSH brute-force attacks by managing the detected attackers’IPs using blacklist techniques.If IPs that attempt malicious access can be obtained continuously, they can be used to defend against future brute-force, thereby enhancing the security of IT infrastructure.In addition, the proposed method can block malicious attacks while preventing channels from concealing their IP address.

    Figure 1:SSH brute-force attack detection model

    3.2 Research Hypothesis

    To develop an access control policy based on logs from routers, this study established hypotheses based on the research model and verified the implementation of the proposed SSH brute-force attack detection model by testing each hypothesis.The research hypotheses for the proposed model are as follows:

    (1) Identification of continuous and malicious access to the Internet router

    (2) Specification and detection of unauthorized access

    (3) Fragmentation of unauthorized attack logs

    First, a hypothesis was established to verify whether there is continuous and malicious access to the router and attacks against the target system.Then, to collect attack logs by identifying unauthorized access from logs on attacks against the router, it was assumed that unauthorized access can be specified and detected by confirming the points of an excessively huge number of access through SSH.The last hypothesis assumes that data to be used for a blacklist can be extracted by removing repeated messages from repeated logs and fragmenting necessary data only.

    3.2.1 Identification of Continuous and Malicious Access to the Internet Router

    The research subject is a router applied without a separate system, since it is connected to a network before security equipment is installed in a fail-safe way.Routers are equipped with no separate network or access point to ensure connection with the external network.Thus, if there is no change in the network, fewer logs will be generated, and the administrator’s access will be recorded as logs.Tab.1 shows the number of logs generated on the router over a year, separated by months.

    Table 1:Number of internet router logs generated

    Fig.2 shows the numbers of logs generated in the target system, and the figures in the table cannot be obtained only with system logs.In addition, the host name was changed to router-1 to show the logs for the Internet router and to infer ownership of the equipment.Since IP addresses are sensitive data, we have reduced the likelihood of privacy exposure by replacing them with *.Routers guarantee the availability of systems between enterprises and institutions, and they do not receive frequent maintenance.There is no special work except for changes to routing tables,ISP and circuits, and transfer equipment.However, there must be a reason for the huge number of logs generated, and most logs generated are repeated ones.

    Figure 2:Sample of internet router logs

    The analysis results of the Internet router logs produced are as follows:“SSH user failed to login from” means that SSH access was attempted but failed, and whoever requested access is displayed via IP information.“on VTY0 due to IP restriction” means that access failure occurred due to IP access restriction; in other words, the SSH user of the starting point IP information was not able to log into VTY0 due to IP restriction, where VTY refers to a virtual terminal line to access the router interface.

    Fig.3 shows the one-year analysis results of all logs generated from the two routers used in the experiment, system logs generated through normal access, logs generated by unauthorized access attempts, and the access rate of unauthorized access logs to all logs.In fact, most of the logs are from unauthorized access, which indicates that there are continued attempts to access the routers.Vulnerabilities of Internet routers, including account management, log management, and function management, are improved through the inspection of the vulnerabilities of important information infrastructure.As for access to VTY by the administrator, only registered persons designated by the ACL (Access-List) are allowed, and other unauthorized access is blocked to prevent unidentified access.In other words, brute-force attacks that are attempted countless times generate too many logs on unauthorized access.A comparison of unauthorized access logs with all types of logs, including normal attempts, is shown in Fig.3.

    Figure 3:Analysis of internet router attack logs

    3.2.2 Specification and Detection of Unauthorized Access

    Unauthorized access to the Internet router is normal access through SSH but is not authorized access on the target system.The Internet router only allows SSH access through the registered administrator IP, blocks all other accesses, and generates relevant logs.These logs take up a large portion of the entire logs, and unauthorized SSH access attempts are a result of brute-force attack attempts to identify the account information of the target system’s Internet router.

    Fig.4 shows the top 10 IPs that attempted unauthorized access to the target systems used for research as of April 2019.Out of a total of 6,187 logs, 3,171 logs were generated by IP “A,”taking up 51.25%.The figures indicate that it is difficult to consider that normal access is attempted,or values are entered manually.In addition, access was retried over very short intervals, and the regular frequencies and intervals reveal that the access was attempted using an automated tool.

    Figure 4:Number of unauthorized access by IPs

    Fig.5 shows, in ascending order, 1.2 million attempts extracted by one of the top 10 IPs at unauthorized access to IPsenf determine the frequency.Automatic access by scripts or programs is also suspected as these IPs have attempted to connect sequentially for several days and with very a short time intervals (less than one second).In addition, the above picture shows that there are 12 attempts to invade the area on the same day, depending on the time zone.

