• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    2021-12-16 06:38:36PriyaSumaiyaThaseenThippaReddyGadekalluMohamedAboudaifandEmadAbouelNasr
    Computers Materials&Continua 2021年3期

    V.Priya,I.Sumaiya Thaseen,Thippa Reddy Gadekallu,Mohamed K.Aboudaifand Emad Abouel Nasr

    1School of Information Technology and Engineering,Vellore Institute of Technology, Vellore, 632014, India

    2Advanced Manufacturing Institute, King Saud University, Riyadh, 11421,Saudi Arabia

    3Industrial Engineering Department, College of Engineering, King Saud University,Riyadh, 11421,Saudi Arabia

    Abstract:Generally,the risks associated with malicious threats are increasing for the Internet of Things(IoT)and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices.Thus,anomaly-based intrusion detection models for IoT networks are vital.Distinct detection methodologies need to be developed for the Industrial Internet of Things(IIoT)network as threat detection is a significant expectation of stakeholders.Machine learning approaches are considered to be evolving techniques that learn with experience,and such approaches have resulted in superior performance in various applications,such as pattern recognition,outlier analysis,and speech recognition.Traditional techniques and tools are not adequate to secure IIoT networks due to the use of various protocols in industrial systems and restricted possibilities of upgradation.In this paper, the objective is to develop a two-phase anomaly detection model to enhance the reliability of an IIoT network.In the first phase,SVM and Na?ve Bayes,are integrated using an ensemble blending technique.K-fold cross-validation is performed while training the data with different training and testing ratios to obtain optimized training and test sets.Ensemble blending uses a random forest technique to predict class labels.An Artificial Neural Network (ANN) classifier that uses the Adam optimizer to achieve better accuracy is also used for prediction.In the second phase,both the ANN and random forest results are fed to the model’s classification unit,and the highest accuracy value is considered the final result.The proposed model is tested on standard IoT attack datasets,such as WUSTL_IIOT-2018,N_BaIoT,and Bot_IoT.The highest accuracy obtained is 99%.A comparative analysis of the proposed model using state-of-the-art ensemble techniques is performed to demonstrate the superiority of the results.The results also demonstrate that the proposed model outperforms traditional techniques and thus improves the reliability of an IIoT network.

    Keywords: Blending;ensemble;intrusion detection;Industrial Internet of Things(IIoT)

    Abbreviations

    ACO Ant Colony Optimization

    ANN Artificial Neural Network

    BPN Back Propagation Network

    CNN Convolutional Neural Network

    GRU Gated Recurrent Unit

    LSTM Long Short Term Memory Networks

    RNN Recurrent Neural Network

    CPS Cyber Physical Systems

    DT Decision Tree

    FNT Flexible Neural Tree

    GA Genetic Algorithm

    IoT Internet of Things

    IIoT Industrial Internet of Things

    KNN K-Nearest Neighbor

    KPCA Kernel Principal Component Analysis

    NB Na?ve Bayes

    PCA Principal Component Analysis

    RF Random Forest

    SA Simulated Annealing

    SVM Support Vector Machine

    1 Introduction

    Currently,the number of IoT devices and connected devices is estimated to be more than 15 billion,and up to 50 billion connected IoT devices are expected by 2022.Development of huge numbers of IoT devices combined with the pressure to deliver IoT devices to market in a timely and competitive manner has increased attention on privacy and security issues.Advances in the IoT and Cyber Physical System (CPS)domains has stimulated creation of Cyber-Physical Manufacturing Systems (CPMS).With the continuous development of CPMSs, significant security concerns have been raised in relation to the Industrial IoT(IIoT), which is characterized by real-time monitoring, automated systems, smart connections, and collaborative machines [1].Identifying IIoT threats and developing defense strategies is required because the complete internet could be paralyzed if a single component and/or communication channel in an IIoTbased system is compromised.

    The four-layered architecture of the IIoT is shown in Fig.1.The first layer is the edge layer, which contains the IIoT devices, and the second layer, the aggregation layer, consists of connected devices.The third layer is the network layer.The fourth layer is the cloud layer, which performs analytics, reporting,and planning based on data captured from the IIoT devices.As shown in Fig.1 (edge layer), IIoT devices will be distributed in various environments, including remote locations where routine maintenance is not feasible.Furthermore, the control logic on IIoT devices cannot be determined in the destination environment.IIoT devices are vulnerable to various types of attacks, such as DDoS, DoS, tampering,spoofing,privilege escalation,and IoT botnet attacks[2].

    Figure 1: IIoT Architecture

    Cisco analyzed a survey [3] that identified Trojan as the most common type of malware deployed to access users and an organization’s computers.Security is a significant challenge that has to be addressed sensibly.As shown in Fig.2, the global cybersecurity market has increased due to increasing threats and attacks, and, by 2023, it is expected that the market will increase exponentially.Despite measures implemented to maintain a secure environment,attacks can occur[4].Building a network that is immune to all types of attack is not possible.Therefore, to realize a trust-based IoT network, developing ways to preventing or mitigate attacks is very important.

