• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved Dragonfly Optimizer for Intrusion Detection Using Deep Clustering CNN-PSO Classifier

    2022-03-14 09:27:12BhuvaneshwariVenkatachalamHublovskTrojovskandPrabu
    Computers Materials&Continua 2022年3期

    K.S.Bhuvaneshwari,K.Venkatachalam,S.Hubálovsky,P.Trojovsky and P.Prabu

    1Department of Computer Sceince and Engineering,Karpagam College of Engineering,Coimbatore,641032,India

    2Department of Computer Science and Engineering,CHRIST(Deemed to be University),Bangalore,560074,India

    3Department of Applied Cybernetics,Faculty of Science,University of Hradec Králové,Hradec Králové,50003,Czech Republic

    4Department of Mathematics,Faculty of Science,University of Hradec Králové,Hradec Králové,50003,Czech Republic

    5Department of Computer Sceince,CHRIST(Deemed to be University),Bangalore,560074,India

    Abstract:With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and information.Based on the characteristics of these intruders,many researchers attempted to aim to detect the intrusion with the help of automating process.Since, the large volume of data is generated and transferred through network,the security and performance are remained an issue.IDS (Intrusion Detection System) was developed to detect and prevent the intruders and secure the network systems.The performance and loss are still an issue because of the features space grows while detecting the intruders.In this paper,deep clustering based CNN have been used to detect the intruders with the help of Meta heuristic algorithms for feature selection and preprocessing.The proposed system includes three phases such as preprocessing, feature selection and classification.In the first phase, KDD dataset is preprocessed by using Binning normalization and Eigen-PCA based discretization method.In second phase, feature selection is performed by using Information Gain based Dragonfly Optimizer(IGDFO).Finally,Deep clustering based Convolutional Neural Network (CCNN) classifier optimized with Particle Swarm Optimization(PSO)identifies intrusion attacks efficiently.The clustering loss and network loss can be reduced with the optimization algorithm.We evaluate the proposed IDS model with the NSL-KDD dataset in terms of evaluation metrics.The experimental results show that proposed system achieves better performance compared with the existing system in terms of accuracy,precision,recall,f-measure and false detection rate.

    Keywords: Intrusion detection system; binning normalization; deep clustering; convolutional neural network; information gain; dragonfly optimizer

    1 Introduction

    Over the years, computer networks are the area which effectively used in the applications such as business data processing, education and learning, widespread data acquisition and collaboration and entertainment.The connected devices over the internet for this application are increasing day by day and generate large amount of data for transfer and processing.This unauthorized access also aims to access the systems that will break the confidentiality, availability and integrity which is called as attack/intrusion.To monitor the malicious activity of the system and alert if there is any such attack happened is controlled by the Intrusion detection system (IDS).IDS provides the security from the attackers [1].IDS can be classified either networkbased or hostbased attacks.Network based attacks are the anomaly based attacks that are detected from the computer systems interconnections and the system can communicate to other via routers and switches, attacks also sent through these ones.Host based attacks are found from the single computer system and also it is easy to prevent from attacks.These are occurred from the external devices connected to the systems.Web based attacks are enabled during connecting to the internet and these systems attack to other system over the mail and downloading.

    For this IDS development, data mining and Machine learning techniques are widely used.Network feature selection is declared by selecting the most important features for the entire network without the loss of information.In terms of feature selection and classification on IDS,various ML algorithms have been used such as K nearest neighbor (KNN), Support Vector Machine (SVM), Random forest (RF) and Multi-layer perceptron (MLP) [2].IDS based deep learning algorithm called convolutional neural network are discussed in paper [3] to handle the imbalanced network traffic.The existing deep learning and machine learning algorithms are still lack in improving the IDS performance.The improved deep learning based algorithm has been used to overcome the issues in the existing systems in terms of improving the performance of the IDS and reduce the generalization error in this paper.The benefits of this contribution are as follows:

    ? The raw input IDS data set is preprocessed with binning normalization process to remove the missing values and handle the data that are out of the range.The high dimension of raw data is then transformed using the discretization method called Eigen-PCA.

    ? The transmitted data are then used for feature selection process.This proposed work introduced evolutionary algorithm called improved dragonfly optimizer with information gain (IG-DFO) for selecting the relevant features.For feature selection, the weight and the number of iterations will produce the optimal solution.Dragonfly optimizer with information gain is used here to produce the optimal feature selection.

    ? Classification with deep clustering convolutional neural network has been used.Compare to traditional CNN, deep clusteringcan reduce the clustering loss and improve accuracy of the classification.The network loss can be reduced with the optimization algorithm called PSO.Thus, the PSO optimized by clustering convolutional neural network (PSO-CCNN)can reduce the generalization error, training time and improved the classification accuracy with minimum noise.

    ? The proposed feature selection based classification on IDS data has been experimented and compared with existing feature selection and classification algorithms in terms of evaluation metrics.

    The paper has been organized as follows: Section 2 describes the review of the literature, Section 3 introduces evolutionary based feature selection and deep learning classification approaches,Section 4 discusses about the experimented results and Section 5 concludes the paper with future directions.

    2 Literature Review

    This section describes various literature and recent research related to IDS.In paper [4],various classification algorithms are analyzed with NSL-KDD data set.This can analyzethe protocols with the attacks by the intruders using WEKA tool.They used CFS based dimensionality reduction to improve the classification accuracy.Least square support vector machine (LSSSVM)based on IDS was proposed in paper [5].It used mutual information based on feature selection method to handle linear and nonlinear correlated features.They used KDD cup 99, NSL-KDD and Kyoto 2006 + datasets.The proposed approach obtained better accuracy and computational cost than other existing algorithms.

