• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    2021-12-16 06:39:38ShumailaShahzadiFahadAhmadAsmaBasharatMadallahAlruwailiSaadAlanaziMamoonaHumayunMuhammadRizwanandShahidNaseem
    Computers Materials&Continua 2021年3期

    Shumaila Shahzadi,Fahad Ahmad,*, Asma Basharat,Madallah Alruwaili,Saad Alanazi,Mamoona Humayun, Muhammad Rizwan and Shahid Naseem

    1Department of Computer Sciences, Kinnaird College for Women, Lahore, 54000, Pakistan

    2College of Computer and Information Sciences, Jouf University, Sakaka, 72341,Saudi Arabia

    3Division of Computer Science &Information Technology, University of Education, Lahore, 54000,Pakistan

    Abstract:With the rising demand for data access,network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access.To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization(NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance,and increase maintenance cost.The existing frameworks lack in security,and computer systems face few abnormalities,which prompts the need for different recognition and mitigation methods to keep the system in the operational state proactively.The fundamental concept behind SDN-NFV is the encroachment from specific resource execution to the programming-based structure.This research is around the combination of SDN and NFV for rational decision making to control and monitor traffic in the virtualized environment.The combination is often seen as an extra burden in terms of resources usage in a heterogeneous network environment,but as well as it provides the solution for critical problems specially regarding massive network traffic issues.The attacks have been expanding step by step; therefore, it is hard to recognize and protect by conventional methods.To overcome these issues, there must be an autonomous system to recognize and characterize the network traffic’s abnormal conduct if there is any.Only four types of assaults,including HTTP Flood,UDP Flood,Smurf Flood,and SiDDoS Flood,are considered in the identified dataset,to optimize the stability of the SDN-NFVenvironment and security management,through several machine learning based characterization techniques like Support Vector Machine(SVM),K-Nearest Neighbors(KNN),Logistic Regression(LR)and Isolation Forest(IF).Python is used for simulation purposes, including several valuable utilities like the mine package, the open-source Python ML libraries Scikit-learn,NumPy,SciPy,Matplotlib.Few Flood assaults and Structured Query Language (SQL) injections anomalies are validated and effectively-identified through the anticipated procedure.The classification results are promising and show that overall accuracy lies between 87%to 95%for SVM,LR,KNN,and IF classifiers in the scrutiny of traffic,whether the network traffic is normal or anomalous in the SDN-NFV environment.

    Keywords: Software defined network; network function virtualization; machine learning; support vector machine; K-nearest neighbors; logistic regression;isolation forest;anomaly detection;attacks

    1 Introduction

    In this research, the proposed framework may help develop a comprehensive response for insufficiency, odd acknowledgment, shirking, and augmentation to delineate availability and capability under any conditions.

    1.1 Anomaly Types

    The anomaly is an undefined property of a standard sample.To understand the anomaly, different algorithms are required.The anomaly is analyzed under three headings:

    ●If a particular sample of data looks different from the properties it carries from the entire dataset;it is called a point anomaly.

    ●A data sample’s out-of-pattern behavior depends on or occurs under specific conditions known as a contextual anomaly.

    ●According to standard data, if a data load consisting of similar data has anomalous properties, it is called the collective anomaly.

    1.2 Network Attacks

    The network security principle tries to secure the network from malicious data using confidentiality,integrity, and availability.All network characteristics and their relationship with different malicious attacks are shown in Fig.1.

    Figure 1: Security management through anomaly detection

    ●Information should be accessible only to authentic users, and unauthorized users would be barred named as confidentiality [1].

    ●Adding,modifying, and deleting information can only be done by the authentic user.Unauthorized users would not be able to modify information is called integrity [2].

    ●The system should always provide accessibility to the authentic user.

    1.3 Network Attacks

    The major types of network attacks include:

    ●HTTP-Flood is a Distributed Denial of Service(DDoS)attack flooded over a web application using port 80,through HTTP GET or POST request.In a web application,HTTP might not be used for illformed packets,bluffing,or replication.

    ●UDP-Flood Attack is a Denial of Service (DoS) attack processed over the User Datagram Protocol(UDP) using port 53 as a target port to an IP address.DoS attack is flooded in the form of an application-specific irregular UDP.

    ●To accomplish DDoS,a web site using SQL injection,SQL Injection is an application layer attack that takes advantage of security vulnerabilities in websites and applications,and when executed,gives the hacker access to an underlying database is known as SiDDoS attack.

    ●In the Smurf attack, Internet Control Message Protocol (ICMP) can be used to broadcast a request from a target node, transmit network traffic, and slow down its transmission speed[3].

    1.4 Software Defined Network

    SDN’s primary function is to manage the system,control,and vesting the system’s capabilities to turn out simple programs and detach the system applications and system administration.It is legitimately programmable and permits to progressively arrange a comprehensive traffic stream to address evolving issues utilizing SDN programs.The system is legitimately brought together in a programmed SDN controller that keeps up an overall impression of the integrated system, which shows up as one single intelligent switch, as depicted in Fig.2 SDN might be considered as a controller that combines the framework coordinating rationally, and decoupling the data plane (send/receive packets) from the control plane(direct) [4].

    Figure 2: Software defined network architecture

    An essential segment in the control plane is the controller,which has an overall view of the network and can subsequently propel the organization of streams in a versatile and adaptable manner.The Open Flow scheme is the communication standard between both data and control planes [5].The scheme represents a channel between these two planes, making it possible to incorporate or remove entries in the switch stream tables.Besides this, programmable frameworks can shatter the interruptions to new and propelling advancements in computer networks.

    1.5 Network Functions Virtualization

    Network Function Virtualization (NFV) refers to adopting virtualization technologies in a network environment that separates system capacities from restrictive equipment and runs them as programming in virtual machines (VMs).The European Telecommunications Standards Institute (ETSI) has been leading the standardization of this approach.For example, the various capacities, firewalls, traffic control,and virtual directing are called Virtual Network Functions (VNFs).NFV uses virtualized networking components to support an infrastructure fully independent of hardware.Multiple VMs can run on a single server and scale to consume the remaining free resources.It means that resources are less often sitting idle, and data centers with virtualized infrastructure can be more effectively used.Within the data center and the outside networks,the data plane and control plane can also be virtualized with NFV[6].

    There are three principal parts in the NFV design: framework, administration, organization, and the executives presented in Fig.3.The infrastructure, known as NFVI (NFV Infrastructure), covers equipment and programming assets, just as the virtualization condition.The Service part covers the virtualized organize capacities, or VNFs, which are chosen from an archive.They are executed in virtualized conditions rather than devoted equipment (otherwise called center boxes).Finally,Management and Orchestration in NFV, known as NFVMANO, centers around increasingly particular errands.For example, if there is a firewall and an Intrusion Detection System (IDS) executed as VNFs,the NFV-MANO decides the request wherein packets of a stream should cross these VNFs[7].

