• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure

    2022-08-24 06:58:38MohammadHafizMohdYusofAbdullahMohdZinandNurhizamSafieMohdSatar
    Computers Materials&Continua 2022年8期

    Mohammad Hafiz Mohd Yusof,Abdullah Mohd Zin and Nurhizam Safie Mohd Satar

    1Faculty of Computer&Mathematical Sciences,Universiti Teknologi MARA,40450,Shah Alam,Selangor,Malaysia

    2Centre for Software Technology and Management(SOFTAM),Universiti Kebangsaan Malaysia,43600,Bangi,Selangor Malaysia

    Abstract: Due to polymorphic nature of malware attack,a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature of malware attacks.On the other hand,state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model.This is unlikely to be the case in production network as the dataset is unstructured and has no label.Hence an unsupervised learning is recommended.Behavioral study is one of the techniques to elicit traffic pattern.However,studies have shown that existing behavioral intrusion detection model had a few issues which had been parameterized into its common characteristics,namely lack of prior information(p(θ)),and reduced parameters(θ).Therefore,this study aims to utilize the previously built Feature Selection Model subsequently to design a Predictive Analytics Model based on Bayesian Network used to improve the analysis prediction.Feature Selection Model is used to learn significant label as a target and Bayesian Network is a sophisticated probabilistic approach to predict intrusion.Finally,the results are extended to evaluate detection,accuracy and false alarm rate of the model against the subject matter expert model,Support Vector Machine (SVM), k nearest neighbor (k-NN) using simulated and ground-truth dataset.The ground-truth dataset from the production traffic of one of the largest healthcare provider in Malaysia is used to promote realism on the real use case scenario.Results have shown that the proposed model consistently outperformed other models.

    Keywords: Intrusion detection prevention system;behavioral malware analysis;machine learning in cybersecurity;deep learning in intrusion detection system(IDS)and intrusion prevention system(IPS)

    1 Introduction

    Machine learning can be divided into supervised and unsupervised learning.In cybersecurity research,supervised learning has been widely adopted,especially using deep learning [1,2].This is applied due to the nature of the standard dataset that has been deliberately labelled as normal or attack.Arguably,deep learning is the state-of-the-art;however,production network traffic has no label,hence unsupervised learning is recommended [3-5].Current trend on unsupervised learning over unstructured,especially in bio-technology and statistical computation,is on Bayesian model,specifically the non-parametric Bayesian model[6,7],thus it has motivated this research to explore a solution through Bayesian model.

    This unsupervised learning applied in production network is to discover underlying pattern of the network distribution between normal and attack.Behavioral study is one of the techniques to elicit this pattern.Studies have shown that existing network-level behavioral analysis methods suffered a few issues,for instance;lack of distribution modelling refinement processes,limited ground truth testing dataset,non-inferential analysis which leads to the inability to predict zero-day attacks,and produces high-level assumptions [4].The reduction of millions of instances,disregarded parameters,removed similarities of most of the traffic flows to reduce information noise,insufficient number of optimized features,and ignored instances which do not involve an entity are amongst other problems that have been identified as the main issues contributing to the inability to predict zero-day attacks[8].

    Those problems have been parameterized into a few common root-cause characteristics.They lack ofprioriinformationp (θ)and reduced parameters (θ).Previous methods were proposed to address the problems;however,were still unable to resolve the stated scientific glitches.Due to the shortcomings,the Bayesian Network,in terms of its probabilistic modelling,would be the best method to deal with the stated scientific glitches.The method has been proven in the area of Artificial Intelligence,Clinical Expert Systems,and Pattern Recognition.One of the credible malware analysis studies to have applied the Bayes theorem model was in[9].However,the model hadlimited directed conditional probabilities,which could lead to false alarm.Furthermore,in this study,thedistribution density model has been fixed,and onlyone feature,the IP address,has been utilized to build up the model.

    Therefore,this study aims to determine the Feature Selection and Distribution Density Model to select the optimal features that will improve the prediction of the behavioral analysis.Subsequently,the Predictive Analytics Model based on Bayesian Network which utilizes the selected optimized features is designed based on the outcome.The final step is to evaluate the model against detection,accuracy,false positive rate and state-of-the-art model.The testing dataset is from production network traffic.

    This study has significantly contributed to the construction of;(1)The Feature Selection Model based on distribution density function.Many Intrusion Detection System (IDS) models have used supervised learning from labeled dataset,whilst production traffic is unlabeled and multidimensional.Using maximum likelihood information from the density distribution function,this model will assist the acquisition of the target label during data pre-processing stage.(2) The Predictive Analytics Model based on Bayesian network.This model is arguably the novelty of this research.From the optimized feature,it serves as a prior information for this model.Having this model will allow this prior information to be automatically updated through its posterior probability information.This is the essence of the Machine Learning model whereby the model is able to learn and update itself from data.Detailed discussion is available in the Research Methodology section.

    2 Literature Review

    Intrusion and malicious software detection in network security has become an important research domain[10].The emergence of new threats that are stealthy and sophisticated are almost undetectable and not recognized by existing intrusion detection systems,or traditional tools in security layer perimeters (i.e.,firewall,antivirus (AV)).These are among the challenges in malware and intrusion system research.This scenario leads to inefficiency to achieve higher detection rates and reduced false positives in intrusion systems.Signature-based can only detect intrusion based on pattern or signature.Signature-based method primarily focuses on code-structure of the viruses,vs.the dynamic aspects of its behavior[11].

    Study in[12]introduced supervision system for the IDS to monitor traffic log.The analysis phase includes data preprocessing,feature selection and finally proactive prediction based on deep learning.The study stated that data perspectives in ML are divided into 1) supervised and 2) unsupervised.Supervised data are a labelled dataset and unsupervised are an unlabeled training or testing dataset.In this study,the pre-processing technique uses time-series multivariate to construct self-supervised data labels.

    Research by[13]introduced a model that can learn features from unlabeled dataset and is able to classify simultaneously benign or malicious traffic.It has two stages:1) to decide normal (benign)or abnormal (malicious) traffic using probability,which will then be used in 2) which is to label certain features as target for the classifier.The first stage is to classify normal or abnormal traffic with probability value by using any distribution or z-score value.Then,in the second stage,the probability value will be used as additional feature or label or target for the transformed dataset for which the multi-classification model can be trained and tested.As a conclusion,the study had introduced feature representation from unlabeled data.

