• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Machine Learning with Dimensionality Reduction for DDoS Attack Detection

    2022-08-24 06:59:20ShavetaGuptaDineshGroverAhmadAliAlZubiNimitSachdevaMirzaWaqarBaigandJimmySingla
    Computers Materials&Continua 2022年8期

    Shaveta Gupta,Dinesh Grover,Ahmad Ali AlZubi,Nimit Sachdeva,Mirza Waqar Baig and Jimmy Singla

    1IK Gujral Punjab Technical University,Jalandhar,144603,India

    2Department.of Electrical Engineering and Computer Science,Punjab Agriculture University,Ludhiana,141004,India

    3Department of Computer Science,Community College,King Saud University,Riyadh,11437,Saudi Arabia

    4Vunsol Private Limited,Mohali,160055,India

    5Department of Electrical Engineering,FAST National University,CFD Campus,Faisalabad,44000,Pakistan

    6School of Computer Science and Engineering,Lovely Professional University,Punjab,144001,India

    Abstract: With the advancement of internet,there is also a rise in cybercrimes and digital attacks.DDoS(Distributed Denial of Service)attack is the most dominant weapon to breach the vulnerabilities of internet and pose a significant threat in the digital environment.These cyber-attacks are generated deliberately and consciously by the hacker to overwhelm the target with heavy traffic that genuine users are unable to use the target resources.As a result,targeted services are inaccessible by the legitimate user.To prevent these attacks,researchers are making use of advanced Machine Learning classifiers which can accurately detect the DDoS attacks.However,the challenge in using these techniques is the limitations on capacity for the volume of data and the required processing time.In this research work,we propose the framework of reducing the dimensions of the data by selecting the most important features which contribute to the predictive accuracy.We show that the ‘lite’model trained on reduced dataset not only saves the computational power,but also improves the predictive performance.We show that dimensionality reduction can improve both effectiveness(recall)and efficiency(precision)of the model as compared to the model trained on‘full’dataset.

    Keywords: DDoS (Distributed denial of service);internet;ML (machine learning);accuracy

    1 Introduction

    In all realms of business and industry,including banking,social media,e-mail,and university e-Services,network security has been crucial[1].Attacks have been launched against a variety of web and network services.The DDoS attack is the supreme culprit to exploit the limitations of the internet[2].When a popular website is not up,or the customers are deprived of access to a site,often the primary reason is a DDoS attack.The rationale behind facilitating the denial-of-service attack is to overload the victim with traffic,often more than its capacity,because of which the server becomes inoperable as shown in Fig.1.Hackers are constantly developing new types of Distributed Denial of Service(DDoS)attacks that target both the application and network layers.

    Figure 1:Typical Distributed Denial of Service(DDoS)attack

    In the last two decades,DDoS attacks are increasing at an alarming rate both in frequency and severity.In February 2020,it was detected on Amazon Web Services[3].It was 2.3 Tbsp.This attack is caused for three days of “Elevated Threats”for amazon’s shield staff.Similarly,it also happened on GitHub,which is an online code monitoring system utilized by several millions of developers in 2018.DDoS attacks can be driven by a variety of factors,including friendly competition,hacktivism,and acts of vengeance[4].There are vast weaknesses present in the network architecture that attracts hackers and intruders to launch DDoS attacks.Some of the internet characteristics that invite hackers to launch DDoS attacks are the deterministic nature of Internet Protocols,the stateless nature of routers,Lack of Authenticity on the internet,etc.As DDoS attacks are growing exponentially,and it is a big threat in the present digital world,so researchers have developed a variety of solutions to cope with them.Some attackers,on the other hand,are clever enough to get beyond these defenses[5].

    Whenever the attacker attacks on some website or a server,it’s important to filter the attack flow from the usual flow so that the genuine users need not suffer.Attack detection methodologies do the same thing i.e.,filter out the legitimate traffic from attack traffic.A prerequisite for attack detection is to gather enough information about the network traffic to analyze it for proper filtration.Broadly,it is categorized into two types[6]as shown in Fig.2:

    Figure 2:DDoS attack detection methodologies

    Signature Based DDoS detection(Misuse Detection):In these methods,a list of known signatures of attacks needs to be stored in the database and then traffic is monitored based on these signatures.If a match occurs,then it generates an alarm of suspicious traffic.Its biggest benefit is that it mostly gives 100%accurate results;however,its major disadvantage is its inability to detect unknown attacks[7-10].

