• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Novel Collective User Web Behavior Simulation Method

    2021-12-16 06:38:54HongriLiuXuZhangJingjingLiandBailingWang
    Computers Materials&Continua 2021年3期

    Hongri Liu, Xu Zhang,Jingjing Li and Bailing Wang,*

    1College of Computer Science &Technology, Harbin Institute of Technology at Weihai, Weihai, 264209,China

    2Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, 518000,China

    3Research Institute of Cyberspace Security, Harbin Institute of Technology, Harbin,150001, China

    Abstract:A collective user web behavior simulation is an import means for generating a large-scale user network behavior in a network testbed or cyber range.Existing studies almost focus on individual web behavior analysis and prediction,which cannot simulate human dynamics that widely exist in large-scale users’behaviors.To address these issues,we propose a novel collective user web behavior simulation method, in which an algorithm for constructing a connected virtual social network is proposed, and then a collective user web behavior simulation algorithm is designed on the virtual social network.In the simulation method, a new epidemic information dissemination algorithm based on the SIR model is proposed to drive the user web behavior with Breadth—First Search algorithm on the connected virtual social network.We specially build an experiment environment with 12 servers by using Docker container technology and then perform a wide range of experiments with different user scales to evaluate the method.The experimental results demonstrate that not only the degrees of the social network but also the time intervals of the collective users’ web behavior can be well fitted to a power-law distribution and show that our simulation method can well simulate a collective user web behavior.

    Keywords: Web behavior simulation; virtual social network; human dynamics;power-law distribution

    1 Introduction

    Facing an increasingly severe network security issues in the Internet,researchers and organizations have constructed all kinds of large-scale of network testbeds to simulate the Internet and then conduct experiments for analyzing these issues,such as Emulab Network Testbed,NCR(National Cyber Range)[1]and StarBED[2].In large-scale network testbeds or cyber ranges, virtualization technologies are widely employed to simulate the hardware and network, which constitute the infrastructure of the network testbed.Meanwhile, the user network behavior on network testbed is generated by simulating the user behavior on the Internet [3,4].In recently years, for predicting or simulating individual behaviors on some applications, many user network behavior models and simulation methods have been proposed [5-11]and achieved promised results.However,these methods cannot be directly applied in collective user network behavior simulation because of the lack of interactions among individuals and other issues.

    Based on human dynamics,many researchers have devoted the studies on behavior analysis[12-15]and have achieved fruitful results.However, a collective user network behavior simulation is rarely touched in current studies for the challenges in the scale and the method of simulation in a network testbed.Our interest arises out of the question of how to perform a collective user network behavior simulation that follows human dynamics in a real network environment.In the simulation, the key is how to drive the collective user to perform one kind of network behavior while following the laws of human dynamics.

    In this paper,we study a collective user web behavior simulation method.In detail,we first construct a virtual social network in which each virtual node is modeled as an agent and the degrees of the agents follow a power-law distribution, a form of heavy-tailed distribution.Then, we simulate the information dissemination process among the agents based on an epidemic information dissemination model,in which all agents reply a message to a specific post in the forum after infected and then infects its neighbors.We finally validate that the time intervals between two consecutive replies follow a power-law distribution,which agrees with the laws of human dynamics.The experimental results demonstrate that our method is capable of simulating the collective user web behavior realistically.

    The goal of our work is to study the method of simulating a collective user network behavior in a large network testbed or cyber range,instead of studying the mechanism of the heavy-tailed phenomenon in the real social network such as Twitter and Facebook.To the best of our knowledge,this work is the first study on the method of simulating a collective user network behavior in a real network environment.

    In summary,the main contributions of our work are listed as follows:

    1.We design a virtual social network construction method, which improves the PLOD (power-law out degree) [16] algorithm with the BA (Barabási-Albert) model [17,18] and has the ability to quickly establish a connected virtual social network whose degree distribution follows a power-law distribution.

    2.An information dissemination algorithm,the key of the simulation method,is proposed to drive the individual user’s network behavior.We give the calculation method of the length of waiting time and define the process of the epidemic information dissemination in the algorithm.

    3.We design a real network environment to evaluate the performance of the simulation method on the Docker container swarm.As an agent, each Docker container posts a reply to the specific post of the same forum by running our proposed algorithms in the connected social network.We validate that the time intervals of consecutive replies follow a power-law distribution.

    The rest of the paper is organized as follows:Section 2 reviews related work,Section 3 introduces the approach,Section 4 presents our experiments and the result,and Section 5 discusses and concludes the paper.

    2 Background

    A collective user behavior simulation plays an essential role in multiple internet applications.Many researchers have focused on the prediction and simulation of individual network behavior.

    2.1 User Network Behavior Modeling and Predicting

    Kaderka et al.[19] build a tool named BeCos, which not only allows users to specify system and component behavior but also enables system engineers to clearly define behavior in a semantically rigorous manner with behavior ontology and scenario ontology.Yang et al.[20] analyzed the influence of multiple factors on email reply behavior and developed a model to predict whether a receiver will reply to the sender.Moreover, they characterized the influence of rich factors on email reply behavior.Incorporating structure, usage, and content data from a real website, Loyola et al.[8] proposed a new method to analyze web user behavior by using an Ant Colony Optimization algorithm, which can explain approximately 80% of real usage with a predefined similarity measure.Si et al.[21] studied the users’post and reply behaviors in Tianya, an internet forum, and found that users’ posts, replies, in-degrees and out-degrees of replied message distribution all follow a power-law distribution, which is consistent with the achievements of other researchers.

