• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference

    2021-12-16 06:39:02YichaoZangTairanHuTianyangZhouandWanjiangDeng
    Computers Materials&Continua 2021年3期

    Yichao Zang, Tairan Hu,Tianyang Zhou and Wanjiang Deng

    1State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450000,China

    2National Engineering Technology Research Center of the Digital Switching System, Zhengzhou,450000, China

    3NUS Business School,National University of Singapore, Singapore, 119077,Singapore

    Abstract:Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration testing.Associative rule mining, a data mining technique, has been studied and explored for a long time.However, few studies have focused on knowledge discovery in the penetration testing area.The experimental result reveals that the long-tail distribution of penetration testing data nullifies the effectiveness of associative rule mining algorithms that are based on frequent pattern.To address this problem, a Bayesian inference based penetration semantic knowledge mining algorithm is proposed.First, a directed bipartite graph model, a kind of Bayesian network, is constructed to formalize penetration testing data.Then, we adopt the maximum likelihood estimate method to optimize the model parameters and decompose a large Bayesian network into smaller networks based on conditional independence of variables for improved solution efficiency.Finally, irrelevant variable elimination is adopted to extract penetration semantic knowledge from the conditional probability distribution of the model.The experimental results show that the proposed method can discover penetration semantic knowledge from raw penetration testing data effectively and efficiently.

    Keywords: Penetration semantic knowledge; automated penetration testing;Bayesian inference;cyber security

    1 Introduction

    With the increasing size of computer networks and complexity of information systems, security problems faced by corporations have become much more prominent than ever [1].Penetration testing, as a common security check approach, is widely used in discovering attack paths existing in computer networks to improve the security level of systems.Penetration testing aims to obtain control over specific computers in a target network.Usually, it starts with a controlled computer, based on which hackers try to gather computer and network information through scanners and vulnerability exploitation.After gathering information, hackers choose the best vulnerability exploitation program to penetrate the target host.Even though penetration testing could discover attack paths hidden in network, the quality of penetration testing depends heavily on the security expert’s experience,and it has become a popular topic to automate penetration testing in both academic and engineering areas[2].Mining semantic knowledge hidden in raw penetration testing data is an essential part of the solution for automated penetration testing.Penetration semantic knowledge is a kind of mapping relation {software: version→vulnerability} which means that the specific version of the software may cause the vulnerability, based on which we could choose the corresponding vulnerability exploitation program to control the host when faced with the specific version of the software.Existing studies have extracted penetration semantic knowledge by transforming specific vulnerability database such as metasploit and nessus.There are two disadvantages to this kind of approach: one is that the semantic knowledge extracted from a specific vulnerability database does not match the information gathered through scanners, for example, the operating system information gathered by nmap scanner is windows_7_sp1 for vulnerability numbered cve-2019-0708(common vulnerability and exposure, cve), but the operating system description of vulnerability numbered cve-2019-0708 in metasploit is windows_7 sp1.Even though they look similar(windows_7_sp1 and windows_7 sp1), they do not match each other, missing the knowledge rule{windows_7 sp1→cve-2019-0708} during penetration testing.The other is that the penetration semantic knowledge becomes tedious without considering information gathered through multiple scanners.During penetration testing, multiple tools are used to gather information to form intact knowledge, meaning that the penetration semantic knowledge is composed of multiple sources, and transforming a specific vulnerability database can not meet the demand.Tab.1 shows an example of host configuration and vulnerability information gathered by nmap and shodan scanners [3].It indicates that the software Apache:2.4, OpenSSH:7.4 and CCMPlayer:1.5 are installed on the host, the operating system is either windows xp sp3 or windows 7, and there is also a vulnerability numbered cve-2011-5170 on the host.The penetration knowledge hidden in the raw data is {CCMPlayer:1.5, windows xp sp3→cve-2011-5170}which means that when faced with the software CCMPlayer:1.5 and the operating system windows xp sp3, the vulnerability exploitation program corresponding to cve-2011-5170 could be used to control the target host.In summary, the aim of penetration semantic knowledge mining is to discover all of these reliable mapping relations existing in raw penetration testing data gathered by multiple scanners.

    Table 1: Example of scanned configuration and vulnerability information for a single host through nmap and shodan scanners

    Considering the problems with current penetration semantic knowledge mining methods, this paper applies Bayesian inference techniques to mine semantic knowledge from raw penetration testing data.The remainder of the paper is organized as follows.Section 2 presents related works involving associative rule mining algorithms that could be used to mine penetration semantic knowledge.Section 3 introduces some definitions, and the problem statement is given.Section 4 presents the proposed Bayesian inference based penetration semantic knowledge mining algorithm.In Section 5, the details of penetration testing data are analysed, and the performance of associative rule mining algorithms is compared to the performance of the proposed method on the same data.Section 6 summarizes the study and notes some future research objectives.

