• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    2021-12-16 06:37:50MamdouhAleneziAbhishekKumarPandeyRichaVermaMohdFaizanShaliniChandraAlkaAgrawalRajeevKumarandRaeesAhmadKhan
    Computers Materials&Continua 2021年3期

    Mamdouh Alenezi,Abhishek Kumar Pandey, Richa Verma,Mohd Faizan,Shalini Chandra,Alka Agrawal, Rajeev Kumar,4,*and Raees Ahmad Khan

    1College of Computer and Information Sciences, Prince Sultan University, Saudi Arabia

    2Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh,India

    3Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh,India

    4Department of Computer Application, Shri Ramswaroop Memorial University, Lucknow, Uttar Pradesh, India

    Abstract: Design architecture is the edifice that strengthens the functionalities as well as the security of web applications.In order to facilitate architectural security from the web application’s design phase itself,practitioners are now adopting the novel mechanism of security tactics.With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions.The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order preference by similarity ideal solution(fuzzy TOPSIS).To establish the efficacy of this methodology, the results are obtained after the evaluation have been tested on fifteen different web application projects (Online Quiz competition,Entrance Test, and others) of the Babasaheb Bhimrao Ambedkar University,Lucknow, India.The tabulated outcomes demonstrate that the methodology of the Multi-Level Fuzzy Hybrid system is highly effective in providing accurate estimation for strengthening the security of web applications.The proposed study will help experts and developers in developing and managing security from any web application design phase for better accuracy and higher security.

    Keywords: Web application;software security;security tactics;fuzzy AHP;fuzzy TOPSIS

    1 Introduction

    The digital revolution has been the harbinger of instant connectivity and easy access at viable costs and time investments.Hence,digitization in every business is not only a present-day necessity but also the best available recourse to enhance revenue generation for any business.With more and more businesses becoming digitalized, web applications at present are being designed to meet the demand and structural needs of businesses through their secured architecture [1].However, the increasing reliance on web applications has also led to dubious growth in the instances of data breach incidents.A report on cybersecurity assessment stated that nearly 54%of organizations accepted that they had been affected by at least a single breach last year[2].The report also states that the ratio of this data could be even higher as many companies did not report the breaches.Most companies believe that such a disclosure could affect their clients’ trust and lead to loss of revenue, in addition to marring their brand image.Another report on failures of airplanes stated that British Airways was left stranded with its web application problem in 2019.That failure led to the cancellation of about a 100 of its flights while disrupting the schedule of another 200 flights.

    Such a scenario calls for foolproof mechanism to develop and maintain web applications with enhanced security to safeguard the data of the users and the organizations.The present scenario needs the design of secure web applications that are immune to infringements.Nevertheless, ensuring and maintaining an invincible security mechanism is a challenging and complex job, more so because of the multifarious aspects associated with security features [3].Summarizing these factors to manage security in web applications is a critical task Therefore, for achieving this goal, the developers are focusing on the development of secure software from the design phase of the web application itself [4].In the present context, the developers are trying to add security attributes and measure possible breach threats in a web application at the design phase, and thereby, develop the web application according to the constructed security standards and model from the design phase.

    The defects in the web applications that gives opportunity to the attackers to exploit applications are called vulnerabilities.Various security experts and advisors believe that a tested and verified security strategy can provide a good environment for security maintenance and can also reduce the possibilities of vulnerabilities.Several research studies have focused on assessing and strengthening the security from the web application’s development design phase itself.Alenezi et al.[5] have proposed the novel fuzzy AHP-TOPSIS based prioritization concept that enlists security guidelines and strategies.The proposed concept is an effective approach for summarizing various security attributes.The cited study discusses various factors that affects the security of a web application and then assess those factors through a scientific methodology.

    The authors of this study have also summarized various security attributes or factors that affect security in web applications.Thereafter,a hierarchical model of factors has been constructed for applying the fuzzy AHP-TOPSIS methodology.The model helps in finding and assessing the priority of various factors.Such an evaluation process provides a framework of well-defined security attributes,thereby helping the practitioners to inculcate more efficient security policies and strategies.There are various multi-criteria decision making(MCDM) techniques available for solving multiple decision problems.Therefore, finding an appropriate method for evaluation requires a judicious comparison of different techniques.A number of studies conducted in this regard suggest that fuzzy AHP based MCDM approaches are comparatively more effective and accurate [6] than the other available MCDM approaches.

    In particular,the reference to Dr.Garg’s study becomes notable in this league.The author’s study enlists and defines some implications of the AHP methodology [7].Therefore, to tackle these implications and barriers, we have added the fuzzy approach in the existing methodology to achieve better accuracy with fewer implications in our tabulations.Furthermore, in the context of analyzing security tactics, the selection of attributes or factors that are likely to be extremely vital components contributing to security is also a very critical task.Hence, to ensure precision in choosing the most determining attributes, this study uses the fuzzy AHP-TOPSIS technique.This technique uses aggregated pair-wise comparison matrices and fuzzification as well as the de-fuzzification process to evaluate the ranking of the criteria.

    The rest of this study is organized as follows: Second section describes the security tactics.The third section details the methodology.After the evaluations, the results have been tabulated in the fourth, fifth and sixth sections.The seventh section presents the discussion, and section eight concludes this study.

    2 Security Tactics for Secure Web Application

    The maintenance of the security of the web applications is an extremely challenging task that needs continuous efforts to keep them secure [8,9].Even a minor change in the web application’s structure and mechanism can render it vulnerable, endangering the users’ data.Thus, it is imperative to develop security tactics [10] for web applications that can be applied during the design phase of development and help in securing the application effectively.Security tactics is a significant tool that can help developers in designing exploitation-free web applications.Security tactics can best be explained as “a concept that provides a clear and effective path for addressing the needs and problems of security at the design level of the web application” [11,12].