    In terms of the analysis approaches, Rajabi et al.[9] defined user behavior categories using an unsupervised learning algorithm and then proposed a data-driven approach to analyze user behavior.Liu et al.[10] presented a new user behavior modeling method on the user’s clicking behavior of search engines, in which a convolutional neural network(CNN) architecture is constructed to build click models,and the parameters from traditional click models are used to restrict the meaning in the hidden layer of the CNN.This model is considered as the best with respect to the evaluation metric of click perplexity.Park et al.[7] analyzed the behavior of image search on a large-scale query log from Yahoo Image Search, which assumed that a user’s behavior is dependent on the query type.Aiming at revealing highlevel patterns in the behavior of game players, Sifa et al.[22] performed four experiments on a 6 million player dataset covering a total playtime of over 5 billion hours across more than 3000 games distributed via the Steam platform, which provided unique insights into the behavior of the game player.Xiao et al.[23] studied human behavior in Sina Microblog of China and found that not only on the individual level but also on the group level,the message releasing time intervals obey power-law distribution.

    2.2 User Network Behavior Simulation

    Agent-based models(ABM)[24,25]are computational models that simulate the actions and interactions of autonomous agents (individual or collective entities) to assess their effects within an environment.In company with the increase of computing power, ABM based user behavior simulation techniques (e.g.,BDI) have been widely used in social simulation [26-29], e.g., Kampmann et al.[29] proposed an automatic parameter identification approach for personality driving behavior models by comparing the behavior data of human and artificial drivers in the same virtual environment.This method can also be applied to compare human and artificial driving behavior.Also, Flamino et al.[30] concluded that human patterns of temporal preference are consistent and resilient by analyzing users of several real-world datasets.Further, they integrated those patterns into large-scale agent-based models and simulated the users’ activity to validate predictive accuracy.Xu et al.[31] build an agent-based model to simulate the knowledge transfer and integration processes among irrational individuals and then explored the effects of individual irrationality and network structure on collective performance.Although ABM is widely used to simulate human behavior in multiple research areas such as auto driving, the research on simulating user network behavior is quite rare.In [32], the BP-BDI model is proposed to simulate the user’s behavior on email, in which a behavior learning model based on BP neural network is used to learn the user’s mail behavior.Diallo et al.[33] first analyzed the web simulation by using the principles of service orientation,platform independence and interoperability, and then proposed a layered approach for the web simulation.In terms of Human-machine interaction (HMI) simulation, Amirkhanyan et al.[5] proposed a user behavior simulation scheme based on user behavior state graphs, which are capable to generate simple user behavior on Windows-family virtual machines.

    To sum up,there are many researches on individual behavior modeling and simulation based on ABM and make some notable research results, whereas, in collective user network behavior simulation, these research results cannot be applied directly.On the one hand, different from traffic simulations and crowding behavior simulation in an emergency, the collective user’s network behavior is spontaneous and lasting for several days or even months.On the other hand, the individual network behavior simulation methods are not suitable for collective user behavior simulation for lack of interactions among users.

    In this paper, we propose a novel collective user web behavior simulation method based on ABM.Firstly, we construct a connected undirected virtual social network, and then use epidemic information dissemination model to simulate the information dissemination process among the agents in the virtual social network to drive individual user’s web behavior simulation.The time calculation method makes the time intervals of two consecutive network behaviors follow a power-law distribution.It should be noticed that our work is different from [23], in which they simulated multi-agent interactions in a real-life social network topology to verify whether the results are consistent with empirical observations.In addition, their simulation happened in an emulation environment without any real network behavior.However, our work is to explore a simulation method that can construct a virtual social network and simulate a collective user’s web behavior that follows human dynamics in a real network environment.

    3 Research Method

    In this section,we first propose a connected virtual social network construction algorithm by combing the PLOD algorithm with the BA model.In the virtual social network,each node is modeled as one agent.We divide the agents into three categories,the susceptible agent,the infected agent and the recovered agent.The SIR is modified,named as s_SIR,to simulate the information dissemination among the agents,which drives individual network behavior simulation.Taking web behavior for example, one agent selected randomly from the social network replies to an specific post of the same forum after Δti(i∈[1, n]) length of time and then infects its neighbors.The infected agent will repeat the same process.The abstract simulation process of the collective user web behavior is demonstrated as Fig.1.

    Figure 1: The abstraction process of collective user web behavior simulation

    In Fig.1, (a) shows isolated agents, (b) a virtual social network constructed by our algorithm, (c) one agent is infected (individual web behavior simulation), (d) The neighbors are infected, and (e) all the agents are infected (collective user web behavior simulation complete).We assume one infected agent will recover if it has infected all its susceptible neighbors and the recovered agent will never be infected anymore.In the information dissemination process, two connected agents communicate with each other to simulate the infection process by using UDP.Once infected, the agent will perform web behavior simulation after Δti(i∈{1,2, …,n})length of time.

    3.1 Virtual Social Network Construction Algorithm

    There are two classical virtual social network generation algorithms,one is the PLOD,and the other is the BA model.The degree distribution resulting from the BA model follows a power-law distribution of the form P(k) ~k-3, which cannot generate other degree distributions directly.The PLOD algorithm can construct a virtual social network that the degrees of the agents obey power-law distribution by assigning a degree to each agent.However, it cannot guarantee that the virtual social network is connected.To construct a connected virtual social network with specified degree centrality, we improve the PLOD algorithm with the BA model, which makes the degrees of the agents follow a power-law distribution.The algorithm is described as Algorithm 1.