    Figure 5:IP access attempt information sample

    Since unauthorized access by IPs to the Internet router can be specified through the number of access attempts or access log messages and accounts for most of the logs, these logs can be used as security logs.Furthermore, these access attempts fall under SSH brute-force attacks and their IP information can be collected through logs.

    3.2.3 Fragmentation of Logs Associated with Unauthorized Access

    Logs of SSH brute-force attacks collected in the Internet router are shown as follows:

    The above log can be analyzed as follows:First, “Apr 1 00:01:07 2019” refers to the month,day, time, and year, respectively; “router-1” is a hostname; and the log shows SSH access failure analyzed previously.This log can be rearranged as a construction consisting of month, day,time, year, hostname, and message.The log is generated with the hostname and time information(month, day, time, and year), accurately verifying the content of the log.In other words, the log reveals when and to which equipment the SSH access has been attempted.The part excluding the IP is repeated in the message, whose log length can be reduced and the construction can be fragmented by deleting the repeated part.The above log can be reduced to “Apr 1 00:01:07 2019 router-1 11?.17?.5?.88”, and it can be saved in various file formats.Tab.2 shows the fragmentation of a log of SSH brute-force attacks.The log includes month, day, time, year, hostname, and IP data.

    Table 2:Fragmentation of log data of SSH brute-force attacks

    The fragmented data of the log can be exported into a CSV file, through which the number of access attempts by time, day, year, and IP can be easily identified.Moreover, by adding a country field and registering the country code associated with each IP, the country from which attacks were attempted can be specified.

    3.3 Design of the Proposed SSH Brute-Force Attack Detection Model

    We study a blacklist access control policy against SSH brute-force attacks by analyzing source logs from the Internet router, extracting logs of SSH brute-force attacks only, and fragmenting them.This requires the extraction of logs related to SSH brute-force attacks caused by unauthorized access from source logs.Source logs are arranged in a text file, and a function is applied to classify them into two types:SSH brute-force attack logs, and other logs.Then, repeated strings are eliminated from the SSH brute-force attack logs and only the necessary data are left, which are then exported to a CSV file.IPs to be included in the blacklist are identified and used for the ACL of the Internet router and the blocking policy of security equipment.

    3.3.1 Processing of Source Logs

    A log document composed of one row and as many columns as the number of logs generated can be utilized to detect SSH brute-force attacks.To do this, a filter is used to fragment the log content.To process logs, the initial log information is first classified by applying two functions:(1) the FIND function, which returns the location of a starting point of the cell that includes the finding value; and (2) the ISNUMBER function, which returns the resulting value according to the result of a formula.The FIND function is used to determine the starting point of a message in a log, while the ISNUMBER function is applied to express TRUE or FALSE when a message related to SSH brute-force attacks is detected.These enable the extraction of logs only of bruteforce attacks.Strings indicating SSH brute-force attacks are “SSH user failed to log in from” and“on VTY0 due to IP restriction.” Only when the ISNUMBER function is applied to the two strings and they are found on a log is the result TRUE.Fig.6 outlines log processing.

    Figure 6:Log processing steps

    Once the raw log information is determined as either TRUE or FALSE through the aforementioned functions, the logs related to SSH brute-force attacks are extracted through filtering.At least 3,000 and up to 5,000 logs are generated from the Internet router in a month.Extracting the system logs from a large number of logs can be cumbersome as only specific logs must be extracted.However, when extracting only the logs not related to SSH brute-force attacks,the number of logs extracted is reduced exponentially; this allows users to identify system logs more easily.

    Tab.3 shows an example of the results that can be obtained when each function is applied to the raw log.This confirms that the log returns TRUE if it includes “SSH user failed to log in from” and “on VTY0 due to IP restriction.”

    Table 3:Results of applying the functions

    3.3.2 Fragmentation of Logs

    The fragmentation process for the extracted logs of SSH brute-force attacks is simple because the pattern of all logs is set and the row can be classified by meaning.In addition, log information can be fragmented by eliminating the two phrases referring to the SSH brute-force attacks, “SSH user failed to log in from”and “on VTY0 due to IP restriction”and extracting the IP data.Fig.7 illustrates the process of extraction and fragmentation of log information through log analysis.

    Figure 7:CVS file example

    3.3.3 Log Analysis

    Information for analysis undergo classification and fragmentation, and be exported to a CSV file.Log analysis is performed by dividing the log content into month, day, time, year,hostname, and IP address.Entered logs are sequentially sorted by a certain column, which is divided into sub-columns for the next entry.Fig.8 shows the breakdown of a log and a summary of analysis results.

