• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System

    2021-12-15 12:47:52AmirHaiderMuhammadAdnanKhanAbdurRehmanMuhibUrRahmanandHyungSeokKim
    Computers Materials&Continua 2021年2期

    Amir Haider,Muhammad Adnan Khan,Abdur Rehman,Muhib Ur Rahman and Hyung Seok Kim,*

    1Department of Intelligent Mechatronics Engineering, Sejong University, Seoul, 05006,Korea

    2Department of Computer Science, Lahore Garrison University, Lahore, 54000,Pakistan

    3School of Computer Science, National College of Business Administration &Economics, Lahore, 54000,Pakistan

    4Department of Electrical Engineering, Polytechnique Montreal, Montreal, QC H3T 1J4, Canada

    Abstract:In recent years,cybersecurity has attracted significant interest due to the rapid growth of the Internet of Things (IoT) and the widespread development of computer infrastructure and systems.It is thus becoming particularly necessary to identify cyber-attacks or irregularities in the system and develop an efficient intrusion detection framework that is integral to security.Researchers have worked on developing intrusion detection models that depend on machine learning (ML)methods to address these security problems.An intelligent intrusion detection device powered by data can exploit artificial intelligence (AI), and especially ML, techniques.Accordingly, we propose in this article an intrusion detection model based on a Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System (RTS-DELM-CSIDS) security model.The proposed model initially determines the rating of security aspects contributing to their significance and then develops a comprehensive intrusion detection framework focused on the essential characteristics.Furthermore, we investigated the feasibility of our proposed RTS-DELM-CSIDS framework by performing dataset evaluations and calculating accuracy parameters to validate.The experimental findings demonstrate that the RTS-DELM-CSIDS framework outperforms conventional algorithms.Furthermore, the proposed approach has not only research significance but also practical significance.

    Keywords: Security;DELM;intrusion detection system;machine learning

    1 Introduction

    Across various areas, such as social networking, online banking, and web browsing, the number of Internet users worldwide continues to grow and reach new heights.The increase in Internet usage is associated with an increase in cyberattacks, which poses a danger to the cybersecurity of the organizations.The primary reason for this is the growth of the Internet of Things (IoT) [1].Cyber threats can result in irretrievable network disruption and economic difficulties.Such cyber threats can also accompany a denial-of-service (DoS), device ransomware, or inappropriate approach [2,3].Data suggests that a previous ransomware attack triggered a massive loss to several companies involving banking,education,resources,and colleges[4].

    Throughout today’s web-enabled communities, the increasing availability of network access enhances cyber-related violations.This rise is incentivizing organizations, which are trying to prevent illegal activities, to resolve network protection concerns.Cybersecurity architecture comprises a network protection framework and a computer security system [5].While numerous technologies, including firewalls and cryptography, are configured to manage cyber-attacks on the Internet, a new intrusion detection system (IDS) is likely to withstand cyber threats on a computer network [6].Traditional methods,such as firewalls,cannot withstand threats effectively[7,8].

    An IDS detects harmful cyber-attack actions on a system while tracking and reviewing everyday operations in a system and the information structure to recognize security vulnerabilities and challenges.The need for information security has recently increased, requiring safety from various forms of cyberattacks.An IDS often aims to track, monitor, and classify unwanted device activities such as illegal entry,alteration, or disruption [9,10].Identifying different types of cyber threats and irregularities in a system and creating an efficient IDS integral to ongoing network security to ensure the protection of a device are critical.Consequently, the key objective of an IDS is to identify various forms of unauthorized network interaction and application systems used for early detection.Intrusion monitoring devices capture and archive network data in a server that can be further used for an analytical review of the network.

    An IDS can vary in classification,depending upon the nature of implementation.The primary forms of IDSs include host-based and network-based systems with specific computer systems linked to complex systems.A host-based IDS is focused on a separate device and monitors critical operating system records for unusual or harmful incidents, limited to detecting and analyzing harmful content [11].In contrast, the program analyzes and monitors the network infrastructure in a network IDS for unauthorized activity.Furthermore, well-established variations focusing on the detection method include signature-based and anomaly-related detection, which the global technology research community has investigated for several years[12].

    For detecting subsequent threats, conventional techniques use a process characterized by a signaturebased IDS.For example, the system perceives a byte series in system activity, established forms, or malware clusters as a signature.The antivirus program uses these template styles as a signature to identify attacks by comparing them.These signature-based IDSs can capture identified threats efficiently;nevertheless, identifying new unseen threats that use a recognized signature where no mechanism is visible is challenging [13].In contrast, an anomaly-based IDS analyses the system’s activity and discovers correlations, generates a data-driven framework for monitoring typical behavior, and identifies exceptions in the event of abnormalities.The anomaly-based IDS have the largest advantage over a signature-based IDS for tracking actions to manipulate existing and unknown flaws or cyber-attacks.The anomaly-based IDS can also yield false detection concentrations recognizing previously unknown device activities as abnormalities.Therefore, an efficient detection method focused on machine learning (ML) is required to mitigate these problems,which is the motivation for this work.

    Predictive protection models must be developed to examine various trends of cyber-attacks and forecast the risks that can be applied to create an intelligent IDS that leverages cybersecurity data.The nature of artificial intelligence (AI) approaches, which can learn from a security database, are suitable for this task[14].Therefore, in this research, we minimize security issues and propose an efficient data-driven intrusion detection framework in the field of cybersecurity.In this article, we propose an intrusion detection framework focused on a Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System(RTS-DELM-CSIDS),which mitigates the above problems.