    There are seven important and main categories for security tactics in web applications.These are

    Confidentiality, Availability, Testability, Scalability, Interoperability, Accountability, and Maintainability.After reviewing the existing literature available on these factors, the authors have constructed the hierarchy of factors, as shown in Fig.1.

    Figure 1: Tree structure of security factors

    Confidentiality:Confidentiality is a process of maintaining the secrecy of data or information[13].Web application’s confidentiality is the key factor that affects the security of web applications.Thus,by the very virtue of its need,confidentiality is an important attribute.

    Availability: Any data can only be useful if it is made available to the user at the required time.For instance, if at the time of extracting the required data, the search shows unable to fetch “error 404”, it would not only delay the outsourcing of crucial information but also stall the other related processes.Thus the factor of availability is an essential security tactic for a web application.However, the attackers are frequently targeting the availability of data to penetrate an organization or system [4].Hence,Availability Management becomes an imperative aspect right from the design phase of web application development as a security tactic.

    Testability:The testability of any web application is defined as its ability for testing its performance in an insecure attack situation.Testability is important for managing and validating the web application’s security at any certain point in time [5].

    Scalability:A functionality of any application that refers to its data adoption ability by its value growth within a particular timeframe is defined as scalability.For example, blockchain is used to carry financial transactional data and information, but currently, it is being utilized and developed [14] for healthcare data transactions that are larger and higher in volume.In terms of scalability, this change poses a great challenge[14]for the blockchain developers.If a web application is not scalable in terms of its design,then attackers can exploit the application very easily through buffer overflow and other such advanced cyberattacks [15].Thus,scalability becomes an integral aspect of security tactics.

    Interoperability: Compatibility of information format is a significant issue in web application development.Interoperability defines the factor or attribute of any web application that gives an additional quality to web applications in work with different non-similar data types or information formats [16].Interoperability also becomes a vital focus in security tactics because it can cause data error and run time error at any point in the web application process.

    Accountability: Web applications have many users that are responsible for data handling and security[17].For instance, in case of a bank application, the cashier, manager and front-end executives have their own data handling and alter rights.But all of them are working on the same application that has the same connectivity.Therefore to assure information security in such an application, it is important to assign answerability for every node (user) regarding its actions within the application [15].This type of answerability is called accountability and it is a vital component for maintaining security.

    Accessibility: Information access within a web application is a matter of rights and accessibility.Accessibility is a factor or functionality of web application that provides categorization [15] related to information read, write, and modify (r/w/m) actions in web application.Managing access to data is the most significant task for the developers because wrong access rights can cause serious data modification,breach, and expose threats.Accessibility is defined in a web application through the access control model.Access management is one of the key components of any security mechanism and is also an important part of security tactics in web applications.

    Apart from the factors mentioned above,the present study has also used some other alternatives to test the results obtained after using the fuzzy AHP method.To be specific,15 sensitive online web application projects of Babasaheb Bhimrao Ambedkar University, Lucknow, India, were chosen as the alternatives.These projects included the Online Quiz Competition, Entrance Test Application,etc.A brief enumeration on the same has been described in the subsequent sections of the paper.Tab.1 given below describes the various security factors and their contribution to security tactics for web applications.

    Integrating security from the design phase,with specific reference to the tactics specified above,can be an efficacious approach for producing highly secure web applications.Moreover,to analyze and validate the technique related to web application security proposed in our study,we have adopted a hybrid methodology of Analytical Hierarchy Process and TOPSIS along with a fuzzy set theory called the fuzzy-AHP-TOPSIS approach.This is an MCDM approach that is highly effective for prioritizing and ranking various attributes for different fields or topics.

    3 Methodology

    Implementing security at the design phase[18-20]can enhance the security of web applications at the performance stage.For achieving this goal,preparing security tactics factors became a vital premise of the present study [10].Furthermore, after successfully identifying the significant security tactics for web application security, the authors analyzed the impact and importance of these selected tactics.Evaluation of the significance of factors would be a useful reference for the experts and researchers in prioritizing the security tactics that need to be given more attention during web application development.For creating a priority list, we chose the most preferred methodology- the fuzzy-AHP-TOPSIS [21].This is an MCDM approach that gives effective results in a multi-criteria selection situation.A brief description of the adopted methodology is described below:

    Table 1: Key contributions of factors in security tactics concept

    Fuzzy AHP is a methodology that works on a tree-based structure through triangular fuzzy numbers(TFN) evaluation.Additionally, it creates pair-wise comparison matrices and then evaluates the assessment of these TFNs for developed hierarchy through selected tactics.The fuzzy AHP approach helped the authors to evaluate and analyze the importance of selected tactics for web application security.

    To conduct this analysis, the authors developed a hierarchy after examining the relevant research literature in this domain, assimilating experts’ opinions, and brainstorming.The authors chose 35 experts to analyze the value of specific factors through a questionnaire.We ensured that the panel of experts was a congregation of practitioners with enriched experience in the domain of web application and software development.The next step was to convert the original numbers given by the experts into TFN and prepare a comparison matrix.To make the analysis part simple and easy, this paper uses the TFN number that lies between 0 and 1 [22,23].Furthermore, the calculated values are described as 1, 2, 3…..9.Additionally,the membership function of TFN,M on F is derived from Eqs.(1)and(2):

    In the above Triangular Membership Function,l,mi and u represent the lower,middle,and upper limit for TF numbers.TFN’s are represented in Fig.2.