    Figure 2: Global cybersecurity market projected to 2023

    Security solutions use antivirus software and intermediate boxes,such as Intrusion Detection Systems(IDS)and firewalls.A firewall controls inbound and outbound traffic at the network endpoints based on the source and destination addresses.However, firewalls require knowledge of the host and are limited by the amount of state available.IDSs are security monitoring tools.They analyze network traffic and scan the system for malicious activities.In addition,IDSs notify the system administrator when a malicious incident is detected.Misuse, anomaly, and hybrid detection mechanisms are widely used in IDSs.With misuse identification, unknown attacks are detected by knowledge rules.In anomaly detection, attacker behavior is compared to normal behavior based on a hypothesis.Hybrid techniques integrate misuse and anomaly detection mechanisms.

    Various machine learning approaches have been developed for anomaly detection in the IoT.Methods based on machine learning have proven to be effective for identifying anomalous events in the network traffic flow.Machine learning strategies can be classified as supervised and unsupervised.Unsupervised learning does not require labelled data.However, with supervised learning, the algorithm is train on labelled samples; i.e., the process includes a function whereby samples are mapped to class labels.In the testing phase, the class for the unpredicted samples is determined according to the function.Widely used machine learning techniques include Na?ve Bayes, SVM, KNN, and decision trees [5].Convolutional Neural Networks (CNN) [6,7] are also employed in machine learning.There are many ensemble techniques, such as random forest [8], Bending, AdaBoost, and stacking.However, there is no universal approach that can work equally well on all datasets[9].

    In this paper, a unified two-phase intrusion detection model is developed using an ensemble machine learning approach called blending that integrates SVM, NB, and DT in the first phase and a random forest classifier is used for prediction.In addition, the results of an Artificial Neural Network (ANN)classifier are integrated with those of the random forest to obtain the best prediction.A contingent analysis is performed by evaluating the integrated model against the WUSTL_IIOT-2018, N_BaIoT and Bot_IoT datasets.In this analysis, accuracy,precision,F-Score, and recall are measured.

    The primary contributions of this study are as follows.

    ●Several existing studies on intrusion detection in the IoT are examined.The investigation focuses on the performance of the algorithms used to develop an attack identification approach.

    ●Base and ensemble machine learning techniques are integrated to construct a robust approach for anomaly detection.

    ●Accuracy and other performance metrics on various benchmark IoT datasets are analyzed.

    The remainder of this paper is organized as follows.A brief review of related work is presented in Section 2.Section 3 addresses the proposed IIoT attack identification model.The results and performance analysis of the proposed model on various datasets are discussed in Section 4.Conclusions and suggestions for future work are provided in Section 5.

    2 Literature Survey

    Machine learning approaches are known to provide optimal intrusion detection solutions.Compared to other methods, machine learning approaches provide better results because they can be applied to various types of datasets and can analyze real-time data.In a previous study, a trust model was constructed for machine-to-machine communication using various machine learning approaches, such as logistic regression, NB, DT, KNN and RF [4].A comparative study has been performed to identify the best approach [5].That study investigated various techniques, i.e., Na?ve Bayes, an SVM, and decision trees.This approach provides accurate information regarding anomalous behaviors and can also analyze the source of the intrusion or the main issue.Typically, these problems are detected based on data patterns,which is time-consuming for human analysts.In this study, large data sets were evaluated, which is laborintensive and time-consuming with conventional approaches.

    Deep learning approaches, such as CNN, CNN-LSTM, CNN-RNN and CNN-GRU, have also been used to identify intrusions [6].These approaches have proven to be more accurate; however, due to the complex architecture, a high computational cost is incurred during training.To increase accuracy,an ANN model that used a wrapper method for feature selection was constructed [8].The proposed ANN model was compared to an SVM, and the comparison shows that the proposed model yielded more accurate results.Simulated annealing with an SVM is a hybrid approach that has been applied to network intrusion [10].This approach proved to be significantly more accurate than an SVM alone.

    The limitation of this approach that more false positives are generated compared to other methods,such as BPN.The deployment of machine learning approaches in cybersecurity has been analyzed [11].In addition, multiple classifier techniques have been studied [12].In that study, the misuse detection model is combined with anomaly detection.A decision tree was used in the anomaly detection module.This approach proved to be effective as it minimized the number of false positives, and the rate of detection was improved.

    Bhattacharya et al.[13]constructed a network intrusion detection model that used an integrated PCAFirefly-based XGBoost approach.In that study, PCA is applied to reduce dimensionality, and XGBoost,which is an advanced ensemble method, was used to predict the classification.Another study, proposed an intrusion identification model using hybrid PCA-GWO for IoMT [14].The proposed model resulted in better accuracy and decreased the time complexity by 32% for faster alert generation.Rupa et al.[15]analyzed various classifiers, such as LinearSVC, logistic regression, MultinomialNB, and random forest,and developed a computational system that could classify cyber-crime offences.The results demonstrated that logistic regression outperformed superior all other analyzed classifiers.

