• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Using Capsule Networks for Android Malware Detection Through Orientation-Based Features

    2022-03-14 09:25:06SohailKhanMohammadNaumanSuleimanAliAlsaifToqeerAliSyedandHassanAhmadEleraky
    Computers Materials&Continua 2022年3期

    Sohail Khan,Mohammad Nauman,Suleiman Ali Alsaif,Toqeer Ali Syed and Hassan Ahmad Eleraky

    1Deanship of Preparatory Year and Supporting Studies,Computer Science Department,Imam Abdulrahman Bin Faisal University,Dammam,Saudi Arabia

    2National University of Computer and Emerging Sciences,Pakistan

    3Department of Computer Science,Islamic University of Medina,Medina,Saudi Arabia

    Abstract:Mobile phones are an essential part of modern life.The two popular mobilephone platforms,Android and iPhone Operating System(iOS),have an immense impact on the lives of millions of people.Among these two,Android currently boasts more than 84%market share.Thus,any personal data put on it are at great risk if not properly protected.On the other hand, more than a million pieces of malware have been reported on Android in just 2021 till date.Detecting and mitigating all this malware is extremely difficult for any set of human experts.Due to this reason, machine learning-and specifically deep learning-has been utilized in the recent past to resolve this issue.However, deep learning models have primarily been designed for image analysis.While this line of research has shown promising results, it has been difficult to really understand what the features extracted by deep learning models are in the domain of malware.Moreover, due to the translation invariance property of popular models based on Convolutional Neural Network(CNN),the true potential of deep learning for malware analysis is yet to be realized.To resolve this issue, we envision the use of Capsule Networks (CapsNets),a state-of-the-art model in deep learning.We argue that since CapsNets are orientation-based in terms of images,they can potentially be used to capture spatial relationships between different features at different locations within a sequence of opcodes.We design a deep learning-based architecture that efficiently and effectively handles very large scale malware datasets to detect Android malware without resorting to very deep networks.This leads to much faster detection as well as increased accuracy.We achieve state-of-the-art F1 score of 0.987 with an FPR of just 0.002 for three very large, real-world malware datasets.Our code is made available as open source and can be used to further enhance our work with minimal effort.

    Keywords: Malware; security; Android; deep learning; capsule networks

    1 Introduction

    In little more than a decade, Android has become one of the most dominant software stacks for touch screen devices like smartphones and tablets.It has retained the top position in market share for the past few years.According to a report by IDC [1] in the first quarter of 2021,more than 83% of all smartphones sold to end users were powered by Android operating system.Statcounter Global Stats in their recent release of market share statistics [2] has also stated that Android maintained the number one global smartphone operating system spot by further extending its lead over Apple’s iOS, with a 72.72 percent market share to 26.46 percent share for iOS.

    One of the most significant differences of Android software stack with its competitors is the unprecedented business model realized by open source development and distribution.Android software stack is kept completely open source that includes an operating system, middleware, and some built-in applications (cf.Fig.1).The open source nature of Android has attracted a large number of developers and contributors, working towards improvement of the architecture.Unlike the previous open source mobile phone approaches, Android has targeted the consumer market and thus become the first open source mobile phone software stack that can be bought and sold off-the-shelf.

    Figure 1: Android software stack

    Being open source implies that it is an undeniable choice for all emerging smartphone manufacturers at the time when smartphone markets were taking off.Some prime examples include Samsung, Huawei and the fastest-growing brands such as OnePlus and Xiaomi.From the developers’perspective, it is much easier to build applications for Android as compared to others.On the flip side, this same open nature of Android also attracts a huge number of malware applications that aim to steal users’personal information.Smart devices in general and Androidbased devices in particular, are an appealing target of malware writers due to the fact that they are not only popular, open source in nature and have a unique application market [3], but also because of the presence of enormous amount of users’private and sensitive data on these devices [4].For instance, these devices are equipped with a number of sensors that can easily track users’physical activities and current location.Similarly, embedded cameras and microphones can be used to record videos and take pictures, even without the users’consent and awareness [5,6].

    According to McAfee [7], until 2009 no more than 1000 mobile malware were known but since then, malware growth and diversity has been explosive, with the expansion of new technology in the smart device market.F-Secure, in one of their reports [8], show an interesting correlation between the rise in mobile malware detection and the distribution of Android-based smartphones in the market.Accordingly, between 2004 and 2007, only about 400 mobile malware infections were reported, while this number increased by 3350% in the last quarter of 2011 for Android alone [9].Recently, for Android, Kaspersky Lab detected around 1,245,894 malicious installation packages, of which 38,951 are Trojans targeting banking applications and 3,805 are mobile ransomware Trojans [10].They also concluded that most of these infected applications are distributed through the official app stores, which makes it really difficult for common users to identify them.Kaspersky Lab data also indicates that mobile malware writers make good use of the current trends to distribute their malicious code.For instance, an application called Gustuff including a malware-Trojan-Banker.AndroidOS.Gustuff.a-appeared on Google Play in 2019 and was one of the most autonomous and massive spreading distributions targeting more than 125 banking and cryptocurrency applications.This makes these threats even more frightening from users’perspective.According to the same report [10], in recent times mobile banking Trojans and Wireless Application Protocol (WAP) Trojans are on the rise in Android devices.The Mobile banking Trojans are not only targeting applications provided by financial institutions but rather getting control over applications providing online hotel and taxi bookings.WAP Trojans, on the other hand, are stealing money from the users by visiting WAP subscription websites without even the consent and knowledge of the users [11].

    We note that malware detection has always been a race against the clock, with security experts trying to detect the newly emerging 0-days and malicious software writers cooking up new ways of evading the detection algorithms.However, in the recent past, the use of deep learning has given an advantage to the detection side over malicious software.Due to the fact that learning can be performed from samples automatically, machine learning in general and deep learning models in particular have had great success in mitigating the malware issue on Android [12-14].

    Almost all the deep learning models applied to-date for malware detection on Android have been based on the core concept of a Convolutional Neural Network (CNN) [15].This type of neural network is based on the convolution operation, which is inherently translation invariant.This means that if a feature is found in one location, it is the same as being found in another location and the relationship between different features is not important.An easy to understand example is that of a car-for a CNN, an image with a hood, four tires and a couple of doors is a car regardless of whether they are all in thecorrect position relative to each other.We note that in the case of real world images, it is unlikely that we will see different parts of an image that do not ‘fit together’and therefore CNNs have immense success in the image domain.

