• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

    2021-12-14 06:06:34NojoodAljehane
    Computers Materials&Continua 2021年9期

    Nojood O.Aljehane

    College of Computer Science and Information Technology,University of Tabuk,Tabuk,Saudi Arabia

    Abstract:Cyber physical systems (CPSs) are a networked system of cyber(computation,communication)and physical(sensors,actuators)elements that interact in a feedback loop with the assistance of human interference.Generally,CPSs authorize critical infrastructures and are considered to be important in the daily lives of humans because they form the basis of future smart devices.Increased utilization of CPSs,however,poses many threats,which may be of major significance for users.Such security issues in CPSs represent a global issue;therefore,developing a robust,secure,and effective CPS is currently a hot research topic.To resolve this issue,an intrusion detection system(IDS)can be designed to protect CPSs.When the IDS detects an anomaly,it instantly takes the necessary actions to avoid harming the system.In this study,we introduce a new parameter-tuned deep-stacked autoencoder based on deep learning(DL),called PT-DSAE,for the IDS in CPSs.The proposed model involves preprocessing,feature extraction,parameter tuning,and classification.First,data preprocessing takes place to eliminate the noise present in the data.Next,a DL-based DSAE model is applied to detect anomalies in the CPS.In addition,hyperparameter tuning of the DSAE takes place using a search-and-rescue optimization algorithm to tune the parameters of the DSAE,such as the number of hidden layers,batch size,epoch count,and learning rate.To assess the experimental outcomes of the PT-DSAE model,a series of experiments were performed using data from a sensor-based CPS.Moreover,a detailed comparative analysis was performed to ensure the effective detection outcome of the PT-DSAE technique.The experimental results obtained verified the superior performance on the applied data over the compared methods.

    Keywords:Cyberphysical system;intrusion detection system;autoencoder;cybersecurity

    1 Introduction

    In general,sensors are embedded in cyberphysical systems (CPSs) to monitor anomalies and manage intrusions and hazards.To predict and prevent abnormalities,anomaly detection systems(ADSs) have been applied.Therefore,ADSs experience false positives (FPs,false alarms) and false negatives (FNs,missed predictions),which result in performance limitations in CPS domains.In particular,FPs tend to recover unwanted information,whereas FNs tend to recover essential data only.These prediction errors result in imbalanced values,which are forwarded to the controller and result in nonoptimal destabilizing control solutions that compromise the system performance.For instance,prediction errors result in catastrophic actions,such as reactor dispersion in process control systems,pollution in water distribution systems,and traffic control in smart transportation networks [1].

    CPS networks are comprised of sensors,actuators,and networking modules,which are suitable in the fields of power,automation,development,civil structure,and medicine,among others.Generally,a CPS is a difficult system in which external operations and cyber applications are supported in a combined fashion.Although information and communications technology (ICT)is extremely progressed in CPSs,cybersecurity is still considered a vital issue in several sectors.One of the complicated vulnerabilities in CPSs is intrusion hazards.In the past few decades,close attention has been paid to the enhancement of CPS security.Intrusion detection (ID) is one of the important applications for maximizing the integrity of CPSs.Intrusion detection systems (IDSs)are usually applied to effectively prevent attacks.In 1980,Anderson presented the notion of basic ID,which was later followed by a massive number of studies on IDSs.

    In general,IDS approaches are categorized into two major classes:misuse and anomaly prediction.Initially,features of well-known attacks are applied for misuse prediction.At this point,the audited data are related to a database and reported as an intrusion.Although misuse detectors generate the minimum FPs,these detectors have massive limitations.For example,with these detectors,developing and maximizing a comprehensive database represent a tedious operation,and well-known attacks are expected.Many models have been developed for misuse prediction.For example,Abbes et al.established a new protocol analysis to enhance the performance of pattern matching.In [2],the authors estimated ID-based pattern matching.A rule-based expert method has been used for misuse prediction.Moreover,a genetic algorithm (GA) has been employed for computing misuse detection.Recently,data mining (DM) schemes have been used to develop misuse prediction approaches.An extensive review of ID by GAs and DM is available in [3].However,only a few efforts were made to classify and predict system intrusions under the application of colored Petri nets.Anomaly detectors shape the general behavior of a network.An intrusion is defined as considerable degradation from general system operation.One of the major benefits of these detectors is their ability to identify attacks,which is traditionally unknown.Unlike classical models,this model yields FPs,although its accuracy is low.

    Some prediction approaches depend on clustering models.Recently,several artificial learning methods have been extensively applied in anomaly prediction.Currently,the only anomaly detection (AD) technologies available are neural networks (NNs),GAs,and wavelet.Previous works on IDS have assumed misuse detection and anomaly prediction.Conventionally,misuse and anomaly prediction approaches have both major advantages and disadvantages.Previous IDSs have been applied only for the identification of misuse or anomaly attacks,whereas concurrent misuse and anomaly IDSs have been developed to address limitations.

    In this study,we introduce a new parameter-tuned deep-stacked autoencoder based on deep learning (DL),called PT-DSAE,for the IDS in CPSs.The proposed model comprises preprocessing to eliminate the noise present in the data.Next,a DL-based DSAE model is applied to detect anomalies in the CPS.In addition,hyperparameter tuning of the DSAE is performed by a search-and-rescue (SAR) optimization algorithm to tune the number of hidden layers,batch size,epoch count,and learning rate.To evaluate the experimental outcomes of the PT-DSAE model,a series of experiments were performed on data from a sensor-based CPS.