    Significant machine learning algorithms deployed on various benchmark datasets are listed in Tab.1.The DT, NB, ANN, and RF classifiers obtained maximum accuracy of 99% on at least one benchmark dataset.However, maximum accuracy for the SVM was 96% due to its known generalization issue.These results led to the selection of these classifiers for the proposed integrated anomaly detection model for IoT because a blend of these classifiers could result in increased accuracy and reduced error rates.

    3 Proposed Methodology

    The proposed methodology (Fig.3) is an efficient method that provides a trust-based attack identification model for a network.Initially,the datasets, i.e.,WUSTL_IIOT-2018,N_BaIoT and Bot_IoT,are normalized.In the initial stage, the values are fitted between 0 and 1 using label encoding to avoid overfitting.Another level data preprocessing is performed using the Standard Scaler to eliminate null and redundant data.The Standard Scaler arranges the data in a standard normal distribution.In the next step,the data are divided with different cross-validation ratios, e.g., 60:40, 70:30, and 80:20.It was observed that an 80:20 ratio results in better accuracy at the first level of deployment.This model ensures that all observations from the dataset have a fair chance of appearing in the training and test data.A two-level of classification is deployed in the proposed model.In the first level,SVM, Na?ve Bayes,and a decision tree are integrated as a blended ensemble, and the output is a new training set that is sent to a random forest classifier.In addition, an ANN classifier is deployed on the data using softmax as the activation function.Here, the Adam optimizer is used to improve accuracy.In the second level, both the ANN and random forest results are sent to the classification unit, and the most accurate result is considered the final predicted test result.The pseudocode of the proposed model is shown in Fig.4.

    Table 1: Evaluation of significant machine learning techniques in cybersecurity

    Figure 3: Proposed IIoT attack identification model

    4 Experimental Analysis

    4.1 Dataset Description

    The first dataset used is the WUSTL_IIOT_2018 dataset for ICS (SCADA) Cybersecurity [30].Realworld industrial systems are closely emulated, and cyber attacks are generated and captured.The different attacks generated in the testbed are listed in Tab.2.The dataset contains 93.93% normal traffic and 6.07% abnormal traffic.Initially, the dataset has 25 features.However, based on an analysis, six features are selected, as shown in Tab.3.After the data are cleaned to eliminate null and redundant data, a new column is introduced as “Target” wherein normal traffic is represented as “0” and attack traffic is represented as “1”.

    Table 2: Attacks generated in WUSTL_IIOT_2018 dataset

    Table 3: Features selected in WUSTL_IIOT_2018 dataset

    The second dataset used for our analysis is the N_BaIoT dataset [31] that comprises data from nine commercial IoT devices infected by the Bashlite and Mirai botnets.The data is classified as malicicious(10 categories) and benign (1 category).Initially, the datasets had more than 100 features.However, after stream aggregation and deploying statistics, 12 features are used for analysis.

    The final dataset is the BoT_IoT[32]generated by the Australian Centre for Cyber Security.This dataset contains both anomalous and normal events.There are six attack categories, i.e., Data exfiltration, Service Scan,DDoS,Keylogging,DoS,and OS attacks.

    4.2 Pseudocode of the Proposed Model

    Figure 4: Pseudocode of the Proposed Model

    4.3 Performance Metrics

    ●Accuracy:Accuracy measures the correctness of a result.In this case,the correctness of the model’s predictions are measured.Accuracy can be expressed as follows.

    ●Precision(P):Precision represents the exactness of a classifier and can be expressed as follows.

    ●Recall(R): Recall defines the completeness of a classification model Recall can be expressed as follows.

    ●F1 score: The F1 score measures acccuracy based on precision and recall values.F1 values are calculated as follows.

    Here,true negatives,true positives,false positives,and false negatives are represented as tn,tp,fp,and fn,respectively.

    4.4 Results

    Performance indicators,such as accuracy,precision,F1 score,and recall are measured to evaluated the proposed model.The various performance metrics obtained using the SVM,NB,and DT classifiers[33,34]on the WUSTL_IIOT_2018 dataset are shown in Fig.5.Naive Bayes performs poorly with accuracy,precision, recall, and f-score values of 83, 86, 84, and 83, respectively.The SVM and DT classifiers results were similarly; the DT classifier demonstrated maximum accuracy of 96%.

    Figure 5: Performance metrics obtained on first level classification on WUSTL_IIOT_2018 dataset

    The performance metrics of the proposed model on the WUSTL_IIOT_2018 dataset after the second level of classification are shown in Fig.6.The classification result is obtained by predicting the better of the random forest and ANN classifier results.Here, maximum accuracy of 99% is obtained.Note that the Adam optimizer is deployed for the ANN as it can rapidly converge and has a high variance.Thus, a two-level classification results in the best prediction.

