• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Understanding Research Trends in Android Malware Research Using Information Modelling Techniques

    2021-12-16 06:39:20JaitegSinghTanyaGeraFarmanAliDeepakThakurKaramjeetSinghandKyungsupKwak
    Computers Materials&Continua 2021年3期

    Jaiteg Singh,Tanya Gera,Farman Ali,Deepak Thakur,Karamjeet Singh and Kyung-sup Kwak

    1Chitkara University Institute of Engineering & Technology, Chitkara University, Punjab,140401,India

    2Department of Software, Sejong University, Seoul,05006, South Korea

    3Department of Computer Science and Engineering,Thapar University, Patiala, 147001,India

    4Department of Information &Communication Engineering, Inha University, Incheon, 22212,South Korea

    Abstract: Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share.Such popularity of Android has drawn the attention of cybercriminals and malware developers.The malicious applications can steal sensitive information like contacts,read personal messages, record calls, send messages to premium-rate numbers, cause financial loss,gain access to the gallery and can access the user’s geographic location.Numerous surveys on Android security have primarily focused on types of malware attack,their propagation,and techniques to mitigate them.To the best of our knowledge, Android malware literature has never been explored using information modelling techniques.Further, promulgation of contemporary research trends in Android malware research has never been done from semantic point of view.This paper intends to identify intellectual core from Android malware literature using Latent Semantic Analysis(LSA).An extensive corpus of 843 articles on Android malware and security, published during 2009-2019, were processed using LSA.Subsequently, the truncated singular Value Decomposition (SVD)technique was used for dimensionality reduction.Later, machine learning methods were deployed to effectively segregate prominent topic solutions with minimal bias.Apropos to observed term and document loading matrix values, this five core research areas and twenty research trends were identified.Further,potential future research directions have been detailed to offer a quick reference for information scientists.The study concludes to the fact that Android security is crucial for pervasive Android devices.Static analysis is the most widely investigated core area within Android security research and is expected to remain in trend in near future.Research trends indicate the need for a faster yet effective model to detect Android applications causing obfuscation, financial attacks and stealing user information.

    Keywords: Android security; research trends; latent semantic analysis;vulnerabilities;malware;machine learning;clustering

    1 Introduction

    Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8%of the market share[1].Affordability,agility and reliability of Android smartphones have encouraged their use in e-commerce, banking, sending emails, using social media and marketing.Such popularity of Android has drawn the attention of cybercriminals and malware developers.An exponential increase in Android malware families has been observed by the research community.These malware families differ in the way they attack, the type of vulnerabilities they exploit and the Android subsystem they target [2].At times, these attacks may even propagate through application stores like Google play store [3].The malicious applications can steal sensitive information like contacts, read personal messages, record calls,send messages to premium-rate numbers, cause financial loss, gain access to the gallery and access the user’s geographic location.Popularity among users and continuously increasing Android malware attacks has gained the attention of the researchers.Few of the benchmark literature reviews have also been done by the research community[2,4-6].

    These surveys have primarily focused on types of malware attack,their propagation,and techniques to mitigate them.Few surveys also highlighted fundamental vulnerabilities of Android platforms.To the best of our knowledge, Android malware literature has never been explored using information modelling techniques.Further, promulgation of contemporary research trends in Android malware has never been done from semantic point of view.This paper intends to identify intellectual core from Android malware literature using Latent Semantic Analysis (LSA).LSA mimics the human brain to filter out semantics from the text as it is mathematically proven to model words, synonyms, and metaphors to elaborate various semantic aspects of qualitative literature [7-11].LSA is reliably efficient in information retrieval and query optimization [12,13].Many researchers from different research fields have used LSA to discover the research trends [10,14-17].LSA identifies the entire of the contexts in which a word could appear and learns to establish a common factor to represent underlying concepts.Keeping into consideration other researches using information modeling techniques; the main contribution of this study is to discover current trends, future research directions, and core research areas pertaining to Android malware.To minimize opinion bias, K-means clustering was used to automatically map the document to its closest possible topic solution.

    The rest of the paper is organized as follows:The second section introduces the available materials and methods along with the procedure to deploy LSA.The third section explains experimental results,different topic solutions,research trends,core research areas and their mapping.Section 4 concludes the findings.

    2 Materials and Methods

    Automated topic modelling techniques require minimal human intervention and can process thousands of articles in one go.However,manual review process does require human intervention at every step and can be biased sometimes[7].It is very difficult to manually review full length articles in large numbers.A great manual effort is required to draw conclusions like research trends across large literature.At the document level, one of the most useful ways to understand the text is by analyzing its topics.The process of learning, recognizing, and extracting these topics across a collection of documents is called topic modeling.Numerous well-formed algorithms are available to produce research trends and core research areas within research field.In addition to it, numerous machine learning techniques could be used for performing data analysis, visualization and interpretation of results.LSA is the fundamental and most studied techniques in topic modeling.Papadimitriou et al.[18] investigated appropriate conditions for applying LSA.Few of the researchers also performed decision making to analyze trends in blockchain technology using Word2vec-based Latent Semantic Analysis (W2V-LSA) [19].The experimental results confirmed its usefulness and better topic modelling than tradition bibliometric methods.Initially, research trend analysis was also performed on doctoral dissertations and master’s theses for identifying future research opportunities in the domain of blended learning[20].Systematic information retrieval using automated and semi-automated approaches in any field of research has itself become a trend.However,recent advancements in text mining, information retrieval and topic modelling has gained attention of research community to forecast research trends [21].Text mining has also facilitated machine learning algorithms to enhance its capability to mine latent information [22] from user review on websites, newspaper articles and social media information analysis.Other techniques like probabilistic latent semantic analysis use uni-gram format conversion of a word, which generally get fail to capture the specific context in the document[23].Further, n-gram format leads to decrease in efficiency of model due to wide dimensionality [24].Owing to these probable limitations of probabilistic latent semantic analysis, LSA has been widely accepted by research community to promulgate trends within research literature.