    However, for the case of malware (and opcode sequences in any software in general), this is not a feature one would consider useful.For instance, the order in which different sequences or subsequences of operations are carried out is of immense importance.This has been shown by the extremely crafty technique of Return-Oriented Programming [16] to make benign software act maliciously simply by changing the order in which different operations are carried out.

    In this paper, we thus argue that translation invariance is not a property we would like to have in our models and moreover, the spatial relationship between different features is also quite important.For instance, the orientation in images gives different latent properties of the objects within the image such as their geospatial relation with the coordinate system as well as the different objects within that coordinate system.Similarly, the concept of orientation in malware data can capture the relationship between the baseline functioning of executables and their behavior towards other executables on the system.Existing malware detection techniques based on CNN cannot capture such data because of the inherent limitations of CNNs [17].For instance, in case of image-based datasets, the features learned by different convolutional layers could be visualized and information such as edges, lines, and curves in images could easily be depicted.However,in case of malware datasets it is extremely difficult to visualize or even comprehend the learned features.Moreover, by design CNNs are rotation and translation invariant, which means that a feature found in one location is as good as if it is found in any other location regardless of their spatial relationship as mentioned in our car example above.

    We therefore need to forsake CNN and turn to a model that handles these two issues properly.In the recent past, Capsule Networks [17] have been shown to handle both these issues with great success in the domain of image analysis.We therefore utilize Capsule Networks to model malware and thus remove both these limitations from malware detection.Concretely, our contributions in this paper are:

    (1) We propose and implement a deep learning-based model for malware analysis that is centered around the concept of Capsule Networks as opposed to CNNs.This helps us learn “orientation-based” relationships between different subsequences in an application’s code that captures the behavior in a much more succinct manner.

    (2) We evaluate this model on three very large scale datasets to demonstrate its efficacy in detecting real-world malware.

    (3) We make our source for the whole pipeline available as open source so that any further modifications to our work can be made easily to further enhance the results.

    The rest of the paper is organized as follows: We first describe the background related to deep learning in brief.We then turn to Capsule Networks in particular and show how it is different from the traditional CNN-based models.Section 3 shows the details of our model and network design as well as the details of the dataset.Our detailed experiments, results, limitations, and future directions are discussed in Section 4.Related work is detailed in Section 5 and the paper is concluded at the end.

    2 Background

    Malware detection and its analysis over various platform has remained a top priority of researchers working in the domain of security.A number of approaches are presented for the purpose, each having its own weaknesses and strengths.The presented solution can be broadly classified into traditional approaches i.e., use of Anti-virus software programs along with various hardware devices.However, it suffers issues like availability of signatures from prior set of families of malware.Machine learning approach regarding malware analysis automates the analysis mechanism.However, traditional approaches are unable to learn application feature over a large scale.Deep architectures have proven quite effective in the tasks of classification, and it facilitates in terms of reducing human involvement and increasing classification accuracy.Deep architectures can learn malign traits in automated fashion.Malware developers write applications in a manner that malware changes its appearance to avoid being detected.Handcrafted features are ultimately used for labeling through use of algorithms.However, the newly developed malware are rapidly increasing and these cannot be detected efficiently and at scale through hand-crafted features.

    The conception of Deep learning satiates end-to-end learning, which refers to machine learning that can automate every step starting from input to the architecture, extracting features from the input and then performing various operations for its representation for classifying the input accordingly.The Deep learning architectures include neural networks wherein the nodes are organized into layers and are densely connected.The concept of deep learning is proven quite effective in domains of artificial intelligence [18,19].For the purpose of clarity, a number of deep learning models are presented below:

    Typically, in machine learning a dataset is classified into training and test set.A process is trained on the training set to generate another model that receives samples from test set as input, performs some computation based on theta values and predicts the ground truth.To minimize the energy function, the theta values are modified to optimize the model.Regression model is fitted to obtain an overall conception of how far the expected values are from the ground truth for individual data items.In case errors are high, the gradient descend mechanism is adopted to minimize the error.However, the typical machine learning approaches require human intervention in terms of defining the input for training purpose.Also, the traditional machine learning approaches are not efficient computationally [20].To overcome the difficulties of traditional machine learning, deep neural network architectures are introduced.In the following subsections, we provide a comprehensive details of various Deep Learning models.

    Each Deep learning model essentially includes neural networks.It provides an approximation to the ground truth in a specific domain similar to a human brain.After training, input from the test set is provided to neural networks so that it can extract features and based on learned features it can predict the label as result.A neural network (cf.Fig.2) has an input layer containing data in the form of text, image etc.The inputs are obtained from a dataset, which can be either in processed or unprocessed form.The processed data contains rows defining various input data points and columns, which specifies associated feature with the data points.These features are then fed to the input layer for Neural Network training one by one [21].The dataset is preprocessed if it is not in conformance with format design of the Deep learning model.

    Figure 2: Fully connected neural networks

    2.1 Hidden Layers of the Network and its Various Components

    Hidden layer includes neurons with activation functions inside them.These receive input previous layer in form ofinput*weights+biasand uses activation functions to present the input in a range [22].Similarly, it provides output to the next layer.Hidden layers are not included in a simple neural network.It is only included for the deep learning model.

    2.2 Learning Through Activation Functions

    Likewise, activation functions are utilized inside each neuron of hidden and output layer to decide whether the coming input from the previous layer is significant.The activation functions are of various kinds including the linear and sigmoid function.The linear activation function puts linearity in the network and has the following as general functionF(x)=ax+bThe sigmoid activation function is also a most well-known function that outputs values between 0 or 1.However, it suffers from vanishing gradient problem because it produces small values which diverges the learning process as well [23].Another activation function is called Tanh function that produce output between -1 and 1.Tanh functions also face vanishing gradient issue as well at some stage of neural training.A general solution repeatedly used to remedy this issue is the ReLu activation function and its several variants [24].

    2.3 Fully Connected Neural Network(FCNN)

    Fully connected neural network contains layers of nodes that are connected fully to each other.A fully connected layer is a function fromRmtoRn.Wherein its output dimension depends on the input dimension.One of the forms of fully connected layer is represented pictorially in Fig.2.

    Since all nodes are connected and there may be a number of other layers, the fully connected network suffers from vanishing gradient issue [25].Another issue is that of huge number of parameters which is handled through CNN.Similar to ordinary neural networks, CNNs are made up of neurons that are sparsely connected instead of fully connected nodes.The neurons receive some inputs, perform a dot product followed with a non-linearity.It repeatedly applies a number of filters on images which results in translation invariance [26].For a detailed analysis of these and other neural network based methods, we refer the readers to [14].