    Then study in [14]designed an optimization algorithm for optimizing hidden layers in neural network and then evaluated the algorithm against network intrusion system.Dataset used is NSLKDD,which is for training and testing dataset.This algorithm has been compared against traditional optimization algorithm and subsequently the classification effectiveness was compared with other machine learning model like SVM,Random Forest and Na?ve Bayes.

    Research by [9]stated that behavioral-based methods are effective in malware detection;hence there is a need for a research toward behavioral-based analysis methods.Behavioral-based analysis is highly related to heuristic approach to speed up the process of finding a satisfactory solution,especially when dealing with real-time traffic[15].Previous studies have described the issues in this area,namely reduced instances(θ),and lack ofpriori(p(θ)).Thus,there is a need for a sophisticated probabilistic interpretation.It can be resolved using Bayesian theorem;a sophisticated probabilistic approach to interpret the uncertainty event that has been proven in Clinical Expert Systems,Artificial Intelligence,Pattern Recognition.

    Bayesian Network is known as Belief Network and is the Artificial Intelligence framework for uncertainty supervision,which is a contrast to the deterministic approach to understand phenomena[16].Although it was published in 1763,the techniques applied in health management and medicine decision-support systems are quite recent;colon biopsy [17]was recently used in the mortality classification of COVID-19 patients [18].Thus,the gaps discussed previously can be resolved using Bayesian theorem.The latest approach in behavioral malware analysis at network level using Bayes theorem is proposed by[9],which produces high detection rate and low false positive result[19].

    However,the current method may lead to inability to detect unknown attacks[20].The first factor is the distribution density model proposed by[9],which only focused on one feature,which will affect the accuracy of classification results[21].The second factor is the distribution density model strategy used by[9],which is fixed with Gamma function and it is not flexible[22]and may not follow sample weights[23].The third factor is the predictive model used by Weaver,which is based on na?ve Bayes analysis method to model scanning behavior of Conficker Botnet in large Internet Service Provider(ISP) network.However,studies by [17]stated that the use of the Bayesian Network method may improve the result of prediction.Thus,this research is to extend the previous works in[8]which has established the Feature Selection Model.The model is utilized to obtain optimized features which are subsequently used in this proposed model.Reference in[3]highlights some of the preliminary studies of this work.

    3 Research Methodology

    This section introduces the research methodology framework to execute the study.Altogether,there are four stages to complete the research activities;which are(1)ground-truth dataset acquisitions,(2)modelling,(3)testing,and(4)evaluation.Stage 1,which is the ground-truth dataset acquisitions,will include profiling the baseline,spike,decay after disinfections,and decay after spike.Stage 2 is to design feature selection and distribution density model for which to obtain optimized lambda information.Stage 3 is the design of the predictive analytics model based on Bayesian Network method.Finally,Stage 4 is the testing and evaluation,whereby the predictive analytics model is evaluated against the ground-truth traffic.The discussion will be presented in the Results and Discussions section.The following section will discuss each stage in detail.

    3.1 Stage 1:Ground-truth Dataset Acquisitions

    This stage is to acquire ground-truth dataset from the largest healthcare provider in Malaysia.Fig.1 shows the network physical diagram of the provider.The dataset is in the form of packet capture(PCAP)file of a live production network traffic.It will be used to train the predictive model.The first task is to acquire site permission,then to acquire the baseline or normal dataset from the site over the configured switched port analyzer(SPAN)port.Next,is to acquire the Suspicious Objects(SOs)from the Trend Micro Deep Discovery Inspector(TMDDI)on the specified date;24thAugust,2017.Then,to simulate attack procedures using Virtual Machine after which the PCAP file of the attacked network traffic is then retrieved via Wireshark.This is to baseline the detection threshold of the predictive model.The final step is to draw the distribution functions over the raw data and analyze them.

    Raw ground-truth dataset is grouped into baseline,spike,decay,and decay after disinfections,and decay after spike attributes.Beta,Gamma and Normal distribution model are used to attribute the baseline dataset.Eq.(1) shows the Gamma distribution model,which is applied throughout the baseline dataset ofqbaseline_win_size,qbaseline_frame_len,qbaseline_delta_timeandqbaseline_dst_src.

    It is followed with Eq.(2)that shows the Beta distribution model that is applied throughout the baseline dataset.

    Finally,the following Eq.(3)shows the Normal distribution model,which is again applied across the same baseline dataset.

    The data sampling for the ground-truth dataset is shown in Tab.1.

    Figure 1:Physical network diagram of the healthcare provider in Malaysia

    Table 1:Ground-truth dataset sampling

    3.2 Stage 2:Feature Selection and Density Distribution Function Modelling

    Several method specifications were identified as weights of classifier to rank the feature for their removal[24].Letwjbe defined as in Eq.(4).

    Eq.(4)can be used as a ranking criteria to sort features.Another weighted score is the true normal score;whereby,in order to create a normal profile,it is necessary to index each attribute’s instances asi=1,2,...,n.The model was built based on the ratio of the normal number of training data(Ri)against the total number of packets associated with each attribute(Ni).The probability of the normal score,Pi=Ri/Niis represented by Eq.(5).

    Another ranking criteria principle is the correlation coefficient,also known as the Pearson correlation.Correlation coefficient ranking is able to identify linear dependencies between the target and the variables.The Pearson correlation coefficient(r)is defined in Eq.(6).

    The selected features will be normalized through the following Eq.(7).

    At this stage,the model will be first trained using KKD Cup 99 dataset,which includes a wide variety of simulated intrusion scenarios in a military network environment specifically simulating typical U.S Air Force,Local Area Network (LAN).To obtain optimized features,the maximum likelihood function as defined in Eq.(8) is utilized.This work has been published in previous work in[8].Then,it will be used to extract optimized features from the ground truth dataset of the largest healthcare provider in Malaysia.

    Finally,the optimized features of the ground truth from the real use case of Malaysia healthcare provider is shown in Tab.2.

    Table 2:Variable notations

    3.3 Stage 3:Predictive Analytics Modelling Based on Bayesian Network

    Statistically,a Bayesian Network model has four properties,which are (1) prior probability orpriori,(2)the likelihood or the conditional probability,(3)posterior probability orposteriorias shown in Eq.(9),and(4)the relationship of parents’nodes and its inheritance.