    Figure 3: Network function virtualization

    1.6 Hybrid SDN-NFV Controller

    Network software is a growing optimistic phenomenon aimed at fundamentally advancing telecommunications industries by adopting network infrastructure, cloud computing technology, and software models [8].SDN and NFV are the main forces behind this transition.By decoupling the control and data plane, SDN provides a new level of network modifiability.A centralized controller supervises the network’s state and establishes instructions for the network components to appropriately handle the traffic flows.On the other hand, NFV enhances virtualization frameworks to implement network components as software instances, ensuring an increased degree of versatility and elasticity in services’ lifecycle management.By replacing dedicated expensive hardware with commodity servers to host software-based network appliances, NFV will allow a remarkable reduction in CAPEX/OPEX cost [9].Although SDN and NFV are two different frameworks, their everyday use will further improve the network’s potential security services and meet the broad array of those requirements imposed by new applications [10].The enormous number of resources and tactile internet applications are significant representations of challenging scenarios that reveal various new technology and vulnerabilities.Taking advantage of the versatility and scalability provided by SDN and NFV integration, the telecommunication operators should be able to effectively implement the necessary security policies in the designated environment[11].

    SDN and NFV combination can be used to handle control challenges in an SDN controller that can be virtualized throughout the cloud of servers rapidly.This method also delivers extra compensations such as reduced hardware maintenance idle-time and lessened recovery-time if disaster or failover occurs.

    NFVI delivers the infrastructure that involves all the hardware,and software means vital in organizing VNFs [12].The hardware means involve computing, storage, and network essentials that deliver the processing, storage, and connectivity competences to VNFs over a virtualization layer.The virtualization layer delivers an abstraction to the hardware and empowers the software to utilize the virtualized infrastructure as a substitute [13].

    1.7 Machine Learning Approach

    Machine learning enables systems to learn from the patterns given by it in the form of instructions.In machine learning, computers can be trained through instruction and assign different patterns and analyze their behavior in solving complex problems.Machine learning is used to interpret extensive and complicated data to make the existing systems autonomous by using some learning algorithms required to reason and process the raw data by incorporating supervised,unsupervised,and reinforcement learning.

    ●Supervised learning techniques,has expertly grouped,and marked the training information.

    ●Unsupervised learning separates the information into bunches as per different properties and watches their relationship.

    ●Reinforcement learning is required to labeled or unlabeled a tiny portion of the data.

    This learning is also combined the high performance of supervised learning with the low performance of unsupervised learning.

    1.8 Machine Learning Classifiers

    Machine Learning empowered classifiers are used for classification purposes in different scenarios.Identification of different kinds of attacks in the SDN-NFV environment through different ML classifiers can also be planned, and accuracy can be used to measure each classifier [14].The detector can use multiple classification models like Support Vector Machine (SVM), Isolation Forest (IS), K-Nearest Neighbors (KNN), and Logistic Regression (LR).Different implementations’ performance rate shows that the KNN classifier is much better than other competing classifiers in diverse kinds of attack detection.The improved performance rate of detecting attacks in the SDN-NFV environment will reduce the delay in processing time with an extensive load [15].The purpose of traffic quality improvement is to ensure the network services and end-user quality of experience in the NFV environment [16].

    ●Support Vector Machine (SVM) could be applied to distinguish unusual conduct and stretch out to identify a few sorts of assaults from traffic.SVM is an unsupervised ML algorithm that can be used for anomaly detection.The main goal of SVM is to classify each packet of traffic in two distinct classes.1 is used to represent “Normal,” and +1 is used for “Anomaly/Attack,” and then C-SVC is used to solve the following optimization problem.

    The extreme hyperplane helps to characterize which inclination of all the conceivable isolating lines is the best classifier.SVM chooses the most considerable edge for isolating hyperplane and augments the capacity to incorporate any concealed quality.A straight condition can define the new hyperplane.

    The distance between the hyperplane and the data points can be calculated by:

    ●Isolation Forest unequivocally distinguishes abnormalities instead of describing specific information.IF, similar to any tree ensemble strategy, is based on the choice of trees.It assembles a decent performing model with few trees utilizing little subtests of fixed size, paying little heed to an informational index’s size.An abnormality score is required for dynamics on account of IF.It is characterized as:

    where N is a total number of trees,M is a total number of binary splits,k is a total number of data points in the final node, and n is the total number of data points in a sample.Each observation is given an anomaly score, and the decision can be made accordingly if Score = 1 indicates anomalies, if Score<0.5 indicates standard observations,and otherwise if Score=0.5 indicates isolation.

    ●The K-Nearest Neighbor’s algorithm (k-NN) is a nonparametric approach utilized in classification;the yield is a class association.Traffic is classified by a plurality vote of its neighbors, with the traffic being allotted to the anomaly class famous among its k nearest neighbors.If k = 1, then the traffic is simply allocated to that single nearest neighbor’s anomaly class.

    ●Logistic Regression or logistic model is used to model the probability of an anomaly class that occurs.It can be extended to model several classes with different features consideration.

    1.9 Problem Statement

    The standing frameworks are deficient in security,and computer systems face few irregularities,which stimulates the necessity for an innovative recognition and mitigation approaches to keep the system in the operative state.To cope with the Software Defined Network (SDN) and Network Function Virtualization(NFV) inadequacies, it is essential to eradicate network security configuration errors that can create susceptibilities that affect overall efficiency, lessen network performance, increase maintenance cost, and compromise the quality of service.

    1.10 Objectives

    This research will contribute by achieving the following objectives in the SDN-NFV environment:

    ●Real-time recognition of assaults quickly and viable by considering system oddity with ML strategies in the SDN-NFV environment.

    ●To enhance security management of the SDN-NFV environment.

    ●Augmentation of QoS and user experience optimization in the SDN-NFV environment.

    2 Literature Review

    Software Defined Network (SDN) entails unique security concerns, especially where its controller is defenseless against attacks by Distributed Denial of Service (DDoS).If DDoS attacks occur against the SDN server, the server’s operation and contact capability would be overwhelmed and detected DDoS attacks in SDN using an ML-based model through feature selection methods.To simplify these models,feature selection methods were selected whose training time is comparatively shorter [3].

    Open stack-based private cloud is used to detect DDoS attacks that directly target the bandwidth flooding, connection flooding, and the server infrastructure over the internet using network protocols and standards [17].DDoS attacks threaten the cloud’s network layer, set up with invalid requests, and refuse legitimate requests.The proposed framework with embedded OpenStack firewall and raw socket programming focused on controlling the network traffic.machine learning techniques such as Decision Tree (DT), K-Nearest Neighbor (KNN), Naive Bayes, and Deep Neural Network (DNN) algorithms have been compared against the trained model based on the dataset created during the management of DDoS attack.From the reported outcomes, it is depicted that DNN has higher precision and accuracy than other classifiers.

    Internet of Things(IoT)systems are vulnerable to various security threats ranging from DoS to intrusion into the network and data storage[16,18].A novel security architecture based on machine leaning has been proposed,which leverages both SDN and NFV,enables them to mitigate various threats[19].The projected intelligent platform incorporates the monitoring agent and reaction agent that uses machine learning models in IoT to differentiate network traffic patterns.The rate of anomalies’identification was promising[20,21].

