• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Anomaly Detection for Internet of Things Cyberattacks

    2022-08-24 12:57:32ManalAlanaziandAhamedAljuhani
    Computers Materials&Continua 2022年7期

    Manal Alanaziand Ahamed Aljuhani

    College of Computing and Information Technology, University of Tabuk, Tabuk, 71491, Saudi Arabia

    Abstract: The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives.The IoT revolution has redefined digital services in different domains by improving efficiency, productivity, and cost-effectiveness.Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’operation; however, IoT security issues remain a significant challenge.To minimize the risk of cyberattacks on IoT networks, anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks.Although various detection techniques have been proposed in the literature, existing detection methods address limited cyberattacks and utilize outdated datasets for evaluations.In this paper, we propose an intelligent, effective, and lightweight detection approach to detect several IoT attacks.Our proposed model includes a collaborative feature selection method that selects the best distinctive features and eliminates unnecessary features to build an effective and efficient detection model.In the detection phase, we also proposed an ensemble of learning techniques to improve classification for predicting several different types of IoT attacks.The experimental results show that our proposed method can effectively and efficiently predict several IoT attacks with a higher accuracy rate of 99.984%, a precision rate of 99.982%, a recall rate of 99.984%, and an F1-score of 99.983%.

    Keywords: Anomaly detection; anomaly-based IDS; cybersecurity; feature selection; Internet of Things (IoT); intrusion detection

    1 Introduction

    The Internet of Things (IoT) is now widely used and has been integrated into a wide range of critical domains, including healthcare, transportation systems, energy, and manufacturing.This technology enables multiple connected devices to communicate and exchange data with minimal or no human interaction, offering many great advantages for both service providers and end users.IoT applications have transformed buildings, vehicles, health-care systems, and even entire cities into smart objects.With increasing demand for such a technology, the number of IoT devices is expected to reach 83 billion by 2024 [1].

    As heterogeneous data structures and protocols are inherent in IoT networks, security and privacy issues have emerged.Consequently, IoT networks remain susceptible to several cyberattacks that affect both service providers and end users.A well-known security issue that threatens web service availability is Distributed Denial of Service (DDoS) attacks.Such an attack benefits from a large group of compromised devices generating massive traffic toward the target, rendering the service unresponsive or unavailable to legitimate users.Even worse is when the attack employs a botnet,which enables the attacker to remotely control a large group of infected devices and launch IoT-based botnet DDoS attacks, consuming available resources and causing tremendous damage to the target in a short time [2].Another common IoT security risk is a man-in-the-middle attack, in which an attacker intercepts the network communication between IoT nodes and masquerades as an authentic device to eavesdrop and compromise their communication [3].Hide and seek (HNS) is another IoT threat in which a malware employs a botnet to quietly compromise thousands of devices using advanced communication techniques [4].These devices are added to the malware network to perform malicious activities.

    Cybersecurity threats continue to pose a significant challenge to IoT networks, raising the demand for securing them.Mirai botnet is a common IoT attack that causes significant damage.The IoTbased botnet Mirai exploits IoT vulnerabilities and employs millions of infected IoT devices for remote control and instruction by an attacker to behave as a group of malicious botnets to launch a destructive DDoS attack [5].The Mirai attack renders various service providers unavailable as they encounter massive malicious traffic capable of disabling web services.In 2018, attackers targeted a Saudi petrochemical plant to remotely access the workstation by installing malicious malware to destroy data and shut down plant infrastructure [6].Researchers found in 2019 that two million smart home devices, including security cameras, baby monitors, and smart doorbells might be used to track and eavesdrop onowners’devices.Theattack exploits vulnerabilities in Peer-to-Peer (P2P)technology,allowing access without manual configuration [7].Another sophisticated botnet-based IoT attack is Dark Nexus, more than 40 versions of which have been developed in a short time (three months) and affect a wide range of IoT devices [8].Regrettably, IoT devices in the health-care sector are vulnerable to and exploited by attackers.IoT devices can be deployed to monitor, manage, and alert health-care workers about patient status, including infusion pumps, insulin pumps, and thermometer sensors;attacks such as ransomware [9] and DDoS have had a major impact on smart healthcare devices [10].

    An anomaly detection system has been implemented and integrated with IoT systems as an essential component for securing IoT networks from several cybersecurity threats [11-13].The Intrusion Detection System (IDS) has grown in popularity as an effective protection for network services.IDS can be utilized in two forms, signature-based and anomaly-based [14].Signaturebased IDS (also known as rule-based IDS) detects attacks by searching for certain patterns to identify an attack’s signature and report matched existing threats [15].However, signature-based IDS has a number of limitations [14]: it detects only known attacks and fails to identify new or previously unknown threats such as zero-day attacks.As the number of newly discovered attacks has increased, the number of signatures to match and identify attacks has also increased.Consequently,the detection system’s computation cost increases, affecting overall performance and causing a critical issue for real-time attack detection.Another issue with signature-based IDS is the need for human involvement in reviewing, analyzing, and developing signature rules for new attacks, which consumes time and effort and results in cost increases.Anomaly detection-based techniques can address all the limitations listed above and identify both known and unknown attacks [16].In other words, the system builds normal user behavior from a sequence of incoming normal events; trained parameters identify suspicious activities and consider them anomalies if they differ from the trained normal user model.Although anomaly-based IDS approaches overcome numerous limitations in signature-based techniques, reducing false positive rates could be a challenge [17].Many traditional solutions for anomaly-based IDS are designed for dedicated hardware or traditional networking models; less effort has been put into developing anomaly-based IDS for IoT networks [18].The largest obstacle is that,owing to the nature of IoT environments that have limited computational resources, it is crucial to deploy an IDS on such an environment, raising the demand to design and develop a cost-effective anomaly-based IDS for IoT applications.The deployment of a lightweight IDS close to IoT devices will ensure an effective security protection to detect anomalies as near as possible to the IoT data source.Another issue is that many anomaly-based IDSs have been developed based on different techniques, such as statistical methods and rule-based models; these models often suffer from a high false positive rate [19].Although some traditional anomaly detection methods provide promising results, these approaches rely on a single model, which may affect the prediction decision.

    IIn this paper, an intelligent, lightweight, effective anomaly detection approach is proposed to overcome a diverse range of IoT cyberattacks.As traffic flow features play a vital role in detecting attack behavior, we propose a collaborative feature selection method for selecting the most valuable features that can effectively and efficiently detect attacks with higher accuracy and reduce false positives.Because a robust detection approach requires detecting attacks rapidly to avoid further damage to the target, our feature selection approach uses a set of algorithms to choose the best representation from a given traffic flow with the goal of removing unnecessary features and improving detection time.We also propose an ensemble learning method that employs multiple learning techniques that collaborate in detecting several different cyberattacks with improved predictive performance.Additionally, we validate our approach by applying the proposed model with the modern IoT dataset Aposemat IoT-23, whose modern attack features include sophisticated attacks such as IoT-based botnet attacks.The main contributions of this paper can be summarized as follows:

    ■We propose an intelligent, lightweight, and effective anomaly detection approach to detect a diverse range of modern cyberattacks in IoT networks.