    In the above Fig.2, l, mi, u represent the Triangular Fuzzy Numbers.Further in this paper, Tab.2 describes the scale for ranking the factors’ score for evaluating the factors that affect quantitatively.For converting the numeric values into the triangular fuzzy number,the authors have used Eqs.(3)-(6).

    Figure 2: TFN

    Table 2: TFN scale

    In the above equations,lij represents the lower limit;mij represents middle values and uij represents the upper value.Eq.(3)shows the TFN.Eqs.(7)-(9)have been used for integrating the different TFN values in the evaluation process.

    After, evaluating all the TFN values, the analysts need to construct a n x n fuzzy comparison matrix through Eq.(10).

    In case of more than one preference being present in the evaluation process,the experts used Eq.(11)for calculating the average.

    After calculating the average preference in the next step of the calculation,the experts updated the fuzzy integrated comparison matrix for hierarchy prepared through the practitioners’ views.For calculating this step,the experts used the Eq.(12):

    In the next step,the specialists ascertain the geometric mean and fuzzy weights of the factor through the following(13).Further,for normalizing and concluding the evaluation,Eqs.(14)-(16)have been used.

    At the end of the fuzzy AHP method,the best non-fuzzy performance(BNP)value is assessed by Eq.(17).

    Thus by adopting the Fuzzy TOPSIS methodology, we obtained the ranking of different factors.Thereafter, to establish the authenticity of the results through a scientific approach, we employed the TOPSIS method.For attaining precise results, the TOPSIS technique utilizes fuzzy numbers rather than exact numbers to demonstrate the significance of factors.A step-by-step description of this methodology is described as follows:

    In the initial step of the estimation, this paper utilized fuzzy AHP for assessing the pertinent weights through Eqs.(1)-(17).After that, in the following stage, the specialists arranged a correlation lattice and chose a variable with the assistance of Tab.3 and Eq.(18).

    In the accompanying advances, the fuzzy framework is standardized through Eq.(19), and the grid is formed by utilizing Eq.(20).

    Table 3: Ranking scale

    After the assessment, the examiners used Eq.(21) to decide the assessed elective gap degree of factors.

    At the end of the evaluation process,through Eq.(21),the experts assigned a gap degree for factors and obtained the testing results that show the performance of selected alternatives based on evaluated results from the fuzzy AHP method.

    4 Results and Analysis

    The hierarchy image of factors (Fig.1) discusses different factors of security tactics for a web application.Based on Fig.1, the authors used the fuzzy AHP-TOPSIS methodology for ranking the factors.In Fig.1, the hierarchy has a total of seven factors that directly affect security tactics.To conduct this analysis, the authors compiled and processed the collated opinions from selected decision-makers and then, through the use of Eqs.(1)-(9) as well as according to Tab.1, converted the linguistic values into the TFN.The evaluated calculation is described in the following Tab.4.The authors have applied fuzzy AHP-TOPSIS methodology on all these seven factors and step-wise results are described in Tab.4.

    Table 4: Integrated fuzzy pair-wise comparison matrix

    Table 4 (continued).F1 F2 F3 F4 F5 F6 F7 F4(Scalability) 0.870,1.000,1.000 1.000,1.000,1.150 1.000,1.000,1.350 1.000,1.000,1.000 1.000,1.000,1.500 1.000,1.350,1.850 1.000,1.500,2.000 F5(Interoperability) 0.610,0.870,1.000 0.770,1.000,1.000 0.900,1.000,1.000 0.670,1.000,1.000 1.000,1.000,1.000 1.000,1.000,1.350 1.000,1.000,1.500 F6(Accountability) 0.510,0.710,0.870 0.650,0.770,1.000 0.670,1.000,1.000 0.550,0.770,1.000 0.770,1.000,1.000 1.000,1.000,1.000 1.000,1.000,1.150 F7(Accessibility) 0.440,0.570,0.810 0.550,0.770,1.000 0.620,0.900,1.000 0.500,0.670,1.000 0.670,1.000,1.000 0.900,1.000,1.000 1.000,1.000,1.000

    Tab.4 is the matrix of the comparison of various factors that directly affect information security according to the hierarchy depicted in Fig.1.After this step, the authors evaluated the weights and BNP values of various factors through the Eqs.(11)-(16) and (21) and tabulated their respective ranks as shown in Tab.5.

    Table 5: Weights of factors

    Furthermore, to analyze and test the effect of the factors, the authors selected the web applications of Babasaheb Bhimrao Ambedkar University, Lucknow, India.Fifteen sensitive online web application projects as alternatives were chosen to map a more comprehensive empirical base.These selected alternatives are highly sensitive like the Online Quiz Competition, Entrance Test Application, etc.In the following Tabs.6 and 7, the authors have described the subjective cognition results and their respective normalized fuzzy decision matrix through the Eqs.(18)-(21).

    After these evaluations, the authors mapped the normalized fuzzy matrix in Tab.7 through Eq.(20).Thereafter, the satisfaction degree as well as the gap degree of different alternatives among various factors through Eq.(21) was measured,as described in Tab.8.

