• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures

    2022-08-24 12:56:38MahmoudRagabandAliAltalbe
    Computers Materials&Continua 2022年7期

    Mahmoud Ragaband Ali Altalbe

    1Information Technology Department, Faculty of Computing and Information Technology, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    2Center of Artificial Intelligence for Precision Medicines, King Abdulaziz University, Jeddah, 21589, Saudi Arabia

    3Mathematics Department, Faculty of Science, Al-Azhar University, Naser City, 11884, Cairo, Egypt

    Abstract: Due to the drastic increase in the number of critical infrastructures like nuclear plants, industrial control systems (ICS), transportation, it becomes highly vulnerable to several attacks.They become the major targets of cyberattacks due to the increase in number of interconnections with other networks.Several research works have focused on the design of intrusion detection systems(IDS) using machine learning (ML) and deep learning (DL)models.At the same time, Blockchain (BC) technology can be applied to improve the security level.In order to resolve the security issues that exist in the critical infrastructures and ICS, this study designs a novel BC with deep learning empowered cyber-attack detection (BDLE-CAD) in critical infrastructures and ICS.The proposed BDLE-CAD technique aims to identify the existence of intrusions in the network.In addition, the presented enhanced chimp optimization based feature selection (ECOA-FS) technique is applied for the selection of optimal subset of features.Moreover, the optimal deep neural network (DNN) with search and rescue (SAR) optimizer is applied for the detection and classification of intrusions.Furthermore, a BC enabled integrity checking scheme (BEICS) has been presented to defend against the misrouting attacks.The experimental result analysis of the BDLE-CAD technique takes place and the results are inspected under varying aspects.The simulation analysis pointed out the supremacy of the BDLE-CAD technique over the recent state of art techniques with the accuyof 92.63%.

    Keywords: BC; internet of critical infrastructure; ids; deep learning; security;deep neural network; machine learning

    1 Introduction

    Critical infrastructure system has been utilized for underpinningthe functions of an economy and society.Also, it ranges from conventionally-defined physical assets to a broader description of current assets in the fields of agriculture, gas, transportation, water supply, electricity, telecommunication,public health, security services, and so on [1].Such transformation is mainly because of the extensive utilization of Internet of Things (IoT) and their considerable aid for critical infrastructure systems in industry 4.0 [2].The IoT system has become essential part of critical infrastructure in industry 4.0,which creates smart services like smart grids and offers numerous benefits for efficiencies and cost savings.The international data corporation (IDC) have predicted that there would be an estimation of 41.6 billion interconnected IoT device, which generate 79.4 zettabytes (ZB) by 2025 [3].

    The industrial control system (ICS) is the core of critical infrastructure system [4].It is largely accountable for supervisory control and data collection (SCADA), which monitors the control flows and processes of data in industry.The possible application areas of critical infrastructure with IoT are shown in Fig.1 [5].The wider adaption of Internet connected IoT devices have offered different challenges to critical infrastructure.Initially, ICS was mainly developed for a closed infrastructure and proprietary without taking care of security problems into account, since conventional critical infrastructure is kind of isolated and is invulnerable to cyber-attacks.With this infrastructure being interconnected to the Internet via IoT system, a wide-ranging of cyberattacks, including malware,Man-in-the-middle attack, distributed denial-of service (DDoS), Brute force, breach, and phishing attacks are threatening the process of ICS [6,7].The compromised ICS by cyber attackers might generate possible risk for the loss of information [8].Next, scalability is another challenge where ICS wasn’t initially developed to resolve.Assuming the dramatic growth in the volume of data and the number of IoT devices they are analyzing and collecting, the centralized method for data analysis and collection has become a bottleneck of ICS.A decentralized method is crucially needed to satisfy the evolving needs of ICS.

    Figure 1: Application areas of critical infrastructures with IoT

    Blockchain (BC) and Artificial intelligence (AI) have their own benefits, but, all of them have relative drawbacks.BC has problems relating to scalability, security, energy consumption, efficiency,and privacy, whereas AI systems face problems like effectiveness and interpretability.As two distinct directions of research, they could be associated with one another and have the benefits of natural integration.Both techniques have shared requirements for data trust, analysis, and security, and they could empower one another [9].For example, AI technique based on three most important components: computing power, data, and algorithms, and the BC could break the island of data and realize the flow of data resources, algorithms, and computing power, according to its specific features, involving immutability, anonymization, and decentralization.Additionally, BC could ensure the audit traceability and credibility of AI and the credibility of the original data.Furthermore, BC could record the decision-making of AI that assists in analyzing and understanding the behaviour of AI and eventually promote the decision-making of AI, which makes it more explainable, trustworthy,and transparent.The AI technique could improve the BC construction for making it more efficient,secure, and energy-saving [10].

