• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intrusion Detection System Using FKNN and Improved PSO

    2021-12-16 07:49:14RaniyahWazirali
    Computers Materials&Continua 2021年5期

    Raniyah Wazirali

    College of Computing and Informatics,Saudi Electronic University,Saudi Arabia,Riyadh

    Abstract:Intrusion detection system (IDS) techniques are used in cybersecurity to protect and safeguard sensitive assets.The increasing network security risks can be mitigated by implementing effective IDS methods as a defense mechanism.The proposed research presents an IDS model based on the methodology of the adaptive fuzzy k-nearest neighbor(FKNN)algorithm.Using this method,two parameters,i.e.,the neighborhood size(k)and fuzzy strength parameter(m)were characterized by implementing the particle swarm optimization(PSO).In addition to being used for FKNN parametric optimization,PSO is also used for selecting the conditional feature subsets for detection.To proficiently regulate the indigenous and comprehensive search skill of the PSO approach,two control parameters containing the time-varying inertia weight(TVIW)and time-varying acceleration coefficients(TVAC)were applied to the system.In addition,continuous and binary PSO algorithms were both executed on a multi-core platform.The proposed IDS model was compared with other state-of-the-art classifiers.The results of the proposed methodology are superior to the rest of the techniques in terms of the classification accuracy,precision,recall,and f-score.The results showed that the proposed methods gave the highest performance scores compared to the other conventional algorithms in detecting all the attack types in two datasets.Moreover,the proposed method was able to obtain a large number of true positives and negatives,with minimal number of false positives and negatives.

    Keywords:FKNN;PSO approach;machine learning-based cybersecurity;intrusion detection

    1 Introduction

    The world has entered the era of cyber networking and the Internet of Things (IoT).Many people use the internet for communication and business purposes.Confidential data of every individual are available on the internet,where many the sites can be hacked for siphoning-off private information,thus causing a negative impact on digital interactions.Therefore,an intrusion detection system (IDS) was developed to prevent stealing users’private data;it detects suspicious behaviors of intruders and avert malicious activities.For this,several classification models have been created,evolving from traditional statistical methods to machine learning approaches.Previously,different kinds of statistical approaches,such as logistic regression,multivariate discriminant technique,and factor analysis,were used for intrusion detection purposes.Recent research in machine learning (ML) and artificial intelligence (AI) techniques,including support vector machine (SVM) [1],Bayesian network models [2,3],artificial neural network (ANN) [4],and k-nearest neighbor (KNN) [5,6]approaches,have been implemented for the detection of malicious activities in cybersecurity.The ANN classification model is considered to be the most efficient approach for IDS,though it is challenging to precisely program it for IDS due to its black-box nature.

    The KNN approach is user-friendly,easily understandable,and interpretable with a high accuracy and precision rate.The KNN approach equally weighs the selected neighbors irrespective of their space from a particular point.A more advanced form of the KNN approach is typically used,the fuzzy KNN,which applies fuzzy logic,by allocating a degree of membership to the groups due to the space from each k-nearest neighbor.Every point is assigned a specific value for detection purposes.The nearest point to a particular one is allocated a higher degree of membership than the one at a larger distance from the query (particular point).Therefore,the group with the highest value is considered the winner.The FKNN approach has already been applied to biological and image data [7-9].However,no major research has been done using the FKNN for IDS.In the literature [6],While the FKNN approach was used to determine the unknown intruder,no comprehensive information about fuzzy strength (m) and neighborhood size(k) has been elucidated.In this article,a comprehensive overview of the FKNN approach related to k and m is presented in regards to the IDS system for cybersecurity purposes.

    Other than opting for the best algorithm,feature selection also plays a vital role in IDS for selecting the subgroups of attributes from the group of original attributes.Feature selection is used to create the best possible learning model.Feature selection has three main advantages.First,it can enhance the probability performance of interpreters;second,it can offer speedy and economical interpreters;and third,it can deliver a better understanding of the ongoing processes that create the data [10].In IDS,genetic algorithms (GAs) [11]are often used for choosing the input features [12,13]or to elucidate proper hyper-parameter values of the interpreter [14,15]using the SVM approach [16].As compared to the GA,the PSO approach [17]contains no mutation or crossover processes.This approach is user friendly,needs less time for processing,and has a low cost.In addition,it fine-tunes the position and velocity of every point in such a way that it can differentiate accurately between the best local and global variables.All the elements have a strong capability to search around,helping the swarm to find the ideal solution.

    In terms of practical tasks,the PSO and GA take a lot of computational time for processing.Therefore,computing techniques need to be improved.To increase the search and optimization process,implementation of binary and continuous PSO approaches should be done by making use of open multiprocessing that is a transferrable;an accessible model can assist in developing a parallel use of platforms [18].

    In this paper,we discussed an adaptive FKNN approach that uses PSO algorithm by defining the neighborhood size (k) and fuzzy parameter (m).In addition,the binary PSO was used for detecting and defining the most significant features.The contribution and efficacy of the proposed IDS model were authenticated by relating them to other state-of-the-art classification models based on real-life scenarios.The experimental visualization outcome showed that the proposed topology can attain the proper parameters as well as display a high discerning power because of the feature selection tool.A comparison among the series and parallel models was performed.We also analyzed the parallel model of TVPSO-FKNNm and we found that it can greatly decrease the computational processing/run-time.

    The fKNN and time-variant particle swarm optimization (TVPSO) are explained in Section 2.In Section 3,relevant studies of intrusion detection based on the k-nearest neighbors and PSO are discussed.Section 4 explains the proposed method and the algorithm of the FKNN-TVPSO.We provide the experimental outcomes in Section 5 and compare them with other techniques.In Section 6,we present the conclusion.