    Algorithm 1.A connected social network construction with specified degree Input: n is the number of agents in the virtual social network.degree_max is the maximum degree of the social network.S1={n1,n2,…,nn},S2={},S3={},ni ,(i ∈{1,2,…,n})represent the agents in the social network.Output: a virtual connected social network in which the degrees of the agents follow power-law distribution.Description:Begin:Step 1.Generate a set of n integers{d1,d2,…,dn}that are consistent with the power-law distribution,where di is the degree of ni in S1 and max{d1,d2,…,dn}≤degree_max;Step 2.Randomly select an agent ni from S1 as the initial network and add it to S2,then delete ni from S1;Step 3.Randomly select an agent ni from S1 and link it to a random agent nk in S2 with probability α=(di+ dk)/ SUM(dj,where nj∈S1).di =di-1,dk= dk -1 (i∈[1,length(S1)] and k∈[1,length(S2)]);Step 4.if dg ==0(ng∈{ ni,nk }) then add ng to S3 ,else add agent ni to S2;Step 5.if S1 != {}then jump to Step 3 else jump to Step 6;Step 6.Random select two agents ni and nk from S2 whose degrees are not 0 and link them with probability α =(di+ dk)/SUM (dj,where nj∈S2).di= di-1, dk= dk -1;Step 7.if dg ==0(ng∈{ ni,nk }) then add dg to S3 ;Step 8.jump to Step 6 until S2= {};End

    In Algorithm 1, the agents are divided into three non-intersecting collections, S1, S2, and S3.S1is the collection of isolated agents in the social network, S2is the collection of the connected agents whose degrees are not zero in the virtual network, and S3is the collection of agents whose degrees are 0.The virtual social network grows up until S1= {} and S2= {}.The α →1 when |S2|→0.Therefore, the virtual social network constructed is a connected network.Also, the time complexity of Algorithm 1 is O(n2).Furthermore, we implement the method proposed in [34] to calculate the set {di} for the degrees of the agents.

    We assume that the{di}satisfies a power-law distribution p(di)∝di-β,and an upper limit M is assigned to degree_max in Algorithm 1.The purpose is to generate a set{di|di∈[1,M]∧diis an integer ∧p(di)∝di-β}.The cumulative distribution is

    Accordingly,Eq.(1)can be approximated by a continuous form,as

    The ratio of F(Δt)(Δt∈[1,M]) to F(M) is denoted by r,as

    0 ≤r ≤1 and

    If M →∞,then M1-β→0 and hence (4)can be approximated as

    For different β, the average intervals avg(Δt) is different.To exclude the bias influenced caused by avg(Δt),a correction factor u(β)is introduced to Eq.(5),as

    where u(β)satisfies

    For simplicity but without loss of generality,we set u(1)= 1, hence

    To sum up,given M and β,u(β)can be estimated directly.The set{di}can be generated by selecting a random r ∈[0,1]and then calculating Δtiby using Eq.(6).Furthermore,if Δt′is not an integer,we further rectify Δt′.Namely,Δt′=with probability Δt′-while Δt′=with probability-Δt′.The virtual relationship is established and maintained by the communication among agents.

    3.2 Web Behavior Simulation Algorithm

    We apply the SIR model to simulate the information dissemination process among the agents and meanwhile trigger the web behavior simulation, which is named the s-SIR algorithm as described in Algorithm 2.More specifically, the status of agents in the virtual social network is divided into three types,namely, susceptible agents,infected agents,recovered agents.

    Before describing our s-SIR algorithm, we first give the following definitions:

    1.In the initial state,each agent in the social network is susceptible.

    2.Each agent is irrational; in other words,it will infect all susceptible neighbors.

    3.Each infected agent will become a recovered agent after infecting all neighbors and will never be infected anymore.

    The infection process is implemented by one agent transferring a message to its neighbors one by one in the virtual social network.The agent is viewed as infected once it receives a specified message from a neighbor,and then replies to the same post after waiting a specified length of time.

    ?

    In Algorithm 2, each infected agent vi(i∈{1, 2,…, n}) will wait for the length of tibefore replying a message to an specific post of the same forum, and then send a message to each susceptible neighbors vjwith Breadth—First Search.At some point of time, multiple agents are performing web behavior simulations simultaneously.The length of waiting time ti(i = 1, …, n) also follows a power-law distribution.The calculation method of tiis given in the Eqs.(1)-(7).To simulate the web behavior realistically, we use an expansion factor γ to extend the web behavior simulation process.Namely, the length of the waiting time tiis expanded by γ times.

    To simulate collective user web behavior,a construction method of a virtual social network is proposed,of which the degrees of nodes follow a power-lower distribution.Next,a web behavior simulation method named s-SIR based on SIR has been designed to drive each agent performing a reply to the post in the virtual social network.Not only the distribution of agents’ degrees but also the time intervals of post behaviors follow a power-law distribution.In other words, we abstract an undirected graph G = {vi, di, ti} to describe the agents in the virtual social network, where diis the degree of vi, and tiis the length of waiting time from being infected to perform the simulation.Once the G is determined, the collective user web behaviors can be simulated,and finally,the degree and waiting time intervals follow a power-law distribution.

    4 Experiments

    In our experiments,we use a Docker container swarm to simulate the collective user.We deploy 6000 and 10000 Docker containers respectively to evaluate our proposed simulation method.First, the virtual social network constructed method is validated,and then we perform web behavior simulation in the virtual social network with our proposed s-SIR algorithm.Finally, a power-law function is used to fit test data, and the standard error is employed to evaluate the realistic of the simulation method.Our experiments demonstrate that the method is capable of simulating the collective user web behavior realistically.

    4.1Experiment Setup

    We deploy 12 high-perfor mance servers (Intel Xeon E5-2650 V4, 64G memory, 2 NICs and 2T hard disk) to conduct the experiments, of which 10 servers running Docker containers are used to perform collective user web behavior simulation and another server serves as a web server where a forum is deployed and the 12th server is used to generate the virtual social network and calculate the time of replying to the post of the forum.Each agent replies a message to the specific assigned post of the forum in the web server.The agent is implmented by one Docker container, and the Weave Net networking toolkit is employed to connect all the agents.The physical and logical topologies of the experiment is shown in Fig.2.

