• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Unknown Attack Detection:Combining Relabeling and Hybrid Intrusion Detection

    2021-12-14 06:04:44GunYoonShinDongWookKimSangSooKimandMyungMookHan
    Computers Materials&Continua 2021年9期

    Gun-Yoon Shin,Dong-Wook Kim,Sang-Soo Kim and Myung-Mook Han

    1Department of Computer Engineering,Gachon University,Sungnam-si,13120,Korea

    2Agency for Defense Development Songpa,Seoul,05661,Korea

    3Department of Software,Gachon University,Sungnam-si,13120,Korea

    Abstract:Detection of unknown attacks like a zero-day attack is a research field that has long been studied.Recently,advances in Machine Learning(ML) and Artificial Intelligence (AI) have led to the emergence of many kinds of attack-generation tools developed using these technologies to evade detection skillfully.Anomaly detection and misuse detection are the most commonly used techniques for detecting intrusion by unknown attacks.Although anomaly detection is adequate for detecting unknown attacks,its disadvantage is the possibility of high false alarms.Misuse detection has low false alarms;its limitation is that it can detect only known attacks.To overcome such limitations,many researchers have proposed a hybrid intrusion detection that integrates these two detection techniques.This method can overcome the limitations of conventional methods and works better in detecting unknown attacks.However,this method does not accurately classify attacks like similar to normal or known attacks.Therefore,we proposed a hybrid intrusion detection to detect unknown attacks similar to normal and known attacks.In anomaly detection,the model was designed to perform normal detection using Fuzzy c-means(FCM)and identify attacks hidden in normal predicted data using relabeling.In misuse detection,the model was designed to detect previously known attacks using Classification and Regression Trees (CART)and apply Isolation Forest (iForest) to classify unknown attacks hidden in known attacks.As an experiment result,the applicationof relabeling improved attack detection accuracy in anomaly detection by approximately 11% and enhanced the performance of unknown attack detection in misuse detection by approximately 10%.

    Keywords:Unknown attack;hybrid intrusion detection;fuzzy c-means;relabeling;CART;iForest

    1 Introduction

    The advances in IT technology have led to its ubiquitous use in various fields,including communication,social networking,IoT,and security,and there is an increasing number of technologies especially integrating ML and AI.Although such development of IT technology has brought us many benefits,the number of technologies that malicious exploit it is also increasing.The zero-day attack,which attacks a vulnerability unknown to the public,including network system defenders,is one of the major challenges for computer network security as a representative technology exploiting advanced IT technologies [1].A zero-day attack is composed of unknown attacks in which various malicious behavior take place and can evade detection by means of obfuscation [2].

    Intrusion Detection (ID) generates alerts in case of suspicious behavior and known threats [3].ID aims to detect abnormal behavior in a computer system.Recently,studies have been conducted on the application of ML and Data Mining (DM) to ID techniques.ID can be divided into three categories:anomaly detection,misuse detection,and a hybrid of the two techniques.In anomaly detection,when new data are entered into a system that has learned normal behavior,the system decides whether the new data are normal or abnormal based on the system’s normal information criteria.In anomaly detection,ML applicable to clustering or a 2-class problem in classification is used.Misuse anomaly generates signatures and rules based on the previously known attacks and compares them with new data to check if they match each other.In misuse detection,ML applicable to a classification problem is often used.Although anomaly detection is suitable for the detection of new or unknown attacks,its disadvantage is that it cannot detect attacks similar to normal and also generates too many false alarms.Because misuse detection produces signatures or rules,it generates far fewer false alarms,but its disadvantage is that it can detect only known attacks [4].

    Hybrid intrusion detection systems that combine anomaly detection with misuse detection have been proposed to overcome the disadvantages of both anomaly and misuse detection.A hybrid intrusion detection system is designed to overcome the problem of excessive false alarms about attacks in anomaly detection and the disadvantage of detecting only known attacks in misuse detection.Also,ML and DM are applied for the detection of unknown attacks [3,5-10].However,these methods are also difficult to detect hidden attacks such as attacks like normal or unknown attacks similar to known attacks.Detecting hidden or unknown attacks requires additional analysis of the data classified through detection.

    The present study proposed a hybrid intrusion detection model for identification of unknown attacks similar to normal and known attacks.In anomaly detection,FCM was used to classify normal and attack,and a relabeling technique was applied to identify attacks falsely classified as normal data.In misuse detection,CART was used for classification of known attacks,while iForest was applied to identify unknown attacks hidden in known attacks.This study aims to detect attacks falsely classified as normal by anomaly detection and to identify unknown attacks similar to known attacks to improve the accuracy of the intrusion detection.Most preceding studies on intrusion detection were conducted with a focus on improving the performance of a classifier,but we aim to reduce the ratio of falsely classified data in anomaly detection and misuse detection to enhance the accuracy of intrusion detection.In the experiment,the evaluation of the proposed hybrid intrusion detection model is performed.

    Our paper makes the following contributions:

    · In anomaly detection,we proposed a method to identify attack similar to normal;

    · In misuse detection,we proposed a method to classify unknown attack similar to known attacks;

    · We proposed hybrid intrusion detection methods to detect the unknown attack and evaluated its performance with accuracy,f-measure,and research and validation.

    The rest of the paper is organized as follows:Section 2 introduces related works about hybrid intrusion detection and unknown attack detection,Section 3 presents a detailed explanation of our proposed hybrid intrusion detection.Section 4 introduces the results of the experiment,and the paper ends with Section 5,which presents our conclusions and future direction.