    2 Background

    2.1 Fuzzy K-Nearest Neighbor Algorithm

    The KNN algorithm is the first of its kind being a simple and nonparametric classification algorithm where a group allocates rendering to the most-known group amidst the k-nearest neighbors.The fuzzy form of the KNN was first proposed by Keller in 1985 by integrating fuzzy logic into the KNN technique and he named it the “fuzzy-KNN-classifier algorithm (FKNN).”Instead of separate groups,like in the KNN,the fuzzy affiliations of points are allocated to several groups with the following formulation:

    wherei=1,2,3,...,G (groups)andj=1,2,3,...k(no.of nearest neighbors).The fuzzy parameter (m) defines the weight given to the distance of each point while computing the neighbor’s contribution to the membership value.The value is selected as m ∈(1?∞).is the space between the x and its jth nearest neighborxi.Several distance metrics,such as Euclidean distance,Mahalanobis distance,and Hamming distance,can be selected to measureIn this research,the Euclidean distance was given preference.uijis the membership unit of patternxjfrom the training group to class I between the k-nearest neighbor ofx.The two ways to defineuijare the crisp membership and nonmembership in class and the fuzzy membership,where KNN of each set is allocated to the membership in each group using the following equation:

    wherenjis the number of neighbors belonging to thejth class.It must be noted that memberships allocated by (2) must fulfill the following equations:

    In this research,we found that the fuzzy method has excellent classification precision.After calculating the membership of a particular point,it is then allocated to the group having the highest membership number,as shown as follows:

    2.2 Time-Variant Particle Swarm Optimization(TVPSO)

    This approach was inspired by organisms’social behavior,for instance,fish swimming in a school and birds flocking together.This approach was first developed by Kennedy and Eberhart [19].In this technique,each point is taken as a unit in d-dimensional space,with some velocity and position.The position vector of theith unit is symbolized asXi=xi1,xi2,xi3,...,xid.The velocity is characterized asVi=Vi1,Vi2,Vi3,...,Vid.Both of these parameters are updated using the following equations:

    wherePi=pi1,pi2,pi3,...,pid,i.e.,theprevious position,Pz=pz1,pz2,pz3,...,pzd,i.e.,the best unitamongall,r1and r2arerandom numbers,andvi,jis thevelocity.

    The inertia weight (w) is considered for the global survey and local utilization.A large weight assists in a global search,while a small weight eases the local search.W is updated for algorithm utilization using (9),which is also known as the “time-varying inertia weight”:

    wherewmin and wmaxare predefined valuesof w,and t is the running iteration.

    The magnitudes of the unit’s velocity in the local and global directions are defined by the acceleration coefficients,i.e.,c1 and c2.The concept of the time-varying acceleration coefficient(TVAC) for balancing the search space among the global survey and local usage was implemented in another study [20]which was also deployed in this research to ensure a better solution search.TVAC can be represented mathematically by the following equations:

    wherec1f,c1i,c2f,c2iare constants,andtmaxis the maximum number of iterations.

    The binary PSO is defined as the search in an isolated space where a unit changes its position in a space limited to zero and one at every dimension.Upon perceiving a high velocity,1 is assigned,and for lower values,0 is assigned to the unit.For changing the velocity from the continuous to the probability space,the sigmoid function is used (Eq.(12)).

    The new unit position is updated using the following equation:

    whererndis a uniform random number ranging between 0 and 1.

    3 Literature Review

    The KNN has been discussed in detail in the literature [21].KNN model does not comprise any kind of learning phase,so it is also known as a “l(fā)azy learner.” It does not memorize the data for training.The KNN categorizes new data from already-available datasets based on parallel measures by using three of the distance metrics,i.e.,the Euclidean distance,Mahalanobis Distance,and Hamming Distance,which help in forecasting and predicting about the hidden data point.

    There are obstacles arising from using a simple KNN algorithm,and a new extended algorithm of KNN,the fuzzy KNN technique,was developed to prevent unbalanced normal and intrusion data by building up the feature vectors in the FKNN based on the clustering query point fuzzy conditions [17].We experimentally found that the fuzzy KNN model performance is far better and greater than the conventional TANN (triangle area based nearest neighbors) and CANN (combined cluster centers and nearest neighbors) classifiers.According to the outcomes of the conducted research in this paper,the precision rate of FKNN is said to be 98.73%,while that of TANN is 98.47% and CANN has an accuracy rate equal to 96.07%.The intrusion detection rate of the FKNN is 96.23%,the TANN’s rate is equal to 94.5%,and that of the CANN algorithm is up to 86.05%.The third calculated parameter was the false alarm rate for the FKNN,TANN,and CANN,which was 0.28%,0.4%,and 0.75% respectively.

    A semisupervised methodology was implemented to lessen the false alarm rate and improve the detection rate in IDS using the KNN hyper-parameter approach with cross-validation [22].In this approach,for every unlabeled dataset,the KNN of the training set is categorized and after gaining statistical data from the KNN hyper-parameter tuning,namely,a neighboring dataset of each group,distance weight,metric,and new data points are taken as the attacking group or normal group.The NSL-KDD dataset was employed for analyzing the robustness of the model.

    The fusion approach was implemented for intrusion detection,and it uses cross classifiers’techniques,including the SVM,PSO,and K-NN on the KDD99 dataset [23].The accuracy of the SVM was 97%,the accuracy of the KNN was 98%,and the accuracy of the PSO was 99.8%(the highest accuracy) during an R2L attack.Compared to the above three classifiers,the fusion model had an accuracy rate of 98.55%.

    The IDS was performed over the KDD99 dataset using KNN-ACO and the SVM approach and the accuracy rate of the classifiers was observed [5].This approach generated fewer false alarms than the rest of the classifiers.The accuracy rate was also mentioned in the paper for the KNN-ACO and was equal to 94.17%.The accuracy rate of the backpropagation neural network(BPNN) was 93% and SVM had an 83% accuracy rate.The false alarm rate for KNN-ACO,BPNN,and SVM was 5.82%,6.90%,and 16.90% respectively.

