• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    EDSM-Based Binary Protocol State Machine Reversing

    2021-12-15 07:09:36ShenWangFanghuiSunHongliZhangDongyangZhanShuangLiandJunWang
    Computers Materials&Continua 2021年12期

    Shen Wang,Fanghui Sun,Hongli Zhang,Dongyang Zhan,2,Shuang Li and Jun Wang

    1School of Cyberspace Science,Harbin Institute of Technology,Harbin,150001,China

    2The Ohio State University,Columbus,43202,USA

    3Guangzhou University,Guangzhou,510006,China

    Abstract:Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols are emerging in endlessly various network environments.Herein,relevant protocol specifications become difficult or unavailable to translate in many situations such as network security management and intrusion detection.Although protocol reverse engineering is being investigated in recent years to perform reverse analysis on the specifications of unknown protocols, most existing methods have proven to be time-consuming with limited efficiency,especially when applied on unknown protocol state machines.This paper proposes a state merging algorithm based on EDSM(Evidence-Driven State Merging) to infer the transition rules of unknown protocols in form of state machines with high efficiency.Compared with another classical state machine inferring method based on Exbar algorithm,the experiment results demonstrate that our proposed method could run faster,especially when dealing with massive training data sets.In addition, this method can also make the state machines have higher similarities with the reference state machines constructed from public specifications.

    Keywords: Network security; protocol state machine; EDSM algorithm;protocol reverse engineering; protocol analyzing

    1 Introduction

    Communication processes among network entities are regulated by network protocols, which define the specifications of message syntaxes and semantics as well as the order messages are to be transmitted.With the continuous development of computer networks [1–3], the massproduced private or unknown communication protocols have increased the difficulty of related network security management.Thus, the ability of obtaining unknown protocol specifications becomes extremely vital in various situations especially in security-related contexts such as firewalls and intrusion detection systems [4–6].In these cases, protocol specifications are used to identify malicious traffic and in DPI (Deep Packet Inspection) to assist in making network access more secure and efficient [7–10].

    Protocol Reverse Engineering (PRE) refers to the process of analyzing an unknown protocol,where its specifications are obtained by analyzing the message sequences captured from the network traces, or by the instruction streams, during the protocol’s communicating process.Network protocol reverse engineering mainly contains two parts:1) message format & semantic mining and 2) state machine inferring.Much research has been done on the first part as represented by the methods in [11–17].Cui et al.[15] proposed Discoverer to analyze the protocol format in communication traffic.In order to determine the optimal length of message keywords and recover message formats, Cai et al.[16] introduced a hidden semi-Markov model to fit unknown protocol message format.However, there is less research work on the second part [18–24].Shevertalov presented a protocol state machine inferring solution called PEXT based on common sequences [23].In order to make the state merging process more reasonable, Comparetti et al.[24]used Exbar algorithm to complete this process and got final minimal DFAs (Deterministic Finite-state Automatons).

    In the past years, traditional methods have proven to be usually time-consuming and to contain many errors.Open-source project Samba spent 12 years on manually mining Microsoft’s SMB (Server Message Block) protocol specification and implementing cross-platform file and print sharing mechanisms.Afterwards, many automatic protocol reverses analyzing methods were proposed to improve the PRE’s efficiency and accuracy, just like the aforementioned research work [18–24].When reconstructing the state machine of an unknown protocol communication process, however, there has still been many problems with computation efficiency including state explosion and time cost [25,26].

    This paper proposes a state merging algorithm based on EDSM [27] to automatically reconstruct the state machine of unknown binary protocols.Firstly, in order to transform protocol message exchange sessions from the form of message sequences into message type sequences,training samples pre-processing is carried out.Secondly, we use a heuristic state labeling algorithm to assign different labels to the protocol transition states.Finally, a state merging algorithm based on EDSM is proposed to complete the state machine reverse process to achieve the final state merging result as a general minimal DFA.

    This paper is organized as follows.We give formalized description of the protocol state machine and other definitions in Section 2, and explain the detailed theoretical design of this method in Section 3.In Section 4, several binary protocols are tested by our algorithm.The results demonstrate that the inferred protocol state machines have superior similarities with the reference state machines constructed by public specifications and have better processing capabilities aimed at large amounts of training data.

    2 Problem Definition

    Protocols regulate the transmission processes among network entities by defining message syntax and semantics as well as their exchange orders.A network protocol consists of three elements:(1) Syntax, (2) Semantic, and (3) Timing.Syntax refers to the message format and encoding.Semantic refers to the meaning of each field in a message.Timing rules the constraints and requirements of communication sequences and state transitions between protocol entities.Specifically, network entities generate responding messages and send them to each other in process of communication according to the semantic information that exists in message format specification and protocol state machines.

    Bhargavan et al.[28] formalized the problem of message interaction between network entities as a problem of language identification.Inspired by their work, we give a formalized description of the problem of protocol specification mining, as shown below.

    Definition 1:A Protocol State Machine can be represented as a “six-tuple” FSM (Finite State Machine), as shown in Eq.(1):

    where Q={q0,q1,...,qk} is a finite set of states; I= {i1,i2,...,im} is an input set of message formats; O = {o1,o2,...,on} is an output set of message formats; δ:Q × I →Q is the state transition function; λ:Q×I →O is the output function;q0is the initial state.

    In particular, there are two differences between the FSM in Definition 1 and the classical automatic mechanism.Firstly, for the FSM in Definition 1, all states are acceptable without rejection states.Secondly, any prefix of a valid message sequence is acceptable, and any prefix of an invalid message sequence is acceptable except the last message.