    Bayesian Network is a directed acyclic probabilistic model,and conditional probability is the nucleus of the model.It is a probabilistic causal network also known as Belief Network.It is used as an Artificial Intelligence framework for uncertainty supervision,which is contrary to the deterministic approach to understand phenomena[16].

    For the proposed model,it starts with the following Eq.(10) of the Joint Probability function.Pr(bws) refers to the baseline window size,Pr(bfl) refers to the baseline frame length,andPr(bdt)refers to the baseline delta time.BTis the probability of baseline traffic,and comprises of all the baseline traffic intersections,andMis the probability of malicious traffic where all of these at a later stage will be defined as lambda information.

    These notions are the ground-truth dataset which have been trained in Stage 2.The model can be written in its conditional probability as derived in the following forms in Eqs.(11)to(15).This brute force notation is supplied to the classifier engine.

    Eqs.(11) to (15) is the prior information of the proposed model.It is taken from the density distribution information which was sourced from Stage 2 research activity.The following are the generated posterior probability orposteriori.Theposterioriwill be updated when the prior information is updated.Having this feature will allow the model to be automatically updated.

    Eqs.(16)to(18)are the conditional probabilities betweenPr(bws)-baseline window size,Pr(bfl)baseline frame length,Pr(bdt)-baseline delta time,Pr(BT)-benign baseline,andPr(M)-malicious baseline.

    It begins with this general expression,for instance;Pr(BTandbdt)=Pr(bdt)*Pr(Pr(BT)|bdt).Then,this equation;Pr(Pr(BT)|bdt)is unknown.Algebraically,the equation can be reversed intoPr(Pr(BT)|bdt)=Next,the numerator can be expanded intoPr(BTandbdt)=(Pr(BT)*Pr(bdt))/(Pr(BT)*Pr(bdt))+(Pr(′BT)*Pr(bdt).Substitute this expanded numerator intoPr(Pr(BT)|bdt)=and finally the full expression is shown in Eq.(18).This set of expressions can be optimized into a single equation as shown in Eq.(19).This final representation ensures the translation of expressions into code will be much easier during implementation.

    The next step is to resolve the set of conditional probability between probability of benign baseline(Pr(BT))and malicious baseline(Pr(M));orPr(MandBT).Hence,the equation needs to consider prior information ofPr(bws),Pr(bfl)andPr(bdt).

    These equations should be optimizable.This is to reduce the number of parameters in the equation(s),which will utilize less memory and will speed up the computational process.For instance,Eq.(16)Pr(Pr(BT)|bws)=((Pr(BT)*Pr(bws))/(Pr(BT)*Pr(bws))+(Pr(′BT)*Pr(bws))/Pr(bws)has redundant parameters in the denominator.Pr(bws)is mentioned twice.Take it outside the equation and it can be eliminated by the same parameter in the numerator.The final equation is as shown in Eq.(23)

    3.4 Stage 4:Evaluation Matrix

    The first evaluation stage is by comparing the proposed predictive analytics model that is trained using the ground truth dataset against the Poisson inter-arrival modelling that is used as the testing simulated traffic.Suppose a simulation ofnpacket of connection is observed aspacket1,packet2,...,packetn;this connection’s win_size is modelled as Poisson function,as shown Eq.(24).

    whereλpacket_win_sizeis the mean of the packet’s window size,the distribution of the mean is modelled as Gamma and Beta as in Eq.(25)following the raw data analysis.

    Then,the traffic will be flagged as true positive(TP),true negative(TN),false positive(FP),and false negative(FN).These flags will be used to evaluate accuracy,detection rate and false alarm rate(FAR).Detection rate,on the other hand,is used to measure true positive traffic over the sum of true positive and false traffic (positive traffic wrongly classified as negative,and negative traffic wrongly classified as positive).The formula is the following Eq.(26).

    Accuracy is used to measure all true traffic,which consists of the sum of the true positive(TP)and true negative(TN)over the sum of all traffic of a true positive(TP),true negative(TN),false positive(FP)and false negative(FN)nature.The formula is denoted as the following Eq.(27).

    Finally,the false alarm rate(FAR)is used to measure the false positive(FP)alarm,which signifies true negative(TN);the negative traffic that was wrongly classified as positive.In this research,positive traffic that was wrongly classified as negative also will be considered as a false alarm and the rate will be measured.This is a very serious issue because it may cause an attack vector.The formula is denoted as the following Eq.(27).

    Prior to that,the baseline traffic will be compared against the threshold,which,according to Weaver in[4],can be done through hard setting,heuristically,or probabilistic relationships.However,in[4],it is mentioned that probabilistic relationships will give more statistically rigorous results.For this research,the threshold will be set both by probabilistic relationships and by hard setting.For simulated traffic,it is set to a quarter(1/4)of the baseline traffic.

    Next,the model will be tested against another testing ground truth dataset based on the real use case in Malaysian healthcare provider,as shown in Fig.2.This figure illustrates a year of observation of the ground-truth dataset uses HGIGA?load balancer from August 2016 until August 2017.The sample was acquired at different occasions.Sample traffic were captured early October 2016,early Jan 2017,early May 2017 and in August 2017.The samples represent different traffic conditions,namely baseline,attack and after-disinfection.Next,it will be tested against other classification models,SVM andk-NN.

    Figure 2:Ground truth testing dataset sampling activity

    4 Results and Discussion

    Fig.3 shows correlation heat map matrix of the KDD dataset.22;‘count’,23;‘srv_count’,24;‘serror_rate’,25;‘srv_serror_rate’,26;‘rerror_rate’and 39;‘dst_host_rerror_rate’are the labelled features.Light(white)plots depict relatively low correlation,and dark(blue)plots depict high correlation.High correlation is the relationship between two variables at upward trending(positive relationship).Here,it is observed that high relationship betweensourceanddestinationendpoints’transactions,size and counts.The attributes like ‘count’and ‘srv_count’,‘dst_host_same_src_port_rate’and ‘srv_count’,‘serror_rate’and ‘dst_host_serror_rate’,and ‘rerror_rate’and ‘dst_host_rerror_rate’describe the features ofsourceanddestinationendpoints’transactions,size and counts with 98%to 99%correlation.This is the lead to select and process the ground truth dataset,whereby the final selected features wereqbaseline_win_size,qbaseline_frame_len,andqbaseline_delta_time..Detailed discussion on Feature Selection Model is explained in paper[8].