    2 Literature Review

    Different types of detectors have been introduced with machine learning (ML) and NNs.Goh et al.[4]established an unsupervised method for anomaly prediction in CPS-based recurrent neural networks (RNNs) as well as a cumulative sum approach.Kosek [5]implied a contextual AD technology for smart grids based on NNs.Krishnamurthy et al.[6]used a secondary method called Bayesian networks,which provides a means for learning causal correlations and temporal relations in cyber and external parameters from unlabeled data using Bayesian systems.Such modules are employed to predict abnormalities and isolate root causes.Jones et al.[7]developed a method based on formal ones to compute AD in CPSs.This model is equipped with model-free,unsupervised learning,which tends to create signal temporal logic (STL) from the final outcomes collected in common operations.Next,anomalies are predicted by a flagging method that does not satisfy the learned function.Kong et al.[8]described a scheme based on formal methods for supervised anomaly learning.

    Chibani et al.[9]investigated the problems faced while creating fault detection filters in fuzzy systems,which assume errors and failures in discrete-time polynomial fuzzy systems.Moreover,AD is employed in security intrusions to predict the CPS over the intrusions.Urbina et al.[10]used a physics-based prediction of stealthy intrusions through industrial control systems.Conventional works are defined with prediction principles,which does not restrict the influence of stealthy attacks.Next,a new measure was utilized to measure the impacts,demonstrating attacks distinguished with better configuration.Unlike former schemes,Kleinmann et al.[11]considered predictive attacks over industrial control networks on the basis of cyber anomalies,and various modalities have been considered for forecasting errors projected in traffic networks.

    Lu et al.[12]recommended a former work in AD of traffic sensors that,according to the level of data used,categorizes detection methods into three phases:macroscopic,mesoscopic,and microscopic.In general,several data correction approaches have provided practical guidelines for AD in traffic networks.Zygouras et al.[13]developed three methods based on Pearson’s correlation,cross-correlation,and multivariate ARIMA to examine failed traffic values.They also employed crowdsourcing to resolve indefinite values in faulty sensors.Finally,Robinson [14]applied a sample based on the correlation between flows at close sensors to detect faulty loop detectors.

    3 The Proposed Parameter-Tuned Deep-Stacked Autoencoder Model

    Fig.1 shows the process involved in the proposed PT-DSAE model.As depicted,the input data are first preprocessed to remove noise.Then,DSAE-based classification is performed,in which the parameters are optimized using an SAR optimization algorithm.

    3.1 Stacked Autoencoder

    It should be noted that the stacked autoencoder (SAE) applied in this study was developed using various autoencoder (AE) and logistic regression (LR) layers,as depicted in Fig.2.The AE is a fundamental unit of the SAE classification method.It is composed of an encoding step(Layers 1 to 2) and a decoding or reconstruction step (Layers 2 to 3).This process is depicted in Eqs.(1) and (2),whereWandWT(transpose of W) are weight matrices of modesbandb′are 2 various bias vectors of this mode;sis defined as a nonlinearity function,like the applied sigmoid function;ydenotes latent parameter implication of the input layerx;andzis viewed as a prediction ofxgiveny,which has a similar shape to that ofx:

    Various AE layers are jointly stacked in the unsupervised pretraining phase (Layers 1 to 4).Then,the secondary representation ‘y’processed by the AE is applied as an input to the upcoming AE layer.The layer then undergoes training as an AE by reducing the reconstruction error,which has simultaneously been computed [15].Then,the reconstruction error (loss functionL(x,z)) is estimated in massive iterations.At this point,cross-entropy is applied to measure the reconstruction error,as depicted in formula (3),wherexkandzkrepresent thekth element ofxandz,respectively:

    Importantly,the reconstruction failure is limited when a gradient descent (GD) model is applied.Hence,the weights in Eqs.(1) and (2) should be upgraded on the basis of Eqs.(4)-(6),where 0 implies a learning rate:

    Figure 1:Steps followed in the proposed model

    Once the layers are pretrained,the system is supervised at a fine-tuning stage.Then,from the supervised fine-tuning stage,an LR layer is included in an output layer at an unsupervised pretraining phase.In this work,the probability with input vectorx(Layer 4) comes under classias illustrated in formula (7),whereydefines a predicted class of input vectorx,·W;brepresents a weight matrix and bias vector;WjandWjrepresent theith andjth row of matrixW,respectively;bjandbjare theith andjth elements of vectorb,respectively;and softmax is a nonlinearity function applied in this work.The class with the maximum probability is considered the predicted label (ypred) of the input vectorx,as depicted in formula (8).The prediction error of a sample data setD(Loss(D))is estimated on the basis of true labels,as illustrated in formula (9),whereyjdenotes a true label ofxj.Loss(D)is reduced when a GD scheme is applied,which is same as reducing the reconstruction failure,as defined in the following:

    Figure 2:Stacked autoencoder (SAE) structure

    3.2 Parameter Optimization of a Deep-Stacked Autoencoder

    In SAE networks,the pretraining layer is essential to gain the best weights with the help of an optimization model,and this is applied as initial variables for deep AE systems.Then,optimal attributes are applied to achieve the best detection accuracy.One of the effective models applied in this approach is backpropagation(BP),which depends on GD.However,this model has some deficiencies in large data sets,such as a low convergence speed and probability to fall into a local extremum.Here,theL-BFGS method is applied for initial parameter examination.This is one of the significant limited-memory quasi-newton mechanisms that can be applied in largescale data optimization issues.It can also be applied to search global optima with the maximum convergence speed.The procedure ofL-BFGS is defined inλlgvxiithm1.The main objective of this work is to identify optimal attributesθby reducing a functionf(x),wheref(x)is a nonlinear,frequently differentiable objective function.An objective function is illustrated in Eq.(4).Here,Hkrepresents an inverse Hessian approximation,which is upgraded at each iteration to obtainHk+1.In previous quasi-newton technologies,Hkwas denser and had an increased number of iterations,which becomes impossible as the memory and processing of a matrix.In general,theL-BFGS approach does not require the storage of a fulln×ninverse Hessian matrix;it saves the extended version ofHkby changing {sk,yk}.This model keepsr,which represents correction pairsfor upgrading theriterations.It can be seen that the cost of every iteration is minimal;thus,theL-BFGS approach exhibits a high implementation speed and strong robustness.