    2 Related Work

    In this section,representative hybrid intrusion detection and unknown attack detection are introduced.Most of the researches,combining misuse detection and anomaly detection based on ML.

    2.1 Hybrid Intrusion Detection

    The past research of ID proposed unknown attack detection as the identification of abnormal activities and the creation of rules for attacks and normal activities.However,most IDs generate too many false alarms and have a low detection accuracy.To overcome these problems,researchers propose a hybrid intrusion detection.This method attempts to complement the problems that anomaly detection and misuse detection have,thereby solving the problem of generating false alarms for large numbers of attacks that anomaly detection has and detecting only known attacks that misuse detection has.It improves detection performance,and also enables detection of unknown attacks contained in datasets.

    In Khraisat et al.[3]propose intrusion detection using a Decision Tree (DT) and Support Vector Machine (SVM).DT was applied to effectively handle high-dimensional data,and a decision boundary was presumed by adding a relaxation parameter to each data sample in SVM to improve performance.Kim et al.[5]propose a detection system using DT and SVM for the detection of attacks.Traffics are captured to extract meaningful features,and DT is used to check whether they would belong to the existing attacks.SVM is used to classify those data found not to belong to the existing attacks into unknown attacks or normal.AlEroud et al.[6]propose a method that combined a misuse detection which used the context profile of an attack with an anomaly detection using 1-nn.In misuse detection,it creates a profile for an attack based on the past data using conditional entropy and checks matching with newly entered data.If their matching is not complete,anomaly detection is done based on 1-nn.Hussain et al.[7]propose a hybrid method integrating misuse detection based on DT with anomaly detection based on SVM.DT is used to create rules in known attacks,and SVM is used to create a boundary about normal for the detection of unknown attacks.Lekha et al.[8]propose a method to create rules and classify known attacks using CART,it uses an Extreme Learning Machine (ELM) for the classification of normal and abnormal activities.Bitaab et al.[9]propose a method to do misuse detection based on DT and anomaly detection based on a Gaussian Mixture Model for classification of normal and unknown attacks.Al-Yaseen et al.[10]propose an intrusion detection system based on SVM and ELM.Unlike the two-stage classifier of most hybrid intrusion detection,they propose a five-stage classifier for the detection of unknown attacks.

    As such,hybrid intrusion detection methods improve performance by complementing the problems of anomaly detection and misuse detection with each other,and unknown attack detection is possible.However,it does not accurately detect hidden attacks such as attacks like normal or unknown attacks similar to known attacks.A method to overcome the false alarms problem in general hybrid intrusion detection is to reduce false alarm in anomaly detection by classifying known attacks through misuse detection first,reducing known attack data.Because this approach is preprocessing of input data for anomaly detection,unknown attacks similar to normal or known attacks cannot be accurately detected.

    2.2 Unknown Attack Detection

    Detection of unknown attacks means detection of previously unseen attacks and their related data.The detection identifies how much an unknown attack is similar to which type of attack or checks the features of the unknown attack.The most representative method of its kind is anomaly detection.This method detects how much an unknown attack differs from normal,how much it is similar to other attacks,and how much it differs from other attacks.

    Detection methods for unknown attacks are mainly divided into two.The first method is to create and detect unknown attacks and variants;attacks are usually created using Generative Adversarial Network (GAN) [11,12].The advantage of this method is that because it generates unknown attacks,it can clearly detect attacks that are completely different from the previously collected attacks,but its disadvantage is that it is difficult to create a new attack and to find out whether the created attack could actually perform malicious behavior.The second method is to define a certain class of the collected dataset as an unknown attack.This method has been commonly applied by most studies.A study was carried out by specifying some classes of the collected dataset as unknown attacks and by removing labels on them.The advantage of this method is that various kinds of datasets can be used,and could be carried out on many different attack types.However,the limitation is that most of them were known attacks;so it is uncertain whether it could accurately detect an unknown attack that might actually occur in fields.

    Hu et al.[11]propose malgan,which used a GAN to create adversarial attacks based on malware;they generate adversarial attacks using malgan and detect adversarial attacks.Kawai et al.[12]propose a method to improve the limitations of malgan,including the problem with the feature number and the use of various malware;they generate attacks using the proposed method and detected them.Liu et al.[13]propose a framework based on the Generative Adversarial Cooperative Network (GACN) for the detection of known and unknown attacks.K-means is used to execute the clustering of known and unknown attacks generated by GACN,and attacks are detected based on similarity.Lin et al.[14]propose a hybrid attack detection method based on short term memory and attention mechanism for unknown attack detection.Ji et al.[15]propose deeparmour,a model to detect attacks that differ from the existing attacks that might occur by transformation and poisoning of data.Huda et al.[16]propose a method to extract the features of classes using a semi-supervised method and use an improved SVM to identify an unknown attack.Duessel et al.[17]propose a model to detect attacks using a message within an application layer.It detects attacks using extraction and normalization of data in a message,feature extraction,similarity calculation,and anomaly detection.Lai et al.[18]propose opensmax for the detection of botnet attacks by combining open set recognition based on domain generation algorithms with openmax.