    Gumaei et al.[11] presented an architecture which integrates a BC with a deep recurrent neural network (DRNN) and edge computing for 5G-enabled assisted mode detection and drone identification.In the presented approach, raw RF signals of dissimilar drones under various flight modes are collected and sensed remotely on a cloud framework for training a DRNN method and allocate the training models on edge devices to detect their flight modes and drones.BC is utilized in this architecture for securing data transmission and integrity.Alkadi et al.[12] presented a DBF to provide security-based privacy-based BC and distributed IDS with smart contracts in IoT networks.The IDS is applied by a BiLSTM-DL method for handling sequential network data and is measured by the data sets.The smart contract and privacy-based BC methodologies are designed by utilizing the Ethereum library to offer security to the distributed IDS engine.

    Singh et al.[13] introduced a DL-based IoT-based framework for a secured smart city in which BC provides a distributed platform at the transmission stage of software defined networks (SDN) and cyber-physical systems (CPS) established the protocol for forwarding information.A DL based cloud is employed at the application layer for resolving transmission scalability, centralization, and latency.Zhang et al.[14] presented an edge intelligence and BC enabled industrial IoT architecture that attains secure and flexible edge service management.Next, developed a credit-differentiated edge transaction approval method and present a cross-domain sharing inspired edge resource scheduling system.

    This study designs a novel BC with deep learning empowered cyber-attack detection (BDLECAD) in critical infrastructures and ICS.The proposed BDLE-CAD technique aims to identify the existence of intrusions in the network.In addition, the presented enhanced chimp optimization based feature selection (ECOA-FS) technique is applied for the selection of optimal subset of features.Moreover, the optimal deep neural network (DNN) with search and rescue (SAR) optimizer is applied for the detection and classification of intrusions.Furthermore, a BC enabled integrity checking scheme (BEICS) has been presented to defend the misrouting attacks.The experimental result analysis of the BDLE-CAD technique takes place and the results are inspected under varying aspects.

    2 The Proposed Model

    In this study, a new BDLE-CAD technique has been developed to identify the existence of intrusions in critical infrastructures.The proposed BDLE-CAD technique encompasses ECOA-FS technique for the selection of optimal subset of features.Moreover, the DNN with SAR optimizer is can be used as a classifier and the BEICS has been presented to defend over the misrouting attacks.The experimental result analysis of the BDLE-CAD technique takes place and the results are inspected under varying aspects.

    2.1 ECOA Based Feature Selection

    Primarily, the ECOA-FS technique is executed to choose the optimal subset of features.The chimp optimization algorithm (COA) is a mathematical method that is dependent upon intelligent diversity[15].Drive, chase, block, and attack are capable of 4 distinct kinds of chimps that are realized by attacker, obstacle, chaser, and driver.The 4 hunting stages are finalized in 2 phases.In primary stage is the exploration step, and the second step is the exploitation phase.The exploration phase contains driving, blocking, and chasing the prey.Since the exploitation step, it has attacked the prey.Where the drive and chase are demonstrated as in Eqs.(1) and (2).

    whereXpreyimplies the vector of prey place,xchimprefers the vector of chimp place,tstands for the amount of present iterations,a,c,mrepresents the coefficient vector and it is attained with Eqs.(3)-(5).

    wherefimplies the non-linearly declined in 2.5 to 0,r1andr2refers the arbitrary number amongstzeroand one, andmrefers the chaotic vector.The dynamic coefficientfhas chosen to distinct curve as well as slope, so the chimps are utilizing distinct capabilities for searching the prey.The chimps are upgrading their places dependent upon another chimp, and this mathematical method is signified by Eqs.(6) and (8).

    In ECOA, the extremely disruptive polynomial mutation is increased version of polynomial mutation technique [16].It could resolve the limitation that polynomial mutation technique is fall as to local optimal once the variable is nearby boundary.In Eqs.(9)-(12) illustrate the procedure of HDPM modifies thexi

    whereubandlbdefine the upper and lower boundaries of the search spaces.rsignifies the arbitrary number amongst zero and one.ηmrefers the distribution exponential that is a non-negative number.Since it is clear that the previous formula, HDPM is exploring the total search space.

    In contrast to the classical ECOA, in which the update of solutions takes place in the search area in the direction of continuous value location.However, in the BECOA, the searching area can be defined byndimension Boolean lattice.In addition, the solutions get updated using the corner of a hypercube.Moreover, for selecting the features, 1 represents the selection of features, otherwise 0.In addition, the BECOA derived a fitness function in determining the solutions for maintaining a tradeoff between a pair of objectives, as given in Eq.(13):

    ΔR(D) denotes the error of the classifier, |Y| represents the subset size, and |T| indicates the total number of features that exist in the dataset.Besides,α signifies a variable∈[0, 1] related to the weight of the classification error level, and β= 1 -α symbolizes the significance of reduction feature.