    Algorithm 1:Application of the L-BFGS model to reduce a strictly convex function 1:Initiate θ0 as θij 0~[-6/N+M,6/N+M],(θ ∈RN×M)2:for k=1,2,... until convergence do 3:Estimate gk=?f(θk)4: sk-1=θk-θk-1,yk-1=gk-gk-1 5: H0k=sTk-1yk-1 yTk-1yk-1 I 6:for i=k-r,...,k-1 do 7: si=θi+1-θi yi=gi+1-gi ρi=1 yTk sk Vi=I-ρiyisTi 8:end for 9: Hk=images/BZ_1054_400_2300_424_2346.pngVTk-1...VTk-rimages/BZ_1054_680_2300_704_2346.pngH0kimages/BZ_1054_778_2314_796_2359.pngVk-r...Vk-1images/BZ_1054_1051_2314_1069_2359.png+ρk-rimages/BZ_1054_1213_2300_1238_2346.pngimages/BZ_1054_1538_2300_1562_2346.pngimages/BZ_1054_1733_2314_1751_2359.pngVk-r+1...Vk-1images/BZ_1054_2052_2314_2070_2359.pngimages/BZ_1054_871_2403_896_2448.pngimages/BZ_1054_1196_2403_1220_2448.pngVTk-1...VTk-r+1 sk-rsTk-r+ρk-r+1 VTk-1...VTk-r+2 sk-r+1sTk-r+1images/BZ_1054_1480_2417_1498_2462.pngVk-r+2...Vk-1images/BZ_1054_1798_2417_1816_2462.png+...+ρk-1sk-1sTk-1 10:Allocate step size αk θk+1=θk+αkHkgk k ←k+1 11:end for

    3.3 A Deep-Stacked Autoencoder Model Based on Search and Rescue

    To enhance the training process of theL-BFGS model,a SAR optimization algorithm is employed.In SAR,the humans’places are similar to the solutions attained for optimization issues,and the volume of clues identified in these positions refers to an objective function for such solutions [16].Fig.3 shows the flowchart of SAROA.

    Figure 3:Process of SAROA

    Group variants collect clue data in the search,and only a few clues are left after identifying the optimal clues in alternate positions;however,this information is applied to enhance the searching task.In this approach,the places of the remaining clues are recorded in a memory matrix(matrixM),whereas intrusions are assumed in a position matrix (matrixX).The dimensions of matrixMare similar to those ofX.InN×Dmatrices,Drepresents the dimension of a problem andNrefers to intrusions.The clues matrix (matrixC) is described as a matrix with the places of clues.This matrix is composed of twoXandM.Notably,Eq.(10) implies the development ofC.Novel solutions in social and individual stages are deployed on the basis of the clues matrix,and it is the significant portions of SAR.The matricesMandCare upgraded in the human search phase:

    whereMandXrefer to the memory and intrusion of a CPS,respectively,andXN1denotes the place of the first dimension for theNth value.Additionally,M1Drepresents the location of theDth dimension for the first memory.These modules have two phases,a social phase and an individual phase,as shown in the following.

    From the given statement,a random clue was considered to find the searching direction using the given expression:

    whereXi,Ck,andSDidenote the place of theith intrusion,the position of thekth clue,and a search direction of theith value,respectively,andkdenotes a random value within 1 and 2N(selected ink/=i).

    Importantly,the search process should be computed when the group members are identified.However,the dimensions ofXiremain the same in Eq.(11).This condition is applied using a binomial crossover operator.Moreover,a defined clue is optimal when compared with clue based on recent position,the regions fromSDidirection as well as place of a clue is identified (Area 1);otherwise,a search task is processed in the present location withSDidirection (Area 2).Finally,the given function is applied in a social phase:

    whereX′i,jdenotes the position of theith dimension for theith intrusion;Ckjrepresents the position of thejtdimension in thekth clue found;f(C)andf(X)are the objective functions for the solutionsCkandXi,respectively;r1 denotes a random value with a uniform distribution from [-1,1];r2 mimics uniformly distributed arbitrary within [0,1]that is varied from all the dimensions,and hence r1 is fixed for such dimensions;jrandrepresents a random value other than 1 andDassures a 1D ofX′i,jis differed fromXij;and SE represents a model variable from 0 and 1.Here,Eq.(12) is applied to achieve a new location ofith dimensions.

    In the individual phase,intrusions are identified by the present clues applied in the social phase used for the searching process.Unlike in the social phase,the dimensions ofXiare modified in an individual phase.Hence,the intrusion of theith objective is obtained by the given derivations:

    wherekandmrepresent random integer values ranging from 1 to 2N.To eliminate movement with other clues,kandmare selected ini/=k/=m.r3 defines a random value with a uniform distribution within 0 and 1.

    In metaheuristic approaches,solutions should be placed in a solution space.When the solution exceeds the considered solution space,then it needs to be changed.Thus,when an IDS is processed from a solution space,the following equation is applied to change the new position:

    whereandare the measures of the higher and lower thresholds for thejth dimension,respectively.