    This section details the methodology to deploy LSA on Android malware literature.The keywords used to search research articles and adopted inclusion-exclusion criteria for selecting articles are detailed here.A manual search was performed across previously mentioned databases using the following search terms“malware” OR “vulnerability” OR “security” OR “privacy” OR “monitoring” OR “application” OR“smartphone” OR “android” OR “virus” OR “static” OR “dynamic” OR “detection” OR “data flow”search keywords, with Android as prefix.Prominent research databases like Google Scholar, Mendeley,ACM DL, Hindawi, Taylor and Francis, IEEE, Wiley and Scopus were searched to identify quality literature related to Android malware.The inclusion and exclusion criteria followed for selection of articles is mentioned in Tab.1.The collected literature was pre-processed and organized using Mendeley reference manager [25].Mendeley helped to introduce standard formatting to all documents which were indexed according to common objects.

    Table 1: Inclusion and exclusion criteria

    Initially, a total of 1289 abstracts and titles of articles published during 2009-2019 were collected by searching previously mentioned keywords.From amongst the collected documents, 251 duplicate entries were removed.Remaining 1038 articles were accessed and evaluated as per decided inclusion/exclusion criteria.Articles focusing on general malware (39), iOS (45), Symbian operating system (50),windows (61) were excluded.Finally, we were left with 843 articles to be processed using LSA.Owing to the required brevity of manuscript, the method to deploy LSA has been elaborated below with the help of an example:

    Assume Sample Doc1 and Sample Doc2 as documents within a given document corpus.The required pre-processing and document-term matrix scores for identifying frequency of each term have been detailed in Tabs.2 and 3.

    Sample Doc1:Malware application reads the unique device identifier to track the user’s device.Malware applications can misuse user data like his or her phone numbers,contact list,calendar,etc.

    Table 2: Pre-processing procedure on sample documents

    Table 3: Document-term matrix describing frequency of terms

    Sample Doc2:Applications can track down the exact location of the user by finding the WiFi network or tower it is connected to.Various malware applications can record your daily usage data and send it to servers

    As the task is to mine the relevant terms that provide useful or quality information about the document,the document-term matrix has to be replaced by Term-Frequency/Inverse Document Frequency (TF-IDF)weights for further processing of the matrix.TF-IDF weight is a measure to interpret the importance of a term to a document in a collection of the large corpus.TF-IDF works on the fact that relevant words are not necessarily frequent words.The TF-IDF weight is build-up of two terms that need to be calculated beforehand:

    (i) TF(Term Frequency):It provides the frequency of a term(TF)with normalized value,which can be computed as the division of the number of occurrences of a term in a document and the total number of terms in that document, refer Eq.(1).Sample TF scores in context with an example taken are shown in Tab.4.

    Table 4: Term frequency scores for each sample document

    (ii) IDF (Inverse Document Frequency):IDF indicates the importance of each term within the document.IDF is calculated as a log of the division of count of documents in the corpus divided by the count of documents where the specific term appears.However, it is quite obvious that some terms, like “is”, “the”, “of”, and “that” or certain domain-specific words, may appear repeatedly but may not have much importance.Thus, arises a need to weigh down the importance of most occurred terms while scaling up the rare ones.Therefore, IDF scores are important and can be computed as given in Eq.(2).IDF scores for sample documents are presented in Tab.5.

    Table 5: Inverse document frequency score for each term

    Hence,after the calculation of TF and IDF scores,the final document-term matrix with TF-IDF scores is calculated with the following Eq.(3).

    where t denotes the terms; d denotes each document; N denotes the total number of documents.Consider Tab.6 above, it represents the document-term matrix with TF-IDF scores for previously stated example.A term will have more TF-IDF value when its occurrences across the document are more but less across the corpus.Let’s take an example of a domain-specific word i.e., “malware” which was very common in entire of the corpus, but may appear often in a document hence, it will not have a high TF-IDF score.However, the word “permissions” may appear frequently in a document, and appears less in the rest of the corpus, it will have a higher TF-IDF score.As shown in the example given above, a large corpus of the research papers on Android security and malware resulted in high dimensional TF-IDF matrix.High dimensional matrix is generally expected to be redundant and noisy.Therefore, to uncover the relationship among the words and documents and to capture the latent topics within the corpus,dimensionality reduction was required.Term Frequency-Inverse Document Frequency (TF-IDF) matrix(as produced in the previous step) was fed to truncated Singular Vector Decomposition (SVD).SVD transforms the data from high dimensional vector space to a low dimensional vector space keeping the originality of the data sustained.Using SVD, the LSA would produce two matrices, one for the terms loading values and other for the documents loading values.High loading terms and high loading documents help to interpret their association with topic solutions.Each topic solution signifies the research theme across the corpus.Researchers can modify selection by varying the selections of the number of factor solutions.The most common research areas can be found easily by selecting a lowerlevel factor aggregation.A higher-level factor aggregation signifies principal or core research themes.Truncated SVD is a matrix algebra technique which decomposes TF-IDF matrix into a product of three matrices—U,∑and V.The SVD decomposition over matrix A is represented as follows in Eq.(4):