    Artificial Intelligence (AI) based defense mechanisms proposed a novel approach known as Multi-Layered Intrusion Detection and Prevention (ML-IDP) to identify intrusion in the SDN-NFV enabled cloud of 5G networks.The proposed approach defends against security attacks using AI [22].The proposed ML-IDP approach is tested using NS3.26 for various security threats, including IP spoofing,overloading the flow table, DDoS, control plane saturation, and hijacking of host location.From the results of the experiment, it is proved that the ML-IDP effectively detects and avoids attacks [23].The artificial intelligence has much more application in the security management regime that guides to look into human-like cognitive abilities to attain more consistent and operative defense capacities [24].

    Classification models Support Vector Machine (SVM), Naive Bayes (NB), Artificial Neural Network(ANN), and K-Nearest Neighbors (KNN) have been trained and tested with the identified dataset [25].The test results showed that using the wrapper feature selection with a KNN classifier achieved the maximum accuracy rating in DDoS attack detection.The outcome shows that ML-based selection algorithms can produce improved results through detecting DDoS attacks in the SDN environment with decent loads and reduce processing time[26,27].

    The Mouseworld, an SDN-NFV based safety traffic analysis, described a novel experimental system,integrating SDN and NFV to establish an ecosystem capable of mixing, transmitting real and synthetic traffic, storing, and marking useable this traffic for training and validation purposes [28].ML algorithms are used to identify cybersecurity threats [29].The Mouseworld architecture comprises a series of modules for traffic generation, selection, analytics, algorithm training, and visualization.The results presented security threat detection to confirm the feasibility and validity of the proposed system [30].

    Machine Learning(ML)assisted planning,and provisioning for SDN-NFV enabled Metropolitan Area Networks (MANs) to support the control plane in making strategic decisions by using intelligent optimization algorithms [31].The suggested architecture ensures equal behavior against the past, present,and future applications, for instance, network resource allocation decisions using ML approaches as an executive.The Net2Plan platform, Python platform support ML algorithms, libraries in SDN-NFVenabled MANs and express favorable outcomes[32,33].

    3 Materials and Methods

    The development of new traffic monitoring and identification practices to distinguish and characterize unusual traffic is a fundamental concern to secure the system against noxious assaults.

    3.1 Incoming Network Traffic

    Capturing traffic is the initial phase for monitoring of network traffic in the NFV component.Interruptions can be either inside or outside; therefore, approaching traffic and nearby traffic should be checked.Traffic can be observed and caught at various levels, which not just influences the data accessible for investigation, yet additionally,the exactness of the performance rate for identification.

    3.2 Mitigation Agent

    After capturing traffic,it is the point to recognize the presence of anomalous cases in traffic flow.For the most part,traffic is preprocessed before being passed to the specialized layer.This layer grasped attacks by identifying the altered part of the traffic.In this way, attacks are distinguished from regular traffic by the mitigation process.Fig.4 represents the process of identification, and there are some specific features which are essential to identify anomaly or attack:

    Figure 4: Attack detection in network function virtualization layer

    3.2.1 Volume

    The size and complexity of network traffic have increased more rapidly.Thus, traditional timeconsuming methods of traffic anomaly detection can no longer meet the timeliness requirement.

    3.2.2 Assortment

    Network traffic is generated from diverse sources.Novel attacks can overlook the detection systems based on signatures and cause significant damage.

    3.2.3 Worth

    With the low-value density,some traffic data features do not play a role in identifying anomaly or even hinder the process.

    3.2.4 Speed

    Velocity detection is critical.Anomalies are ultimate to be detected in real-time.

    3.3 Monitoring

    The initial phase of anomaly identification is to gather features of traffic streams.This refers to the controller investigating the flow of data for authorized access before sending it to the NFV component’s various resources.

    3.3.1 Flow Explorer

    It is essential to pick a reasonable performance level of measuring attacks that differentiate different classes of anomaly cases and normal cases in the dataset and find the occurrence at which layer or resources.

    3.3.2 Flow Collector

    After setting a measurement scale of flow level,the identification process is happening to check if the flow level is excessively high at resources or layer,then data is passed to the analyzer phase.Then again,if the flow level is excessively low at the controller,missing data are gathered,in light of which the irregularity resource may neglect to distinguish certain anomalous cases.

    3.4 Data Controller

    In this process, the data controller is versatile and intelligently handles the SDN and NFV based environment, and as per some fundamental processes, an analyzer can progressively determine the levels of complexity for different layers.For example, the identifier may demand a better precision for the flow of data, which causes disturbing behavior or a smaller irregularity in the flow of data traffic.The data controller controls and makes optimized data handling by passing data to multiple modules represent in the flowchart shown in Fig.5.

    Figure 5: Identification scheme for inliers& outliers

    3.4.1 Data Generation

    To understand the upcoming issues, framework engineering recognizes both high-and low-volume attacks level.In the proposed framework, the controller can be identified as an incoming attack presence within the system and can classify online traffic by utilizing an ML-based procedure.The ML-based procedure can help make derivations using periodic traffic tests to arrange modules through data stream scrutiny.The proposed approach is good with the framework and does not require any more memory consumption.Besides this, client information security is ensured at all phases of framework activity.

    3.4.2 Transforming Data

    Procedures,such as separating,changing,and naming the database cases,are performed in this module.The data flow traffic is separated from the recognized files and passes to the next module.Each transformed multiclass data is based on the descriptor database containing all factors.The multiclass data with their data type is transformed using the lable_encoder command to make efficiently accessible data flows for various ML classifiers.

    3.4.3 Model Training

    A way to deal with programmed highlight choices has been created utilizing the cross-approval method for models that meet specific classification quality measures.This methodology is utilized to define the data points received by training data.

    3.5 Analyzer

    Enhancement in performance is a significant breakthrough in the identification mechanism, which involves identifying the least possible set of inputs capable of effectively representing different components.A few strategies for variable choice are accessible in writing and actualized in programming libraries like Scikit-learn.The choice of features is performed.Some AI calculations are broadly utilized,i.e., IF, LR,KNN, and SVM.

    3.5.1 Classification

    The dataset covers machine learning methods capable of detecting intrusions of all ordinary examples;exceptional execution in real conditions is not guaranteed regardless of whether the models achieve high precision on test sets.Features will be identified from the dataset, and further, classifiers will be utilized for classification into two disjoint classes normal or anomalous stream [34].

    3.5.2 Anomaly Detection

    Network attacks are affected by traffic instances designed to undermine a structured framework’s functionality, legitimacy, designation, trustworthiness, and other vital assets.The anomaly detection phase involves many attributes in the collected audit data.Various derived statistical measurements and the classification results will decide whether it is an attack.

    3.6 Decision and Reaction

    The global decision performs in a better way rather than local decisions to moderate the overload conditions.This process will be performed to analyze the performance quality of all VNFs in the NFV by considering an overloading condition.

