• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks

    2021-12-15 08:12:22MernaGamalHalaAbbasNourMoustafaElenaSitnikovaandRowaydaSadek
    Computers Materials&Continua 2021年11期

    Merna Gamal,Hala M.Abbas,Nour Moustafa,Elena Sitnikova and Rowayda A.Sadek

    1Department of Information Technology,Helwan University,Cairo,Egypt

    2Department of Computer Science,Helwan University,Cairo,Egypt

    3School of Engineering and Information Technology,University of New South Wales at ADFA,Canberra,Australia

    Abstract:Intrusion Detection Systems(IDSs)have a great interest these days to discover complex attack events and protect the critical infrastructures of the Internet of Things (IoT) networks.Existing IDSs based on shallow and deep network architectures demand high computational resources and high volumes of data to establish an adaptive detection engine that discovers new families of attacks from the edge of IoT networks.However,attackers exploit network gateways at the edge using new attacking scenarios (i.e.,zero-day attacks),such as ransomware and Distributed Denial of Service (DDoS)attacks.This paper proposes new IDS based on Few-Shot Deep Learning,named CNN-IDS,which can automatically identify zero-day attacks from the edge of a network and protect its IoT systems.The proposed system comprises two-methodological stages:1)a filtered Information Gain method is to select the most useful features from network data,and 2)one-dimensional Convolutional Neural Network(CNN)algorithm is to recognize new attack types from a network’s edge.The proposed model is trained and validated using two datasets of the UNSW-NB15 and Bot-IoT.The experimental results showed that it enhances about a 3%detection rate and around a 3%-4%falsepositive rate with the UNSW-NB15 dataset and about an 8% detection rate using the BoT-IoT dataset.

    Keywords:Convolution neural network;information gain;few-shot learning;IoT;edge computing

    1 Introduction

    The Internet of Things (IoT) plays a significant role in constructing smart systems,including smart homes,smart cities,and healthcare,to offer automated services to users and organizations [1].The IoT can be defined as a communication model in which any device acts as an object that exchanges data through the Internet and senses the environment [2].It consists of many IoT peripherals such as sensors and actuators that connect with the Internet.With the prevalence of IoT systems,network architectures have been redesigned to include three tiers of edge/physical,fog,and cloud [3].The edge tier includes all computer devices,IoT devices,and network appliances [4].This layer is linked with the fog tier,which is the interface that includes virtualization platforms and gateways.Both layers are interconnected with the cloud tier that offers software,platforms,and infrastructure services to end-users [3,5].

    The technology of IoT provides different functions that can interconnect devices and applications,along with computing resources,to handle the data captured [6].The security of IoT systems is still the main challenge in the cybersecurity domain,due to the heterogeneity of IoT devices and the large number of IoT services linked to the network [3].Manufacturers often do not plug security services to their IoT products,exceptionally light devices-enabled IP addresses,due to their non-standard and licensed firmware [4].This leads to various vulnerabilities,either in the firmware or network level,in which attackers attempt to breach IoT systems and their networks.There are three security challenges in IoT networks [7].Firstly,physical impendence in the edge layers results from weaknesses of hardware protection.Secondly,this is followed by a confidentiality challenge that discloses sensitive information of IoT services passed to the fog and cloud layers.Man-In-The-Middle (MITM) and reconnaissance attacks are common hacking techniques that violate the confidentiality of IoT networks.The cyber threat of confidentiality is often risky between gateways and IoT devices at the edge.Thirdly,the integrity challenge that alters or manipulates original data of IoT systems that breach privacy.This often happens using spoofing,poisoning,evasion,and inference attacks that steal and/or illegally modify the telemetry data of IoT systems and their networks [8,9].

    The security and privacy of IoT networks are essential,which need to safeguard the IoT components that depend on object identification technologies.Every IoT object has its own identity that loads all its information,such as location and personal information.To monitor IoT systems’services at the edge of a network,defensive mechanisms,such as Intrusion Detection Systems (IDSs),should be effectively deployed and configured.The discovery of cyber-attacks at the edge layer would address the security issue in IoT networks.IDSs have been widely proposed to monitor and recognize cyber-attacks in network systems.However,existing network IDSs still suffer from the challenge of detecting new attack families (i.e.,zero-day attack),especially with the extensive amount of network traffic collected from heterogeneous IoT systems across network connectivity [7,10].Some IDSs have been explored in the literature to utilize shallow and deep learning techniques to discover cyber threats.A shallow network is declared as an artificial neural network that consists of one/two hidden layers.Deep learning (DL) is considered an improvement of shallow learning,but the difference is that deep learning has many hidden layers with different architectures [11].Researchers have broadly used DL techniques in many fields,such as image processing,biomedical,and security.The shallow networks have achieved reasonable outputs in detection accuracy and low false alarm rates,for handling small-scale data.However,large-scale data demand a deep adaptive architecture that can learn hidden patterns and extract characteristic data features of anomalous behaviors in real-time,as we suggest in this study.

    We propose using Few-Shot Learning (FSL) architecture [12]to address this challenge,which can deal only with a limited number of instances in time-series analysis of network traffic.In more detail,this paper proposes a new IDS using a few shot deep learning models that can discover cyber-attacks from the edge of a network.The proposed system includes two methodological phases:feature selection and decision engine.In feature selection,a filtered information gain method is employed to select the most useful features from network data.This phase improves the processing times and enhances the performance of the decision engine.Few-Shot Deep Learning techniques are utilized in the decision engine using an adaptable Convolutional Neural Network (CNN) architecture [13].CNN is used to recognize new attack types from the network’s edge.The proposed work is trained using two-benchmark datasets of the UNSW-NB15 [14]and Bot-IoT [15].