    Table 6: Subjective cognition results

    Table 6 (continued).Alternatives/Factors F1 F2 F3 F4 F5 F6 F7 A14 7.7600,9.3800,10.000 7.0000,9.0000,10.000 7.0000,9.0000,10.0000 6.2400,8.2400,9.6200 5.0000,7.0000,9.0000 3.7600,5.7600,7.7600 6.2400,8.2400,9.6200 A15 1.0000,3.0000,5.0000 3.0000,5.0000,7.0000 7.0000,9.0000,10.0000 5.6200,7.6200,9.3100 7.0000,9.0000,10.0000 1.6200,3.6200,5.6200 5.6200,7.6200,9.3100

    Table 7: Weighted normalized fuzzy-decision matrix

    Table 7 (continued).Alternative/Factors F1 F2 F3 F4 F5 F6 F7 A11 0.01700,0.03100,0.04500 0.03300,0.04400,0.05400 0.06200,0.07100,0.07400 0.01600,0.02600,0.03700 0.01200,0.02100,0.02900 0.01500,0.02200,0.02800 0.01600,0.02600,0.03700 A12 0.04900,0.06300,0.07000 0.03300,0.04400,0.05400 0.06600,0.07400,0.07400 0.01600,0.02600,0.03700 0.01200,0.02100,0.02900 0.01000,0.01700,0.02400 0.01600,0.02600,0.03700 A13 0.00800,0.01000,0.01300 0.01100,0.01400,0.01600 0.01400,0.02000,0.02700 0.03600,0.04700,0.05200 0.01100,0.01800,0.02500 0.01200,0.02000,0.02800 0.03600,0.04700,0.05200 A14 0.01000,0.01300,0.01300 0.01200,0.01500,0.01700 0.02200,0.02900,0.03200 0.03200,0.04300,0.05000 0.01800,0.02500,0.03200 0.01500,0.02300,0.03100 0.03200,0.04300,0.05000 A15 0.00100,0.00400,0.00700 0.00500,0.00800,0.01200 0.02200,0.02900,0.03200 0.02900,0.03900,0.04800 0.02500,0.03200,0.03500 0.00700,0.01500,0.02300 0.02900,0.03900,0.04800

    Table 8: Closeness coefficients to aspired level among different alternatives

    Tab.8, above, illustrates the overall results of testing through fuzzy-TOPSIS as a satisfaction degree format.The results obtained from Tab.8 suggest that the gap degree between different alternatives is in good and very good condition.Therefore, authors can say that security tactics are in good and very good condition for the selected web applications.

    5 Sensitivity Analysis

    Sensitivity Analysis assess the impact of the set of independent variables over dependent variables under some definite conditions [24].Such an analysis establishes the robustness of tested and evaluated results,thereby authenticating the findings and making the results an accurate base for future research and reference.The given study analyzes the sensitivity of results through a method where value for one factor fluctuates by 0.05 at a particular time, while the values for the other factors remain the same [25].Moreover, when the value of one factor fluctuates by 0.05, at the same time, the remaining factors’values must be the same as that of the original values.This evaluation provides an indication of the performance in the results when the resources or valuation of factors are changed, and also depicts the impact of fluctuation value over the results.The final results of sensitivity analysis are shown in Tab.9 and Fig.3.

    Table 9: Sensitivity analysis

    It is evident from Fig.3 and Tab.9 that Alternative 1 has the best performance in each analysis for all the 15 alternatives.Further, fluctuation in results shows that results are sensitive to resource changes that are acceptable [26] in the evaluation process.As per the sensitivity analysis test, it is observed that the variation in overall results is negligible.

    Figure 3: Sensitivity analysis

    6 Comparison through Classical Approach

    The comparison of the results plays a vital role in the validation and corroboration of the research analysis.To apply this statement in this study, the authors compared the adopted fuzzy AHP-TOPSIS method with the classical AHP-TOPSIS approach.For accurate comparison analysis, we conducted an evaluation of selected techniques on 15 same alternatives for selected security tactics.The authors have calculated the Pearson-correlation coefficient value for both techniques because it is a widely used statistic that measures the degree of relationship between the two variables [27].The value is found to be 0.7681.The results of both the techniques clearly illustrate that the fuzzy-based approach provides better results as compared to the classical technique.In a nutshell, we can say that the adopted methodology is better and effective than the classical AHP-TOPSIS.A graphical and tabular description of comparative analysis is shown in Tab.10.

    Table 10: Comparison analysis

    ?

    7 Discussion

    Implementing architectural security in web applications was first proposed by Ryoo et al.[11]in 2016.However,even in the present context,the delivery of a technical product with an ideal security mechanism continues to be a challenge for the developers.In this league,maintaining security attributes from the design or development phase of software and web application [18,19] can produce effective security measures,thereby maintaining data security effectively and minimizing the risk of data breaches.Addressing this research quest, the present study provides an overview of the need for security tactics and evaluates various security tactics for web application security.In the proposed study, the researchers have used a hybrid fuzzy AHP-TOPSIS methodology for assessing the performance of web application insecurity tactics perspective.The key contributions of this research article are:

    ●The evaluation of security tactics for producing secure web applications is a domain for intensive research.This study used the hybrid fuzzy based AHP-TOPSIS methodology for quantitative assessment of various security tactics in web applications.

    ●Selected security tactics are extremely effective for web application security and their accurate implementation, according to the calculated results, can produce a highly secure web application.

    ●To establish the effectiveness of the proposed scheme,the evaluation is undertaken for 15 online web applications.

    ●Statistical validation has been done to establish the validity of the results;the correlation coefficient is computed and found to be 0.7681.

    ●The comparative analysis done in the study also corroborates that fuzzy-AHP TOPSIS is an efficient method.

    ●According to the calculated results, it is evident that confidentiality is the most prioritized factor amongst all the tactics.Developers need to focus on confidentiality first to design a secure web application.

    The pros and cons of the paper can be listed as-

    7.1 Pros-

    ●Assessment of web application security as per the security-tactics perspective is a way of evaluation of security tactics about a web application.

    ●A thorough and prioritized implementation of security tactics can be a better result producer.The outcome of this study will help the experts and developers to concentrate on the most pertinent security tactics.