    Figure 6: Performance metrics of the integrated model using WUSTL_IIOT_2018 dataset

    The various performance metrics obtained using the SVM, NB, and DT classifiers on the N_BaIoT dataset are shown in Fig.7.NB performs poorly with accuracy, precision, recall.and F-scores of 87, 88,88, and 87, respectively.The SVM returns 95% accuracy, which is better than the NB classifier.The DT classifier outperforms both the SVM and the NB classifiers with maximum accuracy of 98%.The results of the proposed model after the second level of classification are shown in Fig.8.The result of the blending is used to train new data and send it to the RF classifier.The ANN and RF predictions are merged to derive a new result with an accuracy of 99%.

    Figure 7: Performance metrics obtained on first level classification on N_BaIoT dataset

    Figure 8: Performance metrics of the integrated model using N_BaIoT dataset

    Fig.9 shows the various performance metrics obtained using the SVM,NB,and DT classifiers on the BoT_IoT dataset.NB performs poorly with accuracy, precision, recall and f-scores of 87, 88, 88, and 87,respectively.The SVM performs better and results in an accuracy of 95%.The DT classifiers returned the best results with maximum accuracy of 98%.The performance of the proposed model after deploying the second level of classification using ANN and RF is shown in Fig.10.The results of the merged prediction show an increase of 99%accuracy.

    Figure 9: Performance metrics obtained on first level classification on BoT_IoT dataset

    Figure 10: Performance metrics of the integrated model on BoT_IoT dataset

    The major findings of the proposed work are as follows.

    ●Maximum accuracy of 99%is obtained for all three benchmark IoT intrusion detection datasets.

    ●The Adam optimizer increases the accuracy of the ANN and results in the overall best performance.

    Tab.4 lists the accuracy of the developed IIoT attack identification model compared to state-of-the-art intrusion detection models using multiple classifiers on the BoT_IoT dataset.

    Table 4: Proposed model accuracy comparison with contemporary approaches

    5 Conclusion

    Intrusion detection models are powerful mechanisms to secure IIoT systems.We conducted a literature survey of studies that investigated machine learning techniques on standard datasets to identify cyber threats and deployed identified learning approaches in our proposed model.The proposed model integrates three base classifiers, NB, SVM, and KNN by blending, i.e., a stacked ensemble technique.The second level classifier used in the proposed model is RF, and it is one of the best approaches to achieve higher prediction.The ANN and RF classification results are compared, and the best accuracy is considered the final result.The proposed model is evaluated on the WUSTL_IIOT-2018, N_BaIoT, and Bot_IoT datasets.Maximum accuracy of 99% with a marginal change in decimal values is obtained for all three datasets.Precision,recall,and F-Score values were also greater than 98%.

    Acknowledgement:The authors extend their appreciation to King Saud University for funding this work through Researchers supporting project number (RSP-2020/164), King Saud University, Riyadh,Saudi Arabia.

    Funding Statement:The authors extend their appreciation to King Saud University for funding this work through Researchers Supporting Project number (RSP-2020/164), King Saud University, Riyadh,Saudi Arabia.