    ■We develop a collaborative feature selection method that uses a group of machine learning models to produce an optimal representation set of data features to effectively and efficiently help the anomaly detection model predict IoT attacks.

    ■To improve detection performance, we employ an ensemble learning model, which combines several learning techniques to produce the best prediction decision.

    ■We model, validate, and analyze our anomaly detection approach with both large- and smallscale data to show the effectiveness of the proposed method, which can accurately and quickly identify abnormal data when the dataset is relatively small.

    ■We analyze, evaluate, and compare our proposed method with other machine-learning techniques and existing works to demonstrate the robustness and effectiveness of our proposed method.

    2 Related Works

    A number of related works for anomaly detection-based IDS in the IoT network have been proposed.Soe et al.[20] suggested a sequential attack detection approach for IoT environment that utilizes machine learning techniques.The proposed detection method is validated based on the NBaIoT dataset which contains both normal and IoT attack traffic.The experiment result showed that the proposed method can detect attacks with higher accuracy result.Injadat et al.[21] proposed a detection mechanism by using a hybrid technique based on machine learning for attack classification.The detection approach utilized the bayesian Optimization Gaussian Process (BO-GP) model and Decision Tree (DT) model.The evaluation results showed the efficacy of the proposed mechanism;however, the result was performed on a small scale of normal data instances.Authors stated that in the future work they will use more normal data samples to ensure more normal trained behavior in such a complete dataset.Patel et al.[22] proposed a hybrid anomaly detection approach to identify anomalies in the network.Authors used entropy method to calculate traffic feature; and the entropy values were used then in a One Class Support Vector Machine (OCSVM) to classify anomalies.The evaluation results showed the efficacy of the proposed approach.However, the performance results have been performed on a synthetic dataset and limited to certain types of cyberattacks.Wang et al.[23] proposed a host-based detection method for predicting cyberattacks in IoT environment.Authors used a machine learning method named the Extreme Gradient Boosting(XGBoost)and Long Short-Term Memory (LSTM) as a deep learning model for anomalies detection.The performance metrics demonstrated that the proposed anomaly detection mechanism achieved good performance results.However, authors examined their approach on customized dataset, in which a part of the data was constructed by authors.In addition, the used dataset was limited to certain types of IoT attacks; and not including sophisticated attacks such as IoT based botnet attacks.Alrashdi et al.[24]proposed an anomaly detection approach (AD-IoT) to overcome cybersecurity attacks in a smart city.The detection method utilized a machine learning technique based on random forest algorithm.The evaluation results demonstrated that the proposed approach can effectively detect several IoT cybersecurity threats in a smart city.However, the training model was performed on UNSW-NB15 dataset which was available in 2015.Abbasi et al.[25] proposed an anomaly detection to detect several attacks in IoT networks.The proposed metho utilizes two machine learning techniques:logistic regression and Artificial Neural Network (ANN).Authors used logistic regression model for feature extraction, and ANN for attack classification.The performance results exhibit higher accuracy, precision, recall, and F1-score rate.However, authors have not provided the prediction time for the proposed method which is an essential part to evaluate the proposed model.Ullah et al.[26]proposed an anomaly-based IDS in IoT environments which utilizes a deep neural network model named a Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) for classifications.Authors used Recursive Features Elimination (RFE) technique to select the best 48 features from 80 data features.The proposed approach obtained higher performance results compared to other used techniques in the paper.However, authors have not provided the training and prediction time for the proposed model.Sahu et al.[27] proposed a detection approach in the IoT environment using hybrid deep learning model.Authors used CNN to extract data features for traffic classification.In the detection phase, the proposed model used LSTM technique to predict and classify attack traffic.The evaluation results show that the proposed model achieved 96% as an accuracy rate in detecting IoT attacks.However, LSTM model is considered to be slow in attack detection due to sequential computation such a model utilized in several layers.Dutta et al.[28] proposed a hybrid detection model for network intrusion detection system.The proposed work utilized a Classical Auto Encoder (CAE)technique along with a Deep Neural Network (DNN) model.The CAE model employed as feature engineering to select most relevant features for traffic classification.The DNN used the produced features from CAEfor anomaly detection.The performance results illustrated that the proposed model achieved good performance results comparing to other models.Xu et al.[29] proposed a hybrid deep learning mode using CNN with ConvLSTM to distinguish between authentic and fake biometrics in IoT platforms.The evaluation results of the proposed method achieved higher performance results in terms of accuracy, sensitivity, specificity, and the F1 score.A number of limitations have been identified in the literature.For example, using synthetic datasets rather than real-time IoT traffic may have an impact on detection performance.Another issue is the lack of publicly available real datasets for researchers to validate their approaches due to privacy concerns.Some proposed work provides promises performance results, but their approaches performed on outdated dataset which is limited to specific types of attacks and not including sophisticated cyberattacks such as botnet.Another issue is that some proposed techniques in the literature have a relatively high false alarm rate; they rely on a single method, which may have an impact on detection effectiveness.

    3 Proposed Method

    Fig.1 illustrates the proposed anomaly detection framework for IoT, which comprises three phases: the preprocessing phase, the feature selection phase, and the classification phase.In this subsection we illustrate the three phases of the anomaly detection framework.

    Figure 1: The proposed anomaly detection framework for IoT

    3.1 Preprocessing Phase

    The cleaning and data standardization stages are the most significant parts of the preprocessing phase.Data cleaning is important; it guarantees that the data used to generate the models are of higher.As part of the data cleaning process, duplicates were removed, missing data were replaced,structural errors were fixed, and unnecessary (possibly noisy) observations were removed.After the data have been cleaned, they will be standardized by using the following expression:

    wherexrepresents the data value,μ represents the data mean, and σ represents the data variance.

    3.2 Feature Selection Phase

    The data feature is the most critical step in identifying and detecting anomalies.To build an effective, efficient, lightweight detection model, it is necessary to choose the most distinctive features.The best selected representation of features leads to build a useful predictive model.The goals of the selected features are to reduce overfitting data, improve detection accuracy, and minimize detection time, as such a robust prediction model should rapidly detect attacks before they further damage the system.In addition, IoT devices have limited computational resources, which requires a lightweight anomaly detection technique.Therefore, we employ a collaborative machine learning model to select the most relevant features for our detection techniques.Our approach utilizes a group of machine learning models that cooperate in selecting the best distinctive features and eliminating the useless ones to predict attacks effectively and efficiently with higher accuracy and lower detection time.We utilize four machine learning techniques:Decision Trees(DT),Extra Trees(ET),Random Forest(RF),and XGBoost (XGB).Each feature selection method nominates best features independently based on their detection performance; features that achieve high scores are added to the optimal feature set,which is then utilized in the detection stage.

