• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Malware Detection Using Decision Tree Based SVM Classifier for IoT

    2022-08-24 12:57:50AnwerMustafaHilalSiwarBenHajHassineSouadLarabiMarieSainteNadhemNemriMohamedNourAbdelwahedMotwakelAbuSarwarZamaniandMesferAlDuhayyim
    Computers Materials&Continua 2022年7期

    Anwer Mustafa Hilal, Siwar Ben Haj Hassine, Souad Larabi-Marie-Sainte, Nadhem Nemri,Mohamed K.Nour, Abdelwahed Motwakel, Abu Sarwar Zamaniand Mesfer Al Duhayyim

    1Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University,AlKharj, Saudi Arabia

    2Department of Computer Science, College of Science and Arts, King Khalid University, Mahayil Asir, Saudi Arabia

    3Department of Computer Science, College of Computer and Information Sciences, Prince Sultan University, Saudi Arabia

    4Department of Computer Science, College of Computing and Information System, Umm Al-Qura University,Saudi Arabia

    5Department of Natural and Applied Sciences, College of Community-Aflaj, Prince Sattam bin Abdulaziz University,Saudi Arabia

    Abstract: The development in Information and Communication Technology has led to the evolution of new computing and communication environment.Technological revolution with Internet of Things (IoTs) has developed various applications in almost all domains from health care, education to entertainment with sensors and smart devices.One of the subsets of IoT is Internet of Medical things (IoMT) which connects medical devices, hardware and software applications through internet.IoMT enables secure wireless communication over the Internet to allow efficient analysis of medical data.With these smart advancements and exploitation of smart IoT devices in health care technology there increases threat and malware attacks during transmission of highly confidential medical data.This work proposes a scheme by integrating machine learning approach and block chain technology to detect malware during data transmission in IoMT.The proposed Machine Learning based Block Chain Technology malware detection scheme (MLBCT-Mdetect) is implemented in three steps namely: feature extraction, Classification and blockchain.Feature extraction is performed by calculating the weight of each feature and reduces the features with less weight.Support Vector Machine classifier is employed in the second step to classify the malware and benign nodes.Furthermore, third step uses blockchain to store details of the selected features which eventually improves the detection of malware with significant improvement in speed and accuracy.ML-BCT-Mdetect achieves higher accuracy with low false positive rate and higher True positive rate.

    Keywords: Blockchain; malware detection; classification; feature selection;internet of medical things

    1 Introduction

    The Internet of Things (IoTs) is the interrelation of mechanical and digital machines with unique identifiers (UIDs) with an ability to transfer data in a network without human intervention.An ecosystem of web enabled smart devices with sensors to collect and send data from the environment is a IoT ecosystem.The computing paradigm has changed with the advancement in the smart devices to facilitate our day-to-day activities.These advancements have enabled the implementation of Internet of Medical Things (IoMTs) which communicates through smart medical equipment.In IoMT, medical devices are equipped with wireless technology like Bluetooth or Wi-Fi to enable communication to promote IoMT technology.The future of the medical world will be shaped better with the integration of Augmented Reality (AR), Artificial Intelligence (AI), Blockchain technology,Machine Learning and sensors.With many advantages in IoMT technology, there are few challenges that need to be resolved while designing an IoMT system.The issues to be concentrated are: Security challenges, Interoperability and privacy.The privacy issues may be replay, man-in-the-middle attack,impersonation, privileged-insider, denial of service attacks (DoS) and malware attacks.Malignant attacks need to be prioritized which is malware attacks that deals with confidentiality and integrity.Health care data is considered to be very confidential and sensitive to be disclosed or altered by unauthorized person.The number of IoT devices are increasing day by day and is roughly 6.1 billion smartphone users in 2021 [1,2].With the consistent use of Internet devices attackers are prone to hack the sensitive data [3].The architecture of IoMT is shown in Fig.1.

    The existing malware detection methods seems to be not efficient which is evident from recent attacks by Mirai Brickbot botnets.Due to the lack of good protection technique, bot nets create distributed denial-of-service (DDoS) attacks in smart things environment.These attacks may be very dangerous to the people which may even lead to death.This leads to development of many innovations to protect and prevent the attack in IoMT by IoT researchers in IoT security domain.Hence it is very essential to enable a strong security mechanism and a framework to detect the threatening attacks in IoMT where the transmitted clinical data is highly sensitive and confidential [4-6].The advantages of smart technology and its usage in the near future motivated to develop a malware detection framework.Since nowadays all the devices are driven towards the Internet of Things it becomes essential to protect us from the problems caused due to the growth in technology.These smart devices are connected through a network to share data with different entities like servers, sensors and IoT devices.From the literature it is clearly evident that the new blockchain technology has also stepped into IoT to enable strong security mechanism [7-9].Blockchain technology ensures reliable data sharing in IoT environment which is based on distributed computing.With an intention to detect the malware in this smart IoT era, this paper enhanced a novel malware detection framework by using machine learning techniques to detect and train the IoMT malware detection which in turn creates a huge database.This database stores the results of the models in the blockchain framework.The proposed ML-BCTM detect frame work integrates machine learning techniques and blockchain methodology to ensure effective detection of malwares.Fuzzy C Means (FCM) clustering algorithm is employed to extract relevant features useful for malware detection.Further Decision tree based SVM is used for multi feature classification.Finally, the data related to malware is stored in blockchain database to ensure efficient dynamic detection.New malwares which are detected during the run time is also added to the blockchain database for further similar malware detection.The contribution of the work is as follows.