    Figure 2: (a)The physical topology of the experiment network.(b)The logical topology of the agent server

    As shown in Fig.2, the servers are connected by a router in physical while the agents (Docker containers) are connected by Open vSwitch, a virtual switch, controlled by Weave Net in logical.The implementations of Algorithms 1 and 2 are deployed in the control server and the agents, respectively, to perform the simulation.We deploy 10000 agents at most to evaluate our proposed method, and all the system clocks of the servers are synchronized by NTP before each round of the experiment.Furthermore,the clock synchronization error of 1000 Docker containers in one server is tested and the maximum error is less than 1 s.

    4.2 Calculation Time Comparison

    First,we compare the calculation time between the PLOD algorithm and the improved PLOD algorithm(Algorithm 1).The number of nodes ranges from 100 to 1000 with the same degree distribution function.The experimental result is shown in Fig.3.

    Figure 3: The comparison of the calculation time between the PLOD and improved PLOD

    As shown in Fig.3, the calculation time increases as the number of nodes increase.However, the improved PLOD algorithm grows slowly compared with the PLOD.For the improved PLOD algorithm,the maximum calculation time is 0.15 s with 1000 nodes, which is much less than that of the PLOD algorithm.

    4.3 Virtual Social Network Construction Experiment

    Next, we evaluate the virtual social network construction method with 1000 agents where β = 2.1 in Algorithm 1.The degree distribution and generated graph are demonstrated in Fig.4.

    Figure 4: (a) The distribution of the virtual social network log-log plot.(b) The graph of virtual social network

    In Fig.4a,the x-axis is the degrees of the agents,and the y-axis represents the number of times of the same degree that appears in the experiment.In the experiment,there are 44 different degrees from{1,2,…,292} for the 1000 agents.Furthermore, most degrees of the nodes are smaller and follow heavy-tailed distribution in the log-log plot.The power-law function appears as a straight line with slope k= -2.1.

    4.4 Time Interval Distribution Experiment

    In this section, we construct a virtual network with 6000 and 10000 agents, respectively.Firstly, one agent is randomly selected as the source of the infection.Then we drive the web behavior simulation according to the network topology and the length of waiting time.In this section, we set all the infected probability pj= 1 (j = 1, …, n), and the length of each waiting time ti(i = 1, …, n) is multiplied by expansion factor γ (γ = 1500) to extend the waiting time.Finally, we calculate the time intervals of the reply to the post.The time intervals are indirectly obtained from the database of the webserver of the forum.The time interval distribution of 10000 users is illustrated in Fig.5.

    Figure 5: (a)The distribution of time intervals of replies to the post with 10000 users.(b)The logarithmic plot of the time intervals of replies to the post with 10000 users

    As in Fig.5,the x-axis is the time interval and the y-axis is the number of counts of the time interval.We can conclude:

    1.Most of the time interval of agents are located in the tail part,

    2.The smaller the time interval,the larger the counts and

    3.The larger the time interval,the smaller the counts.

    We fit the pow-law function, which is y = 6640 × x-2.1, and the probability density function using logarithmic operations is y= -2.1 ×x +3.8 with standard error 0.0153.

    To compare with the simulation result of 10000 users, the experimental result of 6000 users is shown in Fig.6.

    Figure 6: (a) The distribution of time intervals of replies to the post with 6000 users.(b)The logarithmic plot of the time intervals of replies to the post with 6000 users

    As demonstrated in Fig.6a,the time intervals also exhibit a power-law distribution,which is similar to the 10000 user’s simulation.The probability density function using logarithmic operations is y=-2.0×x+3.7 with standard error 0.0156.Comparing Fig.6 with Fig.5,we can conclude that the standard error does not change obviously(less than 2%).Hence,the performance of the simulation method is stable.

    4.5 Standard Error Comparisons Experiment

    Finally,we perform extensive experiments to evaluate the standard error of the fitted pow-law function,in which β=3,4,5 in Algorithm 2 and the waiting time expansion factor γ=200,300,500,and 1500 with 6000 agents and 10000 agents,respectively.The experimental results are shown in Fig.7.

    Figure 7: (a)The standard error comparison with different β and γ under 6000 users.(b)The standard error comparison with different β and γ under 10000 users

    From Fig.7,we can conclude that the standard error does not increase obviously with the increase of the agents’ number.The max standard error appears when γ = 200 and β = 5 (Algorithm l) in both figures.Furthermore, the standard error grows as β increases when γ is fixed.The standard error decreases as γ increases when β is fixed.Furthermore, the simulation process lasts 37.1 h when β = 3 and γ = 1500 with 10000 agents, and 14.6 h with 6000 agents.So, the longer the waiting time, the better the fitting effect and the closer to the real collective user web behavior in a specific range of the length of waiting time.

    In our experiments,we first validate the connected social network construction algorithm with specified degree.Compared with the PLOD algorithm, the calculation cost of our proposed method is smaller and ensures that the generated social networked is connected.Base on the virtual social network, we then deploy 6000 and 10000 Docker containers with ten servers to simulate the collective user web behavior with the s-SIR algorithm respectively.By using UDP, we simulate the infection process that occurs among virtual users.The time intervals of the web behavior of the collective user are fitted to pow-law function with a lower standard error, which fits the human dynamics.From the experiments, we can conclude that the standard error is stable when increasing the scale of the users, and the standard error grows when increases β or decreases γ.