    Figure 8:Fragmented log

    If a is a log fragmented as above, the month field extracts the Apr column and generates a log counter, and then the Apr column is divided by day to obtain the number of logs generated per day.The count increases by 1 when the same IP is found among the logs per month, and allows us to determine the number of access requests made over an entire month.Among the classified logs, the IP address of 11*.17*.588, was extracted and found to account for 51.87% of the total logs.In addition, collected IP addresses can be used to identify access requests.Most importantly,the number of access attempts can be identified by accessing IPs and related maliciousness.When the counts are sorted by day for the IPs with high risk of multiple intrusions, attack patterns by date can also be analyzed.

    While SSH brute-force attacks occurred with high frequency, the analysis of attacking patterns by date confirmed that the attacks took place over a few days rather than in a single day.These attacks are more malicious than those occurring in a single day and must be blocked since they occur continuously.

    3.3.4 IP Blacklist

    IPs carrying out SSH brute-force attacks can all be assumed to be malicious hosts; however,designating and blocking all attacking IPs as blacklisted IPs may be an ineffective policy.Some of the attacking IPs can be a one-time attack and have no intention to attack anymore.Thus,the frequency of attack is an important factor to consider in proving the intention of an attack.The number of attacks per day is also a significant factor that determines the continuity of attacks.A time-based classification can provide more details, such as whether the attacks occur during business hours or over holidays, and the country from which the attack originates can be determined by the IP.Tab.4 lists the characteristics of malicious hosts on the Internet router, and attack strength, which is the blocking frequency by IP, is the most important indicator in selecting blacklisted IPs.

    Table 4:Characteristics for selecting blacklisted IPs

    When selecting blacklisted IPs, those with one-time attacks should be excluded.A total of 419 IP addresses were involved in the attacks against the router.The IP with the highest frequency carried out 3,171 attacks, demonstrating its intention of attack.For ambiguous one-time attacks,it was difficult to determine whether 405 IPs, i.e., 96% of the total IPs, had any intent to attack further since they carried out less than 10 attacks; thus, these were not classified as blacklisted IPs.This made the analysis faster.Other parameters can be calculated to establish the allowable criteria to determine blacklisted IPs.Three characteristics of attack are defined as x, and whether an IP is classified as blacklisted is y.Formula 1 is used to identify a blacklisted IP.

    Here, x1 is the frequency of attacks.n attacks (0

    x2 denotes the number of days detected, and is m (0

    x3 denotes the location of attack, which is either a specific country or international.The weighted values are 1 and 1.1 for country and international, respectively.x3 can be calculated as follows:

    To illustrate the use of these formulas, we assumed that 100 SSH brute-force attacks were made against the Internet router per day within a country.The relevant formula is(100*0.01)*(1*0.1)*1,and the value of 0.1 is returned.For an IP to be determined as a blacklisted IP, it must meet the requirements of at least 100 attacks, 2 or more detection days, and an international location.In the Tab.5, having a value of 0.22 or higher means the IP will be blacklisted IP; when the value is between 0.1 and 0.22, the IP is classified as “suspect.” Tab.5 shows the process and results of determining blacklisted IPs.

    Table 5:Example of determining blacklisted IPs

    3.3.5 Verification of the Proposed SSH Brute-Force Attack Detection Model

    This research aims to identify SSH brute-force attacks against an Internet router through logs, select blacklisted IPs based on the analysis of attack characteristics, and establish an access control policy using the blacklisted IPs.Three research hypotheses on continuous and malicious access to the Internet router, specification of unauthorized access, and the fragmentation of logs of unauthorized access were set up and verified to establish access control policies based on logs.

    Regarding the first hypothesis that there is continuous and malicious access to the Internet router, we revealed that more than 90% of logs were of unauthorized access.Attacks by unauthorized access generated logs that had the same message pattern, including “SSH user failed to log in from [attacker’s IP address] on VTY0 due to IP restriction.” By extracting relevant logs,unauthorized access was identified (which is associated with the second hypothesis) and the SSH brute-force attacks were detected.Lastly, the repeated message content was eliminated, and logs were fragmented by month, day, time, and year, which confirmed that the third hypothesis of log fragmentation was true.We digitized the characteristics of fragmented attack logs to detect blacklisted IPs and finally proposed a blacklisted IP identification model that can determine whether an IP should be blacklisted.

    Attack frequency, number of detection days, and country from which the attack originated were used to determine blacklisted IPs.The weighted values of 0.01, 0.1, and 1 (country) or 1.1 (international) were set for attack frequency, detection days, and location, respectively.IPs with 100 or more attacks and 2 or more detection days and an overseas origin were classified as blacklisted IPs.Tab.6 shows the number of access control policies set according to the number of blacklisted IPs with malicious intention by month.