    Figure 3:Correlation heat map for KDD dataset

    The PCAP files were extracted from the baseline Transmission Control Protocol or User Datagram Protocol (TCP/UDP) traffic of the live production network from a Malaysian healthcare provider.This is conducted during Stage 1 of the research activity.Graphs in Fig.4 below are the bar plotted for baseline traffic.The graphs show the baseline traffic of window size,frame length,delta time,and source and destination traffic distribution.

    Figure 4:Descriptive analysis of baseline traffic

    If a network administrator observes these graphs over the available state-of-the-art,signaturebased CNMS (Centralized Network Monitoring System),they could conclude some normalcy over its distribution.Further analysis procedure is to be compared with the spike (attacked network distribution).This could lead into different outcomes and conclusions.

    4.1 Comparison Results of the Proposed Distribution Function Against the One Feature Model

    Fig.5A shows the dataset from the descriptive analysis is further analyzed using distribution function,as discussed in Stage 2 of the research activity.This figure is onNormaldistribution ~(baseline_win_sizen;λbaseline_win_size,σ2) function where the mean,λbaseline_win_size,and the variance,σ2(σis the standard deviation)are fitted by the normal MLE(maximum likelihood)as shown in the Datavs.Density graph above.QQ plot graph(quantile-quantile plot)suggests that the distribution is not normally distributed.

    Fig.5B shows theBetadistribution analysis,which the unknown parameters;shape 1α(alpha)and shape 2β(beta),are fitted by the normal MLE(maximum likelihood)as shown in the Datavs.Density graph.Meanwhile,Fig.5C shows theGammadistribution analysis,Gamma ~(λbaseline_win_size;αbaseline_win_size_gamma,βbaseline_win_size_gamma)where the mean,λbaseline_win_size,and the unknown parameters;shapeαbaseline_win_size_gammarate,andβbaseline_win_size_gammaare also fitted by the normal MLE(maximum likelihood),as shown in the Datavs.Density graphs.This analysis will then be replicated against the other selected features.

    Figure 5:Goodness of fit information of baseline traffic

    One feature’s model previouslyfittedthe distribution function toGamma.This study processes the selected features against several distribution functions to get optimized results.As a result,proposed model of Normal distribution scored optimum likelihood value (the least score) of 762.3 as compared to Weaver’s[9]Gamma distribution chosen model with the score of 874.6.In this case,optimum or maximum likelihood indicates the optimized selection at the very least mean score.For the remaining baseline features,the proposed model scored certain optimum likelihood values,which are not available in the state-of-the-art model.AIC is the Akaike’s Information Criterion to measure error and the same goes to BIC(the Bayesian Information Criterion)[10].Lowest AIC and BIC scores indicate the least error measured.Proposed model AIC scored value is-1520.5 whereas Weaver in[9]scored-1745.2.Error measurement shows that the proposed model has+0200.0 slightly higher value than in[9].However,the idea of having the best mean value has been met with the likelihood function,which estimates the maximum likelihood mean.Tab.3 summarizes the differences of distribution function modelling between the proposed model and the subject matter expert.

    Table 3:Comparison of the proposed distribution model against one feature’s model

    Table 3:Continued

    4.2 Classification Results Against Simulated Dataset

    Next,is to use the optimized features from Stage 2 and fit it into the predictive analytics model as discussed in Stage 3 of the research activity.This model is used to test against simulated dataset.The traffic was generated using Poisson function for inter-arrival modelling and will be optimized using Gamma distribution function as discussed in Stage 4 of the research activity.The prior information(lambda information) of the traffic is illustrated in Tab.4.This lambda information and its initial value has been selected and optimized using the feature selection and density distribution model as discussed in Stage 2 of the research activity.

    Table 4:Lambda information of the baseline dataset

    This is the followed by two designed scenarios to simulate the traffic.First,the traffic is generated using the Poisson model as mentioned before.The system then sets the threshold of the attacked traffic at an additional of 23%higher from the baseline.Then,the model is run and evaluated in accordance to the evaluation matrix.The result is shown in Tab.5.

    From Tab.5,the threshold willflag more true positivetraffic or simply true traffic.From here,the additional 23%traffic will still indicate 100%accuracy that all traffic is a true positive;with 100%detection rate and 0%false alarm rate.In the second and final scenario,this is where the amount ofPr(bws)of the simulated traffic(trained traffic)is increased by 50%.The results are as in Tab.6.

    A tuple of lambdaPr(bws)which is contained with malicious traffic had exceeded the threshold;a significant outcome.It will trigger the malicious alarm and it will be flagged as true negative traffic or simply true traffic.This will generate a bunch of true negative traffic based on the model.However,there are several tuples,which indicate a true positive traffic and this is true,as their lambda information does not exceed the threshold.This is considered a false alarm.To measure this,false alarm rate equation,which measures the false alarm over the whole traffic,is used.Here,the false alarm rate is at 27%.However,the detection rate(of detecting true traffic)is still at 73%;a significantly high probability rate.

    Table 5:Baseline dataset tested against simulated traffic with 23%threshold

    Table 6:Baseline dataset tested against simulated traffic with 50%increase in traffic tuple

    4.3 Predictive Analysis Results Against Ground Truth Dataset

    The next step is to use the optimized features and to fit it into the predictive analytics model as discussed in Stage 4 of the research activity.This model is used to test over the real use case scenario of an attacked dataset from the Malaysian healthcare provider as shown in Fig.2 of Stage 4 of the research activity.The figure shows the testing dataset sampling extracted from the HGIGA?internet traffic utilization monitoring system dashboard.It also shows the attacked traffic were ranged from early May until early July 2017.Later attacked traffic will be set as a threshold value for the model.Traffic in August 2017 on the other hand was sampled as a baseline traffic.Traffic in October 2016 and early January 2017 will be studied to model its distribution.

    The distribution characteristics of this testing traffic dataset were then recorded.The selected features were extracted during the feature selection phase and three optimized features were selected,namelyλframe_len,for frame length lambda,λwin_sizefor window size lambda andλdelta_timefor delta time lambda.These are the same selected features from the same feature selection model discussed in Stage 2 of the research activity.