    The Paper [6] proposed an ensemble method to improve the IDS performance.They used two methods such as boosting and bagging with tree based classifiers.It extracted 35 features and used NSL-KDD dataset for evaluation and concluded that bagging with J48 classifier performs better.Recurrent Neural Network (RNN) [7] is used for IDS with supervised learning classifier.The RNN-IDS was compared with the classification models such as J48, Random forest and SVM in terms of accuracy.For binary classification, the RNN consist of 80 hidden nodes with the learning rate of 0.1.RNN-IDS obtains 83.28% accuracy for binary classification and 80 hidden nodes with the learning rate of 0.5 and accuracy of 81.29% for multi class classification.Feature selection based on Ant Colony Optimization (ACO) [8] is used for classification of features with accuracy.

    Filter based on feature selection XGBoost [9] is used for detecting network attacks by using machine learning classification techniques with 91% accuracy.Feature selection approach [10]uses correlation techniques as naive bays (NB), Random Forest (RF), J48, and ZeroR.Study of various IDS techniques [11] for identifying attacks using classification algorithms.IDS in the IOT network is very important issue and studiesare conducted [12,13].This paper gives detail review about the existing IoT based on secure communication on IDS.It also discussed about the IoT based on classifications and discussed about the future research challenges.Best feature selection strategy is implemented [14] using genetic algorithm with logistic regression techniques.Swarm intelligent technique for feature extraction [15] uses Pigeon Inspired optimizer with sigmoid function.Feature extraction using Particle Swarm Optimization (PSO), Firefly Optimization (FO),Grey Wolf Optimization (GO) and Genetic Algorithm (GA) [16] are discussed with accuracy rate.Deep learning clustering techniques for IDS system [17,18] uses contextual deep clustering with Euclidean distance based deep analysis.It can find out clusters accurately for IDS.Convolutional neural network model used for detecting the DoS attacks [19] in big networks are discussed for identifying optimal solution.

    3 Proposed Deep Clustering PSO Based IDS Model

    The proposed approach includes three phases such as Preprocessing, Feature selection and Classification.The overview of the approach is shown in Fig.1.Initially the network data set is divided into two datasets-training dataset and testing dataset in the ratio of 6:4.In all classification algorithm approaches, preprocessing plays on vital role on improving the accuracy.From the raw data, the irrelevant and missing data are handled with this preprocessing process.

    Figure 1: Overview of proposed IDS

    In this proposed work, preprocessing stage includes normalization and discretization.The phases are:

    (i) Preprocessing using Binning method to handle the missing values.Binning method is used to handle the missing values for both numerical and categorical data.It is used to enhance the model more robust and prevent from overfitting.

    (ii) Dimensionality reduction using Eigen PCA.This method is used to reduce the n dimension data into m where m<nbased on the non-linear local relationship among the data points.

    (iii) Feature selection using proposed information gain with Dragonfly optimizer (IG-DFO).This method is used to select the reduced number of feature set for further processing.

    (iv) Classification using proposed PSO optimized-Clustering Convolutional neural network(PSO-CCNN).Among the various machine learning and deep learning techniques, CNN proven to be the generative model that contains multiple layers of latent and stochastic variables.These deep clustering and evolutionary algorithms analyzed with the intrusion detection dataset to prove the efficiency of the proposed work in terms of performance measures.

    3.1 Preprocessing Using Binning Normalization

    The raw input data set are complex to process due to noise and missing values.It is also difficult to process the dataset with whole features of numeric and non-numeric data.Hence, the raw input data are to be preprocessed before proceeding for further analysis improvement.Initially,the symbols in the data are replaced with the unique numeric value using the mapping function available in Python library which is mathematically represented using the logarithmic equation [20]of the dataset X which is represented in Eq.(1)

    The data features having missing values may also have some useful information.Avoiding the missing values data may affect the performance of the classification.Those missing values are handled using the binning method.In this method, the data are smoothened and the missing values are handled.The bin have equal width with the range of each bin are defined as Eq.(2)

    where

    In general, the larger the width, the greater the data get smoothened.In this work, the Binning method combined with discretization to transform the data using the dimensionality reduction technique called Eigen-PCA which is described in the Section 3.2.

    3.2 Dimensionality Reduction Using Eigen-PCA

    To make the database as an elegant one for processing, dimensionality reduction is important step to reduce the dimension of the input data into low dimensional space.Here, Eigen-PCA has been used to reduce the dimension of feature space.Principal Component Analysis (PCA) has been used to reduce the high dimensional space of the data into low dimension space of features.PCA is used here for calculationof the eigenvector of covariance matrix.The high dimensional data space is transformed into low dimensional space with the eigenvectors with larger eigenvalues.The Nrepresents the number of features in the data set and the set is represented as [P1,P2,...PN].The feature set is represented in Eq.(4)

    The covariance matrix C is calculated based on Eq.(5)

    The eigenvalues and eigenvectors are calculated based on Eq.(6)

    where V are eigen vectorsλare eigen value associated with matrix C.

    All the input image setsare projected into the eigen-subspace and they are represented by Eq.(7)

    where i=1,2,3,...,N andare projection of p called as the principal components.