    2 Related Works

    Associative rule mining [4], which was first proposed by Argawal et al., aims to discover itemsets that appeared frequently, and this approach is similar to penetration semantic knowledge mining.The Apriori algorithm [5] was the first algorithm used to mine associative rules by generating candidate frequent itemsets.However, this method has high computational complexity because of the large number of database scan operations required.Han et al proposed the FP-Growth [6] algorithm to address this problem, in FP-Growth,an FP-tree structure is created to avoid database scan operations.However, the FP-Growth algorithm is limited to small-scale databases because of the extremely high memory consumption.Qin et al.[7] proposed compact FP-tree to mine associative rules to avoid conditional FP-tree generation to decrease memory consumption.Zaki proposed the Eclat [8] algorithm, which can mine associative rules by applying set union operations based on a vertical database structure.Pei proposed another memory-based associate rule mining algorithm, H-mine [9], based on an H-struct structure.H-mine achieves frequent pattern mining by partitioning data so that it can mine scalable databases.Deng proposed a data structure called N-list for a cache database, and the PrePost [10] algorithm was proposed based on N-list.Deng also adopted childrenparent equivalence to prune search branches in PrePost, which effectively reduced the number of candidate frequent itemsets [11].Because the N-list structure requires high memory consumption for both pre-traversal and post-traversal information, Deng proposed the NodeSets structure [12] to store pre-traversal information to mine associative rules; this approach reduced memory consumption by 50%.Aryabarzan et al.proposed another prefix tree structure, NegNodeSet [13], and adopted bitmap technology to mine associative rules.In addition, some researchers adopted high utility itemset mining techniques to achieve associative rule mining.The two-phase algorithm [14] is a famous and classical candidate based high utility itemset mining algorithm that is composed of two phase: the first phase prunes the search space and generates candidates by the proposed transaction weight downward closure property, and the second phase scans the database to filter high utility itemset from high transaction weight utility itemsets identified in phase I.Vincent et al.proposed an algorithm named UP-Growth[15]to mine high utility itemset,this algorithm can construct a utility pattern tree from databases based on DGU(discarding global unpromising items), DGN(discarding global node utility), DLU(discarding local unpromising items) and DLN(discarding local node utility) strategies to prune the search spaces.Even though many tricks have been proposed to prune search spaces, there are still many candidate itemsets waiting to be tested in phase II, which will consume a large amount of memory and time.To overcome these problems, Liu et al.proposed an algorithm called HUI-Miner [16] to mine high utility itemsets without generating candidates.HUI-Miner uses a novel structure called utility-list to store both utility information and heuristic information of the itemset for pruning the search space.Based on the utilitylist, the high utility itemsets can be mined by joining utility lists instead of by scanning the database, which decreases the mining time.Further, Krishnamoorthy et al.[17] proposed an algorithm called HUP-Miner that employs two novel pruning strategies to prune search spaces.Peng et al.utilized IHUP tree structure [18] to guide the itemset expansion process to avoid considering itemsets that are nonexistent in the database.Although associative rule mining algorithms can be used to mine penetration semantic knowledge from penetration testing data,the effect is not ideal.Notably,some host configuration and vulnerability information does not meet the requirements for frequent patterns.

    3 Definitions and Problem Statements

    3.1 Definitions

    Definition 1.Given itemset I ={i1,i2,···,in} and database DB={T1,T2,···,Tm} where Ti,1 ≤i ≤m is a transaction that satisfies Ti?I, for any itemset A ?I, A is contained by transaction Tiwhen A ?Tiholds.The support of A is the number of transactions containing A, denoted as sup(A).A is called a frequent itemset if sup(A)≥ξ for any specified minimal support ξ.

    Definition 2.A Bayesian network is a kind of probabilistic graphical model, denoted as G={V,E},where V is a set of random variables and E is a set of dependence relationships among variables, denoted as p(v|π(v)); π(v) is set of parent nodes of v.A Bayesian network is used to represent cause-effect relationships, denoted as <π(v), v >∈E; the specific value for π(v) is the cause, and v is the effect.Thus, <π(v)=a,v=b >has a strong causal effect if p(<π(v)=a,v=b >)≥α holds.

    Definition 3.d-separation can be defined as follows:Given a Bayesian network G={V,E}and a set X,Y,Z ?V, where each pair is disjoint, for each path between X and Y, Z d-separates X and Y under the following three conditions: (1) There is one node a that belongs to Z in the path, and the two neighbours b and c, which are in sets X and Y, respectively, follow the same edge direction <b,a ><a,c >or <a,b ><c,a >.(2) There is one node a that belongs to Z in the path, and the two neighbours b and c are in sets X and Y, respectively, with the inverse edge direction <a,b ><a,c >.(3) There is one node a in the path, the node and its descendants do not belong to Z, the two neighbors b and c are in sets X and Y,respectively,and the edge direction satisfies <b,a ><c,a >.

    Definition 4.A directed bipartite graph G={V,E} is a kind of special Bayesian network for which V can be divided into two disjoint sets A and B.For each edge <vm,vn>∈E in the graph, vmbelongs to A,and vnbelongs to B.

    3.2 Problem Statement

    Penetration semantic knowledge mining aims to discover associative rules from vast amounts of penetration testing data, including rules for open ports, services, operating systems, etc.There are two problems with penetration semantic knowledge mining: One is that there is much more irrelevant penetration semantic knowledge than critical knowledge data, and the other is that there are many invalid rules that can not be used to improve the efficiency of automated penetration testing.Therefore,penetration semantic knowledge mining aims to discover rare penetration knowledge while avoiding redundant and low-value penetration testing data.

    4 Penetration Semantic Knowledge Mining

    4.1 Model

    Considering the above problem,we adopted a Bayesian network to formalize penetration testing data,and the maximum likelihood estimation method was adopted to retrieve parameters.Finally, we adopted a variable elimination method to retrieve the probability of each mined rule and discover all penetration testing knowledge of interest.The steps are described as follows.