    In all iterations,the group members find two stages in which the measure of the objective function at positionX(f(X))is higher than the existing one(f(Xi)).The traditional position (X)is saved randomly from a memory matrix (M) with the help of Eq.(15) and is approved as a novel place with the help of Eq.(16);otherwise,it is left and the memory remains the same:

    whereMndenotes the place of thenth clue saved in the memory matrix andndefines a random integer value from 1 toN.This allows memory updates to enhance the diversity of a model and the capability of this model to identify a global optimum.

    In the case of an SAR process,time is considered a significant factor,because when people get wounded,any delay by the SAR teams prevents them from finding these people.Hence,the process defined above is computed with a massive space and limited time duration.In general,the unsuccessful search number (USN) is fixed as 0 for all human beings.When an intrusion is examined,the USN is set as 0;otherwise,it is changed to 1,as shown below:

    whereUSNishows the time of humaniwas not applicable to identify optimal clues.If the USN is higher than the maximum unsuccessful search value (MU),then a random position is selected in a search space by Eq.(18),andUSNiis fixed as 0:

    wherer4 refers to a random value with a uniform distribution ranging from 0 to 1,which differs from one dimension to another.

    Generally,SAR is composed of two control variables:social effect (SE) and MU.The SE is applied to manage the impact of group members in the social phase.This attribute falls in the range [0,1].Higher values of SE enhance the convergence value and limit the global search of a method.Here,theeMU parameter indicates a greater number of ineffective searches before excluding a clue.It falls within the range [0,2×Tmax],where 2×Tmaxmeans higher searches andTmaxrepresents a larger number of iterations.In case of massive values inMU,attacks or intrusions can be identified.A minimum value of this attribute results in Group 3 members finishing their exploration of the present clue and moving on to an alternate position.Therefore,MU is compared with the dimension of the problem.When the search space is maximized,the massive count of unsuccessful searches is also enhanced.Hence,the measure of SE is allocated as 0.05,and the measure of MU is accomplished by Eq.(19).Analysis of the SAR variables shows that the predefined values for SE and MU can be applied to identify CPS intrusions:

    4 Performance Validations

    For an experimental analysis,a series of experiments were performed on the NSL-KDD dataset,which includes samples under five attack types.This dataset contains a total of 45,927 samples under denial-of-service (DoS) attack,995 samples under R21 attack,11,656 samples under probe attack,52 samples under U2r attack,and 67,343 samples under normal attack,as shown in Tab.1.Fig.4 presents details related to this dataset.

    Table 1:Dataset description

    Figure 4:Types of attacks in the NSL-KDD dataset

    Both Tab.2 and Fig.5 show the performance of the PT-DSAE model in the identification of intrusions in a CPS.The figure shows that the PT-DSAE model has detected DoS attacks with a precision of 0.9702,recall of 0.9837,F-measure of 0.9778,and accuracy of 0.9787;R21 attacks with a precision of 0.9806,recall of 0.9861,F-measure of 0.9872,and accuracy of 0.9867;probe attacks with a precision of 0.9895,recall of 0.9922,F-measure of 0.9933,and accuracy of 0.9918;U2r attacks with a precision of 0.9793,recall of 0.9863,F-measure of 0.9851,and accuracy of 0.9842;normal attacks with a precision of 0.9758,recall of 0.9840,F-measure of 0.9851,and accuracy of 0.9842;and intrusions with a average precision of 0.9791,recall of 0.9865,F-measure of 0.9860,and accuracy of 0.9849.

    Table 2:Result analysis of the proposed PT-DSAE method

    Figure 5:Result analysis of the PT-DSAE method with different measures (a) Precision;(b) Recall;(c) F-measures and (d) Accuracy

    Tab.3 and Figs.6 and 7 show a comparative result analysis of the PT-DSAE model with existing models with respect to distinct measures [17-21].Regarding classifier results with respect to precision,the figure shows that the IDBN model yielded a poor classifier outcome with the least precision of 0.904.At the same time,the AK-NN model surpassed the IDBN model with a precision of 0.9219.Likewise,the DL model attained a precision of 0.9354,while an even better precision of 0.9512 was attained by the DPC-DBN model.Moreover,the DT model attained a moderate precision of 0.9659,while the AdaBoost,T-SID,random forest (RF),and SVM models attained close precision values of 0.9742,0.9751,0.9756,and 0.9774,respectively.However,it was observed that the proposed PT-DSAE model attained a maximum precision of 0.9791.

    Table 3:Result analysis of existing models with the proposed PT-DSAE method

    Figure 6:Comparative analysis of the PT-DSAE model in terms of precision and recall

    With regard to the computation of the classifier outcomes by means of recall,the Fig.6 shows that the IDBN method attained an inferior classifier result with a minimum recall of 0.92.Simultaneously,the DT framework outperformed the IDBN model with a recall value of 0.9284.Similarly,the AdaBoost approach generated a recall value of 0.9321,while a moderate recall value of 0.9376 was generated by the AK-NN scheme.In line with this,the RF technology attained a considerable recall value of 0.9384,and the SVM,DL,DPC-DBN,and T-SID methods yielded close recall values of 0.9436,0.9487,0.9499,and 0.9517,respectively.Similarly,with regard to the evaluation of the classifier results in terms of F-measure,the Fig.7 shows that the IDBN method has attained an insignificant classifier outcome with a low F-measure of 0.908.Moreover,the AK-NN technology surpassed the IDBN method with an F-measure of 0.9292.In line with this,the DL approach generated an F-measure of 0.9412,while an acceptable F-measure of 0.9508 was generated by the DPC-DBN framework.Likewise,the DT scheme attained a reasonable F-measure of 0.9542,followed by the AdaBoost,RF,SVM,and T-SID methods,which attained close F-measure values of 0.9568,0.9592,0.9655,and 0.9729,respectively.Importantly,it was observed that the proposed PT-DSAE technique attained an optimal F-measure of 0.986.