    3.2.1 Decision Trees

    A DT is a tree structure that looks like a flowchart, with an internal node representing a feature(or attribute), a branch representing a decision rule, and each leaf node reflecting the outcome.In a decision tree, the root node is the uppermost node and learns to divide based on an attribute’s value.Recursive partitioning is amethod of recursively splitting a tree.This flowchart-like form, which closely reflects the human thought process, aids in decision-making.DT takes less time than the other techniques to train data, and the number of records and characteristics in the provided data determine the temporal complexity of the decision trees.DT is a non-parametric or distribution-free approach that does not rely on probability distribution assumptions.The following is the core principle behind every decision tree algorithm:

    ■To separate the records, choose the best attribute using Attribute Selection Measures (ASMs).

    ■Break the dataset into smaller subgroups by making that attribute a decision node.

    ■Start tree construction by recursively repeating this method for each child until one of the following three conditions matches:

    o The tuples are all associated with the same attribute value.

    o There are no more characteristics available.

    o There are no more examples.

    Attribute selection measures are heuristics for determining the optimum splitting criterion for partitioning data.Because they assist us in determining breakpoints for tuples on a particular node,they are also known as splitting rules.By describing the provided dataset, an ASM assigns a score to each feature (or attribute).As a dividing attribute, the best scoring attribute will be chosen (Source).Split points for branches must also be defined in the case of a continuous-valued property.

    The Gini technique is used to produce split points in the decision tree algorithm [30].

    The chance that a tuple inDbelongs to classCiis given byPi.For each attribute, the Gini Index analyzes a binary split.You may compute a weighted sum of each partition’s impurity.If dataDare partitioned intoD1andD2as a result of a binary split on attributeA, the Gini index ofDis [30]:

    When a discrete-valued property is chosen, the subset that yields the lowest Gini index is picked as a splitting attribute.When dealing with continuous-valued characteristics, the method is to choose each pair of nearby values as a candidate splitting-point, with the point with the smallest Gini index chosen as the splitting point.

    The attribute with the lowest Gini index is picked as the dividing attribute [30].

    3.2.2 Extra Trees

    Extremely randomized trees (ET) is a type of learning method that generates a classification result by aggregating the results of many decorrelated decision trees gathered in a“forest,”except for how the decision trees in the forest are built.In the ET decision, the original training sample is used to build all the trees.The tree is then given a random sample ofkfeatures from the feature set at each test node, from which it must select the best feature to divide the data according to a mathematical criterion (typically the Gini index) [31].This random sample of attributes is used to build several decorrelated decision trees.As the forest is constructed, the computed normalized reduction will be used in the feature decision (Gini index is utilized in constructing the forest) is computed for each feature to perform feature selection utilizing the above forest structure.The feature’s Gini importance is the name given to this value [31].To conduct feature selection, each feature is ranked in descending order by Gini importance, and the user selects the topkfeatures depending on their preferences [31]:

    whereCis the total classes andPiis the probability that an element will be classified as belonging to a specific class.

    ■Larger partitions are preferred.

    ■The percentage of classes is squared.

    ■If the element is perfectly categorized, the Gini index would be 0.

    ■1 - (1/# Classes) would be evenly distributed.

    ■You are looking for a variable split with a low Gini index.

    ■1 - (P(class1)2 +P(class2)2 +...+P(classN)2) is the algorithm.

    3.2.3 Random Forest

    The RF model generates a collection of decision trees from a random sample of the training data [32].It is made up of a collection of DT created from a randomly chosen training set, which then collects votes from numerous decision trees to arrive at the final prediction.To assess feature importance, the decrease in node impurity is weighted by the chance of achieving that node.The node probability is calculated by dividing the number of samples that arrive at the node by the total number of samples.The greater the score, the more important the trait [32].For estimating the significance of each node in a decision tree utilizing Gini importance [33], under the assumption that there are only two child nodes (binary tree),

    ■nijnodej’simportance

    ■wjnumber of samples reaching nodej,weighted

    ■Cjnodej’simpurity value

    ■left(j)child node from nodej’sleft split

    ■right(j)child node from nodej’sright split

    3.2.4 XGBoost

    The XGBoost provides a split-finding method for optimizing trees, as well as built-in regularization to prevent overfitting.In general, XGBoost is a faster and more accurate form of gradient boosting.The basic assumption of the XGBoost technique is to train an ensemble (group) tree model progressively with a penalty parameter.

    3.2.5 Proposed Feature Selection Method

    Given a classification task and a set of training examples (xi,yi) in whichxi∈Rnis the input example andyi∈{-1, 1} is the corresponding class and1≤i≤n, our main task is to choose a set of featuresfk, such thatk≤n, based on finding a classifier with a decision functionf(X,θ) such that the labeling class vectorYis a functionY=f(X,θ) and θ is a set of parameters that are determined according to some classifier∈{DT,ET,RF,XGB}.To determine local importance of a variable for a feature, the parameters are of the utilized classifier is estimated and the overall importance for a feature is applied.In the feature selection phase, a set of machine learning techniques are utilized in order to identify the best features from the given dataset.In this stage, we have proposed a new way to select the most important features which contain the important information that can be used to construct the anomaly detection model.We applied each machine learning techniques (DT, ET, RF,XGB),and then we select the features with the best triple performances(Ac,Pr,Fs)using the following equation.

    where

    ■Nnumber of classifiers

    ■Acaccuracy value

    ■Prdenote for precision value

    ■Fsindicate the F1-score

    ■C(i)set of utilized classifiers

    Applying the proposed criterion, we guaranty that the best features will be selected, and the dimension of the input data will be reduced; indeed, the proposed criterion is used as dimension reduction technique.Following that, the selected features will be entered to the ensemble learning model to determine whether a given flow of traffic is normal or indicates an attack.

    Here is the complete algorithm:

    Input:

    a dataset (X,Y) in which the matrixXn x mis the input and the vectorYis the output; and in each training example (xi,yi),xi∈Rnandyi∈{-1, 1}

    Cis the set of the employed classifier,C∈{DT,ET,RF,XGB}

    Output:

    A set of features F = {f1,f2, ...,fk}, k=1...n

    For each of classifierC, apply its learning algorithm to estimate the parameter θ:

    Choose the best important featuresFc= {f1c,f2c, ...,frc|1≤r≤n} such that redundant or non-informative predictors are eliminated and according to the Eq.(7).

    Applying Eq.(7) for the given set of features will result in the addition of chosen features to the output poolFcto help the detection model effectively predict IoT traffic.