    The rest of the paper is structured as follows.Section 2 presents the background and related work of IoT and IDS.Section 3 explains the proposed approach for the intrusion detection system.Section 4 describes the empirical results and discussions.Finally,Section 5 introduces the conclusion of the paper.

    2 Background and Related Work

    This section explains the background and previous studies related to IDS and IoT networks.

    2.1 Intrusion Detection System

    An Intrusion Detection System (IDS) is a security solution,either hardware or software,which monitors network traffic and/or audit traces of client systems to identify cyber threats from computer and network systems [1].Some IDSs react to intrusions in a real-time manner,while others do not work in real-time due to performing depth analysis for forensic purposes [16].An IDS is essential software that monitors the traffic of the network that recognizes malicious events [17].It mainly includes three stages:1) a data preprocessing method is to filter and clean data;2) an intrusion detection method is to train and test legitimate and suspicious observations;and 3) a decision-making method is to alert malicious events [5].

    There are two popular forms of IDSs-based deployment:Host-based IDS (HIDS) and Network-based IDS (NIDS) [18].One the one hand,a HIDS monitors system activities of hosts,for example,system configuration,application activity,system logs,application processes,and file access [19].On the other hand,a NIDS monitors network activity and analyzes the collected information to identify suspicious events from network traffic [20].The NIDS consumes low computational processing less than the HIDS and has a quicker response because it does not require maintaining for the sensor programming at the host level [1].There are three detection methods in IDSs:1) anomaly-based detection,2) misuse-based detection,and 3) a hybrid of both.An anomaly detection method designs a standard profile and discovers outliers as anomalies [21].A misuse-based detection method depends on well-known signatures and matches them against a blacklist of suspicious events.A misuse-based IDS cannot discover new attack types while An anomaly-based IDS can detect them,along with a false alarm rate if small variations of normal and abnormal patterns have been identified [22,23].

    IDSs have been designed based on machine and deep learning algorithms to recognize cyber threats [1,5].Deep learning algorithms have proven their capability in different applications,such as computer vision and malware detection [5].Deep learning can be categorized on its architecture into generative and discriminative.The classes of generative architecture are Recurrent Neural Network (RNN),Deep Auto Encoder,Deep Boltzmann Machine (DBM),and Deep Belief Networks (DBN) [1].Auto-encoder consists of two symmetrical components,which are an encoder and a decoder.The encoder works to extract the features from the raw data.The decoder reshapes the data from the features that extract using the encoder.DBM consists of arbitrary units for the whole network for getting or producing binary results.DBN has multiple layers that have a connection between them,not between units.Discriminative architecture has two types,which are recurrent neural network and convolutional neural network.RNN is used in sequential data,and in most cases,it is used for natural language processing [16].This work focuses on CNN as it includes multiple layers that can classify small variations of data features of various class labels,such as legitimate and normal behaviors.

    2.2 Internet of Things(IoT)

    The Internet of Things (IoT) offers connecting devices and applications to the Internet to sense and monitor systems [4,16].IoT is defined as the seamless connection of the information network and physical objects,named ‘smart objects,’ with these objects being active users in business processes,being accessed through network services,along with considering security and privacy in mind [24].At the end of the 20thcentury,the Internet started to spread through web services.It was imaginable that objects like a pen or book that would automatically work itself and write directly.The development of IoT spreads worldwide through mobile devices,laptops,and workstations [3].The creation of new IoT products would minimize the computer and new approaches linked with wireless networks [25].Nowadays,IoT sensors connect to the Internet,such as devices that carry IP cameras.The IoT devices usually are not expensive and easy to deploy in IoT networks,such as the deployment of temperature and light bulb sensors [26].

    Research studies have emphasized that security in the IoT concentrates on attack detection,authorization,authentication,and access control [26,27].Many aspects affect the change of the traffic pattern while recognizing abnormal behaviors from IoT networks.It is vital to consider various aspects while developing IDS techniques for IoT networks at the edge,such as inspecting network protocols [28],determining application services [29],and identifying abnormal patterns at the edge [30].Existing IDSs have led to evolve and improve deep learning,statistical learning,and machine learning systems to classify massive data by analyzing the threats of IoT networks [11,31].

    2.3 Related Work

    Several IDSs have been proposed in the literature to identify cyber-attacks from network systems.For instance,Sadek et al.[32]proposed a new hybrid IDS approach using an indicator variable-enabled rough set technique for feature reduction and neural networks for classification.The empirical results revealed that the hybrid approach could achieve a 96.7% accuracy and a 3% false alarm rate using the NSL-KDD dataset,with lower computational resources than other compelling IDSs.The authors in [33]suggested a hybrid IDS based on the triangle area based nearest neighbors (TANN).The k-mean algorithm was used to cluster centers of attack classes,and KNN was used for classifying attack events.This experiment showed high accuracy and a low false alarm rate on the KDD-Cup 99 dataset.

    Moustafa et al.[5]proposed a new approach called (ODM-ADS) that detects attacks,where a new profile was designed to model normal events and detect attacks differently based on an outlier function.This approach would be deployed at IoT and cloud and fog computing,and it accomplished high performances compared with other techniques using the NSL-KDD dataset and UNSW-NB15 datasets.Essam et al.[34]proposed a hybrid algorithm based on correlation feature selection and information gain to reduce the number of features.This research applied to the NSL-KDD dataset;the reduced dataset was validated by a naive Bayes classifier using the adaptive boosting technique.A study by Alom et al.[35]used DBN to perform an intrusion detection system for detecting unknown attacks.Karimi et al.[36]developed a feature selection technique using information gain and symmetric uncertainty model to select the relevant features and na?ve Bayes for classifying attacks.The outputs showed that the proposed techniques performed more than machine learning-based IDSs.