    The CANN and KNN approaches and classifiers were explained using k-means clustering over the NSL-KDD dataset [24].The FKNN approach was used for categorizing the data.The FKNN approach had a good accuracy rate and detection rate and a low false alarm rate.

    The fuzzy c-means approach,distance-weighted KNN approach,and Dempster Shafer Theory were executed to identify the unknown attack in IDS by evaluating the functions and probabilities on the KDD99 dataset [6].The accuracy,false alarm,and detection rate were measured using these approaches of the KNN algorithm,and the authors found that implementing fuzzy KNN logic was far better than other approaches.

    The PSO-based KNN approach was implemented for the secured transfer of information from the server station to the mobile devices and laptops [25].The results obtained from this research showed the increased accuracy in the PSO-KNN approach (up to 2%).

    The PSO based approach using the SVM-KNN methodology was implemented for assembling classifiers into one category on the KDD99 dataset [26].The distance weight method was executed using the weighted majority algorithm (WMA) for creating ensemble classifiers.The results were high-performance ensemble classifiers compared to other traditional algorithms.

    The two-layered hybrid classification and detection process was proposed using the KDD99 dataset [27].The first layer consists of the GBGT approach,which detects the DoS attack,while the second layer is comprised of the KNN feature selection classifier that is improved and enhanced by the FOA to identify and split the non-DoS data from the normal,U2L,and R2L probes.All of these classifiers were examined based on their accuracy,recall rate,and detection rate.The grouping of the DoS data using the KNN approach on two attacks (such as the back,teardrop,smurf,and Neptune pod) had a high recall rate.The precision rate of the smurf and Neptune attacks was greater than 99%,while that of the back and pod was greater than 60%.The authors concluded that the KNN methods have a high performance compared to the SVM-ANN methods.

    In the KNN-based TSA,the feature selection approach for intrusion detection was implemented for reducing feature severance while the KNN was deployed for classification purposes on the KDD99 dataset for improving the efficiency and accuracy of the IDS system [28].It was experimentally observed that the accuracy of the KNN-PSO was 87.34%,while that of the TSA-KNN was 87.34%.

    The hybrid KNN approach was implemented for intrusion detection on the NSL-KDD dataset and evaluated experimentally [29,30].The KNN approach was far better than the rest of the algorithms applied.

    Based on the literature review above,the PSO approach using the fuzzy KNN method was selected for optimization because it could obtain a better accuracy in the IDS system in addressing various kinds of cyber attacks.

    4 Proposed Methodology

    The methodology implemented to conduct this research is the TVPSO-FKNN [31].Using this model,the FKNN classifier can automatically be optimized by analyzing the k and m parameters and detecting and categorizing the class of best distinct features.So,for this,the binary and continuous PSO approaches were linked together for feature selection and classification.The attained feature was taken as the input to the categorized FKNN approach.In this section,the parameter encoding and the fitness function are discussed first.Then,the first serial PSO methodology in terms of the TVPSO-FKNN is elaborated upon.

    4.1 Parameter Encoding

    The decision variables (fuzzy logic parameters) were encoded using the binary representation,and integer representation within the search bound.While it is easy to represent the search bound for the fuzzy strength with integer representation,the k-neighborhood set and the feature set are lists of values that can be represented with binary values.Eqs.(14) and (15) are examples of binary representation of the k-neighborhood set

    4.2 Fitness Function

    The fitness function was designed to obtain the optimal fuzzy logic parameters,which was done with cross-validation using 20% of the data as the validation set.Machine learning performance metrics (accuracy,precision,recall,and f1 score) were introduced to evaluate the fuzzy KNN model obtained from each combination of parameters.The accuracy,precision,recall,and f1 score were calculated at every training stage on the validation set using the formula defined in (16)-(19).Since we were concerned with reducing the false positive rate,the accuracy and the F-score were used to design the fitness function,as given by (20)

    4.3 Serial Implementation of the Proposed Approach

    The following steps were followed using the TVPSO-FKNN approach for constructing a series PSO algorithm.

    Step 1:Encode the particles using n+2 dimensions,considering k and m as the first two continuous values.The remaining n dimensions are the Boolean feature mask;tag 1 if selected and 0 if discarded.

    Step 2:Initialize each individual by random numbers while characterizing PSO units with the upper and lower velocity bounds.

    Step 3:Train the FKNN approach with the selected features.

    Step 4:Higher fitness values are achieved when units have a high fitness value and a smaller number of the selected features.By taking into consideration the accuracy,precision,recall,and f-score parameters,objective functions are designed and calculated,as shown in (19).

    Step 5:Increase the iteration time.

    Step 6:Increase the population numbers by updating the position and velocity of m and k and their feature using (7),(8),(12),and (13) for every unit.

    Step 7:Train the FKNN using the obtained feature vector from Step 6 and calculate each unit fitness value using (20).

    Step 8:Update the personal ideal fitness value (pfit) and position (pbest) in comparison to the best value present in the memory slot.

    Step 9:On reaching the maximum population size,move to Step 10,otherwise,repeat the process starting from Step 6.

    Step 10:Update (gfit) and (gbest) after comparing gfit with pfit in the overall population.The dominating parameter is stored in the memory.

    Step 11:The process moves ahead if the stopping criteria are satisfied;otherwise it is repeated from Step 5.

    Step 12:Finally,the ideal (k and m) parameters and feature subset from the best unit (gbest)are obtained.