    Table 6: Transformed term frequencies after TF-IDF generation

    Here, A represents the TF-IDF matrix, U represents documents-to-concepts matrix describing associations between concepts and terms, V represents terms-to-concepts matrix describing associations between documents rooted to various concepts and ∑represents a diagonal matrix with non-negative real numbers, arranged in descending order.Moreover, these diagonal values represent the relative strength of each concept.A maximum number of concepts (also known as topics) cannot be more than the total number of documents rather its value needs to be adjusted to develop a latent semantic representation of the original matrix.Let’s assume d is the total number of documents, t is the total number of terms in all the documents and k is considered as the hyperparameter indicating the number of topics to be extracted from the textual data.Akis the low-rank approximation of matrix A and can be produced using truncated SVD as follows in Eq.(5):

    where Ukis the document-to-topic matrix(t×k),Vkis the term-to-topic matrix(d×k),andis the topicto-topic matrix (k × k).To decrease the importance of frequent terms and increase the rare terms in documents, the TF-IDF technique was used and Tab.6 shows the term frequencies being transformed after applying TF-IDF.To illustrate the text mining done by LSA, consider the same textual data example, SVD operation has to be applied on the TF-IDF matrix.As discussed, each of the k reduced dimensions corresponds to a latent concept which helps to discriminate the documents.To obtain the most significant dimensions, the optimal value for k needs to be adjusted.But for the above example, the value of k is taken to be two.The document loading-matrix and term-loading matrix are shown in Tabs.7 and 8.As an application of LSA followed by clustering approach will help to identify topic solutions.

    Table 7: Term-loading with five latent topics

    Table 8: Document-loading with two latent topics

    3 Experimental Results and Findings

    Using procedure detailed in Section 2 and weighting scheme as given in Eq.(3),a n*843 term-document weighted matrix was created for t term in d document for all n documents within corpus.This corpus would be used for identification of prominent topic solutions within Android malware literature.Initially the dataset of 843 documents had 10076 tokens.After pre-processing,the count was reduced to 1122 tokens.843 sparse vectors were created with 1122 tokens.The collection of 843 articles on Android malware was then transformed to a singular row of vectors wherein rows of the matrix used as 1122 terms of 843 columns,each vector representing an article on Android malware.This process would provide a unique numeric value to the collection of words as discussed in Tab.6 for sample documents and in Tab.10 for actual 843 documents (as proof of concept).This list of words is further used for the creation of matrix containing weights.As mentioned previously, large corpus of 843 documents on Android malware resulted into high dimensional TF-IDF matrix which was likely to be noisy and redundant across its many dimensions.Therefore, to uncover the latent structure within words and documents and to identify latent topics within corpus, dimensionality reduction step was performed as detailed in subsequent sections below.

    3.1 Rank Lowering Using Singular Vector Decomposition

    The weighted matrix TF-IDF obtained after preprocessing steps was provided to the SVD to further perform rank lowering.The SVD model X =U ∑V∧t is used to perform matrix X factorization into variables [13,26].The following terminology is used in Eqs.(6)and (7).

    U: Initial rotation

    ∑:Scaling

    V:Final rotation

    The mathematical expression XXtand XtX provides term-loading and document-loading respectively.∑∑^t represents the weights of the topics in descending order.The maximum number of topics generated was equal to the number of documents in the corpus.For extracting a few topics (k), the topmost k singular values were taken from the matrix ∑∑t[27,28].Text is represented as a matrix of form X = U∑Vtsuch that each row stands for unique word and each column represents unique document.Each cell represents the number of occurrences of the word with which it appears in a document.Apply preliminary transformation wherein weights have been assigned describing word importance in particular document w.r.t all other documents.The dimension reduction step had structured the matrices in such a way that words that did not appear originally in some contexts now do appear, at least fractionally.Afterwards, apply SVD which decomposed the original matrix into the product of three other matrices.Term loading XXtmatrix represents terms loaded for a particular topic solution.Each cell contains term weight for a particular topic giving more weightage to that topic solution as per the specified threshold value.Document loading matrix XtX represents documents loaded for a particular topic solution.Each cell contains document weight for a particular topic giving more weightage to that topic in terms of number of documents loaded for that topic as per the specified threshold value.

    3.2 Selecting Optimal Topic Solutions

    Optimal topic loadings come from dimensionality reduction.It offers a detailed analysis of obtaining k optimal terms or values from the term matrix produced by it.Selecting an optimal topic value has been difficult because of its requirement to understand and requiring several procedures to obtain favorable value [26].The five prominent topic loadings for 843 corpus of documents is shown in Tab.9.It is suitable enough to identify trends in Android malware research.

    The results in Fig.1 showed that numerous high loading publications converged to one research area,i.e.,“Static Level Monitoring”(T5.2)in the five topic solutions.Static analysis is the most utilized analysis technique for malware analysis;hence it is unsurprising that“Static Level Monitoring”(T5.2)remained to trend research area throughout the year 2009-2019.Results also showed that“Automatic Malware Analysis”(T5.3) and “Hybrid level monitoring” (T5.4) also became a trending research area during the year 2014-2019.“Dynamic level monitoring” (T5.5) also had been a dominant research area in Android malware research.

    Figure 1: Publication count for five-factor solution during three different time periods

    In the corpus,the most common approaches used by researchers to capture security threats in Android ecosystem are based on static level monitoring (39%).Dynamic Level Monitoring (26%), Hybrid Level Monitoring (21%), Automatic Malware Analysis (about 11%), and Application Structure Analysis (3%)were also found to have considerable share in Android malware literature.It is to be noted that from the year 2009, many static technique to detect android malware were proposed [29] and the techniques based on dynamic analysis were first explored by the researchers in 2010[30].

    The ten-topic solution as shown in Fig.2 uncovered ten trending areas, viz.“Machine Learning Approach” (T10.9), “Dynamic Code Loading” (T10.2), “Dalvik Byte Code Analysis” (T10.6), “Feature-Based Analysis” (T10.10), and “Repackaged App Identification” (T10.3) which were dominant research areas for the time period 2014-2019.However, in Fig.3 the twenty-topic solution uncovered various trending areas, viz.“Permission-Based Analysis” (T20.5), “Data Flow Tracking” (T20.7), “Context Monitoring” (T20.16).“Permission-Based Analysis” (T20.5) was a dominant research area throughout the period 2009-2019.However, “Kernel Level Check” (T20.6), “Data Flow Tracking” (T20.7) and other supplementary techniques like “Machine Learning Approach” (T20.12), “Formal Analysis” (T20.20)became trending research areas during the year 2014-2019.