    2.2 Optimal DNN Based Intrusion Detection and Classification

    At this stage, the chosen features are passed into the DNN model for intrusion classification.The DNN is an ANN that consists of input, hidden, and output layers.The hidden layer applies a group of non-linear functions and it can be demonstrated as follows [17]:

    wherexrefers the input of all nodes,Wand bias signifies the weight as well as bias vectors correspondingly andsigimplies the sigmoid activation functions, for instance,.During the presented optimizing DNN, 2 hidden layers are assumed and for minimizing the MAE of DNN,optimum selective of weight matrices are required in order, at this point SAR has been employed.The searching and rescuing function has important 2 stages, for instance, social as well as individual phases.In the searching procedure, the set members collect the clues.The clues left under the search by group members were saved from the memory matrix (O) but the human place is saved from the place matrix (W).The clue matrixBwith sizeN*Dthat has of left clues and the human places are expressed as:

    The 2 steps of human search are demonstrated as follows.i) Social step: The search way has provided bySDi= (Wi-Bk) whereki.A novel solution has been created utilizing the formula.

    Atthis pointf(Bi) &f(Wi)denotes the FF values toBi&Wi,r1andr2indicates the arbitrary numbers from the range [-1, 1] and [0,1], the SE is technique parameter range amongst zero and one.

    ii) Individual step: According to the present place humans identify its novel place and novel place ofithhuman is provided as [18]:

    Every solution is placed from the solution spaces, once the novel place is outer the solution space then it can be enhanced utilizing the formula

    whereMEnisnrhhas saved clue place from thememorymatrix andnrrefers the arbitrary integer number ranging amongst [1,N].During the clue search procedure, once optimum clues are not initiated nearby the present place a specific amount of searches, human goes to novel place.For modeling, this, primary,the USN is fixed 0 to all humans.

    Once the USN value is superior to the maximal unsuccessful searching number, the human becomes an arbitrary place from the searching space utilized in Eq.(21), and the value ofUSNiis fixed 0 to that human.

    wherer4ranges from the intervalzeroand one.

    2.3 Process Involved in BEICS

    The BC [19] is a major component of the integrity verification system.The primary concept is to offer a solution in which that every flow produced from the controller is saved in a verifiable and immutable dataset.The BC includes a series of blocks interconnected to one another via hash values.At the BC network, the users contain a pair of keys namely private key for signing the BC transaction and public key for representing the irreplaceable address.The client signed a transaction by the use of private key and transmit it to the other ones in the network for verification.Once the broadcasting block gets verified, it is added to the BC.If it is saved, the data in the provided blocks could not be modified with no changes of all succeeding blocks.Besides, the data is present in many hosts concurrently, therefore, the modifications can be discarded by the peer hosts.Here, a private BC has been presented in contrast to a public BC.The private BC decides who can get participated in the network and represented actions as well as permissions allotted identifiable applicants.Therefore, it limits the need for consensus mechanisms like Proof of Work.Fig.2 shows the structure of BC.

    Figure 2: Structure of BC

    3 Experimental Validation

    In this section, the performance validation of the BDLE-CDE technique takes place using benchmark dataset [20], which comprises 1000’s different classes of events.The dataset contains binary (Natural and Attack) and multiclass (No event, Natural, and Attack) labels.Tab.1 provides a detailed result analysis of the BDLE-CDE technique on the binary class dataset.

    Table 1: Results analysis of proposed BDLE-CAD model on binary class dataset

    Fig.3 offers a briefprecnandrecalanalysis of the BDLE-CDE technique under distinct subdata on binary class dataset.The figure revealed that the BDLE-CDE technique has attained increased valuesofprecnandrecal.For instance,with subdata-1,the BDLE-CDE technique has offeredprecnandrecalof 96.89% and 97.47% respectively.Meanwhile, with subdata-10, the BDLE-CDE technique has providedprecnandrecalof 97.80% and 97.97% respectively.Eventually, with subdata-15, the BDLECDE technique has demonstratedprecnandrecalof 97.76% and 97.04% respectively.

    Figure 3: Prenand Reclanalysis of BDLE-CDE technique on binary dataset

    Fig.4 exhibits a detailedspecyandFscoreanalysis of the BDLE-CDE technique under distinct subdata on binary class dataset.The figure shows that the BDLE-CDE technique has accomplished superior values ofspecyandFscore.For instance, with subdata-1, the BDLE-CDE technique has demonstratedspecyandFscoreof 99.02% and 97.10% respectively.Moreover, with subdata-10, the BDLE-CDE technique has gainedspecyandFscoreof 99.37% and 97.23% respectively.Furthermore,with subdata-15, the BDLE-CDE technique has reachedspecyandFscoreof 99.28% and 96.90%respectively.

    Figure 4: Specyand Fscoreanalysis of BDLE-CDE technique on binary dataset

    Fig.5 portrays theaccuyanalysis of the BDLE-CDE technique on the test binary dataset.The results show that the BDLE-CDE technique has gained a loweraccuyof 98.30% on subdata-7 and higheraccuyof 98.91% on subdata-14.Therefore, it is ensured that the BDLE-CDE technique has effectually classified binary classes.

    Figure 5: Accuyanalysis of BDLE-CDE technique on binary dataset

    Tab.2 offers a comprehensive comparison study of the BDLE-CDE technique on the multi class dataset.