    3.6.1 Reaction Notification

    The VNF-level segments will be responsible for analyzing the excess of network traffic,and instead of blocking the overall traffic,notify the component to reduce its traffic for malicious attack avoidance caused by users.The local decisions will be made by the VNF-level segments that can quickly lessen the overload state,whereas global decisions will be made by the network-level agents to regulate if the VNF-level agents are in overload state.If an overload state exists for a short time,the network agents will be allowed to elicit worldwide decisions.If the network controller requires more time to trigger than the VNF-level agents,network-level overload control will require different parameters to react against network traffic blockage.At this point,the VNF and NFV will be ceaselessly tuned.

    3.6.2 Reliable Incoming Traffic

    The reliable incoming traffic will be forwarded to the VNF component.

    3.7 Drop Network Traffic

    The VNF-level traffic will be blocked if network traffic will be flooded;instead,the network-level traffic will be blocked,and dismiss notifications will be sent to the VNF-level individually to each VNFs.

    Algorithm: Anomalous traffic identification

    ?

    4 Validation and Results

    For the detection of traffic anomaly or attack in the SDN-NFV environment,this research will work in the different phases as follows:

    4.1 Dataset Collection

    For efficient learning,a dataset has to be preprocessed.The dataset is accessible to the public and used in our research.It presents knowledge collected in a detailed state using the Network Simulator‘NS2’,which has four vicious attack categories: HTTP Flood, UDP Flood, DDoS Using SQL Infusion (SiDDoS), and Smurf, as shown in Tab.3.The dataset provides authoritative instances of a normal and malicious traffic attack.We present the analysis of the dataset’s features by using the observable investigation and techniques outlined in Tab.1.The dataset has twenty-eight features, five classes (four assault classes and one normal traffic class), and 21647 records.Tabs.2 and 3 represent the frequency records of packets types(ACK, CBR,PING, TCP)and normal/attack types.

    Table 1: Overview of the dataset

    4.2 Simulation Platform

    Python, an open-source, object-oriented programming language, is considered an attractive language due to its essential grammar and dynamic structure.In Python, it is straightforward to compose and investigate the code for errors.Despite each of these points of interest, it works with numerous libraries,where “AI” applications might be possible.In this unique context, Python was chosen because of its substantial interests.Sklearn (Scikit-learn) is an AI library that can be used with the programming language for Python.Sklearn offers a broad scope of choice to the user with its various AI applications.In Python, after loading the dataset, it described all the features of the dataset explained in Tab.4.Pandas is a fantastic information investigation library running on Python.When working with an enormous dataset, Pandas permit to handily perform numerous tasks, for example, sifting, mass section/column erasure, expansion, and substitution.Matplotlib is a library that is utilized to make diagrams for the investigation of results, and NumPy, a Python library that permits to perform scientific and coherent tasks rapidly and effectively.Here we take out the class name on the testing information by changing the ARFF document into the CSV record position.We have a sum of 28 attributes, including the class name.

    Table 2: Records of the packet type

    Table 3: Records of anomaly atta ck

    Table 4: Dataset feature

    ?

    4.2.1 Box and Whisker Graphics

    When reviewing these box and fraction graphics,reasonable utilization occurs for practically all types of attacks related to the identified features.The box plot (otherwise known as a box-and-whisker plot) is an integrated figure outlining a selected dataset’s general properties in an underlying representation.The lower limit of the container explains the main quartile Q1, such as the limit that indicates 25% of the estimations.The middle Q2 exists and represents the distance between the upper and lower quartiles,dIQR, is the interquartile range (IQR), and contains 50% of the data, and the top limit of the case states the Q3 quartile, that is 75% of the estimations.The midpoint of the overall situation, concerning Q1 and Q3, can demonstrate whether the rectangle is balanced or slanted.

    It provides a graphical depiction of the considered performance metrics through the boxplot diagrams shown in Fig.6, representing the distribution of each feature’s results.Each boxplot is representing the results for each distinct feature from Packet_ID to Packet_Class,respectively.Values that exceed 1.5dIQR above the upper quartile or below the lower quartile are considered minor outliers; values that exceed 3dIQR above the upper quartile or below the lower quartile are considered significant outliers.These four limits form the fences of the boxplot.Outliers are defined as values beyond the whiskers and marked with circle sign.

    Figure 6: Box and whisker plot for each attribute

    4.2.2 Frequency of Selected Dataset Features

    The most suggested method used to find all occurrences is to determine the frequency rate;this gets all element distribution and could also print single element frequency if required.Figs.7-9 represent the frequency ranges of Packer type (CBR, TCP, ACK, PING), Packet class (Normal, SiDDoS, UDP-Flood,HTTP-Flood,and Smurf),and Packet received(client 1, client 2, client 3,..,server1, etc.) from each node.

    Figure 7: Frequency of each packet type

    Figure 8: Frequency of each packet class

    Figure 9: Packet reception frequency from each node

    4.2.3 Histogram Plot for Feature’s Values

    Fig.10 shows the distribution of different network traffic features and indicate the unusual changes in features’ values as anomaly/attack in the form of different peaks.In the following representation, the statistical dispersal of different featured values is highly skewed due to the difference in each feature’s values.

    Figure 10: Histogram plot for statistically distributed feature’s values

    4.2.4 Training and Testing Dataset

    Once a refined dataset has obtained about traffic characteristics and features that have been selected from the dataset for building the model,the next step is to generate the train and test dataset for anomaly/attack detection.The dataset will be divided into two different datasets, namely training and testing datasets.The model will be built using the training set, and then we will test it on the testing set to evaluate how the model performs for anomaly/attack.Sklearn based, train_test_split, is utilized that isolates the information into two sections at the sizes determined by the user.Moreover, the primarily suggested ratio is 80% training, 20% testing dataset.The train_test_split order makes a choice asymmetrical while making a decision.This procedure is known as cross-validation.To guarantee that the outcomes acquired during the application are healthy.

    4.2.5 Normalization of Training Dataset

    Normalization is needed because the representation provided by its input vectors influence the model.It is a little bit like translating data,and the same scaling can be applied to training results.That means saving the scale and offset and used it again for the training results.Error is measured by comparing the training dataset results before and after normalization separately, which is visualized in Figs.11-13 represent the dataset’s flow that also normalized the confusion matrix at an appropriate scale.

    Figure 11: Confusion matrix for training dataset without normalization

    Figure 12: Confusion matrix for training dataset with normalization

    Figure 13: Normalization of features

    Fig.14 describes that the model will be programmed with consistent data, and all information would need to be converted to the training scale before it is fed into the model.The algorithm must return a weighted prediction and compare those predictions to achieve the performance metrics for comparison instances [35].The classification report is a Scikit-Learn built-in metric developed especially for classification problems.The report also returns average accuracy,precision,recall, and F1-score.

    Figure 14: Classification report

    4.2.6 Correlation Matrix

    The dataset contains records of the incoming/outgoing traffic in an SDN-NFV network.Each record captures some information about traffic like SRC_ADD, DES_ADD,…, LAST_PKT_RESERVED, etc.There is also a Boolean field -1 to 1 determining if that particular feature is positively correlated,negatively correlated, and neutral.The correlation matrix with relevant features represents the relationship among identified features,as shown in Fig.15.