    ●The given approach will also help the security practitioners to assess the priority in accordance with the given rank while developing the web applications.

    7.2 Cons-

    ●More Security tactics can be considered apart from the ones used in this paper.

    ●The data evaluated in this paper is from limited resources.The evaluation techniques may also be different from the approach selected for our study.

    ●Only the first layer of factors has been described in this study.Future research studies might consider the two-layer and three-layer architecture for evaluation.

    8 Conclusion

    Frequent penetration of web applications security through massive and highly advanced cyber-attacks has created a dangerous situation for information security in web applications.The alarming scenario necessitates the implementation of security tactics more constructively, that too from the web applications’ development phase itself.To apply the security tactics mechanism on the web application development phase, it is important to determine those tactics that must be prioritized during the development phase.For achieving the stated objective, the study used an MCDM approach, the fuzzy-AHP-TOPSIS.The results drawn from the evaluations were tested on 15 different web application projects of Babasaheb Bhimrao Ambedkar University.The assessed and tested results of this study are highly accurate and conclusive.Moreover, the findings of the present research investigation can be adopted by the developers for producing secure web applications.The effective security tactics evaluation tabulated in the study would be a useful empirical framework for future research pursuits.Furthermore,the study can also be extended by adding more security tactics in the proposed hierarchy for eliciting even more efficient results.

    Acknowledgement:Authors are thankful to Prince Sultan University,Saudi Arabia for providing the fund to carry out the work.