    A comprehensive IDS is required because conventional approaches use a signature-based methodology to identify unique arrangements.One approach is to use the latest technologies,such as RTS-DELM-CSIDS,to evaluate data flows and identify intrusions and attack patterns.Hence, it is essential to manage smart blockchain-based applications by developing robust and versatile algorithms to process such a vast quantity of data.ML, an AI framework, involves machines for training, reasoning, and behaving without human intervention.The goal of ML is to create an effective algorithm to take data from the input,generate a prediction, and change the outputs by statistical analysis.ML may process a significant amount of information and make decisions guided by evidence.

    In our method,we initially considered the classification of protection features given their significance in the framework.We subsequently developed an RTS-DELM-CSIDS security framework grounded on the selected core characteristics.After the development of the framework using training security information,we authenticated the framework using assessment outcomes.This method is not only successful in forecasting precision for unknown datasets by eliminating redundancy in simulation but also mitigates the framework’s computational complexity by limiting the dimensions of the feature when constructing the corresponding structure.The outline of the efforts of the research are as follows:

    ? Identify the significance of high-dimensional safety features in an RTS-DELM-CSIDS.

    ? Formulate an IDS focused on the RTS-DELM-CSIDS security system.

    ? Consider the rating of security protocols based on their significance and construct a simplified model based on the specified core characteristics.

    ? Develop the proposed RTS-DELM-CSIDS framework for detecting intrusions on anomaly-based ML approaches to counter and track new attacks.

    ? Implement an innovative strategy for updating the learning model based on the feedback in the proposed RTS-DELM-CSIDS framework to raise the number of false warnings over a period.

    ? Decrease the risk of repeated false alerts with identical data in an efficient manner.

    ? Evaluate the efficacy of the proposed RTS-DELM-CSIDS framework for cyber intrusion detection.

    The remainder of the paper is organized as follows.Section 2 briefly describes the related work.Section 3 elaborates on the mathematical modeling of the proposed system model.Section 4 presents the simulation results and discussion.Finally,Section 5 concludes the contributions and achievements of this study.

    2 Related Work

    Intrusion monitoring devices capture and archive network data in a server that can be further used for an analytical review of the network.Network analysis tools are built to examine vast amounts of network traffic data and information such as routers,network servers,and adapters.The key advantages of smart cities are increased protection, wellness, higher-quality education and living standards, efficient use of resources,improved management of the environment and habitats, a sustainable economy, and more jobs.Whereas the central concept of smart cities has existed for roughly ten years, it has been predicted to change city life drastically since it was first introduced with the emergence of essential facilitators, such as the IoT.Gogoi et al.[15] conducted a research study reviewing numerous current solutions to ML and the potential to identify threats in information on Internet traffic using unsupervised and supervised teaching methods.Peddabachigari et al.[16] incorporate support vector machine (SVM) and decision tree architectures for malware detection.Abbas et al.[17] proposed that a smart city is a sophisticated society in which diverse elements, such as people, the environment, sovereignty, democracy, and the economy,are interconnected in an intelligent network.

    Diverse data mining (DM) and ML methods are used to identify sequences of security incidents to develop quality judgments [6].An intrusion detection program is usually used to recognize suspicious cyber-attack actions on a system when tracking and analyzing the everyday processes in a network or operating device to identify safety vulnerabilities or attacks [18].This framework considers an established signature and has seen widespread acceptance and business success recently.Its methodology monitors network activity and identifies behavioral trends for risks by examining the related security information.

    The anomaly-based method, in contrast, has an advantage over the signature-based approach to track invisible threats, such as the potential to recognize hidden or zero-day attacks [10].Reducing the false positive level of an IDS should be a significant concern [12].Within the field of cybersecurity, a range of work has been conducted for the potential to detect and deter cyber threats or breaches.Signature-based network intrusion detection is a popular method used in the cyber-industry [13].The key downside of the anomaly-based approach is that it could generate substantial false alarm levels because it can identify undiscovered system operations as anomalies.However, an efficient detection method focused on ML is required to mitigate such problems.

    Ganin et al.[1]proposed a comprehensive explanation of the functions of intrusion detection methods for ML.Buczak et al.[10] investigated cybersecurity intrusion detection methods for ML and DM.ML applications have drawn significant attention.Namdev et al.[19] proposed a detailed description using ML emphasis on Internet traffic classification.Bkassiny et al.[20] researched several complex knowledge complications in cognitive-radio networks (CRNs) and analyzed present ML-based solutions.Methods to address problems in wireless sensor networks with ML were examined in [21].Wang et al.[22]developed state-of-the-art techniques to formulate heterogeneous networks in AI and discussed future research problems.Klaine et al.[23] investigated a useful classification and comparison of ML systems and their explanations in mobile networks.Fadlullah et al.[24] explored the use of ML methods to enhance network traffic management.Hodo et al.[25] concentrated on ML-based IDSs.Zhou et al.[26]emphasized the use of ML and cognitive radiation expertise to improve wireless-to-network spectrum use and energy efficiency.Abadeh et al.[27] suggested a complementary genetic area analysis algorithm to identify disruptive actions.

    In contrast to the previous studies, we present in this investigation an RTS-DELM-CSIDS security framework.The proposed framework first captures the classification of security issues based on their significance.It then constructs a generic architecture for detecting intrusions centered on the identified significant characteristics to address the known problems.

    3 System Model

    This section elaborates on the development of the proposed IDS using anomaly-based ML methods.The proposed RTS-DELM-CSIDS framework uses an innovative strategy to mitigate the number of fake alerts over the period.It is achieved by accessing human expert feedback and modifying the learning model based on that information.This approach efficiently decreases the risk of repeated false alerts with identical data.Nonetheless, the proposed RTS-DELM-CSIDS can consider all unsupervised and supervised learning methods.Consequently, in the training process, there is no need for label information.Given that the percentage of traffic segments is the only necessary prior information, the proposed approach supports identifying the correct labels for unlabeled details.It also suggests adjustments in instances where conventional approaches classify the training samples through human experts.