    The October traffic could be considered as benign traffic as it is way below the spike threshold.Generally,a threshold is used in many behavioral researches.For instance Weaver in[9]suggested that instead of hard setting the threshold heuristically,probabilistic relationship will give a more statistically rigorous outcome.Thus,in this research,the threshold is set by both probabilistic relationships and hard setting threshold.Hence,the quarter (1/4) baseline rate was chosen to condition the prediction rate of more than 20%before the attack.In this section,the results have been discussed by applying the predictive model against the ground truth testing datasets.We run the dataset against our model and the result is summarized in Fig.6.It is apparent that the proposed predictive analytics model has accurately detected a zero day attack a few months prior to the actual attack.For the baseline traffic of the ground truth dataset(October 2016),the model was already able to detect almost 60%of the traffic that was prepared for the zero day attack with 75% accuracy.Then the test traffic (January 2017),which was obtained five months prior to the attack,was run across the algorithm.The model has detected that 86%of the traffic was directed toward the attack and this time with 100%accuracy.

    Figure 6:Predictive analytics model detection and accuracy rate

    4.4 Results Against Other Classification Methods

    Many researchers,for instance Leskovec in [25],considered Support Vector Machine (SVM) as a state-of-the-art classification method for behavioral malware analysis.Thus,the dataset is further trained,classified then later compared to the SVM model as defined in Eq.(29);

    whereXAandYAis the coordinate of point A andwis the weight vector.This is the margin between point A and the hyperplane.Each feature has a weight defined in Eq.(30);

    wherewis a distance inner product of some point A or the support vector with some point B along the hyperplane 90°to point A.In order to separate attack(1)from benign(0)episode is the work to decide the best separating line (hyperplane).Hence,there is a need to find the hyperplane with the largest margin;the line that separates ones and zeroes the most.The data are trained through total Least Squares residuals equation to obtain optimal hyperplane with optimal slope(m)and intercept(b).The general Least Squares(L)equation is defined in Eq.(31).

    However,since support vector is used,the model is refined by measuring the Euclidean distance(D) of the support vector near the optimal hyperplane obtained from the Least Squares (L) model.Fig.7 below is the depiction of the dataset separated by the optimal hyperplane.

    Figure 7:A depiction of optimal hyperplane separating baseline traffic and attack traffic

    Linear equation for the classification model mentioned in Eq.(28)will penalize the attacked nodes that fall into a normal region.This will determine the accuracy of the detection using this model.The measured accuracy is 5.83333e-1,which is almost 60%accuracy.

    kNN (kNearest Neighbor) is another classification and prediction model based on feature similarity of the nearest neighbors.This model is considered as the favorite model amongst researchers for its simplicity.Euclidean distance works inkNN algorithm.It determines the distance between the unknown data from all the points in the trained dataset.The closest distance from the nearest class neighbor will determine the class of the unknown dataset or test dataset.The binary classification and prediction model is derived from the general term of Euclidean Distance and extended into Eq.(32);

    wherexinewpointis the new point of the test dataset projected in the dataset plane.It will be evaluated against attack point first,xjattackand then normal point,xjnormal.Then the class will be modeled asy ? Y,y:Attack(1),Benign(0).Fig.8 depicts the new point(test dataset)on the trained dataset.Some of the points are overlaid onto its neighbor on each class,which could significantly improve the classification of the new data point based on thekNN model suggested in Eq.(32).The coefficient values of 1 and 0 are inserted to penalize the wrong decision made by the model.It will assist in measuring the accuracy and false alarm rate.

    Figure 8:A depiction of test dataset separating baseline traffic and attack traffic using kNN

    Tab.7 summarizes the comparison results of the proposed model to other classification models discussed in this research.Again,detection rate and accuracy rate of the proposed Behavioral-based Malware Analysis model based on the Bayesian Network method scored 100%and 86%,significantly outperforming other models.False Alarm Rate also scored less,at 14% as compared to other classification models.This is achieved through the feature selection model and refined distribution model and finally the application of Bayesian Network for the classification model.

    Table 7:Comparison results against other classification model

    Acknowledgement:The authors wish to thank the Research Management Centre(RMC)of Universiti Teknologi MARA(UiTM),Universiti Kebangsaan Malaysia(UKM)and Centre for Languages and Foundation Studies(CELFOS),Universiti Sultan Azlan Shah(USAS).

    Funding Statement:The work is fully sponsored by the research project grant FRGS/1/2021/ICT07/UITM/02/3.

    Conflicts of Interest:The authors declare that there are no conflicts of interest to report regarding the present study.