    Anomaly-Based DDoS detection:In these methods,the system monitors the traffic data against a database containing features of normal data and any deviation from these features generates an alarm.Under this research work,we have used an anomaly-based detection methodology[7-10].

    Existing attack detection approaches[11-15]aim to detect ongoing DDoS attacks.Characterization of DDoS attacks helps to discriminate DDoS attacks from genuine users.However,no foolproof solution has yet been discovered.The researcher aims to lessen the false positive and false negative rates of detection but making them zero is impossible[16,17].

    Different researchers used different methodologies to detect DDoS attacks like statistical technique [18],neural network [19],fuzzy logic [20],or machine learning [21].Machine Learning is a data processing technique for creating analytical models that is automated.It is a subset of artificial intelligence predicated on the idea that computers can learn from data,recognize trends,and make judgments with little human intervention.Demand and importance of machine learning are increasing day by day among scientists,data analysts,and the corporate world.The difference between machine learning and statistical methods is their purpose.Statistical methods work best when we need to infer something from the data set.Machine learning,on the other hand,works effectively when the goal is to make predictions based on a set of data.As a result,machine learning is an algorithm that can learn from data without the need for specific laws,as is the case for conventional computer programs.

    The machine learning mechanisms are also widely used to detect attacks on the networks in centralized environments,such as cloud computing,software-defined networks,etc.However,data is usually the only requirement for machine learning.

    That’s why this research work is going to use a data set[22]that has sufficient rows to train the machine learning model.This cleaned dataset contains 60 features to train the machine learning model.However,according to the“curse of dimensionality,”the more features in a data set,the greater the risk of the model overfitting the data[23].Since overfitted models cannot be generalized well to outof-time data,so the next step is to evaluate if there is a way to reduce the input feature list without compromising the performance of the system.Furthermore,for the robustness and trustworthiness of the models,practitioners also need insights on which features contribute to predictive accuracy and they should be interpretable.Therefore,we select the best features as picked by the algorithm and reduce our dataset by using only those features.Our contributions are summarized as follows:

    ? The system undergoes a series of steps to pre-process the dataset.

    ? On the‘full’data set,various machine learning models are implemented.Based on performance measures,a comparative analysis of various machine learning models was conducted.

    ? Then,using‘feature importance’and‘Shapley value,’we used dimensionality reduction to the data set,picking just the highest performing features in our data.

    ? Finally,Random Forest algorithm is applied on the reduced dataset,and the performance is compared with the best performing model using the full dataset.

    2 Machine Learning Models

    Machine Learning is a data processing technique for creating analytical models that is automated.It is divided into three types:supervised,unsupervised,and reinforcement learning.We will employ supervised machine learning techniques in this study,which are briefly outlined below[24]:

    2.1 Logistic Regression

    It is the most basic and widely used machine learning algorithm for two-class classification problems.It is a statistical method to predict binary classes.Linear Regression assumes that the data follows a linear function and gives continuous output whereas the Logistic Regression model the data using Sigmoid Function and gives constant output.The sigmoid function,also known as the logistic function,generates an S-shaped curve that may transfer any real-valued number to a value between 0 and 1.

    2.2 Decision Tree

    It is a supervised learning technique that can be used to solve problems like classification and regression.Internal nodes carry dataset attributes,branches represent decision rules,and each leaf node represents the conclusion in a tree structured classifier.

    2.3 KNN(k-Nearest Neighbors)

    It is an easy approach to sort the data as shown in Fig.3.

    ? Start with a dataset with identified categories.

    ? Then add a new set of rows of data set that we need to classify.

    ? Then categorize the new cell by studying the nearest annotated cells.

    ? If k=1,the algorithm will look for a neighbor who is closest to a new cell.If k=11,the 11 closest neighbors would be used.

    Figure 3:KNN model

    2.4 Random Forest Machine Learning Model

    A random forest is a supervised machine learning system that uses decision tree algorithms to build it.This algorithm is used to anticipate behavior and outcomes in a variety of industries,including banking and e-commerce.Small changes to the training set might result in drastically different tree architectures,which is why decision trees are so sensitive to the data they’re trained on.Random forest takes use of this by enabling each tree to sample from the dataset at random with replacement,resulting in unique trees Fig.4.Bagging is the term for this procedure.