    Tang et al.[37]developed an intrusion detection model using a deep forward network that contains three hidden layers.The model used the best six features selected from the NSL-KDD dataset.Ling et al.[38]applied a convolution neural network technique for IDS that detect attacks.Niyaz et al.[39]used the auto-encoder to get feature representation then classify the data using the soft-max regression using the NSL-dataset.Hodo et al.[40]proposed a new approach of an artificial neural network to detect DoS and DDoS attacks with obtaining good accuracy in IoT systems.Chen et al.[41]also tried to detect DDoS for IoT networks.Haddadi et al.[42]used two hidden layers of the neural network using the DARPA1999 data to overcome the problem of overfitting and detect suspicious events.Amma et al.[43]proposed a new in-depth radial approach to optimize the depth of the neural network parameters applied to different datasets to detect DoS attacks.

    Recently,Moustafa et al.[1]reviewed existing IDSs and their methods and problems in network and edge systems.The authors demonstrated that the main challenge of IDSs is that existing IDS approaches cannot discover new families from large-scale and heterogeneous data sources collected from IoT networks.It was recommended that deep learning techniques improve the performance of reliable intrusion detection systems for obtaining high detection accuracy and low false alarm rates [1,16].Therefore,this study’s primary goal is to discover new attack families from heterogeneous data sources collected from the edge of a network.Deep learning is used in this work as it has the ability of the feature extracting,analyzing in deep,and detecting suspicious vectors.

    3 Proposed CNN-Enabled Intrusion Detection System

    This section discusses the proposed Intrusion Detection System (IDS) that discovers cyberattacks from the edge of a network.The proposed system provides the ability to deal with the essential features of network flows.The proposed system includes three main components:data preprocessing,feature selection,and decision engine,as depicted in Fig.1.In data preprocessing,network data are filtered and processed by removing redundant values,converting data into a numeric format,and normalizing data to improve feature selection and decision engine stages.In feature selection,the information gain method is applied to select the essential features and enhance the accurate detection of the decision engine technique.In the decision engine,a few shot deep learning-based Convolution Neural Network (CNN) techniques are employed to classify anomalous behaviors.The three components of the proposed IDS are explained below.

    Figure 1:Architecture of the proposed IDS system

    3.1 Data Preprocessing Phase

    In the data preprocessing phase,network data are filtered by converting non-numerical features to numerical values because the convolution neural network handles numbers.This conversion happens by converting categorical values in the datasets into numeric ones,such as protocol values in the dataset are converted into numerical values,for example,(TCP=1,UDP=2,ICMP=3).Redundant values in the datasets are also excluded to enhance the detection accuracy of Deep Learning.To overcome the imbalance in the datasets,the train and test data are divided into 20% testing data and 80% training data.The values of the feature datasets,such as UNSW-NB 15 and BoT-IoT datasets,are entirely different because the data have nominal,float,and timestamp values.Therefore,data features are normalized into a range of values,such as [0,1],to improve the decision engine’s performance.

    3.2 Few Shot Learning Method for Intrusion Detection

    Few-Shot Learning (FSL) can release new tasks that have only a few samples with supervised information.In other words,FSL is a new machine learning that is ready to learn from a limited number of examples with supervised information [44,45].FSL can help in the robotics field [46],which generates robots or machines that act like humans.Many fields need to use FSL,and the most important one is drug discovery,which finds out the properties of new molecules to generate a new drug [9]that will be useful for diseases.FSL is now considered a hot topic because it is based on a small number of samples,so many machine learning approaches have been proposed,such as embedding learning [47,48],meta-learning [49],and generative modeling [44,50].

    3.2.1 Feature Selection-Based Information Gain(IG)

    Information Gain (IG) is known as mutual information that indicates a training set of features vectors is most useful for discriminating between the classes to be learned and tries to find a subset of the original variable,which is calculated as Eq.(1).It is one of three feature selection strategies:filter,wrapper,and embedded approaches [16].It is used to improve the accuracy of the system or time for mining.The different researchers applied data preprocessing techniques,such as data cleaning,data integration,and dimensionality reduction based on feature reduction and feature selection.The entropy determines the value of the information and relation between each feature,estimated as Eq.(2).Feature selection is the way of searching for a solution to make a network more secure through reducing false alarm and time costs of IDSs during monitoring malicious activities on a network.

    The objective of feature selection is to minimize the attribute.It led to making probability close to possible original distribution to all attributes.This process is done without more selection techniques employed to select relevant and information features or to select features that are useful to build a good predictor.Information gain is based on Shannon’s mathematical theory and communication and depends on entropy,which is a measure of unpredictability of information,and ranks the features that affect the data classification and pi is the probability of feature in the given set of features as shown in Eq.(3).

    where

    According to Maher and Ulrich (2012),IG handles only discrete values;therefore,it is essential to transfer continuous values into discrete values.Given the two random variables X and Y,I (X,Y) is the information gain of X concerning the class attribute Y.When Y and are discrete variable that takes values in {yi,...,yt} and {xi,...,xt}.With probability distribution function P(x);then the entropy of X is given by Eq.(4) or average information is expected value of I(x)over an instance of X by Eq.(5).Information I from the message X.Hence the IG for feature F on the dataset D in Eq.(6)

    where value (F) is the set of all possible F values,Dattris the subset of D that has a value attr.H(D)=entropy of the class attribute.