    4.4 Parallel Implementation of the Proposed Approach

    To improve the optimization performance and reduce the computational time of the model,TVPSO-FKNN was implemented in parallel on a multicore processor using OpenMP.The following steps were used with the TVPSO-FKNN approach for constructing a series PSO.

    Pseudocode of the parallel TVPSO-FKNN approach is as follows:

    “Initializing parameters”

    “Training of FKNN model”

    “Calculating fitness”

    “While(cni

    “For each unit”

    “Updating velocity”

    “Updating position”

    “Training FKNN model”

    “Calculating pfit”

    “Calculating pbest”

    “End For”

    “Calculating gfit”

    “Calculating gbest”

    “cni=cni+1”

    “End while”

    5 Experimental Design

    5.1 Dataset Description

    The intrusion prevention dataset discussed in KDD-NSL [32]and CICIDS2017 [33]was used to improve the intrusion detection system.These datasets were comprised of 43 and 78 features,respectively,as regarded to network traffic when optimized in a separate group.The CICID2017-based dataset contained network traffic taken for a period of five days,i.e.,Monday,3 July 2017 to Friday,7 July 2017,with six types of attacks with normal network traffic.The NSL-KDD dataset used four types of attacks with normal network traffic.Group labels were tagged in such a way that each data set had an equal number of samples.We collected 500 samples from the CICID2017 dataset,and 1000 samples from the NSL-KDD for each type of attack.The proposed methodology was implemented for the effective classification of every type of networking traffic.

    5.2 Experimental Set-Up

    The OpenMP platform and MATLAB software were used for the implementation of the proposed methodology by making use of statistics,machine learning (ML),and the neural network toolbox.Four algorithms were implemented (PSO,FKNN,KNN,and GA) from the start.Two of the algorithms (BPNN and PNN) were established using the NN-toolbox of MATLAB 7.0.The technical specifications of the computer used for simulation purposes were as follows:

    Intel Quad-Core Xeon 2.0 GHz CPU

    RMA=8 GB

    System=Window Server 2003

    The search range of two parameters,k and m,for both the datasets were as follows:

    k=[1100]

    m=[0.13].

    The values set for c1i,c1f,c2i,and c2f were 2.5,0.5,0.5,and 2.5,respectively [20].The values for wmax and wmin were 0.9 and 0.4,respectively.Parameter setting for proposed TVPSO-FKNN in (NSL-KNN &CICID2017) was as follows:

    No.of iteration=250

    No.of units=10

    For the GA-FKNN,the following values of parameters were set to

    No.of iteration=150

    No.of units=20.

    5.3 Experimental Results and Discussion

    The proficiency of two models (fuzzy KNN-GA and fuzzy KNN-TVPSO) were evaluated on two datasets by making use of performance metrics mentioned in (16)-(19).The outcomes were compared with those of traditional ML techniques (PNN,Decision Tree,SVM,and KNN) [34].The experimental results of the NSL-KDD and CICIDS2017 datasets are shown in Tabs.1 and 2,respectively.

    From our results,we found that the performance score of the proposed model was the highest compared to the rest of the algorithms for detecting and identifying every type of attack for two datasets.The average performance of the proposed model and other models was calculated for a single value and presented in Tabs.1 and 2.The F1-score of PNN is 49.35,for the KNN,it is 89.9,for the SVM,it is 71.39,and that of the decision tree is 92.33.The F-scores for the proposed model using the fuzzy logic KNN with TVPSO and GA were 94.25 and 92.46,respectively.The proposed approaches have a better performance than conventional methods.The evaluated precision accuracy of the proposed techniques and the rest of the IDS models is listed in Tab.3.The proposed algorithms (FKNN-GA AND FKNN-PSO) have a high accuracy and detection rate and a lower false alarm rate.

    Table 1:Experimental result that compares the performance metric of other classifiers with the proposed solution using the NSL-KDD dataset

    Tabs.4 and 5 represent the summary of all the results deduced from the above-mentioned algorithms (PNN,SVM,decision tree,KNN,FKNNPSO,and FKNN-GA) for two datasets(NSL-KDD and CICIDS2017).The proposed algorithms offer high precision rate,recall,and F-scores.In Tab.6,the testing and training time of two datasets for the suggested methods and other classifiers are shown.We observed that FKNNPSO and FKNNGA do not have fast detecting time as compared to the other models,which is why the parallel implementation of the proposed approaches was performed to eliminate the processing time problem.Nevertheless,the proposed approaches have a higher performance rate than the rest of the classification methods.

    To analyze the number of times the algorithm detected an attack,a confusion matrix was determined [35].Tabs.7 and 8 show this matrix for the NSL-KDD set intended for optimization of PSO and GA approach.Tabs.9 and 10 explain the matrix for the CICIDS2017 set.On observing the diagonal of each matrix,we found that the proposed models showed a high number of true positives and negatives and small number of false positives and negatives.

    Figs.1 and 2 depict the evolutionary process,showing that fold #1 is the best among the ten-fold cross-validation in the FKNN-TVPSO using the NSL-KDD and CICIDS2017 datasets.These results were measured based on the best global position.The fitness of the local best positions on the training sets was measured to gain the best fitness of the population in every generation.These evolutionary processes were intriguing because the fitness curves progress from iteration 1 to 100 and reveal no major progression after 40 in the KDD-NSL approach and 3 in CICIDS2017.The stopping criteria is 100 iterations.In the beginning,there is a rapid increase in fitness of the evolution,but after a specific number of iterations,this rapid increase slows.Even then,the stability feature of the fitness remains the same until the stopping criteria are reached.This illustrates that FKNN-TVPSO topology can quickly congregate towards the global target and efficiently find the solution.The phenomenon proves the value of FKNN-TVPSO in developing parameters (k and m) and features via the TVPSO algorithm.