    Figure 4:Random forest model

    Step 1:Pick K data points from the training set at random

    Step 2:For the data points you’ve picked,make decision trees(Subsets).

    Step 3:Choose a N for the number of decision trees you want to make.

    Step 4:Go oversteps 1 and 2 again.

    Step 5:Locate each decision tree’s projections for new data points and assign them to the

    category with the most votes.

    2.5 Support Vector Machine(SVM)

    In this algorithm,for the classification of data points,the system will find a hyperplane in Ndimensional space that can do it.There can be a vast hyperplane that can do this job,but algorithm needs to choose that who has the maximum margin(Maximum distance between data points for both classes)as shown in Fig.5.

    Figure 5:SVM model

    2.6 NBC(Naive Bayes Classifier)

    It is a probabilistic machine learning system that’s commonly used to classify data sets.The Bayes Theorem is used to support this.Its advantages are that they give us fast results and are easy to implement.But its major disadvantage is that this algorithm demands predictors to be independent,but in most of the real scenario’s predictors are dependent.

    3 Related Work

    This section contains an overview of several publications on the machine learning approaches used to detect DDoS attacks:

    Prasad et al.[22]provided a DDoS detection method using machine learning and Stochastic Gradient Boosting.DDoS attacks are detected using machine learning in a non-linear way.Different Classifiers are used for intrusion detection.XGBOOST is a program that implements an algorithm.For testing and training,a 2:1 data set ratio is used.

    Pérez-Díaz et al.[25]demonstrated a modular and supported framework for detecting and mitigating the LR-DDoS attacks in SDN (Software Defined Networking) settings.The Intrusion Detection System was trained using the six machine learning algorithms.The authors use ML techniques like SVM,Random Forest and J48The accuracy of these models was also evaluated using the DoS dataset from the Canadian Institute of Cybersecurity.According to the data,the suggested solution achieved a detection rate of 95%.

    Karan et al.[26]presented a detection model for detecting DDoS attacks in an SDN environment.In this proposed model,two layers of protection are used.The evolved framework initially detects attacks based on signatures.These attacks are detected using Snort.Following that,two classifiers from machine learning techniques were used to construct a qualified model.These classifiers help vector machines and deep neural networks.This is followed by a comparison of the two classifiers.As a result,the model’s accuracy is 74.3%,and the DNN model is more efficient(with an accuracy of 84.3%).

    Nanda et al.[27]used machine learning algorithms to build a model.The model was trained by using information gleaned from previous attacks or interactions to recognized malicious attacks and contacts.To suggest the model,the most used ML techniques are Decision Table,Na?ve Bayes,Bayesian Network and,C4.5.This model describes the network that has been.After comparing the results,the accuracy of the Bayesian Network was found to be higher than that of the other models,at 91.68 percent.

    Table 1:Description of dataset

    Table 2:Flow details in balanced and imbalanced data sets

    Table 3:Feature description

    Table 4:Confusion matrix

    Table 5:TN,TP,FN,FP for random forest

    Table 6:Results of random forest

    Table 7:TN,TP,FN,FP for machine learning models

    Table 7:Continued

    Table 8:Comparative analysis of machine learning models based on metrics

    Table 9:Comparison results

    Silveira et al.[28]introduced a smart detecting gadget.This gadget aids in the detection of network DoS or DDoS attacks.The researchers employed the Random Forest Tree Algorithm,a machine learning technique,to develop this model,which classifies network traffic depending on the samples provided during the training phase.A series of tests are often performed to evaluate the performance of this scheme.As a result of these investigations,the given method is more realistic and has improved efficiency when compared to the most recent current system available in the literature on this subject.

    Li et al.[29]defined a method that uses deep learning to identify DDoS attacks on a network.The suggested model will achieve the outcome by using the network’s background of traffic dynamics as well as other network attack operations.The findings of this study also showed that the deep learning method is more reliable,effective,and effective.

    Elsayed et al.[30]extensively examined the different ML methodologies used by multiple researchers to detect DDoS attacks in the SDN environment.This study looked at the specific shortcomings that have been found in conventional models.Per technique has been tested in accordance with different performance criteria.In this job,four techniques are compared:SVM,Random Forest,and Na?ve Bayes and J48.It is discovered that the J48 machine learning algorithm is the best method for detecting DDoS attacks in an SDN environment since it is more accurate than other current approaches.