    Based on the information gain method,we select the most critical ten features from the network datasets to improve the decision engine technology’s performance that can discover cyber-attacks.

    3.2.2 Convolution Neural Network(CNN)as Decision Engine

    CNN is used as a decision engine of IDS that classifies legitimate and anomalous activities at the network’s edge.CNN may be a later type of neural network that works on to memorize and reach appropriate features for speaking to the input information.There are two contrasts with MLPs,which are weight sharing and pooling.CNN has numerous layers,and each layer comprises numerous convolution bits that are utilized to form distinctive outlines.Each locale of the neuron of a feature outline is connected to the following layer.All the spatial areas of the input share the bit for producing the included outline.One or different completely connected layers are utilized for the classification [13]after a few convolution and pooling layers.Since the utilization of shared weights in a Convolution Neural Network,the demonstration learns the same design is happening at distinctive positions of inputs without inquiring about memorizing isolated detectors for each position.For that,the architecture can control the interpretation of inputs [51].

    The pooling layers minimize the computational obstacle since it diminishes the number of connections between convolutional layers.Be that as it may,pooling layers expanding the properties of interpretation and upgrading the open field of convolution layers.The activation function is used to solve non-linearity for convolution neural networks that help multi-layer detect nonlinear features.There are three types of activation function sigmoid,tanh and ReLU.One or numerous completely connected layers can be included after the stream of the network.To measure the blunders within the preparing portion,loss work can be utilized to check the mistakes [52].The CNN is adapted using the parameters listed in Tab.1 to establish a decision engine technique that can classify legitimate and attack events of datasets collected from the edge of networks.

    Table 1:Adapted hyperparameters of CNN used as a decision engine

    4 Experimental Results

    4.1 Experimental Design

    We used Google open-source data flow engine TensorFlow using the Python Keras package,which is named Google Colab [53],to implement the proposed IDS.Keras was used as the front-end API as it is the foremost critical library in an in-depth convolutional network study.It incorporates a model reinforcement to utilize it effectively and rapidly that runs utilizing CPU and GPU.

    4.2 Datasets Used

    To validate the proposed system for different types of attacks and different network infrastructure and characteristics,testing and evaluation was carried out on two different network datasets of UNSW-NB15 [14]and BoT-IoT [15,54].First,the UNSW-NB15 [14]is a new data set published in 2015 from The UNSW Canberra Cyber to evaluate intrusion detection purposes.The UNSW-NB15 is divided into a training set and testing set containing 175,341 records and testing 82,332 records.The UNSW-NB15 used the IXIA Perfect Storm tool to establish mixed regular and modern attacks of network traffic.The UNSW-NB15 includes nine attack families,as demonstrated in Tab.2.

    Second,the Bot-IoT dataset was designed from a real network environment and was built in the cyber range lab of UNSW Canberra to be used for creating.There are combinations between normal and malicious traffic in the environment.The source files of the datasets are given with different formats that contain CSV files,PCAP files,and argue files.The files will be clustered based on the attack category and subcategory to get better support in the labeling process.The PCAP files are 69.3 GB,with more than 72.000.000 records.The size of the extracted traffic is 16.7 GB.MySQL queries are used in the botnet dataset for extracting 5% of the original dataset to ease the usage of the dataset.The extracted 5% consists of 4 files 1.07 GB in size,and 3 million records.The attack types of the Bot-IoT dataset are described in Tab.3.

    Table 2:Attack types of UNSW-NB15 dataset

    Table 3:Attack types of Bot-IoT dataset

    4.3 Feature Selection Using Information Gain

    The ten crucial features are selected using the Information Gain technique from the UNSWNB15 and BoT-IoT datasets,as listed in Tabs.4 and 5.These features are used as the input of applying CNN as a decision engine to classify normal and attack activities.They significantly impact the performance of the decision engine by improving the detection accuracy and processing time.

    Table 4:Best ten features from the UNSW-NB15 dataset

    Table 5:Best ten features from the Bot-IoT dataset

    4.4 Results of CNN Compared with Other IDSs

    The proposed CNN-IDS model was trained using the two datasets of UNSW-NB15 and Bot-IoT.This phase of training to guarantee that parameters dependable for affecting in the testing phase.The evaluation of the CNN intrusion detection system was processed on the ten selected features of datasets listed in Tabs.4 and 5.Using the UNSW-NB15 dataset,the overall Detection Rate (DR) and False Positive Rate (FPR) of the CNN-IDS are represented in Fig.2.In this figure,the Receiver Operating Characteristics (ROC) curves which show the relation between the detection rates and false rates,are depicted.The outcomes demonstrated the proposed system could detect different attack types in an average of 91% on the UNSW-NB15 dataset.The results of CNN-IDS system is compared with four existing intrusion detection techniques,that are named the Triangle Area Nearest Neighbors (TANN) [33],Euclidean Distance Map (EDM) [55]and Multivariate Correlation Analysis (MCA) [56],Outlier Dirichlet Mixture (ODM) [5].As shown in the figure,the system outperforms these techniques in terms of detection rate with about 2% and a false positive rate with roundly 1%-2%.

    Figure 2:ROC curve of CNN-IDS compared with other techniques on the UNSW-NB15 dataset

    The proposed CNN-IDS system also can correctly classify and discover various attack types using the BoT-IoT dataset,as presented in Fig.3.The proposed system can detect all the attack types in around a 99.9% detection rate and a 0.01% false-positive rate on the BoT-IoT dataset.The CNN-IDS system is also compared with the four techniques used in the UNSW-NB15 dataset.The outputs illustrated that the proposed system would detect attack types better than other models with about a 3% detection rate and around a 3%-4% false-positive rate.When comparing the results on both datasets,it is obvious that the proposed CNN-IDS achieves better performance with about 8% detection rate using the BoT-IoT dataset that is higher than the UNSW-NB15.This is because the BoT-IoT has new attack types with high variations between the normal and attack classes,enabling the CNN-IDS system to train the normal and attack data better than the UNSW-NB15 dataset.