    Figure 15: Correlation matrix to analyze anomaly attributes

    4.2.7 Evaluation Metrics

    TP,FP,TN,and FN are true positive,false positive,true negative,and false negative.Here,an attack is a positive class, and normal is a negative class.In calculating these four items, the four values summarized below are used:

    ●TP:True Positive(Correct Detection);the standard traffic is classified as normal.

    ●FP:False Positive(Type-1 Error); the standard traffic is classified as an anomaly/attack.

    ●FN:False Negative (Type-2 Error); malicious traffic is classified as normal.

    ●TN:True Negative (Correct Rejection), the malicious traffic is classified as anomaly/attack.

    This distribution is presented in Tab.5.by visualizing the Confusion matrix.

    Table 5: Performance metric

    4.2.8 Performance Measures

    Various measures are used to determine the execution of ML methods.Their proposed strategies have various attributes and give various outcomes for recognizing anomaly/attack.A few exhibition measures,such as accuracy, precision, recall, and false alarm rate, are calculated for identifying traffic as standard or malicious shown in Tab.6.

    Table 6: Number and ratio of normal and anomaly cases

    Accuracy measures the rate of accurately classified anomaly/attack instances in a class, and it can be called as:

    Accuracy= Number of correct detections/Total number of detections

    Precision is the ratio between the received relevant anomaly/attacks to the total number of relevant and irrelevant anomaly/attacks is called precision or positive predictive,and it can be calculated as:

    A recall is the ratio between the received relevant anomaly/attacks to the total number of relevant anomalous/attacks is called recall or positive sensitivity that can be calculated as:

    F1 Measure or F-score can be calculated by using the Harmonic Mean.It arranges the information to correctly classify the data, classify the observations, and recalls the characteristic achieved when a significant number of instances are not missed.

    Using the confusion matrix,it is easy to calculate the accuracy,precision,recall,and other performance rates of different ML classifiers.Figs.16-19 signify different ML classifiers’ performance through the Confusion matrix.

    Now statistical values about accuracy and anticipated characterizations are completed by the efficient models.Execution measurements of such models are ordinarily assessed utilizing the data in the lattice presented in Tabs.6 and 7.The outlier fraction is 0.1134.Fig.20 epitomizes the selected dataset’s anomaly/attack patterns according to the appropriate traffic type by a Confusion matrix.

    4.2.9 Detection of Anomaly by Inlier and Outliers

    This method attempts to distinguish incoming/outgoing traffic in the SDN-NFVenvironment as normal or anomaly/attack.In the SDN-NFV environment,an inlier pattern represents normal network behavior and outliers as possible anomalous attempts [36].Fig.21 shows the inliers and outliers for anomaly detection using machine learning techniques.

    Figure 16: Confusion matrix for support vector machine

    Figure 17: Confusion matrix for logistic regression

    Figure 18: Confusion matrix for K-nearest neighbors

    Figure 19: Confusion matrix for isolation forest

    Table 7: Inliers and outliers detection

    Figure 20: Confusion matrix for anomalous classes prediction

    Figure 21: Inlier and outliers detection by IF,CBLOF,and KNN

    5 Discussion

    This section sightsees outcomes of the proposed simulated framework.After accuracy measurement,precision is identified as actual and in-depth, correct classification measurement, i.e., how many are normal from all the instances classified.The values obtained show how effective the machine learning algorithms are when the incoming/outgoing traffic is classified as normal.It is also said to be a positive predictive factor.The average precision for SVM, LR, KNN, and IF are correspondingly in the range of 0.984, 0.982, and 0.983, 0.969 can be visualized in Tab.8.The classifiers are evaluated using the confusion matrix based on the measurements, as reported in Figs.16-19 for SVM, LR,KNN, and IF.

    Table 8: Performance results

    We have computed the accuracy, precision, and recall of our model from the above-reported confusion matrices.The overall accuracy is 87% to 95% for SVM, LR, KNN, and IF classifiers shown in Tab.8.In any case, it is necessary to visualize the precision limit, especially when the information is comprehensive,as in our model, where the number of cases in the normal class is higher than in the abnormal.The quality and analysis of every information are calculated in this manner.It is observed that all classifiers are accurately executed and checked for the identification of irregularities.The recall is described as being from all common instances; how many are categorized correctly.The recall results of each classifier were also represented in Tab.8.The algorithm with higher recall values shows minimal false negatives represent ML achieved high accuracy.F1 Score is the weighted average of precision and recall.Therefore,this score takes both false positives and false negatives into account.Intuitively it is not as easy to understand as accuracy,but F1 is usually more useful than accuracy,especially if the dataset has uneven class distribution.

    In optimization, performance can be compared in different settings through True Positive Rate(TPR) and False Positive Rate (FPR) values.The higher TPR values show a higher positive rate,which represents optimized performance, and the higher FPR values show a higher negative rate, which is not suitable for performance.In the Tab.9.SVM shows the highest TPR value, and IF shows the lowest FPR value.

    To compare our findings with similar studies, we created a comparison table.A study contains the NSL-KDD and CAIDA dataset with their machine learning classifier are given below [37]:

    Table 9: Performance rate for TPR and FPR

    It can be seen from Tab.10.that the proposed machine learning models using identified approaches in our study results are better in comparison with the results from the NSL-KDD and CAIDA dataset[27,38].It can be observed from the literature that similar studies used different models; therefore, it is difficult to compare results exactly.Finally, results show that the network services of the SDN-NFV environment proved successful in terms of detecting anomalies/attacks with machine learning techniques.The performance rate represented that anomalous cases in the dataset can be detected and optimized efficiently by using ML techniques.The algorithms proposed to work are implemented using Python.Several valuable utilities like the MINE package, the open-source Python ML libraries Scikit-learn,NumPy,SciPy,Matplotlib are also used during the simulation process.

    Table 10: Performance analysis of different classifier on NSL-KDD and CAIDA datasets

    In conclusion, the proposed framework SDN-NFV environment is deployed for monitoring of anomalous cases in network traffic to improve the network services and user quality of service time by using classification models based on machine learning techniques like SVM, LR, KNN, and IF,respectively to minimize or even eliminate human interference.Dataset has been selected that incorporates current attacks that have been infrequently used in the past for other studies.The dataset contains 28 features and five classes.The python platform is utilized in this work because Python can be utilized with high certainty because of its capability of creating legitimate outcomes that mirror a certain domain of intelligence.The gathered information has been recorded for various sorts of attacks and will notify the anomalous cases to the SDN-NFV controller, whereas the non-anomalous cases will be moved forward to the NFV layer for network services with higher accuracy rate.The ML algorithms applied to the identified dataset for grouping various kinds of attacks precisely: HTTP-Flood, UDP-Flood, Smurf,and SiDDoS.The selected ML classifiers accomplished the particular task with accuracy and precision, as discussed above.It will help to characterize the normal network traffic to ensure the network services of the SDN-NFV environment.