    We imposed a firewall to block blacklisted IPs attempting to access the internal traffic of destination.For 46 days from May when the firewall policy was established through June, a total of 10,147 IPs were blocked by the firewall through the CIDR blocking a single IP or processing the bands of multiple IPs.We found that 29 destination IPs were Chinese IPs with access requests.

    Table 6:Establishment of access control policies in accordance with blacklist

    Tab.7 lists the number of times each internal IP was blocked by the firewall.IPs “A”and “B”showed that more than 90% of the entire blocking was normal traffic, but they were also blocked since their destination address was in the same band as that of a blacklisted IP.This may cause further inconvenience by requiring the CIDR processing of internal IPs.

    Table 7:Logs blocked by firewall

    4 Conclusions

    The advancement of infrastructure has increased the necessity to collect a significant amount of personal data for user convenience, driving IT infrastructure managers to encounter many important information assets and systems.However, there is no standardized method for analyzing the data generated during system management, which thus tends to rely on the manager’s experience.While skilled managers can solve a problem based on their experience, most managers take a long time to determine the meaning of each log and the cause of the error from a huge number of logs generated by a system.Systems designed to manage important information assets require timely action against errors and appropriate prevention, but the general process alone is not enough to solve the error when a quick action is required in a certain case.

    This research analyzed logs generated in a router for one year and studied methods for protecting the system through the detection and access control of SSH brute-force attacks against the target system.We confirmed that many of the logs were generated due to SSH brute-force attacks, and then proposed a blacklisted IP determination model by fragmenting and examining the logs.This approach can prevent continuous attacks by detecting access to specific internal IPs through routers that are not normally protected by security devices.The approach can also prevent unauthorized access to internal IPs and attack site IPs by creating a blacklist based on the risk,thereby preventing infection to other systems.However, this method aims to prevent future attacks by analyzing the attacks that have already occurred, and thus it does not have the capability to respond to real-time attacks.

    While the logs that are currently generated must be determined faster than the analysis of logs on previous attacks to respond to real-time attacks, in practice, it is difficult for a manager to immediately identify and determine them.To prevent potential attacks, it is necessary to apply a real-time log determination using machine learning in the future by analyzing past logs while conducting real-time analysis on current logs.

    Funding Statement:This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2019S1A5C2A04083374).

    Conficts of Interest:We declare that we have no conflicts of interest to report regarding the present study.