    The input dataset is the combination of number of principal components.The final reduced dataset dimension is represented as in Eq.(8)

    Algorithm 1: Preprocessing Using Binning- Eigen PCA Input: Raw dataset X with features (f), n represents number of data Output: Normalized and reduced dataset.Step 1: for i=1 to n // Normalization process Step 2: if (fi==symbol) then Step 3: map the symbols into numeric using Python library Step 4: normalization using Eq.(1)Step 5: Smoothening: Handle missing values using the Binning method as Eq.(2)Step 6: else Step 7: Normalization using Eq.(1)Step 8: Smoothening: Handle missing values using the Binning method as Eq.(2)Step 7: End if Step 8: End for Step 9: Dimensionality reduction using Eigen PCA using Eqs.(4)-(8).

    3.3 Optimized Feature Selection Using Enhanced IG-DFO

    This section will select the optimal features that are relevant to classify the intruders with improvement.The irrelevant features in the dataset will lead to slow the training and testing process for classification.Reducing the irrelevant features will reduce the complexity of the system,speed up the computation process and improve the overall performance of the Intrusion Detection Systems.The information Gain [21] is formed from the information theory [22] is used to find the features that are relevant to the class.The Dataset X is divided into n number of classes and each feature fiwhich have maximum number of non-zero values are selected and the uncertainty of the valueXis also called as entropy based on information theory and it is represented as E(X)which is calculated using Eq.(9),

    where P(x) is probability of x.

    The conditional entropy of two random features X and Y are calculated using Eq.(10)

    The enhanced Information Gain is calculated from Eqs.(9) and (10)

    Hence, the feature Y have the stronger correlation to feature X than other features f, if EIG(X|Y) >EIG(f|Y).Those correlated features are then optimized using Dragonfly Optimizer (DFO) algorithm to select the optimal features set.Among the various meta heuristic algorithms includes Swarm intelligence [23] approaches such as Particle swarm optimization(PSO) [24], Ant colony optimization (ACO) [25], Cat swarm optimization (CSO) [26], Grey wolf optimizer (GWO) [27], Artificial bee colony (ABC) [28], Fitness dependent optimizer (FDO) [29],Donkey and Smuggler Optimization (DSO) [30], Firefly algorithm (FA) [31], Cuckoo search(CS) algorithm [32], Dragonfly optimizer (DFO) [33] is the recent swarm based method that is successfully implemented.

    DFO is mimicking the behavior of the dragonfly for the reason of migration or hunting.The swarming behavior may be static or dynamic.In static swarm, small group of dragonflies are moved to hunt other swarms in small area with the local movement of abrupt changes.In dynamic swarm, larger volume of dragonflies is moved towards in one direction for long distance as a group.The dragonflies behavior of static and dynamic swarm is shown in Fig.2.Artificial dragon flies movement direction is based on five weights such as:

    ? separation weight (s);

    ? alignment weight (a);

    ? cohesion weight (c);

    ? food factor (f);

    ? enemy factor (e);

    ? the inertia weight (w).

    Figure 2: Dragonfly characteristics attraction to food distraction from enemy

    To optimize the process of exploration and exploitation, the five weights have to be tuned.The weight factors such as separation, alignment, cohesion, attraction to food and distraction from enemy of DFO has been mathematically explored and computed.

    ?

    The work process of proposed IIW-DFO has been shown in Fig.3.Until the maximum iterations satisfied the five weight vectors, velocity and position vectors are updated with the improved inertia weight.If the dragonflies have neighbors then the position also are updated.Now the optimized features are given as input to the deep clustering algorithm called PSO optimized clustering convolutional neural network for identification of the intruders.

    3.4 Classification Using Proposed PSO Optimized-Clustering CNN

    Deep clustering adopts deep neural network to learn the clustering method to reduce the loss.To train the neural network, Clustering deep neural network algorithms are used in the clustering loss.The network can be either fully connected network (FCN) or convolutional neural network(CNN) or deep belief network (DBN).The clustering related loss functions are categorized into principal clustering loss and auxiliary clustering loss.The principal clustering loss contains cluster centroid and sample cluster assignment.This includes the losses such as k means loss, cluster assignment hardening loss, agglomerative clustering loss, and nonparametric maximum margin clustering and so on.Auxiliary clustering loss runs the clustering method after the neural network training with deep clustering loss such as locality-preserving loss, group sparsity loss and subspace clustering loss.The deep clustering loss function is formulated as in Eq.(12)

    where Lnis thenetwork loss, Lcis the clustering loss andλ∈[0,1] is the parameter to balance network and clustering loss.The network loss can be used to learn the relevant features to avoid the confused solutions.The clustering loss groups the feature points to form the clusters.In this proposed work, the clustering loss can be used to train the Convolutional neural network.The loss function of deep clustering with CNN is described by Eq.(13)

    Figure 3: Work flow of proposed IG-DFO

    Clustering convolutional neural network of deep clustering is a type of supervised pre-trained network.This uses the CNN framework to learn the clustering and reduce the loss.It picks ‘k’samples initially and extract k features as initial cluster Centroid.

    ?

    The proposed preprocessing, feature selection and classification algorithms are efficient in terms of accuracy and reducing the error.Accuracy of IDS has been obtained with the preprocessing followed by relevant feature selection using information gain based DFO.This meta heuristic algorithm improves the classification accuracy.The proposed deep clustering method with PSO reduces the network loss error.It improves the QoS of the proposed IDS.Hence, the proposed preprocessing, feature selection and classification algorithms are efficient and accurate on predicting the intruders around the network communications.