    5 Discussion and Conclusion

    In this work,we have studied the collective user’s web behavior simulation method and validated our proposed method by driving 6000 and 10000 agents to reply to a specific post of the same forum.First, a construction method of a virtual social network whose degrees follow a power-law distribution is proposed.Then, we use a new data structure G = {vi, di, ti} to describe the agents in the virtual network.Based on this network, we design an algorithm named s-SIR to drive each agent to perform web behavior simulation.A calculation method, which can generate a data collection following a power-law distribution, is implemented to create the degrees and the waiting time of the agents in the virtual social work.The degree collection is employed to construct the virtual social network, and the waiting time collection is used to control the message dissemination process by our s-SIR algorithm.We have ignored the time of information dissemination and the replies to the post due to the expansion factor γ is much longer than those time.The experimental results show that the time intervals of the web behavior follow a power-law distribution.

    To the best of our knowledge,this is the first work to study on the method of simulating the collective user web behavior in a real network environment.The study results can be widely employed in all kinds of network testbeds to construct a real network scenario in the construction of a large-scale users’ network behavior that follows human dynamics,such as mail behavior and web behavior.

    Since our work is the first research in the area of collective user network simulation,it comes with certain limitations.One is that we only simulate 1,0000 users’ web behavior because of the limitation of the hardware.Another possible limitation is that we cannot directly calculate the collection of power-law distribution for degree and waiting time given the distribution function of collective user behavior time interval.In the future, we may want to study the power-law distributions calculation method of degree and waiting time, given the collective user behavior distribution.