    The suggested IDS offer a scheme for simplifying the assessment of human safety experts’ decisions.Accordingly, the framework can identify irregularities based on predetermined observations.Therefore,with supervised feature learning, the program has the potential to spot human mistakes while marking the data and proposing corrections.Moreover, the framework can identify new traffic segments using a scoring scheme.The suggested intrusion detection solution offers a rapidly-updating framework that identifies the adaptability dilemma of existing approaches.One use of the proposed framework is to upgrade the learning framework based on current information and novel forms of attacks with minimal computational cost.

    Fig.1 describes the proposed RTS-DELM-CSIDS methodology applied to the NSL-KDD dataset.Intrusion detection is performed by two modules:

    ? A labeled information collection trains a learning model in the preprocessing layer to detect attacks.

    ? A novel attack detection method detects new threats in specific periods after RTS-DELM-CSIDS implementation.

    Figure 1:Proposed framework of RTS-DELM-CSIDS

    3.1 Exploring Security Dataset

    In this study,we use the publicly accessible intrusion dataset from Kaggle,which consists of two types:regular and attack[28].Tab.1 presents all the security protocols comprising their value categories.The NSLKDD dataset is a revamped version of KDD 99,which has many improvements relative to the initial KDD 99 dataset [29].The NSL-KDD dataset includes 41 features per record.Tab.2 presents a full overview of the features.

    Furthermore,each instance has a label indicating its traffic type—either regular or malicious traffic.The open attack groups for the NSL-KDD data belong to one of four major classes[28]:DoS,Remote to Local(R2L), User-to-Root (U2R), and probe.All types of attacks include multiple sample attacks in the information collection.The complete list of threats is presented in Tab.1

    Table 1:NSL-KDD dataset attacks description[28]

    Table 2:Dataset structure[28]

    3.2 Deep Extreme Learning Machine(DELM)

    Fig.2 illustrates the Deep Extreme Learning Machine (DELM) framework, which has several hidden layers, hidden neurons, and activation functions of multiple types to produce an optimal cybersecurity framework.The proposed framework consists of three layers:data collection,preprocessing,and application.The application layer includes two sub-layers:one for prediction and one for evaluation.The exploratory studies acquire actual information from sensors.The data collection layer uses the collected sensor data as inputs.Various cleanup processes of data and inspection methods are applied in the preprocessing layer to remove irregularities from the actual data.The application layer implements the DELM framework to optimize cybersecurity for any malicious or intrusive activity.

    Figure 2:Systemic model of a DELM[30]

    The DELM approach applies to multiple intrusion detection applications.A considerable number of sensor measurements is usually necessary to preserve the precision of the required detection.The DELM mitigates numerous network builder problems, such as network security and connectivity concerns.Given that sending and processing data consumes 80 percent of the network’s energy, data reduction and feature extraction techniques can minimize processing and further prolong the network’s lifespan.With high computational and memory demands, commonly used compression strategies may contribute to increased energy consumption.The DELM framework adjusts the data compression performance threshold within networks.Consequently, cybersecurity requires real-time networking approaches, including protection,schedules, tracking, clustering nodes, aggregating data, identification of faults, and data integrity.The DELM framework enhances the capacity of cybersecurity to respond to their surroundings’complex behavior.

    A DELM can be configured in different fields to forecast health problems, energy consumption, and transport and traffic management [30,31].Conventional artificial neural network (ANN) architectures require several measures and sluggish learning cycles and can overwrite the learning system [32].The concept of an extreme learning machine is defined by [33], which is typically a feedforward neural network; this indicates that input passes only one direction over a set of layers.Nonetheless, we have also used the backpropagation approach in this predictive model during the training process, where data flows backward through the network.In backpropagation, the neural network adjusts weights to attain a high precision at a minimal error rate.The weights are constant during the validation stage, which imports the qualified model and predicts the real data.The DELM framework consists of an input layer, several hidden layers, and one output layer.After training of the system is complete, the trained model is exported to the cloud for online use during the validation phase.Fig.2 indicates the definition of the DELM in a hierarchical form,wheremdenotes nodes in the input layer,ldenotes nodes in the hidden layer,andTdenotes nodes in the output layer.The mean squared error (MSE) is observed in the evaluation layer to optimize cybersecurity.

    Huang et al.[33]demonstrated an extreme learning machine (ELM) for the training of single-hiddenlayer feedforward neural networks.In contrast, a DELM uses many current learning strategies (e.g.,backpropagation) when arbitrarily initializing input weights; it only changes output weights in one iterative process without changing the input weights, thus offering a quick and comprehensive ability to learn.The DELM methodology operates as follows.Assume we have multiple hidden-layer feedforward neural networks withnhidden layer neurons and a training dataset ofNrecords (эi,fi), in which(эi∈Sd)andfi∈Sc.The outcome of these multiple hidden layer feedforward neural networks is:

    where pjandajare learning variables,γjis node output at weightj,and¥:S →S is the activation function.

    An ideal rapprochement of a multiple-hidden-layer feed forward neural network with zero error illustrates that with discrete intervals pjandajthere occurs γjsuch that;

    which can be represented as

    where

    and

    When the number of observations is greater than the number of hidden-layer neurons,the outcome value weights can be determined using the following equation:

    and Q-1is the inverse of matrix Q.A DELM is,therefore,a computationally economical system of study.