    Figure 2: Ten factor solution during three different time periods

    Table 9: Core research areas identified through LSA

    Table 10: Transformed term frequencies after TF-IDF generation for 843 documents

    3.3 Android Security Research Trends

    Considering the twenty-topic solutions,the prominent research trends in android security research are;the distribution of articles clearly interprets,“Machine Learning Approach”(T20.12),“Data Flow Tracking”(T20.7),“Context Monitoring”(T20.16),“Kernel Level Check”(T20.6),emerged as among highly explored topic solutions.This was consistent with the five, ten topic solutions.

    The research trend,“Machine Learning Approach”(T20.12)is one of the highly explored topics over the last few years in which android applications are analyzed statically as well as dynamically to collect some set of features and then make the system learn it for making a decision about unknown sample of malicious applications.Machine learning methods were used in [31-37].Another significant trend that emerged was“Kernel Level Check” (T20.6) which focuses on the techniques designed to make the kernel level attacks more difficult to execute[4].

    Figure 3: Twenty factor solution during three different time periods

    3.4 Mapping of Core Research Areas and Research Trends

    Tab.11 shows the mapping of research trends with five core research areas.The mapping is done on the basis of similarity scores.The topics corresponding to the latter were somewhat related to the former and were verified using similarity scores.The similarity scores were calculated as a result of the low and high loading values of topic solutions.The similarity scores present a clear relationship between the core research area and their related trends which also validates the procedures developed to show their semantic connection.The detailed discussion is presented in the following sections.

    Table 11: Mapping of core research areas and trends

    3.5 Mapping of Core Research Areas and Trends

    This section details the mapping of top five topic labels with toptwenty topic solutions.Initial mapping of Topic (T5.1) “Application Structure Analysis” has a clear overlap with “App Level Features” (20.2).It uncovered the use of metadata and features of an Android application to detect and analyze Android malware.Metadata can be characterized as the displayed information which is available before downloading and installing the Android application, e.g., required permissions, description, version, last updated, rating, number of installations, developer information.This trend was seen in the project named WHYPER [38].Among all five core research areas, results revealed that (T5.2) “Static Level Monitoring” has been investigated the most.Tab.11 demonstrates that out of twenty topic solutions,seven research trends converged to core research area T5.2.In “Permission-Based Analysis” (T20.5),permissions played a vital role for investigation of malicious content, as most activities (e.g., a collection of APIs) require specific consents keeping in mind the end goal to be achieved [3].Another research trend that emerged in this area is the “Dex file study” (T20.11).Though dex files are difficult to humans to understand, yet it is prudent to study dex files for mitigating malware attacks.To identify malicious code segments, researchers first decompile the dex code into more conceivable formats such as assembly,smali, dalvik bytecode, source code, jar, jimple or java bytecode [39].Automatic Malware Analysis(T5.3), primarily explored “Input Matching” (T20.4), “Repackaged App Identification” (T20.19), “Formal Analysis” (T20.20), and “Machine Learning Approach” (T20.12).All such techniques were related to automated identification of Android malware.To achieve the effectiveness and scalability of Android malware detection, the trend “Machine Learning Approach” (T20.12) came into light during the time period 2014-2019.Another research trend that emerged was “Repackaged App Identification” (T20.19).Repackaging is one of the popular techniques being used by malware authors to generate fraudulent repackaged applications [40].The year 2012 was a high time when malware started evolving and a need of hybrid techniques for malware monitoring was felt (T5.4).The rampant utilization of techniques such as dynamic code loading, native code, java reflection, and code coverage by malware community was limiting the significance of static and dynamic detection methods.Researchers were in need of a robust solution to analyze and mitigate the impact of malware.The trends like “Dynamic Code Loading”(T20.9), “Dalvik ByteCode Analysis” (T20.18), “Obfuscated Code Analysis” (T20.1) which emerged during 2014-2019 played the vital role in introducing/establishing hybrid approaches to combat against the evolving malware.The past hybrid projects such as “AppIntent [41], SmartDroid [42], IntelliDroid[43], Harvester [44], A5 [45] witness the curtailment of smart tactics and had produced precise detection results.Dynamic Level Monitoring (T5.5) is also a prominent trend that signifies the requirement of runtime analysis of Android applications.The trend “Kernel Level Check” (T20.6) uncovered the use of system calls for effective malware detection.Android Linux kernel has more than 250 system calls in common [46].

    4 Discussion

    The results of this study revealed that“Static Level Monitoring”(T5.2)had been proved to be the most widely investigated topic in Android malware research.The studies related to static analysis majorly focus on network addresses,data flow tracking,control flow graphs,string matching,permissions,dex files,context,and intents.Studies also focused on behavioral and structural analysis to extend its coverage for advanced malware applications.Kernel-level analysis, API call monitoring, taints were its major highlights.Researchers identified that the results of the combined effects of structural and behavioral features produce richer and robust analysis.Numerous studies support hybrid techniques to detect destructive payloads.Though automation in malware analysis and analysis with supplementary techniques were comparatively less in number yet are effective enough to produce promising results.