    3 Hybrid Intrusion Detection Process

    In this paper,we proposed a method to detect hidden unknown attacks based on hybrid intrusion detection,such as Fig.1.In anomaly detection,we classified normal and attacks and used the membership degree of the FCM to detect attacks similar to normal contained within classified normal.Misuse detection exploited known attack classification and iForrest to classify unknown attacks similar to known attacks hiding in them.Our system was based on three stages process:

    Figure 1:Processes of the proposed hybrid intrusion detection

    · Stage 1:Anomaly detection using relabeling to detect hidden attacks

    · Stage 2:Misuse detection using iForest to detect hidden unknown attacks

    3.1 Feature Preprocessing

    In feature pre-processing,recursive feature elimination (RFE) was used to select important features [19].RFE,one of the most widely used methods for feature selection,selects high influenced features in performing ML [20].RFE removes the least important feature among all features one by one until a specified number of features is reached.It improves performance on models that perform machine learning-based learning.And we applied the minmax scaler to reduce the deviation of the values that each feature has.

    3.2 Anomaly Detection for an Attack Similar to Normal

    Detection of unknown attacks depends on how accurately it can classify normal and known attacks from data.In this stage,FCM was used for the classification of normal and attacks,and relabeling was applied based on a membership degree created in each cluster to detect an attack hidden in data classified as normal.

    FCM is a soft-clustering method.Unlike hard clustering,in which each datapoint belongs to one cluster,FCM measures the membership degree of datapoint in each cluster.For instance,if there are three clusters,the membership degree of datapointxin each cluster ofc1,c2,andc3is expressed respectively asc1=0.2,c2=0.65,andc3=0.15.The advantage of FCM is that it allows data to have a membership degree in each cluster,unlike other clustering methods that measure data as either 0 or 1;hence data can belong to more than two clusters with different membership degrees [21].

    Each data is assigned a fuzzy membership function to each cluster.FCM aims to minimize object function,which can be measured using Eq.(1).mis the real number in a domain(1≤m<∞);c is the number of clusters;nis the number of data samples;uijindicates the membership degree of dataxjin the jth cluster;andcjis the cluster center.

    FCM updates the cluster centercjand the fuzzy membershipuijby repeated executions,which are computed using Eqs.(2) and (3).

    Therefore,we used membership degree to perform the detection of attacks similar to normal.In other words,we detected hidden attacks classified as normal.

    Some attacks have characteristics similar to normal,so anomaly detection cannot distinguish important differences between normal and attacks [22].Because an attack similar to a normal might exist in data predicted and classified as normal,classification was performed with data classified as normal through FCM in relabeling.This enabled a more accurate classification of attacks similar to normal.First,it computed differences between membership degrees in clusters using for each datapoint created by FCM and checks whether it was within a threshold range defined by a user.data within the threshold range measured the distance from each cluster center.The formula was as follows:

    MD refers to membership degree in each cluster created by FCM;xiis the entire dataset wherei=1,...,n;cnormalandcattackrefer to normal and attack clusters;threshold means a value defined by a user.The threshold ranges from 0 to 1.Only if the relabeling result is 1 is distance computed.In this paper,a threshold was defined by a user,and by relabeling the contained data in the threshold,we detected attacks similar to normal that exist between the data classified as normal.

    3.3 Unknown Attack Detection

    In this stage,unknown attacks included in them are identified based on the attack data classified through anomaly detection.First,the known attacks were classified based on CART,and the unknown attacks were detected by applying iForest.Because an unknown attack that has characteristics similar to that of a known attack could be classified as being an already defined class,it was detected by two stages to solve this problem.

    DT is one of the algorithms in intrusion detection that are used to generate rules and use them for the detection of a known attack.It employs various algorithms including ID3,C4.5,C5.0,and CART [3,5,7,8].CART,which uses the Gini index,which is the generalization of binomial variance,is a binary decision tree that starts from the root node,which includes all the training samples,and is recursively split into two sub-nodes [23].For feature selection,computes the impurity value for each feature for selection.The Gini index is as follows [24]:

    pjis the probability of j,j is the number of the class.Rules,which are usually composed in if-then structure,are created about all attacks used as training data in CART.In this paper,we used it to generate rules for detecting known attacks.

    iForest can converge quickly with very few trees,hence can show a high detection performance with only a small sub-sampling.Also,iForest can work well with a partial model without isolating all data or with a small sample.An anomaly score is required to do iForest based anomaly detection.The equation is as follows:

    where h(x) is the path length to x;c(n) is the average path length,and n is the number of external nodes.In the paper,the score was computed as a value between 0 and 1.If it was close to 1,the data were unknown attacks.If it is below 0.5,the data are known attacks.

    4 Experimental Results

    In this section,we explored the experiments conducted based on the proposed method.First,we detected attacks similar to normal using relabeling.Then,based on the anomaly detection results,we detected unknown attacks using iForest.And we used a second method used in unknown attack detection studies to remove labels from certain classes that data sets have and define them as unknown attacks.

    4.1 Dataset

    We used the NSL-KDD [25]dataset.NSL-KDD is a refined version of the KDD CUP 99 [26]dataset,which solved the problem of meaningless and redundant data in KDD CUP 99 [27].There are 41 features and 23 detailed attack types,which can be divided into four attack classes(see Tab.1).

    Table 1:Detailed attack type based on attack class

    Training data and test data have ratios as seen in Tabs.2 and 3,in which other attack classes have lower data ratios than dos had.Especially,u2r has the lowest data ratio.In this paper,we converted symbolic features that exist in the data into the binary form [28].We selected 15 features out of a total of 41 by preprocessing.We also applied minmax scaler to solve the large deviation of the values of those features.

    Table 2:Normal and attack data ratio in NSL-KDD

    Table 3:Normal and attack types data ratio in NSL-KDD

    4.2 Evaluation Metrics

    Tab.4 is the confusion matrix of two classes that are often used for evaluating classification.The column of the matrix indicates an instance in the actual class,and the row indicates an instance in the predicted class.