    2.4 Machine Learning and Capsnets

    Traditional machine learning employed the age old concept of statistically modelling the correlation between input features and outputs.As mentioned before, this was extremely difficult and did not scale well.Fully connected deep neural networks were introduced to automatically extract features from large datasets.

    However, there are two major limitations with CNN first, CNN were developed with imagebased datasets in mind.This has its upsides-learned features could be visualized and depicted information such as edges, lines, curves, and high and low contrast areas.However, for datasets of a different nature-such as malware, the learned features are extremely difficult to visualize or even comprehend.

    The second and more important limitation is more rooted in the way CNNs are designed.By their very nature, CNNs are rotation and translation invariant.This means that if a feature is found in one location, it is just as good as if it was found in any other location.While this makes CNNs more scalable and a lot more computationally feasible, it has its drawbacks.Consider, for example, a case where there is an image that contains several tires strewn around a workshop.There is also a hood of a car and a few doors in the image.As far as the CNN is concerned,all the features that define a “car” are present in the image and therefore, the image represents a car-which is definitely not the case.

    To tackle this issue, Sabour et al.[17] devised a new architecture of deep learning called Capsule Networks (or CapsNet).The idea is that the different features extracted from a data point not only have to be present, but they also need to have an interaction with each other before they can be considered to form a larger whole.In the example above, the tires and the hood need to be in a certain position relative toeach otherbefore they can be considered parts of a car.The way through which this is achieved is described briefly as follows.

    Capsule networks are very similar to CNNs with a few minor changes.The basic architecture of a CapsNet is essentially that of a few filters connected sparsely with each node on the next layer.The output produced are through the typical convolution operation.

    However, after the convolution operation has been applied, the activation has three possible outcomes:

    ? If the activation isnotcarried out but the feature does not contribute correctly to the overall label, it is penalized by a factor ofβu

    ? If the activation is carried out and the feature does not contribute to the final label, it is penalized byβuand an additional penalty ofβa

    ? Finally, if we feature did contribute to the correct label, it is not penalized and in essence carried more weight in the final label.

    This seemingly simple algorithm is termed as routing-by-agreement since the different features combine together and agree on what the final label should be.An example of how parts of an image can contribute to the correct labeling of the overall image can be seen in Fig.3.The two images contain the correct parts but the orientation of the triangle and its spatial position relative to the rectangle dictates whether the image should be labeled a house or a boat.

    Moreover, the cost function is slightly modified as well.Briefly, it is defined in Eq.(1) as:

    Let us explain that briefly:idenotes a data point andjdenotes a single capsule.the probability density of the vote dimensionhfor the given data point and capsule.Finally,is the “vote” for the capsulejfor data pointialong dimensionh.This may be, for the sake of understanding, considered as the activation along this dimension.

    An easier way to understand this is to think of the activation of the output of a single node as not being a single value but a vector ofhdimensions.

    Figure 3: Capsule network routing-by-agreement example

    Based on the above, the final activation for capsulejin the output layer is defined in Eq.(2) as:

    This routing-by-agreement algorithm ensures that only those features are contributing to the final label which actually have an agreement about the differentpropertiesof the final label.These properties are, in the case of images, orientation of the different parts and their composition.For instance, the orientation of a triangle in Fig.3.For further details about this algorithm as well as the effectiveness of this method, we refer the interested reader to [17].

    In our use case of malware analysis, these different properties will be completely different.We discuss how CapsNet can be used to improve malware analysis and make it much more semanticsaware in the section below.

    3 CapsDroid

    As discussed before, the limitations of CNN have been catered to effectively in the domain of image classification through the use of Capsule Networks.In this section, we describe how we envision the same model as being applied to malware analysis and the changes required to model the problem in this domain.

    3.1 Network Architecture

    We base our malware analysis model on the seminal work by Sabour et al.[17].First, we describe the architecture that achieved the best results and then discuss some of design choices and hyperparameter values we tried along the way to our top result.

    Our top-performing model in terms of accuracy of classification is shown in Fig.4.It is essentially a two-layer learning process.The primary difference between the way capsules are used in image classification and our work is the input.Images are two dimensional by nature and have a horizontal and vertical correlation between neighboring pixels.

    Figure 4: CapsNet architecture for predicting families of malware

    3.1.1 Embeddings for Opcodes

    The complete architecture of our CapsNet is shown at an abstract level in Fig.4.Malware analysis is typically done using sequences of opcodes (or bytecode in our case).This is a onedimensional structure.Moreover, the dependence can be not only among neighboring operators but also among opcodes farther apart from each other.Finally, since the opcode values are discrete and do not have an inherent partial or full order to them, the numerical values assigned to opcodes are purely arbitrary.

    In order to break the partial ordering between the numeric values assigned to them, we first convert the numeric values to one-hot vector encoding.This results in each opcode in the sequence to be represented using a vector of length 256-the total number of possible opcodes.However,this is a very large vector (especially considering the fact that typical length of the sequences of these opcodes is more than 80,000).If we use this encoding, the number of nodes in our input layer for the CapsNet would be more than 20 million-which is obviously infeasible.

    To cater to this problem, we first use a different neural network to learn the embeddings for each of the opcodes.This can be seen in Step 0 and Step 1 of our full architecture in Fig.4.To achieve this goal, we create a four-layer neural network which tries to classify the data points into malware and benign applications.While this dataset is nothing new and does not achieve good results, it does help us learn embeddings for the opcodes in its first layer.Once this network reached an accuracy of 80%, we stopped the training and used the first layer of the network as the embeddings for the opcodes.The weights of the nodes for the first layer were used to learn vector embeddings for opcodes.This vector was only of length 4 which significantly reduces the amount of computation and storage required in the CapsNet network.

    3.1.2 CapsNet

    We then re-encoded our complete dataset to represent each of the opcodes using the embeddings learned in the first step.This was a one-time process and any changes to the CapsNet architecture did not affect our embeddings.The output of this layer was therefore in the shape(ψ,800000,4), whereψwas the batch size.These embeddings were then fed to the capsule layer.This is where the core of our learning happens.We kept the number of capsules to quite small.Our best results were achieved using the number of capsules set to 250.(We discuss alternate results later.) In order to avoid overfitting over the training data, we utilized a separate dropout layer after the capsule layer as it is not clear if embedding the dropout within the capsule layer would be prudent.