    Table 2: Results analysis of proposed BDLE-CAD model on multiclass dataset

    Fig.6 showcases a briefprecnandrecalanalysis of the BDLE-CDE technique under distinct subdata on multi class datasets.The figure discovered that the BDLE-CDE technique has attained increased values ofprecnandrecal.For instance, with subdata-1, the BDLE-CDE technique has presentedprecnandrecalof 79% and 92.09% respectively.Meanwhile, with subdata-10, the BDLECDE technique has deliveredprecnandrecalof 83.37% and 92.39% respectively.Finally, with subdata-15, the BDLE-CDE technique has demonstratedprecnandrecalof 78.62% and 89.25% respectively.

    Figure 6: Prenand Reclanalysis of BDLE-CDE technique on multiclass dataset

    Fig.7 reveals a detailedspecyandFscoreanalysis of the BDLE-CDE technique under distinct subdata on multi class datasets.The figure displayed that the BDLE-CDE technique has resulted in maximum values ofspecyandFscore.For instance, with subdata-1, the BDLE-CDE technique has demonstratedspecyandFscoreof 93.46% and 80.55% respectively.Moreover, with subdata-10, the BDLE-CDE technique has gainedspecyandFscoreof 93.87% and 80.67% respectively.Furthermore,with subdata-15, the BDLE-CDE technique has reachedspecyandFscoreof 93.75% and 82.46%respectively.

    Figure 7: Specyand Fscoreanalysis of BDLE-CDE technique on multiclass dataset

    Fig.8 shows theaccuyanalysis of the BDLE-CDE technique on the test binary dataset.The figure reported that the BDLE-CDE technique has gained a loweraccuyof 91.01% on subdata-14 and higheraccuyof 93.98% on subdata-4.Therefore, it is ensured that the BDLE-CDE technique has effectually classified multiple classes.

    Figure 8: AccuyBDLE-CDE technique on binary dataset

    Tab.3 offers a detailed comparative study of the BDLE-CDE technique with recent methods [21].A comparative classification result analysis of the BDLE-CDE technique on the binary class dataset is depicted in Fig.9.The results exposed that the Nearest Neighbor (NN), random forest (RF), and SVM models have obtained loweraccuyof 71.56%, 80.61%, and 78.84% respectively.At the same time,the KNN,Adaboost+JRip,and JRip models have obtained moderateaccuyvaluesof95.49%,95.56%,and 90.10%.However, the BDLE-CDE technique has resulted in increasedaccuyof 98.63%.

    Table 3: Comparative accuracy analysis of BDLE-CAD model on binary and multiclass dataset

    Figure 9: Comparative Accuyanalysis of BDLE-CDE technique on binary dataset

    Detailed multiclass performance analysis of the BDLE-CDE technique on the multi class dataset is offered in Fig.10.The experimental values illustrated that the Nearest Neighbor (NN), random forest (RF), and SVM models have gained reducedaccuyof 77.33%, 80.51%, and 78.56% respectively.Moreover, the KNN, Adaboost+JRip, and JRip models have obtained moderateaccuyvalues of 87.66%, 91.44%, and 90.09%.However, the BDLE-CDE technique has accomplished superioraccuyof 92.63%.From these results and discussion, it can be ensured that the BDLE-CDE technique has the ability to attain maximum performance over the other compared methods.

    Figure 10: Comparative Accuyanalysis of BDLE-CDE technique on multiclass dataset

    4 Conclusion

    In this study, a new BDLE-CAD technique has been developed to identify the existence of intrusions in critical infrastructures.The proposed BDLE-CAD technique encompasses ECOA-FS technique for the selection of optimal subset of features.Moreover, the DNN with SAR optimizer is can be used as a classifier and the BEICS has been presented to defend over the misrouting attacks.The experimental result analysis of the BDLE-CAD technique takes place and the results are inspected under varying aspects.The simulation analysis pointed out the supremacy of the BDLECAD technique over the recent state of art techniques with the accomplished superioraccuyof92.63%.Therefore, the BDLE-CAD technique can be utilized as a proficient tool to detect intrusions in the network.In future, clustering and outlier detection approaches can be designed to boost the detection performance.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the Project Number (IFPIP-145-351-1442) and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