    Funding Statement:Prince Sultan University,Riyadh, Kingdom of Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    人妻夜夜爽99麻豆av| 国产片特级美女逼逼视频| 18禁动态无遮挡网站| 亚洲在线观看片| 国产精品1区2区在线观看.| 午夜福利在线在线| 亚洲av成人av| 国产精品熟女久久久久浪| 国产在视频线精品| 免费黄网站久久成人精品| 欧美高清成人免费视频www| 精品国产露脸久久av麻豆 | 欧美不卡视频在线免费观看| 免费看a级黄色片| 一边亲一边摸免费视频| 午夜福利视频1000在线观看| 国产在线一区二区三区精 | 97超视频在线观看视频| 18禁在线无遮挡免费观看视频| 亚州av有码| 亚洲五月天丁香| 久久精品久久久久久久性| 久久精品熟女亚洲av麻豆精品 | 日本黄大片高清| 国产精品久久久久久精品电影| 在线观看美女被高潮喷水网站| 少妇猛男粗大的猛烈进出视频 | 国产在视频线精品| 精品久久久噜噜| 熟女电影av网| 国产私拍福利视频在线观看| 亚洲va在线va天堂va国产| 成人亚洲精品av一区二区| 久久这里有精品视频免费| 你懂的网址亚洲精品在线观看 | 国产色爽女视频免费观看| 白带黄色成豆腐渣| 91aial.com中文字幕在线观看| 麻豆国产97在线/欧美| 毛片女人毛片| 成人欧美大片| 免费看a级黄色片| 久久久精品94久久精品| 国产亚洲精品久久久com| 内地一区二区视频在线| 亚洲色图av天堂| 久久99蜜桃精品久久| 久久精品综合一区二区三区| 熟女人妻精品中文字幕| 联通29元200g的流量卡| 精品一区二区三区人妻视频| 亚洲内射少妇av| 久久久久网色| 日韩欧美在线乱码| 成人三级黄色视频| 日韩av在线大香蕉| av线在线观看网站| 国产午夜福利久久久久久| 免费播放大片免费观看视频在线观看 | 大香蕉97超碰在线| 啦啦啦观看免费观看视频高清| 三级男女做爰猛烈吃奶摸视频| 亚洲av中文av极速乱| 亚洲伊人久久精品综合 | 赤兔流量卡办理| ponron亚洲| 长腿黑丝高跟| 国产精品一二三区在线看| 日韩视频在线欧美| 汤姆久久久久久久影院中文字幕 | 国产精品国产三级国产av玫瑰| 国产高清有码在线观看视频| 午夜福利成人在线免费观看| 波野结衣二区三区在线| 国产不卡一卡二| 国产亚洲最大av| 人妻少妇偷人精品九色| 久久99热6这里只有精品| 精品国内亚洲2022精品成人| 边亲边吃奶的免费视频| 丰满乱子伦码专区| 干丝袜人妻中文字幕| 亚洲成av人片在线播放无| 久久久久久九九精品二区国产| 天堂√8在线中文| 国产成人aa在线观看| av专区在线播放| 日韩av在线免费看完整版不卡| 中文精品一卡2卡3卡4更新| 午夜免费激情av| 成人美女网站在线观看视频| 永久免费av网站大全| 日韩欧美三级三区| 成人性生交大片免费视频hd| 97超碰精品成人国产| 日韩av在线免费看完整版不卡| 久久久久久国产a免费观看| 国产精品久久久久久精品电影小说 | 日本与韩国留学比较| 中国国产av一级| 日本黄色片子视频| 亚洲成人av在线免费| 久久婷婷人人爽人人干人人爱| 色播亚洲综合网| 亚洲不卡免费看| 国产老妇女一区| 五月玫瑰六月丁香| 干丝袜人妻中文字幕| 一个人看视频在线观看www免费| 国产真实伦视频高清在线观看| 18禁在线播放成人免费| 麻豆av噜噜一区二区三区| 国产伦一二天堂av在线观看| 欧美日韩精品成人综合77777| 两个人视频免费观看高清| 中文字幕亚洲精品专区| 亚洲中文字幕日韩| 国国产精品蜜臀av免费| 久久草成人影院| 亚洲成色77777| 日韩欧美三级三区| 少妇熟女欧美另类| 国产精品1区2区在线观看.| 久久这里只有精品中国| a级毛片免费高清观看在线播放| 18禁在线播放成人免费| 亚洲精品久久久久久婷婷小说 | 五月伊人婷婷丁香| 欧美性猛交黑人性爽| 丰满少妇做爰视频| 男人狂女人下面高潮的视频| 亚洲人成网站高清观看| 看免费成人av毛片| 婷婷色麻豆天堂久久 | 免费黄网站久久成人精品| 欧美潮喷喷水| 亚洲成人av在线免费| 亚洲乱码一区二区免费版| 国产精品av视频在线免费观看| 欧美日韩综合久久久久久| av在线蜜桃| 精品国产三级普通话版| 欧美一区二区国产精品久久精品| 嫩草影院新地址| 亚洲国产精品成人久久小说| 欧美另类亚洲清纯唯美| 联通29元200g的流量卡| 两性午夜刺激爽爽歪歪视频在线观看| 成人毛片a级毛片在线播放| 国产精品无大码| 国产视频首页在线观看| 亚洲五月天丁香| 婷婷色av中文字幕| 啦啦啦观看免费观看视频高清| 国产午夜精品论理片| 亚洲经典国产精华液单| 一级,二级,三级黄色视频| 搡女人真爽免费视频火全软件| 少妇的逼好多水| 最后的刺客免费高清国语| 在线免费观看不下载黄p国产| 熟妇人妻不卡中文字幕| 另类亚洲欧美激情| 亚洲人成77777在线视频| 亚洲精品日韩在线中文字幕| 日本色播在线视频| 日本猛色少妇xxxxx猛交久久| 久久 成人 亚洲| 天堂俺去俺来也www色官网| 亚洲国产精品国产精品| 久久亚洲国产成人精品v| 精品国产露脸久久av麻豆| 18在线观看网站| 精品午夜福利在线看| xxxhd国产人妻xxx| 亚洲五月色婷婷综合| 国产在线一区二区三区精| a级片在线免费高清观看视频| 国产精品久久久久久久电影| 日本av免费视频播放| 欧美精品国产亚洲| 精品国产国语对白av| 韩国av在线不卡| 午夜视频国产福利| 美女脱内裤让男人舔精品视频| 亚洲天堂av无毛| 中文精品一卡2卡3卡4更新| 中文字幕av电影在线播放| 亚洲欧美一区二区三区国产| 新久久久久国产一级毛片| 深夜精品福利| av网站免费在线观看视频| 免费播放大片免费观看视频在线观看| 丰满乱子伦码专区| 久久久久网色| 国产乱人偷精品视频| 免费看不卡的av| 中文天堂在线官网| 