    Afterwards, in order to reduce the number of parameters, we utilized a global average pooling layer which significantly reduces the number of parameters before passing them on to a fully connected layer.While this has the disadvantage of losing some information, the alternative is simply not feasible as two fully connected layers of more than 500,000 parameters would lead to over 250 billion trainable parameters.Finally, we utilize batch norm to avoid the problem of internal co-variate shift which invariable creeps into deep learning model [27].The output layer of our model depicted in Fig.4 was used to predict the family of malware to provide fine-grained classification.Our initial experiments however, only predicted whether the sample being fed was malicious or benign.

    Some further details of how the analysis was carried out from a practical perspective are given below.

    3.2 Dataset Description

    As with any deep learning-based analysis, we need to have a large enough dataset to satiate the requirements of the deep model with a large number of parameters.If we do not have sufficient data, we would be significantly overfitting.To handle this issue, we utilized three large scale datasets in tandem.First one is Drebin which is a massively popular, high quality collection of malware collected over a period of two years containing more than five thousand malware samples belonging to 20 families.

    The second dataset used in our study was Android Malware Dataset (AMD) which is a slightly newer dataset that has more than 60 gigabytes of malware collected in more than a hundred families.

    Finally, we augmented this with some very recent malware samples coming from VirusShare.All three combined, we had a total malware collection of 40,000+ samples.To create a balanced dataset, we downloaded around 50,000 samples of benign applications from the Google Play store(along with some third party stores).To get a slightly better assurance that these samples were indeed benign, they were passed through the VirusTotal online virus detection service.The final result was a benign sample size of 45,000 and a malicious sample size of approx.40,000.

    Since the dataset contained Android packages (apk files), which cannot be fed directly to a neural network, we processed them using the AndroGuard tool which helped us extract the dex files, which contain the actual bytecode of applications.After getting the dex file, we used an in-house script to extract the opcode sequences from the code section of the dex file.The operator part of each instruction was saved, and the operand parts were ignored for the sake of tractability.The resulting data was saved in ahdf5file for easier processing in the future.This dataset was then fed to the neural network as described in Section 3.1.2.We describe the physical aspect and some design decisions for our experiment in the section below.

    4 Experiments and Results

    4.1 Experiment Setup

    The experiment was run on an NVidia k80 GPU (mounted on a system with a 32GB main memory and a 8-core processor clocked at 3.5 GHz) using Keras with the Tensorflow backend.The code for our CapsNet module for Keras is available as open source under the GPLv3.Since the sequences in datasets were quite long, we clipped them to a max sequence length of 800,000.This covered more than 92% of the data points fully but led to a significant improvement in performance and learning times.

    Our codebase is dependent on Keras as the front-end API to Tensorflow.We utilizedh5pyto perform out-of-memory data allocation since the total dataset was much larger than the total available physical memory.Matplotlib and the excellent seaborn library were used to automatically generate learning curves and result plots simultaneously with the training and validation process.

    Our maximum sequence length discussed above was a major hyperparameter.If this hyperparameter is reduced by a lot, the training becomes quite fast but unfortunately turns the whole learning process into an n-gram feature classifier, which has poor accuracy.If, on the other hand,we increase this number by a lot, the resulting accuracy is exceptional but leads to slow and sometimes infeasible learning times.

    Another important hyperparameter is the number of layers in the CapsNet architecture described above.Again, the issue is that if we increase the number of layers even by one, the inefficiency of the CapsNet architecture to-date means increasing the time taken by an order of magnitude.This significantly reduces the ability to, at least given the hardware we have access to,increase the number of layers to improve the accuracy further.Hopefully with a cluster of GPUs and utilizing Tensorflow’s horizontal parallelization of the network, we should be able to train a much larger network in the future.

    Last but not least, the number of capsules in the hidden layer is a major hyperparameter.We tried several alternatives for this hyperparameter.Details of the effect of these experiments are discussed in the section below.

    One important point to note is that, typically, hyperparameters are optimized using a better strategy such as grid search.This was not feasible in our case as a single training session takes days to complete even a handful of epochs.This would make grid search infeasible and thus required expert hand-tuning of the hyperparameters discussed above.

    4.2 Results and Discussion

    We summarize the results of all our experiments in Tab.1.We compare our results to [14,28-31] since these are the best results achieved for malware detection till date.The symbol ‘-’in Tab.1 indicates that the corresponding metric is not reported by the source paper.As can be seen,CapsDroid performs quite well in terms of the evaluation metrics.We achieved an F1 score of 0.987.This seems like a minor improvement over LUNA but note that LUNA is an uncertainty based model and it achieved an F1 score of 0.986 at the expense of a loss of coverage of 0.024.It means that while they were able to predict with that F1 score, they were not able to make predictions forallof the applications due to the higher amount of uncertainty associated with some applications.This, we feel was a major limitation in that model.CapsDroid, however was able to classify all applications with a minimal False Positive Rate (FPR).

    Table 1: Comparison of results with existing techniques

    For the rest of the metrics, it can be noted that we achieved the lowest FPR of only 0.2%as well as a very high detection rate of 98% and an Area Under the Curve (AUC) of 0.984.The higher AUC value achieved by CapsDroid implies that it is able to distinguish the benign applications from the malicious samples in the datasets.An important aspect of the results shown in Tab.1 is that the F1 score and AUC of the model improves significantly with increase in the complexity of the learning models as evident from the performance metrics.The IMFCN approach also reported a higher F1 score of 0.982 with almost the same accuracy rate.However,these results were achieved by using relatively smaller datasets for experiments.

    The Receiver Operating Characteristic (ROC) curves of our model along with that of LUNA are shown in Fig.5.The graph showing the training and validation loss calculated for each epoch of the CapsDroid network is shown in Fig.6, where the vertical dashed line shows theearlystoppingpoint, which is used as a form of regularization to avoid overfitting of the model.As mentioned earlier, the dropout layer embedded after the capsule layer and early-stopping technique helped in avoiding overfitting over the training data and improves our model’s performance on the test data.

    Figure 5: ROC comparison: LUNA vs. CapsDroid

    Figure 6: Loss curves for the best model

    4.3 Limitations and Future Directions

    Although, CapsDroid achieve good results, we do note a limitation of our model here.The time taken to perform the training of our model is quite slow as compared to other deep learning models.This is due to the fact that the capsule module (and its routing-by-agreement algorithm) is quite slow in nature.This is an active area of machine learning research, and we are quite confident that advancements in this area will alleviate this limitation of our work overtime.Moreover, since this is only an issue at training time, the runtime performance of our model is not an issue at all.

