• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML

    2022-03-14 09:21:48RanjithkumarandChenthurPandian
    Computers Materials&Continua 2022年3期

    S.Ranjithkumarand S.Chenthur Pandian

    1Sri Ramakrishan Engineering College,Coimbatore,641022,India

    2SNS College of Technology,Coimbatore,641035,India

    Abstract:The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the intrusion detection system(IDS).IDS are considered as an essential factor to fulfill security requirements.Recently,there are diverse Machine Learning(ML)approaches that are used for modeling effectual IDS.Most IDS are based on ML techniques and categorized as supervised and unsupervised.However,IDS with supervised learning is based on labeled data.This is considered as a common drawback and it fails to identify the attack patterns.Similarly, unsupervised learning fails to provide satisfactory outcomes.Therefore, this work concentrates on semi-supervised learning model known as Fuzzy based semi-supervised approach through Latent Dirichlet Allocation (F-LDA) for intrusion detection in cloud system.This helps to resolve the aforementioned challenges.Initially,LDA gives better generalization ability for training the labeled data.Similarly, to handle the unlabelled data, Fuzzy model has been adopted for analyzing the dataset.Here, preprocessing has been carried out to eliminate data redundancy over network dataset.In order to validate the efficiency of F-LDA towards ID,this model is tested under NSL-KDD cup dataset is a common traffic dataset.Simulation is done in MATLAB environment and gives better accuracy while comparing with benchmark standard dataset.The proposed F-LDA gives better accuracy and promising outcomes than the prevailing approaches.

    Keywords: Cloud security; fuzzy model; latent dirichlet allocation; preprocessing; NSL-KDD

    1 Introduction

    With today’s technological development, Network Intrusion Detection System (NIDS) is a software or device that predicts abnormal functionality of network system by analyzing and monitoring network [1].Denning has introduced NIDS in 80’s and anticipated a detection model for Intrusion identification.It is extensively used in security violations in networking [2].Recently,the incursions of unknown attacks are constantly increasing, the conventional tolls like access control/encryption and firewalls fails to safeguard network from unknown attacks [3].As an outcome, various investigators paid attention towards establishment of network architectures or complex systems, for instance, cyber-physical systems, quality-aware service access system, multidimensional context aware social network framework [4], NIDS and emotion-aware cognitive systems.With these security applications, NIDS gains increased attention and turns as a primary source of cloud systems [5].This is owing to the cloud requirements towards huge transmission and data interaction [6].Data transmission is done with diverse data.It is inevitable that security towards data privacy is constantly exposed by intrusion [7].To validate privacy and security of data, NIDS is essential during construction of cloud systems [8].Henceforth, this work anticipates a novel NIDS security system for cloud.

    Indeed of effectual NIDS functionality, establishment of NIDS is considered to be more challenging [9].This is due to certain crisis like intrusion detection and data collections.These have to be taken into consideration.Subsequently, certain benchmark traffic datasets like NSLKDD and KDDCup 99 are constructed and NIDS is modeled to enhance the intrusion detection performance [10].As intrusion recognition are considered as an essential part of classification,various artificial intelligence (AI) and Machine Learning (ML) approaches are used in NIDS [11].Usually, ML based approaches are considered as unsupervised (ULA) or supervised (SLA).The functionality of SLA is to perform mapping of feature samples to certain categories with labeled data utilization [12].Various SLA like Decision Tree (DT), Deep Neural Networks (DNN),and Support Vector Machine (SVM) have been resourcefully used to recognize and to identify intrusions [13].The SLA for NIDS has been attained with higher accuracy on diverse benchmark datasets.Moreover, certain disadvantages are clear.Initially, processing of labeled data requires costly expertise, and therefore detection updation is costly.Subsequently, when training process is based on detection model, labeled data can completely recognize newer kinds of attacks.Indeed of SLA, the ULA train detection approach devoid of any labeled instances and determines hidden unlabelled data structure.In ULA, various kinds of network events are differentiated using evaluation of unlabelled data distribution.The samples of similar features to hold similar class [14].Even though, ULA has no necessity towards labeled data; generally outcomes towards prediction model with lesser accuracy and higher false positive rate (FPR).Fig.1 depicts the generic view of NIDS in cloud systems.

    To get rid of various deficiencies, semi-supervised learning approach (SSLA) is also implemented for NIDS.It merges unlabelled and labeled data to determine the detection model [15].Subsequently, SSLA diminishes the dependency towards labeled data, and therefore it is considered to be healthier than SLA.As lesser amount of labeled data is initiated, SSLA generally carry out better performance in accuracy and FPA than unsupervised learning.Moreover, SSLA shares similar set of disadvantages of both SLA and ULA models.However, SSLA for NIDS needs more sophisticated model to diminish negative influence using both the approaches.This work anticipates a novel SSLA through hybridization of Fuzzy based semi-supervised approach through Latent Dirichlet Allocation (F-LDA) for intrusion detection in cloud system.This approach reduces the variance in classifier outputs.Here, the generalization ability outperforms the functionality of single model system in more appropriate environment.There are various attack types that are unidentified during training data, it is more appropriate to choose hybrid SSLA.For labeled data, a basic classifier is generated as candidates and constructs a hybrid model during classifier ranking.However, to completely analyze unlabelled data distribution, a Fuzzy based model is used.Then, based on results of ULA, a newer hybridized learning system is constructed and extended with Latent Dirichlet Allocation.At last, the anticipated model will be tested over NSL-KDD dataset.The significant contributions with the anticipated model are given below:

    Figure 1: Generic view of NIDS in cloud systems

    1) This work presents a novel SSLA for classifciation purpose.By considering the intrusion detection for non-linear classification approach, this work uses classification as a basic learner with hybridized system.To merge the outcomes of Fuzzy model and LDA is applied to determine weights.