    4 Results and Discussions

    This section describes about the experimented results and discussions of the proposed feature selection and classification on IDS.This analysis used binary classification on NSL-KDD dataset and it was implemented using Python deep learning library called Keras.

    4.1 Dataset Description

    To analyze the performance of the proposed IIW-DFO with IDBCNN based IDS system, the benchmark network traffic dataset called NSL-KDD is used.It is proven to be the best dataset for testing the IDS [4].There are 41 features that are divided as basic, content based and time based attributes.The NSL-KDD dataset consists of three types of features such as Nominal (3 features), Binary (6 features) and Numeric (32 features).Training set consists of 22 attacks and 16 attacks are considered as testing set.The attacks are categorized as:

    1) Denial of Service attacks (DoS);

    2) Probe Attacks (PA);

    3) Remote to Local attacks (R2L);

    4) User to Root attacks (U2R).

    The IDS attacks with detailed explanation and the training, testing data are shown in Tab.1.with the binary class.

    Table 1: NSL-KDD attacks, training data and testing data

    4.2 Optimized Features Selection Using IG-DFO

    The NSL-KDD dataset consists of 41 features and 1 class label which is represented with example in Tab.2.The proposed optimized feature selection approach called IG-DFO select seven relevant optimal features from this feature set which will improve the classification accuracy.This feature selection approach is compared to other existing feature selection approaches which are represented in Tab.3.And the selected feature names of the proposed approach are represented in Tab.4.

    4.3 Evaluation Using Performance Metrics

    The proposed IGDFO-PSOCCNN-IDS system is compared with the existing approaches to analyze the performance using the performance metrics such as Accuracy (ACC), False positive rate (FPR), False negative rate (FNR), Sensitivity/True positive rate (SN), Specificity/True negative rate (SP) and recall/Attack Detection rate (ADR).The evaluation metrics equations are represented by Eqs.(16)-(18)

    Table 2: NSL-KDD dataset features/attributes

    Table 3: Feature selection of different approaches

    Table 4: Selected feature names by IIW-DFO

    4.4 Performance Evaluation Based on NSL Feature Selection Approaches

    The proposed IDS performance based on the original and selected input features are represented in graph.The original 41 features are normalized using feature selection IGDFO.The selected 7 features are represented.The graph proves the importance of preprocessing method called two step normalization with binning process to avoid the network traffic data.This feature selection process also overcomes the over fitting issue and enhance the overall performance of the IDS to improve the accuracy of classification, decreases the error rate and detection time and also minimize the computational complexity.

    The proposed feature selection performance is compared with the existing FS on IDS such as standard DFO, FMIFS, FLCFS, and SMOTE-ENN [3].The proposed IG-DFO FS obtains higher accuracy with lower complexity analysis than other existing contemporary techniques which indicate that these selected features improves the classification accuracy on protect the computer network from intruders.The graphical illustration from Fig.4 also clearly shows that the increase percentage of accuracy, sensitivity, specificity and attack detection rateare shown in proposed FS approach more than other techniques.

    Figure 4: Performance comparison of existing vs. proposed approaches

    4.5 Performance Evaluation of Proposed IGDFO-PSOCCNN IDS with Existing IDS Systems

    In order to prove the deep neural network based IDS systems, our proposed convolutional deep neural network based on IDS is compared with the existing IDS systems such as DMNB,DBN-SVM, PSOM [1], and SMOTE-ENN [3].The proposed Information Gain Dragonfly optimizer with improved deep clustering convolutional neural network with PSO based on IDS obtains higher accuracy and lowerFPR rate than other existing IDS approaches including our previous work.The proposed system obtains 98.71% of accuracy on detecting the intruders and 0.12 of False Positive Rate.The IGDFO-PSOCCNN IDS obtains this high accuracy due to the optimization process.The graphical representations of these results are shown in Figs.5 and 6 for better understanding.

    Figure 5: Accuracy comparison of various IDS

    Figure 6: FPR comparison of various IDS

    Hence, the various experimented results of IDS process show that our proposed IG-DFOPSOCCNN have higher classification accuracy, minimum error, and reduce the computational complexity.Even though our previous work performs better on detecting the intruders, this work with optimization process also increases the classification accuracy and reduces the loss than our previous work.The clustering based convolutional neural network withPSO can reduce the loss of the network efficiently.Hence, to detect intruders with high accuracy and low error, the preprocessing based IGDFO feature selection with deep clustering method (PSO-CCNN) is better than other existing algorithms in terms efficiency and accurate classification.

    5 Conclusions

    An information gain dragonfly optimizer based feature selection and improved Deep bagging convolutional neural network has been proposed in this paper for IDS.Due to the large number of features and large amount of data in the data set, an improved proposed classification technology based on evolutionary and deep learning algorithms is proposed to improve the classification accuracy and prediction of the intruders in the network.Optimization based feature selection algorithm proves that it is the best for finding the relevant features.Deep clustering based CNN with PSO optimization improves the accuracy and stability of the system.Main advantage of using this technique is, swarm intelligence with evolutionary strategy give accurate optimization result.The proposed system is implemented using NSL KDD dataset.The efficiency of the algorithm is proved with the comparative analysis of existing contemporary algorithms in terms of feature selection and classification.The experimental results show that the proposed evolutionary based deep clustering algorithm outperforms in terms of Accuracy (98.71%) and False Positive Rate (0.12).Deep clustering with PSO optimization can reduce the clustering and network loss.Hence, the proposed IDS system will reduce the generalization error, training time, reduced noise and improve the classification accuracy.In the future, the proposed algorithm will be experimented with small number of datasets.The future aim is also to increase the detection rate of the attacks in the NSL KDD dataset.