    Table 3:Accuracy evaluation for NSL-KDD and CICIDS

    Table 4:Result summary for NSL-KDD dataset

    Table 5:Result summary for CICIDS dataset

    Table 6:Test and train time analysis

    Table 7:Confusion matrix for NSL-KDD dataset using FKNPSO algorithm

    Table 8:Confusion matrix for NSL-KDD dataset using FKNNGA algorithm

    Table 9:Confusion matrix for CICIDS dataset using PSO algorithm

    Table 10:Confusion matrix for CICIDS dataset using the GA algorithm

    Figure 1:Fitness value vs. number of iterations for NSL-KDD

    Figure 2:Fitness value vs. number of iterations for CICIDS

    6 Conclusion

    This research offers a novel approach for IDS.The main approach of this research is the implementation of the TVPSO algorithm assisting the FKNN classifier to gain the highest classification performance.The continuous TVPSO is employed to identify parameters k and m of the FKNN,while binary TVPSO is taken into consideration for recognizing the most discrete feature.Both of these TVPSO approaches are executed in a parallel environment for decreasing the processing time.Experimental outcomes illustrate the performance of proposed models to be significantly better than the rest of the state-of-the-art classifiers in place of the IDS system.Experiments show that the parallel implementation of the FKNN-TVPSO is a strong feature selection tool in detecting the best distinct function for intrusion detection (IDS).Nevertheless,the proposed model has a high computation efficiency.

    Hence,it is concluded that the proposed FKNN-TVPSO technique is the best in IDS for a cybersecurity system.It should be noted that this technique efficiently performs on the data.Parallel implementation will take to major development when smearing with larger datasets of the detection system before future use.Future analysis should focus on assessing the proposed algorithm for larger datasets.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors state that they have no conflicts of interest to report regarding the present study.