    Step 1: Given host configuration information A=Aiand vulnerability information B=Biwhere i=1,···,k is the host identifier, the Bayesian network is composed of union set A ∪B, where A is set of conditional nodes with host configuration information for the operating system, application, etc.,and B is a set of deductive nodes of host vulnerabilities.The Bayesian network is constructed by adding all directed edges <vm,vn>, where vm∈Aiand vn∈Bi.Because there are only edges from the conditional node to the deductive node, the constructed Bayesian network is actually a directed bipartite graph, as shown in left panel of Fig.1.

    Figure 1: Bayesian inference based penetration knowledge discovery.The left panel shows a Bayesian network model based on original penetration data and the right panel shows penetration knowledge inferred based on a Bayesian network model constructed with the method below

    Step 2: The parameters of the directed bipartite graph can be described with a conditional probability distribution p(v|π(v)), where π(v), the set of conditional nodes, is the parent set of deductive node v.If π(v) is empty, then the conditional probability distribution reduces to the initial probability distribution.Finally, the parameters of the directed bipartite graph can be described as set θ, where each element in θ is represented as

    which is the probability of vulnerability b conditioned on a combination of host configurations a.Concretely,this value is the probability of vulnerability cve-2017-0472 occurring when windows 10 and the IE 10 browser are installed on a host.Given the constructed Bayesian network, the parameter θabis expressed as follows by optimizing the maximum likelihood function.

    where p(Dl|θ)is the probability of record Dlbased on θ.

    Step 3: Given the maximum likelihood function L(θ|D), we can optimize the objective function to retrieve parameter θab, based on which we can obtain the probability for each expression<π′(v)=a,v=b > by simplifying irrelevant variables, where π′(v)?π(v).If the probability of<π′(v)=a,v=b >is larger than the user-specified threshold α, the penetration testing rule of interest is established; otherwise, it is not.Specifically, as shown in right panel of Fig.1,the host is influenced by vulnerability b with high probability when the combined host configuration is a.The algorithm for constructing the directed bipartite graph is shown in Alg.1.

    Algorithm 1.Directed bipartite graph construction algorithm

    4.2 Penetration Semantic Knowledge Mining Algorithm

    In this section, we introduce the use of penetration testing data to calculate the parameters of the Bayesian network and improve the parameter solution efficiency through d-separation.However, we first introduce the following theorem.

    Theorem 1: Given a directed bipartite graph G(V, E), where V =A ∪B, A is set of conditional nodes,and B is a set of deductive nodes.P(a,b|M)=P(a|M)P(b|M) holds for every two nodes a,b ∈B and set of conditional nodes M ?A.

    Proof.First,we prove that P(a,b|m)=P(a|m)P(b|m)holds for each conditional node m ∈M.Because the Bayesian network G is a directed bipartite graph, there are three kinds of relations between m and a, b.(1)Both<m,a >and <m,b >belong to E.(2)One and only one of <m,a >or <m,b >belongs to E.(3)Neither <m,a > or <m,b > belongs to E.For (1), m is the branch node of a and b, and P(a,b|m)=P(a|m)P(b|m) holds.For (2), assuming that <m,a >∈E, there is no connection between b and a, m; therefore, b is independent from a and m, so P(a,b|m)=P(a|m)P(b)=P(a|m)P(b|m) holds.For (3), there are no connections among a, b and m, so these nodes are independent from each other, and we can conclude that P(a,b|m)=P(a,b)=P(a)P(b)=P(a|m)P(b|m).For an arbitrary node m,P(a,b|M)=P(a|M)P(b|M) holds.

    Theorem 1 indicates that the parameter solution process for a large Bayesian network can be divided into many smaller processes to improve efficiency.By assuming that the Bayesian network constructed from penetration testing data D={Dl|1 ≤l ≤n} is denoted as G (V, E), the maximum likelihood function L(θ|D)can be expressed as follows:

    where ?(i,j,k) is the number of records that satisfy π(vi)=j and vi=k.We can optimize the objective function and obtain the parameter as follows:

    representing the ratio of records for which the value of viis k,the value of the corresponding parent π(vi)is j,and all possible values of viare considered.Assuming that the obtained parameter set is denoted as θ={θ1::,θ2::,···θn::} where θi::=p(vi|π(vi)) is the conditional probability distribution of node vi, we need to implement a variable elimination process [19] to retrieve key factors.Assuming that the sequence of variable elimination is denoted as ρ,ρ ?π(vi)/π′(vi), for each variable z ∈ρ, the probability distribution of node vican be represented as θi::=p(vi|π(vi))={p1,p2,···,pm} according to the definition of θi::, where m is the number of free variables.Let g =pibe the function of variable z in the Bayesian network, d be the number of free variables containing z in the probability distribution set of vi,and h=be the probability distribution function after eliminating variable z and adding it back to θi::.Then, ρ is iterated until it is an empty set to obtain all possible penetration semantic rules with probabilities larger than a user-specified support value α.The final penetration semantic knowledge mining algorithm is shown as follows.

    Algorithm 2.Penetration semantic knowledge mining algorithm

    5 Experiments

    In this section,we compare our proposed algorithm with other associative rule mining algorithms based on four real penetration testing datasets.

    5.1 Metric

    The experimental metric adopted is the ROC curve, which is used to evaluate the performance of algorithms.This curve is composed of two parts, the true positive ratio (TPR) and false positive ratio(FPR), and corresponding formulas are shown as follows:

    where P is the set of all true knowledge rules,N is the set of all false knowledge rules and D is the set of all mined knowledge rules.