    Definition 2:The communication between protocol entityD1and protocol entityD2is composed of a series of message sequencesT1,...,Tn.Each message sequenceTi={p1p2...p|Ti|} is composed of a certain number of messages, wherepirefers to the ithmessage, |Ti|refers to the number of messages inTi.

    According to Definition 2, we divide the PRE-process into two steps based on the scope of protocol specification:(1) message format and semantic mining, and (2) protocol state machine reverse.Besides, the first step is the basic of the second step.In this paper, we mainly focus on protocol state machine reverse.

    3 The Proposed Protocol State Machine Reverse Method

    In last section, we give the formalized description of the protocol state machines and explain the relationship between the message format, semantic mining and protocol state machine reverse.

    In this section, we introduce the theoretical method design of our proposal.In Section 3.1,we describe how to pre-process the initial message of binary protocols in detail.In Section 3.2,the state labeling algorithm is described to assign different labels on states.Finally, the EDSMbased state merging algorithm is introduced to rebuild final protocol state machines of the target unknown protocol.

    3.1 Pre-Processing of Messages

    As the initial messages cannot be used as elements of the input set in Definition 1, we preprocess training samples to find state relevant fields to transform protocol sessions from the form of message sequences into the form of message type sequences.The main idea is using multiple sequence alignments to identify the variable length fields in messages, and then extracting state relevant fields by analyzing statistical characteristics of each field after removing variable length fields.

    3.1.1 Identification of Variable Length Fields

    Binary protocol messages are formed by a series of bytes, which usually consist of message headers and message bodies.The message header includes the message type, length and other fields.The length of a message header is usually fixed.However, in some complex binary protocols, there may be variable length fields, such as parameter fields.Therefore, we use multiple sequences alignment [29] to identify these variable length fields.

    Multiple sequence alignment is essentially an NP-complete problem, which is always realized by heuristic algorithms.Here, we use a progressive multiple sequence alignment algorithm to solve the multiple message field segmentation problem.To implement a multiple sequence alignment,we create a phylogenetic tree to guide this process.

    Once the phylogenetic tree is completed, a progressive multiple sequences algorithm can be achieved under the guidance of this phylogenetic tree.In fact, the basic operation of the progressive multiple sequence algorithm is global sequence alignment.In this paper, we apply the Needleman–Wunsch algorithm [30] to complete the global sequence alignment.The score matrix of messages A and B in the Needleman–Wunsch algorithm can be built based on the following equation.

    where 1 ≤i ≤M, 1 ≤j ≤M.

    In order to ensure that the fixed fields do not introduce gaps, and variable length fields could be aligned by adding gaps, we present a new substitution matrix for Needleman–Wunsch algorithm:initialize a match score of 2, mismatch score of -1, gap penalty of -3.The gap penalty is a special treatment in the algorithm running process:continuous gaps are counted only once, and gap penalty plus -1 for the next time.

    The advantage of our method is that once gaps are introduced between fixed fields, the remaining fields will not be aligned to result in serious gap penalties.In addition, variable length fields may need to be introduced more than one gap to be aligned.In order to avoid excessive gap penalties, we only count continuous gaps once.

    3.1.2 Extraction of State Relevant Fields

    There are various fields in binary message formats with different constraints added by protocol specification, which leads to different statistical characteristics of fields.Thus, we compute and analyze their statistical features, and then find out the features we are interested in.Based on the“Variance of the Distribution of the Variances” [31] of fields in each message format, relevant features are filtered for subsequent analysis.In this paper, we make the following assumptions to find the fields related to the state.

    Assumption 1.Binary protocols have the following properties:

    (1) The specific logic underlies in different traffic flows of a certain protocol to ensure the stable running of transmissions;

    (2) State relevant fields in messages assign the common logic of protocols;

    (3) The value of state relevant fields is usually limited and not excessive;

    (4) The value distributions of state relevant fields are similar in each session;

    (5) The length of a state relevant field is 1 byte which can represent 256 message types.

    We define the byte as the basic field unit.Based on these assumptions, we can find that there exists a certain change pattern of each byte field in the flow of a protocol.Relevant byte fields in different packets are presented in Fig.1.The distribution of one field in different flows is similar.

    Figure 1:Relevant byte fields in different packets

    For comparison, we useto denote the decentralization of field i in flow j.Then, calculate the variance distribution of each field in the entire set of flows 1...n.The distribution curve shows the variability of the field in these flows.Then, we consider in all flows 1...n for each field of the variance distribution previously computedWhat we are interested in is the low degree of variability in this statistic.

    3.2 EDSM-Based Protocol State Machine Reverse

    We determine state relevant fields by preprocessing.At the end of the preprocessing, each session is denoted as a sequenceSi=(t1,...,tn), andt1,t2,...,tnrepresents the message type set.In this process of state machine inference, we are aiming to achieve an acceptor machine which can recognize the target protocol in its valid sessions by analyzing the sequence of message types.

    3.2.1 State Labeling Algorithm

    Here, we use an Augmented Prefix Tree Acceptor (APTA [32]) T to build the initial state machine.In the training set, all states are assigned by “accept”.Now, we cannot leverage the existing state merging algorithm to merge pairs of states directly, which would result in an overgeneralized DFA with only one single state.Therefore, we introduce and optimize a state labeling algorithm proposed in [24] to assign different labels to the states ofT.In the following,we first introduce the state labeling algorithm, and then optimize it to complete state labeling.

    There is a convention in network protocols that a sequence of messages must be sent before the server can execute certain actions.So, a regular expression shown in Eq.(3) is used to represent the prerequisite of a certain message.

    where r,a1,...,ajare message types.