久久久久视频综合| 久久精品国产综合久久久 | 久久人妻熟女aⅴ| 少妇人妻 视频| 久久青草综合色| 久久久精品区二区三区| 午夜影院在线不卡| 国产精品一区二区在线观看99| 欧美精品人与动牲交sv欧美| 亚洲综合色惰| 777米奇影视久久| 欧美人与性动交α欧美软件 | 亚洲精品视频女| 女人精品久久久久毛片| 国产成人av激情在线播放| www日本在线高清视频| 精品99又大又爽又粗少妇毛片| 免费看不卡的av| 日韩一本色道免费dvd| 日日撸夜夜添| 男男h啪啪无遮挡| 晚上一个人看的免费电影| 精品人妻在线不人妻| 边亲边吃奶的免费视频| 99久久中文字幕三级久久日本| 午夜福利视频精品| 久久久久久人人人人人| 日韩在线高清观看一区二区三区| 交换朋友夫妻互换小说| 亚洲av.av天堂| 午夜老司机福利剧场| 欧美日韩亚洲高清精品| 亚洲国产精品999| 91国产中文字幕| 人人澡人人妻人| 久久久久国产精品人妻一区二区| 国产高清三级在线| 人人妻人人澡人人爽人人夜夜| 国产精品一国产av| 人人澡人人妻人| 久热久热在线精品观看| 亚洲精华国产精华液的使用体验| 寂寞人妻少妇视频99o| 七月丁香在线播放| 一区二区三区乱码不卡18| 高清毛片免费看| 亚洲成色77777| 菩萨蛮人人尽说江南好唐韦庄| 亚洲,一卡二卡三卡| 国产69精品久久久久777片| 久热这里只有精品99| 亚洲欧美一区二区三区黑人 | 99久久中文字幕三级久久日本| 亚洲成人手机| 九九爱精品视频在线观看| 成年人免费黄色播放视频| 街头女战士在线观看网站| 精品一区在线观看国产| 日韩 亚洲 欧美在线| 久久久精品区二区三区| 国产精品久久久av美女十八| 波野结衣二区三区在线| 欧美人与性动交α欧美精品济南到 | 国产又爽黄色视频| 国产免费一级a男人的天堂| 最近最新中文字幕免费大全7| 91精品伊人久久大香线蕉| 午夜精品国产一区二区电影| 国产毛片在线视频| av播播在线观看一区| 在线观看美女被高潮喷水网站| 激情视频va一区二区三区| 国产精品国产av在线观看| a级毛片在线看网站| 有码 亚洲区| 99热全是精品| 人人妻人人爽人人添夜夜欢视频| 日产精品乱码卡一卡2卡三| 9色porny在线观看| 成人二区视频| 女人久久www免费人成看片| 亚洲美女视频黄频| av国产精品久久久久影院| 欧美成人精品欧美一级黄| 捣出白浆h1v1| 亚洲天堂av无毛| 美女福利国产在线| 国产日韩欧美亚洲二区| 欧美日韩综合久久久久久| 我的女老师完整版在线观看| 最近手机中文字幕大全| av线在线观看网站| 国产熟女欧美一区二区| 草草在线视频免费看| 亚洲国产最新在线播放| 日本91视频免费播放| 国产精品久久久久久久电影| 亚洲精品乱久久久久久| 国产精品熟女久久久久浪| 免费人成在线观看视频色| 人成视频在线观看免费观看| 激情五月婷婷亚洲| 黄色 视频免费看| 90打野战视频偷拍视频| 国产成人91sexporn| 人妻人人澡人人爽人人| 国产亚洲精品第一综合不卡 | av在线播放精品| 乱码一卡2卡4卡精品| 午夜福利在线观看免费完整高清在| 亚洲国产欧美在线一区| 免费日韩欧美在线观看| 国产色爽女视频免费观看| 亚洲国产精品一区二区三区在线| 桃花免费在线播放| 下体分泌物呈黄色| 蜜桃在线观看..| 人人妻人人澡人人看| 丝袜美足系列| 国产精品久久久av美女十八| 日本-黄色视频高清免费观看| 一级片'在线观看视频| 久久久久精品性色| 亚洲精品久久成人aⅴ小说| freevideosex欧美| 91在线精品国自产拍蜜月| 性色av一级| 亚洲人成77777在线视频| 亚洲av男天堂| 亚洲av免费高清在线观看| 精品视频人人做人人爽| 欧美精品人与动牲交sv欧美| √禁漫天堂资源中文www| 久久久精品区二区三区| 成年人免费黄色播放视频| 国产精品秋霞免费鲁丝片| 大片免费播放器 马上看| 十八禁高潮呻吟视频| 国产一区二区三区综合在线观看 | 一级毛片我不卡| 日韩精品免费视频一区二区三区 | 国产精品免费大片| 狂野欧美激情性bbbbbb| 久久亚洲国产成人精品v| 日本av免费视频播放| 91精品伊人久久大香线蕉| 在线观看人妻少妇| 男女边摸边吃奶| 欧美日韩视频高清一区二区三区二| 飞空精品影院首页| 欧美日韩一区二区视频在线观看视频在线| 精品一区在线观看国产| 亚洲成人一二三区av| 人人妻人人澡人人爽人人夜夜| 我的女老师完整版在线观看| 美女国产高潮福利片在线看| 国产精品不卡视频一区二区| 免费在线观看黄色视频的| 精品久久久精品久久久| 午夜福利乱码中文字幕| 蜜臀久久99精品久久宅男| 免费观看性生交大片5| videos熟女内射| 蜜臀久久99精品久久宅男| 日日爽夜夜爽网站| 亚洲三级黄色毛片| 成人黄色视频免费在线看| 国产免费视频播放在线视频| 精品亚洲成a人片在线观看| 22中文网久久字幕| 日本av手机在线免费观看| 内地一区二区视频在线| 免费女性裸体啪啪无遮挡网站| 日本猛色少妇xxxxx猛交久久| 丝袜脚勾引网站| 免费av不卡在线播放| 又粗又硬又长又爽又黄的视频| 国产精品一区www在线观看| 考比视频在线观看| 日韩不卡一区二区三区视频在线| 婷婷色综合www| 久久亚洲国产成人精品v| 久久精品国产自在天天线| 日韩免费高清中文字幕av| 久热这里只有精品99| 波多野结衣一区麻豆| 久久午夜福利片| 18禁国产床啪视频网站| 最新中文字幕久久久久| 高清欧美精品videossex| 久久久精品免费免费高清| 亚洲美女黄色视频免费看| 丰满少妇做爰视频| 久久久精品免费免费高清| 日本色播在线视频| 99久国产av精品国产电影| 女的被弄到高潮叫床怎么办| 国产精品久久久久久久电影| 久久ye,这里只有精品| 在线亚洲精品国产二区图片欧美| 99精国产麻豆久久婷婷| www.