    3.3 Real-Time Sequential Deep Extreme Learning Machine(RTS-DELM)

    The DELM is a batch learning framework.We address instances in which information is received in sequential order by proposing a Real-Time Sequential DELM (RTS-DELM).Upon the creation of new information,the RTS-DELM upgrades the framework as a series of learning algorithms, without requiring previously trained data.

    RTS-DELM comprises two initial and sequential stages of learning.Initially,the framework trains withN0different observations, and, based on these observations, the hidden layer performance matrix Q0is developed.For DELM and RTS-DELM,N0should be equal to or less than the number of hidden layer neuronsn, such that the level (Q0) is equivalent to or greater thann.The framework can be sequenceupdated on the introduction of new information following the initial phase.

    After the initial stage,the creation of (k+1)thof records with Nk+1number of records may create the partially hidden layer performance matrix as

    and performance weights can be modified using the following equation:

    with

    The back propagation method involves weight configuration, feed forward propagation, backward error propagation, and a distinguish ability update.An activation function such as g(x) =sigmoid is present in the hidden layer on each neuron.This approach designs the sigmoid input function and the DELM hidden layer:

    sj= Desired output

    wpj= calculated output

    Eq.(12)specifies a back propagation error,which can be measured by dividing the square sum from the required output by 2.The adjustment in weight is required to mitigate the common error.The weight change levels for the output layer are defined by Eq.(13) as:

    i= 1,2,3...10(no.ofneurons)

    and j = Layer of Output Value

    Eq.(14)illustrate the weight update and how the biases occur between the hidden layer and inputs.

    4 Results and Discussion

    In this study,we implement an RTS-DELM methodology on a dataset[28].The data were divided up randomly into 70%training(103,962 samples)and 30%validation(44,554 samples).Data were processed in advance to delete information irregularities and mitigate information from errors.The RTS-DELM-CSIDS attempts to identify any malicious action or intrusion in various hidden layers (including hidden neurons)and activation functions.Moreover, we evaluated a specific number of neurons in hidden layers in a network and also implemented numerous forms of active functions.In this investigation, we evaluated the RTS-DELM-CSIDS to accurately predict the efficiency of this system.We calculated the output with the counterpart algorithms of the RTS-DELM-CSIDS algorithm using multiple statistical measures, as described in Eq.(15) through Eq.(18).

    Within this analysis, we assess the efficacy of the experiments conducted by the current RTS-DELMCSIDS.The two widely used intrusion detection assessment measures are Detection Rate and False Positive Rate:

    In Eqs.(15),(16),Wsymbolizes the predictive outcome value of RTS-DELM-CSIDS andRexpresses the real outcome value.W0andR0denote normal (no attack) in the predictive and actual outputs,respectively.W1andR1denote an attack in the predictive and actual outputs, respectively.Theindicates that projected and real outcome values are similar.Likewise,denotes error, where predictive and real outcome values vary.

    Tab.3 illustrates the proposed RTS-DELM-CSIDS for the prediction of intrusion detection during the training phase.A total of 103,962 samples were used during training, divided into 53,937 and 50,025 samples for normal and attacks,respectively;52,198 samples belong to a normal class,in which no attack was found, and these samples were correctly predicted.Moreover, 1,739 samples were recorded as incorrect predictions, demonstrating that an attack was detected while, in reality, no attack occurred.Similarly, 50,025 samples were taken for attack found, for which the attack was correctly predicted for 47,835 samples; in contrast, 2,190 samples were incorrect predictions because they were found to be normal while, in reality,an attack occurred.

    Table 3:Training of the proposed RTS-DELM-CSIDS security model during the prediction of network traffic

    Tab.4 depicts the proposed RTS-DELM-CSIDS for the prediction of intrusion detection during the validation phase.A total of 44,554 samples were used during validation, which is further divided into 23,116 and 21,438 samples for normal and attacks, respectively.Moreover, 21,837 samples of the normal class were correctly predicted, while 1,279 samples exhibit incorrect prediction of an attack while, in reality, no attack occurred.Similarly, 21,438 samples were taken for attack found, for which the attack was correctly predicted for 19,478 samples; in contrast, 1,960 samples were incorrect predictions because they were found to be normal while,in reality,an attack occurred.

    Table 4:Validation of the proposed RTS-DELM-CSIDS security model during the prediction of network traffic

    Tab.5 depicts the proposed RTS-DELM-CSIDS system model performance in terms of accuracy and miss rate during the training and validation phase.The proposed RTS-DELM-CSIDS system model had a 96.22% and 3.78% accuracy and miss rate during training, respectively.Moreover, during the validation phase, the proposed RTS-DELM-CSIDS system model had a 92.73%accuracy and a 7.27%miss rate.

    Table 5:Performance evaluation of proposed RTS-DELM-CSIDS during validation and training

    We contrasted the efficiency of our solution to the current NSL-KDD dataset approaches.As illustrated in Fig.3,with a lower error rate,the proposed system achieves considerably higher precision.The proposed RTS-DELM-CSIDS technique is superior to other models in terms of accuracy,such as a self-organizing map(SOM) [34], ANN-based IDS [35], and generative adversarial networks (GANs) [36].The RTS-DELMCSIDS outperformed the NSL-KDD dataset.The precision of the SOM [34] is much lower than other ML algorithms.In [34], the authors proposed a SOM, in which the investigators obtained 75.5%accuracy.In [35], the authors proposed ANN-based IDS, in which the investigators obtained 81.2%accuracy.In [36], the authors proposed GANs, in which the investigators obtained 86.5% accuracy.The proposed RTS-DELM-CSIDS framework accuracy is 96.22% and higher in terms of accuracy compared with the existing techniques.The proposed RTS-DELM-CSIDS framework outperforms current methods significantly based on statistical values.Thus, the proposed RTS-DELM-CSIDS framework is a viable option as a smart solution for network security.