    Figure 7:Comparative analysis of the PT-DSAE model in terms of F-measure and accuracy

    With regard to the measurement of the classifier results in terms of accuracy,the Fig.7 shows that the AK-NN approach yielded an ineffective classifier outcome with a minimal accuracy of 0.9199.Concurrently,the DL scheme performed quite better than the AK-NN model with an accuracy of 0.9277.Moreover,the DT method generated an accuracy of 0.9365,while a reasonable accuracy of 0.9396 was attained by the T-SID model.Similarly,the DPC-DBN scheme yielded a considerable accuracy of 0.9498,whereas the AdaBoost,RF,IDBN,and SVM approaches exhibited close accuracy values of 0.9587,0.9598,0.9617,and 0.9632,respectively.Importantly,it was observed that the newly proposed PT-DSAE scheme yielded a superior accuracy of 0.9849.

    5 Conclusion

    In this study,we developed an effective IDS using DL models for CPSs.First,input data were preprocessed to remove noise,and then a DSAE-based classification process was performed,in which the parameters were optimized using a SAR optimization algorithm.In SAE networks,the pretraining layer is essential to obtain the best weights with the help of an optimization model,and this is applied as initial variables for deep AE systems.To improve the training process of theL-BFGS model,a SAR optimization algorithm was employed.For an experimental analysis,a series of experiments were performed on the NSL-KDD dataset,which includes samples under five attack types.From the experimental results,it was observed that the PT-DSAE model identified intrusions with an average precision of 0.9791,recall of 0.9865,F-measure of 0.9860,and accuracy of 0.9849.Therefore,it can be applied as an effective tool for intrusion detection in CPSs.In the future,hybrid optimization algorithms can be used to improve the performance.