    Conflict of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美成人午夜精品| 两个人免费观看高清视频| 国产麻豆69| 母亲3免费完整高清在线观看| 精品久久久久久久毛片微露脸| 悠悠久久av| 久久久久久久久久久久大奶| 亚洲七黄色美女视频| 午夜福利一区二区在线看| 亚洲视频免费观看视频| videosex国产| 91国产中文字幕| 日本wwww免费看| 国产区一区二久久| www.www免费av| 久久精品91无色码中文字幕| 欧美成狂野欧美在线观看| 久9热在线精品视频| 日本一区二区免费在线视频| 老司机福利观看| 日日夜夜操网爽| 在线国产一区二区在线| 日日摸夜夜添夜夜添小说| 日本撒尿小便嘘嘘汇集6| 黄色 视频免费看| 精品国产超薄肉色丝袜足j| 久久久久久免费高清国产稀缺| av免费在线观看网站| 欧美精品啪啪一区二区三区| 日日夜夜操网爽| 看黄色毛片网站| 日韩国内少妇激情av| a级毛片黄视频| 国产欧美日韩一区二区三区在线| 美女大奶头视频| 日本欧美视频一区| 一二三四在线观看免费中文在| 久久精品国产亚洲av高清一级| 欧美激情极品国产一区二区三区| 亚洲性夜色夜夜综合| 成年人免费黄色播放视频| 90打野战视频偷拍视频| 午夜免费激情av| 99香蕉大伊视频| 久久久久久亚洲精品国产蜜桃av| 狂野欧美激情性xxxx| 脱女人内裤的视频| 在线十欧美十亚洲十日本专区| 黄色毛片三级朝国网站| 他把我摸到了高潮在线观看| av电影中文网址| 成年版毛片免费区| 亚洲自偷自拍图片 自拍| 一本大道久久a久久精品| 欧美激情久久久久久爽电影 | 交换朋友夫妻互换小说| 超色免费av| 亚洲人成电影观看| av福利片在线| 成年女人毛片免费观看观看9| 中文字幕色久视频| 亚洲国产精品一区二区三区在线| 色综合婷婷激情| 脱女人内裤的视频| 国产伦一二天堂av在线观看| 法律面前人人平等表现在哪些方面| 精品久久蜜臀av无| 一进一出抽搐动态| 在线观看日韩欧美| 97超级碰碰碰精品色视频在线观看| 99香蕉大伊视频| 亚洲人成电影免费在线| 国产精品美女特级片免费视频播放器 | 国产欧美日韩综合在线一区二区| 国产伦人伦偷精品视频| 男女下面插进去视频免费观看| 成年人黄色毛片网站| 亚洲一区二区三区欧美精品| 91国产中文字幕| 精品久久久久久成人av| 高清在线国产一区| 久久精品亚洲av国产电影网| av天堂久久9| 一级,二级,三级黄色视频| 精品福利永久在线观看| 男女下面插进去视频免费观看| 国产色视频综合| 中文字幕人妻熟女乱码| 精品一区二区三区四区五区乱码| 无人区码免费观看不卡| 深夜精品福利| 亚洲中文日韩欧美视频| 男人舔女人下体高潮全视频| 久久精品91蜜桃| 三上悠亚av全集在线观看| 婷婷精品国产亚洲av在线| 涩涩av久久男人的天堂| 一区二区三区激情视频| 国产精品成人在线| 一个人观看的视频www高清免费观看 | 999精品在线视频| 国产精品1区2区在线观看.| 亚洲欧美精品综合一区二区三区| 性欧美人与动物交配| 日韩精品青青久久久久久| 91字幕亚洲| 伊人久久大香线蕉亚洲五| 老汉色∧v一级毛片| 99国产精品一区二区三区| 中文字幕av电影在线播放| а√天堂www在线а√下载| 午夜精品在线福利| 99久久国产精品久久久| av网站在线播放免费| 可以免费在线观看a视频的电影网站| 美女扒开内裤让男人捅视频| 中文字幕最新亚洲高清| 99久久99久久久精品蜜桃| 国产亚洲精品综合一区在线观看 | 久久精品国产99精品国产亚洲性色 | 激情在线观看视频在线高清| 精品国产国语对白av| xxxhd国产人妻xxx| 黄色a级毛片大全视频| 一级毛片精品| av国产精品久久久久影院| 久久久久精品国产欧美久久久| 成人国语在线视频| 人妻久久中文字幕网| 黄色怎么调成土黄色| 9191精品国产免费久久| 高潮久久久久久久久久久不卡| 亚洲专区字幕在线| 黄网站色视频无遮挡免费观看| 涩涩av久久男人的天堂| 国产精品一区二区三区四区久久 | 免费在线观看亚洲国产| 久久久久久久久免费视频了| 免费日韩欧美在线观看| 国产视频一区二区在线看| 一进一出抽搐动态| 国内久久婷婷六月综合欲色啪| av在线天堂中文字幕 | 99久久久亚洲精品蜜臀av| 亚洲国产看品久久| 日本精品一区二区三区蜜桃| 成人亚洲精品一区在线观看| 国产精品自产拍在线观看55亚洲| 一级片免费观看大全| 欧美人与性动交α欧美精品济南到| 别揉我奶头~嗯~啊~动态视频| 