    Figure 3:Comparison results of the proposed RTS-DELM-IDS with literature

    5 Conclusions

    In this article, we have proposed an RTS-DELM-CSIDS security model.We presented safety characteristics based on their values.Moreover, we developed a generalized intrusion detection model focused on the identified critical characteristics to ensure forecasting accuracy and efficiency for unknown datasets and reduce computational complexity.We then tested the efficacy of our RTS-DELM-CSIDS framework by performing a sequence of dataset experiments.Specific methodological approaches were used to determine the feasibility of the suggested approach.The measured data indicate that the proposed RTS-DELM-CSIDS approach is much higher in accuracy compared with other algorithms.The proposed RTS-DELM-CSIDS security model produces impressive outcomes.The proposed technique exhibits 96.22% and 92.73% accuracy during training and validation, respectively.We also contrasted the findings of the RTS-DELM-CSIDS framework with many conventional mainstream approaches to evaluate the efficacy of the associated security framework.

    Funding Statement:This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korean government (MSIT) (Nos.2019R1A4A1023746, 2019R1F1A1060799) and Strengthening R&D Capability Program of Sejong University.

    Conflict of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚州av有码| 久久久久久久久久人人人人人人| 天天躁夜夜躁狠狠久久av| 日日撸夜夜添| 好男人视频免费观看在线| 成人二区视频| 亚洲,欧美,日韩| 寂寞人妻少妇视频99o| 精品久久久久久电影网| 日韩强制内射视频| 97精品久久久久久久久久精品| 极品少妇高潮喷水抽搐| 精品国产露脸久久av麻豆| 午夜av观看不卡| 国产亚洲最大av| 美女cb高潮喷水在线观看| 久久久久久人妻| 国产探花极品一区二区| 精华霜和精华液先用哪个| 日韩强制内射视频| 妹子高潮喷水视频| 亚洲丝袜综合中文字幕| 久久久久久久久久久久大奶| 九色成人免费人妻av| 在现免费观看毛片| 免费人成在线观看视频色| 日本-黄色视频高清免费观看| 国产伦精品一区二区三区视频9| 日韩成人av中文字幕在线观看| 51国产日韩欧美| 欧美97在线视频| 肉色欧美久久久久久久蜜桃| 美女国产视频在线观看| av不卡在线播放| 高清毛片免费看| 大香蕉久久网| 欧美日韩精品成人综合77777| 综合色丁香网| 国产无遮挡羞羞视频在线观看| 欧美高清成人免费视频www| 久久热精品热| 久久久久人妻精品一区果冻| 狂野欧美激情性bbbbbb| 中文资源天堂在线| 久久国产乱子免费精品| 国产精品久久久久久av不卡| 国产日韩欧美亚洲二区| 欧美区成人在线视频| 亚洲国产av新网站| 春色校园在线视频观看| 在线观看免费视频网站a站| 寂寞人妻少妇视频99o| 亚洲精品色激情综合| 欧美 亚洲 国产 日韩一| 在线观看人妻少妇| 国产成人精品无人区| av又黄又爽大尺度在线免费看| 高清欧美精品videossex| 国产亚洲av片在线观看秒播厂| 国产男女超爽视频在线观看| 国产亚洲欧美精品永久| 久久人人爽人人片av| 国产在线男女| 国产永久视频网站| 丰满迷人的少妇在线观看| 亚洲欧美日韩另类电影网站| 亚洲,欧美,日韩| 日本av免费视频播放| 欧美性感艳星| 国产精品久久久久久精品古装| 