    久久草成人影院| 国产成人欧美在线观看 | 巨乳人妻的诱惑在线观看| 午夜福利一区二区在线看| 国产精品.久久久| 久久人妻熟女aⅴ| 两性夫妻黄色片| 亚洲欧美激情综合另类| 两个人看的免费小视频| 亚洲国产精品合色在线| 纯流量卡能插随身wifi吗| 日韩欧美一区视频在线观看| 天堂中文最新版在线下载| 人成视频在线观看免费观看| 国产成人精品久久二区二区91| 国内毛片毛片毛片毛片毛片| 啦啦啦 在线观看视频| 精品免费久久久久久久清纯 | 999精品在线视频| 国产亚洲精品第一综合不卡| 99re6热这里在线精品视频| 少妇裸体淫交视频免费看高清 | а√天堂www在线а√下载 | 欧美精品高潮呻吟av久久| 高清视频免费观看一区二区| 在线观看免费日韩欧美大片| 男女高潮啪啪啪动态图| 午夜91福利影院| 欧美日韩国产mv在线观看视频| 欧美激情高清一区二区三区| 精品一区二区三区视频在线观看免费 | 欧美日韩亚洲国产一区二区在线观看 | 免费在线观看亚洲国产| 免费看十八禁软件| 精品一品国产午夜福利视频| 999久久久国产精品视频| 午夜两性在线视频| 精品久久久精品久久久| 精品一区二区三区av网在线观看| 久久草成人影院| e午夜精品久久久久久久| aaaaa片日本免费| 亚洲成国产人片在线观看| 国产亚洲欧美精品永久| 丰满迷人的少妇在线观看| 一本综合久久免费| ponron亚洲| 久久精品国产清高在天天线| 久久久久久久精品吃奶| av片东京热男人的天堂| 国产1区2区3区精品| 亚洲va日本ⅴa欧美va伊人久久| 超碰97精品在线观看| 国产又爽黄色视频| 国产三级黄色录像| 久久精品亚洲av国产电影网| 搡老乐熟女国产| 国产免费男女视频| 精品亚洲成a人片在线观看| 十八禁网站免费在线| 亚洲一码二码三码区别大吗| 久久久久视频综合| 久久国产亚洲av麻豆专区| 国产精品1区2区在线观看. | 欧美乱妇无乱码| 中文字幕色久视频| av电影中文网址| 国产一区二区三区视频了| 午夜影院日韩av| 久久久水蜜桃国产精品网| 老鸭窝网址在线观看| 热99re8久久精品国产| 黑人猛操日本美女一级片| 看黄色毛片网站| 国产99白浆流出| 国产又爽黄色视频| 叶爱在线成人免费视频播放| 久99久视频精品免费| 黄色丝袜av网址大全| netflix在线观看网站| 妹子高潮喷水视频| 亚洲成人国产一区在线观看| 一级,二级,三级黄色视频| 久久久久久亚洲精品国产蜜桃av| 在线观看免费高清a一片| 亚洲专区国产一区二区| 免费少妇av软件| 国产精品.久久久| 色精品久久人妻99蜜桃| 欧美黄色淫秽网站| 热99国产精品久久久久久7| 新久久久久国产一级毛片| 亚洲av日韩精品久久久久久密| 国产欧美日韩一区二区精品| 精品久久久精品久久久| 精品一品国产午夜福利视频| 波多野结衣一区麻豆| 91精品国产国语对白视频| www.自偷自拍.com| 久久香蕉国产精品| 少妇的丰满在线观看| 欧美日韩瑟瑟在线播放| 亚洲成av片中文字幕在线观看| 成人黄色视频免费在线看| 丁香六月欧美| 国产真人三级小视频在线观看| 亚洲av欧美aⅴ国产| 久久久久精品国产欧美久久久| 亚洲熟女毛片儿| 亚洲久久久国产精品| 99香蕉大伊视频| 成人精品一区二区免费| 精品亚洲成a人片在线观看| 精品免费久久久久久久清纯 | 啦啦啦 在线观看视频| 很黄的视频免费| 日韩免费高清中文字幕av| 国产xxxxx性猛交| 母亲3免费完整高清在线观看| 成人18禁在线播放| 久久久久久久国产电影| 大陆偷拍与自拍| 少妇的丰满在线观看| 水蜜桃什么品种好| 国产一区二区激情短视频| 夜夜夜夜夜久久久久| 欧美人与性动交α欧美软件| 人妻一区二区av| 99热国产这里只有精品6| 亚洲成人手机| 欧美午夜高清在线| 欧美日韩福利视频一区二区| 欧美不卡视频在线免费观看 | 亚洲视频免费观看视频| 亚洲精品粉嫩美女一区| 制服诱惑二区| 亚洲午夜理论影院| 日韩制服丝袜自拍偷拍| 十八禁网站免费在线| 三级毛片av免费| xxxhd国产人妻xxx| 精品少妇一区二区三区视频日本电影| 精品国产一区二区三区四区第35| a级毛片在线看网站| 可以免费在线观看a视频的电影网站| 一级毛片精品| 国产精品久久久av美女十八| 亚洲成人手机| 日韩成人在线观看一区二区三区| 18禁美女被吸乳视频| 可以免费在线观看a视频的电影网站| 美女福利国产在线| 亚洲第一av免费看| 亚洲av日韩在线播放| 免费久久久久久久精品成人欧美视频| 亚洲专区国产一区二区| 国产精品二区激情视频| 精品无人区乱码1区二区| 国产成人免费无遮挡视频| 亚洲精品国产区一区二| 久久精品aⅴ一区二区三区四区| 他把我摸到了高潮在线观看| 久久天躁狠狠躁夜夜2o2o| 法律面前人人平等表现在哪些方面| 久久精品亚洲精品国产色婷小说| 少妇被粗大的猛进出69影院| 久久性视频一级片| 看片在线看免费视频| 亚洲精品在线美女| 午夜福利,免费看| 女警被强在线播放| 亚洲成人手机| www.自偷自拍.com| 天天操日日干夜夜撸| 中出人妻视频一区二区| 美女国产高潮福利片在线看| 午夜福利,免费看| 国产欧美日韩一区二区精品| 正在播放国产对白刺激| 啦啦啦视频在线资源免费观看| 免费观看精品视频网站| 欧美日韩瑟瑟在线播放| 啦啦啦免费观看视频1| 啦啦啦 在线观看视频| 中国美女看黄片| 十分钟在线观看高清视频www| 中文字幕最新亚洲高清| 欧美日韩瑟瑟在线播放| 亚洲 国产 在线| 91麻豆精品激情在线观看国产 | 国产精品久久久久久精品古装| 亚洲精品在线观看二区| 亚洲第一青青草原| 国产伦人伦偷精品视频| 午夜精品在线福利| 欧洲精品卡2卡3卡4卡5卡区| 色播在线永久视频| 美女视频免费永久观看网站| 国产不卡一卡二| 亚洲男人天堂网一区| 日本黄色日本黄色录像| av视频免费观看在线观看| 老司机影院毛片| 中文字幕人妻丝袜制服| 