    Figure 3:ROC curve of CNN-IDS compared with other techniques on the BoT-IoT dataset

    To sum up,the proposed CNN-IDS system achieves higher detection accuracy than the other four IDS mechanisms because of its potential design using the Information gain and CNN models.The Information Gain assisted in selecting the most important features in both datasets,while the CNN architecture [57]was designed to have multi-dense layers that can identify small variations between the normal and abnormal events from the datasets.Therefore,the proposed system can be used as a proper IDS solution that identifies and alerts attack activities at the edge of networks.

    5 Conclusion

    This paper has presented a new IDS,so-called CNN-IDS,based on a few shots learning.The proposed CNN-IDS has been developed to discover new attack events from the edge of a network.The proposed system includes two models of feature selection and decision engine.The feature selection model was developed by the Information Gain method to select essential features from network data,while the decision engine was developed using a one-dimensional Convolutional Neural Network (CNN) algorithm to discover attack events.The proposed system was trained and tested using two datasets of the UNSW-NB15 and Bot-IoT.The results showed that the proposed system outperforms several peer intrusion detection systems.This demonstrates the capability of applying the proposed system at real IoT networks and safeguards them against new cyber threats.This work will be extended by developing new federated IDS that can concurrently discover attacks from IoT services and their network traffic.

    Funding Statement:This work has been supported by the Australian Research Data Common(ARDC),project code-RG192500.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美xxxx性猛交bbbb| 亚洲在线自拍视频| 国产熟女欧美一区二区| 久久久久久久久大av| 亚洲七黄色美女视频| 成人av在线播放网站| 国产91av在线免费观看| 国产黄片美女视频| www.色视频.com| av视频在线观看入口| 久久99热6这里只有精品| 联通29元200g的流量卡| 国内久久婷婷六月综合欲色啪| 久久精品国产清高在天天线| 日韩制服骚丝袜av| 97超视频在线观看视频| 色哟哟·www| 少妇的逼好多水| 免费高清视频大片| 国产成人福利小说| 深爱激情五月婷婷| 91久久精品国产一区二区成人| 午夜福利在线观看吧| 久久九九热精品免费| 高清毛片免费观看视频网站| 国产精品嫩草影院av在线观看| 一进一出抽搐动态| 久久久国产成人精品二区| 国产精品伦人一区二区| 久久久a久久爽久久v久久| 国内精品久久久久精免费| 国内精品久久久久精免费| 日本熟妇午夜| 日本-黄色视频高清免费观看| 国内少妇人妻偷人精品xxx网站| 日韩中字成人| 亚洲美女视频黄频| 亚洲精品色激情综合| 日韩欧美三级三区| 美女xxoo啪啪120秒动态图| 午夜精品在线福利| 51国产日韩欧美| 