    Funding Statement:The third and fourth authors were supported by the Project of Specific Research PrF UHK No.2101/2021 and Long-term development plan of UHK, University of Hradec Králové, Czech Republic.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久精品国产鲁丝片午夜精品| 成人国产av品久久久| 亚洲在久久综合| 亚洲第一区二区三区不卡| 99热国产这里只有精品6| 国产成人免费观看mmmm| 男女啪啪激烈高潮av片| 丰满饥渴人妻一区二区三| 久久韩国三级中文字幕| xxxhd国产人妻xxx| 丰满少妇做爰视频| 国产极品粉嫩免费观看在线| 免费高清在线观看视频在线观看| 99国产综合亚洲精品| 伦理电影大哥的女人| 只有这里有精品99| √禁漫天堂资源中文www| 2021少妇久久久久久久久久久| 久久久久久人妻| 亚洲,欧美精品.| 男的添女的下面高潮视频| 亚洲av福利一区| 热re99久久国产66热| 在线观看www视频免费| 亚洲人成网站在线观看播放| 国产黄频视频在线观看| 精品少妇久久久久久888优播| 黄网站色视频无遮挡免费观看| 成人午夜精彩视频在线观看| 婷婷色麻豆天堂久久| 日本猛色少妇xxxxx猛交久久| 五月天丁香电影| 国产一区有黄有色的免费视频| 国产亚洲av片在线观看秒播厂| 日本猛色少妇xxxxx猛交久久| 少妇人妻久久综合中文| 99热国产这里只有精品6| 精品午夜福利在线看| 亚洲欧美一区二区三区久久| 天天躁狠狠躁夜夜躁狠狠躁| av网站免费在线观看视频| 国产成人精品婷婷| 一二三四在线观看免费中文在| 日本欧美视频一区| 久久久久久久久久久久大奶| 男女高潮啪啪啪动态图| 少妇熟女欧美另类| 亚洲精品美女久久av网站| 欧美日韩视频精品一区| 最近中文字幕高清免费大全6| 热re99久久精品国产66热6| 18+在线观看网站| 美女大奶头黄色视频| 久久精品亚洲av国产电影网| 国产免费福利视频在线观看| 久久久久精品人妻al黑| 久久久久精品人妻al黑| 人人妻人人澡人人爽人人夜夜| 一级片免费观看大全| 亚洲内射少妇av| 国产精品久久久久久精品电影小说| 久久国产精品男人的天堂亚洲| 免费女性裸体啪啪无遮挡网站| 国产精品偷伦视频观看了| 18在线观看网站| 久久午夜福利片| 久久久久网色| 秋霞在线观看毛片| 女人高潮潮喷娇喘18禁视频| 国产精品二区激情视频| 久久久久久久久久久久大奶| 亚洲美女视频黄频| 中文字幕色久视频| 精品午夜福利在线看| 高清不卡的av网站| 丰满饥渴人妻一区二区三| 亚洲精华国产精华液的使用体验| 免费观看av网站的网址| 成人黄色视频免费在线看| 欧美日韩亚洲国产一区二区在线观看 | 亚洲人成网站在线观看播放| 自线自在国产av| 精品亚洲成国产av| av线在线观看网站| 大香蕉久久网| 七月丁香在线播放| 欧美日韩精品网址| 人妻一区二区av| 日本av免费视频播放| 久久久久久久精品精品| 国产日韩欧美亚洲二区| 国产免费福利视频在线观看| 男女国产视频网站| 中文字幕亚洲精品专区| 国产福利在线免费观看视频| 精品第一国产精品| 亚洲精品一区蜜桃| 国产精品 国内视频| 欧美精品av麻豆av| 久久久久久久大尺度免费视频| 免费大片黄手机在线观看| 久久精品久久久久久噜噜老黄| 久久 成人 亚洲| 国产深夜福利视频在线观看| 亚洲精品aⅴ在线观看| 国产片内射在线| 三级国产精品片| 亚洲精品美女久久久久99蜜臀 | 纵有疾风起免费观看全集完整版| 亚洲情色 制服丝袜| 欧美成人精品欧美一级黄| 大香蕉久久网| 在线观看三级黄色| 999精品在线视频| 国产在线视频一区二区| 亚洲成国产人片在线观看| 亚洲综合精品二区| 亚洲国产欧美日韩在线播放| 久久精品熟女亚洲av麻豆精品| 久久久久国产网址| 国产成人精品久久久久久| 欧美日韩亚洲国产一区二区在线观看 | 国产男人的电影天堂91| 国产成人91sexporn| 精品少妇久久久久久888优播| 18禁观看日本| 美女大奶头黄色视频| 在线观看国产h片| 婷婷色av中文字幕| 欧美日韩一区二区视频在线观看视频在线| 成人影院久久| 男人爽女人下面视频在线观看| 激情视频va一区二区三区| 国产亚洲av片在线观看秒播厂| 欧美黄色片欧美黄色片| 国产国语露脸激情在线看| videossex国产| 