    99国产精品一区二区蜜桃av | 男女高潮啪啪啪动态图| 久久 成人 亚洲| 建设人人有责人人尽责人人享有的| 精品亚洲成a人片在线观看| 人妻一区二区av| 香蕉丝袜av| 麻豆国产av国片精品| 国产精品久久电影中文字幕 | 天天躁日日躁夜夜躁夜夜| 亚洲精品在线美女| 日韩欧美一区二区三区在线观看 | 亚洲av第一区精品v没综合| 国产熟女午夜一区二区三区| 色视频在线一区二区三区| 曰老女人黄片| avwww免费| 99国产综合亚洲精品| 欧美成狂野欧美在线观看| www.精华液| av电影中文网址| 男人舔女人的私密视频| 亚洲精品美女久久av网站| 麻豆av在线久日| 精品欧美一区二区三区在线| 热99国产精品久久久久久7| 亚洲av成人不卡在线观看播放网| 欧美激情极品国产一区二区三区| 国产熟女午夜一区二区三区| 高清欧美精品videossex| 欧美日韩国产mv在线观看视频| 老司机亚洲免费影院| 九色亚洲精品在线播放| 亚洲成人免费电影在线观看| 欧美日韩黄片免| 欧美成人午夜精品| 黄色视频在线播放观看不卡| 丰满少妇做爰视频| 国产在视频线精品| 中文字幕高清在线视频| 高清欧美精品videossex| 真人做人爱边吃奶动态| 黄色毛片三级朝国网站| 亚洲国产欧美网| av网站免费在线观看视频| 高清毛片免费观看视频网站 | 欧美激情高清一区二区三区| 国产福利在线免费观看视频| av网站免费在线观看视频| 色精品久久人妻99蜜桃| 一进一出好大好爽视频| 俄罗斯特黄特色一大片| 亚洲av日韩在线播放| 成年人黄色毛片网站| 午夜老司机福利片| 精品熟女少妇八av免费久了| 青草久久国产| 中国美女看黄片| 国产黄色免费在线视频| 欧美日韩成人在线一区二区| 亚洲一区二区三区欧美精品| 亚洲七黄色美女视频| cao死你这个sao货| 亚洲精品中文字幕一二三四区 | 怎么达到女性高潮| 美女主播在线视频| 91麻豆av在线| 国产有黄有色有爽视频| 国产一区二区在线观看av| 精品少妇久久久久久888优播| 变态另类成人亚洲欧美熟女 | svipshipincom国产片| 免费在线观看视频国产中文字幕亚洲| 在线观看一区二区三区激情| 一夜夜www| 极品人妻少妇av视频| av国产精品久久久久影院| 亚洲中文日韩欧美视频| 91九色精品人成在线观看| 亚洲国产av新网站| 女人久久www免费人成看片| 性色av乱码一区二区三区2| 久久九九热精品免费| 日本一区二区免费在线视频| 日本wwww免费看| 制服诱惑二区| 免费观看a级毛片全部| 老司机午夜十八禁免费视频| 亚洲精品久久午夜乱码| 久久久久网色| 国产深夜福利视频在线观看| 午夜福利一区二区在线看| 老司机影院毛片| 久久精品成人免费网站| 亚洲天堂av无毛| 久久久久视频综合| 国产人伦9x9x在线观看| xxxhd国产人妻xxx| 国产成人免费无遮挡视频| 成人精品一区二区免费| 成人18禁在线播放| 国产麻豆69| 高清av免费在线| 国产日韩一区二区三区精品不卡| 国产在线精品亚洲第一网站| 国产成人av激情在线播放| 老司机午夜福利在线观看视频 | 国产精品 欧美亚洲| 丰满人妻熟妇乱又伦精品不卡| 色尼玛亚洲综合影院| 国产成人啪精品午夜网站| 菩萨蛮人人尽说江南好唐韦庄| 亚洲人成伊人成综合网2020| 国产亚洲午夜精品一区二区久久| 精品国产乱子伦一区二区三区| 激情视频va一区二区三区| 日韩欧美一区视频在线观看| 嫁个100分男人电影在线观看| 国产激情久久老熟女| 在线十欧美十亚洲十日本专区| 色在线成人网| 国产成人精品久久二区二区91| 日韩中文字幕视频在线看片| 国产精品98久久久久久宅男小说| 99re6热这里在线精品视频| 亚洲精品自拍成人| 国产亚洲午夜精品一区二区久久| 成人特级黄色片久久久久久久 | 中文字幕色久视频| 老熟妇乱子伦视频在线观看| 精品久久蜜臀av无| 国产激情久久老熟女| 麻豆成人av在线观看| 搡老岳熟女国产| 免费观看人在逋| 欧美成人免费av一区二区三区 | 亚洲中文字幕日韩| 成人免费观看视频高清| 桃花免费在线播放| 中文亚洲av片在线观看爽 | 最黄视频免费看| 丁香六月欧美| 极品少妇高潮喷水抽搐| 欧美精品人与动牲交sv欧美| 人人妻人人添人人爽欧美一区卜| 精品一区二区三区视频在线观看免费 | 女同久久另类99精品国产91| 免费一级毛片在线播放高清视频 | 亚洲av成人一区二区三| 大片免费播放器 马上看| 久热爱精品视频在线9| 久久久久久人人人人人| 国产成人系列免费观看| 黄片小视频在线播放| 色94色欧美一区二区| 国产精品久久电影中文字幕 | 中文欧美无线码| 久久国产精品人妻蜜桃| 久久精品国产a三级三级三级| 18禁美女被吸乳视频| 成人18禁在线播放| 亚洲伊人色综图| 黄频高清免费视频| 两个人看的免费小视频| 精品人妻1区二区| 一夜夜www| 欧美精品av麻豆av| 国产精品影院久久| 又大又爽又粗| 午夜日韩欧美国产| 80岁老熟妇乱子伦牲交| 精品久久久久久电影网| 一边摸一边抽搐一进一出视频| 国产精品久久久人人做人人爽| 国产av又大| 亚洲欧美一区二区三区久久| kizo精华| 色婷婷av一区二区三区视频| 亚洲成人免费电影在线观看| 91av网站免费观看| 9色porny在线观看| 亚洲 国产 在线| 中文字幕人妻丝袜制服| 欧美大码av| 丝袜在线中文字幕| 国产成人精品无人区| 高清在线国产一区| 久久人人97超碰香蕉20202| 国产精品自产拍在线观看55亚洲 | 夜夜骑夜夜射夜夜干| 精品一区二区三卡| 欧美亚洲 丝袜 人妻 在线| 精品国产乱子伦一区二区三区| 99久久人妻综合| 天堂中文最新版在线下载| 色尼玛亚洲综合影院| 久久久精品区二区三区| 久久中文字幕人妻熟女| 搡老乐熟女国产| 悠悠久久av| 国产有黄有色有爽视频| 精品一区二区三区av网在线观看 | 欧美精品一区二区免费开放| 成人永久免费在线观看视频 | 国产高清国产精品国产三级| 