    2) This work adopts Fuzzy based model for mining hidden structures of unlabelled data.This method extracts essential information and eliminates redundant data from unlabeled data.This can improves the performance of anticipated model.

    3) This work combines both SLA and ULA through hybridization approach.With this, the labeled data has to correct the unlabeled data.This is by means of lacking in labeled data;unlabeled data utilization performs classifier model construction to perform detection procedure for robustness and accuracy.

    This is work is structured as trails: Section 2 offers diverse background study based on ML based techniques for NIDS and brief explanation towards SSLA.Then, the anticipated SSLA for cloud system is discussed in Section 3.Experimentation and outcomes are performed in Section 4.Finally, Section 5 draws conclusion of anticipated model.

    2 Background Studies

    The ultimate objective is to construct an adaptive and an effectual NIDS for predicting malicious functionalities which tries to construct various network services.Various studies are related to the anticipated model and explained in Section 2.1.

    2.1 NIDS Approaches

    NIDS model is extensively utilized for detecting and monitoring malicious functionalities from network activities [16].A typical detection model includes four preliminary stages: data source,pre-processing, decision making process and defense mechanisms.Initially, data source comprises of set of network functionalities where every feature is utilized for differentiating suspicious and legitimate observations [17].Next, pre-processing organizes data by eradicating redundant features to generate pattern set involving suspicious and legitimate properties based activities [18].Thirdly,detection approach comprises of classification method that recognizes abnormal observations.At last, defense response is considered as decision made by cyber or software administrators for eliminating attack.

    NIDS methodologies are categorized as anomaly, misuse and hybrid model.To initiate with this, anomaly based approach builds a normal profile and determines variation from attack profile.As, it can recognizes both zero-day and prevailing attacks, it will not demand any efforts to generate any rules, it is extremely effectual for system mitigation than misuse grounded IDS,when decision making process is effectually modeled [19].Similarly, misuse grounded NIDS examines network traffic for handling instances over known attack models to be black-listed.Although it generates lower false positive rates and superior detection rates, it may not detect zero-day attacks.Also, it needs considerable attempt to update blacklists with newer attack rules dependent on attacks identified.Various investigators have used ensemble model to enhance NIDS performance [20].The objective is to merge alerts for diminishing alarms, assisting security administrators to handle alerts effectually.Abaid et al.[21] modeled an ensemble approach for determining diverse attack types using some of features.The author made a final decision for predicting attack based on voting rule based approach.Li et al.[22] constructed an ensemble approach with Classification and Regression Trees (CART) and Bayesian networks (BN) to predict attack samples.As whole, empirical outcomes of these approaches provides the overall performance of ensemble/hybrid approaches that are superior to every individual model.However, it increases computational overhead.

    The performance analysis for all NIDS is based on source that comprises of feature set that are classified into various types of classification purposes termed as payload based features,source/destination port, flow and behavioral feature models [23].

    Some source/destination port number features are extracted with Net flow and Coral-Reef tools [24].Some features are ineffectual as it needs basic information from packet headers are extremely unreliable in contemporary network to recognize attacks with faster and dynamical variation towards present network model [25].Payload based feature model acquires considerable signatures of diverse applications.Some features assist in predicting malicious functionalities offering superior accuracy.Also, there are some autonomous ports that are utilized and facilitate the provision for prediction during the use of non-standardized ports.Also, some features need enormous effort to update signatures regularly for predicting attacks, with complexity of acquiring higher network traffic rates [26].

    Behavioral features draw the attention among hosts based on ports, destinations and behavior of host patterns, At last, flow based feature gains the preliminary flow identifiers (protocols,ports, source/destination IP) and statistical features like packet sizes and inter-arrival times.The two kinds to attain higher accuracy; when used precisely as recommended with anticipating aggregation more than an attribute in extractor module to identify botnet strategies occurrence by flooding of enormous flows towards compromised hosts.

    Various investigators perform data model sources from TCP/IP protocols for valuating performance of NIDS.Specifically, it concentrates on recognizing diverse kinds of exploitation methods and botnets like DDoS, DoS and phishing model.For instance, author in [27], modeled a distributed and scalable IDS through set of instances from HTTP, DNS, honeypot and IP-data flow.Also, it will not offer features utilized for execution.In addition, simulated data was gathered from diverse systems devoid of providing configuration environment for computing newer IDS performance.

    Moustafa et al.[28] recommends bot detection approach through DNS flow analysis dependent on features constructing with DNS queries.This work was constructed by extracting statistical data from DNS queries like query domain name and source IP address.Also, these may be altered or hidden via virtual private network utilization with no further statistical network flow aggregation analysis that include potential features of aggregated flooding threats like DDoS attacks.Kim et al.[29] anticipates a domain name generation model for identifying botnets via analysis of individual DNS queries.These investigations uses prevailing flow tools and approaches and analysis the outcomes via ML approach utilization.The author cannot use aggregated flow that effectually recognizes botnet threats for decision making process [30].It cannot find effectual features of protocols as recommended in the anticipated model.From the above discussions, it is known that IDS system can analyze the suspicious activities where the violations are related to the event management and security information where the original cause of threats relies over the benign traffic abnormalities or false alarm rate.Moreover, it takes longer time to differentiate the threat model.It leads to more damage.IDS are provided for monitoring the network traffic and the surface threats.However, some traffic paths are left unmonitored in some cases where the threats are considered to be deeper and avoid network visibility.Some IDS fails to give security to the VM, IoT devices, and container environments.There are no proper alert mechanisms to make the functionality faster for better decision making.The proposed research attempts to finds the attack by violating the data redundancy and formulating efficient rules for analyzing the network traffic flow.