国产真实乱freesex| 国产美女午夜福利| 99热6这里只有精品| 三级毛片av免费| 男人狂女人下面高潮的视频| 男人狂女人下面高潮的视频| 精品午夜福利视频在线观看一区| 一本精品99久久精品77| 日韩一区二区视频免费看| 欧美+日韩+精品| 国产亚洲精品久久久久久毛片| 寂寞人妻少妇视频99o| 精华霜和精华液先用哪个| 偷拍熟女少妇极品色| 久久人人爽人人片av| 国产亚洲精品综合一区在线观看| 亚洲精品日韩在线中文字幕 | 亚洲熟妇熟女久久| 在线免费观看不下载黄p国产| av专区在线播放| 久久久久久九九精品二区国产| 国产欧美日韩精品亚洲av| 毛片女人毛片| 国产激情偷乱视频一区二区| 人人妻人人澡欧美一区二区| 一区二区三区四区激情视频 | 国产精品亚洲美女久久久| 波多野结衣高清无吗| 有码 亚洲区| 在线免费十八禁| 中文字幕久久专区| 欧美+亚洲+日韩+国产| 久久久精品欧美日韩精品| 日韩 亚洲 欧美在线| 联通29元200g的流量卡| 人人妻,人人澡人人爽秒播| 91久久精品国产一区二区三区| 麻豆乱淫一区二区| 一个人看视频在线观看www免费| 国产三级在线视频| 岛国在线免费视频观看| 99热这里只有精品一区| 你懂的网址亚洲精品在线观看 | 欧美日本亚洲视频在线播放| 日日摸夜夜添夜夜爱| 成年av动漫网址| 少妇熟女aⅴ在线视频| 成年女人看的毛片在线观看| ponron亚洲| 国产不卡一卡二| 床上黄色一级片| 欧美在线一区亚洲| 日本一二三区视频观看| 午夜爱爱视频在线播放| 蜜桃亚洲精品一区二区三区| 在线播放国产精品三级| 中文字幕av在线有码专区| 成年版毛片免费区| 日韩一本色道免费dvd| 91av网一区二区| 久久久久久久久久黄片| 日韩成人av中文字幕在线观看 | 日本成人三级电影网站| 十八禁网站免费在线| 简卡轻食公司| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲综合色惰| 国产麻豆成人av免费视频| 午夜日韩欧美国产| 亚洲精品日韩av片在线观看| 日韩欧美精品免费久久| 亚洲丝袜综合中文字幕| 亚洲国产精品sss在线观看| 69人妻影院| 色视频www国产| 级片在线观看| 99久久精品一区二区三区| 日韩欧美在线乱码| h日本视频在线播放| 天天躁夜夜躁狠狠久久av| 精品国产三级普通话版| 噜噜噜噜噜久久久久久91| 18禁裸乳无遮挡免费网站照片| 桃色一区二区三区在线观看| 国产精品一区二区免费欧美| 欧美激情国产日韩精品一区| av在线蜜桃| 欧美bdsm另类| 国产精品日韩av在线免费观看| videossex国产| 麻豆av噜噜一区二区三区| 老女人水多毛片| 日韩国内少妇激情av| 亚洲第一区二区三区不卡| 亚洲第一电影网av| 内地一区二区视频在线| 网址你懂的国产日韩在线| 村上凉子中文字幕在线| 国产精品女同一区二区软件| 99在线视频只有这里精品首页| 亚洲精品乱码久久久v下载方式| 看免费成人av毛片| 精华霜和精华液先用哪个| 亚洲欧美日韩卡通动漫| 色av中文字幕| 91狼人影院| 成人三级黄色视频| 欧美一区二区亚洲| 啦啦啦啦在线视频资源| 国产精品不卡视频一区二区| 高清午夜精品一区二区三区 | 国产成人freesex在线 | 日本一二三区视频观看| 人妻久久中文字幕网| av专区在线播放| 在线天堂最新版资源| 97人妻精品一区二区三区麻豆| 色哟哟·www| 99riav亚洲国产免费| 极品教师在线视频| 久久久欧美国产精品| 日本-黄色视频高清免费观看| 久久99热这里只有精品18| 免费人成视频x8x8入口观看| 日本一本二区三区精品| 精华霜和精华液先用哪个| videossex国产| 99久久精品一区二区三区| 日本色播在线视频| 国产成人影院久久av| 久久久欧美国产精品| 一区福利在线观看| 精品无人区乱码1区二区| 久久鲁丝午夜福利片| 亚洲精品色激情综合| 成年免费大片在线观看| av福利片在线观看| 嫩草影院精品99| 97超级碰碰碰精品色视频在线观看| 亚洲成a人片在线一区二区| 久久久久久久久久黄片| 丝袜美腿在线中文| 成人鲁丝片一二三区免费| 小蜜桃在线观看免费完整版高清| 国产午夜精品久久久久久一区二区三区 | 日日撸夜夜添| 欧美3d第一页| 精品一区二区三区人妻视频| 日韩av在线大香蕉| 亚洲国产日韩欧美精品在线观看| 天堂动漫精品| 午夜福利成人在线免费观看| 国产高清视频在线播放一区| 99riav亚洲国产免费| 97超碰精品成人国产| 搡女人真爽免费视频火全软件 | 欧美三级亚洲精品| av在线天堂中文字幕| 亚洲天堂国产精品一区在线| 婷婷色综合大香蕉| 久久午夜亚洲精品久久| 国产成人91sexporn| 免费观看人在逋| 天堂影院成人在线观看| 亚洲美女黄片视频| 成人性生交大片免费视频hd| 国产成人freesex在线 | 99久久九九国产精品国产免费| 黑人高潮一二区| 老司机影院成人| 国产激情偷乱视频一区二区| 在线观看av片永久免费下载| 天堂动漫精品| 欧美xxxx黑人xx丫x性爽| 亚洲18禁久久av| av卡一久久| 99久久成人亚洲精品观看| 九九在线视频观看精品| 99久久中文字幕三级久久日本| 亚洲自偷自拍三级| 午夜爱爱视频在线播放| 波多野结衣巨乳人妻| 一进一出抽搐gif免费好疼| 天堂√8在线中文| 国产淫片久久久久久久久| 欧洲精品卡2卡3卡4卡5卡区| 欧美日本视频| 成人av一区二区三区在线看| 亚洲精品色激情综合| 麻豆国产av国片精品| 精品久久久久久久久久久久久| 亚洲欧美日韩东京热| 午夜影院日韩av| 亚洲国产欧美人成| 国产真实乱freesex| 人妻丰满熟妇av一区二区三区| 免费无遮挡裸体视频| 美女大奶头视频| 免费观看人在逋| 成年女人毛片免费观看观看9| 亚洲国产精品合色在线| 欧美bdsm另类| 精品无人区乱码1区二区| 日本熟妇午夜| 久久久午夜欧美精品| 麻豆一二三区av精品| 欧美最新免费一区二区三区| 一区福利在线观看| 99国产精品一区二区蜜桃av| 蜜桃久久精品国产亚洲av| 国产精品乱码一区二三区的特点| 欧美日本亚洲视频在线播放| 日韩欧美免费精品| 亚洲av电影不卡..