    To maintain the effective interpretations and comparisons among the topics;change of focus over two time-frames 2009-2013 and 2014-2019 were observed.It depicts the paradigm shift from time window 2009-2013 to 2014-2019.Machine learning approaches were found to be effective among other competitive approaches to detect Android malware.These approaches are well explored and promising during the time 2014-2019.The trend kernel-level check greatly influenced the research community during 2014-2019.Applications were inspected at the kernel level in order to understand their real-time behavior.Detection of piggybacked application through sensitive graph analysis/data tracking followed by usage of machine learning algorithms was widely studied during 2014-2019.Application permissions have remained the topmost static features to detect Android malware.It has been widely investigated during 2009-2019, as it poses as the first barrier to the malware authors.To activate certain events in an Android ecosystem, some specific permission should be declared in the manifest file.Due to the ability of malicious applications to hide their actual behavior through the user interface, it became cumbersome to analyze all possible paths or inputs, while performing sandbox analysis.During 2014-2019, smart interaction solutions came into light which focused on generating activity, and function call graph using static analysis and exploring paths using dynamic analysis.

    5 Conclusion

    Reviewing literature manually may result in biased and incomplete inferences.This work systematically analyses a large corpus of 843 research articles on Android security using an information modeling technique.The major outcomes of this study are the analytical interpretation of five core research areas and twenty substantial research themes.The results suggest that Static Level Monitoring is the most widely investigated topic in Android malware analysis and detection.Behavioral analysis in addition to structural is a must to extend the coverage for advanced malware and vulnerable applications.Kernellevel analysis, API call monitoring, taints are also important indicators of malware behavior.Research trends indicate that results of the combined effects of structural and behavioral features produce richer and robust analysis.

    This investigation also identifies new future dimensions for researchers.The results of this study will help others to choose their areas of interest for their potential research along with the associated research trend.The most impacting factor of this work lies in that researchers can apply the same methodology in any other research fields by little or almost no changes.