    A prerequisite means the server in a state that can accept message of typemmust receive another typerfirstly, and follows with(a1|...|aj)*, optionally.

    The limitation of an algorithm for calculating r is that more than one value of r may be obtained after the calculation, but not each value is reasonable.For example, in SMB, the“OPEN” operation must be performed before the “WRITE” operation, and the “TREE CONN”operation must be performed before the “OPEN” operation.Therefore, we can conclude that the“OPEN” operation is likely to rely on the “TREE CONN” caused by the dependent transition.

    Therefore, for each valueri, we test whetherriis the last appeared after other values in each protocol session.If such a value is found, we consider it as the final valuerthat we required.And if we cannot find one, the value ofris null which means no message type is required before the server can accept the message type M.

    Once all prerequisites are computed, the state q of T will be labelled within the set of message types, which can serve as an input.A serious problem of the state labeling algorithm is that many message types have the same prerequisites, which results in many states having the same label, but not all of them actually should be merged.For example, in SMB, the state created by “OPEN”’operation should not be merged with the state created by the “CREATEDIR” operation.The reason is that the “WRITE” and “READ” operations have relied on the “OPEN” operation, but no operation relies on the “CREATEDIR” operation.So, we label the state “s” by a tuple:

    where A is an acceptable message type ofs,Ris a set of message types that requires, andOis the last two elements of the path from the root tos.

    The expanded state labeling algorithm is shown as follows.

    ?

    3.2.2 EDSM-Based State Merging Algorithm

    An essential operation of protocol state machine reverse is the similar states merging.According to the state tree (APTA [32]) labelled by heuristics, now we can go one step further to infer an optimal DFA by merging similar states.In the field of grammar inference, obtaining the smallest DFA consistent with the labelled training set has been proved to be an NP-complete problem by Gold, and there are many exact or approximate algorithms to solve this problem.

    In fact, the complexity of protocol state machine inference is always higher than general grammar inference, because the amount of protocol messages is larger and the protocol logic is more complex.Therefore, in this paper, we adopt an approximate algorithm, EDSM, to deal with the state merging of unknown protocol APTAs.The performances of EDSM [33] and Exbar are compared and analyzed in Section 4.3.

    The EDSM algorithm is achieved in the red-blue frame, which is a directed graph with the following properties:

    (1) All nodes in the graph are labelled with red, blue or unmarked;

    (2) The initial root node is marked with red, and its children are marked with blue;

    (3) Each red node’s non-red children are marked with blue;

    (4) Each unmarked blue node is the root of a tree;

    EDSM is based on a greedy strategy.It will calculate all scores of red and blue node pairs using state labels.If there exists a blue node that cannot be merged with any other red nodes,we promote it to be red.The red node and blue node with the highest score will be merged.In the process of protocol state machine reversal, we use the Breadth-First Search (BFS) strategy to modify the EDSM algorithm in order to complete the state merging of states in same depth with same behavior.The modified EDSM algorithm is shown in Algorithm 2.

    ?

    There are two places reflecting the idea of breadth-first search.The first is the selection of blue nodes to generate the candidate state merging set; and the second is the selection of promotable blue nodes.The advantage of using breadth-first search is that it can search similar states in different paths preferentially to avoid generating too many branches in the final state machine.

    In order to obtain an efficient and reliable result, the focus of our algorithm is to design a reasonable scoring mechanism.In this paper, we use the state labeling method discussed in Section 3.1 to solve this problem.The scoring algorithm is shown in Algorithm 3.

    Algorithm 3:Try_Merging Input red node r, blue node b Merge score = 0 if label (r.A) = label (b.A) and label (r.R) = label (b.R)merge_score + 1 if label (r.O) = label(b.O) or r.O.second != b.O.second merge score + 1 else return - 1 for each message type m in M do if exist (r.child (m)) and exist (b.child (m))Repeat the above operations return merge_score

    4 Experiment Results and Analysis

    We test our implementation of the proposed method on a number of stateful binary protocols(including transport layer protocol TCP (Transmission Control Protocol) and two application layer protocols SMB and DHCP (Dynamic Host Configuration Protocol)).Since the completeness and validity of the training set have a crucial impact on the quality of the state machine, and the inferred FSM cannot identify the packet not included in the training set, we try to collect as many complete protocol sessions as possible.

    4.1 State Machine Inference

    In this section, we apply our method to one transport layer protocol (TCP) and two application layer protocols (SMB, DHCP).It creates state machines ranged from 4 to 12 states for each protocol.

    TCP.It is an important transport layer protocol which is object oriented, reliable and based on stream of bytes.In our experiments, we connect our terminal with a router, and run Wireshark(a well-known network packet analysis software) to sniff TCP network traffic.Then, the collected traces are fed to the implemented system, and the obtained state machine is shown in Fig.2.

    Figure 2:Result of TCP state machine

    The three-way handshake of TCP related to State 2 is obviously visible as well as the four waves of TCP leading to State 5.The network data transmit between server and client in State 2.Besides, we can see the “RST” and “RST-ACK” packets in State 4 which are always associated with abnormal connections in the real world.

    SMB.As an instance of a relatively elaborate, stateful, binary protocol, we chose SMB to test this method.In the experiment, version 4.1.14 of the Samba software suite has been adopted to tracked the SMB daemon when this client is used to look through directories, carry out typical operations like reading, writing, and deleting directories and files.In this way, a set of 445 recorded sessions is collected.Fig.4 shows the protocol state machine inferred from this SMB data set.