    1.We propose a ML-BCT-M detect framework for malware detection in in IoMT devices using blockchain

    2.FCM clustering is used to extract the relevant malware from real features considering the membership values for detection process.

    3.A multi-feature decision tree based SVM algorithm is used to classify real data from malware from the samples to achieve high accuracy.

    4.In addition to the above, the proposed framework uses blockchain database to store the results of the machine learning models to pass the malware details to all the users.

    The brief introduction is followed by related work in Section 2.Section 3 describes the proposed methodology.Experimental results discussed in Section 4.Section 5 concludes the paper with future research idea.

    2 Related Work

    Existing methods to meet the challenges and issues related IoMT devices are reviewed in this section.A software that is delivered in the network to infect the resources or affects the other software is called as malicious software.Malwares provides remote access to the infected system.They are also transferred from system to system and might attack sensitive data [10-13].Wellness based health care systems are developed with Internet of Things where the healthcare devices monitor and send the sensitive and confidential health data to the cloud which can be accessed by IoT devices.This ensures IoT to facilitate processing and analysis of real time health care data [14, 15].

    Dinakarrao et al.[15] developed a machine learning based malware detection mechanism for IoT devices.The performance of malware detection is improved by applying machine learning algorithms.Further the results are stored in distributed malware database which is a blockchain framework.A graph-based convolution neural network (CNN) mechanism is developed by Aslam et al.[16] to detect the malware like IoT bots.Experimental results proved that proposed method classifies the benign and IoT malware with highest accuracy.Xu et al.[17] creates a malware detector named as HaRM which uses the low computational cost classifier to use IoT resource for IoT malware detection.Proposed HaRM achieves high accuracy and also gives the range of estimation state to prevent the further spread of malware.

    Raje et al.[18] developed a Blockchain-based framework to preserve patient anonymity with Bluetooth enabled smart phones.Contact of public is traced using smart phone and this data is stored in cloud.This data from cloud is accessible by the health department and the government.People could do their regular activities in a secured manner to keep them safe.Thus, the author proves that proposed Adaptive Neuro-Fuzzy Interference System(ANFIS)system to predict the status of COVID,and the proposed method achieves accuracy rate of 95.9% that is proved from experimental analysis.

    Ouaguid et al.[19] presents a contact tracing scheme that preserves privacy using blockchain technology to bridge the user/patient and the authorized solvers to desensitize the user IDand location information.The authors show that their proposed model has secured higher security and privacy and is battery friendly and globally accessible.Beep Trace develops and implements digital contact tracing applications that can overrule COVID-19 with the features of providing timely framework to developers and researchers.

    Afonso et al.[20] classified files as benign or malicious by constructing decentralized firewall using blockchain technology.The authors used a Deep Belief Neural network (DBN) as direction engine.In the proposed method, 10,000 files are used to train the model to classify gray scale images into two classes.Afonso et al.[20] developed a method named as ANDROSCANREG (Android Permissions Scan Registry) which extracts and analyses the requested permissions in android application using blockchain technology.This method uses two blockchain namely: PERMBC and BTCBC.PERMBC analyses, validates and prepares the raw results to pertain in second block chain whereas BTCBC saves the history of permissions of all applications scanned through financial transactions.Intruders private data with the administrator permissions are encrypted and destroyed by downloading and installing the malicious modules in the file.

    Shaukat et al.[21] proposed a dynamic API calls and framework calls to track and study booster vector machines, J48, IBk, BayesNet Pool, BayesNet K2, Random Forest, and Naive Bayes were used for their approach and found that the proposed model outperformed the existing ones.The machine learning like SVM, Linear regression, naive bayes, etc.are described in article [22] for security detection.Also role of ML in security application are discussed in article [23].The AI advantages and needs for future employment is discussed in paper [24].Machine learning used in cyber security and detection of malware is discussed in paper [25].

    3 Proposed MLBCT-M Detect Methodology

    One of the main challenges in internet of medical things is handled by proposing a malware detection scheme using Machine Learning technique and blockchain technology.The proposed method MLBCT-Mdetect employs two machine learning techniques namely: feature extraction and classification then it develops a blockchain based detection framework.Feature extraction and classification approaches trains the model and uses blockchain to distribute the new malware information.Distributed ledger records all type of malware that helps to train the model to detect malware efficiently.Dynamic malware detection is enabled in this model by placing the detected malware data into the blockchain database.Implementing the proposed system will run in the following manner.Developed machine learning models will identify the malware and retrain the model for effective detection.Information regarding to the new malware is stored in the blockchain.Intruders might introduce a new attack which is also stored in the blockchain database.The architecture of the proposed framework is shown in Fig.2.