    Due to the research scope,some common types of attacks and security parameters have been selected,but in the future more categories of innovative attacks and features in SDN/NFV environment can be incorporated to better understand and cope with the identified issues.Furthermore, innovative algorithms can also be designed or existing can be modified to detect a broader range of attacks than already discussed to get far better efficiency and accuracy.

    Acknowledgement:Thanks to our families and colleagues who supported us morally.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产久久久一区二区三区| 狠狠狠狠99中文字幕| av.在线天堂| 久久精品国产亚洲av涩爱 | 午夜久久久久精精品| 天堂√8在线中文| 国产三级中文精品| 亚洲电影在线观看av| 国产91av在线免费观看| 嫩草影院新地址| 亚洲综合色惰| 国产高潮美女av| 日韩国内少妇激情av| 日韩欧美国产在线观看| 熟女人妻精品中文字幕| 又粗又硬又长又爽又黄的视频 | 男女啪啪激烈高潮av片| 亚洲av中文字字幕乱码综合| 秋霞在线观看毛片| 精品国产三级普通话版| 身体一侧抽搐| 欧美日韩综合久久久久久| 色视频www国产| 麻豆国产97在线/欧美| 国产蜜桃级精品一区二区三区| 中文欧美无线码| 男女啪啪激烈高潮av片| 三级经典国产精品| 在线国产一区二区在线| 老女人水多毛片| 久久精品国产亚洲av天美| 观看美女的网站| 亚洲av男天堂| 夜夜看夜夜爽夜夜摸| 久久鲁丝午夜福利片| 青春草视频在线免费观看| 中文字幕制服av| 青春草亚洲视频在线观看| 18禁黄网站禁片免费观看直播| 欧美人与善性xxx| 看片在线看免费视频| 天堂网av新在线| 亚洲美女搞黄在线观看| 直男gayav资源| 高清毛片免费看| 日本撒尿小便嘘嘘汇集6| 老司机影院成人| 一本久久中文字幕| 综合色丁香网| 国产亚洲91精品色在线| 男人舔女人下体高潮全视频| 国产精品无大码| 少妇的逼水好多| 一级av片app| 麻豆乱淫一区二区| 亚洲成a人片在线一区二区| 日本免费a在线| av又黄又爽大尺度在线免费看 | 亚洲av成人精品一区久久| 如何舔出高潮| 99热全是精品| 国产精品久久久久久精品电影小说 | 亚洲av.av天堂| 男人舔奶头视频| 夫妻性生交免费视频一级片| 看片在线看免费视频| 变态另类丝袜制服| 永久网站在线| 久久精品91蜜桃| 国产精品久久久久久久电影| av黄色大香蕉| 久久久久性生活片| 国产精品嫩草影院av在线观看| 99在线视频只有这里精品首页| 最近的中文字幕免费完整| 亚洲欧美清纯卡通| 激情 狠狠 欧美| 国产精品三级大全| 国产精品精品国产色婷婷| 久久久久久大精品| 国产成人精品婷婷| 蜜臀久久99精品久久宅男| 女同久久另类99精品国产91| 国产高清不卡午夜福利| 九九在线视频观看精品| 国产精品一区二区在线观看99 | 国产又黄又爽又无遮挡在线| 麻豆成人午夜福利视频| 亚洲国产精品成人综合色| 亚洲av第一区精品v没综合| 99在线人妻在线中文字幕| av免费在线看不卡| 少妇丰满av| 亚洲精品自拍成人| 日本五十路高清| 久久99蜜桃精品久久| 久久人人精品亚洲av| 国产av在哪里看| 国产精品一区二区在线观看99 | 美女脱内裤让男人舔精品视频 | 精品久久久噜噜| 蜜桃久久精品国产亚洲av| 99久国产av精品| 久久精品国产亚洲网站| 中文字幕精品亚洲无线码一区| 午夜爱爱视频在线播放| 亚洲欧美日韩高清专用| 六月丁香七月| 亚洲精品国产av成人精品| 国产精品爽爽va在线观看网站| 国产高清视频在线观看网站| 精品一区二区免费观看| 国产三级在线视频| 欧美三级亚洲精品| 网址你懂的国产日韩在线| 国产在线男女| 日韩大尺度精品在线看网址| 亚洲欧美日韩高清在线视频| 亚洲不卡免费看| 尤物成人国产欧美一区二区三区| 国产在线精品亚洲第一网站| 人妻久久中文字幕网| 欧美色欧美亚洲另类二区| 99久久无色码亚洲精品果冻| 能在线免费看毛片的网站| а√天堂www在线а√下载| 天美传媒精品一区二区| 久久韩国三级中文字幕| 美女cb高潮喷水在线观看| 乱人视频在线观看| 偷拍熟女少妇极品色| 日日摸夜夜添夜夜爱| 久久久国产成人免费| 精品无人区乱码1区二区| 夜夜夜夜夜久久久久| 亚洲最大成人手机在线| 欧美成人a在线观看| 午夜老司机福利剧场| 在现免费观看毛片| 青春草国产在线视频 | 春色校园在线视频观看| 国产亚洲av嫩草精品影院| 好男人在线观看高清免费视频| 日本爱情动作片www.在线观看| 插阴视频在线观看视频| 热99re8久久精品国产| 久久久国产成人精品二区| 午夜精品国产一区二区电影| 丁香六月天网| 在线播放无遮挡| 蜜桃在线观看..| 欧美人与善性xxx| 你懂的网址亚洲精品在线观看| 精品人妻偷拍中文字幕| 亚洲精品视频女| 丰满乱子伦码专区| 欧美3d第一页| 51国产日韩欧美| 美女国产高潮福利片在线看| 国产精品熟女久久久久浪| 99久久精品国产国产毛片| 亚洲欧美中文字幕日韩二区| 黄色视频在线播放观看不卡| 少妇 在线观看| 另类精品久久| 日本91视频免费播放| 亚洲精品久久成人aⅴ小说 | 性高湖久久久久久久久免费观看| 欧美激情极品国产一区二区三区 | 97超碰精品成人国产| 熟女av电影| 午夜免费男女啪啪视频观看| 久久毛片免费看一区二区三区| 蜜桃在线观看..| 久久久久久久久久成人| 亚洲精品美女久久av网站| 免费看光身美女| 亚洲中文av在线| 人人妻人人澡人人爽人人夜夜| 国产精品.