    Funding Statement:This project was supported financially by Institution Fund projects under Grant No.(IFPIP-145-351-1442).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲av成人精品一区久久| 国产人妻一区二区三区在| 99久久精品热视频| 三级经典国产精品| 真人做人爱边吃奶动态| 久久久国产成人免费| 黑人高潮一二区| 午夜影院日韩av| 真实男女啪啪啪动态图| av卡一久久| 天堂动漫精品| 大型黄色视频在线免费观看| 日韩,欧美,国产一区二区三区 | 国内精品宾馆在线| 岛国在线免费视频观看| 国产精品三级大全| 色吧在线观看| 女生性感内裤真人,穿戴方法视频| 少妇裸体淫交视频免费看高清| 嫩草影院入口| 麻豆乱淫一区二区| 男女那种视频在线观看| 欧美不卡视频在线免费观看| 国产av在哪里看| 久久久成人免费电影| 床上黄色一级片| 国产高清有码在线观看视频| 51国产日韩欧美| 麻豆国产av国片精品| 男女视频在线观看网站免费| 99热全是精品| 精品久久久久久久久久免费视频| 99久久精品一区二区三区| 亚洲av电影不卡..在线观看| 国产成人a∨麻豆精品| 麻豆久久精品国产亚洲av| 国产免费男女视频| 啦啦啦韩国在线观看视频| 男人的好看免费观看在线视频| av国产免费在线观看| 别揉我奶头~嗯~啊~动态视频| 九色成人免费人妻av| 婷婷精品国产亚洲av在线| 久久久久久久亚洲中文字幕| 成人亚洲精品av一区二区| 性欧美人与动物交配| 国产精品嫩草影院av在线观看| 欧美一区二区国产精品久久精品| 中文字幕av成人在线电影| 久久人妻av系列| 国产单亲对白刺激| 国内精品宾馆在线| 午夜免费激情av| av卡一久久| 日韩成人av中文字幕在线观看 | 国产精华一区二区三区| 日韩强制内射视频| 久久精品综合一区二区三区| 亚洲自偷自拍三级| 免费不卡的大黄色大毛片视频在线观看 | 天天一区二区日本电影三级| 熟女人妻精品中文字幕| 国产高清激情床上av| 此物有八面人人有两片| 91狼人影院| 亚洲精品乱码久久久v下载方式| 在线看三级毛片| 春色校园在线视频观看| 日本精品一区二区三区蜜桃| 午夜福利18| 欧美又色又爽又黄视频| 三级国产精品欧美在线观看| 亚洲中文字幕日韩| 高清午夜精品一区二区三区 | 九色成人免费人妻av| 一级毛片我不卡| 日韩高清综合在线| 春色校园在线视频观看| 久99久视频精品免费| 亚洲图色成人| 男女那种视频在线观看| 国产综合懂色| 亚洲最大成人手机在线| 听说在线观看完整版免费高清| 少妇丰满av| 黄片wwwwww| 搡老岳熟女国产| 草草在线视频免费看| 久久精品国产自在天天线| 精品人妻视频免费看| 午夜福利18| 国产av在哪里看| 午夜影院日韩av| 色在线成人网| avwww免费| 精品久久国产蜜桃| 亚洲最大成人手机在线| 欧美潮喷喷水| 两个人的视频大全免费| 一进一出好大好爽视频| 一夜夜www| 热99re8久久精品国产| 精品久久久久久久久久免费视频| 亚洲成人av在线免费| av中文乱码字幕在线| 国产一区二区在线av高清观看| 18禁裸乳无遮挡免费网站照片| 色av中文字幕| 国产精品99久久久久久久久| 嫩草影视91久久| 亚洲熟妇中文字幕五十中出| 国产高清有码在线观看视频| 免费在线观看成人毛片| 日韩在线高清观看一区二区三区| 亚洲精品日韩在线中文字幕 | 久久中文看片网| 久久6这里有精品| 色视频www国产| 天堂av国产一区二区熟女人妻| 欧美日韩一区二区视频在线观看视频在线 | 亚洲精品久久国产高清桃花| 天堂影院成人在线观看| 99精品在免费线老司机午夜| 国产中年淑女户外野战色| 亚洲国产精品国产精品| 亚洲电影在线观看av| 国产精品av视频在线免费观看| 少妇裸体淫交视频免费看高清| 一级黄片播放器| 精品国内亚洲2022精品成人| 97碰自拍视频| 听说在线观看完整版免费高清| 夜夜爽天天搞| 午夜免费激情av| 国产精品一区www在线观看| 成人二区视频| 可以在线观看毛片的网站| 成人永久免费在线观看视频| 身体一侧抽搐| 大型黄色视频在线免费观看| 亚洲美女视频黄频| 精品久久久久久久久av| 国产黄色视频一区二区在线观看 | 久久精品国产亚洲av涩爱 | 午夜福利在线在线| 有码 亚洲区| 