    Funding Statement:This research was supported by National Key Research and Development Plan under Grant 2017YFB0801804, Key Research and Development Plan of Shandong Province under Grant 2017CXGC0706, Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, frontier science and technology innovation of China under Grant 2016QY05X1002-2, national regional innovation center scientific and technological special projects Grant 2017QYCX14, University Coconstruction Project in Weihai City.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    男女边吃奶边做爰视频| 久久久午夜欧美精品| 黄色日韩在线| 亚洲欧美日韩东京热| 小蜜桃在线观看免费完整版高清| 99热精品在线国产| 淫妇啪啪啪对白视频| 久久精品国产亚洲av天美| 国产91av在线免费观看| 国产欧美日韩一区二区三区在线 | 国产 一区精品| 亚洲美女黄色视频免费看| 国产午夜精品久久久久久一区二区三区| 成人毛片a级毛片在线播放| 国产成人精品久久久久久| 高清午夜精品一区二区三区| 国产精品一区二区三区四区免费观看| 亚洲国产日韩一区二区| 国产一区二区三区综合在线观看 | 交换朋友夫妻互换小说| 成人毛片60女人毛片免费| 国产精品一区二区性色av| 亚洲av日韩在线播放| 边亲边吃奶的免费视频| 国产女主播在线喷水免费视频网站| 1000部很黄的大片| 在线观看av片永久免费下载| 亚洲精品自拍成人| 2022亚洲国产成人精品| 国产黄频视频在线观看| 国产一区二区三区av在线| 精品久久久久久久久亚洲| 欧美日韩视频精品一区| 日本色播在线视频| 久久精品国产自在天天线| 欧美日韩视频精品一区| 成人黄色视频免费在线看| 少妇丰满av| 亚洲美女视频黄频| 色吧在线观看| 日本与韩国留学比较| 国产黄频视频在线观看| av免费观看日本| 99热国产这里只有精品6| 国内揄拍国产精品人妻在线| 少妇人妻 视频| 一本色道久久久久久精品综合| 黑人高潮一二区| 精品久久久久久久久av| 精品一区在线观看国产| 丰满迷人的少妇在线观看| 嫩草影院新地址| 精品少妇久久久久久888优播| 校园人妻丝袜中文字幕| av卡一久久| videossex国产| 男人爽女人下面视频在线观看| 亚洲一级一片aⅴ在线观看| 日韩av不卡免费在线播放| 久久久亚洲精品成人影院| 亚洲一区二区三区欧美精品| 免费高清在线观看视频在线观看| 日产精品乱码卡一卡2卡三| 国产午夜精品久久久久久一区二区三区| 国产精品无大码| 亚洲天堂av无毛| 欧美bdsm另类| 精品久久久久久电影网| 一本—道久久a久久精品蜜桃钙片| 亚州av有码| 男女边吃奶边做爰视频| 丰满迷人的少妇在线观看| 日韩av不卡免费在线播放| 日韩av在线免费看完整版不卡| 亚洲真实伦在线观看| 亚洲熟女精品中文字幕| 最黄视频免费看| 亚洲av成人精品一二三区| 最近最新中文字幕免费大全7| 亚洲国产欧美在线一区| 多毛熟女@视频| 偷拍熟女少妇极品色| 久久精品久久精品一区二区三区| 日日摸夜夜添夜夜爱| 亚洲综合精品二区| 成年人午夜在线观看视频| a 毛片基地| 韩国av在线不卡| 日本黄色片子视频| 亚洲人成网站在线播| 亚洲精品乱码久久久v下载方式| 中文在线观看免费www的网站| 免费少妇av软件| 欧美老熟妇乱子伦牲交| 岛国毛片在线播放| 午夜福利在线观看免费完整高清在| 日韩欧美 国产精品| 国产精品成人在线| 男女下面进入的视频免费午夜| 一级毛片 在线播放| 色哟哟·www| 日韩成人av中文字幕在线观看| 美女内射精品一级片tv| 男人和女人高潮做爰伦理| 秋霞在线观看毛片| 纯流量卡能插随身wifi吗| 观看免费一级毛片| 小蜜桃在线观看免费完整版高清| 亚洲久久久国产精品| 成人亚洲欧美一区二区av| 午夜福利网站1000一区二区三区| av在线观看视频网站免费| 日本午夜av视频| 少妇人妻久久综合中文| 色婷婷av一区二区三区视频| 国产欧美另类精品又又久久亚洲欧美| 欧美少妇被猛烈插入视频| 午夜免费鲁丝| 久久午夜福利片| 最近的中文字幕免费完整| 国产v大片淫在线免费观看| av黄色大香蕉| 国产精品国产av在线观看| 黄色配什么色好看| 三级国产精品欧美在线观看| 亚洲精品,欧美精品| 日本wwww免费看| 在线观看三级黄色| 狂野欧美激情性xxxx在线观看| 卡戴珊不雅视频在线播放| 久久久色成人| 亚洲av综合色区一区| 国产大屁股一区二区在线视频| 国产午夜精品一二区理论片| 九草在线视频观看| 免费观看av网站的网址| 蜜臀久久99精品久久宅男| 亚洲美女视频黄频| 国产亚洲午夜精品一区二区久久| 免费观看性生交大片5| 高清欧美精品videossex| 国产亚洲一区二区精品| 又爽又黄a免费视频| 熟女av电影| 99视频精品全部免费 在线| 亚洲精品日韩在线中文字幕| 搡女人真爽免费视频火全软件| 国产精品免费大片| 在线观看免费高清a一片| 久久久久精品性色| 亚洲精品国产av蜜桃| 欧美97在线视频| 看免费成人av毛片| av网站免费在线观看视频| 99热国产这里只有精品6| 亚洲国产欧美人成| 一二三四中文在线观看免费高清| 女性被躁到高潮视频| 亚洲精品456在线播放app| 又黄又爽又刺激的免费视频.