    5.2 Dataset

    The experimental datasets encompass four services,namely,Apache,IIS,MySQL and nginx,containing host configuration information and vulnerability information.The process used to collect this information is described as follows.First, we collect host IPs containing these services through a zoomeye scanner [20].Then, we collect host configuration information for each IP with an nmap scanner.Last, we use a shodan scanner to collect vulnerability information for each IP and merge this information with the host information collected above to form an intact penetration testing record for each IP.To describe the distribution characteristics, we plot the information in Fig.2, from which we can see that the plot of the number of vulnerabilities has a long-tail.There are many vulnerabilities that have a few records.The number of records for most vulnerabilities is limited within 10, and the records for the vulnerability type account for approximately 17.5% of those of all vulnerabilities.The comparative algorithms are implemented based on SPMF [21] and include the Apriori, FP-Growth, LCMFreq and PrePost +algorithms.The support of the algorithm ranges from 0.2 to 0.8 and the host configuration is a Core-i7-8750H12 with 64GB of memory.

    Figure 2: Quantity distribution of host vulnerability regarding to record number

    5.3 Results and Analysis

    This section compares the proposed algorithm with traditional associative rules mining algorithms based on accuracy and efficiency.The accuracy of algorithms versus the support based on the Apache dataset is shown in Tab.2, from which we can see that the accuracy of most associative rule mining algorithms is low, at less than 2%.Notably, the data have a long-tailed distribution, and most of the cases have low support, causing the associative rule mining algorithms to fail.However, the proposed algorithm displays better performance than the other algorithms, with the highest accuracy reaching 98.22%.The accuracy decreases with increasing support because the higher the support level is, the fewer the number of knowledge rules provided for the support.

    Table 2: Comparison of the accuracy ratio for penetration testing knowledge discovery based on the Apache dataset with different support levels

    As accuracy cannot reflect all aspects of performance,we adopt receiver operating characteristic curves(ROC)analysis to describe the performances of the algorithms,as shown in Fig.3.The performance of the algorithms is assessed based on four experimental datasets,where(a),(c),(e)and(g)display the performance for support values ranging from 0.2 to 0.8 and(b),(d),(f)and(h)are locally enlarged regions of(a),(c),(e)and(g)respectively.Because of the memory corruption problem,there is no line representing FP-Growth on IIS and nginx datasets.Furthermore,from(a),(c),(e)and(g),we can see that the ROC curve is sensitive to the support parameter.Although the ROC curve is a similar curve to the standard line,this similarity does not mean that the proposed algorithm is a random algorithm because mining penetration semantic knowledge rules from large quantities of penetration testing data is not a simple classification task.Moreover, the ROC curves of the comparative associative rule mining algorithms show a “cluster” phenomenon,and the accuracy is low regardless of the value of the support parameter.This phenomenon illustrates that associative rule mining algorithms are not suitable for penetration semantic knowledge mining problems,and the performance of these methods is far less than the performance of the proposed method.Additionally, the locally enlarged plots show that the Apriori algorithm performs better than other associative rule mining algorithms, but the corresponding accuracy is still less than 2%, which is far from meeting the requirements for penetration semantic knowledge mining.To obtain the best support for the proposed algorithm, we adopt the Youden index [22] to evaluate the performance of the proposed algorithm based on two different support levels.The Youden index formula is shown as follows:

    Figure 3: Receiver operating characteristic curves and locally enlarged receiver operating characteristic curves of different algorithms for each dataset.(a) Apache.(b) Apache detail.(c) IIS.(d) IIS detail.(e)MySQL.(f) MySQL detail.(g)Nginx.(h)Nginx detail

    The performance of the Youden index based on the Apache dataset is shown in Tab.3,from which we can see that the critical value is 0.0559, meaning that the best support parameter is 50%.When the best support parameter is used,the TPR improves,and the FPR decreases.

    Furthermore,we compared the memory and CPU consumption of algorithms on the Apache dataset.The performance is shown in Fig.4, where each bottom point is used to differentiate support.Fig.4 shows that associative rule mining algorithms have similar memory consumption, and the PrePost + algorithm consumes the most memory (approximately 1080 MB).The proposed algorithm has a similar memory consumption of approximately 1250 MB.Regarding CPU consumption, the proposed algorithm consumes less memory than the compared associative rule mining algorithms, with a reduction of approximately 1.8%.What causes this difference is that the proposed algorithm transforms the parameter solution problem into a statistical problem so that the computational complexity is considerably reduced, thus decreasing CPU consumption.

    Table 3: Comparison of Youden index values for the proposed algorithm based on the Apache dataset

    Figure 4: Comparison of memory and CPU consumption for each data mining algorithm based on the Apache dataset.(a) Apriori.(b)FP-Growth.(c) LCMFreq.(d) PrePost+.(e) Bayesian inference

    6 Conclusion

    Considering the problem of mining penetration semantic knowledge to automate penetration testing,this paper proposed a Bayesian inference based penetration semantic knowledge mining algorithm.First, a Bayesian network model is constructed according to penetration testing data, and the parameter solution process divides the whole network into smaller subnetworks according to independence analysis, after which the variable elimination method is adopted to retrieve penetration semantic knowledge.The experimental results show that the proposed method is superior to other associative rule mining algorithms.Moreover, there are still some tasks that could contribute to this work such as adopting domain knowledge in penetration semantic knowledge mining to improve the accuracy and decreasing computational complexity through parallel techniques.