熟女人妻精品国产 | 成人手机av| 亚洲精品国产av成人精品| 国产午夜精品一二区理论片| 一区在线观看完整版| 国产精品熟女久久久久浪| 久久久欧美国产精品| 亚洲国产精品专区欧美| 九色亚洲精品在线播放| 91精品三级在线观看| 最近最新中文字幕免费大全7| 国产精品久久久久成人av| 亚洲少妇的诱惑av| 国产不卡av网站在线观看| 久久亚洲国产成人精品v| 免费在线观看完整版高清| 久久女婷五月综合色啪小说| 亚洲精品视频女| 精品久久蜜臀av无| 美女xxoo啪啪120秒动态图| 卡戴珊不雅视频在线播放| 久热久热在线精品观看| a级毛片在线看网站| 久久99热这里只频精品6学生| 精品人妻一区二区三区麻豆| 交换朋友夫妻互换小说| 久久人人爽av亚洲精品天堂| 日本91视频免费播放| 在线观看免费日韩欧美大片| 男男h啪啪无遮挡| 久久久欧美国产精品| 视频区图区小说| 99热这里只有是精品在线观看| 久久久久久久久久人人人人人人| 成人影院久久| 一级爰片在线观看| 日本wwww免费看| 国产亚洲一区二区精品| 肉色欧美久久久久久久蜜桃| 亚洲欧洲精品一区二区精品久久久 | 成年av动漫网址| 蜜臀久久99精品久久宅男| 午夜91福利影院| 伦精品一区二区三区| 久久久久视频综合| 久久人人97超碰香蕉20202| 一级片免费观看大全| av在线播放精品| 国产成人午夜福利电影在线观看| 日韩制服骚丝袜av| 国产精品久久久久久精品古装| 狠狠婷婷综合久久久久久88av| 在线观看美女被高潮喷水网站| 国产免费又黄又爽又色| 国产精品无大码| 黄色视频在线播放观看不卡| 久久精品国产综合久久久 | 日本wwww免费看| 另类精品久久| 亚洲av欧美aⅴ国产| 卡戴珊不雅视频在线播放| 免费看不卡的av| 国产男女内射视频| 一级爰片在线观看| 亚洲伊人久久精品综合| 在线免费观看不下载黄p国产| 国产有黄有色有爽视频| 精品少妇久久久久久888优播| 精品国产一区二区三区四区第35| 亚洲色图 男人天堂 中文字幕 | 91成人精品电影| 永久网站在线| 免费观看性生交大片5| 久久这里有精品视频免费| 久久久久久伊人网av| 久久久精品区二区三区| 久久人妻熟女aⅴ| 好男人视频免费观看在线| kizo精华| 精品久久国产蜜桃| 精品亚洲成a人片在线观看| 中文欧美无线码| 亚洲五月色婷婷综合| 中文字幕另类日韩欧美亚洲嫩草| 亚洲国产精品一区三区| 国产一区有黄有色的免费视频| 中文欧美无线码| 欧美成人午夜精品| 国产免费一级a男人的天堂| 美女内射精品一级片tv| 国产成人午夜福利电影在线观看| 亚洲一级一片aⅴ在线观看| 女的被弄到高潮叫床怎么办| 1024视频免费在线观看| 99久久精品国产国产毛片| 欧美激情极品国产一区二区三区 | 亚洲少妇的诱惑av| 亚洲欧美成人综合另类久久久| 青春草国产在线视频| 欧美精品人与动牲交sv欧美| 9191精品国产免费久久| 在线精品无人区一区二区三| 国产精品免费大片| 国产色婷婷99| 99久久中文字幕三级久久日本| 香蕉精品网在线| 大香蕉久久成人网| av女优亚洲男人天堂| 亚洲人成77777在线视频| 久久午夜综合久久蜜桃| 成人综合一区亚洲| 99久久中文字幕三级久久日本| 久久久久久久国产电影| 久久99精品国语久久久| 丝袜脚勾引网站| 在线看a的网站| 午夜福利影视在线免费观看| 五月开心婷婷网| 卡戴珊不雅视频在线播放| 久久av网站| 精品一区在线观看国产| 国产xxxxx性猛交| 国产男人的电影天堂91| av黄色大香蕉| 少妇人妻 视频| 内地一区二区视频在线| 免费观看a级毛片全部| 一边摸一边做爽爽视频免费| 国产福利在线免费观看视频| 亚洲欧美清纯卡通| 肉色欧美久久久久久久蜜桃| 国产精品久久久久久av不卡| a级片在线免费高清观看视频| 午夜激情久久久久久久| videos熟女内射| 各种免费的搞黄视频| 国产乱人偷精品视频| 久久精品久久久久久噜噜老黄| 欧美成人午夜精品| 91国产中文字幕| 妹子高潮喷水视频| 如日韩欧美国产精品一区二区三区| 狂野欧美激情性bbbbbb| 色网站视频免费| 国产免费一区二区三区四区乱码| 日本黄色日本黄色录像| 久久久精品94久久精品| 精品一区二区三卡| 午夜激情久久久久久久| 乱码一卡2卡4卡精品| 人人妻人人澡人人看| 欧美成人精品欧美一级黄| 成人手机av| 国产一级毛片在线| 日本色播在线视频| 亚洲国产欧美日韩在线播放| 91国产中文字幕| 国产一级毛片在线| 69精品国产乱码久久久| 啦啦啦啦在线视频资源| 亚洲一区二区三区欧美精品| 九色亚洲精品在线播放| 人成视频在线观看免费观看| 五月天丁香电影| 伊人亚洲综合成人网| 下体分泌物呈黄色| 亚洲精品aⅴ在线观看| 色婷婷久久久亚洲欧美| 日本免费在线观看一区| videossex国产| 精品国产一区二区三区久久久樱花| 精品少妇内射三级| 亚洲成人av在线免费| 午夜福利视频精品| 免费高清在线观看日韩| 9191精品国产免费久久| 色94色欧美一区二区| av卡一久久| 国产有黄有色有爽视频| av电影中文网址| 日本黄大片高清| 热99国产精品久久久久久7| 制服丝袜香蕉在线| 国产片特级美女逼逼视频| 午夜福利网站1000一区二区三区| 国产精品嫩草影院av在线观看| 最近最新中文字幕大全免费视频 | 青春草国产在线视频| 汤姆久久久久久久影院中文字幕| 99热全是精品| 五月伊人婷婷丁香| 精品99又大又爽又粗少妇毛片| 波多野结衣一区麻豆| 国产一级毛片在线| 精品久久久久久电影网| 99久久人妻综合| 黑人高潮一二区| 久久精品熟女亚洲av麻豆精品| √禁漫天堂资源中文www| 赤兔流量卡办理| 人人澡人人妻人| 国产成人精品福利久久| 国产1区2区3区精品| 夫妻性生交免费视频一级片| 性色avwww在线观看| 狠狠婷婷综合久久久久久88av| 日本欧美国产在线视频| 天天操日日干夜夜撸| 97精品久久久久久久久久精品| 亚洲av中文av极速乱| 国产69精品久久久久777片| 亚洲熟女精品中文字幕| 久久久久久久国产电影| 日本wwww免费看| 国产色婷婷99| 成人18禁高潮啪啪吃奶动态图|