    In Fig.3, we can see the obvious login sequence leading to State 3.When the “DFS” option is enabled, the client first attaches the “IPC$” share to achieve a “DFS” referral of the requested share.Otherwise, the client immediately enters the requested share of State 6, where most file system operations (including opening, reading, writing, or closing) are available.

    Figure 3:Result of SMB state machine

    DHCP.Dynamic host configuration protocol is an important network protocol in the local area network which mainly automatically assigns IP addresses for Internet service providers.In our experiment, we have configured a DHCP server in our local area network and traced the DHCP traffic.168 DHCP sessions are collected.Fig.4 shows the DHCP result state machine.

    Figure 4:Result of DHCP state machine

    There are two login sequences (0 ->1 ->2 and 0 ->2) leading to State 2 in DHCP state machine.Path 0 ->1 ->2 happens when the client logins the server for the first time, and path 0 ->2 occurs when the client reboots.

    4.2 Quality of Protocol State Machine

    To test the performance of this system, we use the soundness and completeness to evaluate the quality of the state machines inferred from our implementation.

    4.2.1 State Machine Completeness

    Generally, we consider a state machine is complete enough if it accepts all valid sessions, and we use the recall rate to measure the completeness of that state machine.There are two methods to obtain test samples:by net trace which reflects the overall completeness of the state machine, or by constructing a reference state machine using protocol specifications which reflects the structural completeness of the state machine.Tabs.1 and 2 show the results of each method where “IM-”refers to the relative inferred state machines and “RM-” the reference state machines.

    Table 1:Overall completeness testing of inferred state machines

    Table 2:Structural completeness testing of inferred state machines

    From Tabs.1 and 2, we can see that the recalls of both overall completeness and structural completeness are high enough closing to 100% which demonstrate that our method is useful to accept valid protocol sessions.Besides, overall completeness is a little higher than structural completeness.It is understandable that the test samples produced by the reference state machines are more complete than those by net-traces, and the test samples we used to construct the state machine are collected by net-traces.

    4.2.2 State Machine Soundness

    We consider a state machine is sound enough if it rejects all invalid protocol sessions, and we use accuracy to measure the soundness of the state machine.The result is shown in Tab.3,where we can conclude that the state machine we inferred are not over-generalized, which means they can reject invalid sessions.

    Table 3:Structural completeness testing for state machine

    4.3 Comparative Evaluation

    With merely positive examples, there exist other approaches to implement the automation inferring mission.One popular approach is the Exbar algorithm, which is an exact algorithm to infer the minimal consistent DFA.To compare the performance of the proposed method with the Exbar algorithm, we calculate the precision and recall at different numbers of SMB protocol training samples for both two algorithms.The results are shown in Figs.5 and 6.

    Figure 5:Recall of SMB state machine in different scales of training samples

    Figure 6:Precision of SMB in different scales of training samples

    Two useful conclusions could be drawn from the results.

    1)About the impact of the number of training samples.The number of training samples has a relatively large influence on the recall of these two algorithms, and the recall is rising along with the increase of training samples.Exbar performs slightly better than EDSM in recall.By using an improved state labeling algorithm in our system, the accuracy of the two algorithms reaches 100%at the number of different training samples, which avoids merging invalid state pairs.So, the state machine we inferred is not over generalized, and it is unlikely to generate protocol sessions that cannot be accepted by the reference state machine.

    2)About the data processing capacity.When the number of training samples exceeds 50, Exbar will not run.EDSM is an approximate algorithm that can ensure inferring state machine in polynomial time.However, Exbar is an exact algorithm using backtracking search strategy, and tries to find an optimal result with the least states in an almost exhaustive manner.Each time Exbar is called recursively, it only tries to merge a pair of states or promote a blue node to red,and the depth of the search will continue to increase.Once a search fails, Exbar algorithm will return to the last position and choose another search direction, which may easily fall into infinite backtracking and cannot exit.Fig.7 depicts the search path of Exbar and EDSM when inferring state machines.

    Figure 7:Search direction of Exbar and EDSM

    In order to compare the time consumption of the two algorithms more directly, we record their time consumption and search times under different numbers of SMB training samples (see Tab.4).It can be seen from the results that the running time of the two algorithms grows with the increase of the number of training samples.But for each test set, EDSM takes less time than Exbar.When the sample number in the test set is equal to or greater than 100, Exbar would fail to give a result while EDSM just takes a little longer time to display the results.The reason for this phenomenon can be explained by the difference in computational complexity between Exbar and EDSM.As an approximation algorithm, the time complexity of the EDSM algorithm is much lower than that of Exbar, which makes it more effective when the data size increases.Therefore,the EDSM algorithm has a better performance in the face of large data and higher real-time requirements.

    Table 4:Time consuming between Exbar and EDSM

    5 Conclusion

    This paper proposes a valid approach to refer the state machine of unknown binary protocols from network traces, especially when the training samples are large.Firstly, we improve the substitution matrix of multiple sequence alignments to identify variable length fields and remove them.Then, we extract state relevant fields by analyzing their statistical characteristics.To infer a minimal DFA consistent with training samples, we optimize a state labeling algorithm and apply an optimized EDSM algorithm to complete the final state merge.

    In order to validate the method implemented in this paper, we test our system on three typical binary protocols:TCP, SMB and DHCP.The experimental results show that the state machine we inferred is reliable in terms of both completeness and soundness.Compared with the Exbar algorithm, the experiment results show that when Exbar totally fails, our system has better performances in processing a large number of training samples.In some application environments, such as instruction detection, malicious traffic recognition and other network protection mechanisms,the ability to handle with big data provided by EDSM algorithm will be more practical.