    3 Methodology

    This section explains the novelty based on LDA and semi-supervised approach and explained in detail.This model is more effectual and can be applied for predicting intrusion.The redundant data is removed and given for training.For unlabeled data, fuzzy modeling is used to compute correntropy among the features.The flow diagram of the anticipated model is depicted as in Fig.2:

    Figure 2: Flow diagram of proposed model

    3.1 Latent Dirichlet Allocation(LDA)

    LDA gives an insight towards statistical modeling of identify the corpus framework.This is so popular statistical model to identify network traffic and to predict the attack signatures that has not been explored.It is a probabilistic model, as assumes that document was generated using weighted mixture of unknown model.The ultimate objective of LDA is to automatically recognize the set of documents.To perform this, an inferential problem has to be solved using corpus generated by LDA generation process.This problem provides probability distribution function for generation of set of documents.The primary objective is to evaluate posterior distribution of more hidden variables given by the dataset as in Eq.(1):

    The use of Gibbs sampling is used for evaluating LDA.Consider,wandzas vectors of all incoming data that is allocated under traffic “T”.The multi-modal distribution of the anticipated model is given as below in Eq.(2):

    3.2 Attack Signature Generation with LDA

    LDA has been extensively used in various applications; however it is used as a tool for validating network traffic classification and diverse attack signatures.The intrinsic application of network attack validates the traffic and resembles text in various aspects.

    For example, network flow is composed of diverse ASCII strings, a flow is determined with strings and binary word flow.This flow is determined as corpus flow.The network flow is observed as mixture of data based on intrusion detection applications.The correlation among variables is analyzed using the network packets.In general, network problems are disseminated in E-mail or HTTP flow and the web flow comprises of strings like WWW, HTTP and GET.When network is comprised in web flow, latent flows are included in HTTP flow and corresponding attacks.Thus,when LDA carry out appropriate network traffic and generates cluster flow appropriately.Some are included in cluster specification of latent factors related to flows.This automatically extracts signature for IDS to predict the flows.The functionality of IDS rule signature is based false negatives and positives.There are two metrics that are constructed with LDA.The first metric is to define the superiority of flow associated with the network and signature does not need real NIDS.Time consumption based rule verification is used.It can be achieved by LDA training model.Another metric is associated with false positive of all signatures.The attack signature are chosen based on integrated IDS and validates the rules over real network traffic.The network administrator has to validate the operating overload.Certain rules are needed for attack prediction with higher overload in IDS.

    With respect to document classification of data from network traffic, words are depicted as consecutive bytes partitioned by delimiters like punctuations and spaces.However, it will not be applied for all network traffic as traffic payload comprises of both HEX and ASCII strings,generally it does not hold any separators; the objective is to overcome the complexities associated with key content of strings generated over the application.Some examples are ‘HTTP/2.0’or ‘GET/.file’for all web flows.From these observations, words are defined as a sequence of characters.LDA extracts words from network flow and deals with the set of content strings.The values are empirically analyzed with signature generation and attain acceptable performance.

    3.3 Correntropy Measures

    It is utilized for computing the association among the feature vectors, where it predicts the similarity and differences between the attack and normal instances.When there is dissimilarity among the samples, then statistical analysis measures the feature significance for predicting malicious functionalities.It is performed with non-linear similarity and second-order statistics for projecting the interactions of various feature observations.This is considered to be a lesser sensitive towards outliers.Consider a two random variablesr1andr2; where correntropy is given as in Eq.(5):

    From the observations, ‘I’is observation towards network data, ‘Y’is class label for all observations toward class labels, ‘N’is number of observations, ‘F’is feature set.When the difference among normal and malicious vector values, then it is proven that it shows the significance towards the features.Correntropy of every vector is evaluated for attack and normal instances.The differences among the instances are revealed.Feature selection an essential role in predicting NIDS for choosing essential features and eliminating unnecessary values and helps in distinguishing malicious and normal instances and enhances NIDS performance.The ultimate objective of selecting features is to diminish computational cost, eliminate data redundancy,improves NIDS accuracy and helps in examining data normality.Here, simple feature selection approach is utilized and correlation coefficient measures the degree of strength among certain features.The least ranked features are chosen as the most essential part of fuzzy modeling for predicting abnormal functionalities of instances.Correlation coefficient of features is measured as in Eq.(9):

    From the equation mentioned above,δis standard deviation of features,cov()is feature covariance.The mean value ofr1andr2are performed withrespectively.The CC outcomes are changed and ranges from [+1,-1].When values are nearer to+1 and -1; then it specifies correlation among two featuresr1andr2.When values are closer to 0, then no correlation among features are known.Some positive factors determine the features in similar direction, when negative value specifies features in opposite direction.

    3.4 Fuzzy Modeling

    LDA deals with unlabelled data that comes into the network and moves out of the network.To deal with this unstructured or unlabelled data, fuzzy modeling is used.It is measured to be an uncertainty type where the value ranges from 0 to 1.It is used in various applications like classification.Here, fuzzy modeling is adopted to estimate the significance of every sample.Thereby, it eradicates the irrelevant words or corpus generated from the network.Also, it is adopted to strengthen generalization ability.Therefore, it improves the detection competency for newly introduced malicious events.The unlabelled data is defined aswithna.Here, correntropy modeling is used for extracting features and to train the fuzzy model towards intrusion detection.With this, samplesSais provided with class labels.The unlabelled samples are re-written with prediction label aswhich is a self-labeled sample.Here, information entropy is used to compute fuzzy model of classifier output.It is given as in Eq.(10):

    ?