天天影视国产精品| 91aial.com中文字幕在线观看| 日日摸夜夜添夜夜爱| 精品亚洲乱码少妇综合久久| 男的添女的下面高潮视频| 丰满迷人的少妇在线观看| 久久久久久人人人人人| 亚洲久久久国产精品| 成人手机av| 精品一区二区免费观看| 可以免费在线观看a视频的电影网站 | 水蜜桃什么品种好| 亚洲精品第二区| 日日啪夜夜爽| 在线精品无人区一区二区三| 亚洲美女黄色视频免费看| 国产精品久久久久久av不卡| 巨乳人妻的诱惑在线观看| 永久免费av网站大全| 久久人人爽av亚洲精品天堂| 波多野结衣av一区二区av| 一级片免费观看大全| 亚洲精品久久午夜乱码| 巨乳人妻的诱惑在线观看| 超色免费av| 亚洲婷婷狠狠爱综合网| 成年女人在线观看亚洲视频| 久久精品国产自在天天线| 9191精品国产免费久久| 少妇被粗大的猛进出69影院| 又大又黄又爽视频免费| 久久久久精品性色| 美女高潮到喷水免费观看| av又黄又爽大尺度在线免费看| 国产黄色视频一区二区在线观看| 国产免费现黄频在线看| 熟女少妇亚洲综合色aaa.| 成人二区视频| 国产女主播在线喷水免费视频网站| 青春草亚洲视频在线观看| 久久久久久人人人人人| 边亲边吃奶的免费视频| 在线观看免费高清a一片| 亚洲欧美色中文字幕在线| 一区二区三区精品91| 卡戴珊不雅视频在线播放| 国产色婷婷99| 日韩不卡一区二区三区视频在线| 少妇 在线观看| 岛国毛片在线播放| 男人操女人黄网站| 久久青草综合色| 欧美成人午夜精品| 两个人免费观看高清视频| 国产免费现黄频在线看| 亚洲国产欧美在线一区| 免费黄色在线免费观看| 丝袜美腿诱惑在线| 综合色丁香网| 成年动漫av网址| 欧美日韩视频精品一区| 亚洲欧美精品综合一区二区三区 | 制服人妻中文乱码| 国产一区有黄有色的免费视频| 亚洲人成电影观看| 女性被躁到高潮视频| 99re6热这里在线精品视频| 18禁裸乳无遮挡动漫免费视频| 少妇熟女欧美另类| 国产成人精品久久久久久| 观看美女的网站| videos熟女内射| 亚洲av中文av极速乱| 好男人视频免费观看在线| 精品一品国产午夜福利视频| 一级毛片 在线播放| 亚洲精品成人av观看孕妇| 午夜福利在线免费观看网站| 亚洲情色 制服丝袜| av在线老鸭窝| 少妇被粗大猛烈的视频| 韩国av在线不卡| 99精国产麻豆久久婷婷| 国精品久久久久久国模美| 在线观看免费视频网站a站| 中文字幕人妻熟女乱码| 久久人人爽人人片av| 久久久久久久久久人人人人人人| 亚洲 欧美一区二区三区| 国产日韩欧美在线精品| 亚洲av成人精品一二三区| 欧美日韩av久久| 亚洲国产日韩一区二区| 久久久久人妻精品一区果冻| 日韩视频在线欧美| 国产成人91sexporn| 久久久精品区二区三区| 一级,二级,三级黄色视频| 毛片一级片免费看久久久久| 久久久国产欧美日韩av| 天堂中文最新版在线下载| 成人国产av品久久久| 老鸭窝网址在线观看| 有码 亚洲区| 最近的中文字幕免费完整| 另类亚洲欧美激情| 精品福利永久在线观看| 97在线视频观看| 狠狠精品人妻久久久久久综合| 91午夜精品亚洲一区二区三区| 国产成人a∨麻豆精品| 考比视频在线观看| 国产成人精品婷婷| 波多野结衣av一区二区av| 五月伊人婷婷丁香| 久久久久久免费高清国产稀缺| 亚洲欧美精品自产自拍| 啦啦啦中文免费视频观看日本| 美女午夜性视频免费| 亚洲av成人精品一二三区| 亚洲三区欧美一区| 日韩av不卡免费在线播放| 人妻人人澡人人爽人人| 亚洲av电影在线进入| 亚洲av电影在线观看一区二区三区| 精品亚洲成a人片在线观看| 国产精品偷伦视频观看了| a级毛片黄视频| 人人妻人人澡人人爽人人夜夜| 久久热在线av| 18禁国产床啪视频网站| 亚洲欧洲日产国产| 精品亚洲成a人片在线观看| 哪个播放器可以免费观看大片| 国产片特级美女逼逼视频| 免费高清在线观看日韩| 毛片一级片免费看久久久久| 国产成人精品福利久久| 国产成人av激情在线播放| 久久这里有精品视频免费| 99久久中文字幕三级久久日本| 婷婷色av中文字幕| 街头女战士在线观看网站| 中文乱码字字幕精品一区二区三区| 女人久久www免费人成看片| 国产精品一区二区在线不卡| 成年女人在线观看亚洲视频| 一级片'在线观看视频| 99久久人妻综合| 亚洲精品,欧美精品| 下体分泌物呈黄色| 亚洲精品aⅴ在线观看| av电影中文网址| 日韩熟女老妇一区二区性免费视频| 在线观看国产h片| 成年女人在线观看亚洲视频| 久久久国产一区二区| 精品亚洲成a人片在线观看| 欧美bdsm另类| 