    3.3 Classification Phase

    In the classification phase, we apply ensemble techniques to determine whether a given flow of traffic is normal or indicates an attack.Ensemble learning involves a collection of models cooperating to solve a shared issue.Rather than relying on a single model for the optimal decision, ensemble learning utilizes multiple diverse techniques to compensate for each model’s particular flaws.The resultant collection should be less prone to errors than a single model.Compared with a single decision tree classifier, ensemble techniques aggregate many decision tree classifiers to provide higher prediction performance.The ensemble model’s basic premise is that a number of weak learners join forces to produce a strong learner, enhancing the model’s performance results.In general, decision trees are employed with ensemble learning because they are a dependable technique for achieving regularization.As the number of levels in a decision tree grows, the model becomes more susceptible to high variance and may overfit (resulting in high error on test data).To perform regularization and avoid overfitting, we employ ensemble methods with broad principles (rather than very specialized rules).The aggregate of several versions of a projected model is known as bagging (a method of parallel ensemble), also known as bootstrap aggregating.Each model is trained separately before it is merged through an averaging procedure.The goal of bagging is to achieve less variance than that of any particular model.Parallel techniques suit the different considered learners separately from one another, allowing them to be trained at the same time.Bagging seeks to create an ensemble method which is more resilient than the individual models it comprises.Bagging is a basic concept: we wish to fit multiple separate models, then“average”their predictions to get a model with reduced variance.In practice, however, we cannot fit entirely independent models, which would require far too much data.To fit models which are nearly independent, we rely on the good“approximate features”of bootstrap collections (representatively and independence).

    To begin, we construct several bootstrap samples, each of which acts as a separate (nearly)independent dataset derived from the real distribution.Then, for each sample, we may train a weak learner and aggregate the samples, then“average”their outputs and produce an ensemble model with less variance than its elements.The learned base models are quasi-independent and identically distributed (i.i.d.), as are the bootstrap samples.Then,“averaging”weak learners’outputs does not improve the anticipated response, however, it does minimize the variance (averaging i.i.d.random variables preserves predictable value but reduces variance).

    Assume that we haveLbootstrap samples of sizeB(approximations ofLindependent datasets).

    We can nearly fit L as a self-contained weak learner:

    Then, we can combine them in an averaging procedure to obtain an ensemble model with less variance.We may, for example, define our strong model in such a way that

    There are some options for aggregating the numerous models that were fitted in simultaneously.The classification method was used in this study.In a classification scenario, each model’s output class may be viewed as a vote, with the ensemble model returning the class with the most votes to produce the prediction result.Fig.2 depicts the architecture of the proposed detection model.

    Figure 2: The architecture of the proposed ensemble learning model

    4 Experimental Results and Discussion

    This section aims to evaluate our proposed approach by performing the experimental results on a real-time dataset as a benchmark.We validated our anomaly detection model with both largeand small-scale data and obtained the performance results.As an important part in evaluating the proposed model, we have obtained the performance results by measuring different important metrics as follows:

    Accuracy is computed by dividing the number of accurately estimated values by the total number of all values.The accuracy metric equation is shown in Eq.(11).

    Precision, also known as Positive Predictive Value (PPV), determines how accurate the model is at recognizing events as positive.The precision metric equation is provided below.

    Recall, also known as sensitivity, measures the number of corrected positive instances divided by the number of all positive instances.The recall equation is shown below:

    Negative Predictive Value (NPV) means that when the test is negative, there is a good chance of no abnormality being present.The NPV metric equation is shown in Eq.(14).

    The Matthews Correlation Coefficient(MCC)is a metric for assessing the quality of classification by taking into account TP, FN, TN, and FP.The MCC metric appears below.

    The F1-score measures a classifier performance.It is a function calculated from precision and recall of the tested model.The equation for the F1-score metric is shown in Eq.(16).

    4.1 Dataset

    Choosing a suitable dataset containing real-time IoT traffic from various devices is an important step in validating our anomaly detection approach.Furthermore, a wide range of IoT attacks, both rudimentary and advanced attacks, should be considered when validating such a detection approach.We use the Aposemat IoT-23 dataset, a publicly available dataset published in January 2020 [34].The dataset includes 23 various IoT network traffic scenarios, of which three captured scenarios belong to benign IoT devices and twenty malware captured scenarios have been executed in IoT devices.The dataset provides massive real IoT traffic that is labeled either benign or malicious.The 23 malicious scenarios were each executed with a different type of malware, including more advanced and sophisticated attacks.Tab.1 provides additional information about the Aposemat IoT-23 dataset.

    Table 1: Description of features including in the Iot-23 dataset

    Table 1: Continued

    4.2 Experiment Result Analysis

    Two experiments have been performed on the IoT-23 dataset.The first experiment was carried out on a total of 266,910 data, which were divided into 75% for training and 25% for testing.In the second experiment, the data were split into 10% for training and 90% for validation to determine whether the proposed detection method can accurately and quickly identify abnormal data when the data is relatively small.As assessment measures, accuracy, precision, recall, NPV, MCC, and F1-score[35,36] are used to evaluate and analyze the effectiveness of the proposed method.Additionally, the training and testing time has been evaluated.

    Different models have been employed as baseline algorithms to evaluate the performance results against our proposed method.These include bagging, ET, gradient boosting, and RF, all of which are frequently utilized in anomaly detection techniques.As Tab.2 shows, the classification results indicate that our proposed method achieved good performance results with an accuracy rate of 99.984%, while bagging and RF models achieved similar accuracy results with 99.957% and 99.955% respectively.The gradient boosting model obtained an accuracy rate of 99.919%, considered the lower performance results of all models used.The proposed method also outperforms other models in terms of precision and recall, with 99.982% and 99.984%, respectively, whereas ET and RF obtained similar results for precision with 99.950% and 99.956%, respectively, and for recall measure ET and RF obtained 99.949% and 99.955%, respectively.The gradient boosting model obtained lower performance results of all models in terms of precision and recall measures with 99.920% and 99.919%, respectively.In the case of NPV, the proposed method obtained 99.98%, whereas bagging, ET, and RF achieved similar performance results with 99.95%, 99.94%, and 99.93, respectively.We have also evaluated the proposed method in terms of MCC, which is used to measure the quality of the classification.The proposed method obtained an MCC rate of 99.89%, considering the higher MCC value of all models used.The ET and RF had similar performance results of 99.79% and 99.74%, respectively.However, the gradient boosting model obtained an MCC rate of 99.48%, considered to be the lowest MCC performance of all models utilized.In terms of training and testing time, the proposed method performed well and obtained 3.9 s for training and 0.2 s for prediction, while ET and RF obtained 23.6 and 21.0 s respectively for training and 1.4, 1.1 s respectively for testing.The gradient boosting performed worst in terms of training time (591.54 s) and prediction time (2.49 s).Fig.3 shows the graphical representation of the proposed method with the baseline algorithms in terms of accuracy and precision rates, recall, and F1-score.