在线免费十八禁| 久久久久久久亚洲中文字幕| 国产高潮美女av| 国产高清视频在线观看网站| 久久精品夜色国产| 人人妻人人看人人澡| 看十八女毛片水多多多| 免费av毛片视频| 国产黄片美女视频| 欧美一区二区精品小视频在线| 美女大奶头视频| 舔av片在线| 国产中年淑女户外野战色| 午夜视频国产福利| 国产爱豆传媒在线观看| 亚洲成人中文字幕在线播放| 久久久午夜欧美精品| 五月伊人婷婷丁香| 深夜a级毛片| 亚洲欧美日韩无卡精品| 热99在线观看视频| 色吧在线观看| 亚洲精品粉嫩美女一区| 国产一区二区三区在线臀色熟女| 亚洲欧美日韩卡通动漫| 男人的好看免费观看在线视频| 三级毛片av免费| 女的被弄到高潮叫床怎么办| 欧美丝袜亚洲另类| 久久精品国产99精品国产亚洲性色| 看黄色毛片网站| 国产男靠女视频免费网站| 激情 狠狠 欧美| 国产亚洲欧美98| 一区二区三区四区激情视频 | 日本熟妇午夜| 国产高清视频在线观看网站| 久久久国产成人免费| 亚洲人成网站高清观看| 成人av一区二区三区在线看| 欧美性猛交╳xxx乱大交人| 日本黄色片子视频| 免费看光身美女| 国产女主播在线喷水免费视频网站 | 美女大奶头视频| av视频在线观看入口| 日产精品乱码卡一卡2卡三| 两个人视频免费观看高清| av在线老鸭窝| 18禁黄网站禁片免费观看直播| 18禁裸乳无遮挡免费网站照片| 真实男女啪啪啪动态图| 亚洲中文字幕日韩| 搡老妇女老女人老熟妇| 99久国产av精品| 伦精品一区二区三区| 99热网站在线观看| 国产单亲对白刺激| 男女啪啪激烈高潮av片| 久久国内精品自在自线图片| 黄色配什么色好看| 91久久精品国产一区二区三区| 人妻久久中文字幕网| 国产午夜福利久久久久久| 少妇裸体淫交视频免费看高清| 国产高清三级在线| 一a级毛片在线观看| 简卡轻食公司| 精品不卡国产一区二区三区| 91久久精品国产一区二区三区| 久久久久精品国产欧美久久久| 久久久午夜欧美精品| 国模一区二区三区四区视频| 国产精品亚洲美女久久久| 亚洲精品色激情综合| 一级av片app| 人妻夜夜爽99麻豆av| 成人午夜高清在线视频| 亚洲国产日韩欧美精品在线观看| 九色成人免费人妻av| 成年av动漫网址| 大型黄色视频在线免费观看| 99久国产av精品国产电影| 伦精品一区二区三区| 精品午夜福利在线看| 如何舔出高潮| 国产三级在线视频| 狂野欧美白嫩少妇大欣赏| 在线观看66精品国产| 淫秽高清视频在线观看| 联通29元200g的流量卡| 看非洲黑人一级黄片| 精品免费久久久久久久清纯| 久久国内精品自在自线图片| 亚洲在线自拍视频| 欧美激情国产日韩精品一区| 日本免费一区二区三区高清不卡| 国产一区二区三区av在线 | 精品一区二区免费观看| 美女xxoo啪啪120秒动态图| 国产黄色视频一区二区在线观看 | 亚洲婷婷狠狠爱综合网| 直男gayav资源| 国产午夜福利久久久久久| АⅤ资源中文在线天堂| 51国产日韩欧美| 欧美+日韩+精品| 国产不卡一卡二| 少妇猛男粗大的猛烈进出视频 | 女人被狂操c到高潮| 国产精品一区二区性色av| 色播亚洲综合网| 日韩在线高清观看一区二区三区| 国产精品三级大全| 中文字幕久久专区| 91麻豆精品激情在线观看国产| 熟女人妻精品中文字幕| 日本熟妇午夜| 精品乱码久久久久久99久播| 亚洲欧美中文字幕日韩二区| 在线国产一区二区在线| 一区福利在线观看| 午夜福利视频1000在线观看| 国产精品野战在线观看| 久久欧美精品欧美久久欧美| 国产黄色小视频在线观看| 亚洲一区高清亚洲精品| 婷婷精品国产亚洲av| 日韩欧美一区二区三区在线观看| 美女cb高潮喷水在线观看| 又黄又爽又刺激的免费视频.| 国产精品一区二区性色av| 97在线视频观看| 热99re8久久精品国产| 搡老熟女国产l中国老女人| 国产一区二区三区av在线 | 插阴视频在线观看视频| 国产伦精品一区二区三区四那| 亚洲av中文av极速乱| 狠狠狠狠99中文字幕| 中文字幕精品亚洲无线码一区| 人妻久久中文字幕网| 特大巨黑吊av在线直播| 成年女人毛片免费观看观看9| 一区二区三区高清视频在线| 久久久久久久久大av| 国内精品宾馆在线| 欧美最黄视频在线播放免费| 亚洲av中文av极速乱| 最近中文字幕高清免费大全6| 欧美另类亚洲清纯唯美| 国语自产精品视频在线第100页| 久久久久久久久大av| 成人av在线播放网站| 亚洲无线观看免费| 男人舔女人下体高潮全视频| 