    Funding Statement:This work was supported by National Research Foundation of Korea-Grant funded by Korean Government (Ministry of Science & ICT)-NRF-2020R1A2B5B02002478 through Dr.Kyung-sup Kwak.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    男女啪啪激烈高潮av片| 亚洲欧美日韩另类电影网站| 一区二区三区乱码不卡18| 精品第一国产精品| 高清av免费在线| 亚洲欧美成人综合另类久久久| 一级a做视频免费观看| 一本久久精品| 黄色 视频免费看| 免费少妇av软件| 国产有黄有色有爽视频| 美女国产视频在线观看| 一本大道久久a久久精品| 欧美成人午夜免费资源| 久久女婷五月综合色啪小说| 哪个播放器可以免费观看大片| 国产视频首页在线观看| 国产日韩欧美视频二区| 国产毛片在线视频| 日产精品乱码卡一卡2卡三| 看免费av毛片| 大片免费播放器 马上看| 在线亚洲精品国产二区图片欧美| 久久精品国产亚洲av涩爱| 18在线观看网站| 国产精品欧美亚洲77777| 午夜91福利影院| 纯流量卡能插随身wifi吗| 人人妻人人爽人人添夜夜欢视频| 两性夫妻黄色片 | 成人免费观看视频高清| 日韩在线高清观看一区二区三区| 18在线观看网站| 国产片内射在线| 免费日韩欧美在线观看| 秋霞伦理黄片| 亚洲av中文av极速乱| 男女边吃奶边做爰视频| 少妇 在线观看| 精品一品国产午夜福利视频| 91午夜精品亚洲一区二区三区| 午夜激情久久久久久久| 欧美精品亚洲一区二区| 色5月婷婷丁香| 视频在线观看一区二区三区| 国产精品欧美亚洲77777| 9热在线视频观看99| 日韩视频在线欧美| 中文天堂在线官网| 狂野欧美激情性xxxx在线观看| 欧美精品亚洲一区二区| 深夜精品福利| av福利片在线| 9191精品国产免费久久| 国产精品麻豆人妻色哟哟久久| 成人亚洲欧美一区二区av| 又大又黄又爽视频免费| 亚洲av电影在线观看一区二区三区| 国产日韩欧美视频二区| 国产在线视频一区二区| 搡女人真爽免费视频火全软件| 国产1区2区3区精品| 国产一级毛片在线| 久久精品国产亚洲av涩爱| 汤姆久久久久久久影院中文字幕| av国产精品久久久久影院| 黄网站色视频无遮挡免费观看| kizo精华| 香蕉国产在线看| 观看美女的网站| 亚洲成人一二三区av| 欧美激情 高清一区二区三区| 老司机影院毛片| 久久这里只有精品19| 精品少妇内射三级| 久久精品国产a三级三级三级| 九草在线视频观看| 精品久久久久久电影网| 欧美 亚洲 国产 日韩一| 久久久a久久爽久久v久久| 熟女电影av网| 日韩三级伦理在线观看| 欧美国产精品va在线观看不卡| 在线观看一区二区三区激情| 一级片免费观看大全| 多毛熟女@视频| 国产精品一区www在线观看| 一个人免费看片子| freevideosex欧美| 久久97久久精品| 国产69精品久久久久777片| kizo精华| 草草在线视频免费看| 美女内射精品一级片tv| 国产xxxxx性猛交| 国产av码专区亚洲av| 一本—道久久a久久精品蜜桃钙片| 又黄又粗又硬又大视频| 久久狼人影院| 亚洲激情五月婷婷啪啪| 视频中文字幕在线观看| 97在线人人人人妻| 伊人亚洲综合成人网| 亚洲欧洲精品一区二区精品久久久 | 久久久欧美国产精品| 男女边摸边吃奶| 亚洲精品国产色婷婷电影| 欧美3d第一页| 老司机影院毛片| 少妇的丰满在线观看| 热99国产精品久久久久久7| 国产免费又黄又爽又色| 精品人妻偷拍中文字幕| 亚洲 欧美一区二区三区| 精品99又大又爽又粗少妇毛片| 看十八女毛片水多多多| 日韩制服骚丝袜av| 老司机影院成人| 日韩一区二区视频免费看| 视频在线观看一区二区三区| 亚洲精品av麻豆狂野| 丝瓜视频免费看黄片| 人人妻人人澡人人爽人人夜夜| 国产成人91sexporn| 国产精品久久久久成人av| 国产成人精品一,二区| 国产有黄有色有爽视频| 国产精品国产三级专区第一集| 亚洲高清免费不卡视频| 日韩av免费高清视频| 国国产精品蜜臀av免费| 啦啦啦在线观看免费高清www| 午夜91福利影院| 日韩 亚洲 欧美在线| 久久这里有精品视频免费| 高清黄色对白视频在线免费看| 草草在线视频免费看| 亚洲 欧美一区二区三区| 乱人伦中国视频| 热99国产精品久久久久久7| 麻豆乱淫一区二区| 亚洲精品一二三| 一级片免费观看大全| 日韩三级伦理在线观看| 纵有疾风起免费观看全集完整版| 人人妻人人澡人人看| 国国产精品蜜臀av免费| 久久97久久精品| 国产av国产精品国产| av不卡在线播放| 又黄又爽又刺激的免费视频.| 免费av不卡在线播放| 一区二区av电影网| 亚洲,一卡二卡三卡| 欧美3d第一页| 不卡视频在线观看欧美| 国产免费福利视频在线观看| 国产精品.久久久| 中文字幕另类日韩欧美亚洲嫩草| 国产国语露脸激情在线看| 成人18禁高潮啪啪吃奶动态图| 精品一区二区三区视频在线| 久久精品国产a三级三级三级| 日韩在线高清观看一区二区三区| 日本色播在线视频| 欧美国产精品一级二级三级| 卡戴珊不雅视频在线播放| 丰满少妇做爰视频| 欧美日韩亚洲高清精品| 国产乱人偷精品视频| 日本免费在线观看一区| 免费播放大片免费观看视频在线观看| 国产片内射在线| 午夜老司机福利剧场| 在现免费观看毛片| 亚洲精品中文字幕在线视频| 成年动漫av网址| 亚洲欧美一区二区三区黑人 | h视频一区二区三区| 国产欧美亚洲国产| 在线天堂中文资源库| 男的添女的下面高潮视频| 日本午夜av视频| 国国产精品蜜臀av免费| 建设人人有责人人尽责人人享有的| 久久久久久久大尺度免费视频| 十八禁网站网址无遮挡| 国产极品天堂在线| 国产男人的电影天堂91| 欧美国产精品va在线观看不卡| 老女人水多毛片| 亚洲第一区二区三区不卡| 日本猛色少妇xxxxx猛交久久| 欧美成人午夜精品| 亚洲,欧美,日韩| 亚洲国产精品一区二区三区在线| 