    Table 2: Performance results of proposed method with other models in the first experiment

    Figure 3: Comparison of the proposed method with other models in the first experiment

    The proposed method was also used to evaluate the performance of attack detection in for multiclass classification, and was compared to other machine learning models such as bagging, ET, gradient boosting, and RF.As Tab.3 shows, the proposed method can predict different types of attacks with a higher performance results; our proposed method obtained a detection rate of 100% in many types of attacks, such as C&C-FD, C&C-HB, C&C-HB-Att, C&C-HB-FD, C&C-HPS, C&C-Torri, Okiru,and HorizPortSc-Att, whereas the lower detection rate of 83.33% was obtained in the FD attack.The RF and ET models achieved a similar detection rate in most cases; however, the RF model had a significantly lower detection rate than the ET model of 50.00% in the event of a HorizPortSc-Att attack.The bagging model performed well in some types of attacks, such as C&C-FD, C&C-HB,C&C-HB-Att, and C&C-HB-FD; however, it obtained lower detection rates in the case of C&C Torii and HorizPortSc-Att attacks, with 80.00% and 50.00%, respectively.The gradient boosting model obtained a lower detection rate when compared with other models; such a model completely failed to detect C&C-HB-FD and FD attacks.Fig.4 shows the graphical representation of proposed method for multi-class classification in the first experiment.

    Table 3: Performance results of different types of attacks in the first experiment

    Figure 4: Graphical representation of different attack detection in the first experiment

    In the second experiment, different models must learn from a small training data set and examine their abilities in predicting attacks accurately.As Tab.4 shows, our proposed method outperformed other employed models with an accuracy rate of 99.918%.While the bagging, ET, and RF models achieved similar accuracy rates (99.861%, 99.856%, and 99.887%, respectively), performance results were lower for gradient boosting than for all other models used.As Tab.4 shows, the proposed method also outperforms other models in terms of precision and recall, with 99.982% and 99.984%,respectively, whereas ET and RF obtained similar results for precision with 99.917% and 99.918%,respectively, and for recall measure ET and RF obtained 99.949% and 99.955%, respectively.The gradient boosting model obtained lower performance results of all models in terms of precision and recall measures with 99.591% and 99.610%, respectively.In the case of NPV, the proposed method obtained 99.91%, whereas bagging, ET, and RF achieved similar performance results with 99.86%,99.86%, and 99.88, respectively.The proposed method obtained an MCC rate of 99.65%, considering the higher MCC value of all models used.The bagging and RF had similar performance results of 99.4% and 99.43%, respectively.However, the gradient boosting model obtained an MCC rate of 99.14%, considered to be the lowest MCC performance of all models utilized.Fig.5 shows the graphical representation of the proposed method with the baseline algorithms in terms of accuracy and precision rates, recall, and F1-score.

    Table 4: Performance results of proposed method with other models in the second experiment

    Figure 5: Comparison of the proposed method with other models in the second experiment

    The detection performance of different types of attacks for multi-class classification has been evaluated in the second experiment, and was compared to other baseline algorithms such as bagging,ET, gradient boosting, and RF.As Tab.5 shows, the proposed method can predict different class of attacks with higher performance results, our proposed method obtained a detection rate of 100%in some types of attacks, such as C&C-FD, FD, and HorizPortSc-Att, whereas the lower detection rates of 62.500% and 45.455% were obtained in the case of C&C-HB-FD and C&C-Torii attacks.The RF and ET models achieved a similar detection rate in most cases; however, the RF model had a significantly lower detection rate of 33.333% in the case of the FD attack.The bagging model performed well in some types of attacks, such as C&C, C&C-HB, C&C-HB-Att, DDoS, and C&CHB-FD; however, it failed to detect FD and HorizPortSc-Att attacks.The gradient boosting model performed well in some types of attacks; however, it obtained a lower detection rate in other types of attacks,suchas C&C-HB-FD,FD,and HorizPortSc-Att(42.857%,44.00%,and20.00%,respectively).Fig.6 shows the graphical representation of proposed method for multi-class classification in the second experiment.

    Table 5: Performance results of different types of attacks in the second experiment

    Figure 6: Graphical representation of different attack detection in the second experiment

    We have compared the proposed method’s performance with that obtained in previous studies(see Tab.6).Compared with Xu et al.[29], the proposed anomaly detection method improves the accuracy rate by 8.69% while significantly enhancing the precision and recall rate by 7.9% and 9.34%,respectively.The performance results of our anomaly detection method also outperform a recent proposed work by Dutta et al.[28], who used the CNN technique as a single machine learning for feature extraction and the LSTM method as the classifier model.The accuracy rate improves by 3.98%, while precision and recall were improved by 4.49% and 3.92%, respectively.We also evaluated our proposed method by comparison with other techniques that used a hybrid deep learning model,proposed by Sahu et al.[27]; the accuracy rate of our proposed anomaly detection improved by 0.02%,while precision and recall were improved by 0.08% and 9.24%, respectively.Our anomaly detection method employs a collaborative feature selection method for selecting the most valuable features,reducing the dimension of the input data, and improving the detection performance by using multiple classifiers to provide higher prediction performance with a reduced false alarm rate.Tab.6 illustrates the classification results of the proposed method with existing methods.

    Table 6: Comparison of the proposed method with existing methods

    5 Conclusion

    In this paper, we propose an intelligent, effective, lightweight anomaly detection method to detect several IoT attacks.For our proposed model, we have developed a collaborative feature selection method that selects the best distinctive features and eliminates unnecessary features.For the detection stage, we have also proposed an ensemble learning technique to successfully predict several different types of IoT attacks.The experimental results show that our proposed model has achieved a higher accuracy rate of 99.984%, a precision rate of 99.982%, a recall rate of 99.984%, and an F1-score rate of 99.983%, compared with other existing models developed in recent studies.In future work, we will explore the effectiveness of our method with more data sets.In addition, we will investigate more learning techniques to improve our proposed method.We will perform more experimental evaluations to enhance our methods of detecting different types of attacks.