久久久| 国产免费现黄频在线看| 久久女婷五月综合色啪小说| 99视频精品全部免费 在线| 全区人妻精品视频| 亚洲国产精品一区二区三区在线| 男的添女的下面高潮视频| a级毛片在线看网站| 一区二区三区精品91| 欧美人与性动交α欧美精品济南到 | 国产成人精品福利久久| 男女边摸边吃奶| 婷婷色麻豆天堂久久| 欧美亚洲 丝袜 人妻 在线| 日本免费在线观看一区| 交换朋友夫妻互换小说| 国产伦精品一区二区三区视频9| 国产片内射在线| 中文字幕av电影在线播放| 人妻人人澡人人爽人人| 妹子高潮喷水视频| 99久久精品一区二区三区| 精品国产一区二区三区久久久樱花| 最近中文字幕2019免费版| 黄色一级大片看看| 麻豆成人av视频| 看免费成人av毛片| 中文天堂在线官网| 精品久久久久久电影网| 久久影院123| 国产亚洲最大av| 亚洲国产精品一区三区| 99久久综合免费| 国产精品一区www在线观看| 男人爽女人下面视频在线观看| 国产精品蜜桃在线观看| 成人午夜精彩视频在线观看| 全区人妻精品视频| 久久99蜜桃精品久久| 婷婷色综合大香蕉| 久久精品久久久久久噜噜老黄| 哪个播放器可以免费观看大片| 2018国产大陆天天弄谢| 精品久久久精品久久久| 建设人人有责人人尽责人人享有的| 黑人巨大精品欧美一区二区蜜桃 | 啦啦啦视频在线资源免费观看| 男男h啪啪无遮挡| 日本av手机在线免费观看| 国产免费视频播放在线视频| 日韩一区二区三区影片| 成人综合一区亚洲| 久久久久久久亚洲中文字幕| 日韩成人伦理影院| 国产男女超爽视频在线观看| 久久免费观看电影| 亚洲国产av新网站| 制服人妻中文乱码| 能在线免费看毛片的网站| 国产精品国产三级国产专区5o| 国产爽快片一区二区三区| 亚洲欧美成人精品一区二区| 日本-黄色视频高清免费观看| 久久久久精品久久久久真实原创| 我的女老师完整版在线观看| 黑人猛操日本美女一级片| 高清不卡的av网站| 国产精品久久久久久精品电影小说| 婷婷成人精品国产| 国产一区有黄有色的免费视频| 亚洲性久久影院| 最近中文字幕2019免费版| 亚洲av国产av综合av卡| 最黄视频免费看| 一本色道久久久久久精品综合| 久久久精品94久久精品| 国产成人a∨麻豆精品| 老司机亚洲免费影院| 国产黄色视频一区二区在线观看| 欧美性感艳星| 国产亚洲午夜精品一区二区久久| 亚洲,一卡二卡三卡| 久久影院123| videossex国产| 在线观看www视频免费| 秋霞伦理黄片| 亚洲欧美精品自产自拍| 成人黄色视频免费在线看| 婷婷色综合大香蕉| 日本猛色少妇xxxxx猛交久久| 女性被躁到高潮视频| 成人综合一区亚洲| 亚洲欧美精品自产自拍| 婷婷色综合大香蕉| 亚洲国产欧美在线一区| 日本猛色少妇xxxxx猛交久久| 青春草亚洲视频在线观看| 免费日韩欧美在线观看| 久久精品国产a三级三级三级| 精品人妻在线不人妻| 永久免费av网站大全| 国产成人91sexporn| 精品午夜福利在线看| 久久青草综合色| 国产老妇伦熟女老妇高清| 成人二区视频| 亚洲美女搞黄在线观看| 久久鲁丝午夜福利片| 街头女战士在线观看网站| 777米奇影视久久| 国产精品久久久久久av不卡| 妹子高潮喷水视频| 亚洲性久久影院| 伊人亚洲综合成人网| 亚洲av男天堂| 99九九在线精品视频| 在线观看人妻少妇| 午夜福利网站1000一区二区三区| 亚洲av福利一区| 91精品伊人久久大香线蕉| 少妇人妻精品综合一区二区| 国产黄色视频一区二区在线观看| 亚洲人成网站在线播| 国产精品.久久久| 菩萨蛮人人尽说江南好唐韦庄| 最后的刺客免费高清国语| 国产精品一二三区在线看| 又黄又爽又刺激的免费视频.| 久久久国产精品麻豆| 亚洲天堂av无毛| 一级毛片电影观看| 热99国产精品久久久久久7| av在线app专区| 亚洲中文av在线| 亚洲天堂av无毛| 欧美另类一区| 国产精品嫩草影院av在线观看| 亚洲第一av免费看| av.在线天堂| 国产极品粉嫩免费观看在线 | 精品久久国产蜜桃| 国产在视频线精品| 久热久热在线精品观看| 亚洲精华国产精华液的使用体验| av.在线天堂| 美女国产视频在线观看| av天堂久久9| 国产精品一区www在线观看| 80岁老熟妇乱子伦牲交| 2022亚洲国产成人精品| 少妇的逼好多水| 精品久久久精品久久久| 国产精品久久久久久久久免| 亚洲精品一二三| 久久99蜜桃精品久久| 亚洲精品久久午夜乱码| 高清毛片免费看| 日本免费在线观看一区| 日韩伦理黄色片| 黄片播放在线免费| 999精品在线视频| 乱人伦中国视频| 精品少妇黑人巨大在线播放| 亚洲精品久久久久久婷婷小说| 伦理电影免费视频| 日本黄色片子视频| 精品人妻熟女毛片av久久网站| 国产精品偷伦视频观看了| 国产男女内射视频| 王馨瑶露胸无遮挡在线观看| 熟妇人妻不卡中文字幕| 国产成人精品福利久久| 七月丁香在线播放| av不卡在线播放| 国产成人午夜福利电影在线观看| 中文天堂在线官网| 精品一区二区免费观看| 一二三四中文在线观看免费高清| 久久久久久久大尺度免费视频| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 欧美三级亚洲精品| 18禁裸乳无遮挡动漫免费视频| 大香蕉97超碰在线| 久久久a久久爽久久v久久| 日本黄色日本黄色录像| 日本vs欧美在线观看视频| 亚洲欧美清纯卡通| 男女无遮挡免费网站观看| 插逼视频在线观看| 精品一区在线观看国产| 如何舔出高潮| 精品国产一区二区三区久久久樱花| 啦啦啦在线观看免费高清www| 91精品伊人久久大香线蕉| 18禁动态无遮挡网站| 伦精品一区二区三区| 搡女人真爽免费视频火全软件| 亚洲欧美清纯卡通| 午夜视频国产福利| 婷婷色综合大香蕉| 免费观看性生交大片5| 建设人人有责人人尽责人人享有的| 久久久久久久久久久丰满| 你懂的网址亚洲精品在线观看| 久久人人爽人人爽人人片va| 久久久久国产精品人妻一区二区| 熟女av电影| 久久精品国产自在天天线| 国模一区二区三区四区视频| av在线老鸭窝| 国产永久视频网站| 精品少妇久久久久久888优播| 99久久人妻综合| 欧美精品人与动牲交sv欧美| 免费不卡的大黄色大毛片视频在线观看| 国产免费一区二区三区四区乱码| 新久久久久国产一级毛片| 狠狠婷婷综合久久久久久88av| xxx大片免费视频| 亚洲欧美中文字幕日韩二区| 国产av一区二区精品久久| 男女啪啪激烈高潮av片| 中国国产av一级| 婷婷成人精品国产| 国产精品.