99re6热这里在线精品视频| 亚洲美女黄色视频免费看| 9色porny在线观看| 精品99又大又爽又粗少妇毛片| 女人久久www免费人成看片| 国产极品粉嫩免费观看在线 | 97在线视频观看| 亚洲国产精品成人久久小说| 亚洲丝袜综合中文字幕| 国产一区二区三区av在线| 嫩草影院新地址| 亚洲精品456在线播放app| 十八禁网站网址无遮挡 | 涩涩av久久男人的天堂| 精品人妻偷拍中文字幕| 国产综合精华液| 久热久热在线精品观看| 一级毛片黄色毛片免费观看视频| 一级毛片电影观看| 成人二区视频| h日本视频在线播放| 亚洲怡红院男人天堂| 美女内射精品一级片tv| 精品视频人人做人人爽| 黄色一级大片看看| 老女人水多毛片| 久久久久人妻精品一区果冻| 日韩av免费高清视频| 亚洲精品乱码久久久久久按摩| 国产女主播在线喷水免费视频网站| 最新的欧美精品一区二区| 草草在线视频免费看| 久久人人爽人人爽人人片va| av一本久久久久| 韩国av在线不卡| 99re6热这里在线精品视频| 3wmmmm亚洲av在线观看| 美女cb高潮喷水在线观看| 中文字幕久久专区| 国产一区二区三区av在线| 久久6这里有精品| 精品99又大又爽又粗少妇毛片| 老司机影院毛片| 777米奇影视久久| 丝袜脚勾引网站| 97超碰精品成人国产| 国产精品成人在线| 精品国产国语对白av| 99热这里只有是精品50| 久久99蜜桃精品久久| 久久99热这里只频精品6学生| 三上悠亚av全集在线观看 | 卡戴珊不雅视频在线播放| 亚洲图色成人| 亚洲激情五月婷婷啪啪| 一二三四中文在线观看免费高清| 欧美97在线视频| 亚洲精品自拍成人| 亚洲成人手机| 久久这里有精品视频免费| 婷婷色麻豆天堂久久| 久久精品久久精品一区二区三区| 精品一区二区三卡| 3wmmmm亚洲av在线观看| 最后的刺客免费高清国语| 99热这里只有是精品50| 久久国产乱子免费精品| 日韩免费高清中文字幕av| 欧美97在线视频| 日产精品乱码卡一卡2卡三| 久久青草综合色| av线在线观看网站| 纵有疾风起免费观看全集完整版| 我要看日韩黄色一级片| 精品亚洲成国产av| 只有这里有精品99| 国内精品宾馆在线| 亚洲在久久综合| 国产精品秋霞免费鲁丝片| 亚洲精品国产av成人精品| 久久婷婷青草| 精品国产乱码久久久久久小说| 午夜91福利影院| 美女中出高潮动态图| 国产精品福利在线免费观看| 性色avwww在线观看| 美女中出高潮动态图| av播播在线观看一区| 国产国拍精品亚洲av在线观看| 一本大道久久a久久精品| 高清在线视频一区二区三区| 国产精品一区二区三区四区免费观看| 777米奇影视久久| 99热6这里只有精品| 伦理电影大哥的女人| 国产精品人妻久久久影院| 国产乱来视频区| 精品酒店卫生间| 日韩中文字幕视频在线看片| 婷婷色av中文字幕| 久久99一区二区三区| 成人18禁高潮啪啪吃奶动态图 | 久久久久久久亚洲中文字幕| 亚洲美女黄色视频免费看| 99九九在线精品视频 | 久久97久久精品| 欧美精品高潮呻吟av久久| freevideosex欧美| 亚洲婷婷狠狠爱综合网| 尾随美女入室| 亚洲一级一片aⅴ在线观看| 狂野欧美白嫩少妇大欣赏| 久久鲁丝午夜福利片| 亚州av有码| 天堂俺去俺来也www色官网| 国产黄片美女视频| 国产精品一区二区在线不卡| 亚洲av成人精品一区久久| 日产精品乱码卡一卡2卡三| 亚洲高清免费不卡视频| 人妻一区二区av| 七月丁香在线播放| 秋霞在线观看毛片| 欧美三级亚洲精品| av在线播放精品| 精品一区二区三卡| 亚洲国产精品专区欧美| 亚洲精品456在线播放app| 免费观看av网站的网址| 久久 成人 亚洲| 成人综合一区亚洲| 亚洲国产精品专区欧美| 久热久热在线精品观看| 亚洲精品aⅴ在线观看| 一区二区三区四区激情视频| 欧美一级a爱片免费观看看| 国产真实伦视频高清在线观看| videossex国产| 人人妻人人看人人澡| 国产伦精品一区二区三区视频9| 亚洲欧美一区二区三区国产| av.在线天堂| 欧美日韩视频高清一区二区三区二| 精品人妻一区二区三区麻豆| 成人黄色视频免费在线看| 日本欧美国产在线视频| 精品酒店卫生间| 国产亚洲午夜精品一区二区久久| av在线app专区| 午夜日本视频在线| 色婷婷久久久亚洲欧美| 色网站视频免费| 国产日韩一区二区三区精品不卡 | 国产伦精品一区二区三区四那| 日韩精品有码人妻一区| 99热全是精品| 亚洲av欧美aⅴ国产| 国精品久久久久久国模美| 免费人成在线观看视频色| 又大又黄又爽视频免费| 人妻系列 视频| 夜夜看夜夜爽夜夜摸| 9色porny在线观看| 午夜视频国产福利| 男女边摸边吃奶| 国产成人免费观看mmmm| 中文字幕人妻丝袜制服| 久久精品国产自在天天线| 国产综合精华液| 国产精品久久久久久久久免| 欧美变态另类bdsm刘玥| 精品少妇黑人巨大在线播放| 国产欧美日韩精品一区二区| 成人亚洲精品一区在线观看| 国产伦精品一区二区三区视频9| 欧美日韩国产mv在线观看视频| videos熟女内射| 在线天堂最新版资源| 欧美精品国产亚洲| 亚洲国产色片| 99久久精品一区二区三区| 亚洲一区二区三区欧美精品| 