    In the future, the method for selecting an appropriate algorithm to accomplish the state machine reconstructing needs to be studied in depth.As this article proves, EDSM performs better on large data, but has a slightly lower recall rate than Exbar.We will continue working on this topic and find an automatic mechanism to utilize the proper algorithm to obtain better protocol reverse results.Besides, combined with the present method, the Markov Model could also be considered to deal with the packet missing problem in the future.

    Acknowledgement:We would like to express our gratitude to all those who gave supports for work of this paper, and also devote our great thanks to all the anonymous reviewers of this paper,whose precious comments help promote the quality of this paper a lot.

    Funding Statement:This work is supported by the National Natural Science Foundation of China (Grant Number:61471141, 61361166006, 61301099), Basic Research Project of Shenzhen,China (Grant Number:JCYJ20150513151706561),and National Defense Basic Scientific Research Program of China (Grant Number:JCKY2018603B006).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    色老头精品视频在线观看| 我要看黄色一级片免费的| 我的亚洲天堂| 女人爽到高潮嗷嗷叫在线视频| 久久精品亚洲熟妇少妇任你| 天堂俺去俺来也www色官网| 亚洲全国av大片| 在线观看人妻少妇| 亚洲国产精品999| 国产免费现黄频在线看| 日韩大码丰满熟妇| 少妇的丰满在线观看| av天堂久久9| 亚洲精品av麻豆狂野| 亚洲av成人一区二区三| 麻豆乱淫一区二区| 三上悠亚av全集在线观看| 一个人免费看片子| 亚洲精品国产精品久久久不卡| 亚洲欧美精品自产自拍| 久久久国产成人免费| 久久久国产一区二区| 看免费av毛片| a 毛片基地| 国产成人a∨麻豆精品| 欧美精品啪啪一区二区三区 | 老熟妇仑乱视频hdxx| 国产亚洲av片在线观看秒播厂| 久久精品国产亚洲av香蕉五月 | 纯流量卡能插随身wifi吗| 精品亚洲成a人片在线观看| 国产精品免费视频内射| 亚洲精品国产av蜜桃| 成年av动漫网址| 国产真人三级小视频在线观看| 一区二区日韩欧美中文字幕| 欧美午夜高清在线| 久久精品国产亚洲av高清一级| 这个男人来自地球电影免费观看| 国产精品亚洲av一区麻豆| 国产精品一区二区在线不卡| 欧美性长视频在线观看| 婷婷色av中文字幕| 一区二区日韩欧美中文字幕| 中文字幕人妻丝袜制服| 99热国产这里只有精品6| 精品一区二区三区四区五区乱码| 亚洲欧美日韩高清在线视频 | 国产99久久九九免费精品| 精品久久久精品久久久| 亚洲全国av大片| 人妻 亚洲 视频| 亚洲中文av在线| 亚洲黑人精品在线| 成人国产av品久久久| av又黄又爽大尺度在线免费看| 男女国产视频网站| 超碰成人久久| 亚洲全国av大片| 久久亚洲精品不卡| 黄色视频不卡| 最近最新免费中文字幕在线| 国产精品亚洲av一区麻豆| 久久热在线av| 老司机亚洲免费影院| 国产亚洲av高清不卡| 黄色毛片三级朝国网站| 又紧又爽又黄一区二区| 午夜影院在线不卡| 视频区欧美日本亚洲| 天天操日日干夜夜撸| 99热国产这里只有精品6| 精品一区在线观看国产| 不卡av一区二区三区| 国产一级毛片在线| av视频免费观看在线观看| 黄色视频不卡| 久久精品国产亚洲av高清一级| 久久香蕉激情| 亚洲av电影在线观看一区二区三区| 搡老熟女国产l中国老女人| 999久久久精品免费观看国产| 欧美97在线视频| 亚洲中文av在线| 亚洲精品久久久久久婷婷小说| 亚洲免费av在线视频| 91大片在线观看| netflix在线观看网站| 不卡一级毛片| av天堂在线播放| 日韩精品免费视频一区二区三区| 老熟女久久久| 少妇粗大呻吟视频| 国产日韩欧美视频二区| 国产1区2区3区精品| 50天的宝宝边吃奶边哭怎么回事| 丰满人妻熟妇乱又伦精品不卡| www.