久久久| 久久久久久伊人网av| 精品久久久精品久久久| 天天影视国产精品| 精品人妻偷拍中文字幕| 成人漫画全彩无遮挡| 欧美日韩亚洲高清精品| 免费av不卡在线播放| 最近最新中文字幕免费大全7| 老司机亚洲免费影院| 少妇被粗大的猛进出69影院 | 黑人巨大精品欧美一区二区蜜桃 | 国产一区二区三区综合在线观看 | 制服诱惑二区| av电影中文网址| 免费人成在线观看视频色| 免费高清在线观看视频在线观看| 久久青草综合色| 青春草视频在线免费观看| 欧美日韩精品成人综合77777| 国产高清有码在线观看视频| 欧美xxxx性猛交bbbb| 18+在线观看网站| 午夜福利在线观看免费完整高清在| 免费不卡的大黄色大毛片视频在线观看| 亚洲四区av| 久久久久国产网址| 国产亚洲欧美精品永久| 成人二区视频| 日本黄大片高清| 青青草视频在线视频观看| 久久久久久久久久久丰满| 久久久亚洲精品成人影院| 精品少妇内射三级| 久久久欧美国产精品| 亚洲av男天堂| 久久99热6这里只有精品| 久久精品人人爽人人爽视色| 精品久久国产蜜桃| 99热全是精品| 欧美日本中文国产一区发布| 少妇人妻久久综合中文| 久久人人爽人人片av| 高清午夜精品一区二区三区| 国产精品女同一区二区软件| 在线观看一区二区三区激情| 亚洲精品日韩av片在线观看| 亚洲国产精品成人久久小说| 欧美+日韩+精品| 国产 一区精品| 美女福利国产在线| 欧美一级a爱片免费观看看| 国产一区二区三区av在线| 亚洲婷婷狠狠爱综合网| 亚洲美女搞黄在线观看| 日韩av不卡免费在线播放| 精品少妇内射三级| 日韩在线高清观看一区二区三区| 女人精品久久久久毛片| 妹子高潮喷水视频| 男的添女的下面高潮视频| 91精品伊人久久大香线蕉| 少妇被粗大的猛进出69影院 | 一个人看视频在线观看www免费| 国产成人91sexporn| 丝袜脚勾引网站| 免费大片黄手机在线观看| 精品久久久久久久久av| 丝瓜视频免费看黄片| 成人手机av| 人妻少妇偷人精品九色| 亚洲av二区三区四区| 亚洲av福利一区| 国产无遮挡羞羞视频在线观看| 国产免费福利视频在线观看| 国精品久久久久久国模美| 精品一品国产午夜福利视频| 一区二区av电影网| 久久久久国产精品人妻一区二区| 久久国产精品大桥未久av| 久久久久人妻精品一区果冻| 久久精品国产a三级三级三级| 欧美日韩成人在线一区二区| 人妻人人澡人人爽人人| 免费大片黄手机在线观看| 国国产精品蜜臀av免费| 久久久久久人妻| 边亲边吃奶的免费视频| 国产免费视频播放在线视频| 日韩欧美一区视频在线观看| 亚洲欧美成人综合另类久久久| 丝袜脚勾引网站| 波野结衣二区三区在线| av天堂久久9| 亚洲av成人精品一区久久| 哪个播放器可以免费观看大片| 在线 av 中文字幕| 亚洲中文av在线| 成人影院久久| 在线观看一区二区三区激情| 观看av在线不卡| 人妻少妇偷人精品九色| 免费高清在线观看日韩| 一级二级三级毛片免费看| 亚洲欧美色中文字幕在线| 亚洲av.av天堂| 亚洲人成网站在线播| 91aial.com中文字幕在线观看| 最近2019中文字幕mv第一页| 国产高清不卡午夜福利| 久久人人爽av亚洲精品天堂| 久久狼人影院| 国产精品秋霞免费鲁丝片| 天堂俺去俺来也www色官网| 在线看a的网站| 亚洲高清免费不卡视频| 欧美bdsm另类| 欧美3d第一页| 汤姆久久久久久久影院中文字幕| 在现免费观看毛片| 国产在线免费精品| 久久人人爽人人爽人人片va| 国产一级毛片在线| 午夜福利网站1000一区二区三区| 一本大道久久a久久精品| 免费高清在线观看日韩| 久久韩国三级中文字幕| 99re6热这里在线精品视频| 搡老乐熟女国产| 日本91视频免费播放| 黄片无遮挡物在线观看| 狂野欧美激情性bbbbbb| 插逼视频在线观看| 日日爽夜夜爽网站| 成年人免费黄色播放视频| 视频中文字幕在线观看| 久久av网站| 97在线视频观看| 成年女人在线观看亚洲视频| 日韩三级伦理在线观看| 蜜桃久久精品国产亚洲av| 中文欧美无线码| 韩国高清视频一区二区三区| 亚洲一区二区三区欧美精品| 水蜜桃什么品种好| 永久免费av网站大全| 亚洲精品日本国产第一区| 欧美三级亚洲精品| 精品国产国语对白av| 女性生殖器流出的白浆| 少妇猛男粗大的猛烈进出视频| 久久久久国产网址| 国产av国产精品国产| 黄色配什么色好看| 国产免费视频播放在线视频| 大香蕉久久网| 国产免费视频播放在线视频| 伦精品一区二区三区| 亚洲情色 制服丝袜| 午夜福利,免费看| 一级二级三级毛片免费看| 国产成人午夜福利电影在线观看| 国产男女内射视频| 精品一区二区三卡| 国产成人精品婷婷| 男女无遮挡免费网站观看| 日韩av免费高清视频| 午夜视频国产福利| 久久ye,这里只有精品| 欧美激情 高清一区二区三区| 狂野欧美激情性xxxx在线观看| 免费看不卡的av| 97在线视频观看| av专区在线播放| 国产男女内射视频| 精品人妻在线不人妻| 久久久精品94久久精品| 亚洲欧美成人精品一区二区| 成人18禁高潮啪啪吃奶动态图 | 日本免费在线观看一区| 人妻人人澡人人爽人人| 久久久久久久久久人人人人人人| 亚洲国产最新在线播放| 国产av码专区亚洲av| 一级毛片我不卡| 九九在线视频观看精品| 亚洲高清免费不卡视频| 波野结衣二区三区在线| 精品久久久精品久久久| 久久久久久久久久人人人人人人| 好男人视频免费观看在线| 免费av不卡在线播放| 好男人视频免费观看在线| 亚洲人成77777在线视频| 午夜91福利影院| 高清午夜精品一区二区三区| 欧美 亚洲 国产 日韩一| 人妻夜夜爽99麻豆av| 欧美xxxx性猛交bbbb| 免费人妻精品一区二区三区视频| 国产精品一二三区在线看| 亚洲色图 男人天堂 中文字幕 | 精品久久国产蜜桃| 成人午夜精彩视频在线观看| 男女高潮啪啪啪动态图| 久久久欧美国产精品| 成人漫画全彩无遮挡| 99国产精品免费福利视频| 啦啦啦中文免费视频观看日本| 黄色一级大片看看| 嫩草影院入口| 精品国产露脸久久av麻豆|