    欧美av亚洲av综合av国产av| 久久婷婷人人爽人人干人人爱| 又紧又爽又黄一区二区| 男女那种视频在线观看| 校园春色视频在线观看| 法律面前人人平等表现在哪些方面| 国产麻豆成人av免费视频| 久久久精品欧美日韩精品| 亚洲成人精品中文字幕电影| 国产精品99久久99久久久不卡| 国产片内射在线| 午夜精品久久久久久毛片777| 色综合站精品国产| 亚洲欧美日韩无卡精品| 少妇 在线观看| 日日夜夜操网爽| 国产单亲对白刺激| 国产成人影院久久av| 免费高清视频大片| 国产男靠女视频免费网站| 美女午夜性视频免费| 午夜两性在线视频| 热re99久久国产66热| 色综合欧美亚洲国产小说| 一本久久中文字幕| 听说在线观看完整版免费高清| 日韩欧美一区视频在线观看| 不卡一级毛片| 久久久久免费精品人妻一区二区 | 欧美成人免费av一区二区三区| 国产成人精品久久二区二区91| 免费女性裸体啪啪无遮挡网站| 国产主播在线观看一区二区| 精品欧美国产一区二区三| 极品教师在线免费播放| 国产蜜桃级精品一区二区三区| 一区二区日韩欧美中文字幕| 亚洲一区二区三区色噜噜| 久久精品亚洲精品国产色婷小说| 久久久久精品国产欧美久久久| 久久香蕉激情| 国产成人精品无人区| 长腿黑丝高跟| 国产真人三级小视频在线观看| 亚洲成人免费电影在线观看| 99久久99久久久精品蜜桃| 国内久久婷婷六月综合欲色啪| 女警被强在线播放| 国产精品 国内视频| 国产精品九九99| 久久精品aⅴ一区二区三区四区| 午夜福利高清视频| 欧美不卡视频在线免费观看 | 丰满人妻熟妇乱又伦精品不卡| 亚洲成a人片在线一区二区| 亚洲精华国产精华精| 欧美乱妇无乱码| 亚洲一码二码三码区别大吗| 国产av不卡久久| 亚洲片人在线观看| 欧美日本亚洲视频在线播放| 国产精品亚洲一级av第二区| 中文资源天堂在线| 中文字幕最新亚洲高清| 在线看三级毛片| 一区二区三区精品91| 亚洲欧美一区二区三区黑人| 国产av不卡久久| 一区二区日韩欧美中文字幕| 99国产极品粉嫩在线观看| 亚洲熟女毛片儿| 天天一区二区日本电影三级| 日日夜夜操网爽| 欧美大码av| 国产v大片淫在线免费观看| 国产熟女午夜一区二区三区| 母亲3免费完整高清在线观看| videosex国产| 免费电影在线观看免费观看| 欧美av亚洲av综合av国产av| 老汉色∧v一级毛片| 搞女人的毛片| 亚洲午夜理论影院| 国产成人av激情在线播放| 成人三级做爰电影| 美女 人体艺术 gogo| 又大又爽又粗| 51午夜福利影视在线观看| 久久婷婷人人爽人人干人人爱| 黄色片一级片一级黄色片| 亚洲成人免费电影在线观看| 大型黄色视频在线免费观看| 成在线人永久免费视频| 成人手机av| 久久人妻av系列| 国产黄色小视频在线观看| 精品熟女少妇八av免费久了| 国产1区2区3区精品| 身体一侧抽搐| 日韩欧美一区二区三区在线观看| 一边摸一边抽搐一进一小说| 精品一区二区三区av网在线观看| 国内少妇人妻偷人精品xxx网站 | 色综合站精品国产| 无人区码免费观看不卡| 成人精品一区二区免费| 精华霜和精华液先用哪个| 久久精品国产亚洲av高清一级| av片东京热男人的天堂| 免费无遮挡裸体视频| 久久亚洲精品不卡| 久久 成人 亚洲| 国产一区二区三区视频了| 十八禁网站免费在线| 99在线视频只有这里精品首页| 亚洲男人的天堂狠狠| av免费在线观看网站| 色综合亚洲欧美另类图片| 18禁裸乳无遮挡免费网站照片 | 一级a爱视频在线免费观看| 日韩欧美一区二区三区在线观看| 操出白浆在线播放| 国产久久久一区二区三区| 亚洲最大成人中文| 一区二区日韩欧美中文字幕| 最近在线观看免费完整版| 一级毛片女人18水好多| 午夜福利18| 中文字幕另类日韩欧美亚洲嫩草| √禁漫天堂资源中文www| 亚洲国产日韩欧美精品在线观看 | 国产区一区二久久| 久热爱精品视频在线9| 色综合亚洲欧美另类图片| 制服诱惑二区| 天天一区二区日本电影三级| 欧美黑人欧美精品刺激| 香蕉国产在线看| 真人做人爱边吃奶动态| 国产不卡一卡二| 一边摸一边抽搐一进一小说| 久久精品国产综合久久久| 欧美又色又爽又黄视频| a级毛片在线看网站| 国内久久婷婷六月综合欲色啪| 最新美女视频免费是黄的| 91九色精品人成在线观看| 午夜福利视频1000在线观看| 久久这里只有精品19| 欧美最黄视频在线播放免费| 国语自产精品视频在线第100页| 少妇 在线观看| 