熟女人妻精品国产| 久久久精品国产亚洲av高清涩受| 久久这里只有精品19| av片东京热男人的天堂| 色婷婷av一区二区三区视频| 99热国产这里只有精品6| 人人妻人人澡人人看| 中文字幕人妻熟女乱码| 女警被强在线播放| 一本色道久久久久久精品综合| 777米奇影视久久| 午夜福利视频精品| 欧美 日韩 精品 国产| 亚洲第一青青草原| 免费观看av网站的网址| 香蕉国产在线看| 久久性视频一级片| 亚洲精品第二区| 91精品伊人久久大香线蕉| 午夜成年电影在线免费观看| 国产精品偷伦视频观看了| 国产av又大| 三级毛片av免费| 欧美精品一区二区免费开放| 欧美精品一区二区免费开放| av福利片在线| 亚洲国产欧美一区二区综合| 色精品久久人妻99蜜桃| 大香蕉久久成人网| 亚洲色图 男人天堂 中文字幕| 日韩有码中文字幕| 制服人妻中文乱码| 久久精品国产综合久久久| 国产精品一二三区在线看| 国产xxxxx性猛交| 亚洲九九香蕉| 精品国产一区二区久久| 免费一级毛片在线播放高清视频 | 国产片内射在线| 老司机影院成人| 午夜免费成人在线视频| 在线看a的网站| 首页视频小说图片口味搜索| 女人爽到高潮嗷嗷叫在线视频| 亚洲欧美精品综合一区二区三区| 日韩精品免费视频一区二区三区| 亚洲国产欧美一区二区综合| 国产男女内射视频| 在线十欧美十亚洲十日本专区| 人人妻,人人澡人人爽秒播| 欧美激情极品国产一区二区三区| 精品久久久久久电影网| 美国免费a级毛片| 午夜精品国产一区二区电影| 女人久久www免费人成看片| 日本av免费视频播放| 夜夜夜夜夜久久久久| 9色porny在线观看| 国产高清videossex| 午夜福利一区二区在线看| 国产精品久久久人人做人人爽| 青春草视频在线免费观看| 精品人妻1区二区| 亚洲精品成人av观看孕妇| 水蜜桃什么品种好| 搡老岳熟女国产| 丝袜美腿诱惑在线| 日韩制服骚丝袜av| 久久精品亚洲熟妇少妇任你| 青春草视频在线免费观看| 欧美日韩亚洲综合一区二区三区_| 欧美亚洲 丝袜 人妻 在线| 国产成人啪精品午夜网站| 欧美激情久久久久久爽电影 | 动漫黄色视频在线观看| 久久亚洲国产成人精品v| av网站免费在线观看视频| av网站在线播放免费| 美女国产高潮福利片在线看| av欧美777| 亚洲一码二码三码区别大吗| 50天的宝宝边吃奶边哭怎么回事| 国产真人三级小视频在线观看| 这个男人来自地球电影免费观看| 精品久久久精品久久久| 午夜福利一区二区在线看| 在线观看免费午夜福利视频| 日韩 亚洲 欧美在线| 国产在线免费精品| 一本色道久久久久久精品综合| 久久综合国产亚洲精品| 天天躁日日躁夜夜躁夜夜| 亚洲国产精品成人久久小说| 精品久久久精品久久久| 黄色视频在线播放观看不卡| 亚洲中文日韩欧美视频| 中文精品一卡2卡3卡4更新| 亚洲av电影在线观看一区二区三区| 一级毛片电影观看| 9色porny在线观看| 国产免费一区二区三区四区乱码| 水蜜桃什么品种好| 国产亚洲一区二区精品| 国产成人欧美| 人人妻,人人澡人人爽秒播| 他把我摸到了高潮在线观看 | 91精品国产国语对白视频| 免费日韩欧美在线观看| 丰满饥渴人妻一区二区三| 国产精品麻豆人妻色哟哟久久| 欧美97在线视频| 亚洲av日韩在线播放| 中文字幕色久视频| 欧美性长视频在线观看| 久久久国产欧美日韩av| 桃红色精品国产亚洲av| 王馨瑶露胸无遮挡在线观看| 18禁国产床啪视频网站| 免费不卡黄色视频| 久久久久国产精品人妻一区二区| 美女高潮喷水抽搐中文字幕| 男人操女人黄网站| 欧美精品av麻豆av| 国产亚洲av高清不卡| 男女床上黄色一级片免费看| 国产av又大| 中文字幕av电影在线播放| 老熟女久久久| 国产成人精品久久二区二区91| 国产成人啪精品午夜网站| 精品少妇一区二区三区视频日本电影| 亚洲精品美女久久久久99蜜臀| 免费观看a级毛片全部| 啦啦啦中文免费视频观看日本| av免费在线观看网站| 亚洲精品一区蜜桃| 国产在线免费精品| 老鸭窝网址在线观看| 大片电影免费在线观看免费| 动漫黄色视频在线观看| 亚洲精品美女久久av网站| 日韩大码丰满熟妇| 免费一级毛片在线播放高清视频 | 啦啦啦在线免费观看视频4| 12—13女人毛片做爰片一| 亚洲精品美女久久av网站| 黄色片一级片一级黄色片| 国产亚洲精品一区二区www | 成人影院久久| 自线自在国产av| 精品国产乱码久久久久久男人| 婷婷丁香在线五月| 国产精品一区二区精品视频观看| av有码第一页| 老司机午夜福利在线观看视频 | 9191精品国产免费久久| 在线观看一区二区三区激情| 最近最新免费中文字幕在线| 青春草亚洲视频在线观看| 久久久久久人人人人人| 一个人免费在线观看的高清视频 | 咕卡用的链子| h视频一区二区三区| 国产又色又爽无遮挡免| 久久久国产成人免费| 