    Table 4:Confusion matrix

    · Accuracy:classification accuracy is the ratio of correct predictions to the total number of prediction

    · Precision:the ratio of total true positives instances divided by total number of true positives and false positives

    · Recall:the ratio of total relevant results correctly classified,true positives,divided by the total true positives and false negatives

    · F-measure:the harmony mean of the precision and recall

    · Detection ratio:The ratio to unknown number of attack detections

    4.3 Anomaly Detection for an Attack Similar to Normal

    We did relabel using membership degrees computed by FCM.This detected attacks similar to normal hiding in data classified as normal.First,we measured anomaly detection accuracy and false positive rate (FPR) according to thresholds to compute the optimal threshold value.The computed threshold value was used for relabeling.We found hidden attacks by measuring the distance from the cluster center against the data point contained within the threshold range.This process detected attacks similar to normal in a classified normal class.

    The experimental results of the threshold for relabeling are as seen in Figs.2 and 3.By comparative analysis on accuracy and FPR,the optimal threshold value was obtained.We found values with high accuracy and FPR below the acceptable range,because FPR dramatically increases false positives beyond the acceptable range,thus we set up the maximum acceptable range.

    Figure 2:The accuracy rate of change based on relabeling thresholds

    We did relabel based on the computed threshold and compared the results with the dataset applied only with FCM in terms of anomaly detection accuracy.We found that the proposed model applied with relabeling showed more increases in accuracy and f-measure than when only FCM was applied (see Tab.5);especially the detection rate of attacks increased by approximately 11% (see Tab.6).Additionally,when only FCM was applied,the detection rates of u2r and r2l were low,at approximately 72% and 19%,but when relabeling was applied,the detection rates increased by 19% and 23%,respectively (see Tab.7).This confirmed that when relabeling was done,attacks similar to normal could be detected more clearly.Also,we were confirmed that the proposed method can identify attacks included in the predicted class.

    Figure 3:The FPR rate of change based on relabeling thresholds

    Table 5:Compare classification results for normal and attack

    Table 6:Compare detection rate for normal and attack

    Also,we used t-SNE based visualization to analyze the distribution of datasets applied with FCM and relabeling.Fig.4 shows the visualized distribution of anomaly detection.If we look at the distribution in the right-side graph applied with relabeling,areas mixed with normal and attacks were clearly identified as attacks.Fig.5 shows the visualized distribution of normal data and attack classes.The right-side graph applied with relabeling showed the distribution of attack types more clearly.

    Table 7:Compare classification results for normal and attack classes

    Figure 4:Visualization of normal and attack distribution (left:FCM only,right:FCM+relabeling)

    4.4 Unknown Attack Detection

    We perform unknown attack detection similar to known attack and rule-based known attack detection with attack data classified through anomaly detection.In this stage,we used CART to create the rules for known attacks and then used iForest to execute the detection of unknown attacks in the class predicted as a known attack.When relabeling was applied,accuracy and f-measure improved in most attack classes,showing the better performance (see Tab.8).Also,we measured the detection ratio of each attack type;the results are as seen in Tab.9.The number of detection is a numerical representation of how much each class of attack has been detected.The proposed relabeling-based method showed an improvement of approximately 10%in detection ratio compared to the existing methods,and especially the detection ratios of u2r and r2l improved by approximately 16% and 19%,respectively.In Fig.6,we can be seen that the detection ratio has been increased for all attack classes.Therefore,we confirmed that the method proposed in this paper enables the identification of unknown attacks similar to known attacks that exist between data classified as known attacks.

    Figure 5:Visualization of normal and attack classes distribution (left:FCM only,right:FCM+relabeling)

    Table 8:Evaluating unknown attack detection performance

    Table 9:Measure unknown attack detection ratio

    Also,we performed a comparative analysis with previously studied unknown attack detection results (see Tab.10).The average ratio is the average for unknown attack detection rates measured in each study was calculated.

    Figure 6:Comparison of unknown attack detection ratio with FCM and proposed methods

    Table 10:Performance comparisons obtained by the proposed method and other previous work

    5 Conclusion

    For detection of unknown attacks,we researched a hybrid intrusion detection model that integrated anomaly detection for identification of attacks detection falsely classified as normal with misuse detection for identification of unknown attacks detection falsely classified as known attacks.We applied hybrid intrusion detection to accurately classify known attacks and normal,and to detect hidden unknown attacks,we applied relabeling and iForrest respectively to anomaly detection and misuse detection.The study proceeded in the sequence of the following processes:feature preprocessing,anomaly detection,and misuse detection.As a result,we proposed a hybrid model that could detect unknown attacks more effectively than a single classifier could.In the feature preprocessing,we did feature selection based on an RFE model and selected 15 features.In the anomaly-detection stage,FCM was applied for the classification of normal and attacks,and the application of relabeling made it possible to detect attacks similar to normal,which were hidden in data predicted to be normal.Tab.7 shows that the detection rates of attacks by anomaly detection improved by 11%,and Tab.8 shows that the detection ratio by attack types improved by 6% in dos,11% in probe,19% in u2r,and 23% in r2l.This confirmed that if relabeling was performed,the proposed model could better able to detect attacks hidden in data predicted to be normal than conventional methods.In misuse detection,we used CART and iForest for the classification of known and unknown attacks.CART created rules for known attacks,and iForest detected unknown attacks hidden in known attacks.As seen in Tab.9,the detection ratio by attack classes improved by approximately 10%,and the proposed method in Fig.6 worked better than did conventional methods.