| 国产成人一区二区在线| 一级毛片黄色毛片免费观看视频| 亚洲一区二区三区欧美精品| 日韩制服骚丝袜av| 国产精品一区二区在线不卡| 亚洲精品国产av成人精品| 国产无遮挡羞羞视频在线观看| 久久久a久久爽久久v久久| 国产精品不卡视频一区二区| 高清午夜精品一区二区三区| 欧美日韩视频精品一区| 色哟哟·www| 一本久久精品| 嘟嘟电影网在线观看| 80岁老熟妇乱子伦牲交| 大陆偷拍与自拍| 国产黄频视频在线观看| 在线观看三级黄色| 午夜福利视频精品| 99热这里只有是精品在线观看| av在线老鸭窝| 看免费成人av毛片| 美女视频免费永久观看网站| 精品久久久噜噜| 五月开心婷婷网| 2022亚洲国产成人精品| 国产精品人妻久久久影院| 欧美zozozo另类| 麻豆乱淫一区二区| 又黄又爽又刺激的免费视频.| 欧美激情极品国产一区二区三区 | 亚洲欧美一区二区三区黑人 | 成人亚洲欧美一区二区av| 街头女战士在线观看网站| 自拍欧美九色日韩亚洲蝌蚪91 | 99久国产av精品国产电影| 国产欧美日韩一区二区三区在线 | 中文字幕精品免费在线观看视频 | 亚洲国产日韩一区二区| 天天躁夜夜躁狠狠久久av| 七月丁香在线播放| 啦啦啦中文免费视频观看日本| 乱系列少妇在线播放| 亚洲国产精品国产精品| 亚洲无线观看免费| av在线蜜桃| av免费在线看不卡| av卡一久久| 如何舔出高潮| 免费看不卡的av| 国产免费一级a男人的天堂| 99热网站在线观看| 最近中文字幕高清免费大全6| 少妇熟女欧美另类| 精品一区二区三卡| 欧美日韩综合久久久久久| 观看av在线不卡| 国产综合精华液| 少妇 在线观看| 日韩一区二区视频免费看| 亚洲第一区二区三区不卡| 九九久久精品国产亚洲av麻豆| 久久99热这里只频精品6学生| 在线 av 中文字幕| 久久精品国产鲁丝片午夜精品| 日本黄色日本黄色录像| 在线观看免费日韩欧美大片 | 国产精品人妻久久久久久| 国产高潮美女av| 色吧在线观看| av国产久精品久网站免费入址| 中文字幕制服av| 99国产精品免费福利视频| 国产极品天堂在线| 国产亚洲午夜精品一区二区久久| 色婷婷久久久亚洲欧美| 精品人妻一区二区三区麻豆| 不卡视频在线观看欧美| 国产精品偷伦视频观看了| 91久久精品国产一区二区三区| 在线 av 中文字幕| 日本欧美视频一区| 熟女电影av网| 国产精品秋霞免费鲁丝片| 久久97久久精品| 国产v大片淫在线免费观看| 麻豆成人av视频| 国产精品偷伦视频观看了| 成人影院久久| 在线免费观看不下载黄p国产| 精品视频人人做人人爽| 永久网站在线| 一本—道久久a久久精品蜜桃钙片| 欧美成人一区二区免费高清观看| 18禁动态无遮挡网站| 精品少妇黑人巨大在线播放| av播播在线观看一区| 丰满迷人的少妇在线观看| 国产精品一二三区在线看| kizo精华| 只有这里有精品99| 久久影院123| 99热6这里只有精品| av视频免费观看在线观看| 22中文网久久字幕| 国产亚洲午夜精品一区二区久久| 麻豆成人午夜福利视频| 国产色婷婷99| 永久网站在线| 国产国拍精品亚洲av在线观看| 2021少妇久久久久久久久久久| 涩涩av久久男人的天堂| 熟女电影av网| 99久久中文字幕三级久久日本| 一区二区三区乱码不卡18| 内地一区二区视频在线| 女性生殖器流出的白浆| 久久精品久久久久久噜噜老黄| 欧美成人a在线观看| 内地一区二区视频在线| 欧美最新免费一区二区三区| 日日撸夜夜添| 国内精品宾馆在线| 国产亚洲av片在线观看秒播厂| 亚洲经典国产精华液单| 成人国产麻豆网| 午夜福利视频精品| 国产乱人偷精品视频| 亚洲电影在线观看av| 又粗又硬又长又爽又黄的视频| 水蜜桃什么品种好| 在线播放无遮挡| av免费观看日本| 天天躁日日操中文字幕| 尤物成人国产欧美一区二区三区| 国产精品久久久久久久电影| 国产欧美另类精品又又久久亚洲欧美| 在线免费十八禁| 少妇的逼水好多| 成人国产麻豆网| 在线观看免费高清a一片| 尤物成人国产欧美一区二区三区| 国产有黄有色有爽视频| 少妇的逼好多水| 51国产日韩欧美| 中国美白少妇内射xxxbb| 哪个播放器可以免费观看大片| 免费观看无遮挡的男女| 99久久人妻综合| 亚洲欧美一区二区三区黑人 | 在线天堂最新版资源| 日韩三级伦理在线观看| a 毛片基地| 小蜜桃在线观看免费完整版高清| 中文字幕av成人在线电影| 一级毛片电影观看| 亚洲精品中文字幕在线视频 | 免费人成在线观看视频色| 欧美亚洲 丝袜 人妻 在线| 啦啦啦中文免费视频观看日本| 久久精品国产a三级三级三级| av.在线天堂| 欧美国产精品一级二级三级 | 亚洲精品中文字幕在线视频 | 国产伦精品一区二区三区四那| 黄片无遮挡物在线观看| 高清不卡的av网站| 又爽又黄a免费视频| 永久网站在线| 国产高清国产精品国产三级 | 免费观看a级毛片全部| 99久久综合免费| 亚洲国产毛片av蜜桃av| 日韩一本色道免费dvd| 免费观看性生交大片5| 国产大屁股一区二区在线视频| 久久久久久九九精品二区国产| 国产精品女同一区二区软件| 亚洲图色成人| 欧美精品一区二区大全| 一级二级三级毛片免费看| 久久久久久久大尺度免费视频| 国产高清不卡午夜福利| 国产亚洲午夜精品一区二区久久| 成人二区视频| 你懂的网址亚洲精品在线观看| 欧美少妇被猛烈插入视频| 一级av片app| 国产av精品麻豆| 欧美另类一区| 欧美日韩亚洲高清精品| 成年美女黄网站色视频大全免费 | 女性生殖器流出的白浆| 搡女人真爽免费视频火全软件| 婷婷色综合www| 青春草视频在线免费观看| 国产精品国产三级专区第一集| 高清不卡的av网站| 国产精品麻豆人妻色哟哟久久| 久久久午夜欧美精品| 91精品伊人久久大香线蕉| tube8黄色片| 亚洲精品日韩在线中文字幕| 啦啦啦中文免费视频观看日本| 日日啪夜夜爽| 久久久亚洲精品成人影院| 女人十人毛片免费观看3o分钟| 亚洲精品一区蜜桃| 国产女主播在线喷水免费视频网站| 青春草亚洲视频在线观看| 欧美极品一区二区三区四区| 国产高清不卡午夜福利| 一级a做视频免费观看| 中文字幕制服av| 在线看a的网站| 亚洲欧美日韩卡通动漫| tube8黄色片| 只有这里有精品99| 国产免费一区二区三区四区乱码| 另类亚洲欧美激情| 精品一区二区免费观看| 国产精品熟女久久久久浪| 亚洲国产精品999| 七月丁香在线播放| 秋霞在线观看毛片| 国产av精品麻豆| 噜噜噜噜噜久久久久久91| 精品亚洲乱码少妇综合久久| 亚洲av国产av综合av卡| 天美传媒精品一区二区| 成人美女网站在线观看视频| 欧美日韩视频精品一区| 久久久色成人| 欧美激情极品国产一区二区三区 | 男人和女人高潮做爰伦理| 国产探花极品一区二区| 丰满人妻一区二区三区视频av| 三级国产精品片| 精品熟女少妇av免费看| 深爱激情五月婷婷| 国产亚洲av片在线观看秒播厂| 在线观看免费日韩欧美大片 | av国产免费在线观看| 亚洲精品日本国产第一区| 成人高潮视频无遮挡免费网站| 久久人人爽人人爽人人片va| 中文字幕制服av| 男女边摸边吃奶| 精品久久久精品久久久| 人人妻人人爽人人添夜夜欢视频 | 亚洲欧美日韩无卡精品| 中文乱码字字幕精品一区二区三区| 女人久久www免费人成看片| 91久久精品国产一区二区三区| 97在线人人人人妻| 一区二区三区精品91| 中文字幕精品免费在线观看视频 | 深夜a级毛片| 久久久色成人| 国产白丝娇喘喷水9色精品| 搡老乐熟女国产| 丝袜喷水一区| 欧美日韩精品成人综合77777| 丝袜脚勾引网站| 黄色日韩在线| 观看美女的网站| 精品一品国产午夜福利视频| 日本vs欧美在线观看视频 | 国产乱来视频区| 一级毛片黄色毛片免费观看视频| 久久青草综合色| 国产av码专区亚洲av| 日韩成人av中文字幕在线观看| 青春草视频在线免费观看| 日韩av不卡免费在线播放| 欧美zozozo另类| 人人妻人人看人人澡| 日韩大片免费观看网站| 韩国高清视频一区二区三区| 三级国产精品欧美在线观看| 91精品伊人久久大香线蕉| 日韩成人伦理影院| xxx大片免费视频| 亚洲精品乱码久久久v下载方式| 中文欧美无线码| 国产成人aa在线观看| 一级毛片黄色毛片免费观看视频| 久久97久久精品| 91精品一卡2卡3卡4卡| 国产成人精品婷婷| 久久精品国产鲁丝片午夜精品| 精品人妻视频免费看| 久久久久国产精品人妻一区二区| 全区人妻精品视频| 91久久精品国产一区二区成人| 久久毛片免费看一区二区三区| 五月玫瑰六月丁香| av线在线观看网站| 亚洲精品日韩av片在线观看| 少妇 在线观看| 午夜福利网站1000一区二区三区| 成人无遮挡网站| 亚洲最大成人中文| 搡老乐熟女国产| 成人一区二区视频在线观看| 七月丁香在线播放| 精品99又大又爽又粗少妇毛片| 国产黄频视频在线观看| 熟女人妻精品中文字幕| 免费观看在线日韩| 国模一区二区三区四区视频| 国产欧美亚洲国产| 丰满迷人的少妇在线观看| 国产伦精品一区二区三区四那| 爱豆传媒免费全集在线观看| 99久久人妻综合| 精品国产乱码久久久久久小说| 欧美丝袜亚洲另类| 中文字幕av成人在线电影| 日本欧美国产在线视频| 99视频精品全部免费 在线| 亚洲aⅴ乱码一区二区在线播放| 91狼人影院| 国产精品爽爽va在线观看网站| 免费人成在线观看视频色| 久久久久视频综合| 老师上课跳d突然被开到最大视频| 亚洲欧洲国产日韩| 亚洲精品国产av蜜桃| 精华霜和精华液先用哪个| 久久精品久久久久久久性| 国产黄色免费在线视频| 黄色视频在线播放观看不卡| 三级国产精品欧美在线观看| 午夜福利影视在线免费观看| 久久国产精品大桥未久av | 日韩免费高清中文字幕av| 黄色日韩在线| 国产成人免费无遮挡视频| 日本黄色日本黄色录像| 视频中文字幕在线观看| 欧美日本视频| 成人特级av手机在线观看| 国产淫语在线视频| 高清av免费在线| 男人添女人高潮全过程视频| 精品午夜福利在线看| 99热这里只有是精品50| 99热网站在线观看| 国产乱人偷精品视频| 亚洲国产av新网站| 亚洲美女搞黄在线观看| 亚洲美女视频黄频| 欧美高清性xxxxhd video| 亚洲欧美成人综合另类久久久| 国产91av在线免费观看| 精品国产乱码久久久久久小说| 国产精品蜜桃在线观看| 国产一区二区三区av在线| 亚洲av综合色区一区| 国产一区二区三区av在线| 超碰97精品在线观看| 国产 一区精品| 极品教师在线视频| 一区在线观看完整版| 一级av片app| 免费观看a级毛片全部| 国产一级毛片在线| 五月伊人婷婷丁香| 亚洲av不卡在线观看| 国内揄拍国产精品人妻在线| 亚洲不卡免费看| 亚洲伊人久久精品综合| 精品人妻一区二区三区麻豆| 国产精品一及| 国产精品麻豆人妻色哟哟久久| 亚州av有码| 欧美97在线视频| 国产男女内射视频| 在线观看免费视频网站a站| 97在线视频观看| 亚洲精华国产精华液的使用体验| 久久影院123| 国产精品99久久久久久久久| 最近中文字幕高清免费大全6| 免费大片黄手机在线观看| 美女福利国产在线 | 一本色道久久久久久精品综合| 在线观看一区二区三区激情| 日韩中文字幕视频在线看片 | 欧美精品国产亚洲| h视频一区二区三区| 国产高清国产精品国产三级 | 18禁在线播放成人免费| 十八禁网站网址无遮挡 | 国产精品久久久久成人av| 成人毛片60女人毛片免费| 国产成人aa在线观看| 国产精品国产三级专区第一集| 欧美丝袜亚洲另类| 一区在线观看完整版| 亚洲美女搞黄在线观看| 亚洲av.av天堂| 免费少妇av软件| 多毛熟女@视频| 人妻一区二区av| 一二三四中文在线观看免费高清| 免费av不卡在线播放| 亚洲欧美清纯卡通| 国产高潮美女av| 人妻系列 视频| 五月伊人婷婷丁香| 亚洲国产精品国产精品| 黑人高潮一二区| 久久久精品免费免费高清| 青春草亚洲视频在线观看| 久久亚洲国产成人精品v| 91在线精品国自产拍蜜月| .国产精品久久| 毛片女人毛片| 中文字幕av成人在线电影| 人妻系列 视频| 黄片wwwwww| 国产亚洲av片在线观看秒播厂| 日韩av免费高清视频| 欧美日本视频| 亚洲,一卡二卡三卡| 欧美区成人在线视频| 中文乱码字字幕精品一区二区三区| 男女边摸边吃奶| 国产精品伦人一区二区| 国产精品av视频在线免费观看| 乱码一卡2卡4卡精品| 2018国产大陆天天弄谢| 亚洲无线观看免费| 亚洲aⅴ乱码一区二区在线播放| 国产有黄有色有爽视频| 国产黄色视频一区二区在线观看| 国产精品福利在线免费观看| 免费黄网站久久成人精品| av免费在线看不卡| 久久久精品免费免费高清| 久久久久久久精品精品| 色网站视频免费| 国产人妻一区二区三区在| 免费人妻精品一区二区三区视频| 在线亚洲精品国产二区图片欧美 | 中文天堂在线官网| 国产精品国产三级国产专区5o| 日韩中字成人| 国产 一区 欧美 日韩| 有码 亚洲区| 麻豆成人av视频| 美女内射精品一级片tv| 身体一侧抽搐|