精品一区二区三区四区五区乱码 | 在线观看国产h片| 中文乱码字字幕精品一区二区三区| 国产精品久久久久久久久免| 日韩电影二区| 国产熟女欧美一区二区| 亚洲av男天堂| 日韩免费高清中文字幕av| 国产精品久久久久久精品古装| 巨乳人妻的诱惑在线观看| 性高湖久久久久久久久免费观看| 观看av在线不卡| 少妇的丰满在线观看| 热99国产精品久久久久久7| 久久99热6这里只有精品| 欧美 日韩 精品 国产| 免费看不卡的av| 日韩av不卡免费在线播放| 我的女老师完整版在线观看| 多毛熟女@视频| 男人爽女人下面视频在线观看| 一级爰片在线观看| 国产白丝娇喘喷水9色精品| 国产麻豆69| 久久99热这里只频精品6学生| 一边摸一边做爽爽视频免费| 成人午夜精彩视频在线观看| 亚洲av日韩在线播放| 国产国拍精品亚洲av在线观看| 男男h啪啪无遮挡| 一本大道久久a久久精品| 三上悠亚av全集在线观看| 69精品国产乱码久久久| 色婷婷av一区二区三区视频| 久久 成人 亚洲| 国产亚洲一区二区精品| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 国产无遮挡羞羞视频在线观看| 午夜视频国产福利| 大陆偷拍与自拍| 国产激情久久老熟女| 精品一区二区三区视频在线| 久久毛片免费看一区二区三区| 18在线观看网站| 中国国产av一级| 国产精品一二三区在线看| videos熟女内射| 黄色配什么色好看| 国产欧美日韩综合在线一区二区| 精品第一国产精品| 亚洲精品第二区| 国产xxxxx性猛交| 免费女性裸体啪啪无遮挡网站| 免费观看a级毛片全部| 成人18禁高潮啪啪吃奶动态图| a 毛片基地| 极品少妇高潮喷水抽搐| 欧美激情极品国产一区二区三区 | 在线 av 中文字幕| 国产又爽黄色视频| 交换朋友夫妻互换小说| 欧美+日韩+精品| av免费在线看不卡| 卡戴珊不雅视频在线播放| 国产亚洲一区二区精品| 久久久久久久久久成人| 少妇人妻 视频| 国产精品久久久久久精品电影小说| 十八禁网站网址无遮挡| 日韩中文字幕视频在线看片| 黄色视频在线播放观看不卡| 亚洲国产精品999| 2022亚洲国产成人精品| 国产精品三级大全| 麻豆乱淫一区二区| 性高湖久久久久久久久免费观看| av福利片在线| 在线 av 中文字幕| kizo精华| 日韩精品有码人妻一区| av卡一久久| 国产爽快片一区二区三区| 在线天堂中文资源库| 亚洲av男天堂| 99热这里只有是精品在线观看| 90打野战视频偷拍视频| 美女主播在线视频| 在线观看免费高清a一片| 极品少妇高潮喷水抽搐| 亚洲欧美精品自产自拍| 多毛熟女@视频| 人妻系列 视频| 九草在线视频观看| 日本av免费视频播放| 最后的刺客免费高清国语| 久久久精品免费免费高清| 两性夫妻黄色片 | 精品亚洲乱码少妇综合久久| 男女下面插进去视频免费观看 | 久久国内精品自在自线图片| 九九爱精品视频在线观看| 深夜精品福利| 亚洲一区二区三区欧美精品| 在线观看三级黄色| 国产 精品1| 亚洲国产日韩一区二区| 久久久久精品久久久久真实原创| 日韩免费高清中文字幕av| 亚洲少妇的诱惑av| 99国产综合亚洲精品| 又粗又硬又长又爽又黄的视频| 热99国产精品久久久久久7| av视频免费观看在线观看| 精品国产乱码久久久久久小说| 人妻人人澡人人爽人人| 亚洲丝袜综合中文字幕| 免费观看av网站的网址| www.熟女人妻精品国产 | 人成视频在线观看免费观看| 2018国产大陆天天弄谢| 国产精品久久久久久久久免| 国产成人精品无人区| 国产精品欧美亚洲77777| 五月天丁香电影| 国产xxxxx性猛交| 精品福利永久在线观看| 国产日韩一区二区三区精品不卡| 中文字幕免费在线视频6| 人成视频在线观看免费观看| 亚洲色图综合在线观看| 国产在线一区二区三区精| 看十八女毛片水多多多| √禁漫天堂资源中文www| 黑人巨大精品欧美一区二区蜜桃 | 天美传媒精品一区二区| 涩涩av久久男人的天堂| 国产福利在线免费观看视频| av一本久久久久| 国产爽快片一区二区三区| 日韩av在线免费看完整版不卡| 美女内射精品一级片tv| 欧美97在线视频| 久久99精品国语久久久| 男男h啪啪无遮挡| 亚洲精品一区蜜桃| 日韩av在线免费看完整版不卡| 在线观看美女被高潮喷水网站| 老熟女久久久| 一级,二级,三级黄色视频| 两个人看的免费小视频| 纯流量卡能插随身wifi吗| 制服丝袜香蕉在线| 毛片一级片免费看久久久久| 在线观看免费视频网站a站| 一级,二级,三级黄色视频| 久久午夜福利片| 免费人成在线观看视频色| 波多野结衣一区麻豆| 狂野欧美激情性bbbbbb| 欧美人与善性xxx| 久久久久精品久久久久真实原创| 亚洲av免费高清在线观看| 久久婷婷青草| 亚洲欧洲国产日韩| 久久久久国产精品人妻一区二区| 亚洲精品美女久久久久99蜜臀 | 亚洲精品乱久久久久久| 最近2019中文字幕mv第一页| 深夜精品福利| 一本—道久久a久久精品蜜桃钙片| 国产成人欧美| 肉色欧美久久久久久久蜜桃| 久久ye,这里只有精品| 中文字幕亚洲精品专区| 日韩人妻精品一区2区三区| 久久97久久精品| 免费人成在线观看视频色| 色婷婷av一区二区三区视频| 99热6这里只有精品| 肉色欧美久久久久久久蜜桃| 黄色毛片三级朝国网站| 18+在线观看网站| 亚洲综合色惰| 熟女人妻精品中文字幕| 久久久久久久久久久免费av| 激情五月婷婷亚洲| 久久人人97超碰香蕉20202| 22中文网久久字幕| 丝袜美足系列| 国产又色又爽无遮挡免| 亚洲一级一片aⅴ在线观看| 亚洲精品国产av蜜桃| 在线观看免费日韩欧美大片| 欧美 亚洲 国产 日韩一| 成人午夜精彩视频在线观看| 制服诱惑二区| 亚洲四区av| 波野结衣二区三区在线| 日本爱情动作片www.