    An important research direction to enhance the work presented in this paper is to analyze dynamic behavior of applications such as system calls traces that would classify benign and malicious applications based on the inherent relationship between system calls made by various applications during the course of execution.Another important future research route would be to analyze our model performance over a broader range of applications across platforms other than Android such as iOS and Windows platform.We believe that machine learning has the potential to effectively tackle the over expanding issue of malware on the current mobile ecosystem and our work can contribute to highlight the effectiveness of deep learning models in mitigating these treats.

    5 Related Work

    Machine learning techniques are extensively used for mitigating cyber security threats in general and are continuously optimized for malware detection and classification in particular [34,35].Some of the recent machine learning classifiers used for malware detection on mobile devices are presented here.

    Bourebaa et al.[36] utilizes multiple CNN-based models for detection and classification of malware on Android-based devices.The authors extracted API calls and application permissions list as features and applied a one-dimensional CNN model to suits low memory usage on handheld devices.Further, they applied Inception and Multichannel CNN-based models to achieve better performance in terms of accuracy rate.Although, the choice for linear model for simplification and lower memory usage is surmounted by the complexity of inception and multichannel models.Similarly, Alshahrani et al.[32] proposed DDefender, an Android malware detection solution that employ both the static and dynamic malware analysis techniques to extract features such as application’s components, system calls, requested permissions, network traffics,and system information from the device.DDefender use dynamic analysis to extract features for an inspected application at runtime, then apply static analysis to further extract features from the APK files, and then apply deep learning-based model to detect malicious applications.Though,the hybrid approach of DDefender outperformed some of the best performance models, however significant performance overhead was reported.

    McLaughlin et al.[13] have used convolutional neural networks (CNN) for malware classification using static analysis of bytecode from a disassembled application.Malware indicative features are learned automatically by the network from raw bytecode sequence, which eliminates the need for malware signature to be designed manually.Similarly, Karbab et al.[30] proposed MalDozer,an Android malware detection framework based on sequences mining using CNN.MalDozer takes the sequences of API calls as input, which are extracted from Android app packages, and generate sequences of vector for all applications in the same order of API calls.It applies neural network to the vector sequence and classify applications as benign or malicious.Hou et al.[37]have proposed an Android malware detection framework that extracts Linux kernel system calls for each application automatically and construct weighted directed graphs.Further, they apply convolutional neural network framework to classify newly unknown malware.Hasegawa et al.[38]has proposed a one-dimensional CNN (1-D CNN) for malware detection using a small portion of Android Application Package (APK) files.Using the shallow one-dimensional model, their model has achieved a promising accuracy rate.However, the authors only analyze a small portion of APK files without decompression, reduces the chances of capturing key features of malware.

    Martinelli et al.[39] has proposed a CNN-based linear model that is applied to system calls occurrences of applications installed on Android device.The authors used a relatively small dataset for experiments and achieved detection accuracy of up to 95%.Similarly, Yakura et al.[40]used a linear CNN model to extract bytecode sequences and combine an attention mechanism to produce attention maps for malware.The bytecode sequences are converted into images and the attention mechanism is applied to highlight important regions for malware classification.However,the extracted sequences from the attention maps are only useful for manual analysis, which could only be performed for bytecode extracted from a smaller number of applications.Another CNNbased approach known as IMCFN, proposed by Vasan et al.[33], converted malware bytecode to colorful images and applied a fine-tuned CNN-based architecture known as ImageNet to perform multiclass malware classification.The used two different malware datasets and achieved an accuracy of 98.82% with one of the datasets used.However, similar to [40], the authors used relatively smaller datasets for experiments.

    Fan et al.[31] applied Deep Belief Network (DBN) architecture to classify malware by constructing a deep learning model.The authors have also compared their model detection accuracy with Logistic Regression based models, C4.5, and SVM and concluded that the deep learning model showed better accuracy than the other machine learning models.Ali-Gombe et al.[41],and Canfora et al.[42] proposed dynamic analysis method by identifying behavioral signature of running applications.Although, these and other dynamic analysis methods [43-45] are more resistant to obfuscation but offer less scalability due to incurring additional computational cost [46].We have based our work on different datasets of significantly larger size.The previous studies mentioned here do not report their findings on these datasets.While we also provide our results based on the datasets they have used, our results are much more comprehensive.