国产人妻一区二区三区在| 国产亚洲精品久久久久久毛片| 天美传媒精品一区二区| 国产亚洲精品综合一区在线观看| 九色成人免费人妻av| 国产又黄又爽又无遮挡在线| 亚洲欧美精品自产自拍| 搡老妇女老女人老熟妇| 欧美激情国产日韩精品一区| 亚洲av一区综合| av专区在线播放| 国产精品国产三级国产av玫瑰| 特大巨黑吊av在线直播| 婷婷色综合大香蕉| 免费看av在线观看网站| 无遮挡黄片免费观看| 国产美女午夜福利| 天天躁夜夜躁狠狠久久av| 99久国产av精品国产电影| 在线观看66精品国产| 欧美激情在线99| 熟妇人妻久久中文字幕3abv| 听说在线观看完整版免费高清| av专区在线播放| 国产成年人精品一区二区| 国产精品永久免费网站| 久久99热这里只有精品18| 欧美极品一区二区三区四区| 国产男靠女视频免费网站| 插阴视频在线观看视频| 亚洲人成网站在线播放欧美日韩| 久久久久九九精品影院| 熟女电影av网| 久久久久国内视频| 国产高清不卡午夜福利| 卡戴珊不雅视频在线播放| 国产成人freesex在线 | 亚洲色图av天堂| 欧美日韩乱码在线| 国产探花在线观看一区二区| 床上黄色一级片| 亚洲在线观看片| 男女做爰动态图高潮gif福利片| 男人狂女人下面高潮的视频| 日本色播在线视频| 老司机福利观看| 国产真实伦视频高清在线观看| a级毛色黄片| 男人舔奶头视频| 亚洲人与动物交配视频| 又粗又爽又猛毛片免费看| 精品欧美国产一区二区三| 国产精品亚洲一级av第二区| 在线观看午夜福利视频| 亚洲无线观看免费| 国产高清视频在线观看网站| 在线免费观看不下载黄p国产| 精品少妇黑人巨大在线播放 | 亚洲高清免费不卡视频| 国产高清三级在线| 国产三级中文精品| 舔av片在线| 国产av一区在线观看免费| 波多野结衣高清无吗| 日韩高清综合在线| 日韩在线高清观看一区二区三区| 国产不卡一卡二| 欧美色视频一区免费| 亚洲,欧美,日韩| 国产私拍福利视频在线观看| 秋霞在线观看毛片| 免费无遮挡裸体视频| 99在线人妻在线中文字幕| 老司机午夜福利在线观看视频| 欧美日韩综合久久久久久| 丝袜美腿在线中文| 在线a可以看的网站| 一区二区三区免费毛片| 你懂的网址亚洲精品在线观看 | 欧美日韩乱码在线| 黄色一级大片看看| 毛片一级片免费看久久久久| 亚洲人成网站在线播放欧美日韩| 男人和女人高潮做爰伦理| 精品一区二区三区人妻视频| 精品一区二区三区视频在线| 22中文网久久字幕| 国产视频内射| av国产免费在线观看| 老司机福利观看| 男女下面进入的视频免费午夜| 欧美高清性xxxxhd video| 国产伦精品一区二区三区视频9| 直男gayav资源| 日韩制服骚丝袜av| 国产aⅴ精品一区二区三区波| 国产精品免费一区二区三区在线| 大又大粗又爽又黄少妇毛片口| 十八禁网站免费在线| 亚洲av成人精品一区久久| 99久久中文字幕三级久久日本| av黄色大香蕉| 亚洲18禁久久av| 黄色欧美视频在线观看| 欧美性猛交黑人性爽| 亚洲精华国产精华液的使用体验 | 我要搜黄色片| 床上黄色一级片| 国产精品美女特级片免费视频播放器| 真人做人爱边吃奶动态| 中文字幕av成人在线电影| 日韩一本色道免费dvd| 亚洲精品成人久久久久久| 麻豆成人午夜福利视频| 午夜福利在线观看免费完整高清在 | 欧美日韩综合久久久久久| 亚洲最大成人av| 亚洲一区高清亚洲精品| 成年女人看的毛片在线观看| 日本爱情动作片www.在线观看 | 日韩制服骚丝袜av| 久久精品国产亚洲网站| 免费观看在线日韩| 一个人免费在线观看电影| 日本一本二区三区精品| 少妇被粗大猛烈的视频| 国产成人影院久久av| 亚洲最大成人中文| 久久久久久国产a免费观看| 亚洲图色成人| 国产精品福利在线免费观看| 久久国内精品自在自线图片| 少妇熟女aⅴ在线视频| 变态另类丝袜制服| 欧美高清性xxxxhd video| 人人妻人人澡欧美一区二区| 国产亚洲精品久久久com| 不卡视频在线观看欧美| 99热网站在线观看| a级毛色黄片| 小说图片视频综合网站| 一夜夜www| 亚洲欧美日韩高清在线视频| avwww免费| 国产视频内射| 1000部很黄的大片| 久久午夜福利片| 国产成人一区二区在线| 99在线人妻在线中文字幕| 欧美中文日本在线观看视频| 成人毛片a级毛片在线播放| 天天躁日日操中文字幕| 国产探花在线观看一区二区| 丰满的人妻完整版| 久久草成人影院| 久久久午夜欧美精品| 麻豆国产av国片精品| 