    Figure 2: Architecture of proposed framework

    3.1 Fuzzy C Means Feature Extraction

    Feature Extraction is initiated by taking raw data as input.The input given is (xi, ti) in which xi representing set of attributes and ti represents the label.Si attributes which is a set of xi is extracted for classifying the malware nodes and benign nodes.

    The steps involved in Fuzzy C Means (FCM) feature extraction are Pre-processing, clustering the data and extracting the features for classification.In the pre-processing stage, all the attributes are converted to numeric data to be used for clustering process.Medical data can be in any form in the case of ECG and EEG signals, Haar wavelet is used to compress the waves into predefined points.Few data values are normalized within the range of 0 to 1.Clustering stage is the heart of feature extraction where it takes pre-processed data as input and labels are removed.FCM algorithm is described below in Algorithm 1.

    Algorithm 1: FCM Input: All Data points Output: k clusters Step 1: Initialize U = [uij] membership matrix U(0)Step 2: Calculate center vectors c(k)= [cj] with U(k)(Continued)

    Algorithm 1: Continued Step 3: find Ci=∑n j=1um ijxj∑n j=1um ij Step 4: update U(k), U(K+1)Step 5: Compute uij= 1∑c k=1images/BZ_706_825_741_856_787.png‖xi- cj‖‖xi- ck‖images/BZ_706_1038_741_1069_787.pngStep 6: if‖U(k=1)- U(K)‖<∈then stop else go to step 2

    Initial step is to select the number of clusters and initialize the membership matrix U.Cluster centers are calculated using cluster centers are chosen in such a way that centers should be cluster to points with higher membership value.After computing the cluster centers U is updated as per the cluster center location.New membership value of a point is calculated with the distance of the point from all cluster centers.The same process is repeated until the membership matrix is minimized.The attributes here do not take part in contributing to cluster centers even though they are obtained in K-dimensional space.The steps implemented for extracting features are shown in Algorithm 2.

    Algorithm 2: Feature extraction Input: n clusters, k attributes Output: Relevant Features Dist =φ, mdis =φ, Attr =φ For i=1 to k For j=1 to n-1 For l = j to n Dist = dist(U) min (dist)End for End for mdis = (mdis) Union min (dist)end for for i=1 to k attr = attr union max (mdis)end for end

    The list of attributes is listed in‘a(chǎn)ttr’in which the most relevant attributes are listed first in‘a(chǎn)ttr’and least relevant attributes are at the end of‘a(chǎn)ttr’.The most relevant attributes are chosen for the next stage in the proposed method.The workflow of proposed MLBCT-Mdetect is depicted below in Fig.3.

    Figure 3: Workflow of proposed MLBCT-Mdetect

    3.2 Multi-Feature Classification

    SVM based decision trees are used for multi featured classification.Previous studies have shown DREBIN [26] was developed for statistical analysis to build datasets based on application programming interface.SVM was found to be efficient in malware detection.Attribute of proposed MLBCT-Mdetect is shown in Tab.1 and the flowchart of SVM based decision tree is shown below in Fig.4.

    Figure 4: Flowchart of SVM based decision tree

    Table 1: SVM classifier attributes

    3.3 Blockchain Based Malware Detection

    Blockchain technology with consensus mechanism is gaining more attention.Different consensus algorithmsnamely Proof of Work(PoW),Delegated Proofof Stake(DPOS),Practical Byzantine Fault Tolerance (PBFT), Proof of Stake (PoS) gains deep insight into IoMT data stored in block chain.A framework is designed where a blockchain based framework is used for storing malware information.Benefits of security and fault tolerance between node are the characteristics of consensus mechanism.All the nodes can communicate with each other nodes very easily and any node can join the network or leave the network in a comfortable way.All the nodes can transfer information to the neighbouring nodes.AArequest response pattern is built by synchronous block.Malware features are stored in storage layer and the blockchain provides all information through distributed blocks.Features stored in blocks cannot be modified and features such as risky permission and suspicious API are stores in block which cannot be altered.Tab.2 shows the blockchain attributes and Fig.5 depicts the blockchain based malware detection structure for IoT devices.

    Figure 5: Blockchain based malware detection for internet of things

    Table 2: Blockchain attributes

    The users are protected from malicious application through blockchain technology.The two sections of a block are head section and data section.Head section stores root, version number, hash value etc...Data section stores the details of the malware like name, type of family, permission data,sensitive behavior data APK feature and transaction hash.Exact information stored in distributed malware database increases the speed and accuracy of detecting the malware.The frauds are detected efficiently by the unique hash value.Malware name, package features, hash value permission feature,API call feature of the malware are stored in every data block.

    4 Results and Discussions

    The dataset used for evaluating the proposed MLBCT-Mdetect has infected and uninfected an application which counts to 545 benign and 421 malware applications.True Positive Rate (TPR), false positive Rate (FPR) and Accuracy are the measures considered for evaluating the proposed scheme.Comparison of the performance of proposed method leads to be applied in malware detection in IoMT devices.MLBCT-Mdetect surpasses the results of the existing models in terms of dynamic detection of malware.New malwares are also added dynamically in the blockchain for efficient detection that improves the accuracy further.MLBCT-Mdetect proves to be effective by integrating techniques from machine learning models and blockchain technology for the effective detection of malwares in IoMT devices.