    In the future,we plan to conduct a follow-up study by adding a method to solve the dataimbalance problem of NSL-KDD and to carry out another study on a method for reducing false-positive rates of anomaly detection and misuse detection.And since detecting unknown attacks,such as hybrid intrusion detection,performance depends on what features are used,we will propose an improved feature selection method through further research.We will also improve scalability and robustness for the proposed model by applying various data as well as the data used in this paper.

    Funding Statement:This work was supported by the Research Program through the National Research Foundation of Korea,NRF-2018R1D1A1B07050864,and was supported by another the Agency for Defense Development,UD200020ED.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲内射少妇av| 欧美日韩乱码在线| 国产精华一区二区三区| 蜜桃亚洲精品一区二区三区| 成人欧美大片| 亚洲精品在线美女| 国产精品,欧美在线| 我要看日韩黄色一级片| 午夜激情欧美在线| 国产精品人妻久久久久久| 色哟哟哟哟哟哟| 久久99热这里只有精品18| 我要搜黄色片| bbb黄色大片| 麻豆av噜噜一区二区三区| 日韩免费av在线播放| 日韩有码中文字幕| 亚洲精品成人久久久久久| 国产v大片淫在线免费观看| 亚洲人与动物交配视频| av在线天堂中文字幕| 色综合亚洲欧美另类图片| 91麻豆精品激情在线观看国产| 亚洲精品日韩av片在线观看| 看十八女毛片水多多多| 日日摸夜夜添夜夜添av毛片 | 国产麻豆成人av免费视频| 一级av片app| 国产精品一区二区免费欧美| 免费人成在线观看视频色| 757午夜福利合集在线观看| 两个人的视频大全免费| 久久久久亚洲av毛片大全| 国产精品久久久久久精品电影| 亚洲国产欧美人成| 一进一出好大好爽视频| 亚洲aⅴ乱码一区二区在线播放| 欧美3d第一页| 久久久久国产精品人妻aⅴ院| 亚洲自拍偷在线| 听说在线观看完整版免费高清| 亚洲人成电影免费在线| 91九色精品人成在线观看| 此物有八面人人有两片| 黄色视频,在线免费观看| 国产美女午夜福利| 91九色精品人成在线观看| av在线观看视频网站免费| 欧美日韩中文字幕国产精品一区二区三区| 在线看三级毛片| 中文字幕高清在线视频| 国产精品综合久久久久久久免费| 噜噜噜噜噜久久久久久91| 无人区码免费观看不卡| 国产伦一二天堂av在线观看| 国产av在哪里看| 嫩草影院精品99| 国产中年淑女户外野战色| 人人妻人人看人人澡| 日韩人妻高清精品专区| 欧美性猛交╳xxx乱大交人| 日本撒尿小便嘘嘘汇集6| 久久久久免费精品人妻一区二区| 婷婷色综合大香蕉| 亚洲精品影视一区二区三区av| 亚洲av电影不卡..在线观看| 国产亚洲精品久久久久久毛片| 亚洲激情在线av| www.www免费av| 黄色丝袜av网址大全| 在线a可以看的网站| 久久久成人免费电影| 亚洲五月天丁香| 日本在线视频免费播放| 999久久久精品免费观看国产| 久久久久久久久久黄片| 午夜激情欧美在线| 激情在线观看视频在线高清| 国产精品免费一区二区三区在线| 久久久久国内视频| 国产亚洲欧美98| 国产精品免费一区二区三区在线| 欧美另类亚洲清纯唯美| 国产精品嫩草影院av在线观看 | 欧美乱色亚洲激情| 9191精品国产免费久久| 免费无遮挡裸体视频| 国产乱人视频| 搡女人真爽免费视频火全软件 | 午夜久久久久精精品| 91狼人影院| av福利片在线观看| 午夜福利18| 美女高潮喷水抽搐中文字幕| 我要看日韩黄色一级片| 亚洲av免费高清在线观看| 欧美成人免费av一区二区三区| 色综合婷婷激情| 欧美不卡视频在线免费观看| 久久这里只有精品中国| 一本一本综合久久| 国产激情偷乱视频一区二区| 