女同久久另类99精品国产91| 日本免费a在线| 国产激情偷乱视频一区二区| 久久精品国产清高在天天线| 99久久无色码亚洲精品果冻| 国产欧美日韩一区二区精品| 亚洲性久久影院| 深夜精品福利| 亚洲av不卡在线观看| 少妇被粗大猛烈的视频| 一级av片app| 菩萨蛮人人尽说江南好唐韦庄 | 欧美性猛交╳xxx乱大交人| 国产精品一区二区三区四区免费观看 | 午夜视频国产福利| 两个人视频免费观看高清| 国产熟女欧美一区二区| 中文字幕精品亚洲无线码一区| av国产免费在线观看| 午夜久久久久精精品| 少妇的逼好多水| 搞女人的毛片| 18禁裸乳无遮挡免费网站照片| 午夜福利高清视频| 老司机福利观看| 亚洲av美国av| 欧美日韩国产亚洲二区| 最后的刺客免费高清国语| 精品人妻偷拍中文字幕| 91精品国产九色| 国产精品一及| 在线播放无遮挡| 六月丁香七月| 精品人妻偷拍中文字幕| 校园春色视频在线观看| 天堂√8在线中文| 欧美激情国产日韩精品一区| 春色校园在线视频观看| 最好的美女福利视频网| 亚洲天堂国产精品一区在线| 噜噜噜噜噜久久久久久91| 婷婷亚洲欧美| 简卡轻食公司| 一a级毛片在线观看| 国产色婷婷99| 乱人视频在线观看| 不卡视频在线观看欧美| 综合色丁香网| 成人一区二区视频在线观看| 免费电影在线观看免费观看| 校园春色视频在线观看| 国产 一区精品| 免费在线观看成人毛片| 三级国产精品欧美在线观看| 高清毛片免费观看视频网站| 一个人看视频在线观看www免费| 精品久久久久久久久av| 免费一级毛片在线播放高清视频| 欧美精品国产亚洲| 成人综合一区亚洲| 黄色欧美视频在线观看| 亚洲国产精品sss在线观看| 免费在线观看成人毛片| 日本五十路高清| 久久久久性生活片| av天堂在线播放| 亚洲一区高清亚洲精品| 日韩欧美精品v在线| 欧美色欧美亚洲另类二区| 亚洲精品亚洲一区二区| 国产人妻一区二区三区在| 日韩人妻高清精品专区| 成人av在线播放网站| 国内少妇人妻偷人精品xxx网站| 午夜爱爱视频在线播放| 日本免费一区二区三区高清不卡| 最近2019中文字幕mv第一页| 又粗又爽又猛毛片免费看| 一卡2卡三卡四卡精品乱码亚洲| 少妇的逼好多水| 色综合色国产| 成人av在线播放网站| 在线观看一区二区三区| 亚洲av中文字字幕乱码综合| 久久天躁狠狠躁夜夜2o2o| 在线观看av片永久免费下载| 亚洲人成网站在线播| 天堂√8在线中文| 黄色一级大片看看| 国产麻豆成人av免费视频| 九九久久精品国产亚洲av麻豆| 国产精品电影一区二区三区| 一个人观看的视频www高清免费观看| 国产女主播在线喷水免费视频网站 | 中国美白少妇内射xxxbb| 亚洲精品国产av成人精品 | 乱码一卡2卡4卡精品| 美女xxoo啪啪120秒动态图| 精品熟女少妇av免费看| 国产精品久久久久久久久免| 长腿黑丝高跟| 白带黄色成豆腐渣| 一级黄片播放器| 高清日韩中文字幕在线| 日韩成人伦理影院| 最近手机中文字幕大全| 一级a爱片免费观看的视频| 精品久久久噜噜| 丝袜美腿在线中文| 日韩精品青青久久久久久| 欧美国产日韩亚洲一区| 露出奶头的视频| 国产熟女欧美一区二区| 蜜桃亚洲精品一区二区三区| 九色成人免费人妻av| 一个人看的www免费观看视频| 秋霞在线观看毛片| 亚洲av免费在线观看| 看免费成人av毛片| 午夜激情欧美在线| 在线免费观看的www视频| 日韩国内少妇激情av| 人妻少妇偷人精品九色| 国产精品久久久久久精品电影| 亚洲欧美成人精品一区二区| 亚洲最大成人手机在线| 日韩精品有码人妻一区| 亚洲成av人片在线播放无| 亚洲四区av| www日本黄色视频网| 小蜜桃在线观看免费完整版高清| 99riav亚洲国产免费| 亚洲乱码一区二区免费版| 日韩大尺度精品在线看网址| 国产精品久久久久久av不卡| 2021天堂中文幕一二区在线观| 国产色婷婷99| 美女内射精品一级片tv| 亚洲成人精品中文字幕电影| 亚洲丝袜综合中文字幕| 亚洲精品久久国产高清桃花| 久久国产乱子免费精品| 真人做人爱边吃奶动态| 男插女下体视频免费在线播放| 黄片wwwwww| 亚洲欧美成人精品一区二区| 老司机影院成人| 久久99热这里只有精品18| 国产精品99久久久久久久久| 久99久视频精品免费| 国产精品,欧美在线| 两性午夜刺激爽爽歪歪视频在线观看| 久久久国产成人免费| 一进一出好大好爽视频| 日韩,欧美,国产一区二区三区 | 一本一本综合久久|