    Acknowledgement:The authors would like to thank Dr.Okba Taouali and Dr.Mohammed Mustafa for their insightful comments om how we could improve the quality of paper.We greatly appreciate the time and effort they have dedicated to improving the manuscript.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美日韩一区二区视频在线观看视频在线 | 黄片无遮挡物在线观看| .国产精品久久| 高清视频免费观看一区二区| 国产有黄有色有爽视频| av网站免费在线观看视频| 国产探花在线观看一区二区| 成人午夜精彩视频在线观看| 国产探花极品一区二区| 亚洲成人av在线免费| 在线播放无遮挡| 欧美激情国产日韩精品一区| 三级经典国产精品| 肉色欧美久久久久久久蜜桃 | 日本色播在线视频| 99久久中文字幕三级久久日本| 国产极品天堂在线| 九九在线视频观看精品| 国产毛片在线视频| 夜夜看夜夜爽夜夜摸| 亚洲精品自拍成人| 久久久成人免费电影| 777米奇影视久久| 搡老乐熟女国产| 我要看日韩黄色一级片| 2021少妇久久久久久久久久久| 麻豆乱淫一区二区| 国产亚洲av片在线观看秒播厂| 婷婷色av中文字幕| 美女脱内裤让男人舔精品视频| 久久久久久久午夜电影| 国内少妇人妻偷人精品xxx网站| 丝瓜视频免费看黄片| 成年女人在线观看亚洲视频 | 乱码一卡2卡4卡精品| av在线天堂中文字幕| eeuss影院久久| 丰满少妇做爰视频| 免费高清在线观看视频在线观看| 国产探花极品一区二区| 在线免费十八禁| av国产免费在线观看| 国产有黄有色有爽视频| 男女那种视频在线观看| 亚洲精品国产色婷婷电影| kizo精华| 内地一区二区视频在线| 熟女人妻精品中文字幕| 免费观看无遮挡的男女| 欧美日韩视频精品一区| 国产精品99久久久久久久久| 王馨瑶露胸无遮挡在线观看| 精品一区二区免费观看| 免费av不卡在线播放| 少妇的逼水好多| 亚洲美女搞黄在线观看| 欧美日韩亚洲高清精品| 综合色av麻豆| 国产乱人视频| 80岁老熟妇乱子伦牲交| 久久午夜福利片| 久久女婷五月综合色啪小说 | 热re99久久精品国产66热6| 好男人视频免费观看在线| 听说在线观看完整版免费高清| 亚洲国产精品专区欧美| 免费看a级黄色片| 免费观看在线日韩| 人妻一区二区av| 97精品久久久久久久久久精品| av在线天堂中文字幕| 亚洲av成人精品一二三区| 波野结衣二区三区在线| 男人爽女人下面视频在线观看| a级毛片免费高清观看在线播放| 亚洲一区二区三区欧美精品 | 国产国拍精品亚洲av在线观看| 久久韩国三级中文字幕| 亚洲真实伦在线观看| 亚洲精品,欧美精品| 欧美激情国产日韩精品一区| 狠狠精品人妻久久久久久综合| 99久国产av精品国产电影| 久久综合国产亚洲精品| 国产精品无大码| 国产欧美亚洲国产| 国产乱人偷精品视频| 91精品国产九色| 亚洲人与动物交配视频| 丰满少妇做爰视频| 最近中文字幕高清免费大全6| 在线观看三级黄色| 少妇被粗大猛烈的视频| 国内揄拍国产精品人妻在线| 伊人久久精品亚洲午夜| 亚洲不卡免费看| 婷婷色综合www| 激情 狠狠 欧美| 国产黄频视频在线观看| 91精品一卡2卡3卡4卡| 亚洲图色成人| 狠狠精品人妻久久久久久综合| 青春草国产在线视频| 国产亚洲av嫩草精品影院| 一区二区三区四区激情视频| 麻豆国产97在线/欧美| 免费电影在线观看免费观看| 亚洲av.av天堂| 99精国产麻豆久久婷婷| 国产久久久一区二区三区| 69人妻影院| 日本午夜av视频| 美女脱内裤让男人舔精品视频| 麻豆成人av视频| 97在线人人人人妻| 直男gayav资源| 免费黄色在线免费观看| 国产精品嫩草影院av在线观看| 亚洲国产精品成人综合色| 日日摸夜夜添夜夜爱| 午夜激情久久久久久久| 亚洲天堂av无毛| 久久女婷五月综合色啪小说 | 成人二区视频| 久久久久久久精品精品| 视频区图区小说| 自拍偷自拍亚洲精品老妇| 亚洲av中文av极速乱| 亚洲成人精品中文字幕电影| 国产精品久久久久久久电影| 中文资源天堂在线| 一级av片app| 男人爽女人下面视频在线观看| 校园人妻丝袜中文字幕| 又大又黄又爽视频免费| 精华霜和精华液先用哪个| 国产黄频视频在线观看| 亚洲精品日韩av片在线观看| 国产精品一区二区性色av| 中文资源天堂在线| 大又大粗又爽又黄少妇毛片口| 欧美成人精品欧美一级黄| 午夜爱爱视频在线播放| 欧美日韩视频高清一区二区三区二| 一级毛片久久久久久久久女| 精品少妇久久久久久888优播| a级毛片免费高清观看在线播放| 亚洲av男天堂| 一本色道久久久久久精品综合| 色吧在线观看| 黑人高潮一二区| 高清日韩中文字幕在线| 久久久久久久久久人人人人人人| 国产淫语在线视频| 国产精品蜜桃在线观看| 日韩三级伦理在线观看| 久久这里有精品视频免费| 99热6这里只有精品| 男人狂女人下面高潮的视频| av在线亚洲专区| 中文资源天堂在线| 亚洲精品456在线播放app| 日韩制服骚丝袜av| 久久精品久久久久久噜噜老黄| 国产成人精品婷婷| 成人国产麻豆网| 国产精品不卡视频一区二区| 国产亚洲av片在线观看秒播厂| 观看免费一级毛片| 91午夜精品亚洲一区二区三区| 97在线视频观看| 国产精品一二三区在线看| 亚洲,欧美,日韩| 亚洲欧美精品专区久久| 99久久中文字幕三级久久日本| 亚洲精品亚洲一区二区| 亚洲高清免费不卡视频| 国产精品女同一区二区软件| 欧美日韩视频高清一区二区三区二| 欧美zozozo另类| 亚洲精品中文字幕在线视频 | 国产精品99久久99久久久不卡 | .