另类精品久久| 国产精品av久久久久免费| 最新的欧美精品一区二区| 亚洲av电影在线进入| 亚洲美女视频黄频| 在线观看免费高清a一片| 日韩一区二区视频免费看| 最近最新中文字幕大全免费视频 | 毛片一级片免费看久久久久| 亚洲国产毛片av蜜桃av| 欧美精品一区二区大全| 综合色丁香网| 日日啪夜夜爽| 永久免费av网站大全| 2018国产大陆天天弄谢| 国产精品免费视频内射| 国产成人精品福利久久| 亚洲精品乱久久久久久| 欧美精品亚洲一区二区| 日本黄色日本黄色录像| 国产97色在线日韩免费| 亚洲五月色婷婷综合| 黄色一级大片看看| 欧美少妇被猛烈插入视频| 国产精品熟女久久久久浪| 天天影视国产精品| 亚洲av国产av综合av卡| 一二三四中文在线观看免费高清| 飞空精品影院首页| 国产av码专区亚洲av| 国产精品 欧美亚洲| 精品国产超薄肉色丝袜足j| 人人妻人人澡人人爽人人夜夜| 免费av中文字幕在线| 免费黄网站久久成人精品| 亚洲精品视频女| 久久韩国三级中文字幕| 美女午夜性视频免费| 观看av在线不卡| 日本欧美国产在线视频| 久久精品国产亚洲av涩爱| 少妇人妻久久综合中文| av女优亚洲男人天堂| 亚洲,欧美,日韩| 一级毛片 在线播放| 亚洲欧美精品综合一区二区三区 | 久久99精品国语久久久| 啦啦啦视频在线资源免费观看| 国产色婷婷99| 五月伊人婷婷丁香| 欧美国产精品va在线观看不卡| 久久久a久久爽久久v久久| 亚洲成人av在线免费| 一本—道久久a久久精品蜜桃钙片| 人妻少妇偷人精品九色| 欧美在线黄色| 亚洲av日韩在线播放| 亚洲国产欧美在线一区| 一本久久精品| 两个人免费观看高清视频| 欧美精品人与动牲交sv欧美| av网站在线播放免费| 国产精品久久久久成人av| 日韩制服丝袜自拍偷拍| 黄色一级大片看看| 亚洲色图 男人天堂 中文字幕| 久久午夜综合久久蜜桃| 久久人人爽人人片av| 国产成人午夜福利电影在线观看| a级毛片在线看网站| 亚洲精品国产一区二区精华液| 国产精品熟女久久久久浪| 一个人免费看片子| 国产精品av久久久久免费| 色婷婷av一区二区三区视频| 丝袜美足系列| 亚洲图色成人| 国产男女超爽视频在线观看| 亚洲国产av影院在线观看| 中文字幕精品免费在线观看视频| 国产日韩欧美在线精品| 国产免费福利视频在线观看| 国产精品亚洲av一区麻豆 | 国产亚洲欧美精品永久| 国产精品久久久久成人av| 天天躁狠狠躁夜夜躁狠狠躁| 最近中文字幕2019免费版| 亚洲综合色惰| 精品久久久精品久久久| 少妇精品久久久久久久| 男女免费视频国产| 18禁裸乳无遮挡动漫免费视频| 亚洲综合精品二区| 国产亚洲av片在线观看秒播厂| 精品国产乱码久久久久久男人| 亚洲一级一片aⅴ在线观看| 亚洲欧美清纯卡通| 亚洲国产毛片av蜜桃av| 大话2 男鬼变身卡| 日本猛色少妇xxxxx猛交久久| 午夜激情av网站| 久久久国产精品麻豆| 在线观看国产h片| 天天影视国产精品| 最黄视频免费看| 黄色视频在线播放观看不卡| 波野结衣二区三区在线| 国产男人的电影天堂91| 亚洲精品在线美女| 欧美最新免费一区二区三区| 欧美日韩亚洲国产一区二区在线观看 | 亚洲精品视频女| 一二三四中文在线观看免费高清| 日本91视频免费播放| 国产黄色免费在线视频| 精品卡一卡二卡四卡免费| 热99久久久久精品小说推荐| 日韩大片免费观看网站| av女优亚洲男人天堂| 国产成人精品福利久久| 精品一区二区免费观看| 我要看黄色一级片免费的| 精品人妻在线不人妻| 国产黄频视频在线观看| 校园人妻丝袜中文字幕| 18禁观看日本| 精品国产露脸久久av麻豆| 亚洲欧洲日产国产| 一区二区三区激情视频| 免费在线观看完整版高清| 亚洲色图 男人天堂 中文字幕| 美女福利国产在线| 极品少妇高潮喷水抽搐| 久久99一区二区三区| 国产精品 欧美亚洲| 久久精品国产a三级三级三级| 汤姆久久久久久久影院中文字幕| 久久韩国三级中文字幕| 欧美av亚洲av综合av国产av | 久久精品久久久久久久性| 在线精品无人区一区二区三| 搡女人真爽免费视频火全软件| 一级毛片我不卡| 免费在线观看完整版高清| 久久精品国产自在天天线| av国产久精品久网站免费入址| 国产免费又黄又爽又色| 十八禁网站网址无遮挡| 美女国产视频在线观看| 亚洲国产欧美日韩在线播放| 欧美亚洲 丝袜 人妻 在线| 天天躁日日躁夜夜躁夜夜| 日本黄色日本黄色录像| 国产精品 欧美亚洲| 日韩制服丝袜自拍偷拍| 男女啪啪激烈高潮av片| 9191精品国产免费久久| 久久久久久久亚洲中文字幕| 91国产中文字幕| 