    Funding Statement:This research was supported by the National Natural Science Foundation of China No.61502528.

    Conflicts of Interest:We declare that there are no conflicts of interest to report regarding the present study.

    在线免费观看的www视频| 久久青草综合色| 少妇 在线观看| 美女高潮喷水抽搐中文字幕| 亚洲av日韩精品久久久久久密| 18美女黄网站色大片免费观看| 日本vs欧美在线观看视频| xxx96com| 国产精品免费视频内射| 亚洲精品一区av在线观看| 天堂√8在线中文| www.www免费av| 国产亚洲欧美精品永久| 国产乱人伦免费视频| 国产在线观看jvid| 亚洲av第一区精品v没综合| 美女 人体艺术 gogo| 级片在线观看| 成人特级黄色片久久久久久久| 午夜福利欧美成人| 男女之事视频高清在线观看| 亚洲欧美激情综合另类| 美国免费a级毛片| 日韩精品青青久久久久久| 亚洲国产看品久久| 国产一区二区在线av高清观看| 老鸭窝网址在线观看| av超薄肉色丝袜交足视频| 成人亚洲精品av一区二区 | 日本黄色日本黄色录像| 久99久视频精品免费| 国产成人av激情在线播放| 国产精品1区2区在线观看.| 波多野结衣高清无吗| 长腿黑丝高跟| 国产精品秋霞免费鲁丝片| 啦啦啦在线免费观看视频4| 超碰97精品在线观看| 亚洲精品一二三| 老鸭窝网址在线观看| 人妻久久中文字幕网| 欧美 亚洲 国产 日韩一| 人人妻,人人澡人人爽秒播| 国产黄a三级三级三级人| 大香蕉久久成人网| 日韩大尺度精品在线看网址 | 久久精品国产清高在天天线| 久久精品成人免费网站| 50天的宝宝边吃奶边哭怎么回事| 成人av一区二区三区在线看| 久久中文看片网| 午夜福利在线观看吧| 精品久久久久久成人av| 一区二区三区激情视频| 欧美老熟妇乱子伦牲交| 日韩大码丰满熟妇| xxxhd国产人妻xxx| 午夜精品国产一区二区电影| 黄色视频,在线免费观看| 人人妻人人澡人人看| av国产精品久久久久影院| 久久久久久免费高清国产稀缺| 亚洲激情在线av| 1024视频免费在线观看| 丰满人妻熟妇乱又伦精品不卡| 欧美日韩瑟瑟在线播放| 村上凉子中文字幕在线| 久久人妻福利社区极品人妻图片| 国产精品亚洲av一区麻豆| 老司机深夜福利视频在线观看| 91成人精品电影| 国产有黄有色有爽视频| 欧洲精品卡2卡3卡4卡5卡区| 又紧又爽又黄一区二区| 国产欧美日韩精品亚洲av| 99在线视频只有这里精品首页| 亚洲欧美日韩高清在线视频| 久久欧美精品欧美久久欧美| 嫩草影院精品99| 国产国语露脸激情在线看| 久久国产亚洲av麻豆专区| 999久久久国产精品视频| 亚洲中文av在线| 日本wwww免费看| 精品国产国语对白av| 国产男靠女视频免费网站| 国产一区二区三区在线臀色熟女 | 国产真人三级小视频在线观看| 满18在线观看网站| 中出人妻视频一区二区| 老熟妇乱子伦视频在线观看| 岛国视频午夜一区免费看| 国产av又大| 欧美最黄视频在线播放免费 | 久久性视频一级片| 国产成人精品久久二区二区免费| 国产不卡一卡二| 1024视频免费在线观看| 一级毛片高清免费大全| 啦啦啦免费观看视频1| 啪啪无遮挡十八禁网站| 久久热在线av| 国产精品影院久久| 日本免费a在线| 自拍欧美九色日韩亚洲蝌蚪91| 欧美激情久久久久久爽电影 | 免费看十八禁软件| 国产成人免费无遮挡视频| 波多野结衣高清无吗| 午夜亚洲福利在线播放| 国产aⅴ精品一区二区三区波| 一区二区三区激情视频| 俄罗斯特黄特色一大片| 熟女少妇亚洲综合色aaa.| 一级a爱视频在线免费观看| 1024香蕉在线观看| 日本wwww免费看| 日韩国内少妇激情av| 在线观看一区二区三区| 久久久国产成人免费| 热re99久久国产66热| 欧美日本亚洲视频在线播放| 国产精品久久视频播放| 国产成人免费无遮挡视频| 涩涩av久久男人的天堂| 18美女黄网站色大片免费观看| 人人澡人人妻人| 午夜视频精品福利| 亚洲国产精品一区二区三区在线| 国产成人av激情在线播放| 伊人久久大香线蕉亚洲五| 99国产综合亚洲精品| 欧美中文日本在线观看视频| 女同久久另类99精品国产91| 90打野战视频偷拍视频| 欧洲精品卡2卡3卡4卡5卡区| 超色免费av| 怎么达到女性高潮| 国产三级在线视频| 亚洲精华国产精华精| 黄片播放在线免费| 国产av在哪里看| 狠狠狠狠99中文字幕| 久久伊人香网站| 亚洲三区欧美一区| 叶爱在线成人免费视频播放| 美女扒开内裤让男人捅视频| 不卡一级毛片| 日韩视频一区二区在线观看| 午夜成年电影在线免费观看| 午夜视频精品福利| 香蕉丝袜av| 欧洲精品卡2卡3卡4卡5卡区| 18禁观看日本| 免费观看人在逋| www.