久久国产乱子伦精品免费另类| 国产黄色小视频在线观看| 免费黄网站久久成人精品 | 亚洲五月天丁香| 尤物成人国产欧美一区二区三区| 不卡一级毛片| 黄色视频,在线免费观看| 久久久国产成人精品二区| 在线十欧美十亚洲十日本专区| 中文字幕人成人乱码亚洲影| 午夜老司机福利剧场| 国产精品一区二区免费欧美| 亚洲精品在线观看二区| 欧美在线一区亚洲| 亚洲三级黄色毛片| 免费看a级黄色片| 午夜亚洲福利在线播放| 精品人妻一区二区三区麻豆 | 高潮久久久久久久久久久不卡| 国产精品亚洲一级av第二区| 88av欧美| 最新在线观看一区二区三区| 久久国产精品影院| 国产三级黄色录像| 亚洲一区高清亚洲精品| 女同久久另类99精品国产91| 久久精品综合一区二区三区| 很黄的视频免费| 国产午夜精品论理片| av国产免费在线观看| 嫩草影院入口| 国产精品人妻久久久久久| 精华霜和精华液先用哪个| 最近最新免费中文字幕在线| 又黄又爽又刺激的免费视频.| 大型黄色视频在线免费观看| 国产精品久久久久久人妻精品电影| 日韩欧美在线二视频| 在线天堂最新版资源| 一二三四社区在线视频社区8| 狂野欧美白嫩少妇大欣赏| 国产伦在线观看视频一区| 欧美bdsm另类| 国产人妻一区二区三区在| 欧美乱色亚洲激情| 美女高潮喷水抽搐中文字幕| 亚洲第一欧美日韩一区二区三区| 精品一区二区三区视频在线观看免费| 国内毛片毛片毛片毛片毛片| av在线老鸭窝| 久久国产乱子免费精品| 亚洲精品久久国产高清桃花| 亚洲av中文字字幕乱码综合| 五月伊人婷婷丁香| 麻豆国产av国片精品| 免费av观看视频| 3wmmmm亚洲av在线观看| 久9热在线精品视频| 亚洲欧美日韩高清在线视频| 无遮挡黄片免费观看| 亚洲五月天丁香| 脱女人内裤的视频| 男人舔女人下体高潮全视频| 欧美xxxx性猛交bbbb| 少妇熟女aⅴ在线视频| 日韩欧美三级三区| 欧美成人免费av一区二区三区| 亚洲国产高清在线一区二区三| 欧美日韩中文字幕国产精品一区二区三区| 中文字幕人妻熟人妻熟丝袜美| 一区二区三区高清视频在线| 亚洲七黄色美女视频| 久久久久精品国产欧美久久久| 我的老师免费观看完整版| 一级毛片久久久久久久久女| 老女人水多毛片| 国产精品影院久久| 欧美在线一区亚洲| 99精品在免费线老司机午夜| 国产午夜精品久久久久久一区二区三区 | 在线十欧美十亚洲十日本专区| 免费电影在线观看免费观看| 欧美3d第一页| 老熟妇仑乱视频hdxx| 一夜夜www| 最近最新中文字幕大全电影3| 国产精品影院久久| 午夜老司机福利剧场| 国产精品人妻久久久久久| 草草在线视频免费看| 1024手机看黄色片| 少妇熟女aⅴ在线视频| 国产高清视频在线观看网站| 欧美极品一区二区三区四区| 国产三级中文精品| 91久久精品国产一区二区成人| 久久久久久久亚洲中文字幕 | 久久精品国产亚洲av天美| 身体一侧抽搐| а√天堂www在线а√下载| 午夜精品一区二区三区免费看| 精品人妻视频免费看| 国产亚洲精品久久久com| 在线观看舔阴道视频| 国产91精品成人一区二区三区| 午夜激情福利司机影院| 欧美区成人在线视频| 欧美性猛交╳xxx乱大交人| 又爽又黄a免费视频| 男人舔奶头视频| 最近最新免费中文字幕在线| 亚洲中文日韩欧美视频| 精品一区二区三区视频在线观看免费| 大型黄色视频在线免费观看| 高清日韩中文字幕在线| 成人无遮挡网站| 国产久久久一区二区三区| av福利片在线观看| 国产男靠女视频免费网站| 国产一区二区激情短视频| 在线观看午夜福利视频| 99久久成人亚洲精品观看| 国产精品98久久久久久宅男小说| av在线观看视频网站免费| 午夜亚洲福利在线播放| 蜜桃久久精品国产亚洲av| 亚洲国产精品久久男人天堂| 久久中文看片网| 嫩草影院新地址| 精品一区二区三区视频在线| 国模一区二区三区四区视频| 别揉我奶头~嗯~啊~动态视频| netflix在线观看网站| 美女免费视频网站| 嫩草影院入口| bbb黄色大片| 少妇的逼水好多| 日韩精品青青久久久久久| 亚州av有码| 国产精品女同一区二区软件 | 国产精品三级大全| 禁无遮挡网站| 欧美一级a爱片免费观看看| 国产乱人视频| 免费观看人在逋| 如何舔出高潮| 欧美不卡视频在线免费观看| 丰满的人妻完整版| 午夜精品在线福利| 成人一区二区视频在线观看| 国产精品影院久久| 日韩欧美免费精品| 国产久久久一区二区三区| 午夜福利在线在线| 日韩亚洲欧美综合| 激情在线观看视频在线高清| 一夜夜www| 国产伦精品一区二区三区四那| 久久亚洲精品不卡| 国产成人欧美在线观看| 又粗又爽又猛毛片免费看| 亚洲五月天丁香| 好看av亚洲va欧美ⅴa在| 亚洲综合色惰| 校园春色视频在线观看| 亚洲美女黄片视频| x7x7x7水蜜桃| 亚洲精品亚洲一区二区| 男人和女人高潮做爰伦理| 99久久九九国产精品国产免费| 淫秽高清视频在线观看| 