成熟少妇高潮喷水视频| 精品高清国产在线一区| 看黄色毛片网站| 亚洲人成网站在线播放欧美日韩| 成人三级黄色视频| 亚洲久久久国产精品| 国产精品免费一区二区三区在线| 一a级毛片在线观看| www.999成人在线观看| 久久中文字幕人妻熟女| 在线观看免费日韩欧美大片| 精品久久蜜臀av无| 亚洲专区字幕在线| 亚洲精品在线观看二区| 午夜视频精品福利| 日本欧美视频一区| 精品一区二区三卡| 天天影视国产精品| 日韩 欧美 亚洲 中文字幕| 叶爱在线成人免费视频播放| 国产熟女午夜一区二区三区| 91麻豆av在线| 国产熟女xx| 亚洲专区中文字幕在线| 亚洲精品一二三| 免费高清在线观看日韩| 一区二区三区激情视频| 高清欧美精品videossex| 动漫黄色视频在线观看| 新久久久久国产一级毛片| 美女高潮到喷水免费观看| 亚洲人成伊人成综合网2020| 中文字幕av电影在线播放| 在线观看66精品国产| 亚洲第一青青草原| 久久久久九九精品影院| 精品日产1卡2卡| 一本大道久久a久久精品| 久久人人97超碰香蕉20202| 一个人免费在线观看的高清视频| 免费在线观看黄色视频的| 久久 成人 亚洲| 波多野结衣高清无吗| 99国产综合亚洲精品| 成人国语在线视频| 久久精品亚洲熟妇少妇任你| 嫩草影视91久久| 亚洲片人在线观看| 国产有黄有色有爽视频| 亚洲av电影在线进入| 高清欧美精品videossex| 欧美人与性动交α欧美软件| 热re99久久精品国产66热6| 午夜福利欧美成人| 满18在线观看网站| 91麻豆av在线| 亚洲精品国产一区二区精华液| 老鸭窝网址在线观看| 久久中文字幕一级| 99热国产这里只有精品6| 精品高清国产在线一区| 九色亚洲精品在线播放| 美女大奶头视频| 免费观看人在逋| 午夜老司机福利片| 免费在线观看日本一区| 国产视频一区二区在线看| 男女床上黄色一级片免费看| 国产精品秋霞免费鲁丝片| 国产99久久九九免费精品| 一级a爱视频在线免费观看| 国产成年人精品一区二区 | 精品国产乱子伦一区二区三区| 成人av一区二区三区在线看| 日本精品一区二区三区蜜桃| 99久久国产精品久久久| 美国免费a级毛片| 国产xxxxx性猛交| 久久精品成人免费网站| 9色porny在线观看| 成人av一区二区三区在线看| 欧美黑人欧美精品刺激| av福利片在线| 亚洲自偷自拍图片 自拍| 午夜a级毛片| 超色免费av| 亚洲 欧美一区二区三区| 一进一出抽搐gif免费好疼 | 精品国内亚洲2022精品成人| 三上悠亚av全集在线观看| 亚洲av美国av| 黄色成人免费大全| 久久精品国产综合久久久| 国产深夜福利视频在线观看| 99在线人妻在线中文字幕| 91国产中文字幕| 99国产精品99久久久久| 国产欧美日韩一区二区三区在线| 欧美黑人精品巨大| 18禁美女被吸乳视频| 在线观看日韩欧美| 无遮挡黄片免费观看| 国产精品影院久久| 亚洲男人天堂网一区| 一边摸一边抽搐一进一小说| 最新在线观看一区二区三区| 免费在线观看视频国产中文字幕亚洲| 黄色女人牲交| 在线观看午夜福利视频| 国产精品一区二区免费欧美| 黄网站色视频无遮挡免费观看| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品久久午夜乱码| 久久国产精品影院| 日韩 欧美 亚洲 中文字幕| 在线永久观看黄色视频| 国产成人影院久久av| 亚洲欧洲精品一区二区精品久久久| 在线十欧美十亚洲十日本专区| 国产在线观看jvid| 色综合站精品国产| 欧美人与性动交α欧美软件| 性欧美人与动物交配| 国产亚洲欧美精品永久| 一级毛片高清免费大全| 国产欧美日韩一区二区三区在线| 日本黄色日本黄色录像| 国产精品久久视频播放| 高清av免费在线| 在线播放国产精品三级| 久久中文字幕人妻熟女| 成人亚洲精品av一区二区 | 99久久久亚洲精品蜜臀av| 久久精品影院6| 成人国语在线视频| 精品国产国语对白av| 一进一出抽搐gif免费好疼 | 后天国语完整版免费观看| 久久人人爽av亚洲精品天堂| 人人妻,人人澡人人爽秒播| 最近最新中文字幕大全免费视频| 久久久久精品国产欧美久久久| 男人舔女人的私密视频| 亚洲九九香蕉| 99在线视频只有这里精品首页| 可以在线观看毛片的网站| 亚洲精品一卡2卡三卡4卡5卡| 国产免费av片在线观看野外av| 日日干狠狠操夜夜爽| 国产亚洲欧美98| 国产精品野战在线观看 | 人人妻人人爽人人添夜夜欢视频| 中文字幕人妻熟女乱码| av电影中文网址| 精品国产超薄肉色丝袜足j| av国产精品久久久久影院| 成人特级黄色片久久久久久久| 欧美老熟妇乱子伦牲交| 最近最新免费中文字幕在线| 国产日韩一区二区三区精品不卡| www.