精华液| 亚洲精品中文字幕在线视频| 男女之事视频高清在线观看| 一级毛片女人18水好多| 免费少妇av软件| 国产成人影院久久av| 欧美最黄视频在线播放免费 | 操出白浆在线播放| 日韩国内少妇激情av| 国产免费av片在线观看野外av| 欧美精品一区二区免费开放| 国产精品乱码一区二三区的特点 | 亚洲一区二区三区欧美精品| 看黄色毛片网站| 亚洲美女黄片视频| 男人操女人黄网站| 超碰成人久久| 久久精品影院6| 别揉我奶头~嗯~啊~动态视频| 男男h啪啪无遮挡| 亚洲国产毛片av蜜桃av| 一区二区三区精品91| av国产精品久久久久影院| av天堂在线播放| 久久人妻福利社区极品人妻图片| 午夜免费鲁丝| 91字幕亚洲| 亚洲av成人av| 国产成人欧美在线观看| 亚洲三区欧美一区| 男女下面插进去视频免费观看| 国产aⅴ精品一区二区三区波| 波多野结衣高清无吗| 大型av网站在线播放| 亚洲欧美日韩高清在线视频| 国产主播在线观看一区二区| 亚洲欧美激情综合另类| 黑人巨大精品欧美一区二区mp4| 久久香蕉国产精品| 老司机福利观看| 久久婷婷成人综合色麻豆| 国产一区二区三区在线臀色熟女 | 欧美在线一区亚洲| 亚洲av熟女| 精品第一国产精品| 色在线成人网| 99精品久久久久人妻精品| www日本在线高清视频| 精品乱码久久久久久99久播| 中出人妻视频一区二区| 自线自在国产av| cao死你这个sao货| 99久久99久久久精品蜜桃| 日韩欧美一区视频在线观看| 亚洲成a人片在线一区二区| 国产精品99久久99久久久不卡| 亚洲精品美女久久av网站| 亚洲一区高清亚洲精品| 国产成人欧美| 老鸭窝网址在线观看| 国产成人免费无遮挡视频| 国产又色又爽无遮挡免费看| 三级毛片av免费| 激情在线观看视频在线高清| 嫩草影院精品99| www.精华液| 999久久久国产精品视频| 欧美在线一区亚洲| 搡老熟女国产l中国老女人| 国产免费av片在线观看野外av| 无人区码免费观看不卡| 日韩中文字幕欧美一区二区| 99国产精品一区二区蜜桃av| 国产亚洲精品综合一区在线观看 | 久久影院123| 男人舔女人的私密视频| 亚洲精华国产精华精| 亚洲国产欧美网| 一进一出好大好爽视频| 午夜视频精品福利| 国产精品 国内视频| 亚洲 欧美一区二区三区| 午夜福利欧美成人| 首页视频小说图片口味搜索| 国产高清视频在线播放一区| 久久天躁狠狠躁夜夜2o2o| 亚洲中文日韩欧美视频| 国产精品二区激情视频| 欧美中文日本在线观看视频| 亚洲伊人色综图| 嫁个100分男人电影在线观看| 亚洲av片天天在线观看| 99在线人妻在线中文字幕| 99国产极品粉嫩在线观看| a级毛片在线看网站| 午夜日韩欧美国产| 91精品三级在线观看| 国产成人欧美在线观看| 国产高清视频在线播放一区| 成人手机av| 色婷婷久久久亚洲欧美| 国产精品九九99| 日本三级黄在线观看| 婷婷精品国产亚洲av在线| 国产色视频综合| 日韩精品中文字幕看吧| 日本免费a在线| 中文字幕av电影在线播放| 亚洲激情在线av| 欧美黄色淫秽网站| 韩国精品一区二区三区| 在线观看免费日韩欧美大片| 在线观看66精品国产| 久久中文字幕人妻熟女| 男男h啪啪无遮挡| 99热只有精品国产| 欧美日韩亚洲国产一区二区在线观看| 亚洲av成人不卡在线观看播放网| 69精品国产乱码久久久| 一二三四在线观看免费中文在| 黄色视频,在线免费观看| 夜夜躁狠狠躁天天躁| 男女做爰动态图高潮gif福利片 | 久久国产精品人妻蜜桃| 久久精品aⅴ一区二区三区四区| 国产成人一区二区三区免费视频网站| 色哟哟哟哟哟哟| 亚洲五月天丁香| 高清欧美精品videossex| 成年人免费黄色播放视频| 国产av一区在线观看免费| 亚洲欧美日韩无卡精品| 很黄的视频免费| 亚洲精品中文字幕在线视频| 91国产中文字幕| 岛国在线观看网站| 黄频高清免费视频| 一本综合久久免费| 偷拍熟女少妇极品色| 脱女人内裤的视频| 88av欧美| 国产 一区 欧美 日韩| 婷婷色综合大香蕉| 91麻豆av在线| 少妇人妻一区二区三区视频| 