国产精品久久| 精品久久久久久久久亚洲| 欧美性感艳星| 国产精品国产三级国产专区5o| 国产久久久一区二区三区| 少妇熟女欧美另类| a级毛色黄片| 啦啦啦啦在线视频资源| 国产中年淑女户外野战色| 亚洲婷婷狠狠爱综合网| 一级毛片久久久久久久久女| 久久6这里有精品| 观看美女的网站| 国产综合精华液| 免费观看无遮挡的男女| 国产成人免费无遮挡视频| 久久国内精品自在自线图片| 韩国av在线不卡| 伊人久久国产一区二区| 午夜免费男女啪啪视频观看| 超碰97精品在线观看| 麻豆久久精品国产亚洲av| 亚洲电影在线观看av| 丰满人妻一区二区三区视频av| 中文乱码字字幕精品一区二区三区| 欧美日本视频| 免费不卡的大黄色大毛片视频在线观看| 亚洲成人久久爱视频| 国产精品.久久久| 爱豆传媒免费全集在线观看| 亚洲精品国产av蜜桃| 免费观看av网站的网址| 91在线精品国自产拍蜜月| 免费黄频网站在线观看国产| 久久国产乱子免费精品| 丝袜脚勾引网站| 日本熟妇午夜| 久久久久久久午夜电影| 在线观看人妻少妇| 3wmmmm亚洲av在线观看| 亚洲精品第二区| 看十八女毛片水多多多| 亚洲最大成人av| 久久久久久久久久久丰满| 久久热精品热| 国产在视频线精品| 女人久久www免费人成看片| 国产av不卡久久| 蜜桃亚洲精品一区二区三区| 亚洲精品乱码久久久久久按摩| 亚洲国产精品成人综合色| 午夜免费观看性视频| 精品国产三级普通话版| 热re99久久精品国产66热6| 九九在线视频观看精品| 啦啦啦中文免费视频观看日本| 在线观看一区二区三区激情| 最新中文字幕久久久久| 久久99热6这里只有精品| 成人亚洲欧美一区二区av| 久久ye,这里只有精品| 精品亚洲乱码少妇综合久久| 少妇人妻一区二区三区视频| 日韩 亚洲 欧美在线| 久久女婷五月综合色啪小说 | 99热这里只有是精品在线观看| 国产熟女欧美一区二区| 欧美激情在线99| 国产伦精品一区二区三区四那| 欧美bdsm另类| 天堂俺去俺来也www色官网| 国产av码专区亚洲av| 美女xxoo啪啪120秒动态图| 国产在线一区二区三区精| 亚洲精品日韩在线中文字幕| 国产av不卡久久| 久久久久精品性色| 国产午夜福利久久久久久| 亚洲精品久久午夜乱码| 国产成人午夜福利电影在线观看| 2018国产大陆天天弄谢| 老师上课跳d突然被开到最大视频| 只有这里有精品99| 欧美xxxx性猛交bbbb| 色网站视频免费| 美女xxoo啪啪120秒动态图| 亚洲三级黄色毛片| 免费电影在线观看免费观看| 免费黄网站久久成人精品| 男人舔奶头视频| 亚洲最大成人手机在线| 亚洲成人av在线免费| 青青草视频在线视频观看| 男人添女人高潮全过程视频| 日韩大片免费观看网站| 极品教师在线视频| 国产精品福利在线免费观看| 久久久久国产精品人妻一区二区| 亚洲精品aⅴ在线观看| 好男人视频免费观看在线| 99re6热这里在线精品视频| 麻豆国产97在线/欧美| 又爽又黄a免费视频| 亚洲熟女精品中文字幕| a级毛色黄片| 欧美精品一区二区大全| 大香蕉97超碰在线| 欧美区成人在线视频| 欧美zozozo另类| 人人妻人人爽人人添夜夜欢视频 | 日韩av在线免费看完整版不卡| 18禁裸乳无遮挡免费网站照片| 久久精品国产亚洲av涩爱| 色哟哟·www| 乱码一卡2卡4卡精品| 久久久亚洲精品成人影院| 在线观看三级黄色| 黄色配什么色好看| 一区二区av电影网| 一级毛片我不卡| 天堂网av新在线| 国产精品国产三级专区第一集| 在线观看一区二区三区| 国产亚洲最大av| 91午夜精品亚洲一区二区三区| 少妇的逼好多水| 成人无遮挡网站| 日日啪夜夜爽| 你懂的网址亚洲精品在线观看| 菩萨蛮人人尽说江南好唐韦庄| 王馨瑶露胸无遮挡在线观看| av黄色大香蕉| av福利片在线观看| 日韩三级伦理在线观看| 国产人妻一区二区三区在| 高清在线视频一区二区三区| 成年版毛片免费区| 99热网站在线观看| 99久久精品国产国产毛片| 日韩视频在线欧美| 日韩av不卡免费在线播放| 亚洲四区av| 老司机影院毛片| 丝袜美腿在线中文| 成人亚洲精品一区在线观看 | 精品一区在线观看国产| av在线老鸭窝| 丰满人妻一区二区三区视频av| 亚洲精品乱码久久久v下载方式| 国产午夜精品久久久久久一区二区三区| 一本久久精品| 亚洲国产高清在线一区二区三| 精品一区在线观看国产| 婷婷色综合www| 亚洲av福利一区| 能在线免费看毛片的网站| 久久精品熟女亚洲av麻豆精品| 美女主播在线视频| 精品99又大又爽又粗少妇毛片| 亚洲精品日韩av片在线观看| 一级av片app| 久久99精品国语久久久| 韩国高清视频一区二区三区| 免费看a级黄色片| 日韩一区二区三区影片| 亚洲自拍偷在线| 成年人午夜在线观看视频| 国产熟女欧美一区二区| 热99国产精品久久久久久7| 亚洲电影在线观看av| 婷婷色综合www| 国产精品久久久久久久电影| 高清欧美精品videossex| 精品国产一区二区三区久久久樱花 | 久久精品熟女亚洲av麻豆精品| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲不卡免费看| 亚洲成人中文字幕在线播放| 欧美日韩亚洲高清精品| 少妇丰满av| 欧美成人精品欧美一级黄| 亚洲欧美日韩无卡精品| 亚洲精品中文字幕在线视频 | 精品酒店卫生间| 国产精品女同一区二区软件| 天天一区二区日本电影三级| 午夜福利视频精品| av福利片在线观看| 久久国内精品自在自线图片| 日韩欧美 国产精品| 丝袜脚勾引网站| 久久久亚洲精品成人影院| 国产美女午夜福利| 2022亚洲国产成人精品| 97精品久久久久久久久久精品| 在线观看av片永久免费下载| 国产黄色视频一区二区在线观看| 久久99精品国语久久久| 晚上一个人看的免费电影| 免费观看a级毛片全部| 18禁动态无遮挡网站| 街头女战士在线观看网站| 韩国高清视频一区二区三区| 黄片wwwwww| 成人亚洲精品av一区二区| 哪个播放器可以免费观看大片| 久久久久久久大尺度免费视频| av免费观看日本| 蜜桃亚洲精品一区二区三区| 国产伦精品一区二区三区视频9| 九九爱精品视频在线观看| 亚洲欧洲国产日韩| 在线观看人妻少妇| 有码 亚洲区| 久久久欧美国产精品| 国产亚洲最大av| 日韩在线高清观看一区二区三区| 搡老乐熟女国产| 日韩在线高清观看一区二区三区| 欧美一区二区亚洲| 五月开心婷婷网| 一个人观看的视频www高清免费观看| 99久久九九国产精品国产免费| 天天躁日日操中文字幕| 熟女电影av网| 国产精品99久久99久久久不卡 | 麻豆乱淫一区二区| 国产真实伦视频高清在线观看| 亚洲精品中文字幕在线视频 | 99精国产麻豆久久婷婷| 亚洲四区av| 久久这里有精品视频免费| 国产高清国产精品国产三级 | av国产免费在线观看| 亚洲av不卡在线观看| 看非洲黑人一级黄片| 成年av动漫网址| 久久久成人免费电影| videos熟女内射| 五月玫瑰六月丁香| 小蜜桃在线观看免费完整版高清| 日本爱情动作片www.