自偷自拍.com| 久久久久久久精品吃奶| 欧美最黄视频在线播放免费 | 十八禁网站免费在线| av福利片在线| 精品国内亚洲2022精品成人| 久久婷婷成人综合色麻豆| 露出奶头的视频| 国产成人欧美在线观看| 99国产精品一区二区三区| 精品国产一区二区三区四区第35| 久久亚洲真实| 窝窝影院91人妻| 在线观看一区二区三区| 两性夫妻黄色片| 黑人操中国人逼视频| 国产xxxxx性猛交| 欧美日韩视频精品一区| 久久国产亚洲av麻豆专区| 老司机在亚洲福利影院| 男女午夜视频在线观看| 成在线人永久免费视频| 亚洲人成伊人成综合网2020| 久久 成人 亚洲| 久久久国产欧美日韩av| 国产精品偷伦视频观看了| 在线国产一区二区在线| av在线播放免费不卡| 国产成人精品久久二区二区91| www.999成人在线观看| 琪琪午夜伦伦电影理论片6080| x7x7x7水蜜桃| 看黄色毛片网站| 亚洲精品国产区一区二| 亚洲精品国产精品久久久不卡| 老司机午夜福利在线观看视频| 大型黄色视频在线免费观看| 亚洲人成电影观看| 色老头精品视频在线观看| 国产精品自产拍在线观看55亚洲| 50天的宝宝边吃奶边哭怎么回事| 搡老岳熟女国产| 国产精华一区二区三区| 在线观看舔阴道视频| 亚洲国产看品久久| 国产麻豆69| 久久婷婷成人综合色麻豆| 最近最新免费中文字幕在线| 亚洲av成人一区二区三| 欧美在线黄色| 国产av又大| 国产激情欧美一区二区| 国产av在哪里看| www.www免费av| 搡老熟女国产l中国老女人| 久久狼人影院| 麻豆国产av国片精品| 曰老女人黄片| 久久精品人人爽人人爽视色| 欧美中文综合在线视频| 久久人人97超碰香蕉20202| a级毛片在线看网站| 热re99久久国产66热| 男女做爰动态图高潮gif福利片 | 91精品三级在线观看| www国产在线视频色| 久久香蕉精品热| а√天堂www在线а√下载| xxxhd国产人妻xxx| 男女做爰动态图高潮gif福利片 | 亚洲aⅴ乱码一区二区在线播放 | 亚洲专区中文字幕在线| 欧美日韩一级在线毛片| 欧美一区二区精品小视频在线| 欧美日韩福利视频一区二区| 亚洲精品在线观看二区| 极品人妻少妇av视频| 亚洲av成人不卡在线观看播放网| 日本撒尿小便嘘嘘汇集6| 午夜免费成人在线视频| 夜夜夜夜夜久久久久| 热re99久久精品国产66热6| 国产伦人伦偷精品视频| 国产精品电影一区二区三区| 村上凉子中文字幕在线| 日韩大码丰满熟妇| 日本vs欧美在线观看视频| 午夜福利在线观看吧| 级片在线观看| 在线观看66精品国产| 国产精品av久久久久免费| 国产激情久久老熟女| 亚洲国产欧美日韩在线播放| 中亚洲国语对白在线视频| 香蕉久久夜色| 欧美黄色片欧美黄色片| 久久久久久亚洲精品国产蜜桃av| 曰老女人黄片| 国产一区二区激情短视频| 欧美中文综合在线视频| 免费看a级黄色片| 午夜精品久久久久久毛片777| 欧美国产精品va在线观看不卡| 亚洲专区中文字幕在线| 动漫黄色视频在线观看| 亚洲中文av在线| 国产高清videossex| 三上悠亚av全集在线观看| 亚洲欧美一区二区三区黑人| 日韩大尺度精品在线看网址 | 无遮挡黄片免费观看| e午夜精品久久久久久久| 一进一出抽搐gif免费好疼 | 国产成人欧美| 亚洲七黄色美女视频| 国产成人精品久久二区二区免费| av天堂在线播放| 一边摸一边抽搐一进一小说| 欧美日韩国产mv在线观看视频| 啦啦啦 在线观看视频| 最近最新中文字幕大全电影3 | 日韩av在线大香蕉| 99精品在免费线老司机午夜| 亚洲第一av免费看| 国产av又大| 久久国产精品影院| 日本免费a在线| 在线播放国产精品三级| 亚洲成人精品中文字幕电影 | 欧美中文综合在线视频| 亚洲精品在线观看二区| 一级作爱视频免费观看| 亚洲三区欧美一区| 人成视频在线观看免费观看| 91九色精品人成在线观看| 在线天堂中文资源库| 久久国产精品人妻蜜桃| 精品一区二区三卡| e午夜精品久久久久久久| 亚洲专区中文字幕在线| 香蕉国产在线看| 久热爱精品视频在线9| 最近最新中文字幕大全免费视频| 脱女人内裤的视频| 日韩欧美免费精品| 国产精品1区2区在线观看.