亚洲精品一卡2卡三卡4卡5卡| 麻豆一二三区av精品| 侵犯人妻中文字幕一二三四区| 久久婷婷人人爽人人干人人爱| 国产成人精品久久二区二区91| 亚洲免费av在线视频| 中文字幕av电影在线播放| 一本大道久久a久久精品| 老司机在亚洲福利影院| 免费看a级黄色片| 国产精品爽爽va在线观看网站 | 久久久久久亚洲精品国产蜜桃av| 日日夜夜操网爽| 亚洲成人免费电影在线观看| 欧美日韩黄片免| 久久久国产欧美日韩av| 亚洲精品美女久久av网站| 国产高清有码在线观看视频 | 少妇裸体淫交视频免费看高清 | 久久精品91无色码中文字幕| 国产成人av教育| 国产精品美女特级片免费视频播放器 | 欧美丝袜亚洲另类 | 美女国产高潮福利片在线看| 91字幕亚洲| 欧美激情 高清一区二区三区| 一夜夜www| 18禁黄网站禁片午夜丰满| 日本一本二区三区精品| 国产精品国产高清国产av| 一进一出抽搐gif免费好疼| 男人舔女人下体高潮全视频| www.999成人在线观看| 欧美在线一区亚洲| 欧美色欧美亚洲另类二区| 人人澡人人妻人| 国产黄片美女视频| 亚洲专区中文字幕在线| 亚洲精品一区av在线观看| 亚洲国产看品久久| 成人手机av| 国产伦在线观看视频一区| 久久亚洲精品不卡| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美精品啪啪一区二区三区| 亚洲精品色激情综合| 免费在线观看亚洲国产| 动漫黄色视频在线观看| 一夜夜www| 50天的宝宝边吃奶边哭怎么回事| 亚洲精品久久成人aⅴ小说| 好男人在线观看高清免费视频 | 国产精品久久久久久人妻精品电影| 亚洲在线自拍视频| 美女午夜性视频免费| 91国产中文字幕| 91九色精品人成在线观看| 免费av毛片视频| aaaaa片日本免费| 国产精品免费视频内射| 国产黄色小视频在线观看| 91老司机精品| 亚洲片人在线观看| 十分钟在线观看高清视频www| 变态另类成人亚洲欧美熟女| 欧美激情高清一区二区三区| 国产99久久九九免费精品| 丁香欧美五月| 中文字幕精品亚洲无线码一区 | 黄频高清免费视频| 成人精品一区二区免费| 中文字幕人妻丝袜一区二区| 国产亚洲欧美精品永久| 午夜福利在线在线| 国产av又大| 日韩国内少妇激情av| 老汉色av国产亚洲站长工具| 黄色丝袜av网址大全| 日韩欧美国产一区二区入口| 最近在线观看免费完整版| 国产精品国产高清国产av| 亚洲中文av在线| 色尼玛亚洲综合影院| 精品人妻1区二区| 丝袜人妻中文字幕| 757午夜福利合集在线观看| 免费高清视频大片| 制服人妻中文乱码| av在线播放免费不卡| 在线观看免费午夜福利视频| 中文亚洲av片在线观看爽| 免费看美女性在线毛片视频| 麻豆一二三区av精品| 一进一出好大好爽视频| 亚洲男人的天堂狠狠| 久久欧美精品欧美久久欧美| 一本一本综合久久| 久久香蕉精品热| 欧美日韩亚洲综合一区二区三区_| 国产aⅴ精品一区二区三区波| 人人妻人人澡欧美一区二区| 两性夫妻黄色片| 亚洲国产精品合色在线| 久久中文字幕人妻熟女| 欧美一级毛片孕妇| 亚洲自偷自拍图片 自拍| 18禁观看日本| 国产精品二区激情视频| 亚洲国产欧美一区二区综合| 一本一本综合久久| 欧美成人免费av一区二区三区| 亚洲av中文字字幕乱码综合 | 国产成人精品无人区| 性欧美人与动物交配| 99久久99久久久精品蜜桃| 波多野结衣高清无吗| 免费高清在线观看日韩| 99久久国产精品久久久| 久久久久久久久中文| 好男人电影高清在线观看| 露出奶头的视频| 成人国语在线视频| 国产黄片美女视频| 天堂√8在线中文| av片东京热男人的天堂| 国语自产精品视频在线第100页| 国产精品,欧美在线| 女警被强在线播放| 国产免费男女视频| 国产精品久久久人人做人人爽| 国产麻豆成人av免费视频| 国产黄片美女视频| 成在线人永久免费视频| 亚洲人成网站高清观看| 搡老岳熟女国产| 免费一级毛片在线播放高清视频| 亚洲,欧美精品.