    True positive rate is computed using Eq.(1).

    False positive rate is computed using Eq.(2).

    Accuracy is computed using the below Eq.(3).

    The importance of extracted features is shown through the experimental results.The clustering method used in the proposed MLBCT-Mdetect optimizes the features with the results shown in Fig.6..Red colour indicates the malware samples and blue colour indicates benign samples.

    Figure 6: Clustering benign and malware samples

    The proposed MLBCT-Mdetect is employed and compared with three classifiers namely: Na?ve bayes, K-Nearest Neighbor (KNN) and Random Forest.The results of the above classifiers are shown in Tab.3.

    Table 3: Results observed from different classifiers

    IIt is observed fromthe above table that accuracy percentage is higher with DT-SVM classifier with 98.87% compared to Na?ve bayes, KNN and Random Forest with 87%, 85% and 86% respectively.

    It is evident from Tab.3 that SVM classifier achieves better accuracy compared to other classifiers which is employed in proposed method.MLBCT-Mdetect is efficient in terms of feature extraction and speed to detect the malware and benign samples.Fig.7 clearly depicts the TPR and FPR for Na?ve Bayes, KNN, Random Forest and SVM.Support vector machine scores highest TPR rate compared to other classifiers and FPR also seems to be less compared to Na?ve bayes with 56%, KNN with 58%,Random Forest with 54% and SVM with 17%.To prove the efficiency of MLBCT-Mdetect the results are compared with n-grams malware detection.Results of proposed and existing method are compared in terms of accuracy and processing time which is shown in Figs.8 and 9.To show that the proposed method is significant, the results are compared with existing state of art method malware detection which is implemented for other applications.The detection is proved to be effective by comparing MLBCT-Mdetect and n-grams in terms of Accuracy of detection, precision rate and recall rate.

    Figure 7: Comparison of TPR and FPR in classifiers

    Figure 8: Accuracy, precision and recall of proposed and existing method

    Figure 9: Comparison of processing time

    MLBCT-Mdetect proves to be very efficient from the Fig.9 with accuracy 98%, precision 97% and recall 97% whereas, n-grams malware detection seems to be not very efficient as MLBCT-Mdetect in terms of all compared measures.

    Fig.9 compares the processing time of MLBCT-Mdetect and existing n-grams method which clearly depicts the speed of the proposed method.Experiment is carried out for different number of samples and proved that the proposed MLBCT-Mdetect processes at a higher speed for all number of samples.

    5 Conclusion and Future Enhancements

    The technological advancement has driven us to smart environment with Internet of Things.IoT applications are diverse from sensing, agriculture, smart city development, smart vehicles and also set a path towards smart health care system (IoMT) which is the utmost essential application.With the wide use IoMT applications, there is more possibility of intrusions which may lead the patient health to critical stage.With an objective to detect the malwares in IoMT applications, this works proposes a novel scheme MLBCT-Mdetect to dynamically detect the malwares by integrating machine learning algorithms with block chain technology.Information regarding the intrusions is processed usingmachine learning algorithms and stored in blockchain database and transferred over the network to detect the further malwares efficiently.The new malwares detected are also added in the blockchain network during the runtime.The clustering method employed in the MLBCT-Mdetect extracts the relevant features to identify the samples into to malware samples and benign samples.In addition,classification is performed with Decision tree based SVM to address multi feature issues to achieve accuracy.Experimental results prove that the proposed method is excellent in terms of accuracy,precision and recall.The classifier (decision tree based SVM) employed in this work also outperforms with the existing Na?ve bayes, KNN and Random Forest.MLBCT-Mdetect proves to be efficient in detecting the malwares with 98.78% accuracy and takes only 42 s to process 1000 samples.The limitation of the research is security cannot be highly achieved.This work can be enhanced further by implementing deep learning technology and also can be improvised by applying security mechanisms.

    Acknowledgement:The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.

    Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (RGP 1/279/42).www.kku.edu.sa.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美乱色亚洲激情| 1024香蕉在线观看| 99精国产麻豆久久婷婷| 成人手机av| 日韩一卡2卡3卡4卡2021年| 久久ye,这里只有精品| 久久精品亚洲精品国产色婷小说| 成人国产一区最新在线观看| 在线天堂中文资源库| 亚洲精品中文字幕一二三四区| 91国产中文字幕| 国产精品成人在线| 国产精品美女特级片免费视频播放器 | 极品教师在线免费播放| 黑丝袜美女国产一区| 国产一区二区激情短视频| 1024香蕉在线观看| 19禁男女啪啪无遮挡网站| 日韩欧美三级三区| 十八禁网站免费在线| 黄片小视频在线播放| 亚洲精品久久成人aⅴ小说| 欧美在线黄色| 久久天堂一区二区三区四区| 99国产精品免费福利视频| 免费在线观看完整版高清| 亚洲片人在线观看| 亚洲男人天堂网一区| 黄片小视频在线播放| 1024香蕉在线观看| 久久久久久久午夜电影 | 另类亚洲欧美激情| 一级,二级,三级黄色视频| 可以免费在线观看a视频的电影网站| 亚洲av片天天在线观看| 无遮挡黄片免费观看| 色94色欧美一区二区| 久久香蕉激情| 黑人欧美特级aaaaaa片| 老司机靠b影院| 一本一本久久a久久精品综合妖精| 国产黄色免费在线视频| 久久人妻av系列| 国产精品国产高清国产av | 亚洲国产看品久久| 久久精品91无色码中文字幕| 午夜精品久久久久久毛片777| 女人被狂操c到高潮| 50天的宝宝边吃奶边哭怎么回事| 国产97色在线日韩免费| 国产精品免费大片| 午夜免费鲁丝| 日韩免费高清中文字幕av| 一级a爱视频在线免费观看| 三上悠亚av全集在线观看| 久久国产乱子伦精品免费另类| 久热这里只有精品99| 国产一区二区三区综合在线观看| 老司机影院毛片| 日韩人妻精品一区2区三区| 一区在线观看完整版| 99热网站在线观看| 伦理电影免费视频| 亚洲专区字幕在线| 建设人人有责人人尽责人人享有的| 成人国产一区最新在线观看| 日本精品一区二区三区蜜桃| 最新的欧美精品一区二区| 欧美黄色淫秽网站| 99精品在免费线老司机午夜| 欧美 亚洲 国产 日韩一| 岛国在线观看网站| 成人特级黄色片久久久久久久| 十八禁高潮呻吟视频| 国产在线观看jvid| 免费在线观看完整版高清| 亚洲av熟女| 中国美女看黄片| 国产成人影院久久av| 老司机影院毛片| 午夜福利欧美成人| 欧美黑人欧美精品刺激| 在线天堂中文资源库| 亚洲国产欧美一区二区综合| a在线观看视频网站| 可以免费在线观看a视频的电影网站| 欧美久久黑人一区二区| 欧美乱色亚洲激情| 欧美激情久久久久久爽电影 | 十分钟在线观看高清视频www| av福利片在线| 久9热在线精品视频| 国产成人免费观看mmmm| 成人国语在线视频| 亚洲综合色网址| 91老司机精品| 国产1区2区3区精品| 看黄色毛片网站| 成人精品一区二区免费| 国产乱人伦免费视频| 美女视频免费永久观看网站| a级片在线免费高清观看视频| 又大又爽又粗| 制服人妻中文乱码| 女同久久另类99精品国产91| 午夜福利,免费看| 久久精品成人免费网站| 久久久精品国产亚洲av高清涩受| 日日摸夜夜添夜夜添小说| 自线自在国产av| 亚洲男人天堂网一区| 别揉我奶头~嗯~啊~动态视频| 黑人欧美特级aaaaaa片| 日韩中文字幕欧美一区二区| 久久天堂一区二区三区四区| 国产欧美日韩一区二区精品| 日日摸夜夜添夜夜添小说| 不卡一级毛片| 露出奶头的视频| 久9热在线精品视频| 精品久久久久久久久久免费视频 | 婷婷丁香在线五月| 国产高清国产精品国产三级| 亚洲精品在线美女| 亚洲性夜色夜夜综合| 99精品久久久久人妻精品| 美女福利国产在线| 女人高潮潮喷娇喘18禁视频| 最近最新中文字幕大全免费视频| 欧美中文综合在线视频| 激情在线观看视频在线高清 | 亚洲欧美日韩高清在线视频| 国产一区二区三区视频了| 久热这里只有精品99| 国产精华一区二区三区| 国产激情欧美一区二区| 美女午夜性视频免费| 欧美日韩亚洲综合一区二区三区_| 男人操女人黄网站| 国产成+人综合+亚洲专区| 新久久久久国产一级毛片| 亚洲av熟女| 欧美成人免费av一区二区三区 | 欧美激情 高清一区二区三区| 香蕉国产在线看| 制服人妻中文乱码| 国产野战对白在线观看| 