    4 Experimental Settings

    Here, a network traffic dataset termed as NSL-KDD dataset is introduced in association with the anticipated model.To analyze the functionality of this method, diverse experimental comparisons are performed.This dataset includes both testing and training set.The features chosen determine the dataset description with preliminary statistical and contents information towards network connection.The feature size is given as 41.The dataset label includes five diverse network events like probe, normal, denial of service (DoS), user to root, and remote to local (R2L).Various investigators consider NSL-KDD dataset is a authoritative benchmark standards in intrusion detection.Thus, NSL-KDD dataset is considered in this work for valuating semi-supervised approach.It comprises of various attack patterns that are more appropriate for validating generalization capability.Here, random samples are chosen and remaining samples are utilized as unlabeled data.Here, intrusion detection is considered as multi-class problem.The experimentation is performed in PC.The system configurations are given as: Intel i5 processor,windows 7 OS, 8 GB RAM @ 3.00 GHz.

    There are two diverse features known as numerical and symbolic.The anticipated model deals with symbolic features and values are not distributed randomly.It also triggers negative effect over learning process.To get rid of this problem, data normalization and one-hot encoding approach are used before learning process.The feature values are sequence encoded with 0 and 1.Dimensionality change based on distinctive values of symbolic features.Features like ‘protocol type’, ‘service’, and ‘flag’are encoded when values are higher than 2 (Tab.1).Symbolic features are treated as Boolean type with 1 or 0.

    Table 1: Dataset features

    The data dimensionality increases from 40 to 120.Similarly, normalization is used.The objective is to scale feature values with an interval of [0, 1] as given below in Eq.(11):

    Here,xi,jis attribute value ofxi,xjspecifies thejthfeatures.To compute the performance of prediction, various metrics are computed and specified as in Eqs.(12) & (13):

    Here, True Positive (TP) specifies number of sample attacks classified appropriately as attack.True Negative (TN) specifies number of sample attacks classified inappropriately as normal.False Positive (FP) specifies number of samples appropriately classified as normal samples.False Negative (FN) specifies number of samples classified inappropriately as attack.Prediction accuracy specifies model competency to perform appropriate prediction.FAR is depicted as a ratio of normal traffic predicted as attacks in inappropriate manner.Hence, detection model gives better accuracy and lower FAR.Here, the efficiency of fuzzy model is investigated and analyzed.The anticipated model is compared to prevailing approaches.As unlabeled data are allocated by classifier model, it is not avoidable as unlabeled samples are misclassified.It is clear that fuzzy model plays an essential role in enhancing detection performance in contrary to other models.The fuzzy set gives superior performance while achieving accuracy.It is proven that fuzzy set gives lesser misclassification and helps to identify anomaly.As well, the numbers of ‘R2L’and ‘U2R’in training samples are lesser than other classes.The accuracy is extremely lesser.Fig.3 depicts the network attack types.

    Figure 3: Network attack types

    Tab.2 demonstrates the dataset validation using training and testing model.There are five different attributes like Normal, Probe, DoS, U2R and R2L respectively.The anticipated model works finely and more stable while predicting larger size classes.To validate efficacy of anticipated model, the results are compared to prevailing intrusion detection approaches.As well, the result from conventional ML approaches is given as well.The comparison is done with semi-supervised approach.It is noted that the anticipated model is competitive with various other ML classifier model like ensemble random forest.With conventional ML approaches, tree based techniques outperforms other ML techniques (Multi-layer perceptron and SVM).The result specifies the motivation to select SSLA with NN structure.The anticipated model gives superior performance and seems to be more effectual.As a whole, the anticipated model offers an effectual way for identifying intrusion detection and outperforms the prevailing NIDS.

    Table 2: Dataset validation

    Fig.4 shows the accuracy computation of proposed model with the existing approaches.Fig.5 depicts the FAR computation of fuzzy model in lower, average and higher fuzzy model.Fig.6 depicts the network traffic analysis for various threat models.With average fuzzy set, the anticipated model shows better performance when compared to higher and lower fuzzy model.Fig.7 depicts the accuracy and FAR computation of proposed with other fuzzy approaches.The accuracy is higher for F-LDA and reduced false predictions.This model works optimally and shows better outcomes.

    Figure 4: Accuracy computation

    Figure 5: FAR computation

    Figure 6: Fuzzy model analysis for network traffic flow

    Figure 7: Fuzzy model evaluation

    Tab.3 depicts comparison of F-LDA with other models like DBN, RNN, STL, SMR, SVM,MLP, RT, RF, NB tree, NB, J48 where the accuracy of F-LDA is 88.54% which is 8.04%,7.54%, 9.54%, 13.34%, 19.04%, 11.14%, 7.04%, 7.94%, 6.51%, 12.04% and 7.54% respectively.Tab.4 depicts comparison of FAR computation using Fuzzy model.There are three parts: Lower,Average and Higher Fuzzy set.The values are 7.04%, 4.31% and 7.33% respectively.Tab.5 depicts comparison of various existing Fuzzy models like F-EL-CART, F-EL-J48, F-EL-KNN, F-EL-LR,F-EL-NB and F-LDA.The accuracy of F-LDA is 88.54% which is 4.54%, 5.44%, 7.84%, 11.04%and 12.84% respectively as in Tab.6.The anticipated model shows 4.31% FAR which is lesser than other models.Similarly, the sensitivity and recall of the proposed F-LDA is superior which shows the significance of the model.