| 老司机福利观看| 女人高潮潮喷娇喘18禁视频| 精品一区二区三区四区五区乱码| 18禁观看日本| bbb黄色大片| 国产一级毛片七仙女欲春2 | 日韩免费av在线播放| 又大又爽又粗| 女同久久另类99精品国产91| 久久精品91无色码中文字幕| 国语自产精品视频在线第100页| 免费观看人在逋| 亚洲av中文字字幕乱码综合 | 又黄又粗又硬又大视频| 免费看美女性在线毛片视频| 香蕉久久夜色| 极品教师在线免费播放| 中文资源天堂在线| or卡值多少钱| 人人妻人人看人人澡| АⅤ资源中文在线天堂| 中文字幕久久专区| 中文字幕人妻丝袜一区二区| 夜夜躁狠狠躁天天躁| 国产91精品成人一区二区三区| 国产精品久久电影中文字幕| 男人舔女人下体高潮全视频| 美女扒开内裤让男人捅视频| 久久狼人影院| 性欧美人与动物交配| 婷婷精品国产亚洲av在线| 麻豆成人午夜福利视频| 午夜福利高清视频| 午夜老司机福利片| 好男人电影高清在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 国产高清视频在线播放一区| 国产熟女午夜一区二区三区| 老司机靠b影院| 一区二区三区精品91| 少妇 在线观看| 一个人观看的视频www高清免费观看 | 一区二区三区精品91| 国产精品一区二区精品视频观看| 国产精品久久久久久人妻精品电影| 99国产精品一区二区三区| 国产精品精品国产色婷婷| 一级毛片高清免费大全| 啦啦啦 在线观看视频| 亚洲在线自拍视频| 亚洲成人久久爱视频| 亚洲免费av在线视频| 色av中文字幕| 久久国产精品影院| 国产av不卡久久| 国产单亲对白刺激| 久久国产乱子伦精品免费另类| 免费在线观看成人毛片| 久久人人精品亚洲av| 热99re8久久精品国产| 12—13女人毛片做爰片一| 国产色视频综合| 久久香蕉精品热| 日韩高清综合在线| 亚洲成人免费电影在线观看| 日韩高清综合在线| 亚洲一区二区三区色噜噜| 久久午夜亚洲精品久久| 午夜福利高清视频| 免费在线观看成人毛片| 波多野结衣av一区二区av| 国产亚洲欧美98| 国产av在哪里看| 免费在线观看亚洲国产| 亚洲欧美日韩无卡精品| 校园春色视频在线观看| 久久精品夜夜夜夜夜久久蜜豆 | 国产成人欧美在线观看| 久久狼人影院| 国产高清videossex| 两个人免费观看高清视频| 久久伊人香网站| 久久99热这里只有精品18| 色尼玛亚洲综合影院| 日韩欧美一区二区三区在线观看| 日本一本二区三区精品| 欧美激情极品国产一区二区三区| 一级毛片高清免费大全| 香蕉丝袜av| 熟妇人妻久久中文字幕3abv| av视频在线观看入口| 在线十欧美十亚洲十日本专区| 免费女性裸体啪啪无遮挡网站| 国产亚洲精品一区二区www| 听说在线观看完整版免费高清| 好看av亚洲va欧美ⅴa在| 99国产综合亚洲精品| 成人永久免费在线观看视频| cao死你这个sao货| 国产视频一区二区在线看| 午夜福利视频1000在线观看| 国产爱豆传媒在线观看 | 亚洲午夜理论影院| 国产黄色小视频在线观看| 亚洲国产精品合色在线| 日韩高清综合在线| 免费在线观看影片大全网站| 国内精品久久久久久久电影| 国产精品久久久av美女十八| www.精华液| 国产蜜桃级精品一区二区三区| 亚洲天堂国产精品一区在线| 亚洲熟妇熟女久久| 色播在线永久视频| 两个人视频免费观看高清| 色老头精品视频在线观看| 欧美黑人巨大hd| 国产精品99久久99久久久不卡| 在线观看午夜福利视频| 少妇粗大呻吟视频| 老司机午夜十八禁免费视频| 成人三级黄色视频| 精品久久久久久久久久久久久 | 色尼玛亚洲综合影院| 国产私拍福利视频在线观看| 国产成人av激情在线播放| 久久香蕉国产精品| 又黄又粗又硬又大视频| 色精品久久人妻99蜜桃| 国产一区二区三区视频了| 国产极品粉嫩免费观看在线| 久久国产乱子伦精品免费另类| 人妻久久中文字幕网| 日韩欧美一区视频在线观看| 亚洲免费av在线视频| 久久久久久九九精品二区国产 | 美国免费a级毛片| 国产又爽黄色视频| 99精品久久久久人妻精品| 久久久久久免费高清国产稀缺| 欧美色视频一区免费| 男人舔女人的私密视频| 久久久久国产一级毛片高清牌| 欧美黑人精品巨大| 精品第一国产精品| 淫秽高清视频在线观看| 色老头精品视频在线观看| www.www免费av| 国产一级毛片七仙女欲春2 | 国产高清激情床上av| 日韩欧美国产在线观看| 日韩精品青青久久久久久| 亚洲一卡2卡3卡4卡5卡精品中文| 国产三级在线视频| 国内久久婷婷六月综合欲色啪| 亚洲精品色激情综合| 国产激情偷乱视频一区二区| 欧美激情高清一区二区三区| 国产精品一区二区精品视频观看| 最近在线观看免费完整版| 亚洲精品在线观看二区| 亚洲欧美精品综合久久99| 一区二区日韩欧美中文字幕| 脱女人内裤的视频| 日本免费a在线| 一级a爱视频在线免费观看| 国产av又大| 亚洲精品在线观看二区| √禁漫天堂资源中文www| 日本精品一区二区三区蜜桃| 在线国产一区二区在线| av视频在线观看入口| 少妇 在线观看| 男人的好看免费观看在线视频 | 久久精品影院6| 国产亚洲精品av在线| 黄频高清免费视频| 精品福利观看| 欧美色视频一区免费| 妹子高潮喷水视频| 欧美日韩一级在线毛片| 天天躁狠狠躁夜夜躁狠狠躁| 久久久久精品国产欧美久久久| 亚洲国产欧洲综合997久久, | 又大又爽又粗| 久久欧美精品欧美久久欧美| 国产成人啪精品午夜网站| 亚洲国产欧洲综合997久久, | 又大又爽又粗| 此物有八面人人有两片| 亚洲av电影不卡..