51午夜福利影视在线观看| a级毛片在线看网站| 黄片大片在线免费观看| 成年女人毛片免费观看观看9 | 亚洲va日本ⅴa欧美va伊人久久| 黑人巨大精品欧美一区二区mp4| 精品人妻1区二区| 男女之事视频高清在线观看| 国产精品一区二区免费欧美| 亚洲成人免费电影在线观看| 男女之事视频高清在线观看| 免费av中文字幕在线| 飞空精品影院首页| 亚洲九九香蕉| 中出人妻视频一区二区| 午夜两性在线视频| 欧美黑人欧美精品刺激| 国产精品永久免费网站| 亚洲精品成人av观看孕妇| 国产亚洲欧美在线一区二区| 精品久久久久久电影网| 亚洲精品一卡2卡三卡4卡5卡| 国产欧美日韩一区二区三| 大型av网站在线播放| xxxhd国产人妻xxx| 99国产极品粉嫩在线观看| 亚洲精华国产精华精| 91大片在线观看| 婷婷精品国产亚洲av在线 | 咕卡用的链子| 在线观看免费视频网站a站| 国产欧美日韩一区二区精品| 色婷婷久久久亚洲欧美| 国产高清激情床上av| 欧美人与性动交α欧美精品济南到| 精品国产乱子伦一区二区三区| 搡老岳熟女国产| 夜夜爽天天搞| netflix在线观看网站| 丁香欧美五月| 久久久国产成人免费| 中文字幕高清在线视频| 纯流量卡能插随身wifi吗| 国产成人精品久久二区二区91| 国产人伦9x9x在线观看| 中文亚洲av片在线观看爽 | 一本综合久久免费| 久久中文看片网| 99精品久久久久人妻精品| 在线国产一区二区在线| 黄片小视频在线播放| 久久性视频一级片| 日日摸夜夜添夜夜添小说| 一区福利在线观看| 国产色视频综合| 欧美乱色亚洲激情| 亚洲第一青青草原| 精品无人区乱码1区二区| 国产亚洲精品久久久久久毛片 | 热re99久久国产66热| 99国产极品粉嫩在线观看| 在线观看午夜福利视频| 黑人操中国人逼视频| 在线视频色国产色| 欧美日韩一级在线毛片| 亚洲自偷自拍图片 自拍| 日韩精品免费视频一区二区三区| 人人妻人人澡人人看| 免费在线观看视频国产中文字幕亚洲| 黄色女人牲交| 国产精品偷伦视频观看了| 亚洲午夜理论影院| 久久精品aⅴ一区二区三区四区| 老司机午夜十八禁免费视频| 水蜜桃什么品种好| 少妇 在线观看| 欧美日韩亚洲综合一区二区三区_| 精品久久久久久久久久免费视频 | 久久久久久免费高清国产稀缺| 国产欧美亚洲国产| 久久影院123| 好男人电影高清在线观看| 免费观看人在逋| 91大片在线观看| 飞空精品影院首页| 久久性视频一级片| 免费日韩欧美在线观看| 国产一卡二卡三卡精品| 国产麻豆69| 下体分泌物呈黄色| 欧美日韩亚洲综合一区二区三区_| 欧美国产精品一级二级三级| 国产一区二区三区视频了| 亚洲黑人精品在线| 久久久久久久久免费视频了| av欧美777| 午夜精品在线福利| 亚洲va日本ⅴa欧美va伊人久久| 美女高潮到喷水免费观看| 日本撒尿小便嘘嘘汇集6| 亚洲精品中文字幕在线视频| 男女免费视频国产| 91麻豆av在线| 成人永久免费在线观看视频| 91字幕亚洲| 国产精品免费一区二区三区在线 | 亚洲欧美激情综合另类| 国产乱人伦免费视频| 国内毛片毛片毛片毛片毛片| 亚洲情色 制服丝袜| 丁香欧美五月| 91国产中文字幕| 又黄又爽又免费观看的视频| 亚洲av美国av| av一本久久久久| 丝瓜视频免费看黄片| 亚洲av熟女| 中文字幕精品免费在线观看视频| 亚洲久久久国产精品| 亚洲免费av在线视频| 国产无遮挡羞羞视频在线观看| 90打野战视频偷拍视频| 欧美国产精品一级二级三级| 国产99白浆流出| 亚洲一区二区三区欧美精品| 人妻丰满熟妇av一区二区三区 | 国产精华一区二区三区| av电影中文网址| 久久狼人影院| 亚洲第一欧美日韩一区二区三区| 久久婷婷成人综合色麻豆| 十八禁人妻一区二区| 亚洲午夜理论影院| 久久精品aⅴ一区二区三区四区| 在线观看免费日韩欧美大片| 脱女人内裤的视频| 国产99白浆流出| 国产淫语在线视频| 天天操日日干夜夜撸| 三级毛片av免费| 热re99久久国产66热| 亚洲av美国av| 国产亚洲欧美精品永久| 搡老岳熟女国产| 99香蕉大伊视频| 色老头精品视频在线观看| 黄片小视频在线播放| 日韩欧美在线二视频 | 夜夜爽天天搞| 又黄又粗又硬又大视频| 亚洲久久久国产精品| 91大片在线观看| 久久久国产欧美日韩av| 午夜老司机福利片| 欧美激情久久久久久爽电影 | 国产视频一区二区在线看| 久久久久久久精品吃奶| 99国产精品99久久久久| 国产主播在线观看一区二区| 高清av免费在线| 热re99久久精品国产66热6| 一级片免费观看大全| 一级毛片高清免费大全| 亚洲视频免费观看视频| 亚洲精品国产色婷婷电影| 久久精品国产a三级三级三级| 久久亚洲真实| 一二三四在线观看免费中文在| 国产精品九九99| 淫妇啪啪啪对白视频| 99re在线观看精品视频| 久99久视频精品免费| 999久久久国产精品视频| 国产成人精品久久二区二区91| 高潮久久久久久久久久久不卡| 亚洲视频免费观看视频| 色婷婷av一区二区三区视频| 亚洲伊人色综图| 在线观看免费日韩欧美大片| av不卡在线播放| 久久国产精品大桥未久av| 正在播放国产对白刺激| 亚洲视频免费观看视频| av网站在线播放免费| 国产精品综合久久久久久久免费 | 欧美 日韩 精品 国产| 高清视频免费观看一区二区| 国产片内射在线| 亚洲国产欧美日韩在线播放| 欧美激情极品国产一区二区三区| 校园春色视频在线观看| 国产一区有黄有色的免费视频| 一边摸一边抽搐一进一小说 | а√天堂www在线а√下载 | 日韩精品免费视频一区二区三区| 亚洲精品乱久久久久久| av线在线观看网站| 日韩有码中文字幕| 久热爱精品视频在线9| 日韩大码丰满熟妇| 搡老熟女国产l中国老女人| 美女高潮到喷水免费观看| 国产高清国产精品国产三级| 久久国产精品男人的天堂亚洲| 91麻豆av在线| 欧美+亚洲+日韩+国产| 色婷婷av一区二区三区视频| 