久久久久久久国产电影| 69av精品久久久久久 | 国产免费现黄频在线看| 夫妻午夜视频| 亚洲伊人色综图| 交换朋友夫妻互换小说| 91大片在线观看| 国产在线一区二区三区精| 18禁美女被吸乳视频| 黄片播放在线免费| 在线观看免费视频网站a站| 青草久久国产| 老熟妇乱子伦视频在线观看| 日本精品一区二区三区蜜桃| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲五月色婷婷综合| 捣出白浆h1v1| 午夜激情久久久久久久| 中文亚洲av片在线观看爽 | aaaaa片日本免费| 757午夜福利合集在线观看| 国产91精品成人一区二区三区 | 久久国产精品男人的天堂亚洲| 一边摸一边抽搐一进一小说 | 悠悠久久av| 亚洲av第一区精品v没综合| 精品第一国产精品| 国产精品麻豆人妻色哟哟久久| 午夜福利在线观看吧| av国产精品久久久久影院| 欧美精品高潮呻吟av久久| 久久精品成人免费网站| 亚洲av成人一区二区三| 高清视频免费观看一区二区| 欧美成人免费av一区二区三区 | 91成人精品电影| 中国美女看黄片| 精品高清国产在线一区| 免费在线观看完整版高清| 日本wwww免费看| av免费在线观看网站| 日韩三级视频一区二区三区| 伦理电影免费视频| 波多野结衣av一区二区av| 日本av免费视频播放| 又黄又粗又硬又大视频| 国产午夜精品久久久久久| 亚洲国产欧美在线一区| 久久精品国产a三级三级三级| 中亚洲国语对白在线视频| 在线播放国产精品三级| 日本av免费视频播放| 成人国产一区最新在线观看| 国产在线观看jvid| 亚洲av日韩在线播放| 热99re8久久精品国产| 久久国产亚洲av麻豆专区| 成人特级黄色片久久久久久久 | 亚洲成人免费电影在线观看| 每晚都被弄得嗷嗷叫到高潮| 午夜福利一区二区在线看| 国产精品九九99| 午夜福利在线观看吧| 国产成人av教育| 国产成人啪精品午夜网站| 午夜福利影视在线免费观看| 侵犯人妻中文字幕一二三四区| 韩国精品一区二区三区| 国产精品.久久久| 国产成人影院久久av| 熟女少妇亚洲综合色aaa.| 亚洲欧美一区二区三区久久| 99国产极品粉嫩在线观看| 国产午夜精品久久久久久| 菩萨蛮人人尽说江南好唐韦庄| 王馨瑶露胸无遮挡在线观看| 久久天堂一区二区三区四区| 国产麻豆69| 亚洲欧美激情在线| 欧美在线一区亚洲| 国产在视频线精品| 久久精品人人爽人人爽视色| 亚洲 欧美一区二区三区| 午夜福利欧美成人| 国产97色在线日韩免费| 亚洲专区中文字幕在线| 中文欧美无线码| 国产精品一区二区精品视频观看| 狠狠狠狠99中文字幕| 日日夜夜操网爽| 久久久精品免费免费高清| 在线av久久热| 韩国精品一区二区三区| 久9热在线精品视频| 亚洲欧美精品综合一区二区三区| 18禁美女被吸乳视频| 99精品在免费线老司机午夜| 亚洲成av片中文字幕在线观看| 午夜激情久久久久久久| 日韩 欧美 亚洲 中文字幕| 国产麻豆69| 国产亚洲一区二区精品| videosex国产| 国产极品粉嫩免费观看在线| 亚洲精品国产精品久久久不卡| 热re99久久精品国产66热6| 人妻 亚洲 视频| 久久久久久久精品吃奶| 啪啪无遮挡十八禁网站| 国产麻豆69| 欧美精品啪啪一区二区三区| 久久狼人影院| 国产亚洲欧美在线一区二区| 成人国产av品久久久| 首页视频小说图片口味搜索| 亚洲av成人一区二区三| 久久久久久久国产电影| 丝袜美腿诱惑在线| aaaaa片日本免费| 91大片在线观看| 9热在线视频观看99| 天天影视国产精品| 男女床上黄色一级片免费看| 日韩欧美免费精品| 高清毛片免费观看视频网站 | 亚洲国产精品一区二区三区在线| a级毛片在线看网站| 视频区图区小说| 两个人看的免费小视频| 又黄又粗又硬又大视频| 美女视频免费永久观看网站| 国产高清视频在线播放一区| 精品亚洲成国产av| 美女高潮到喷水免费观看| 亚洲av欧美aⅴ国产| 欧美黄色淫秽网站| 久久久精品94久久精品| 国产精品熟女久久久久浪| 欧美 日韩 精品 国产| 他把我摸到了高潮在线观看 | 咕卡用的链子| 97在线人人人人妻| 午夜福利在线免费观看网站| 午夜老司机福利片| 国产免费视频播放在线视频| 日韩欧美国产一区二区入口| 国产成人精品在线电影| 日本wwww免费看| 欧美日韩av久久| 国产精品.久久久| 看免费av毛片| 国产精品国产av在线观看| 欧美成人免费av一区二区三区 | 搡老岳熟女国产| 老司机午夜十八禁免费视频| 亚洲专区国产一区二区| 亚洲,欧美精品.| bbb黄色大片| 国产成人av激情在线播放| 999久久久精品免费观看国产| 老司机福利观看| 色综合欧美亚洲国产小说| 亚洲午夜精品一区,二区,三区| 蜜桃在线观看..| 青草久久国产| 热re99久久国产66热| 国产精品影院久久| 国产精品 国内视频| 欧美中文综合在线视频| 搡老熟女国产l中国老女人| 91字幕亚洲| 久久久国产精品麻豆| 老司机午夜福利在线观看视频 | 日本黄色视频三级网站网址 | 亚洲色图综合在线观看| 亚洲三区欧美一区| 亚洲七黄色美女视频| 国产精品 国内视频| 日日摸夜夜添夜夜添小说| 国产xxxxx性猛交| 99精品久久久久人妻精品| 九色亚洲精品在线播放| 视频区欧美日本亚洲| 一级片'在线观看视频| 老熟妇乱子伦视频在线观看| 午夜福利免费观看在线| 国产高清国产精品国产三级| 日韩成人在线观看一区二区三区| 又大又爽又粗| 黄色a级毛片大全视频| 亚洲国产毛片av蜜桃av| 成人手机av| 热re99久久国产66热| 人人妻,人人澡人人爽秒播| 国产精品av久久久久免费| 欧美日韩亚洲国产一区二区在线观看 | 国产精品久久久人人做人人爽| av福利片在线| 下体分泌物呈黄色| 国产免费现黄频在线看| 正在播放国产对白刺激| 涩涩av久久男人的天堂| 如日韩欧美国产精品一区二区三区| 热99国产精品久久久久久7| 国产精品二区激情视频| 一本—道久久a久久精品蜜桃钙片| 亚洲熟女毛片儿| 久久久国产精品麻豆| 多毛熟女@视频| 日韩免费av在线播放| 母亲3免费完整高清在线观看| 久久国产亚洲av麻豆专区| 他把我摸到了高潮在线观看 | 18禁观看日本| 色精品久久人妻99蜜桃| 99九九在线精品视频| 亚洲成av片中文字幕在线观看| 一进一出好大好爽视频| 亚洲国产av影院在线观看| 国产亚洲av高清不卡| 精品人妻熟女毛片av久久网站| 多毛熟女@视频| 一级黄色大片毛片| 国产三级黄色录像| 多毛熟女@视频| 91成人精品电影| 99久久精品国产亚洲精品| 精品国产超薄肉色丝袜足j| 黄频高清免费视频| 欧美乱码精品一区二区三区| 日韩三级视频一区二区三区| 国产成人av激情在线播放| 蜜桃在线观看..