| 欧美乱妇无乱码| 国产欧美日韩一区二区三区在线| 国产亚洲欧美98| av欧美777| 久久久久久久久免费视频了| 久久久国产精品麻豆| 欧美 亚洲 国产 日韩一| 最近最新免费中文字幕在线| 999精品在线视频| 国产成人av教育| 国产av在哪里看| 亚洲精品国产一区二区精华液| 欧美激情 高清一区二区三区| xxxhd国产人妻xxx| 国产亚洲精品久久久久5区| 国产精品免费视频内射| 波多野结衣一区麻豆| 亚洲精品在线观看二区| 美女扒开内裤让男人捅视频| 日韩欧美三级三区| 精品卡一卡二卡四卡免费| 大型av网站在线播放| 久久香蕉精品热| 18禁黄网站禁片午夜丰满| 搡老岳熟女国产| 久久影院123| 亚洲精品粉嫩美女一区| 在线十欧美十亚洲十日本专区| 国产成人影院久久av| 大型黄色视频在线免费观看| 久久久国产成人精品二区 | 欧美中文综合在线视频| 免费高清视频大片| 无限看片的www在线观看| 日韩人妻精品一区2区三区| 亚洲精品国产区一区二| 性欧美人与动物交配| 另类亚洲欧美激情| 国产成人精品久久二区二区免费| 国产成人精品无人区| 成人特级黄色片久久久久久久| 国产成人一区二区三区免费视频网站| 国产不卡一卡二| 我的亚洲天堂| 久久中文字幕一级| 午夜两性在线视频| 精品久久久久久电影网| 午夜a级毛片| 午夜免费鲁丝| 亚洲av电影在线进入| 国产乱人伦免费视频| 久9热在线精品视频| 亚洲国产精品sss在线观看 | 男人舔女人下体高潮全视频| 日韩大尺度精品在线看网址 | 欧美一级毛片孕妇| 亚洲熟妇中文字幕五十中出 | 国产黄色免费在线视频| 国产深夜福利视频在线观看| 国产激情久久老熟女| 日韩三级视频一区二区三区| 老司机亚洲免费影院| 久久九九热精品免费| 亚洲自拍偷在线| 久久人妻av系列| 99国产综合亚洲精品| 在线观看免费视频日本深夜| 极品人妻少妇av视频| 在线永久观看黄色视频| 亚洲av成人一区二区三| 又大又爽又粗| 人人妻,人人澡人人爽秒播| 成人18禁在线播放| 亚洲av电影在线进入| 一级a爱视频在线免费观看| 午夜精品久久久久久毛片777| 啦啦啦免费观看视频1| 高潮久久久久久久久久久不卡| 一夜夜www| 日韩中文字幕欧美一区二区| 国产av又大| 精品电影一区二区在线| 亚洲人成伊人成综合网2020| 精品一区二区三区视频在线观看免费 | 国产亚洲精品综合一区在线观看 | 国产精品久久久久久人妻精品电影| 中出人妻视频一区二区| 日韩精品免费视频一区二区三区| 国内久久婷婷六月综合欲色啪| 久久精品国产清高在天天线| 国产精品一区二区免费欧美| 国产黄a三级三级三级人| 精品高清国产在线一区| 国产精品av久久久久免费| 一边摸一边抽搐一进一出视频| 电影成人av| 老司机靠b影院| 久久久久久亚洲精品国产蜜桃av| 亚洲精品久久成人aⅴ小说| 久久午夜综合久久蜜桃| 日本黄色日本黄色录像| 亚洲欧美一区二区三区久久| 亚洲av第一区精品v没综合| 国产日韩一区二区三区精品不卡| 一二三四社区在线视频社区8| 免费一级毛片在线播放高清视频 | 又黄又粗又硬又大视频| 黄频高清免费视频| 国产精品亚洲一级av第二区| 欧美人与性动交α欧美精品济南到| 精品少妇一区二区三区视频日本电影| 色精品久久人妻99蜜桃| 999精品在线视频| 性色av乱码一区二区三区2| 老司机在亚洲福利影院| 最近最新免费中文字幕在线| 亚洲色图av天堂| 国产色视频综合| 18禁观看日本| 久久久久久亚洲精品国产蜜桃av| 国产主播在线观看一区二区| 黄片播放在线免费| 国产午夜精品久久久久久| 一本综合久久免费| 久久亚洲真实| 三上悠亚av全集在线观看| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品久久成人aⅴ小说| 自拍欧美九色日韩亚洲蝌蚪91| 久久精品国产亚洲av香蕉五月| 久久久久久久久免费视频了| 久久久久久大精品| 岛国在线观看网站| 亚洲黑人精品在线| 亚洲色图av天堂| 亚洲五月婷婷丁香| 大型黄色视频在线免费观看| 亚洲欧美激情综合另类| 国产在线观看jvid| 久久久久精品国产欧美久久久| 欧美激情 高清一区二区三区| 黄色毛片三级朝国网站| 黄色视频,在线免费观看| 一边摸一边抽搐一进一出视频| 十八禁人妻一区二区| 日本免费一区二区三区高清不卡 | 可以免费在线观看a视频的电影网站| 婷婷六月久久综合丁香| 国产在线精品亚洲第一网站| 成人免费观看视频高清| 日韩国内少妇激情av| 亚洲人成电影观看| 日本免费一区二区三区高清不卡 | 欧洲精品卡2卡3卡4卡5卡区| 亚洲成av片中文字幕在线观看| 色综合婷婷激情| 亚洲精品中文字幕一二三四区| 国产亚洲精品久久久久久毛片|