    Funding Statement:The author(s) received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    成人性生交大片免费视频hd| 亚洲成人一二三区av| 成年女人看的毛片在线观看| av国产久精品久网站免费入址| 国产免费福利视频在线观看| 熟妇人妻久久中文字幕3abv| 天堂影院成人在线观看| 亚洲人成网站在线播| 免费看日本二区| 久久99热6这里只有精品| 一二三四中文在线观看免费高清| 亚洲av免费在线观看| av免费在线看不卡| 免费播放大片免费观看视频在线观看| 亚洲欧洲国产日韩| 亚洲av.av天堂| 又粗又硬又长又爽又黄的视频| 欧美另类一区| 国产精品精品国产色婷婷| 国产黄色小视频在线观看| 毛片一级片免费看久久久久| 国产在视频线精品| 亚洲精品日本国产第一区| 免费在线观看成人毛片| 午夜精品国产一区二区电影 | 一边亲一边摸免费视频| 国产免费一级a男人的天堂| 美女国产视频在线观看| 91精品伊人久久大香线蕉| 国产乱来视频区| av线在线观看网站| 熟女人妻精品中文字幕| 高清毛片免费看| 亚洲久久久久久中文字幕| 十八禁网站网址无遮挡 | 免费不卡的大黄色大毛片视频在线观看 | 国产精品久久久久久久电影| 亚洲熟女精品中文字幕| 成人特级av手机在线观看| 国精品久久久久久国模美| 女人被狂操c到高潮| 中文字幕人妻熟人妻熟丝袜美| 日本熟妇午夜| 午夜日本视频在线| 婷婷六月久久综合丁香| 久久午夜福利片| 熟女人妻精品中文字幕| 亚洲av中文字字幕乱码综合| 精品熟女少妇av免费看| 91aial.com中文字幕在线观看| 有码 亚洲区| 丰满乱子伦码专区| 亚洲av男天堂| 久久精品夜色国产| 国产成人一区二区在线| 国产精品日韩av在线免费观看| 国产伦精品一区二区三区视频9| 亚洲自拍偷在线| 日本-黄色视频高清免费观看| 国产亚洲精品av在线| 最近的中文字幕免费完整| 精品久久国产蜜桃| 国产有黄有色有爽视频| 99久久精品一区二区三区| 国产免费又黄又爽又色| 成人一区二区视频在线观看| 亚洲精品国产av蜜桃| 一夜夜www| av.在线天堂| 国产在线男女| 男人狂女人下面高潮的视频| 国产片特级美女逼逼视频| 午夜精品在线福利| 国产精品精品国产色婷婷| 久久久久久国产a免费观看| 亚洲精品日韩av片在线观看| 1000部很黄的大片| 精品国内亚洲2022精品成人| 久热久热在线精品观看| 卡戴珊不雅视频在线播放| 国产精品一区二区三区四区免费观看| 超碰97精品在线观看| 精品国产三级普通话版| 亚洲精品日韩在线中文字幕| 免费av不卡在线播放| 精品国产一区二区三区久久久樱花 | 亚洲精品自拍成人| 91精品一卡2卡3卡4卡| 国产欧美另类精品又又久久亚洲欧美| 青春草国产在线视频| 久久久久久久久久黄片| 国产 一区精品| 黄色配什么色好看| 日韩一区二区视频免费看| 成人无遮挡网站| 国产成人精品婷婷| 亚洲av中文av极速乱| 天天躁夜夜躁狠狠久久av| 国产精品久久久久久久电影| 日产精品乱码卡一卡2卡三| 两个人的视频大全免费| 午夜福利在线观看免费完整高清在| 国产老妇女一区| 国产成人精品福利久久| 伊人久久精品亚洲午夜| 九九在线视频观看精品| 欧美区成人在线视频| av福利片在线观看| 亚洲精品日韩在线中文字幕| 国产成人精品婷婷| 舔av片在线| 午夜精品在线福利| 国产在视频线在精品| 精品国产露脸久久av麻豆 | 久久久午夜欧美精品| 床上黄色一级片| 偷拍熟女少妇极品色| 亚洲国产最新在线播放| 亚洲天堂国产精品一区在线| 在线观看av片永久免费下载| 亚洲aⅴ乱码一区二区在线播放| 丝瓜视频免费看黄片| 国产老妇女一区| 亚洲自偷自拍三级| 禁无遮挡网站| 亚洲国产色片| 日本熟妇午夜| 色综合亚洲欧美另类图片| 国产综合精华液| 女的被弄到高潮叫床怎么办| 国产伦一二天堂av在线观看| 日本与韩国留学比较| 免费观看性生交大片5| 国产人妻一区二区三区在| 亚洲天堂国产精品一区在线| 免费无遮挡裸体视频| 色综合亚洲欧美另类图片| 国产综合精华液| 亚洲人与动物交配视频| 少妇熟女aⅴ在线视频| 男的添女的下面高潮视频| 天天一区二区日本电影三级| 一级毛片久久久久久久久女| 一级毛片电影观看| 色吧在线观看| 精品久久国产蜜桃| 91狼人影院| 精品久久久久久成人av| 午夜久久久久精精品| 男女那种视频在线观看| 亚洲在线观看片| 免费大片黄手机在线观看| 赤兔流量卡办理| 久久久a久久爽久久v久久| 在线观看人妻少妇| 国产单亲对白刺激| 久久精品久久久久久久性| 99热这里只有精品一区| 午夜福利成人在线免费观看| 欧美丝袜亚洲另类| av在线播放精品| 在线观看美女被高潮喷水网站| av免费在线看不卡| 肉色欧美久久久久久久蜜桃 | 91久久精品国产一区二区三区| 免费av毛片视频| 久久久亚洲精品成人影院| 我的老师免费观看完整版| 精品人妻偷拍中文字幕| 91久久精品电影网| 亚洲精品乱码久久久久久按摩| 2021天堂中文幕一二区在线观| 亚洲欧美成人综合另类久久久| 亚洲伊人久久精品综合| 欧美成人一区二区免费高清观看| 亚洲久久久久久中文字幕| 一级毛片黄色毛片免费观看视频| 国产精品一区二区三区四区久久| 性插视频无遮挡在线免费观看| 成人综合一区亚洲| 亚洲电影在线观看av| 搡女人真爽免费视频火全软件| 欧美日韩视频高清一区二区三区二| 免费黄网站久久成人精品| 中文资源天堂在线| 日本与韩国留学比较| a级毛片免费高清观看在线播放| 三级毛片av免费| 日本一本二区三区精品| 日本免费在线观看一区| 91久久精品国产一区二区三区| 精品一区二区三区视频在线| 日韩视频在线欧美| 汤姆久久久久久久影院中文字幕 | 又爽又黄a免费视频| 久久6这里有精品| 久久99热这里只频精品6学生| 日韩不卡一区二区三区视频在线| 老师上课跳d突然被开到最大视频| 一级黄片播放器| 女人被狂操c到高潮| 久久久久性生活片| 天堂影院成人在线观看| 