在线观看| 国产午夜精品一二区理论片| 国产精品国产三级国产av玫瑰| 亚洲av综合色区一区| 国产精品久久久久久久电影| 一级爰片在线观看| 91午夜精品亚洲一区二区三区| 国语对白做爰xxxⅹ性视频网站| 亚洲欧美成人精品一区二区| 国产欧美日韩综合在线一区二区| 侵犯人妻中文字幕一二三四区| 国产男女超爽视频在线观看| 啦啦啦在线观看免费高清www| 亚洲精品中文字幕在线视频| 熟女电影av网| 久久 成人 亚洲| 国产不卡av网站在线观看| 久久99蜜桃精品久久| 日日爽夜夜爽网站| 一个人免费看片子| 日韩中字成人| 99热全是精品| 成人毛片a级毛片在线播放| 美女福利国产在线| 99国产精品免费福利视频| 七月丁香在线播放| a级毛色黄片| 亚洲精品久久久久久婷婷小说| 男人爽女人下面视频在线观看| 欧美日韩一区二区视频在线观看视频在线| 久久青草综合色| 日韩视频在线欧美| 99久久中文字幕三级久久日本| 九九爱精品视频在线观看| 汤姆久久久久久久影院中文字幕| 亚洲国产精品成人久久小说| 捣出白浆h1v1| 2018国产大陆天天弄谢| 如何舔出高潮| 寂寞人妻少妇视频99o| 免费观看无遮挡的男女| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 美女大奶头黄色视频| 99久久精品国产国产毛片| 国产精品一区二区在线观看99| 国产视频首页在线观看| 丁香六月天网| 欧美日韩精品成人综合77777| 少妇熟女欧美另类| 亚洲精品乱码久久久久久按摩| 国产高清不卡午夜福利| 亚洲av成人精品一二三区| 天堂俺去俺来也www色官网| 欧美日韩综合久久久久久| 一二三四中文在线观看免费高清| 亚洲国产精品999| 男女边吃奶边做爰视频| 国产免费又黄又爽又色| 日韩精品有码人妻一区| 天堂俺去俺来也www色官网| 成人毛片a级毛片在线播放| 精品国产国语对白av| 岛国毛片在线播放| 天美传媒精品一区二区| 欧美激情 高清一区二区三区| 精品午夜福利在线看| 极品少妇高潮喷水抽搐| 中文字幕人妻熟女乱码| 性色av一级| 亚洲精品视频女| 97人妻天天添夜夜摸| 国产精品 国内视频| 久久国内精品自在自线图片| 亚洲人成77777在线视频| 午夜免费鲁丝| 18禁国产床啪视频网站| 在线观看三级黄色| 国产精品麻豆人妻色哟哟久久| 菩萨蛮人人尽说江南好唐韦庄| 在线免费观看不下载黄p国产| 亚洲一码二码三码区别大吗| 好男人视频免费观看在线| 亚洲在久久综合| 免费大片18禁| 18+在线观看网站| 18禁裸乳无遮挡动漫免费视频| 中文字幕亚洲精品专区| 如日韩欧美国产精品一区二区三区| 侵犯人妻中文字幕一二三四区| 国产熟女欧美一区二区| av在线播放精品| 九草在线视频观看| 日本av手机在线免费观看| 精品人妻在线不人妻| 中国三级夫妇交换| 国产亚洲精品第一综合不卡 | 国产精品久久久久久久久免| 18在线观看网站| 97精品久久久久久久久久精品| 欧美精品一区二区大全| 久久久久国产精品人妻一区二区| 99香蕉大伊视频| 国产精品久久久av美女十八| 久久人人爽av亚洲精品天堂| 女性生殖器流出的白浆| 亚洲欧美中文字幕日韩二区| 69精品国产乱码久久久| 免费少妇av软件| 国产精品女同一区二区软件| 熟女电影av网| 久久99热6这里只有精品| www.色视频.com| 午夜视频国产福利| 国产成人a∨麻豆精品| 人成视频在线观看免费观看| 欧美日韩亚洲高清精品| 又粗又硬又长又爽又黄的视频| 亚洲成av片中文字幕在线观看 | 欧美日韩av久久| 69精品国产乱码久久久| 日韩视频在线欧美| 日本爱情动作片www.在线观看| av.在线天堂| 丰满饥渴人妻一区二区三| 亚洲国产av影院在线观看| 男女无遮挡免费网站观看| 久久久久久久精品精品| 肉色欧美久久久久久久蜜桃| 欧美3d第一页| 国产欧美另类精品又又久久亚洲欧美| 欧美+日韩+精品| 国产精品久久久久成人av| 成人手机av| 极品少妇高潮喷水抽搐| 成人18禁高潮啪啪吃奶动态图| 久久久久久久久久人人人人人人| 最近2019中文字幕mv第一页| 亚洲美女视频黄频| 国产精品国产av在线观看| 91精品国产国语对白视频| 成人毛片a级毛片在线播放| 国产欧美日韩一区二区三区在线| 午夜久久久在线观看| 精品酒店卫生间| 午夜激情av网站| 99香蕉大伊视频| 日韩电影二区| 午夜福利视频精品| 日韩av在线免费看完整版不卡| 黑人巨大精品欧美一区二区蜜桃 | 国产一区二区激情短视频 | av视频免费观看在线观看| 国产成人a∨麻豆精品| 天天躁夜夜躁狠狠久久av| 韩国精品一区二区三区 | 国产免费现黄频在线看| 97精品久久久久久久久久精品| 精品久久久久久电影网| 亚洲精品一二三| 最近手机中文字幕大全| 国产 一区精品| 国产成人精品一,二区| 久久精品久久精品一区二区三区| 欧美精品一区二区大全| 国产深夜福利视频在线观看| 久久ye,这里只有精品| 最近中文字幕2019免费版| 亚洲精品成人av观看孕妇| 亚洲av.av天堂| 高清视频免费观看一区二区| 免费日韩欧美在线观看| 日韩伦理黄色片| 少妇被粗大的猛进出69影院 | 岛国毛片在线播放| 狂野欧美激情性bbbbbb| 久久久久久伊人网av| 亚洲性久久影院| 一级片'在线观看视频| 99re6热这里在线精品视频| 成年人午夜在线观看视频| 观看av在线不卡| 日韩欧美一区视频在线观看| 午夜福利视频精品| 汤姆久久久久久久影院中文字幕| tube8黄色片| 亚洲,一卡二卡三卡| 久久久久久久久久久久大奶| 国产在线一区二区三区精| 一级片'在线观看视频| 免费大片黄手机在线观看| www日本在线高清视频| 日韩精品有码人妻一区| 日韩在线高清观看一区二区三区| 99久久精品国产国产毛片| 日本午夜av视频| 日韩一区二区视频免费看| 日日爽夜夜爽网站| 伊人亚洲综合成人网| av黄色大香蕉| 校园人妻丝袜中文字幕| 伊人亚洲综合成人网| 久久精品国产鲁丝片午夜精品| 免费大片18禁| 免费观看av网站的网址| 在线亚洲精品国产二区图片欧美| 丰满乱子伦码专区| 日本免费在线观看一区| 狠狠精品人妻久久久久久综合| 丰满乱子伦码专区| 免费观看在线日韩| 久久久久久人妻| 欧美性感艳星| 寂寞人妻少妇视频99o| 黑人巨大精品欧美一区二区蜜桃 | 老司机影院毛片| 免费看av在线观看网站| 九色成人免费人妻av| 波野结衣二区三区在线| 在线观看www视频免费| 免费久久久久久久精品成人欧美视频 | 欧美日韩综合久久久久久|