    6 Conclusion

    Detection of malware on mobile phones-especially on Android-based systems, which form a vast majority of the market share-is an immensely important and constantly changing research landscape.In this paper, we have presented CapsDroid-a Capsule Network-based model-for malware detection.This model presents a new way of detecting features of malware that not only provides better results in terms of detection rates and F1 measure but also output features that are more coherent and capture the intrinsic relationship between opcode sequences in different parts of the code being analyzed.Our model was able to beat state-of-the-art results for malware detection on the Android platform.However, note that our model, in its general form,is not restricted to the Android platform.We envision the use of this technique to analyze a broader range of application code on other platforms as well such as iOS, Windows and MacOSwhichever platform you consider-the code is invariably composed of a sequence of instructions,whether interpreted bytecode or compiled machine code.Our model can be used without too many modifications, and we plan on exploring these venues in much greater in the future.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    av天堂在线播放| 国产探花极品一区二区| 最近最新中文字幕大全电影3| 国产久久久一区二区三区| 乱码一卡2卡4卡精品| 99热这里只有是精品50| 日韩一区二区视频免费看| 国产美女午夜福利| 少妇熟女欧美另类| 国产中年淑女户外野战色| 成年免费大片在线观看| 成人性生交大片免费视频hd| 日韩亚洲欧美综合| 亚洲国产精品成人综合色| 少妇猛男粗大的猛烈进出视频 | 女人被狂操c到高潮| 特大巨黑吊av在线直播| 色av中文字幕| 精品久久久久久久久久免费视频| 少妇的逼水好多| 赤兔流量卡办理| 三级经典国产精品| 精品一区二区三区人妻视频| 全区人妻精品视频| 亚洲欧美成人精品一区二区| 最近最新中文字幕大全电影3| 麻豆一二三区av精品| 成人永久免费在线观看视频| 国产精品国产高清国产av| 国产免费一级a男人的天堂| 国产亚洲精品久久久久久毛片| 变态另类成人亚洲欧美熟女| 亚洲成人av在线免费| 亚洲中文字幕日韩| 我的老师免费观看完整版| 国内揄拍国产精品人妻在线| 99热网站在线观看| 久久久精品94久久精品| 日韩高清综合在线| 俺也久久电影网| 99在线视频只有这里精品首页| 最近2019中文字幕mv第一页| 欧洲精品卡2卡3卡4卡5卡区| 亚洲欧美成人精品一区二区| 又黄又爽又免费观看的视频| 亚洲人成网站在线播放欧美日韩| 免费看光身美女| 欧美日韩综合久久久久久| 亚洲专区国产一区二区| 日本成人三级电影网站| 人妻夜夜爽99麻豆av| 18禁黄网站禁片免费观看直播| 国产真实伦视频高清在线观看| 91午夜精品亚洲一区二区三区| 亚洲av中文av极速乱| 国产高清激情床上av| 亚洲国产欧洲综合997久久,| 国产精品女同一区二区软件| 丝袜美腿在线中文| 国产真实乱freesex| 欧美成人精品欧美一级黄| 成人美女网站在线观看视频| 在线播放无遮挡| 精品不卡国产一区二区三区| 97碰自拍视频| 免费av毛片视频| 久久久久久国产a免费观看| 国产久久久一区二区三区| 69人妻影院| 黄色视频,在线免费观看| 99久久无色码亚洲精品果冻| av女优亚洲男人天堂| 99久国产av精品| 大又大粗又爽又黄少妇毛片口| 少妇熟女aⅴ在线视频| 亚洲成人久久性| 最好的美女福利视频网| 欧美日韩在线观看h| 欧美人与善性xxx| 欧美日本视频| 精品福利观看| 高清午夜精品一区二区三区 | 十八禁国产超污无遮挡网站| 淫妇啪啪啪对白视频| 搡老熟女国产l中国老女人| 变态另类成人亚洲欧美熟女| 午夜福利高清视频| 亚洲精品成人久久久久久| 九色成人免费人妻av| 色哟哟·www| 日本a在线网址| 精品一区二区三区视频在线| 国产v大片淫在线免费观看| 啦啦啦韩国在线观看视频| 在线观看66精品国产| 久久久成人免费电影| 亚洲婷婷狠狠爱综合网| 啦啦啦韩国在线观看视频| 日韩av不卡免费在线播放| 噜噜噜噜噜久久久久久91| 国产亚洲欧美98| 亚洲最大成人中文| 久久久久久久久久黄片| 99热全是精品| 少妇熟女aⅴ在线视频| 在线观看一区二区三区| 精品欧美国产一区二区三| 99精品在免费线老司机午夜| 日韩欧美精品v在线| av在线播放精品| 亚洲久久久久久中文字幕| 成人亚洲欧美一区二区av| 免费电影在线观看免费观看| 插逼视频在线观看| 免费高清视频大片| av女优亚洲男人天堂| 在线播放国产精品三级| 天堂网av新在线| 欧美激情久久久久久爽电影| 国产熟女欧美一区二区| 亚洲国产精品sss在线观看| 国产成人福利小说| 久久久久九九精品影院| 99热这里只有精品一区| 日本-黄色视频高清免费观看| 99久久精品热视频| 春色校园在线视频观看| 可以在线观看毛片的网站| 日本五十路高清| 岛国在线免费视频观看| 免费看日本二区| 亚洲人成网站在线观看播放| 国产高清不卡午夜福利| 不卡视频在线观看欧美| 国产高清不卡午夜福利| 夜夜看夜夜爽夜夜摸| 亚洲自拍偷在线| 