    4 Proposed Algorithm

    This section described the proposed algorithm to detect DDoS attacks.This research work is going to present a paradigm for decreasing data dimensions by identifying the most significant features that influence forecast accuracy.This shows that training a‘lite’model on a smaller dataset not only saves time and effort,but also enhances predictive performance.

    This research work is going to introduce an algorithm that can detect the DDoS attacks as described in Fig.6.

    1.First,collect the data.

    2.The data has been cleaned.

    3.Select 10%of data at random,i.e.,1048576 Flows.

    4.Apply Dimensionality Reduction on the cleaned data set.

    5.Then the data set is split up into two parts.In this research work,60% of the subset data is used to train Random Forest machine learning model.

    6.Second,the trained model is tested on the remaining 40%of the data subset.

    7.Performance Evaluation of trained model has been done based on metric values.

    Figure 6:Proposed algorithm

    4.1 Data Set and its Processing

    For this research,a data set was collected from three open data sets that had already been done[22]and are listed below in Tab.1.

    Tab.2.Mentioned that the total number of flows initially in the data set is 1294529(Imbalanced Flows).To make the data set balanced,so that machine learning model can be trained effectively,we have removed approx.6000000 flows from Label DDoS.Finally,in the balanced dataset has12794627 flows.So,it is computationally very cumbersome to incorporate with approximately 12 M rows approximately,we pre-process the data to come up with a significant number of rows to optimize the results.Fig.7.Shows a graphical representation of a balanced data set.

    Figure 7:Graphically representation of a balanced dataset

    We perform a series of steps to process the dataset to get a subset that is enough to apply the proposed algorithm as shown in Fig.8.

    Figure 8:Dataset processing

    1.The original data set contains 12794627 rows.

    2.Our Data Cleaning steps include

    ? Remove Categorical variables.As these variable does not help in characterization of DDoS/Flash/Normal traffic.In our case,we have removed IP,Timestamp,Protocol.

    ? Remove those columns which have more than 50%data missing.

    ? Remove all rows containing negative values as these are irrelevant.

    ? Make a Correlation matrix of all the features.

    ? |Correlation|>0.8——>Remove those features.

    3.Randomly pick 10%of the data after applying the above steps.

    4.2 Dimensionality Reduction

    Dimensionality Reduction means reducing the input features in the training data set.The motive of the reduction matrix is to select the fewer features which are enough to classify the data and that generalize well and make the machine learning model simple and generalizable to other datasets.There are several ways to reduce the number of features.The Python library scikit-learn is the most widely used and provides fairly accurate feature importance.Ideally,each feature can be removed one by one,and then the permutation analysis can be performed to evaluate how many features are sufficient to retain the same accuracy,but that is very computationally expensive.Other techniques like Principal Component Analysis(PCA)can reduce the features but also makes the model opaque.It transforms the features into linear combinations which cannot be directly interpreted for describing the use case.Therefore,in this analysis,we intend to keep the individual features untransformed but pick the 10 most important ones.

    As the scikit-learn feature importance works best on tree-based methods,this research work evaluated it on Random Forest as shown in Fig.9.

    Figure 9:Top 10 feature list using scikit library

    Machine Learning is usually referred to as “Black Box”,as it remains hidden to a normal user about how a machine reached a particular decision[31].What all features contributed to the decisionmaking.To better comprehend the features and their decisions,we calculate SHAP values for each data point.The Shapley value is the average estimated marginal contribution of one player.When each player may have contributed more or less than the others,Shapley value can help calculate a payout for all of them.Another library called Probatus was used to accomplish this.This library suggests leading features for discrimination of DDoS attack and normal traffic,and in addition to this,it also indicates feature’s individual contribution towards DDoS attack and normal traffic identification.As shown in Fig.10.Negative values on X-axis represent DDoS attack and positive values on x-axis contribute towards normal traffic.High value of Fwd Seg Size Min (Red Color) indicates it is a DDoS attack and low value of Fwd Seg Size Min(Blue color)suggests it is a normal traffic.Likewise,low value of Init Fwd Win Bytes(Blue color)suggests it is a DDoS attack and High value of Init Fwd Win Bytes(Red Color)implies it is a normal traffic.

    Figure 10:SHAP values for each data point in test set

    The ten most prominent features with their description are shown in Tab.3.