在线观看| 一二三四社区在线视频社区8| 搡老熟女国产l中国老女人| 中亚洲国语对白在线视频| 999久久久精品免费观看国产| 午夜老司机福利片| 日韩欧美一区视频在线观看| 日日爽夜夜爽网站| 99国产精品一区二区蜜桃av| 妹子高潮喷水视频| 国产单亲对白刺激| 岛国视频午夜一区免费看| 黑人操中国人逼视频| 日韩av在线大香蕉| ponron亚洲| 老司机福利观看| 亚洲成av片中文字幕在线观看| 韩国av一区二区三区四区| 啪啪无遮挡十八禁网站| 一进一出抽搐gif免费好疼| 亚洲第一欧美日韩一区二区三区| 国产精品免费一区二区三区在线| 久久久久久久久中文| 黑丝袜美女国产一区| 在线观看舔阴道视频| 在线视频色国产色| 久久久久久久午夜电影| 国产片内射在线| 欧美在线黄色| 中文字幕精品亚洲无线码一区 | 亚洲五月色婷婷综合| 1024视频免费在线观看| 国产成+人综合+亚洲专区| 亚洲人成77777在线视频| 精品久久久久久久人妻蜜臀av| www.999成人在线观看| 我的亚洲天堂| 88av欧美| 中文字幕久久专区| 19禁男女啪啪无遮挡网站| 精品国内亚洲2022精品成人| 亚洲熟妇中文字幕五十中出| 国产在线精品亚洲第一网站| 日韩欧美三级三区| 久久人妻av系列| 男女床上黄色一级片免费看| 中文字幕久久专区| 琪琪午夜伦伦电影理论片6080| 看黄色毛片网站| a级毛片a级免费在线| 在线观看舔阴道视频| 免费观看人在逋| 色婷婷久久久亚洲欧美| 两个人视频免费观看高清| 精品福利观看| 久久久久九九精品影院| 999久久久精品免费观看国产| 麻豆成人午夜福利视频| 一区二区三区高清视频在线| 少妇的丰满在线观看| 亚洲久久久国产精品| 亚洲最大成人中文| 欧美日韩一级在线毛片| 男女做爰动态图高潮gif福利片| 啦啦啦观看免费观看视频高清| 午夜亚洲福利在线播放| 成人国产综合亚洲| 国产精品久久视频播放| 99国产极品粉嫩在线观看| 亚洲第一电影网av| 亚洲九九香蕉| 一边摸一边做爽爽视频免费| 亚洲欧美激情综合另类| 久久精品aⅴ一区二区三区四区| 怎么达到女性高潮| 满18在线观看网站| 久久精品人妻少妇| 伦理电影免费视频| 日韩欧美免费精品| 色哟哟哟哟哟哟| 99久久综合精品五月天人人| 老汉色av国产亚洲站长工具| 免费无遮挡裸体视频| 中文字幕精品亚洲无线码一区 | 亚洲一区高清亚洲精品| 亚洲精品美女久久久久99蜜臀| 日本熟妇午夜| 女警被强在线播放| 91麻豆精品激情在线观看国产| 国产精品亚洲美女久久久| 国产色视频综合| 午夜福利欧美成人| 真人做人爱边吃奶动态| 国产成人影院久久av| 亚洲国产精品sss在线观看| 亚洲 欧美一区二区三区| 日本 欧美在线| 国产野战对白在线观看| 免费在线观看日本一区| 精品久久久久久久末码| 国产三级在线视频| 免费在线观看日本一区| 久久天躁狠狠躁夜夜2o2o| 最好的美女福利视频网| 脱女人内裤的视频| 麻豆av在线久日| 久久人人精品亚洲av| 啦啦啦韩国在线观看视频| 99久久无色码亚洲精品果冻| 精品人妻1区二区| 高潮久久久久久久久久久不卡| 免费人成视频x8x8入口观看| av中文乱码字幕在线| 人人澡人人妻人| 亚洲黑人精品在线| 午夜影院日韩av| 人妻丰满熟妇av一区二区三区| 亚洲aⅴ乱码一区二区在线播放 | 黄频高清免费视频| 天天躁夜夜躁狠狠躁躁| 九色国产91popny在线| 国产成人精品无人区| av天堂在线播放| 亚洲在线自拍视频| 亚洲五月天丁香| 亚洲国产精品999在线| 精品国内亚洲2022精品成人| 视频在线观看一区二区三区| 美女大奶头视频| 热re99久久国产66热| 久久午夜亚洲精品久久| 久久99热这里只有精品18| 不卡av一区二区三区| 人人妻人人澡人人看| 国产精品二区激情视频| 国产精品1区2区在线观看.|