国产成人91sexporn| 欧美精品国产亚洲| 91在线精品国自产拍蜜月| 成人性生交大片免费视频hd| av黄色大香蕉| 色综合色国产| 久久欧美精品欧美久久欧美| 毛片一级片免费看久久久久| 波多野结衣巨乳人妻| 91av网一区二区| 日韩欧美精品免费久久| 成人一区二区视频在线观看| 男女下面进入的视频免费午夜| 亚洲精品国产av成人精品 | 综合色av麻豆| 欧美极品一区二区三区四区| ponron亚洲| 观看美女的网站| 久久久久精品国产欧美久久久| 午夜福利在线观看免费完整高清在 | 特级一级黄色大片| 精品一区二区免费观看| 亚洲av第一区精品v没综合| 成人亚洲精品av一区二区| 亚洲中文字幕日韩| 男女之事视频高清在线观看| 色尼玛亚洲综合影院| 亚洲中文字幕一区二区三区有码在线看| a级毛片a级免费在线| 精品午夜福利视频在线观看一区| 身体一侧抽搐| 精品免费久久久久久久清纯| av专区在线播放| 亚洲欧美日韩无卡精品| 亚洲国产精品成人久久小说 | 97人妻精品一区二区三区麻豆| 国模一区二区三区四区视频| 尾随美女入室| 亚洲18禁久久av| 麻豆精品久久久久久蜜桃| 亚洲经典国产精华液单| 丰满乱子伦码专区| 久久人妻av系列| 国产三级中文精品| 久久久久九九精品影院| 不卡视频在线观看欧美| 国产一区二区亚洲精品在线观看| 91精品国产九色| 又黄又爽又免费观看的视频| 18禁黄网站禁片免费观看直播| 波多野结衣高清作品| 日本a在线网址| 又爽又黄无遮挡网站| 亚洲无线观看免费| 日本免费一区二区三区高清不卡| 天天躁日日操中文字幕| 在线播放无遮挡| 国产蜜桃级精品一区二区三区| 亚洲成人久久爱视频| 日韩精品中文字幕看吧| 我要看日韩黄色一级片| 99热这里只有是精品50| 日韩精品有码人妻一区| 色视频www国产| 欧美区成人在线视频| 久久久久久大精品| 欧美国产日韩亚洲一区| 欧美一区二区精品小视频在线| 亚洲七黄色美女视频| 亚洲欧美日韩高清在线视频| 亚洲美女视频黄频| 啦啦啦啦在线视频资源| 人妻夜夜爽99麻豆av| 男女之事视频高清在线观看| 国产欧美日韩精品一区二区| 91麻豆精品激情在线观看国产| 久久久久性生活片| 99视频精品全部免费 在线| 综合色av麻豆| 亚洲三级黄色毛片| 菩萨蛮人人尽说江南好唐韦庄 | 久久久久久久午夜电影| 淫妇啪啪啪对白视频| 久久国产乱子免费精品| 久99久视频精品免费| 老熟妇乱子伦视频在线观看| 我要看日韩黄色一级片| 国产av麻豆久久久久久久| 黄片wwwwww| 国产人妻一区二区三区在| 亚洲最大成人中文| 久久精品综合一区二区三区| 丝袜喷水一区| 日韩制服骚丝袜av| 99久国产av精品| 一区二区三区高清视频在线| 亚洲七黄色美女视频| 日本三级黄在线观看| h日本视频在线播放| 精品一区二区三区视频在线观看免费| 久久欧美精品欧美久久欧美| 国产精品国产三级国产av玫瑰| 午夜免费激情av| 又黄又爽又刺激的免费视频.| 国产亚洲精品久久久久久毛片| 久久中文看片网| 99久国产av精品国产电影| 国产精品野战在线观看| 精品乱码久久久久久99久播| 欧美国产日韩亚洲一区| 3wmmmm亚洲av在线观看| 在线看三级毛片| 国产精品久久久久久久电影| 天天躁日日操中文字幕| 久久精品国产亚洲av涩爱 | 国产精品人妻久久久影院| 久久精品国产亚洲网站| 国内少妇人妻偷人精品xxx网站| 天天躁日日操中文字幕| 久久久久国产网址| 我要搜黄色片| 日韩成人伦理影院| 成年女人永久免费观看视频| 成人美女网站在线观看视频| 99久久中文字幕三级久久日本| 欧美丝袜亚洲另类| 日韩欧美 国产精品| 免费搜索国产男女视频| 国产伦在线观看视频一区| 欧美精品国产亚洲| 又黄又爽又刺激的免费视频.| 国产一区二区在线观看日韩| 久久精品国产99精品国产亚洲性色| 两个人的视频大全免费| 免费观看的影片在线观看| 搞女人的毛片| 99九九线精品视频在线观看视频| 人人妻人人看人人澡| 国产精品国产三级国产av玫瑰| 国产亚洲欧美98| h日本视频在线播放| 亚洲美女黄片视频| 欧美一区二区国产精品久久精品| 毛片女人毛片| 中文在线观看免费www的网站| 色综合色国产| 久久久成人免费电影| 嫩草影院新地址| 干丝袜人妻中文字幕| 亚洲,欧美,日韩| 亚洲成人精品中文字幕电影| 俄罗斯特黄特色一大片| 亚洲第一电影网av| 国内揄拍国产精品人妻在线| 晚上一个人看的免费电影| 亚洲精品在线观看二区| 一级黄片播放器| 高清午夜精品一区二区三区 | 久久久国产成人免费| 国产视频一区二区在线看| 亚洲七黄色美女视频| 在线播放无遮挡| 床上黄色一级片| 国产又黄又爽又无遮挡在线| 午夜a级毛片| 久久久国产成人精品二区| 国产乱人视频| 欧美xxxx性猛交bbbb| 成年女人看的毛片在线观看| 亚洲精品国产av成人精品 | 亚洲国产精品成人久久小说 | av福利片在线观看| 国产精品福利在线免费观看| 我要看日韩黄色一级片| 男人的好看免费观看在线视频| 校园春色视频在线观看| 又黄又爽又免费观看的视频| 亚洲av免费在线观看| 亚洲av免费高清在线观看| 欧美高清成人免费视频www| 亚洲精品亚洲一区二区| 免费看美女性在线毛片视频| 99热这里只有精品一区| 国内精品美女久久久久久| 成人漫画全彩无遮挡| 色尼玛亚洲综合影院| 久久人人精品亚洲av| 熟女人妻精品中文字幕| 日韩av不卡免费在线播放| 精品一区二区三区视频在线| 成人毛片a级毛片在线播放| 国模一区二区三区四区视频| 国产精品亚洲一级av第二区| 午夜免费激情av| 变态另类成人亚洲欧美熟女| 一边摸一边抽搐一进一小说| 在线观看66精品国产| 夜夜爽天天搞| .国产精品久久| 免费搜索国产男女视频| av天堂中文字幕网| 亚洲精品久久国产高清桃花| 熟女电影av网| 国内精品宾馆在线| 一个人看视频在线观看www免费| 97超视频在线观看视频| 少妇熟女欧美另类| 伦精品一区二区三区| 久久国产乱子免费精品| 99九九线精品视频在线观看视频| 高清毛片免费看| 久久热精品热| 日日摸夜夜添夜夜爱| 成人综合一区亚洲| av国产免费在线观看| 国产人妻一区二区三区在| 麻豆久久精品国产亚洲av| 久久国内精品自在自线图片| 精品一区二区三区视频在线观看免费| 亚洲欧美日韩高清专用| 日韩人妻高清精品专区| 精品无人区乱码1区二区| 嫩草影视91久久| 国产麻豆成人av免费视频| 精品人妻偷拍中文字幕| 少妇人妻精品综合一区二区 | 深夜a级毛片| 国产单亲对白刺激| eeuss影院久久| 老司机福利观看| 欧美bdsm另类| av黄色大香蕉| 国产男人的电影天堂91| 一级毛片aaaaaa免费看小| 九色成人免费人妻av| 国产精品电影一区二区三区| a级毛片免费高清观看在线播放| 日韩一区二区视频免费看| 男女边吃奶边做爰视频| 免费av观看视频| 露出奶头的视频| 欧美日本视频| 一区二区三区四区激情视频 | 搡女人真爽免费视频火全软件 | 欧美日韩在线观看h| 国产精品伦人一区二区| 国产高清激情床上av| 日本在线视频免费播放| 亚洲精品色激情综合| 国产色婷婷99| 欧美性猛交黑人性爽| 亚洲欧美成人精品一区二区| 日本爱情动作片www.