在线观看| 欧美日本视频| eeuss影院久久| 中国国产av一级| 一级av片app| 少妇熟女aⅴ在线视频| 久久精品国产自在天天线| 免费人成视频x8x8入口观看| 国产av一区在线观看免费| 小说图片视频综合网站| 中文字幕熟女人妻在线| 看片在线看免费视频| 色综合亚洲欧美另类图片| 久久久国产成人精品二区| 久久久久久九九精品二区国产| 中国美女看黄片| 久久精品国产亚洲av涩爱 | 欧美激情在线99| 91在线观看av| 久久精品综合一区二区三区| 国产色婷婷99| 免费av毛片视频| 成人二区视频| 亚洲成人精品中文字幕电影| 精品无人区乱码1区二区| 身体一侧抽搐| 国产亚洲精品久久久com| 国产精品一区二区三区四区免费观看 | 91精品国产九色| 国产爱豆传媒在线观看| 精品欧美国产一区二区三| 免费av不卡在线播放| 69人妻影院| 97超碰精品成人国产| 国产国拍精品亚洲av在线观看| 亚洲国产精品久久男人天堂| 国产av在哪里看| 人妻少妇偷人精品九色| 一进一出抽搐gif免费好疼| 俺也久久电影网| 人妻制服诱惑在线中文字幕| 免费观看人在逋| 一本久久中文字幕| 少妇高潮的动态图| 91久久精品国产一区二区成人| 亚洲性久久影院| 欧美性猛交黑人性爽| 国产高清三级在线| 亚洲精品色激情综合| 国产av一区在线观看免费| 3wmmmm亚洲av在线观看| 亚洲av不卡在线观看| 波多野结衣高清无吗| 一本一本综合久久| 精品一区二区三区人妻视频| 99久久精品国产国产毛片| 国产高清不卡午夜福利| 久久久久国内视频| av天堂中文字幕网| 午夜福利在线观看吧| 成年版毛片免费区| 亚洲高清免费不卡视频| 黄色配什么色好看| 校园人妻丝袜中文字幕| 亚洲最大成人中文| 午夜亚洲福利在线播放| av在线亚洲专区| 狂野欧美激情性xxxx在线观看| 男女那种视频在线观看| 亚洲一级一片aⅴ在线观看| 午夜精品国产一区二区电影 | 日本 av在线| 99热6这里只有精品| 亚洲精品一卡2卡三卡4卡5卡| av国产免费在线观看| 午夜老司机福利剧场| 国产欧美日韩精品一区二区| 亚洲精品一区av在线观看| 国产精品久久视频播放| 久久久a久久爽久久v久久| 国内少妇人妻偷人精品xxx网站| 激情 狠狠 欧美| 高清毛片免费看| 你懂的网址亚洲精品在线观看 | 亚洲av二区三区四区| 男女做爰动态图高潮gif福利片| 97热精品久久久久久| 欧美最黄视频在线播放免费| 少妇被粗大猛烈的视频| 一级毛片我不卡| 国产精品电影一区二区三区| av国产免费在线观看| 性色avwww在线观看| 国产色婷婷99| 午夜福利在线在线| 最近的中文字幕免费完整| 国产女主播在线喷水免费视频网站 | 日韩一区二区视频免费看| 久久精品影院6| 人妻丰满熟妇av一区二区三区| 黑人高潮一二区| 又黄又爽又刺激的免费视频.| 久久99热这里只有精品18| 日本三级黄在线观看| 色噜噜av男人的天堂激情| 亚洲av不卡在线观看| 国产一区二区在线观看日韩| 日本三级黄在线观看| 热99在线观看视频| 老师上课跳d突然被开到最大视频| 亚洲综合色惰| 精品久久久噜噜| 99热只有精品国产| 亚洲欧美日韩高清在线视频| 久久久久久国产a免费观看| 国产激情偷乱视频一区二区| 亚洲性夜色夜夜综合| 尾随美女入室| 搡老妇女老女人老熟妇| 国产毛片a区久久久久| 亚洲aⅴ乱码一区二区在线播放| 国产精品乱码一区二三区的特点| 夜夜爽天天搞| 日本成人三级电影网站| 男人和女人高潮做爰伦理| 永久网站在线| 国产真实乱freesex| 日本免费一区二区三区高清不卡| 三级毛片av免费| av天堂在线播放| 久久人人爽人人片av| 人人妻人人澡欧美一区二区| 精品午夜福利视频在线观看一区| 久久精品国产亚洲av香蕉五月| 国内久久婷婷六月综合欲色啪| 久久久久久伊人网av| av在线老鸭窝| 哪里可以看免费的av片| 麻豆一二三区av精品| 日韩强制内射视频| 伦精品一区二区三区| 日本免费a在线| 日韩精品中文字幕看吧| 日韩高清综合在线| 不卡一级毛片| 最近的中文字幕免费完整| 日产精品乱码卡一卡2卡三| 亚洲一区高清亚洲精品| 黄片wwwwww| 亚洲久久久久久中文字幕| 日韩欧美一区二区三区在线观看| 真实男女啪啪啪动态图| 天堂√8在线中文| 成人精品一区二区免费| 美女xxoo啪啪120秒动态图| 不卡视频在线观看欧美| 男女视频在线观看网站免费| 国产极品精品免费视频能看的| 麻豆成人午夜福利视频| 国产三级在线视频| 蜜桃久久精品国产亚洲av| 久久久久久伊人网av| 淫妇啪啪啪对白视频| 长腿黑丝高跟| 日韩欧美在线乱码| av视频在线观看入口| 亚洲专区国产一区二区| 国内精品宾馆在线| 