    Table 3: Accuracy and FAR computation

    Table 4: FAR computation with Fuzzy set

    5 Summary

    Here, a novel SSLA for intrusion detection over cloud has been deliberated.Through continuous process of experimentation, the F-LDA model is validated to be more resourceful in predicting intrusion and enhance the security of cloud model.As a whole, the significant contribution is concluded with three successive factors.Initially, a novel approach offers a robust detection model over intrusion detection.It improves the competency to identify the newer traffic patterns.Next, fuzzy modeling utilizes enormous unlabelled data and improves prediction accuracy and robustness of entire system.Finally, F-LDA is proven as a more appropriate model to resolve intrusion detection problem.While comparing with various prevailing approaches, the anticipated model has proven a promising performance.The experimental outcomes validates that the SSLA is appropriate and can be applied in intrusion detection.In future, it is extremely essential to enhance prediction performance and generalization ability.To reach the goal, various interesting factors are analyzed for providing network security.Some performance measures will be tested in available public benchmarks.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    最近最新中文字幕大全免费视频| 精品久久久久久久久久免费视频| 精品无人区乱码1区二区| svipshipincom国产片| 热re99久久国产66热| 日本熟妇午夜| 啦啦啦免费观看视频1| 成人免费观看视频高清| 99久久国产精品久久久| 欧美最黄视频在线播放免费| 亚洲熟女毛片儿| av欧美777| 日本免费a在线| 精品熟女少妇八av免费久了| 人妻丰满熟妇av一区二区三区| 一级黄色大片毛片| 女人爽到高潮嗷嗷叫在线视频| 一级黄色大片毛片| 亚洲,欧美精品.| 人成视频在线观看免费观看| 色av中文字幕| 国产精品1区2区在线观看.| 亚洲美女黄片视频| 日韩视频一区二区在线观看| bbb黄色大片| 99精品在免费线老司机午夜| 伊人久久大香线蕉亚洲五| 一二三四社区在线视频社区8| 日韩大码丰满熟妇| 人人澡人人妻人| 在线观看免费视频日本深夜| 亚洲成av片中文字幕在线观看| 日韩大码丰满熟妇| 怎么达到女性高潮| 老汉色∧v一级毛片| 国产精品,欧美在线| 亚洲黑人精品在线| 亚洲avbb在线观看| 麻豆成人av在线观看| 午夜影院日韩av| 国产一区二区三区在线臀色熟女| 欧美丝袜亚洲另类 | 午夜久久久久精精品| 精品福利观看| 男女做爰动态图高潮gif福利片| 亚洲精品中文字幕一二三四区| 国产97色在线日韩免费| 国产伦一二天堂av在线观看| 亚洲成人精品中文字幕电影| 69av精品久久久久久| 精品久久蜜臀av无| 国产精品免费视频内射| 日韩欧美一区视频在线观看| 欧美成人一区二区免费高清观看 | 亚洲免费av在线视频| 久久精品国产综合久久久| 久久精品人妻少妇| 国产伦人伦偷精品视频| 国产亚洲欧美98| 香蕉久久夜色| 村上凉子中文字幕在线| 最近最新中文字幕大全免费视频| 欧美另类亚洲清纯唯美| 757午夜福利合集在线观看| 国产又爽黄色视频| 欧美zozozo另类| 老司机福利观看| 欧美性长视频在线观看| 国产精品久久久人人做人人爽| 欧美在线一区亚洲| 亚洲avbb在线观看| 变态另类成人亚洲欧美熟女| 国产又色又爽无遮挡免费看| 18禁裸乳无遮挡免费网站照片 | 欧美亚洲日本最大视频资源| 天天添夜夜摸| 久久草成人影院| 欧美绝顶高潮抽搐喷水| 巨乳人妻的诱惑在线观看| 日本免费a在线| 欧美中文日本在线观看视频| 精品福利观看| 深夜精品福利| 国产视频内射| 成人国产综合亚洲| 久久久久久久久久黄片| 热99re8久久精品国产| 成人18禁高潮啪啪吃奶动态图| 日本成人三级电影网站| 日韩欧美三级三区| 精品欧美国产一区二区三| 黄片播放在线免费| 999精品在线视频| 国产欧美日韩精品亚洲av| 麻豆国产av国片精品| 国产91精品成人一区二区三区| 欧美大码av| 777久久人妻少妇嫩草av网站| av欧美777| a级毛片在线看网站| 国产人伦9x9x在线观看| 午夜视频精品福利| 久久中文字幕一级| 国产久久久一区二区三区| 麻豆成人av在线观看| 99精品欧美一区二区三区四区| 男人操女人黄网站| 亚洲av中文字字幕乱码综合 | 桃红色精品国产亚洲av| 黄色a级毛片大全视频| 免费在线观看影片大全网站| 免费高清在线观看日韩| 精品久久久久久成人av| 亚洲精品一卡2卡三卡4卡5卡| 国产91精品成人一区二区三区| 成年人黄色毛片网站| 国产激情偷乱视频一区二区| 国产三级在线视频| 人成视频在线观看免费观看| 可以在线观看毛片的网站| 自线自在国产av| 丝袜美腿诱惑在线| 高清在线国产一区| 精品电影一区二区在线| а√天堂www在线а√下载| 国产精品久久电影中文字幕| 熟女电影av网| 久久久精品欧美日韩精品| 国产午夜福利久久久久久| 免费在线观看完整版高清| 欧美乱妇无乱码| 久久青草综合色| 伊人久久大香线蕉亚洲五| 搡老妇女老女人老熟妇| 国产又黄又爽又无遮挡在线| 国产男靠女视频免费网站| 久久精品国产亚洲av高清一级| 国内久久婷婷六月综合欲色啪| 久久精品91蜜桃| 亚洲精品国产精品久久久不卡| 国产欧美日韩一区二区三| 亚洲成av人片免费观看| 成人永久免费在线观看视频| 亚洲,欧美精品.| bbb黄色大片| 亚洲国产日韩欧美精品在线观看 | 精品久久久久久久久久免费视频| 村上凉子中文字幕在线| 一本久久中文字幕| 中文资源天堂在线| 国产精品久久久人人做人人爽| 91国产中文字幕| 日日摸夜夜添夜夜添小说| 亚洲真实伦在线观看| 亚洲精品中文字幕一二三四区| 国内久久婷婷六月综合欲色啪| 亚洲精品中文字幕在线视频| 欧美日韩乱码在线| 国产精品一区二区免费欧美| 91成人精品电影| 日韩视频一区二区在线观看| 精品久久久久久久久久久久久 | 麻豆av在线久日| 午夜免费鲁丝| 亚洲国产精品sss在线观看| 中亚洲国语对白在线视频| 国产在线精品亚洲第一网站| 国产亚洲精品第一综合不卡| 十八禁网站免费在线| 国产精品爽爽va在线观看网站 | 亚洲成人国产一区在线观看| 亚洲国产看品久久| 国产精品一区二区三区四区久久 | 香蕉国产在线看| 非洲黑人性xxxx精品又粗又长| 欧美日韩亚洲国产一区二区在线观看| 精品无人区乱码1区二区| 亚洲第一电影网av| 50天的宝宝边吃奶边哭怎么回事| 熟女电影av网| 亚洲 国产 在线| 波多野结衣高清无吗| 嫩草影视91久久| 国产一区二区三区在线臀色熟女| 一个人观看的视频www高清免费观看 | 中文字幕人妻熟女乱码| 欧美日韩福利视频一区二区| 欧美成人免费av一区二区三区| 成人18禁在线播放| 日日摸夜夜添夜夜添小说| 国产精品99久久99久久久不卡| 老汉色∧v一级毛片| 精品人妻1区二区| 亚洲精品久久成人aⅴ小说| 视频区欧美日本亚洲| 18美女黄网站色大片免费观看| 国产成人av教育| 最新美女视频免费是黄的| 精品久久久久久久久久免费视频| 国产精品国产高清国产av| 波多野结衣高清无吗| 中文字幕人妻丝袜一区二区| 日韩三级视频一区二区三区| 国产av不卡久久| 99riav亚洲国产免费| 真人做人爱边吃奶动态| 宅男免费午夜| 精品午夜福利视频在线观看一区| 99国产精品一区二区三区| 亚洲第一青青草原| 精品久久蜜臀av无| 亚洲av成人不卡在线观看播放网| 午夜免费激情av| 亚洲国产日韩欧美精品在线观看 | 精品国内亚洲2022精品成人| 日本 av在线| 在线观看日韩欧美| 国产精品免费视频内射| 欧美日韩乱码在线| 亚洲av中文字字幕乱码综合 | 脱女人内裤的视频| 国产精品久久久久久精品电影 | 国产一区在线观看成人免费| 三级毛片av免费| 亚洲经典国产精华液单| 美女xxoo啪啪120秒动态图| 欧美国产日韩亚洲一区| 自拍偷自拍亚洲精品老妇| 午夜免费激情av| 欧美+日韩+精品| 国产一区亚洲一区在线观看| 高清毛片免费看| 嫩草影视91久久| 欧美成人一区二区免费高清观看| 不卡视频在线观看欧美| 舔av片在线| av在线老鸭窝| 草草在线视频免费看| 秋霞在线观看毛片| 1000部很黄的大片| 亚洲精品久久国产高清桃花| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲av.av天堂| 色视频www国产| 99热网站在线观看| a级毛色黄片| 在线天堂最新版资源| 我要搜黄色片| 日日摸夜夜添夜夜添小说| 国产真实伦视频高清在线观看| 亚洲欧美清纯卡通| 精品久久久久久久人妻蜜臀av| 