可以在线观看毛片的网站| 男女做爰动态图高潮gif福利片| 国产中年淑女户外野战色| 亚洲电影在线观看av| 亚洲av第一区精品v没综合| 99热精品在线国产| 高清日韩中文字幕在线| 丰满人妻熟妇乱又伦精品不卡| 国产野战对白在线观看| 少妇人妻精品综合一区二区 | 观看美女的网站| 丁香六月欧美| 亚洲18禁久久av| 国产精品永久免费网站| 美女免费视频网站| 成年女人毛片免费观看观看9| 国产高清视频在线播放一区| 欧美乱妇无乱码| 国语自产精品视频在线第100页| 少妇的逼好多水| 午夜久久久久精精品| 少妇丰满av| 国内精品久久久久久久电影| 亚洲专区中文字幕在线| 国产成人aa在线观看| 99视频精品全部免费 在线| 天美传媒精品一区二区| 熟妇人妻久久中文字幕3abv| 嫩草影院精品99| 美女被艹到高潮喷水动态| 一进一出好大好爽视频| 国产成人啪精品午夜网站| 日本成人三级电影网站| 成年女人永久免费观看视频| 国产精品野战在线观看| 九色成人免费人妻av| 黄色丝袜av网址大全| 精品久久久久久久久亚洲 | 国产亚洲精品综合一区在线观看| 天堂√8在线中文| 中文在线观看免费www的网站| 国产午夜精品久久久久久一区二区三区 | 国产三级在线视频| 99热6这里只有精品| 色哟哟哟哟哟哟| 亚洲五月婷婷丁香| 九九在线视频观看精品| 超碰av人人做人人爽久久| 欧美潮喷喷水| 天堂√8在线中文| 国产 一区 欧美 日韩| 少妇丰满av| 国产v大片淫在线免费观看| 国产三级在线视频| 欧美黄色淫秽网站| 亚洲精品日韩av片在线观看| 久久久久性生活片| 在线观看av片永久免费下载| 国产精品嫩草影院av在线观看 | 国产一级毛片七仙女欲春2| 性插视频无遮挡在线免费观看| 成人高潮视频无遮挡免费网站| 国产精品自产拍在线观看55亚洲| 亚洲国产日韩欧美精品在线观看| 欧美性猛交╳xxx乱大交人| 亚洲中文日韩欧美视频| 噜噜噜噜噜久久久久久91| 国产激情偷乱视频一区二区| 国产成人福利小说| 麻豆一二三区av精品| 国产欧美日韩精品亚洲av| av在线老鸭窝| www.999成人在线观看| 中文字幕人妻熟人妻熟丝袜美| 草草在线视频免费看| 蜜桃久久精品国产亚洲av| 精品久久久久久久久亚洲 | 久久久久国产精品人妻aⅴ院| 一级毛片久久久久久久久女| 久久精品国产亚洲av涩爱 | 亚洲成人免费电影在线观看| 午夜老司机福利剧场| 三级男女做爰猛烈吃奶摸视频| 久久亚洲真实| 变态另类成人亚洲欧美熟女| 午夜老司机福利剧场| 变态另类成人亚洲欧美熟女| 久久久久九九精品影院| 999久久久精品免费观看国产| 国模一区二区三区四区视频| 日本黄色视频三级网站网址| 精品一区二区三区视频在线| 中文字幕av成人在线电影| 亚洲成人久久爱视频| 成人av一区二区三区在线看| 日韩有码中文字幕| 人人妻,人人澡人人爽秒播| 国产精品美女特级片免费视频播放器| 此物有八面人人有两片| 国产69精品久久久久777片| 亚洲精品在线观看二区| 美女高潮的动态| 亚洲自拍偷在线| 国产单亲对白刺激| 一区福利在线观看| www.熟女人妻精品国产| 亚洲av.av天堂| 亚洲天堂国产精品一区在线| 十八禁网站免费在线| 免费在线观看日本一区| 国产一区二区在线av高清观看| 啦啦啦观看免费观看视频高清| 我的女老师完整版在线观看| 国产在线精品亚洲第一网站| www.色视频.com| 色综合欧美亚洲国产小说| eeuss影院久久| 亚洲人成网站在线播| 热99在线观看视频| 国产av一区在线观看免费| 国内揄拍国产精品人妻在线| 国产综合懂色| 亚洲自偷自拍三级| 麻豆一二三区av精品| 综合色av麻豆| 两性午夜刺激爽爽歪歪视频在线观看| 日本a在线网址| 亚洲最大成人中文| 免费看美女性在线毛片视频| 国产毛片a区久久久久| 乱人视频在线观看| 淫妇啪啪啪对白视频| 好男人电影高清在线观看| 国产亚洲欧美在线一区二区| 日韩有码中文字幕| av专区在线播放| 国产爱豆传媒在线观看| 欧美xxxx黑人xx丫x性爽| 亚洲在线自拍视频| 国产精品久久久久久亚洲av鲁大| 十八禁人妻一区二区| 亚洲欧美日韩东京热| 88av欧美| 一卡2卡三卡四卡精品乱码亚洲| 九九在线视频观看精品| 国产伦人伦偷精品视频| 国产探花在线观看一区二区| 日本 av在线| 国产欧美日韩一区二区精品| 国产毛片a区久久久久| 久久久成人免费电影| 两人在一起打扑克的视频| 亚洲第一区二区三区不卡| 欧美成人性av电影在线观看| 级片在线观看| 丁香欧美五月| 亚洲人成电影免费在线| 黄色日韩在线| 亚洲五月婷婷丁香| 91午夜精品亚洲一区二区三区 | 成人美女网站在线观看视频| 亚洲av电影在线进入| 91狼人影院| 亚洲国产精品成人综合色| .