    4.3 Performance Evaluation

    Machine learning methods come in a variety of shapes and sizes.The main issue is determining which approach is optimal for our dataset [32].The two major aims of an optimal DDoS security system are effectiveness and accuracy[33].The confusion matrix,which is quantified in terms of the number of False Positives(FPs)and False Negatives(FNs),is used to evaluate the execution of each model(FNs).Predictive analysis for DDoS defense formulates a table called the confusion matrix as described in Tab.4.

    Since we are interested in detecting DDoS,we call successful detection of DDoS in our data as“true positive”and the detection of normal as“true negative”.Consequently,“false positive”would be when a data point is detected as DDoS but is normal.Similarly,a“false negative”would be when a data point is detected as normal but is a DDoS attack.

    Precision,Recall,Accuracy,AUC,f1-score,Receiver Operating Characteristics(ROC)detection metrics to measure the performance of the proposed approach.Precision is a calculation of how much of the test data observed as attacks belongs to one of the attack groups.On the other hand,Recall is the ratio of detected attacks to the total attack events[34].

    Recall=TP/(TP+FN)

    Precision=TP/(TP+FP)

    Accuracy=TP+TN/(TP+FP+FN+TN)

    Receiver Operator Characteristics(ROC):-This graph provides a simple way to summarize true positive and false positive rates.

    AUC (Area Under Curve):-Allows for simple comparison of one ROC curve to another.The higher the AUC value,the better the model.

    5 Results and Discussions

    The results of our proposed algorithm with 10 features set in terms of ROC curve,False negatives,False positives,True Negatives,True Positives,Accuracy,Precision and Recall are shown in Fig.11,Tabs.5,6.

    Figure 11:ROC curve for random forest

    The results of the various machine learning models on 60 features data set are shown in Tab.7.But challenge here is to process the voluminous data as a result,lot of computation is required by various machine learning models.

    Fig.12.Represents Receiver Operating Characteristics (ROC) for different machine learning models on the 60 features dataset.

    Figure 12:ROC curves for machine learning models

    Tab.8.Describes the comparative analysis of various machine learning models based on metrics like accuracy,recall,etc.It has been concluded that Random Forest performs best in all the machine learning models with 60 features data set.

    Above are the results of various machine learning models on 60 features data set.However,according to the “curse of dimensionality,” the more characteristics in a data set,the greater the risk of the model overfitting the data.Because overfitted models can generalize well to out-of-time data,so,in this research work we have tried to minimize the input features without sacrificing the model’s performance.This has been achieved by dimensionality reduction using‘feature importance’and SHAP value importance.Tab.9.Represents comparative analysis of random forest model on 60 features data set with our proposed model.

    It has been clear from the results that by reducing the features from 60 to 10,false positives and false negatives score decreases further as a result accuracy and recall improves.

    6 Conclusion

    Dimensionality Reduction applied to the existing data sets is an economical and effective method to improves accuracy and reduces the computational power needed for machine learning models.Depending on the use case,practitioners may want to reduce false positives or false negatives in the model.Our model with reduced dataset shows that both false negatives and false positives are reduced as compared to the model trained on full dataset.Thus,avoiding the overfitting in model training by dimensionality reduction not only makes the model‘lite’which can be easily implemented on cloud systems,but its performance(both detection rate and precision)also improves.

    In our future work,Firstly,we highly encourage to provide different datasets from different domains e.g.,ecom,education,healthcare,etc.to be used to make this solution more generic.Secondly,we will try to use another feature dimensionality reduction on the same data set that not only reduces the feature set but also contributed towards decision making i.e.,feature individual contribution towards DDoS attacks and Normal Traffic.Third,use of Auto ML,concept where machine trains and updates its model automatically,is encouraged for any future work,to take this concept to even one step further.

    Acknowledgement:This work was supported by the Researchers Supporting Project (No.RSP-2021/395),King Saud University,Riyadh,Saudi Arabia.