首页视频小说图片口味搜索| 日本与韩国留学比较| 麻豆成人午夜福利视频| 1000部很黄的大片| 亚洲最大成人手机在线| 亚洲国产高清在线一区二区三| 欧美zozozo另类| 欧美+日韩+精品| 琪琪午夜伦伦电影理论片6080| 国产成人a区在线观看| 久久这里只有精品中国| 亚洲美女搞黄在线观看 | 亚洲 国产 在线| 亚洲av免费高清在线观看| 麻豆成人av在线观看| 欧美在线一区亚洲| 国产乱人伦免费视频| 嫩草影院新地址| 9191精品国产免费久久| av在线天堂中文字幕| 国产激情偷乱视频一区二区| 久久久久久久午夜电影| 可以在线观看毛片的网站| 深夜精品福利| 国产精品一区二区免费欧美| 黄片小视频在线播放| 日韩欧美在线二视频| 18禁黄网站禁片免费观看直播| 国产亚洲欧美98| 亚洲 国产 在线| 国产人妻一区二区三区在| 动漫黄色视频在线观看| 亚洲最大成人手机在线| 欧美区成人在线视频| 国产精品久久久久久人妻精品电影| 国产熟女xx| a级毛片免费高清观看在线播放| 午夜久久久久精精品| 男人舔女人下体高潮全视频| 99热这里只有精品一区| 国产精品av视频在线免费观看| 中出人妻视频一区二区| 午夜福利欧美成人| 欧洲精品卡2卡3卡4卡5卡区| 色综合亚洲欧美另类图片| 国产精品久久电影中文字幕| 少妇丰满av| 欧美成人免费av一区二区三区| 国产野战对白在线观看| 老司机午夜福利在线观看视频| 亚洲乱码一区二区免费版| aaaaa片日本免费| 日韩人妻高清精品专区| 午夜激情福利司机影院| 欧美日本亚洲视频在线播放| 一级av片app| 国产真实伦视频高清在线观看 | 久久久久免费精品人妻一区二区| 听说在线观看完整版免费高清| 午夜视频国产福利| 国产精品爽爽va在线观看网站| 国产av麻豆久久久久久久| 亚洲精品粉嫩美女一区| 天堂av国产一区二区熟女人妻| 精品久久久久久久久av| 久久久久久久久中文| 淫秽高清视频在线观看| 韩国av一区二区三区四区| 欧美性猛交黑人性爽| 色综合婷婷激情| 亚洲狠狠婷婷综合久久图片| 日日摸夜夜添夜夜添av毛片 | 国产亚洲欧美98| 自拍偷自拍亚洲精品老妇| 97超级碰碰碰精品色视频在线观看| 国产精品久久久久久亚洲av鲁大| aaaaa片日本免费| 亚洲真实伦在线观看| 亚洲成a人片在线一区二区| 神马国产精品三级电影在线观看| 亚洲欧美激情综合另类| 91av网一区二区| 婷婷丁香在线五月| 久久久成人免费电影| 欧美国产日韩亚洲一区| 久久久久久久久久黄片| 啦啦啦韩国在线观看视频| 精品久久国产蜜桃| 人人妻人人看人人澡| 乱人视频在线观看| 在线十欧美十亚洲十日本专区| 岛国在线免费视频观看| 久久国产精品影院| 国产精品嫩草影院av在线观看 | 村上凉子中文字幕在线| 欧美极品一区二区三区四区| 亚洲综合色惰| 高潮久久久久久久久久久不卡| 久久精品影院6| 成人欧美大片| 18禁在线播放成人免费| 亚洲欧美日韩东京热| 最近中文字幕高清免费大全6 | 精品国产亚洲在线| 亚洲国产色片| 99国产极品粉嫩在线观看| 麻豆av噜噜一区二区三区| 日韩欧美精品v在线| 色综合欧美亚洲国产小说| 中文字幕人成人乱码亚洲影| 色尼玛亚洲综合影院| 国产91精品成人一区二区三区| 国产高清三级在线| 久久久久久国产a免费观看| 亚洲午夜理论影院| 亚洲欧美日韩卡通动漫| 在线观看免费视频日本深夜| 免费观看的影片在线观看| 两个人的视频大全免费| 美女 人体艺术 gogo| 日本与韩国留学比较| 99久国产av精品| 草草在线视频免费看| av黄色大香蕉| 欧美精品国产亚洲| 国产精品不卡视频一区二区 | 国产精品久久久久久久电影| 国产真实乱freesex| 亚洲精品亚洲一区二区| 国产v大片淫在线免费观看| 搡女人真爽免费视频火全软件 | 亚洲中文日韩欧美视频| 天美传媒精品一区二区| 国产白丝娇喘喷水9色精品| 中国美女看黄片| 亚洲中文字幕一区二区三区有码在线看| 一级作爱视频免费观看| 国产三级在线视频| 亚洲不卡免费看| 亚洲av美国av| 少妇的逼水好多| 国内毛片毛片毛片毛片毛片| 婷婷精品国产亚洲av| 色精品久久人妻99蜜桃| 悠悠久久av| 欧美色欧美亚洲另类二区| 精品久久久久久久久亚洲 | 全区人妻精品视频| 狂野欧美白嫩少妇大欣赏| 亚洲乱码一区二区免费版| 欧美极品一区二区三区四区| 日韩欧美三级三区| 国产精品人妻久久久久久| 51午夜福利影视在线观看| 亚洲专区国产一区二区| 久久午夜亚洲精品久久| 午夜福利在线在线| 国产精品久久电影中文字幕| 亚洲国产欧洲综合997久久,| 波多野结衣巨乳人妻| 我要搜黄色片| 女同久久另类99精品国产91| 国产精品美女特级片免费视频播放器| 老熟妇乱子伦视频在线观看| 午夜老司机福利剧场| 每晚都被弄得嗷嗷叫到高潮| 两人在一起打扑克的视频| 少妇丰满av| 又黄又爽又刺激的免费视频.