国产精品久久| 久久性视频一级片| 午夜福利高清视频| 亚洲精品456在线播放app | 天天躁日日操中文字幕| 色哟哟哟哟哟哟| 非洲黑人性xxxx精品又粗又长| 日韩成人在线观看一区二区三区| 别揉我奶头 嗯啊视频| 丰满人妻一区二区三区视频av| 成人三级黄色视频| 精品人妻偷拍中文字幕| 十八禁人妻一区二区| 婷婷亚洲欧美| 国产黄色小视频在线观看| 亚洲av中文字字幕乱码综合| 欧美精品国产亚洲| 午夜久久久久精精品| 久久这里只有精品中国| 欧美成人免费av一区二区三区| 亚洲成人精品中文字幕电影| 99热6这里只有精品| 全区人妻精品视频| 一边摸一边抽搐一进一小说| 一本精品99久久精品77| 18禁黄网站禁片免费观看直播| 国产精品日韩av在线免费观看| 看黄色毛片网站| 制服丝袜大香蕉在线| 亚洲精品一卡2卡三卡4卡5卡| 男人和女人高潮做爰伦理| 欧美又色又爽又黄视频| 亚洲不卡免费看| 在线免费观看的www视频| 窝窝影院91人妻| 欧美日韩乱码在线| 在线天堂最新版资源| 午夜精品久久久久久毛片777| 午夜影院日韩av| 直男gayav资源| 少妇的逼好多水| 欧美激情国产日韩精品一区| 欧美xxxx黑人xx丫x性爽| 成人毛片a级毛片在线播放| 亚洲欧美激情综合另类| avwww免费| 啦啦啦观看免费观看视频高清| 极品教师在线免费播放| 国产精品1区2区在线观看.| 亚洲最大成人手机在线| 嫩草影视91久久| 欧美成人免费av一区二区三区| 在线免费观看的www视频| 日韩欧美在线乱码| 亚洲精品影视一区二区三区av| 99久久久亚洲精品蜜臀av| 桃色一区二区三区在线观看| 国产欧美日韩一区二区三| 免费在线观看日本一区| av在线天堂中文字幕| 成年版毛片免费区| 欧美日韩福利视频一区二区| 精品人妻视频免费看| 国产综合懂色| 最近视频中文字幕2019在线8| 一个人看的www免费观看视频| 一本一本综合久久| 久久国产乱子伦精品免费另类| 中文字幕人妻熟人妻熟丝袜美| 欧美性猛交黑人性爽| 757午夜福利合集在线观看| 亚洲最大成人手机在线| 亚洲欧美日韩无卡精品| 久久久久久久亚洲中文字幕 | 日日摸夜夜添夜夜添小说| 性色av乱码一区二区三区2| 九九在线视频观看精品| 在线看三级毛片| 丰满的人妻完整版| 亚洲三级黄色毛片| 黄片小视频在线播放| 97超级碰碰碰精品色视频在线观看| 一本精品99久久精品77| 香蕉av资源在线| 直男gayav资源| 最新中文字幕久久久久| 欧美中文日本在线观看视频| 中文字幕av成人在线电影| 日本撒尿小便嘘嘘汇集6| 18禁黄网站禁片免费观看直播| 直男gayav资源| 在线免费观看的www视频| 中文字幕人妻熟人妻熟丝袜美| 国产私拍福利视频在线观看| 级片在线观看| 亚洲av.av天堂| 久久久久久久亚洲中文字幕 | 欧美色欧美亚洲另类二区| 自拍偷自拍亚洲精品老妇| 两人在一起打扑克的视频| 亚洲欧美日韩无卡精品| 精品日产1卡2卡| 最新中文字幕久久久久| 久久久久精品国产欧美久久久| 久久中文看片网| 人妻丰满熟妇av一区二区三区| 国产一区二区激情短视频| 色综合婷婷激情| 免费观看人在逋| 免费无遮挡裸体视频| 日韩欧美精品免费久久 | 我要搜黄色片| 国产精品乱码一区二三区的特点| 男女视频在线观看网站免费| 亚洲成人免费电影在线观看| 欧美色视频一区免费| 日本黄大片高清| 欧美日韩福利视频一区二区| 亚洲精品在线观看二区| 亚洲第一欧美日韩一区二区三区| 在线观看一区二区三区| 免费观看精品视频网站| 老鸭窝网址在线观看| 欧美又色又爽又黄视频| 九色国产91popny在线| 国产伦人伦偷精品视频| 一区二区三区高清视频在线| 亚洲国产精品久久男人天堂| 我要看日韩黄色一级片| 999久久久精品免费观看国产| 99久国产av精品| 成年女人永久免费观看视频| 一级黄色大片毛片| 欧美丝袜亚洲另类 | 99久久无色码亚洲精品果冻| 97碰自拍视频| 久久国产精品人妻蜜桃| 欧美成人性av电影在线观看| 亚洲 国产 在线| 高清在线国产一区| 嫩草影院精品99| 永久网站在线| 欧美成人免费av一区二区三区| 久久精品综合一区二区三区| 久久香蕉精品热| 国产v大片淫在线免费观看| 色哟哟·www| 欧美区成人在线视频| 久久精品国产99精品国产亚洲性色| 免费高清视频大片| 国产精品1区2区在线观看.| 国产亚洲欧美98| 国产欧美日韩精品亚洲av| 一个人看的www免费观看视频| 国产视频内射| 88av欧美| 搞女人的毛片| 嫩草影院入口| 91久久精品电影网| 亚洲熟妇中文字幕五十中出| 十八禁人妻一区二区| 亚洲一区二区三区色噜噜| 一本一本综合久久| 国产av在哪里看| 欧美另类亚洲清纯唯美| 亚洲av免费在线观看| 色综合婷婷激情| 欧美激情在线99| 亚洲国产高清在线一区二区三| 午夜激情欧美在线| 丁香欧美五月| 高清在线国产一区| 久久精品综合一区二区三区| 亚洲国产精品合色在线| 成年人黄色毛片网站| 波多野结衣高清无吗| 午夜福利成人在线免费观看| 日韩欧美三级三区|