在线观看 | 午夜精品在线福利| 22中文网久久字幕| 在线看三级毛片| 国产精品福利在线免费观看| 一卡2卡三卡四卡精品乱码亚洲| 3wmmmm亚洲av在线观看| 级片在线观看| 十八禁网站免费在线| 日日摸夜夜添夜夜添小说| 一级毛片电影观看 | 国产69精品久久久久777片| 亚洲成人精品中文字幕电影| 蜜桃久久精品国产亚洲av| 久久精品国产亚洲av香蕉五月| 尤物成人国产欧美一区二区三区| 欧美精品国产亚洲| 日韩欧美在线乱码| 校园人妻丝袜中文字幕| 变态另类成人亚洲欧美熟女| 国产精品嫩草影院av在线观看| 色哟哟哟哟哟哟| 久99久视频精品免费| 日日啪夜夜撸| 精品午夜福利视频在线观看一区| 国产成人91sexporn| 国产在线精品亚洲第一网站| 国产精品日韩av在线免费观看| 国产在线男女| 最近中文字幕高清免费大全6| 成年版毛片免费区| 久久国内精品自在自线图片| 嫩草影视91久久| 干丝袜人妻中文字幕| 免费搜索国产男女视频| av.在线天堂| 成人性生交大片免费视频hd| av天堂在线播放| 99久国产av精品| 男女做爰动态图高潮gif福利片| 国产精品永久免费网站| 亚洲国产欧洲综合997久久,| 亚洲成av人片在线播放无| 午夜亚洲福利在线播放| 亚洲专区国产一区二区| 亚洲国产色片| 欧美日韩在线观看h| 国产精品久久电影中文字幕| 国产成年人精品一区二区| 国产激情偷乱视频一区二区| 99九九线精品视频在线观看视频| 白带黄色成豆腐渣| 一本一本综合久久| av在线观看视频网站免费| 特大巨黑吊av在线直播| 国产精品免费一区二区三区在线| 欧美潮喷喷水| 男女之事视频高清在线观看| 变态另类成人亚洲欧美熟女| 国产真实乱freesex| 最好的美女福利视频网| 欧美国产日韩亚洲一区| 少妇的逼好多水| 可以在线观看毛片的网站| 亚洲av成人av| 国产aⅴ精品一区二区三区波| 亚洲精品久久国产高清桃花| 日韩欧美国产在线观看| 国产 一区精品| 少妇熟女欧美另类| 成人毛片a级毛片在线播放| 美女cb高潮喷水在线观看| 国产精品1区2区在线观看.| 两个人视频免费观看高清| 91狼人影院| 淫秽高清视频在线观看| av专区在线播放| 国产精品日韩av在线免费观看| 中文字幕久久专区| 日韩三级伦理在线观看| 中文在线观看免费www的网站| 热99在线观看视频| 成人亚洲精品av一区二区| 精品久久久久久久久亚洲| 一级av片app| 国产精品福利在线免费观看| 成人av在线播放网站| 插逼视频在线观看| 91在线精品国自产拍蜜月| 欧美日本视频| a级毛片a级免费在线| 国产av麻豆久久久久久久| 国产亚洲91精品色在线| 日本一本二区三区精品| 国产精品av视频在线免费观看| 男人的好看免费观看在线视频| 亚洲性久久影院| 综合色丁香网| 亚洲人成网站在线观看播放| 国产高清视频在线观看网站| 直男gayav资源| 精品一区二区三区人妻视频| 岛国在线免费视频观看| 国产午夜精品论理片| 精品乱码久久久久久99久播| 中文字幕人妻熟人妻熟丝袜美| 精品久久久久久久久av| 黄色配什么色好看| 麻豆国产av国片精品| 日本与韩国留学比较| 直男gayav资源| 国产一区二区亚洲精品在线观看| 黄色一级大片看看| 在线免费十八禁| 深夜a级毛片| 老女人水多毛片| 国产精品日韩av在线免费观看| 内射极品少妇av片p| 99riav亚洲国产免费| 久久精品人妻少妇| 精品久久久久久成人av| 国产成人福利小说| 国产精品一区二区三区四区免费观看 | 久久久久久久亚洲中文字幕| 欧美性猛交╳xxx乱大交人| 欧美最新免费一区二区三区| 国产麻豆成人av免费视频| 在线观看一区二区三区| 成人欧美大片| 免费搜索国产男女视频| 国产乱人视频| 国产久久久一区二区三区| 女生性感内裤真人,穿戴方法视频| 亚洲国产精品合色在线| 成人av在线播放网站| 欧美日韩精品成人综合77777| 国产在线精品亚洲第一网站| 免费观看人在逋| 久久精品91蜜桃| 亚洲一区高清亚洲精品| 黑人高潮一二区| 欧美人与善性xxx| 美女cb高潮喷水在线观看| 日本与韩国留学比较| 最近最新中文字幕大全电影3| 乱人视频在线观看| 你懂的网址亚洲精品在线观看 | 麻豆成人午夜福利视频| 国产不卡一卡二| 一级毛片aaaaaa免费看小| 亚洲aⅴ乱码一区二区在线播放| av在线蜜桃| 亚洲av不卡在线观看| 亚洲内射少妇av| 日韩精品中文字幕看吧| 亚洲成人久久爱视频| 热99在线观看视频| 久久久久久久久中文| 嫩草影院入口| 日产精品乱码卡一卡2卡三| 精品久久久久久久久久久久久| 综合色av麻豆| 国产熟女欧美一区二区| 又爽又黄无遮挡网站| 国产精品一区二区三区四区久久| 成人高潮视频无遮挡免费网站| 久久九九热精品免费| 美女免费视频网站| 国产欧美日韩精品一区二区| 亚洲五月天丁香| 婷婷精品国产亚洲av在线| 国产又黄又爽又无遮挡在线| 日本免费a在线| 国内精品美女久久久久久| 亚洲av不卡在线观看| 成年女人永久免费观看视频| 在线观看66精品国产| 国产精品一二三区在线看| 日韩三级伦理在线观看| 久久久久国产精品人妻aⅴ院| 熟女人妻精品中文字幕| 国产精品久久久久久精品电影| 18+在线观看网站| 亚洲欧美清纯卡通| 国产 一区精品| 亚洲丝袜综合中文字幕| 一区二区三区免费毛片| 午夜福利18| 联通29元200g的流量卡| 一个人观看的视频www高清免费观看| 国产三级中文精品| 久久久a久久爽久久v久久| 日本爱情动作片www.在线观看 | 特大巨黑吊av在线直播| 国国产精品蜜臀av免费| 在线观看免费视频日本深夜| 女人被狂操c到高潮| 床上黄色一级片| 在线观看66精品国产| 干丝袜人妻中文字幕| 99在线人妻在线中文字幕| 亚洲欧美日韩东京热| 日韩欧美精品免费久久| 国内少妇人妻偷人精品xxx网站| 少妇人妻精品综合一区二区 | 人人妻人人澡人人爽人人夜夜 | 欧美xxxx黑人xx丫x性爽| 国产一级毛片七仙女欲春2| 中文字幕精品亚洲无线码一区| 日本色播在线视频| 99久久成人亚洲精品观看| 十八禁网站免费在线| h日本视频在线播放| 最近在线观看免费完整版| 国产三级在线视频| 国产精品永久免费网站| 国产av不卡久久| 熟妇人妻久久中文字幕3abv| 性插视频无遮挡在线免费观看| 国产亚洲精品久久久久久毛片| 午夜爱爱视频在线播放| 神马国产精品三级电影在线观看| 如何舔出高潮| 日韩三级伦理在线观看| 在线国产一区二区在线| 两个人视频免费观看高清|