国产一区二区三区视频了| 欧美成狂野欧美在线观看| 精品福利观看| 久久精品人人爽人人爽视色| 无限看片的www在线观看| 成年人免费黄色播放视频| 精品高清国产在线一区| 十八禁网站免费在线| 在线观看免费高清a一片| 午夜福利一区二区在线看| 久久人妻av系列| 亚洲国产毛片av蜜桃av| 欧美黄色淫秽网站| 99久久人妻综合| 免费在线观看亚洲国产| 成人国产一区最新在线观看| 一区二区三区精品91| 国产精品国产高清国产av | 亚洲一区二区三区不卡视频| av欧美777| av一本久久久久| 国产野战对白在线观看| 国产亚洲欧美精品永久| 久久香蕉激情| 侵犯人妻中文字幕一二三四区| 高清毛片免费观看视频网站 | 看片在线看免费视频| 国产精品自产拍在线观看55亚洲 | 久久久久久久午夜电影 | 成熟少妇高潮喷水视频| 精品久久久久久久久久免费视频 | 免费观看a级毛片全部| 精品国内亚洲2022精品成人 | 精品高清国产在线一区| 波多野结衣av一区二区av| 视频在线观看一区二区三区| 黄片播放在线免费| 大型黄色视频在线免费观看| 久久精品aⅴ一区二区三区四区| 免费高清在线观看日韩| 国产亚洲欧美在线一区二区| 中文字幕av电影在线播放| 国产欧美亚洲国产| 亚洲国产欧美网| 国内久久婷婷六月综合欲色啪| 男人舔女人的私密视频| 日韩熟女老妇一区二区性免费视频| 国产男女内射视频| 精品一区二区三卡| 久久久国产成人免费| 亚洲成人免费电影在线观看| a在线观看视频网站| 99精品在免费线老司机午夜| 国产精品.久久久| 美女扒开内裤让男人捅视频| 日韩中文字幕欧美一区二区| 一级,二级,三级黄色视频| 黄片播放在线免费| 亚洲熟妇熟女久久| 丰满人妻熟妇乱又伦精品不卡| 亚洲精品一二三| 久久久久久亚洲精品国产蜜桃av| 久久久国产欧美日韩av| 国产成人影院久久av| 麻豆乱淫一区二区| 免费人成视频x8x8入口观看| 久久国产精品影院| 天天添夜夜摸| 无限看片的www在线观看| 国产欧美亚洲国产| 成人18禁在线播放| 国产午夜精品久久久久久| 色尼玛亚洲综合影院| 精品乱码久久久久久99久播| 欧洲精品卡2卡3卡4卡5卡区| 国产男靠女视频免费网站| 午夜老司机福利片| 亚洲全国av大片| 在线观看日韩欧美| 国产亚洲精品久久久久久毛片 | 美女视频免费永久观看网站| 国产国语露脸激情在线看| 在线观看免费视频日本深夜| 亚洲精品自拍成人| 中文字幕精品免费在线观看视频| 母亲3免费完整高清在线观看| 真人做人爱边吃奶动态| 精品国产一区二区三区久久久樱花| 亚洲色图综合在线观看| 两个人免费观看高清视频| 大码成人一级视频| 男女午夜视频在线观看| 国内久久婷婷六月综合欲色啪| 欧美日韩国产mv在线观看视频| 日韩中文字幕欧美一区二区| 精品国产一区二区三区四区第35| 久久精品人人爽人人爽视色| 国产成人欧美在线观看 | 在线观看免费高清a一片| 丝袜美足系列| 亚洲男人天堂网一区| 久久久国产一区二区| 亚洲成人国产一区在线观看| 熟女少妇亚洲综合色aaa.| 他把我摸到了高潮在线观看| 国产精品欧美亚洲77777| 欧美精品高潮呻吟av久久| 欧美另类亚洲清纯唯美| 精品久久久久久,| 免费久久久久久久精品成人欧美视频| 精品久久久久久,| 久久午夜综合久久蜜桃| 少妇被粗大的猛进出69影院| 狠狠狠狠99中文字幕| 在线十欧美十亚洲十日本专区| 91精品三级在线观看| 男人操女人黄网站| 欧美精品av麻豆av| 一级黄色大片毛片| 国产精品免费一区二区三区在线 | 18禁美女被吸乳视频| av天堂久久9| 亚洲精品国产区一区二| 国产av精品麻豆| 91大片在线观看| 男人舔女人的私密视频| www.999成人在线观看| 黄片大片在线免费观看| 黑人操中国人逼视频| 久久人妻福利社区极品人妻图片| 国产精品久久久久成人av| 免费看十八禁软件| 女性被躁到高潮视频| 亚洲色图 男人天堂 中文字幕| 国产视频一区二区在线看| 三级毛片av免费| 国产精品综合久久久久久久免费 | 久久午夜综合久久蜜桃| 99国产精品免费福利视频| 成年女人毛片免费观看观看9 | 大型av网站在线播放| 男男h啪啪无遮挡| 国产有黄有色有爽视频| 看片在线看免费视频| 欧美日韩乱码在线| 男男h啪啪无遮挡| 免费看十八禁软件| 激情在线观看视频在线高清 | 欧美国产精品va在线观看不卡| 大型av网站在线播放| 欧美日韩av久久| 欧美日韩一级在线毛片| 女人被躁到高潮嗷嗷叫费观| 国产精品亚洲av一区麻豆| 免费看a级黄色片| 99久久综合精品五月天人人| 99re在线观看精品视频| 我的亚洲天堂| 亚洲久久久国产精品| 99国产精品99久久久久| 五月开心婷婷网| 精品卡一卡二卡四卡免费| 老司机影院毛片| 国产精品一区二区精品视频观看| 1024视频免费在线观看| 嫩草影视91久久| 国产国语露脸激情在线看| av在线播放免费不卡| 亚洲综合色网址| 欧美激情 高清一区二区三区| 伦理电影免费视频| 国产精品av久久久久免费| 91在线观看av| 桃红色精品国产亚洲av| 亚洲精品在线美女| 老司机午夜十八禁免费视频| 大型黄色视频在线免费观看| 久久久精品国产亚洲av高清涩受| 精品一品国产午夜福利视频| 黑人猛操日本美女一级片| 国产欧美日韩精品亚洲av| 夜夜躁狠狠躁天天躁| 俄罗斯特黄特色一大片| 欧美乱码精品一区二区三区| 欧美在线一区亚洲| 亚洲精品一卡2卡三卡4卡5卡| 欧美色视频一区免费| 乱人伦中国视频| 亚洲成国产人片在线观看| 天天躁夜夜躁狠狠躁躁| 欧美丝袜亚洲另类 | 91大片在线观看| 亚洲九九香蕉| 搡老熟女国产l中国老女人| 久久精品亚洲av国产电影网| 欧美日韩黄片免| 久久久国产一区二区| 国产高清激情床上av| 欧美乱码精品一区二区三区| 男女之事视频高清在线观看| 91字幕亚洲| 久久久精品国产亚洲av高清涩受| 国产欧美日韩一区二区三| xxx96com|