    Funding Statement:This work was supported by the Researchers Supporting Project (No.RSP-2021/395),King Saud University,Riyadh,Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    天堂网av新在线| 精品熟女少妇八av免费久了| 国内毛片毛片毛片毛片毛片| 五月玫瑰六月丁香| 日韩人妻高清精品专区| 欧美高清成人免费视频www| 一卡2卡三卡四卡精品乱码亚洲| 亚洲国产精品成人综合色| 丰满人妻一区二区三区视频av| 久久热精品热| 精品久久久久久久久亚洲 | 欧美最新免费一区二区三区 | 在线观看免费视频日本深夜| 亚洲欧美日韩高清在线视频| 久久99热6这里只有精品| 一区二区三区免费毛片| 麻豆国产97在线/欧美| 欧美在线黄色| 国内精品美女久久久久久| 免费av观看视频| 国产av一区在线观看免费| 可以在线观看的亚洲视频| 丝袜美腿在线中文| 国产高清视频在线观看网站| 无遮挡黄片免费观看| 黄色一级大片看看| 啦啦啦观看免费观看视频高清| 国产精品伦人一区二区| 日本一二三区视频观看| 国产黄色小视频在线观看| 美女xxoo啪啪120秒动态图 | 欧美日韩瑟瑟在线播放| 人妻制服诱惑在线中文字幕| a级一级毛片免费在线观看| 亚洲中文日韩欧美视频| 在线国产一区二区在线| 老女人水多毛片| 国产色爽女视频免费观看| 99精品在免费线老司机午夜| 午夜日韩欧美国产| 亚洲无线观看免费| 国产精品人妻久久久久久| 91狼人影院| 国产成+人综合+亚洲专区| 91狼人影院| 免费无遮挡裸体视频| 在线观看66精品国产| 免费无遮挡裸体视频| 亚洲 欧美 日韩 在线 免费| 国产乱人视频| 欧美性猛交╳xxx乱大交人| 国产成人av教育| 欧美潮喷喷水| 人人妻人人澡欧美一区二区| 丝袜美腿在线中文| 99热这里只有是精品50| 波多野结衣高清无吗| 国产精品日韩av在线免费观看| 久9热在线精品视频| 脱女人内裤的视频| 999久久久精品免费观看国产| 久久久久久久久久黄片| 国产成人av教育| 日韩欧美在线乱码| 99国产极品粉嫩在线观看| 欧美性猛交黑人性爽| 一级作爱视频免费观看| 中文字幕av在线有码专区| 我的老师免费观看完整版| 久久中文看片网| 18美女黄网站色大片免费观看| 桃色一区二区三区在线观看| 好看av亚洲va欧美ⅴa在| 97碰自拍视频| 一个人免费在线观看电影| 亚洲人成伊人成综合网2020| 亚洲欧美日韩东京热| 国产男靠女视频免费网站| 国产一区二区亚洲精品在线观看| 夜夜夜夜夜久久久久| 中文字幕av在线有码专区| 在线观看av片永久免费下载| 噜噜噜噜噜久久久久久91| 午夜激情欧美在线| 91狼人影院| 国产三级在线视频| 亚洲欧美日韩卡通动漫| 成熟少妇高潮喷水视频| 一个人看的www免费观看视频| 午夜福利欧美成人| 欧美成人a在线观看| 日本三级黄在线观看| 三级男女做爰猛烈吃奶摸视频| 欧美午夜高清在线| 色精品久久人妻99蜜桃| 又黄又爽又刺激的免费视频.| 婷婷精品国产亚洲av| 一进一出好大好爽视频| 精品人妻熟女av久视频| 国产精品人妻久久久久久| 亚洲美女黄片视频| 十八禁人妻一区二区| 国产在线精品亚洲第一网站| 黄色日韩在线| 一a级毛片在线观看| 夜夜爽天天搞| 人妻丰满熟妇av一区二区三区| 亚洲精品在线美女| 听说在线观看完整版免费高清| 日本黄色片子视频| 免费看光身美女| 午夜a级毛片| 中亚洲国语对白在线视频| 日韩欧美国产在线观看| 97碰自拍视频| 日本 欧美在线| 国产精品一区二区免费欧美| 日韩人妻高清精品专区| 99久久无色码亚洲精品果冻| 