女人爽到高潮嗷嗷叫在线视频| 青春草视频在线免费观看| 欧美亚洲 丝袜 人妻 在线| 日本av手机在线免费观看| 欧美性长视频在线观看| 99精品欧美一区二区三区四区| bbb黄色大片| 搡老熟女国产l中国老女人| 成年动漫av网址| 丝袜人妻中文字幕| 精品久久久精品久久久| 1024香蕉在线观看| 久久九九热精品免费| 桃红色精品国产亚洲av| 可以免费在线观看a视频的电影网站| 777久久人妻少妇嫩草av网站| 18禁国产床啪视频网站| 一本—道久久a久久精品蜜桃钙片| 国产精品久久久久成人av| 日韩电影二区| 色播在线永久视频| 捣出白浆h1v1| 高清视频免费观看一区二区| cao死你这个sao货| av国产精品久久久久影院| 人人妻,人人澡人人爽秒播| 亚洲欧美一区二区三区黑人| 日韩一卡2卡3卡4卡2021年| 国产亚洲精品一区二区www | a级毛片在线看网站| 9色porny在线观看| 女人被躁到高潮嗷嗷叫费观| 国产免费福利视频在线观看| 搡老乐熟女国产| 自线自在国产av| 高清黄色对白视频在线免费看| 亚洲成国产人片在线观看| 又紧又爽又黄一区二区| 国产av精品麻豆| 中文字幕人妻熟女乱码| 一本大道久久a久久精品| 久久精品国产亚洲av香蕉五月 | 色视频在线一区二区三区| 免费日韩欧美在线观看| 国产主播在线观看一区二区| 波多野结衣一区麻豆| 日韩免费高清中文字幕av| 亚洲精品中文字幕在线视频| 国产有黄有色有爽视频| 亚洲精品国产色婷婷电影| 女人被躁到高潮嗷嗷叫费观| 国产精品香港三级国产av潘金莲| 亚洲国产日韩一区二区| 桃红色精品国产亚洲av| 搡老乐熟女国产| 欧美性长视频在线观看| 美国免费a级毛片| 国产成人免费无遮挡视频| 精品少妇一区二区三区视频日本电影| 天天添夜夜摸| 久久热在线av| 亚洲欧美日韩另类电影网站| 亚洲性夜色夜夜综合| 久久久国产一区二区| 女性被躁到高潮视频| 两个人免费观看高清视频| 91麻豆av在线| 亚洲伊人色综图| 国产欧美日韩综合在线一区二区| 国产精品免费视频内射| 80岁老熟妇乱子伦牲交| 十八禁人妻一区二区| 王馨瑶露胸无遮挡在线观看| 欧美黑人欧美精品刺激| 日韩大片免费观看网站| 每晚都被弄得嗷嗷叫到高潮| 国产三级黄色录像| 国产高清国产精品国产三级| 在线观看人妻少妇| 国产av又大| 我要看黄色一级片免费的| 欧美黑人欧美精品刺激| 午夜激情久久久久久久| 搡老熟女国产l中国老女人| 久久久欧美国产精品| 亚洲精品自拍成人| 国产在视频线精品| 99精品欧美一区二区三区四区| 91麻豆av在线| 三上悠亚av全集在线观看| 国产免费现黄频在线看| 国产精品亚洲av一区麻豆| 国产亚洲一区二区精品| 精品福利永久在线观看| 王馨瑶露胸无遮挡在线观看| 在线观看免费视频网站a站| 亚洲性夜色夜夜综合| 中文字幕另类日韩欧美亚洲嫩草| 人妻久久中文字幕网| 丝袜脚勾引网站| 欧美+亚洲+日韩+国产| 亚洲欧美一区二区三区黑人| 国产成人a∨麻豆精品| 两个人免费观看高清视频| 一区二区三区精品91| 久久国产精品影院| 满18在线观看网站| 99国产精品99久久久久| 国产av精品麻豆| 国产成人av激情在线播放| 亚洲av美国av| 丰满人妻熟妇乱又伦精品不卡| 十八禁高潮呻吟视频| 国产极品粉嫩免费观看在线| 午夜视频精品福利| 亚洲五月婷婷丁香| 不卡一级毛片| 在线观看免费日韩欧美大片| 少妇 在线观看| 一个人免费在线观看的高清视频 | 亚洲成人手机| 国产成人系列免费观看| 99香蕉大伊视频| 欧美日韩精品网址| 91av网站免费观看| 精品国产国语对白av| 国产亚洲av片在线观看秒播厂| 久久精品亚洲av国产电影网| 久久精品亚洲熟妇少妇任你| 亚洲人成77777在线视频| 久久国产精品人妻蜜桃| 美女中出高潮动态图| 一区在线观看完整版| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲国产欧美日韩在线播放| 中文欧美无线码| 色婷婷久久久亚洲欧美| 啦啦啦 在线观看视频| 婷婷丁香在线五月| 国产精品99久久99久久久不卡| 欧美激情极品国产一区二区三区| 午夜老司机福利片| 国产成人欧美| 18在线观看网站| 91精品国产国语对白视频| 涩涩av久久男人的天堂| 如日韩欧美国产精品一区二区三区| 精品福利观看| 狠狠狠狠99中文字幕| 午夜日韩欧美国产| 人人妻人人爽人人添夜夜欢视频| svipshipincom国产片| 女人高潮潮喷娇喘18禁视频| 69精品国产乱码久久久| 侵犯人妻中文字幕一二三四区| 亚洲精品中文字幕一二三四区 | 18禁国产床啪视频网站| 久久久国产一区二区| 新久久久久国产一级毛片| 日本一区二区免费在线视频| 一区二区三区激情视频| 亚洲伊人久久精品综合| 亚洲成人免费电影在线观看| av超薄肉色丝袜交足视频| 欧美精品啪啪一区二区三区 | 国产成人系列免费观看| 青草久久国产| 欧美日韩av久久| 大陆偷拍与自拍| 精品熟女少妇八av免费久了| 色播在线永久视频| 日本黄色日本黄色录像| 一级片'在线观看视频| 日本五十路高清| 后天国语完整版免费观看| 国产日韩欧美视频二区| 