在线观看| 成年版毛片免费区| 国内精品宾馆在线| 久久精品人妻少妇| 又爽又黄无遮挡网站| 3wmmmm亚洲av在线观看| 观看免费一级毛片| 久久久久久久午夜电影| 日本熟妇午夜| 男插女下体视频免费在线播放| 1000部很黄的大片| 国产视频内射| 少妇丰满av| 国产亚洲av片在线观看秒播厂| 一级片'在线观看视频| 成人午夜精彩视频在线观看| 青青草视频在线视频观看| 女人久久www免费人成看片| 久久久久九九精品影院| 中文字幕av成人在线电影| 国产乱来视频区| 少妇人妻一区二区三区视频| 精品人妻一区二区三区麻豆| 日韩av免费高清视频| 午夜免费男女啪啪视频观看| 欧美激情在线99| 大陆偷拍与自拍| 国产精品熟女久久久久浪| 男人舔奶头视频| 极品教师在线视频| 国内精品美女久久久久久| 大香蕉97超碰在线| 亚洲精品亚洲一区二区| 久热久热在线精品观看| www.色视频.com| 国产大屁股一区二区在线视频| 在线观看三级黄色| 欧美潮喷喷水| 国产一区亚洲一区在线观看| 观看免费一级毛片| 汤姆久久久久久久影院中文字幕| 久久国产乱子免费精品| 国产老妇伦熟女老妇高清| 国产精品一区二区三区四区免费观看| 有码 亚洲区| 在线观看人妻少妇| 亚洲av成人精品一二三区| 日本黄色片子视频| 三级国产精品欧美在线观看| av国产久精品久网站免费入址| 国产一区二区三区综合在线观看 | 欧美xxⅹ黑人| 亚洲欧美清纯卡通| 99精国产麻豆久久婷婷| 嫩草影院入口| 网址你懂的国产日韩在线| 视频中文字幕在线观看| 国产在线男女| 男女边吃奶边做爰视频| 可以在线观看毛片的网站| 精品午夜福利在线看| 久久久a久久爽久久v久久| av免费在线看不卡| 亚洲图色成人| 精品久久久久久电影网| 特大巨黑吊av在线直播| 欧美精品人与动牲交sv欧美| av免费观看日本| 免费在线观看成人毛片| 男的添女的下面高潮视频| 最后的刺客免费高清国语| 特级一级黄色大片| 久久精品综合一区二区三区| 亚洲av成人精品一区久久| 久久久久久伊人网av| 尤物成人国产欧美一区二区三区| 国产精品秋霞免费鲁丝片| 久久久久久久国产电影| 精品国产乱码久久久久久小说| 超碰97精品在线观看| 中文天堂在线官网| 水蜜桃什么品种好| 天天躁夜夜躁狠狠久久av| 国产精品99久久99久久久不卡 | 在线播放无遮挡| 久久久精品欧美日韩精品| 国产成人午夜福利电影在线观看| 狂野欧美激情性xxxx在线观看| 国产在线男女| av在线天堂中文字幕| 可以在线观看毛片的网站| 国国产精品蜜臀av免费| 免费大片黄手机在线观看| 大香蕉97超碰在线| 欧美日韩视频精品一区| 久久久a久久爽久久v久久| 国产精品精品国产色婷婷| 国产老妇女一区| 最近的中文字幕免费完整| 久久精品国产自在天天线| 国产日韩欧美在线精品| 久久99热这里只频精品6学生| 国产有黄有色有爽视频| 久久精品国产亚洲网站| av免费在线看不卡| 亚洲,欧美,日韩| 久久国内精品自在自线图片| 亚洲成人精品中文字幕电影| 亚洲av成人精品一区久久| 综合色丁香网| 国产精品一区二区性色av| 极品教师在线视频| 日本猛色少妇xxxxx猛交久久| 大香蕉久久网| 久久久久精品性色| 亚洲欧美成人综合另类久久久| 男女无遮挡免费网站观看| 黄色怎么调成土黄色| av.在线天堂| 韩国高清视频一区二区三区| 爱豆传媒免费全集在线观看| 一个人看视频在线观看www免费| 春色校园在线视频观看| 黄片无遮挡物在线观看| 观看免费一级毛片| 久久久久久久精品精品| 寂寞人妻少妇视频99o| 亚洲精品中文字幕在线视频 | 午夜福利高清视频| av线在线观看网站| 国产亚洲最大av| 国产av码专区亚洲av| 欧美丝袜亚洲另类| 精品国产乱码久久久久久小说| 秋霞伦理黄片| 一区二区三区免费毛片| 2021天堂中文幕一二区在线观| 新久久久久国产一级毛片| 青春草亚洲视频在线观看| 国产高清不卡午夜福利| 国产69精品久久久久777片| 在线观看三级黄色| 女人久久www免费人成看片| 久久久久国产精品人妻一区二区| 久久久久久久久大av| 欧美+日韩+精品| 日本欧美国产在线视频| 哪个播放器可以免费观看大片| 精品视频人人做人人爽| 亚洲婷婷狠狠爱综合网| 黄片无遮挡物在线观看| 男女无遮挡免费网站观看| 欧美成人a在线观看| 亚洲精品自拍成人| 丝袜喷水一区| 亚洲,一卡二卡三卡| 久久精品人妻少妇| 在线观看人妻少妇| 一区二区三区四区激情视频| 男女啪啪激烈高潮av片| 高清在线视频一区二区三区| 少妇裸体淫交视频免费看高清| 国产成人精品久久久久久| 极品教师在线视频| 丰满乱子伦码专区| 精品国产一区二区三区久久久樱花 | 美女cb高潮喷水在线观看| 亚洲成人中文字幕在线播放| 51国产日韩欧美| 最近最新中文字幕免费大全7| 麻豆成人av视频| 国产淫片久久久久久久久| 亚洲国产av新网站| 日日摸夜夜添夜夜添av毛片| 高清欧美精品videossex| 国产一区二区在线观看日韩| 亚洲av成人精品一区久久| 我要看日韩黄色一级片| 黄色一级大片看看| 中文字幕av成人在线电影| 国产人妻一区二区三区在| 亚洲天堂av无毛| 亚洲国产精品国产精品| 高清日韩中文字幕在线| 亚洲三级黄色毛片| 一级毛片久久久久久久久女| 成人亚洲欧美一区二区av| 下体分泌物呈黄色| 2021天堂中文幕一二区在线观| 日本三级黄在线观看| 在线观看三级黄色| 国产探花在线观看一区二区|