天堂中文最新版在线下载| 色尼玛亚洲综合影院| 黄色成人免费大全| 99国产精品免费福利视频| 成年人黄色毛片网站| 50天的宝宝边吃奶边哭怎么回事| 韩国精品一区二区三区| 又大又爽又粗| 色综合婷婷激情| 国产精品电影一区二区三区 | 高清毛片免费观看视频网站 | 国产精品一区二区在线不卡| 婷婷成人精品国产| 亚洲人成77777在线视频| 精品午夜福利视频在线观看一区| av免费在线观看网站| 亚洲熟妇中文字幕五十中出 | 两个人看的免费小视频| 少妇粗大呻吟视频| 香蕉丝袜av| 久久久久久亚洲精品国产蜜桃av| 亚洲精品成人av观看孕妇| 久久中文看片网| 麻豆av在线久日| 国产成人啪精品午夜网站| 欧美日韩国产mv在线观看视频| 韩国精品一区二区三区| 满18在线观看网站| 国产1区2区3区精品| 韩国精品一区二区三区| 欧美日韩成人在线一区二区| 日日夜夜操网爽| 丁香欧美五月| 桃红色精品国产亚洲av| 老司机亚洲免费影院| 精品亚洲成a人片在线观看| 亚洲一码二码三码区别大吗| 欧美中文综合在线视频| 极品少妇高潮喷水抽搐| av网站免费在线观看视频| 我的亚洲天堂| 国产亚洲精品第一综合不卡| 91字幕亚洲| 亚洲精品美女久久久久99蜜臀| 大香蕉久久成人网| 色综合婷婷激情| 欧美日韩乱码在线| 色尼玛亚洲综合影院| 亚洲五月色婷婷综合| 天堂动漫精品| 精品久久蜜臀av无| 麻豆成人av在线观看| 美女高潮到喷水免费观看| 亚洲精品乱久久久久久| 国产无遮挡羞羞视频在线观看| 在线免费观看的www视频| 国产精品秋霞免费鲁丝片| 亚洲一区二区三区不卡视频| 在线天堂中文资源库| 午夜老司机福利片| 国产精品99久久99久久久不卡| 国产不卡av网站在线观看| 很黄的视频免费| av电影中文网址| videos熟女内射| 超色免费av| 亚洲精品久久午夜乱码| 久久精品aⅴ一区二区三区四区| 又大又爽又粗| 高清欧美精品videossex| 午夜福利乱码中文字幕| 免费不卡黄色视频| 亚洲专区国产一区二区| 精品国产乱码久久久久久男人| 老司机午夜福利在线观看视频| 国产精品久久久久久精品古装| 亚洲精品粉嫩美女一区| 中文字幕色久视频| 久久婷婷成人综合色麻豆| 亚洲九九香蕉| 欧美大码av| 亚洲精品在线美女| 麻豆av在线久日| 欧洲精品卡2卡3卡4卡5卡区| av中文乱码字幕在线| 久久人妻熟女aⅴ| 脱女人内裤的视频| 国产成人系列免费观看| 国产精品美女特级片免费视频播放器 | 天堂动漫精品| 狂野欧美激情性xxxx| 欧美人与性动交α欧美软件| 老熟女久久久| 欧美激情 高清一区二区三区| 国产精品亚洲一级av第二区| 纯流量卡能插随身wifi吗| 两个人免费观看高清视频| 久久中文字幕人妻熟女| 午夜老司机福利片| 久久久久久久久免费视频了| 下体分泌物呈黄色| 国产高清激情床上av| 精品免费久久久久久久清纯 | 国产精品久久久久成人av| 黑人巨大精品欧美一区二区蜜桃| 久久久水蜜桃国产精品网| 亚洲熟女精品中文字幕| 国产成人啪精品午夜网站| 亚洲自偷自拍图片 自拍| 欧美日韩亚洲高清精品| 一进一出好大好爽视频| 精品一区二区三区四区五区乱码| 丰满饥渴人妻一区二区三| 国产一区二区三区在线臀色熟女 | 精品国产国语对白av| 欧美精品高潮呻吟av久久| 99热国产这里只有精品6| 亚洲自偷自拍图片 自拍| 亚洲精品国产精品久久久不卡| 精品欧美一区二区三区在线| 中文字幕制服av| а√天堂www在线а√下载 | 久热这里只有精品99| 午夜精品久久久久久毛片777| av电影中文网址| 少妇被粗大的猛进出69影院| 操美女的视频在线观看| 大型黄色视频在线免费观看| 中文字幕人妻熟女乱码| 丰满饥渴人妻一区二区三| 天天添夜夜摸| 亚洲av成人一区二区三| 国产不卡av网站在线观看| 中出人妻视频一区二区| 国产欧美日韩一区二区三区在线| 中国美女看黄片| 午夜日韩欧美国产| 午夜福利,免费看| 精品无人区乱码1区二区| 国产精品99久久99久久久不卡| 美女高潮到喷水免费观看| 久久人妻av系列| 极品少妇高潮喷水抽搐| 午夜老司机福利片| 丰满饥渴人妻一区二区三| 人成视频在线观看免费观看| 丝袜美足系列| 欧美激情 高清一区二区三区| 国产男女内射视频| 99国产极品粉嫩在线观看| 日韩人妻精品一区2区三区| 免费一级毛片在线播放高清视频 | 国产精品欧美亚洲77777| videos熟女内射| 视频在线观看一区二区三区| 国产精品1区2区在线观看. | 