久久久久免费精品人妻一区二区| 麻豆成人av视频| 日产精品乱码卡一卡2卡三| 中文欧美无线码| 久久这里只有精品中国| 2018国产大陆天天弄谢| 一个人免费在线观看电影| 欧美日韩国产mv在线观看视频 | 国产成人a∨麻豆精品| 久久6这里有精品| 欧美成人a在线观看| 国产成人a∨麻豆精品| 午夜福利在线观看吧| 偷拍熟女少妇极品色| 黑人高潮一二区| 国产高清国产精品国产三级 | 狂野欧美白嫩少妇大欣赏| 日韩一区二区三区影片| 草草在线视频免费看| 我的老师免费观看完整版| 午夜精品一区二区三区免费看| 国产一区二区三区综合在线观看 | 久久国产乱子免费精品| 国产精品av视频在线免费观看| 国产不卡一卡二| 看非洲黑人一级黄片| 日本wwww免费看| 国产伦精品一区二区三区视频9| 七月丁香在线播放| 亚洲av成人精品一二三区| 久久精品国产自在天天线| 99久久精品热视频| 九色成人免费人妻av| 视频中文字幕在线观看| 日日摸夜夜添夜夜爱| 久久久久九九精品影院| 精品一区二区三卡| 在线天堂最新版资源| 菩萨蛮人人尽说江南好唐韦庄| 亚洲精品影视一区二区三区av| 国产精品熟女久久久久浪| 一个人看视频在线观看www免费| 国产真实伦视频高清在线观看| 欧美性猛交╳xxx乱大交人| 丝袜喷水一区| 国产高潮美女av| 一级a做视频免费观看| 中文字幕制服av| 久久久久国产网址| 日韩av在线免费看完整版不卡| 纵有疾风起免费观看全集完整版 | 中文精品一卡2卡3卡4更新| 床上黄色一级片| 欧美zozozo另类| 亚洲婷婷狠狠爱综合网| 一二三四中文在线观看免费高清| 久久国内精品自在自线图片| 国产美女午夜福利| 蜜桃久久精品国产亚洲av| 精品久久久噜噜| 天堂中文最新版在线下载 | 欧美精品一区二区大全| av一本久久久久| 成人亚洲精品av一区二区| 网址你懂的国产日韩在线| 国产成人精品婷婷| 女人被狂操c到高潮| 麻豆成人av视频| 黄片无遮挡物在线观看| 一本一本综合久久| 日韩在线高清观看一区二区三区| 深夜a级毛片| 精品一区二区三区视频在线| 不卡视频在线观看欧美| 亚州av有码| 婷婷色综合www| 久久久久国产网址| 免费av毛片视频| 99久久精品国产国产毛片| 色综合色国产| 床上黄色一级片| 天堂俺去俺来也www色官网 | 成人国产麻豆网| 最后的刺客免费高清国语| 久久久久免费精品人妻一区二区| 99热网站在线观看| av女优亚洲男人天堂| 91精品一卡2卡3卡4卡| 爱豆传媒免费全集在线观看| 韩国av在线不卡| www.av在线官网国产| 91久久精品国产一区二区三区| 国产单亲对白刺激| 免费观看在线日韩| 欧美日韩国产mv在线观看视频 | 精品久久久精品久久久| 天堂网av新在线| 亚洲第一区二区三区不卡| 一区二区三区四区激情视频| 一级爰片在线观看| 在线观看av片永久免费下载| 毛片女人毛片| 国产成人一区二区在线| 搡女人真爽免费视频火全软件| 春色校园在线视频观看| 国产毛片a区久久久久| 搡女人真爽免费视频火全软件| 国语对白做爰xxxⅹ性视频网站| 国产毛片a区久久久久| 黑人高潮一二区| 国产麻豆成人av免费视频| 亚洲欧美一区二区三区黑人 | 日韩欧美精品v在线| 一级毛片久久久久久久久女| 免费黄频网站在线观看国产| 搞女人的毛片| 99九九线精品视频在线观看视频| 国产亚洲av片在线观看秒播厂 | 在线观看美女被高潮喷水网站| 亚洲精品456在线播放app| 看十八女毛片水多多多| 亚洲欧洲日产国产| 国产精品一二三区在线看| 日韩人妻高清精品专区| 久久韩国三级中文字幕| 在线观看人妻少妇| 男人舔女人下体高潮全视频| 在现免费观看毛片| 国产精品久久久久久久电影| 综合色丁香网| 高清在线视频一区二区三区| 久久久久久伊人网av| 禁无遮挡网站| 亚洲欧美精品自产自拍| 91在线精品国自产拍蜜月| 亚洲精品一二三| 又大又黄又爽视频免费| 国产亚洲av嫩草精品影院| 在线a可以看的网站| 精品久久久久久久久av| 一级毛片aaaaaa免费看小| 国产不卡一卡二| 美女cb高潮喷水在线观看| 久久久久久久久久人人人人人人| 激情五月婷婷亚洲| 啦啦啦啦在线视频资源| 永久网站在线| 啦啦啦中文免费视频观看日本| 中文字幕av在线有码专区| 少妇被粗大猛烈的视频| 久久久久精品性色| 日韩一本色道免费dvd| 久久久色成人| 91久久精品电影网| 欧美xxxx性猛交bbbb| 午夜福利高清视频| 国产精品美女特级片免费视频播放器| av网站免费在线观看视频 | 青春草国产在线视频| 国产乱人视频| 一区二区三区免费毛片| 夫妻性生交免费视频一级片| 免费大片18禁| 极品少妇高潮喷水抽搐| 只有这里有精品99| 一二三四中文在线观看免费高清| 人人妻人人澡人人爽人人夜夜 | 国产亚洲5aaaaa淫片| 国产人妻一区二区三区在| 欧美精品一区二区大全| 亚洲精品第二区| 成人毛片60女人毛片免费| 免费观看的影片在线观看| 国产精品久久久久久久电影| 五月天丁香电影| 国产免费一级a男人的天堂| 国产精品嫩草影院av在线观看| 99视频精品全部免费 在线| 美女内射精品一级片tv| 久久久久久久久久人人人人人人| 最近手机中文字幕大全| 亚洲第一区二区三区不卡| 大香蕉97超碰在线| 男的添女的下面高潮视频| 久99久视频精品免费| 中文字幕av成人在线电影| 最近的中文字幕免费完整| 男女边摸边吃奶| 最近的中文字幕免费完整| 婷婷色麻豆天堂久久| 国产精品久久久久久精品电影小说 | 亚洲国产精品sss在线观看| 免费观看a级毛片全部| 舔av片在线| 人妻系列 视频| 久久亚洲国产成人精品v| 亚洲精品自拍成人| 亚洲精品国产成人久久av| 禁无遮挡网站| 尤物成人国产欧美一区二区三区| 国产免费一级a男人的天堂| 国产国拍精品亚洲av在线观看| 男女视频在线观看网站免费| av在线播放精品| 99久久精品国产国产毛片| 天堂影院成人在线观看| 国产精品99久久久久久久久| 日本午夜av视频| 一个人免费在线观看电影| 久久精品熟女亚洲av麻豆精品 | 国产高清国产精品国产三级 | 欧美性感艳星| videos熟女内射| 亚洲精品,欧美精品| 六月丁香七月| 国产激情偷乱视频一区二区| 亚洲国产av新网站| 久久久久性生活片| 夜夜看夜夜爽夜夜摸| 日日摸夜夜添夜夜爱| 亚洲人成网站在线观看播放| 久久久久久久久久黄片| 国产v大片淫在线免费观看| 国产女主播在线喷水免费视频网站 | 久久久久久久国产电影| 免费观看av网站的网址| 最近视频中文字幕2019在线8| 亚洲国产精品成人久久小说| www.av在线官网国产| 91aial.com中文字幕在线观看| 久久久精品欧美日韩精品| 欧美 日韩 精品 国产| 免费无遮挡裸体视频| av免费观看日本| 午夜精品在线福利| 精品一区二区三卡| 久久99热这里只有精品18| videos熟女内射| 免费观看a级毛片全部| 久久久久久久国产电影| freevideosex欧美| 国产视频首页在线观看| 欧美bdsm另类| 大话2 男鬼变身卡| 国产一区亚洲一区在线观看| 男女视频在线观看网站免费| 精品人妻一区二区三区麻豆| 搡老妇女老女人老熟妇| 亚洲av成人精品一区久久| 神马国产精品三级电影在线观看| 干丝袜人妻中文字幕| 男的添女的下面高潮视频| 三级国产精品片| 国产精品综合久久久久久久免费| 欧美一区二区亚洲| 欧美最新免费一区二区三区| 18禁在线播放成人免费| 久久鲁丝午夜福利片| 在线观看美女被高潮喷水网站| 亚洲av成人精品一区久久| 久久久久久国产a免费观看| 亚洲天堂国产精品一区在线| 亚洲成人中文字幕在线播放| 国产综合懂色| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 99久久中文字幕三级久久日本| 啦啦啦啦在线视频资源| 免费av毛片视频| 国产色婷婷99| 国产综合精华液| 欧美最新免费一区二区三区| 亚洲精品日本国产第一区| 男女边摸边吃奶| 久热久热在线精品观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 美女内射精品一级片tv| 三级国产精品欧美在线观看| 亚洲最大成人手机在线| 亚洲av中文av极速乱| 中文乱码字字幕精品一区二区三区 | 国产成人精品福利久久| 青青草视频在线视频观看| 18+在线观看网站| 日本免费a在线| 亚洲性久久影院| 精品午夜福利在线看| 久久亚洲国产成人精品v| 色综合站精品国产| 极品少妇高潮喷水抽搐| 免费电影在线观看免费观看| 中文字幕久久专区| 有码 亚洲区| 中文资源天堂在线| 一级毛片久久久久久久久女| 免费看不卡的av| 少妇猛男粗大的猛烈进出视频 | 伦精品一区二区三区| 天天躁日日操中文字幕| 国内精品一区二区在线观看| 激情五月婷婷亚洲| 国产黄片美女视频| 日本免费a在线| 色网站视频免费| 久久韩国三级中文字幕| 亚洲精品aⅴ在线观看| 久久久久久九九精品二区国产| 韩国高清视频一区二区三区| 日韩不卡一区二区三区视频在线| 熟妇人妻不卡中文字幕| 亚洲欧美精品专区久久| 国产单亲对白刺激| 成人毛片a级毛片在线播放| 欧美丝袜亚洲另类| ponron亚洲| 亚洲精品中文字幕在线视频 | 成年人午夜在线观看视频 | 99热这里只有精品一区| 国产有黄有色有爽视频| 淫秽高清视频在线观看| 免费黄频网站在线观看国产| 午夜福利在线在线| 91久久精品国产一区二区成人| 国产亚洲av片在线观看秒播厂 | 夜夜看夜夜爽夜夜摸| 啦啦啦中文免费视频观看日本| 亚洲三级黄色毛片| 精品午夜福利在线看| 国产日韩欧美在线精品| xxx大片免费视频| 99久久精品一区二区三区| 一级a做视频免费观看| videos熟女内射| 在线免费观看的www视频| 亚洲精品456在线播放app| 久久精品国产自在天天线| 久久久久久久久久久丰满| av一本久久久久| 国产精品一区二区三区四区免费观看| 日韩欧美三级三区| 免费少妇av软件| 亚洲自偷自拍三级| 国产成人精品一,二区| 少妇裸体淫交视频免费看高清| 尾随美女入室| 精品久久久精品久久久| 亚洲av日韩在线播放| 亚洲精品中文字幕在线视频 | 国产av码专区亚洲av| 亚洲精品成人av观看孕妇| 国产av在哪里看| 老女人水多毛片| 亚洲自偷自拍三级| 精品少妇黑人巨大在线播放| 一区二区三区四区激情视频| 日日摸夜夜添夜夜添av毛片| 日本一二三区视频观看| 麻豆久久精品国产亚洲av| 欧美丝袜亚洲另类| 国产午夜福利久久久久久| 性插视频无遮挡在线免费观看| 日本-黄色视频高清免费观看| 日韩亚洲欧美综合| 身体一侧抽搐| 男插女下体视频免费在线播放| 久久精品人妻少妇| 高清毛片免费看| 国产亚洲最大av| 波野结衣二区三区在线| 在线 av 中文字幕| 中文字幕av成人在线电影| 国产黄色视频一区二区在线观看| 精品国产三级普通话版| 中文在线观看免费www的网站| 在线观看美女被高潮喷水网站| 啦啦啦韩国在线观看视频| 一边亲一边摸免费视频| 激情五月婷婷亚洲| 国产淫片久久久久久久久| 欧美日本视频| 国内揄拍国产精品人妻在线| 啦啦啦啦在线视频资源| 欧美精品一区二区大全| 18禁裸乳无遮挡免费网站照片| 天堂av国产一区二区熟女人妻| 久久99精品国语久久久| 日韩 亚洲 欧美在线| 黄色一级大片看看| 国产高清国产精品国产三级 | 国产日韩欧美在线精品| 日韩中字成人| 秋霞在线观看毛片| 看十八女毛片水多多多| 一本久久精品| 国产毛片a区久久久久| 亚洲精品久久午夜乱码| 岛国毛片在线播放| 国产中年淑女户外野战色| 亚洲精品乱码久久久久久按摩| 国产乱人偷精品视频| 亚洲精品乱久久久久久| 国产一区二区三区综合在线观看 | 国产亚洲一区二区精品| 国产三级在线视频| 最近的中文字幕免费完整| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 丰满乱子伦码专区| 久久这里有精品视频免费| 亚洲精品国产成人久久av| 成年女人看的毛片在线观看| 五月玫瑰六月丁香| 久久这里有精品视频免费| 亚洲人成网站在线播|