男女下面插进去视频免费观看| 丰满少妇做爰视频| 一个人免费在线观看的高清视频 | 丰满少妇做爰视频| 少妇被粗大的猛进出69影院| 色综合欧美亚洲国产小说| 每晚都被弄得嗷嗷叫到高潮| 麻豆av在线久日| 在线 av 中文字幕| 99re6热这里在线精品视频| 夜夜夜夜夜久久久久| 国产欧美日韩一区二区三区在线| 亚洲色图 男人天堂 中文字幕| 美国免费a级毛片| 性高湖久久久久久久久免费观看| av一本久久久久| 老熟女久久久| 汤姆久久久久久久影院中文字幕| 免费日韩欧美在线观看| 男女下面插进去视频免费观看| 日韩免费高清中文字幕av| 俄罗斯特黄特色一大片| netflix在线观看网站| 岛国毛片在线播放| 精品国内亚洲2022精品成人 | 久久精品熟女亚洲av麻豆精品| 久久女婷五月综合色啪小说| 午夜老司机福利片| 久久久精品94久久精品| 国产一级毛片在线| 午夜福利在线免费观看网站| 各种免费的搞黄视频| 妹子高潮喷水视频| 久久久精品免费免费高清| 国产av精品麻豆| 男女高潮啪啪啪动态图| 亚洲欧美清纯卡通| 国产淫语在线视频| 肉色欧美久久久久久久蜜桃| 十分钟在线观看高清视频www| 中文字幕高清在线视频| 丁香六月天网| 又大又爽又粗| 亚洲精品av麻豆狂野| 国产亚洲av片在线观看秒播厂| 欧美日韩成人在线一区二区| 欧美激情久久久久久爽电影 | 69av精品久久久久久 | 男人操女人黄网站| 人人妻人人添人人爽欧美一区卜| 国产精品麻豆人妻色哟哟久久| 久久久久国内视频| 久久人人爽人人片av| 国产精品 国内视频| 老熟妇乱子伦视频在线观看 | 19禁男女啪啪无遮挡网站| 黄色怎么调成土黄色| 99精品欧美一区二区三区四区| 亚洲国产精品一区三区| 亚洲精品成人av观看孕妇| av网站免费在线观看视频| 夫妻午夜视频| 天堂俺去俺来也www色官网| 丝袜人妻中文字幕| 免费一级毛片在线播放高清视频 | 久久亚洲精品不卡| 欧美黄色淫秽网站| 国产亚洲精品第一综合不卡| 69精品国产乱码久久久| 在线观看舔阴道视频| 亚洲性夜色夜夜综合| 大片免费播放器 马上看| 美女高潮到喷水免费观看| 啦啦啦中文免费视频观看日本| 欧美97在线视频| 国产成人欧美在线观看 | 久久毛片免费看一区二区三区| 久久久久国产一级毛片高清牌| 久久久久久久大尺度免费视频| 国产色视频综合| 久久国产精品影院| 一级,二级,三级黄色视频| 久久国产精品影院| 精品久久久久久电影网| 一个人免费看片子| 黄色a级毛片大全视频| 美女高潮到喷水免费观看| 国产99久久九九免费精品| 亚洲国产精品一区二区三区在线| 欧美日韩av久久| a级毛片在线看网站| 人妻人人澡人人爽人人| av免费在线观看网站| 国产日韩欧美亚洲二区| 视频在线观看一区二区三区| 亚洲精品国产一区二区精华液| 亚洲精品在线美女| 狠狠婷婷综合久久久久久88av| 欧美久久黑人一区二区| 欧美精品高潮呻吟av久久| 国产精品久久久久久精品古装| 亚洲国产精品999| 夜夜夜夜夜久久久久| 男人舔女人的私密视频| 视频在线观看一区二区三区| 青青草视频在线视频观看| 丝袜喷水一区| av福利片在线| 久热爱精品视频在线9| 亚洲五月婷婷丁香| 色婷婷久久久亚洲欧美| 国产一区二区激情短视频 | 曰老女人黄片| 亚洲中文av在线| 中文字幕高清在线视频| 亚洲精品粉嫩美女一区| 日日夜夜操网爽| 捣出白浆h1v1| 黄色a级毛片大全视频| 成年动漫av网址| 91大片在线观看| 国产欧美日韩一区二区三 | 五月天丁香电影| 亚洲欧美一区二区三区黑人| 欧美精品亚洲一区二区| 人成视频在线观看免费观看| www日本在线高清视频| 天堂中文最新版在线下载| 午夜91福利影院| 女人久久www免费人成看片| 午夜免费鲁丝| 美女高潮到喷水免费观看| 国产精品一区二区在线不卡| 精品一品国产午夜福利视频| 日本撒尿小便嘘嘘汇集6| 丝袜在线中文字幕| 欧美日韩成人在线一区二区| 97精品久久久久久久久久精品| 在线观看免费日韩欧美大片| 国产欧美日韩一区二区三区在线| 欧美中文综合在线视频| www.999成人在线观看| 色婷婷久久久亚洲欧美| 久久天躁狠狠躁夜夜2o2o| 黄网站色视频无遮挡免费观看| 久久久久国内视频| 国产欧美日韩一区二区三区在线| 首页视频小说图片口味搜索| 国产欧美亚洲国产| 国产亚洲精品一区二区www | 12—13女人毛片做爰片一| 美女扒开内裤让男人捅视频| 蜜桃在线观看..| 亚洲欧美清纯卡通| 最近最新免费中文字幕在线| 午夜福利视频在线观看免费| 亚洲国产中文字幕在线视频| 美女高潮喷水抽搐中文字幕| 欧美国产精品va在线观看不卡| 国产黄色免费在线视频| 91成人精品电影| 欧美国产精品一级二级三级| 国产有黄有色有爽视频| 亚洲精品成人av观看孕妇| 中文字幕色久视频| 国产伦理片在线播放av一区| 美女国产高潮福利片在线看| 国产精品秋霞免费鲁丝片| 久久久精品免费免费高清| 一本综合久久免费| 亚洲av国产av综合av卡| 搡老岳熟女国产| 亚洲国产精品一区三区| 亚洲人成77777在线视频| 久久久精品区二区三区| 日本撒尿小便嘘嘘汇集6| 国产一区二区三区综合在线观看|