在线观看美女被高潮喷水网站| 中文字幕制服av| 熟女电影av网| 欧美精品国产亚洲| 人妻少妇偷人精品九色| 80岁老熟妇乱子伦牲交| 女人精品久久久久毛片| 国产精品伦人一区二区| 免费人妻精品一区二区三区视频| 下体分泌物呈黄色| 免费观看在线日韩| 好男人视频免费观看在线| 色5月婷婷丁香| 亚洲av福利一区| 中文字幕免费在线视频6| 蜜臀久久99精品久久宅男| 热99国产精品久久久久久7| 少妇高潮的动态图| 久久99热这里只频精品6学生| 久热这里只有精品99| 成人国产av品久久久| 国产老妇伦熟女老妇高清| 女人久久www免费人成看片| 亚洲欧洲精品一区二区精品久久久 | 视频中文字幕在线观看| 少妇的逼水好多| 七月丁香在线播放| 高清在线视频一区二区三区| 五月伊人婷婷丁香| 国产一级毛片在线| 国产精品成人在线| 欧美xxxx性猛交bbbb| 欧美三级亚洲精品| 能在线免费看毛片的网站| 国产在线视频一区二区| 偷拍熟女少妇极品色| 男女无遮挡免费网站观看| 亚洲国产av新网站| 在线亚洲精品国产二区图片欧美 | 夫妻午夜视频| 国产淫语在线视频| 自拍欧美九色日韩亚洲蝌蚪91 | 免费久久久久久久精品成人欧美视频 | 黑人高潮一二区| 极品教师在线视频| 欧美精品一区二区免费开放| 免费在线观看成人毛片| 久久免费观看电影| 99久久精品国产国产毛片| 亚洲av二区三区四区| 校园人妻丝袜中文字幕| 日韩在线高清观看一区二区三区| 日韩强制内射视频| 久久久欧美国产精品| 中文精品一卡2卡3卡4更新| 免费黄网站久久成人精品| 国产精品偷伦视频观看了| 亚洲欧美中文字幕日韩二区| 大话2 男鬼变身卡| 五月天丁香电影| 美女脱内裤让男人舔精品视频| 国产成人免费无遮挡视频| 99国产精品免费福利视频| 日韩强制内射视频| 欧美高清成人免费视频www| 亚洲内射少妇av| av在线老鸭窝| 国产欧美另类精品又又久久亚洲欧美| 亚洲国产毛片av蜜桃av| 亚洲一级一片aⅴ在线观看| 自线自在国产av| 国产熟女午夜一区二区三区 | 中文资源天堂在线| 丰满迷人的少妇在线观看| av视频免费观看在线观看| av又黄又爽大尺度在线免费看| 十八禁高潮呻吟视频 | 欧美97在线视频| 国产精品国产三级国产av玫瑰| 亚洲人成网站在线播| 日本av免费视频播放| 麻豆乱淫一区二区| 国产精品偷伦视频观看了| 亚洲欧美日韩另类电影网站| 日产精品乱码卡一卡2卡三| 狂野欧美白嫩少妇大欣赏| 午夜福利网站1000一区二区三区| 日韩亚洲欧美综合| 中文天堂在线官网| 51国产日韩欧美| 伊人亚洲综合成人网| 五月天丁香电影| 午夜福利在线观看免费完整高清在| 国产免费一区二区三区四区乱码| 人体艺术视频欧美日本| 国产精品久久久久成人av| 国产熟女欧美一区二区| 日韩免费高清中文字幕av| 人体艺术视频欧美日本| 国产亚洲精品久久久com| 国产男女超爽视频在线观看| 亚洲va在线va天堂va国产| 成人亚洲欧美一区二区av| 99久久综合免费| 色94色欧美一区二区| 在线观看免费高清a一片| 国产一区二区三区综合在线观看 | 亚洲精品国产色婷婷电影| 日韩欧美一区视频在线观看 | 亚洲欧美日韩东京热| 日韩成人av中文字幕在线观看| 国产伦在线观看视频一区| 我要看日韩黄色一级片| 在线精品无人区一区二区三| 日日摸夜夜添夜夜爱| 国产在线免费精品| 91久久精品国产一区二区成人| 国产成人freesex在线| 亚洲情色 制服丝袜| 色5月婷婷丁香| 国产精品女同一区二区软件| 日韩,欧美,国产一区二区三区| 少妇裸体淫交视频免费看高清| 99国产精品免费福利视频| 欧美日韩视频高清一区二区三区二| 亚洲无线观看免费| av国产精品久久久久影院| 亚洲欧美日韩东京热| 亚洲色图综合在线观看| 国产黄片美女视频| 午夜福利影视在线免费观看| 国产免费一级a男人的天堂| 久久久久网色| 日韩人妻高清精品专区| 国产乱来视频区| 亚洲欧美精品专区久久| 亚洲国产成人一精品久久久| www.色视频.com| 99久久人妻综合| 久久久久久久久大av| 国产日韩欧美亚洲二区| 国产成人精品婷婷| a级一级毛片免费在线观看| av一本久久久久| 欧美老熟妇乱子伦牲交| 久久青草综合色| 五月开心婷婷网| 国产成人a∨麻豆精品| 久久国产精品大桥未久av | 亚洲精品视频女| 午夜影院在线不卡| av又黄又爽大尺度在线免费看| 精品一区二区三卡| 国产亚洲最大av| a级片在线免费高清观看视频| 丰满迷人的少妇在线观看| 亚洲在久久综合| 日日摸夜夜添夜夜爱| 免费av不卡在线播放| 一本久久精品| 日本黄大片高清| 国产精品嫩草影院av在线观看| 欧美精品一区二区大全| 99热这里只有是精品在线观看| 少妇人妻一区二区三区视频| 久久精品国产a三级三级三级| 少妇人妻久久综合中文| 国产日韩欧美在线精品| 伦理电影免费视频| 国产成人freesex在线| 午夜福利视频精品| 午夜福利在线观看免费完整高清在| av女优亚洲男人天堂| freevideosex欧美| 欧美日韩亚洲高清精品| 亚洲综合色惰| 在线观看免费视频网站a站| 成人影院久久| 黄色一级大片看看| 春色校园在线视频观看| 久久免费观看电影| 