午夜福利在线在线| 校园春色视频在线观看| 免费不卡的大黄色大毛片视频在线观看 | 最新中文字幕久久久久| 级片在线观看| 精品久久国产蜜桃| 国产免费男女视频| 一边摸一边抽搐一进一小说| 国产高潮美女av| 日本撒尿小便嘘嘘汇集6| 搡老岳熟女国产| 别揉我奶头 嗯啊视频| 国产精品一及| 99精品在免费线老司机午夜| 欧美性感艳星| 亚洲精品一卡2卡三卡4卡5卡| 日本一二三区视频观看| 日韩精品青青久久久久久| 国产视频内射| 一a级毛片在线观看| 亚洲第一电影网av| 国产黄a三级三级三级人| 国产伦精品一区二区三区四那| 一级黄色大片毛片| 丝袜美腿在线中文| 亚洲欧美精品自产自拍| 日本撒尿小便嘘嘘汇集6| 欧美日韩精品成人综合77777| 日本三级黄在线观看| 亚洲自偷自拍三级| 欧美日本视频| 欧美成人a在线观看| 永久网站在线| 国产精品一二三区在线看| 男女下面进入的视频免费午夜| 观看免费一级毛片| 97在线视频观看| 精品少妇黑人巨大在线播放 | 日韩成人av中文字幕在线观看 | 国产成人aa在线观看| 亚洲欧美日韩无卡精品| 国产精品永久免费网站| 麻豆国产97在线/欧美| 在线播放无遮挡| 一个人观看的视频www高清免费观看| av.在线天堂| 亚洲成人久久爱视频| 成人三级黄色视频| 久久久a久久爽久久v久久| 久久精品综合一区二区三区| 亚洲国产精品合色在线| 男人和女人高潮做爰伦理| 国产av在哪里看| 亚洲久久久久久中文字幕| 国产高清视频在线观看网站| 欧美日韩国产亚洲二区| av黄色大香蕉| av免费在线看不卡| 欧美高清成人免费视频www| 嫩草影院精品99| 国产精品人妻久久久久久| 国产一区二区亚洲精品在线观看| 国产探花在线观看一区二区| 色吧在线观看| 亚洲图色成人| 国产伦精品一区二区三区视频9| 麻豆av噜噜一区二区三区| 亚洲精品日韩在线中文字幕 | 国产视频内射| 蜜臀久久99精品久久宅男| 免费在线观看成人毛片| 久久热精品热| 在线免费十八禁| 国产乱人视频| 国产成人aa在线观看| 日韩av不卡免费在线播放| 欧美xxxx性猛交bbbb| 国产高潮美女av| 别揉我奶头~嗯~啊~动态视频| 日韩欧美 国产精品| 成人av在线播放网站| 1000部很黄的大片| av女优亚洲男人天堂| 午夜福利高清视频| 国产真实乱freesex| 精品人妻偷拍中文字幕| 精品人妻熟女av久视频| 亚洲av中文av极速乱| 久久99热6这里只有精品| 亚洲美女黄片视频| 精品久久久久久久久久久久久| 丰满乱子伦码专区| 伦理电影大哥的女人| 久久午夜亚洲精品久久| 97人妻精品一区二区三区麻豆| 老女人水多毛片| 黄色视频,在线免费观看| 小说图片视频综合网站| a级毛色黄片| 国产精品一及| 国产午夜精品论理片| 国产精品久久视频播放| 久久久午夜欧美精品| 久久久久精品国产欧美久久久| 亚洲精品国产成人久久av| 亚洲精品一卡2卡三卡4卡5卡| 亚洲成人久久爱视频| avwww免费| a级一级毛片免费在线观看| 一个人观看的视频www高清免费观看| 国产高清视频在线播放一区| 成年av动漫网址| 成年女人永久免费观看视频| 大香蕉久久网| 最近2019中文字幕mv第一页| 久久99热这里只有精品18| 午夜日韩欧美国产| 俺也久久电影网| 亚洲成人精品中文字幕电影| 欧美一级a爱片免费观看看| 亚洲av一区综合| 亚洲中文字幕一区二区三区有码在线看| 少妇熟女欧美另类| 亚洲综合色惰| 国产伦在线观看视频一区| 国产亚洲精品久久久com| 亚洲国产精品sss在线观看| 黄色欧美视频在线观看| 在线a可以看的网站| 伦理电影大哥的女人| av女优亚洲男人天堂| 男女下面进入的视频免费午夜| 一级毛片aaaaaa免费看小| 免费搜索国产男女视频| 天天躁夜夜躁狠狠久久av| 直男gayav资源| 成人特级av手机在线观看| 久久久久国产精品人妻aⅴ院| 人妻少妇偷人精品九色| 久久99热这里只有精品18| 亚洲国产日韩欧美精品在线观看| 禁无遮挡网站| 国产 一区精品| 欧美最黄视频在线播放免费| 一个人观看的视频www高清免费观看| 国产三级中文精品| 国产大屁股一区二区在线视频| 听说在线观看完整版免费高清| 日本黄色视频三级网站网址| 极品教师在线视频| 久久精品综合一区二区三区| 国产精品亚洲一级av第二区| 国产日本99.免费观看| 国产成年人精品一区二区| 久久久久国产网址| 国产精品一区www在线观看| 一区福利在线观看| 在线播放无遮挡| 亚洲av免费高清在线观看| 在线观看一区二区三区| 日韩在线高清观看一区二区三区| 久久国内精品自在自线图片| 一a级毛片在线观看| 国产亚洲精品综合一区在线观看| 99久久精品国产国产毛片| www日本黄色视频网| 波多野结衣巨乳人妻| 一本久久中文字幕| 欧美日韩精品成人综合77777| 波多野结衣巨乳人妻| 男插女下体视频免费在线播放| 婷婷色综合大香蕉| 人人妻人人看人人澡| 久久久久九九精品影院| 婷婷色综合大香蕉| 午夜日韩欧美国产| 午夜精品在线福利| 国产伦精品一区二区三区视频9| 色5月婷婷丁香| 在线免费十八禁| 国产精品一及| 黄色一级大片看看| 亚洲成a人片在线一区二区| 天堂√8在线中文| 在线观看66精品国产| 麻豆av噜噜一区二区三区| 亚洲内射少妇av| 黄色配什么色好看| 日本欧美国产在线视频| 国产午夜精品久久久久久一区二区三区 | 国产麻豆成人av免费视频| 午夜影院日韩av|