国产aⅴ精品一区二区三区波| 午夜精品国产一区二区电影| 十八禁人妻一区二区| 色综合婷婷激情| 天堂√8在线中文| 成熟少妇高潮喷水视频| 女人高潮潮喷娇喘18禁视频| 成年人黄色毛片网站| 在线观看66精品国产| 国产免费现黄频在线看| 最新美女视频免费是黄的| 久久国产精品影院| 老熟女久久久| 成人精品一区二区免费| av电影中文网址| 亚洲美女黄片视频| 免费观看人在逋| 在线观看免费日韩欧美大片| 淫妇啪啪啪对白视频| 欧美+亚洲+日韩+国产| 亚洲精品粉嫩美女一区| 美女 人体艺术 gogo| 黄色成人免费大全| 1024香蕉在线观看| 久久久久久久久久久久大奶| av片东京热男人的天堂| 亚洲国产欧美网| 人妻 亚洲 视频| 欧美日韩亚洲国产一区二区在线观看 | 不卡一级毛片| 如日韩欧美国产精品一区二区三区| 高清欧美精品videossex| 极品教师在线免费播放| av国产精品久久久久影院| 亚洲成av片中文字幕在线观看| 久久草成人影院| 精品亚洲成国产av| 午夜精品久久久久久毛片777| 亚洲精品在线美女| 电影成人av| 欧美日韩瑟瑟在线播放| 99国产综合亚洲精品| 人人妻人人添人人爽欧美一区卜| 亚洲久久久国产精品| 18禁裸乳无遮挡动漫免费视频| 动漫黄色视频在线观看| 中文欧美无线码| 成人永久免费在线观看视频| 51午夜福利影视在线观看| 国精品久久久久久国模美| 99国产精品免费福利视频| 国产成人啪精品午夜网站| av欧美777| 99热网站在线观看| 国产成人系列免费观看| 免费在线观看亚洲国产| 91字幕亚洲| 在线观看免费日韩欧美大片| 亚洲三区欧美一区| 久久久久久久久久久久大奶| 免费日韩欧美在线观看| 久久99一区二区三区| 亚洲成人手机| 大陆偷拍与自拍| av天堂久久9| 亚洲第一青青草原| 欧美丝袜亚洲另类 | 午夜免费观看网址| 久久午夜综合久久蜜桃| 一级a爱片免费观看的视频| 免费在线观看亚洲国产| 国产一区二区三区视频了| 交换朋友夫妻互换小说| 老司机在亚洲福利影院| 性色av乱码一区二区三区2| 亚洲一区二区三区不卡视频| 满18在线观看网站| 97人妻天天添夜夜摸| 日韩熟女老妇一区二区性免费视频| 国产人伦9x9x在线观看| 伊人久久大香线蕉亚洲五| 国产精品自产拍在线观看55亚洲 | 少妇被粗大的猛进出69影院| e午夜精品久久久久久久| 两性午夜刺激爽爽歪歪视频在线观看 | 国产av一区二区精品久久| 日韩欧美三级三区| 99热国产这里只有精品6| 欧美不卡视频在线免费观看 | 亚洲精品乱久久久久久| 亚洲成人免费电影在线观看| 久久精品人人爽人人爽视色| 精品久久久久久久久久免费视频 | 国产精品永久免费网站| 久久久久久人人人人人| 精品国产一区二区三区久久久樱花| www.熟女人妻精品国产| av线在线观看网站| 成年人黄色毛片网站| 一级毛片高清免费大全| 91麻豆精品激情在线观看国产 | 午夜老司机福利片| 美女国产高潮福利片在线看| 99国产综合亚洲精品| 免费久久久久久久精品成人欧美视频| 日韩制服丝袜自拍偷拍| 天天添夜夜摸| 欧美激情久久久久久爽电影 | 一边摸一边抽搐一进一出视频| 18禁美女被吸乳视频| 免费观看精品视频网站| 日韩熟女老妇一区二区性免费视频| 精品国产一区二区久久| 国产亚洲av高清不卡| 欧美精品一区二区免费开放| 黄色成人免费大全| 亚洲熟女精品中文字幕| 曰老女人黄片| 99riav亚洲国产免费| 亚洲一区二区三区不卡视频| 精品国产一区二区三区久久久樱花| 美国免费a级毛片| 国产精品一区二区在线观看99| 91在线观看av| 国产精品一区二区在线观看99| 一本综合久久免费| 黄色视频,在线免费观看| 久久国产亚洲av麻豆专区| www.999成人在线观看| 国产日韩一区二区三区精品不卡| 久久久水蜜桃国产精品网| 精品久久久久久久久久免费视频 | 99热只有精品国产| 国内久久婷婷六月综合欲色啪| 午夜免费观看网址| 午夜久久久在线观看| 欧美老熟妇乱子伦牲交| 亚洲 欧美一区二区三区| 国产91精品成人一区二区三区| 精品国产一区二区久久| 国产又爽黄色视频| 正在播放国产对白刺激| 精品乱码久久久久久99久播| 成人精品一区二区免费| 中文字幕色久视频| 十八禁高潮呻吟视频| 精品国产一区二区久久| 久久国产精品男人的天堂亚洲| 最新在线观看一区二区三区| 日本欧美视频一区| 欧美丝袜亚洲另类 | 在线播放国产精品三级| 一a级毛片在线观看| 亚洲精品国产色婷婷电影| 91成人精品电影| 午夜久久久在线观看| 