日韩大尺度精品在线看网址| 成人国产一区最新在线观看| 啪啪无遮挡十八禁网站| 免费人成在线观看视频色| 91午夜精品亚洲一区二区三区 | 成年免费大片在线观看| 在线观看免费视频日本深夜| 亚洲精品粉嫩美女一区| 国产成人欧美在线观看| 成人特级黄色片久久久久久久| 哪里可以看免费的av片| 亚洲欧美激情综合另类| av天堂中文字幕网| 欧美性猛交黑人性爽| 久久精品国产99精品国产亚洲性色| 亚洲国产精品合色在线| 国产精品一及| 欧美黑人巨大hd| 亚洲自偷自拍三级| 变态另类成人亚洲欧美熟女| 国语自产精品视频在线第100页| 国产爱豆传媒在线观看| 丁香欧美五月| 天堂√8在线中文| 桃红色精品国产亚洲av| 国产在线男女| 亚洲av.av天堂| 成人性生交大片免费视频hd| 国产精品亚洲美女久久久| 精品99又大又爽又粗少妇毛片 | 99久久久亚洲精品蜜臀av| 欧美性猛交╳xxx乱大交人| 欧美另类亚洲清纯唯美| 动漫黄色视频在线观看| 亚洲av一区综合| 国产成人啪精品午夜网站| 久久国产精品影院| 久久人人爽人人爽人人片va | 国产一区二区三区视频了| 欧美日韩中文字幕国产精品一区二区三区| 免费黄网站久久成人精品 | 国产69精品久久久久777片| 亚洲av二区三区四区| 精品午夜福利在线看| 精品无人区乱码1区二区| 欧美日本视频| 久久这里只有精品中国| 少妇人妻精品综合一区二区 | 最近视频中文字幕2019在线8| 国产精品久久久久久久久免 | 99国产精品一区二区蜜桃av| 丁香六月欧美| 最新中文字幕久久久久| 亚洲最大成人手机在线| 91狼人影院| 香蕉av资源在线| 国产成人av教育| 国产精品乱码一区二三区的特点| 久久人人爽人人爽人人片va | 精品人妻偷拍中文字幕| 一个人观看的视频www高清免费观看| av黄色大香蕉| 亚洲精品一区av在线观看| 免费搜索国产男女视频| av在线老鸭窝| 精品久久久久久久久亚洲 | 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 国内毛片毛片毛片毛片毛片| 久久国产精品人妻蜜桃| 亚洲精品在线观看二区| 日韩亚洲欧美综合| 韩国av一区二区三区四区| avwww免费| 久9热在线精品视频| 伊人久久精品亚洲午夜| 有码 亚洲区| 校园春色视频在线观看| 国内少妇人妻偷人精品xxx网站| 欧美性猛交╳xxx乱大交人| 级片在线观看| 国产一区二区在线观看日韩| 成人性生交大片免费视频hd| 亚洲人成网站在线播放欧美日韩| 男女之事视频高清在线观看| 少妇的逼水好多| 男人舔女人下体高潮全视频| 免费在线观看成人毛片| 国产精品98久久久久久宅男小说| av在线天堂中文字幕| 国产av一区在线观看免费| 久久欧美精品欧美久久欧美| 午夜免费激情av| 中文字幕高清在线视频| 亚洲av美国av| 免费黄网站久久成人精品 | 婷婷丁香在线五月| 91午夜精品亚洲一区二区三区 | www.熟女人妻精品国产| 精品久久久久久,| 男插女下体视频免费在线播放| 午夜视频国产福利| 久久精品国产亚洲av涩爱 | 黄色视频,在线免费观看| av视频在线观看入口| 51国产日韩欧美| 精品一区二区三区av网在线观看| 少妇熟女aⅴ在线视频| 国产乱人伦免费视频| 91字幕亚洲| 国产黄a三级三级三级人| 日韩av在线大香蕉| 欧美色欧美亚洲另类二区| 脱女人内裤的视频| 亚洲欧美日韩无卡精品| x7x7x7水蜜桃| 欧美三级亚洲精品| 毛片一级片免费看久久久久 | netflix在线观看网站| 九九久久精品国产亚洲av麻豆| 非洲黑人性xxxx精品又粗又长| 看十八女毛片水多多多| 日本a在线网址| 99热精品在线国产| 高清日韩中文字幕在线| 亚洲美女搞黄在线观看 | 12—13女人毛片做爰片一| 