国产精品久久久久久久电影| 极品教师在线视频| 22中文网久久字幕| 亚洲激情五月婷婷啪啪| 精品免费久久久久久久清纯| 亚洲精品久久国产高清桃花| 性插视频无遮挡在线免费观看| 毛片女人毛片| 久久久久国内视频| 麻豆乱淫一区二区| 久久精品国产亚洲av天美| 精品国内亚洲2022精品成人| 亚洲,欧美,日韩| 国产熟女欧美一区二区| 欧美+亚洲+日韩+国产| 少妇丰满av| 欧美精品国产亚洲| 免费大片18禁| 欧美激情在线99| 美女cb高潮喷水在线观看| 在线免费十八禁| 日韩亚洲欧美综合| a级毛色黄片| 最新在线观看一区二区三区| 成年免费大片在线观看| 女的被弄到高潮叫床怎么办| 又爽又黄无遮挡网站| 又爽又黄无遮挡网站| 久久99热6这里只有精品| 精品人妻熟女av久视频| 午夜福利视频1000在线观看| 亚洲五月天丁香| 亚洲高清免费不卡视频| 成人无遮挡网站| av在线播放精品| 亚洲国产欧洲综合997久久,| 久久精品国产清高在天天线| 91av网一区二区| 91午夜精品亚洲一区二区三区| .国产精品久久| 成人永久免费在线观看视频| 成人欧美大片| 国产 一区 欧美 日韩| 成人美女网站在线观看视频| 秋霞在线观看毛片| 岛国在线免费视频观看| 亚洲内射少妇av| 日韩av不卡免费在线播放| 午夜日韩欧美国产| 天天躁日日操中文字幕| 亚洲乱码一区二区免费版| 搞女人的毛片| 少妇的逼水好多| 成年av动漫网址| 国产v大片淫在线免费观看| 毛片女人毛片| 18禁在线无遮挡免费观看视频 | 国产精品一二三区在线看| 国产真实乱freesex| 美女内射精品一级片tv| 别揉我奶头~嗯~啊~动态视频| 乱系列少妇在线播放| 国产真实乱freesex| 日日摸夜夜添夜夜爱| 久久午夜福利片| 69av精品久久久久久| 亚洲av熟女| 亚洲国产精品成人久久小说 | 一级a爱片免费观看的视频| 国产免费一级a男人的天堂| 亚洲最大成人中文| 国产精品久久久久久久电影| 一进一出好大好爽视频| 免费观看人在逋| 欧美zozozo另类| 亚洲精品国产av成人精品 | 亚洲欧美日韩高清在线视频| 国内精品久久久久精免费| 精品99又大又爽又粗少妇毛片| 中文字幕精品亚洲无线码一区| 亚洲成a人片在线一区二区| 中文字幕精品亚洲无线码一区| aaaaa片日本免费| 亚洲一区高清亚洲精品| 久久草成人影院| 亚洲av不卡在线观看| 国产精品久久电影中文字幕| 成人欧美大片| 午夜视频国产福利| 精品久久久久久久人妻蜜臀av| 国产伦精品一区二区三区四那| 午夜精品一区二区三区免费看| av黄色大香蕉| av专区在线播放| 久久亚洲国产成人精品v| 亚洲最大成人中文| 在线天堂最新版资源| 久久久久国产网址| 少妇熟女aⅴ在线视频| 成年版毛片免费区| 国产高清不卡午夜福利| 国产老妇女一区| 欧美三级亚洲精品| 日韩精品青青久久久久久| 夜夜看夜夜爽夜夜摸| 日韩国内少妇激情av| 国产激情偷乱视频一区二区| 亚洲精品乱码久久久v下载方式| 高清毛片免费观看视频网站| 偷拍熟女少妇极品色| 国产欧美日韩精品亚洲av| 亚洲乱码一区二区免费版| 欧美又色又爽又黄视频| 国产精品一区二区性色av| 国语自产精品视频在线第100页| 国产亚洲精品av在线| 国产亚洲精品综合一区在线观看| 国产探花极品一区二区| 中国美白少妇内射xxxbb| 在线国产一区二区在线| 午夜视频国产福利| 日韩欧美在线乱码| 国产精品亚洲美女久久久| 国产伦一二天堂av在线观看| 午夜视频国产福利| 看黄色毛片网站| 亚洲中文日韩欧美视频| 中文字幕久久专区| 大又大粗又爽又黄少妇毛片口| 精品久久久久久久久久久久久| 老司机影院成人| 欧美成人精品欧美一级黄| 国产黄色视频一区二区在线观看 | 听说在线观看完整版免费高清| 美女黄网站色视频| 美女免费视频网站| 精华霜和精华液先用哪个| 午夜福利18| 亚洲成人精品中文字幕电影| 午夜福利高清视频| 国产免费一级a男人的天堂| 男人舔女人下体高潮全视频| 草草在线视频免费看| 国产精品人妻久久久影院| 长腿黑丝高跟| 黄色视频,在线免费观看| 神马国产精品三级电影在线观看| 精品不卡国产一区二区三区| 亚洲av五月六月丁香网| 观看免费一级毛片| 亚洲国产精品国产精品| 国产亚洲精品久久久com| 亚洲va在线va天堂va国产| 卡戴珊不雅视频在线播放| 男插女下体视频免费在线播放| 亚洲欧美日韩高清专用| 成人性生交大片免费视频hd| 国产精品一二三区在线看| 日日摸夜夜添夜夜添av毛片| 国产真实伦视频高清在线观看| 亚洲aⅴ乱码一区二区在线播放| 尤物成人国产欧美一区二区三区| 亚洲中文字幕一区二区三区有码在线看| 露出奶头的视频| 午夜福利成人在线免费观看| 亚洲中文字幕日韩| 久久久久久国产a免费观看| 国产麻豆成人av免费视频| 欧美日本视频| 日本 av在线| 亚洲国产精品成人久久小说 | 午夜精品一区二区三区免费看| 亚洲激情五月婷婷啪啪| 成人午夜高清在线视频| 国产av一区在线观看免费| 女同久久另类99精品国产91| 久久人人爽人人爽人人片va| 国产日本99.