美女视频免费永久观看网站| 日本vs欧美在线观看视频 | 免费大片18禁| 亚洲经典国产精华液单| 一本一本综合久久| 这个男人来自地球电影免费观看 | 伊人久久精品亚洲午夜| 午夜91福利影院| 制服丝袜香蕉在线| 日韩一区二区三区影片| 又大又黄又爽视频免费| 国产成人精品一,二区| 免费久久久久久久精品成人欧美视频 | 国产高清有码在线观看视频| 成人亚洲欧美一区二区av| 老司机亚洲免费影院| 精品人妻偷拍中文字幕| 丝袜在线中文字幕| 少妇人妻 视频| 老女人水多毛片| 色哟哟·www| 麻豆成人av视频| 嫩草影院入口| 欧美精品一区二区大全| 亚洲av综合色区一区| 少妇丰满av| 中文字幕人妻熟人妻熟丝袜美| 日韩三级伦理在线观看| 在线播放无遮挡| 亚洲欧美日韩卡通动漫| 高清午夜精品一区二区三区| 狂野欧美白嫩少妇大欣赏| 国产真实伦视频高清在线观看| 国产深夜福利视频在线观看| 九色成人免费人妻av| 人妻一区二区av| 99久久综合免费| 搡女人真爽免费视频火全软件| 丝瓜视频免费看黄片| 少妇丰满av| 久久久久久久亚洲中文字幕| 国产日韩一区二区三区精品不卡 | 亚洲欧美一区二区三区黑人 | 亚洲国产av新网站| 日韩电影二区| 在线观看美女被高潮喷水网站| 欧美最新免费一区二区三区| 国产精品一区www在线观看| 欧美精品一区二区免费开放| videos熟女内射| 一级毛片电影观看| 国产成人精品福利久久| 春色校园在线视频观看| 汤姆久久久久久久影院中文字幕| 国产91av在线免费观看| 中文精品一卡2卡3卡4更新| 赤兔流量卡办理| 中文字幕av电影在线播放| 国产精品一区二区三区四区免费观看| 国精品久久久久久国模美| 岛国毛片在线播放| 中文字幕精品免费在线观看视频 | 在线观看一区二区三区激情| 亚洲国产精品一区三区| 三级经典国产精品| 老司机影院成人| 亚洲美女黄色视频免费看| 又爽又黄a免费视频| 国产亚洲午夜精品一区二区久久| 黄色配什么色好看| 久久久久网色| 观看av在线不卡| 亚洲av成人精品一区久久| 亚洲国产精品一区三区| 国产av精品麻豆| 51国产日韩欧美| 最新中文字幕久久久久| 国产淫语在线视频| 久久97久久精品| 亚洲av日韩在线播放| 妹子高潮喷水视频| 一本色道久久久久久精品综合| 91精品一卡2卡3卡4卡| 六月丁香七月| 日韩av在线免费看完整版不卡| 中文字幕免费在线视频6| 又粗又硬又长又爽又黄的视频| 亚洲国产精品999| 日韩欧美精品免费久久| 日产精品乱码卡一卡2卡三| 久久精品国产鲁丝片午夜精品| 精品久久久久久久久av| 女人久久www免费人成看片| 久久久久精品性色| 久久精品久久久久久噜噜老黄| 精品视频人人做人人爽| 久久 成人 亚洲| 成人毛片a级毛片在线播放| 一级av片app| 黑人高潮一二区| 欧美+日韩+精品| 2021少妇久久久久久久久久久| 欧美精品一区二区免费开放| 99热这里只有是精品50| 亚洲精品久久午夜乱码| 两个人的视频大全免费| 午夜精品国产一区二区电影| 2018国产大陆天天弄谢| 五月开心婷婷网| 日韩 亚洲 欧美在线| 亚洲欧洲国产日韩| 另类亚洲欧美激情| 亚洲国产最新在线播放| 汤姆久久久久久久影院中文字幕| 中文在线观看免费www的网站| 欧美性感艳星| 永久网站在线| 国产乱来视频区| 丰满人妻一区二区三区视频av| 国产伦在线观看视频一区| 国产亚洲精品久久久com| 国产 一区精品| 国产高清三级在线| 最近中文字幕高清免费大全6| 午夜福利网站1000一区二区三区| 亚洲人成网站在线播| 成人特级av手机在线观看| 老司机影院毛片| 久久99热6这里只有精品| 日韩三级伦理在线观看| 久久鲁丝午夜福利片| 人妻少妇偷人精品九色| 日韩制服骚丝袜av| 国产伦理片在线播放av一区| 亚洲精品国产av成人精品| 国产午夜精品久久久久久一区二区三区| 亚洲av成人精品一区久久| 免费观看性生交大片5| 国产精品一区二区性色av| 中文字幕免费在线视频6| a级毛片免费高清观看在线播放| 亚洲经典国产精华液单| 99热这里只有是精品在线观看| 亚洲精品色激情综合| 黄色配什么色好看| 少妇人妻精品综合一区二区| 日本vs欧美在线观看视频 | 亚洲va在线va天堂va国产| 欧美日韩在线观看h| 亚洲第一av免费看| 卡戴珊不雅视频在线播放| freevideosex欧美| 少妇精品久久久久久久| 国产黄片视频在线免费观看| a级毛片在线看网站| 丁香六月天网| 久久精品久久精品一区二区三区| 久久免费观看电影| 在线观看人妻少妇| 一区二区三区四区激情视频| 亚洲精品自拍成人| 国产一区有黄有色的免费视频| 久久6这里有精品| 亚洲av中文av极速乱| av在线老鸭窝| 啦啦啦视频在线资源免费观看| 亚洲av中文av极速乱| 久久久久久久亚洲中文字幕| 黄色毛片三级朝国网站 | 乱人伦中国视频| 亚洲情色 制服丝袜| 欧美精品一区二区大全| 又爽又黄a免费视频| 国产黄片视频在线免费观看| 男女啪啪激烈高潮av片| 极品少妇高潮喷水抽搐| 91在线精品国自产拍蜜月| 亚洲精品亚洲一区二区| 久久久久久久亚洲中文字幕| 午夜福利视频精品| 亚洲色图 男人天堂 中文字幕| 国产av一区二区精品久久|