| 国产亚洲欧美在线一区二区| 亚洲va日本ⅴa欧美va伊人久久| 欧美成人一区二区免费高清观看| 国内少妇人妻偷人精品xxx网站| 欧美黄色淫秽网站| 欧美午夜高清在线| 看片在线看免费视频| 亚洲av一区综合| .国产精品久久| 一本一本综合久久| 无遮挡黄片免费观看| 国产久久久一区二区三区| 亚洲自偷自拍三级| netflix在线观看网站| 欧美在线一区亚洲| 1000部很黄的大片| 亚洲精品456在线播放app | www.www免费av| 精品人妻偷拍中文字幕| 午夜福利成人在线免费观看| 五月玫瑰六月丁香| 亚洲一区二区三区不卡视频| 97热精品久久久久久| 日本免费一区二区三区高清不卡| 最新在线观看一区二区三区| 香蕉av资源在线| 亚洲av中文字字幕乱码综合| 日日干狠狠操夜夜爽| 成年女人看的毛片在线观看| 97超级碰碰碰精品色视频在线观看| 国产高清激情床上av| 午夜精品一区二区三区免费看| 欧美性感艳星| 在线天堂最新版资源| 国内精品久久久久久久电影| 男女做爰动态图高潮gif福利片| 99精品在免费线老司机午夜| 69人妻影院| 国产午夜福利久久久久久| 久久99热6这里只有精品| 久久久成人免费电影| 国产激情偷乱视频一区二区| 啪啪无遮挡十八禁网站| 国产爱豆传媒在线观看| 欧美另类亚洲清纯唯美| 长腿黑丝高跟| 人妻制服诱惑在线中文字幕| 1024手机看黄色片| 搡老岳熟女国产| 久久人妻av系列| av在线天堂中文字幕| 国产精品亚洲一级av第二区| 日本撒尿小便嘘嘘汇集6| 99久久精品热视频| 色综合婷婷激情| 中亚洲国语对白在线视频| 亚洲专区中文字幕在线| 蜜桃久久精品国产亚洲av| АⅤ资源中文在线天堂| 久久久久国产精品人妻aⅴ院| 一本一本综合久久| 18禁黄网站禁片免费观看直播| 午夜精品一区二区三区免费看| 午夜亚洲福利在线播放| 色哟哟哟哟哟哟| 婷婷丁香在线五月| 九色成人免费人妻av| 成人高潮视频无遮挡免费网站| 亚洲欧美日韩高清专用| 中文字幕人成人乱码亚洲影| 美女被艹到高潮喷水动态| 日日干狠狠操夜夜爽| 亚洲成人久久性| 极品教师在线视频| 国产国拍精品亚洲av在线观看| 欧美日韩瑟瑟在线播放| 能在线免费观看的黄片| 国产精品av视频在线免费观看| 国产在线男女| 日韩欧美精品免费久久 | 99久久成人亚洲精品观看| 90打野战视频偷拍视频| 女同久久另类99精品国产91| 色视频www国产| 国产成年人精品一区二区| 国产伦一二天堂av在线观看| 给我免费播放毛片高清在线观看| 久久国产乱子伦精品免费另类| 亚洲av成人精品一区久久| 嫩草影院新地址| 免费在线观看影片大全网站| 中文字幕免费在线视频6| 欧美一区二区国产精品久久精品| 久久国产精品影院| 麻豆av噜噜一区二区三区| 美女高潮喷水抽搐中文字幕| 国产精品乱码一区二三区的特点| 成人av在线播放网站| 男人舔女人下体高潮全视频| 午夜免费男女啪啪视频观看 | 99国产精品一区二区蜜桃av| 中文字幕av成人在线电影| 国产av一区在线观看免费| av在线天堂中文字幕| 永久网站在线| 欧美另类亚洲清纯唯美| 午夜福利免费观看在线| 亚洲成人免费电影在线观看| 老司机午夜福利在线观看视频| 变态另类丝袜制服| 欧美最新免费一区二区三区 | 日本免费一区二区三区高清不卡| 久久精品国产亚洲av天美| 国产精品自产拍在线观看55亚洲| 亚洲精品在线美女| 91麻豆av在线| 久久久久久大精品| 亚洲成人免费电影在线观看| 如何舔出高潮| 成人特级av手机在线观看| 日本成人三级电影网站| 日本黄色片子视频| 国产av不卡久久| 波野结衣二区三区在线| 成人鲁丝片一二三区免费| 国产精品一区二区三区四区久久| 欧美日韩瑟瑟在线播放| 午夜激情欧美在线| 欧美黄色片欧美黄色片| 国产精品一区二区三区四区免费观看 | 久久人人精品亚洲av| 淫妇啪啪啪对白视频| 久久6这里有精品| 亚洲 国产 在线| 国产高清三级在线| 69av精品久久久久久| 午夜福利在线在线| 国内精品久久久久精免费| 夜夜爽天天搞| 国产男靠女视频免费网站| 免费在线观看日本一区| 国模一区二区三区四区视频| 久久国产乱子免费精品| 小蜜桃在线观看免费完整版高清| 午夜福利视频1000在线观看| 3wmmmm亚洲av在线观看|