| 亚洲国产中文字幕在线视频| 巨乳人妻的诱惑在线观看| 国产区一区二久久| 精品人妻1区二区| 日本一区二区免费在线视频| 丰满饥渴人妻一区二区三| 亚洲av欧美aⅴ国产| 免费日韩欧美在线观看| 精品国产一区二区三区久久久樱花| 一级毛片女人18水好多| 国产主播在线观看一区二区| 亚洲综合色网址| av天堂在线播放| 久久久国产成人免费| 日本黄色视频三级网站网址 | 国产免费现黄频在线看| 夜夜夜夜夜久久久久| 岛国在线观看网站| 狠狠婷婷综合久久久久久88av| 丁香六月欧美| 少妇被粗大的猛进出69影院| 国产单亲对白刺激| 久久精品亚洲熟妇少妇任你| 18禁国产床啪视频网站| 久久天躁狠狠躁夜夜2o2o| av国产精品久久久久影院| 国产精品久久久人人做人人爽| 日韩大码丰满熟妇| 日日夜夜操网爽| 一级a爱视频在线免费观看| 日韩一区二区三区影片| 午夜福利,免费看| 日韩有码中文字幕| 黑人猛操日本美女一级片| 18禁观看日本| 老司机影院毛片| 国产亚洲午夜精品一区二区久久| 免费在线观看影片大全网站| 久久99一区二区三区| 黄色丝袜av网址大全| 国产精品亚洲一级av第二区| 男女无遮挡免费网站观看| 日韩一卡2卡3卡4卡2021年| 欧美人与性动交α欧美软件| 两个人免费观看高清视频| 一区在线观看完整版| 人人妻人人添人人爽欧美一区卜| 韩国精品一区二区三区| 性色av乱码一区二区三区2| 午夜成年电影在线免费观看| 日韩一区二区三区影片| 久久99一区二区三区| 亚洲情色 制服丝袜| 亚洲全国av大片| 男女下面插进去视频免费观看| 色播在线永久视频| 久久精品aⅴ一区二区三区四区| 在线观看免费日韩欧美大片| 天堂8中文在线网| 久久狼人影院| 欧美日韩一级在线毛片| 香蕉久久夜色| 91精品三级在线观看| 日本vs欧美在线观看视频| 亚洲中文字幕日韩| 大型av网站在线播放| 99国产精品一区二区三区| 亚洲,欧美精品.| 久9热在线精品视频| 老司机在亚洲福利影院| 欧美激情高清一区二区三区| 男女高潮啪啪啪动态图| 久久久久久久国产电影| 亚洲精品自拍成人| 99国产精品一区二区三区| 又黄又粗又硬又大视频| 国产成人系列免费观看| 又大又爽又粗| 丁香六月欧美| 天天影视国产精品| 黑人欧美特级aaaaaa片| 亚洲中文字幕日韩| 欧美日韩亚洲综合一区二区三区_| 欧美另类亚洲清纯唯美| 国产野战对白在线观看| 99香蕉大伊视频| 国产视频一区二区在线看| 99riav亚洲国产免费| 激情在线观看视频在线高清 | 国产激情久久老熟女| 国产精品久久久久成人av| 热99久久久久精品小说推荐| 香蕉丝袜av| 亚洲情色 制服丝袜| 国产日韩欧美亚洲二区| 国产精品美女特级片免费视频播放器 | 男女免费视频国产| 国产亚洲欧美精品永久| 欧美日韩黄片免| 亚洲av日韩在线播放| 真人做人爱边吃奶动态| 久久久久精品人妻al黑| 大片电影免费在线观看免费| av线在线观看网站| 麻豆国产av国片精品| 老司机深夜福利视频在线观看| 欧美黑人欧美精品刺激| 久久久国产成人免费| 精品国产亚洲在线| 国产一区二区三区在线臀色熟女 | 在线观看免费日韩欧美大片| 在线观看舔阴道视频| 色94色欧美一区二区| 国产高清videossex| 色在线成人网| 满18在线观看网站| www日本在线高清视频| 精品少妇黑人巨大在线播放| 精品一区二区三区四区五区乱码| 精品国产国语对白av| 岛国毛片在线播放| 欧美国产精品一级二级三级| 国产高清视频在线播放一区| av网站免费在线观看视频| 美女国产高潮福利片在线看| 色94色欧美一区二区| 国产av国产精品国产| 日韩三级视频一区二区三区| 亚洲国产中文字幕在线视频| 国产在线一区二区三区精| 国产极品粉嫩免费观看在线| 九色亚洲精品在线播放| 久久中文字幕一级| 国产高清国产精品国产三级| 91麻豆精品激情在线观看国产 | 久久这里只有精品19| 一二三四在线观看免费中文在| 视频区欧美日本亚洲| 精品国产乱码久久久久久小说| 欧美日韩亚洲高清精品| 久久免费观看电影| 一区二区三区乱码不卡18| 日本欧美视频一区| 国产欧美日韩综合在线一区二区| 亚洲精品在线美女| cao死你这个sao货| 亚洲一区中文字幕在线| 大香蕉久久网| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品国产区一区二| 中亚洲国语对白在线视频| 黄色成人免费大全| 亚洲av日韩精品久久久久久密| svipshipincom国产片| 欧美成人午夜精品| 亚洲黑人精品在线| 人人澡人人妻人| 天天影视国产精品| 欧美精品一区二区免费开放| 亚洲精品国产区一区二| 人成视频在线观看免费观看| 亚洲av片天天在线观看| 精品免费久久久久久久清纯 | 国产精品久久久久成人av| 王馨瑶露胸无遮挡在线观看| 国产精品久久久久久人妻精品电影 | 精品久久蜜臀av无| 狠狠精品人妻久久久久久综合| av网站在线播放免费| 老汉色av国产亚洲站长工具| 九色亚洲精品在线播放| 国产精品美女特级片免费视频播放器 | 欧美精品一区二区大全| 欧美+亚洲+日韩+国产| 母亲3免费完整高清在线观看| 三上悠亚av全集在线观看| 高清av免费在线|