亚洲精品一二三| 国产精品欧美亚洲77777| 亚洲精品久久成人aⅴ小说| 黑人欧美特级aaaaaa片| 久久精品人人爽人人爽视色| 天天躁日日躁夜夜躁夜夜| 大型av网站在线播放| 亚洲一区中文字幕在线| 制服诱惑二区| 激情视频va一区二区三区| 精品熟女少妇八av免费久了| 精品人妻1区二区| 免费不卡黄色视频| av视频免费观看在线观看| 成人18禁在线播放| 欧美午夜高清在线| 9色porny在线观看| 国产av精品麻豆| 日日摸夜夜添夜夜添小说| 少妇裸体淫交视频免费看高清 | 久久久水蜜桃国产精品网| 亚洲欧美日韩高清在线视频| 黄色视频不卡| 亚洲自偷自拍图片 自拍| 日韩视频一区二区在线观看| av免费在线观看网站| 久久久国产成人免费| 女人被躁到高潮嗷嗷叫费观| 老司机午夜福利在线观看视频| 搡老岳熟女国产| 久久人妻av系列| 午夜福利一区二区在线看| 9色porny在线观看| 日韩欧美三级三区| 好看av亚洲va欧美ⅴa在| 中亚洲国语对白在线视频| 美女国产高潮福利片在线看| 90打野战视频偷拍视频| 水蜜桃什么品种好| 99香蕉大伊视频| 村上凉子中文字幕在线| 国产片内射在线| 视频区欧美日本亚洲| 两性午夜刺激爽爽歪歪视频在线观看 | 日本欧美视频一区| 精品第一国产精品| 国产一区二区三区综合在线观看| 韩国av一区二区三区四区| 亚洲av电影在线进入| 97人妻天天添夜夜摸| av福利片在线| 精品卡一卡二卡四卡免费| 精品国产一区二区三区四区第35| 自拍欧美九色日韩亚洲蝌蚪91| 人人妻人人爽人人添夜夜欢视频| 午夜免费鲁丝| а√天堂www在线а√下载 | 亚洲一区二区三区欧美精品| 亚洲欧美精品综合一区二区三区| 视频区图区小说| 精品一品国产午夜福利视频| 高清在线国产一区| 他把我摸到了高潮在线观看| 精品欧美一区二区三区在线| 日韩 欧美 亚洲 中文字幕| 很黄的视频免费| 久久人人97超碰香蕉20202| 国产精品成人在线| 91九色精品人成在线观看| 亚洲av日韩精品久久久久久密| 91大片在线观看| 一进一出好大好爽视频| 国产成人免费观看mmmm| 十八禁高潮呻吟视频| 成人黄色视频免费在线看| 午夜两性在线视频| 69av精品久久久久久| 国精品久久久久久国模美| 在线观看免费视频网站a站| 人人妻人人澡人人看| 精品电影一区二区在线| 欧美日韩成人在线一区二区| 亚洲欧美激情在线| 欧美在线一区亚洲| 亚洲一区中文字幕在线| 少妇裸体淫交视频免费看高清 | 男人舔女人的私密视频| 三级毛片av免费| 日韩欧美一区视频在线观看| 久久影院123| 欧美日韩亚洲综合一区二区三区_| 欧美性长视频在线观看| 69精品国产乱码久久久| 精品一品国产午夜福利视频| 正在播放国产对白刺激| 久久人妻福利社区极品人妻图片| 亚洲三区欧美一区| 18禁黄网站禁片午夜丰满| 久久精品国产亚洲av香蕉五月 | 中文字幕人妻丝袜一区二区| 两个人看的免费小视频| videosex国产| 黑人操中国人逼视频| 大香蕉久久成人网| 亚洲第一av免费看| 色尼玛亚洲综合影院| 黑丝袜美女国产一区| 国产亚洲一区二区精品| 在线观看免费日韩欧美大片| 欧美 日韩 精品 国产| 久久午夜亚洲精品久久| av网站免费在线观看视频| 中文字幕高清在线视频| 欧美激情 高清一区二区三区| 最新美女视频免费是黄的| 国产主播在线观看一区二区| 成人18禁在线播放| 精品一区二区三卡| e午夜精品久久久久久久| 在线视频色国产色| 精品一区二区三区四区五区乱码| 日韩欧美一区视频在线观看| 色综合欧美亚洲国产小说| 韩国精品一区二区三区| 亚洲免费av在线视频| 极品少妇高潮喷水抽搐| 91麻豆av在线| 国产一区有黄有色的免费视频| 欧美一级毛片孕妇| 91成人精品电影| 操美女的视频在线观看| 国产深夜福利视频在线观看| 国产精品久久久久久人妻精品电影| 一级毛片高清免费大全| 亚洲九九香蕉| 高清欧美精品videossex| 老司机影院毛片| 97人妻天天添夜夜摸| 精品熟女少妇八av免费久了| 精品国产美女av久久久久小说| 无限看片的www在线观看| 免费人成视频x8x8入口观看| www.自偷自拍.com| 成人影院久久| 国产精品九九99| 中文亚洲av片在线观看爽 | 欧美日韩黄片免| 校园春色视频在线观看| 中文字幕人妻丝袜一区二区| 下体分泌物呈黄色| 香蕉国产在线看| 两个人免费观看高清视频| 久久精品亚洲精品国产色婷小说| 国产黄色免费在线视频| 欧美在线黄色| netflix在线观看网站|