精品少妇内射三级| 两个人免费观看高清视频| 观看av在线不卡| 亚洲国产色片| 精品人妻熟女毛片av久久网站| 精品久久蜜臀av无| 亚洲精品成人av观看孕妇| 90打野战视频偷拍视频| 美女xxoo啪啪120秒动态图| 巨乳人妻的诱惑在线观看| 中文字幕人妻熟女乱码| 韩国高清视频一区二区三区| 亚洲人成电影观看| 日本欧美国产在线视频| 色网站视频免费| 久久久久久久精品精品| 久久av网站| √禁漫天堂资源中文www| 免费黄频网站在线观看国产| 久久精品久久久久久噜噜老黄| 最近的中文字幕免费完整| 色网站视频免费| 亚洲婷婷狠狠爱综合网| 中文字幕人妻丝袜一区二区 | 菩萨蛮人人尽说江南好唐韦庄| 久久久久精品性色| 人人妻人人澡人人爽人人夜夜| 久久精品久久精品一区二区三区| 欧美av亚洲av综合av国产av | 国产精品成人在线| 亚洲欧美清纯卡通| 性高湖久久久久久久久免费观看| 国产人伦9x9x在线观看 | xxx大片免费视频| 黑人巨大精品欧美一区二区蜜桃| 成人黄色视频免费在线看| 国产精品一二三区在线看| 亚洲av日韩在线播放| 日日爽夜夜爽网站| 一区福利在线观看| 美女主播在线视频| 水蜜桃什么品种好| 成年美女黄网站色视频大全免费| 免费观看性生交大片5| 人妻 亚洲 视频| 一本—道久久a久久精品蜜桃钙片| 久久久久久久国产电影| 国产精品无大码| 欧美成人午夜精品| 老鸭窝网址在线观看| 美女国产高潮福利片在线看| 丝袜美腿诱惑在线| 毛片一级片免费看久久久久| 国产在线视频一区二区| 国产一区二区 视频在线| 日本91视频免费播放| 国产欧美日韩综合在线一区二区| 国产乱来视频区| 亚洲一码二码三码区别大吗| 在线观看免费高清a一片| 18禁国产床啪视频网站| 一边亲一边摸免费视频| 男女午夜视频在线观看| 国产极品粉嫩免费观看在线| 欧美亚洲日本最大视频资源| 国产精品国产三级专区第一集| 在线 av 中文字幕| 成人亚洲精品一区在线观看| 制服人妻中文乱码| 亚洲人成网站在线观看播放| 亚洲综合色网址| 精品亚洲成a人片在线观看| 99香蕉大伊视频| 老汉色∧v一级毛片| 成人黄色视频免费在线看| 飞空精品影院首页| 国产精品一国产av| 九色亚洲精品在线播放| 国产福利在线免费观看视频| 在现免费观看毛片| 免费观看在线日韩| 亚洲欧美清纯卡通| 肉色欧美久久久久久久蜜桃| 王馨瑶露胸无遮挡在线观看| 午夜免费男女啪啪视频观看| 久久久久国产一级毛片高清牌| 男人舔女人的私密视频| 如日韩欧美国产精品一区二区三区| 一边摸一边做爽爽视频免费| 亚洲激情五月婷婷啪啪| 超碰97精品在线观看| av福利片在线| 女人高潮潮喷娇喘18禁视频| 可以免费在线观看a视频的电影网站 | 伦理电影免费视频| 欧美黄色片欧美黄色片| 制服人妻中文乱码| 老汉色av国产亚洲站长工具| 国产精品一区二区在线不卡| 丝袜美足系列| 欧美日本中文国产一区发布| 一区二区三区乱码不卡18| 伊人亚洲综合成人网| 麻豆乱淫一区二区| 婷婷色综合大香蕉| 女人高潮潮喷娇喘18禁视频| 亚洲内射少妇av| 欧美老熟妇乱子伦牲交| 久久精品久久精品一区二区三区| 国产熟女欧美一区二区| 久久久久网色| 人成视频在线观看免费观看| 97精品久久久久久久久久精品| 亚洲精品,欧美精品| 丝瓜视频免费看黄片| 亚洲国产欧美在线一区| 亚洲国产精品999| 毛片一级片免费看久久久久| 永久免费av网站大全| 亚洲av综合色区一区| 日韩不卡一区二区三区视频在线| 免费少妇av软件| 久久热在线av| 夫妻性生交免费视频一级片| 欧美日韩av久久| av免费观看日本| 国产亚洲av片在线观看秒播厂| 国产精品欧美亚洲77777| 精品人妻熟女毛片av久久网站| 精品国产国语对白av| 亚洲一码二码三码区别大吗| 下体分泌物呈黄色| av在线观看视频网站免费| 欧美成人精品欧美一级黄| 国产成人精品在线电影| av免费在线看不卡| av不卡在线播放| 国产日韩欧美视频二区| 2022亚洲国产成人精品| 青春草国产在线视频| 一区二区三区精品91| 蜜桃国产av成人99| 精品国产一区二区久久| av在线app专区| 一边亲一边摸免费视频| 考比视频在线观看| 最近中文字幕高清免费大全6| 国产高清不卡午夜福利| 下体分泌物呈黄色| 观看av在线不卡| 巨乳人妻的诱惑在线观看| 亚洲情色 制服丝袜| 女人久久www免费人成看片| 国产在视频线精品| 人成视频在线观看免费观看| 蜜桃国产av成人99| 日本vs欧美在线观看视频| 天天影视国产精品| 91久久精品国产一区二区三区| 久久久久国产网址|