免费观看| 成人高潮视频无遮挡免费网站| 美女大奶头视频| 欧美成人一区二区免费高清观看| 精品久久久久久久久久免费视频| 日韩精品青青久久久久久| 色播亚洲综合网| 老师上课跳d突然被开到最大视频| 成人亚洲欧美一区二区av| 亚洲av成人av| 国产精品一二三区在线看| 99视频精品全部免费 在线| 亚洲内射少妇av| 91精品国产九色| 精品一区二区三区视频在线观看免费| 国产精品人妻久久久影院| 男人和女人高潮做爰伦理| 内射极品少妇av片p| 99久久中文字幕三级久久日本| 亚洲人与动物交配视频| 婷婷亚洲欧美| 久久人人爽人人爽人人片va| 国产综合懂色| 不卡视频在线观看欧美| 深夜a级毛片| АⅤ资源中文在线天堂| 久久久色成人| 成人一区二区视频在线观看| 美女高潮的动态| 熟女电影av网| 久久国产乱子免费精品| 男女下面进入的视频免费午夜| 日本一二三区视频观看| 日日摸夜夜添夜夜添av毛片| 久久精品国产清高在天天线| АⅤ资源中文在线天堂| 人妻久久中文字幕网| 欧美区成人在线视频| 日韩欧美一区二区三区在线观看| av女优亚洲男人天堂| 搞女人的毛片| 色噜噜av男人的天堂激情| 久久九九热精品免费| 99久久成人亚洲精品观看| 国产高潮美女av| 一区二区三区四区激情视频 | 99九九线精品视频在线观看视频| 亚洲国产精品国产精品| 亚洲电影在线观看av| 国产精品爽爽va在线观看网站| 少妇人妻精品综合一区二区 | 人人妻,人人澡人人爽秒播| 亚州av有码| 国产淫片久久久久久久久| 久久人人爽人人爽人人片va| 成人午夜高清在线视频| 亚洲丝袜综合中文字幕| 亚洲精品成人久久久久久| 日韩av在线大香蕉| 精品久久久久久久久久免费视频| 两个人的视频大全免费| 亚洲av第一区精品v没综合| 亚洲av不卡在线观看| 免费在线观看影片大全网站| 波多野结衣高清作品| 午夜激情欧美在线| 欧美人与善性xxx| 久久中文看片网| 在现免费观看毛片| 麻豆一二三区av精品| 亚洲成人av在线免费| 少妇被粗大猛烈的视频| 国产精品一二三区在线看| 在线天堂最新版资源| 精品久久国产蜜桃| 欧洲精品卡2卡3卡4卡5卡区| 日本成人三级电影网站| 亚洲av成人av| 亚洲国产精品成人久久小说 | 激情 狠狠 欧美| 久久久久久久午夜电影| 最近手机中文字幕大全| 国内久久婷婷六月综合欲色啪| 一个人看的www免费观看视频| 久久精品国产亚洲av香蕉五月| 非洲黑人性xxxx精品又粗又长| 夜夜看夜夜爽夜夜摸| 两个人视频免费观看高清| 日韩欧美国产在线观看| 亚洲美女黄片视频| 一个人观看的视频www高清免费观看| 一级毛片aaaaaa免费看小| av天堂在线播放| 国产精品久久久久久av不卡| 亚洲国产精品国产精品| 深夜a级毛片| 99久久无色码亚洲精品果冻| a级一级毛片免费在线观看| 91av网一区二区| 99热全是精品| 国产精品久久久久久久电影| 亚洲一区二区三区色噜噜| 亚洲欧美日韩卡通动漫| 97超碰精品成人国产| 十八禁网站免费在线| 国产视频内射| 久久精品人妻少妇| 国产亚洲av嫩草精品影院| 看黄色毛片网站| АⅤ资源中文在线天堂| 亚洲不卡免费看| 又粗又爽又猛毛片免费看| 插阴视频在线观看视频| 日韩一区二区视频免费看| 91午夜精品亚洲一区二区三区| 国产精品精品国产色婷婷| 最近的中文字幕免费完整| 日本黄色视频三级网站网址| 日韩制服骚丝袜av| 国产成人影院久久av| 赤兔流量卡办理| 一区福利在线观看| av在线播放精品| 久久九九热精品免费| 亚洲性久久影院| 日本免费a在线| 赤兔流量卡办理| 久久婷婷人人爽人人干人人爱| 成熟少妇高潮喷水视频| 亚洲精品一区av在线观看| 六月丁香七月| 51国产日韩欧美| 久久久久久久久久成人| 搡老岳熟女国产| or卡值多少钱| 麻豆乱淫一区二区| 国产精品亚洲一级av第二区| 天天躁日日操中文字幕| 成人永久免费在线观看视频| 精品久久久久久久久亚洲| 亚洲一区高清亚洲精品| 国产精品综合久久久久久久免费| 91久久精品国产一区二区三区| 免费看av在线观看网站| 亚洲乱码一区二区免费版| 女人被狂操c到高潮| 大型黄色视频在线免费观看| 性插视频无遮挡在线免费观看| 国内精品一区二区在线观看| 色综合站精品国产| 久久草成人影院| 精品久久久久久久久亚洲| 中出人妻视频一区二区| 精品熟女少妇av免费看| 男插女下体视频免费在线播放| 亚洲色图av天堂| 狂野欧美激情性xxxx在线观看| 18+在线观看网站| АⅤ资源中文在线天堂| 欧美成人免费av一区二区三区| 国产精品福利在线免费观看| 亚洲最大成人手机在线| 亚洲欧美精品自产自拍| 1024手机看黄色片| 男女那种视频在线观看| 国产精品久久久久久久电影| 午夜福利18| 精品午夜福利在线看| 久久久精品欧美日韩精品| 美女内射精品一级片tv| 亚洲成a人片在线一区二区| 日韩在线高清观看一区二区三区| 欧美最新免费一区二区三区| 久久久成人免费电影| 久久人人爽人人片av| 波多野结衣高清无吗| 国产人妻一区二区三区在| 久久人妻av系列| 国产精品国产高清国产av| 国产成年人精品一区二区| 99热全是精品| 在线天堂最新版资源| 露出奶头的视频| 乱码一卡2卡4卡精品| 国产男靠女视频免费网站| 国产精品久久视频播放|