天美传媒精品一区二区| 日日夜夜操网爽| 国产主播在线观看一区二区| 日本黄色片子视频| 精品人妻偷拍中文字幕| 18禁裸乳无遮挡免费网站照片| 波多野结衣巨乳人妻| 久久中文看片网| 如何舔出高潮| 亚洲精品一区av在线观看| 欧美乱妇无乱码| 免费无遮挡裸体视频| or卡值多少钱| 午夜视频国产福利| 亚洲精品粉嫩美女一区| 亚洲欧美日韩高清在线视频| 久久婷婷人人爽人人干人人爱| 99热这里只有是精品在线观看 | xxxwww97欧美| 午夜福利高清视频| 久久久久国内视频| 日韩精品中文字幕看吧| 性色av乱码一区二区三区2| 丁香六月欧美| 国产国拍精品亚洲av在线观看| 亚洲国产精品久久男人天堂| 亚洲国产精品999在线| 国产成人aa在线观看| 在线天堂最新版资源| 两个人视频免费观看高清| 看黄色毛片网站| 久久中文看片网| 亚洲人成网站在线播| 国产精品影院久久| 亚洲成人久久爱视频| 夜夜看夜夜爽夜夜摸| 丝袜美腿在线中文| 天天一区二区日本电影三级| 欧美性感艳星| 18+在线观看网站| 欧美精品国产亚洲| 九色国产91popny在线| 美女xxoo啪啪120秒动态图 | 亚洲aⅴ乱码一区二区在线播放| 窝窝影院91人妻| 久久中文看片网| 欧美极品一区二区三区四区| 亚洲真实伦在线观看| 一本一本综合久久| 不卡一级毛片| 欧美在线一区亚洲| 国产精品国产高清国产av| 美女xxoo啪啪120秒动态图 | 一边摸一边抽搐一进一小说| 免费无遮挡裸体视频| 免费观看人在逋| 中文字幕高清在线视频| 久久精品综合一区二区三区| 国产精品野战在线观看| 我的女老师完整版在线观看| 欧美极品一区二区三区四区| 欧美bdsm另类| 特大巨黑吊av在线直播| av天堂在线播放| 久99久视频精品免费| 精品一区二区三区视频在线观看免费| 99riav亚洲国产免费| 黄色配什么色好看| 久久久久久久精品吃奶| 日日摸夜夜添夜夜添av毛片 | 欧美xxxx性猛交bbbb| 日本黄大片高清| 国模一区二区三区四区视频| 精品不卡国产一区二区三区| 色精品久久人妻99蜜桃| 麻豆成人av在线观看| 日日干狠狠操夜夜爽| 色5月婷婷丁香| 淫秽高清视频在线观看| 免费av观看视频| 国产亚洲欧美在线一区二区| 99热精品在线国产| 国产精品三级大全| 小蜜桃在线观看免费完整版高清| 亚洲无线在线观看| 少妇的逼水好多| 国产一区二区在线av高清观看| 午夜精品一区二区三区免费看| 久久精品国产清高在天天线| 午夜久久久久精精品| 午夜a级毛片| 老司机福利观看| 亚洲乱码一区二区免费版| 日韩 亚洲 欧美在线| 99久久久亚洲精品蜜臀av| 亚洲av免费高清在线观看| 亚洲中文字幕日韩| 亚洲av免费高清在线观看| 日韩中文字幕欧美一区二区| 成年人黄色毛片网站| 国产精品久久久久久久电影| 亚洲欧美清纯卡通| 身体一侧抽搐| 精品一区二区三区视频在线| 成人毛片a级毛片在线播放| 国产亚洲精品久久久com| 日韩中文字幕欧美一区二区| 成年人黄色毛片网站| 欧美三级亚洲精品| 久久久国产成人免费| 我的老师免费观看完整版| 日韩亚洲欧美综合| 成人毛片a级毛片在线播放| 国产淫片久久久久久久久 | 国模一区二区三区四区视频| 亚洲中文字幕日韩| 欧美色视频一区免费| 国产免费一级a男人的天堂| 国产精华一区二区三区| 亚洲中文字幕一区二区三区有码在线看| 午夜老司机福利剧场| 女同久久另类99精品国产91| 久久久久国内视频| 国产午夜福利久久久久久| 十八禁人妻一区二区| 亚洲人成网站在线播放欧美日韩| 午夜精品在线福利| 每晚都被弄得嗷嗷叫到高潮| 欧美日韩福利视频一区二区| 成人国产一区最新在线观看| 日本黄色片子视频| 日韩中字成人| 亚洲精品乱码久久久v下载方式| 国产不卡一卡二| 亚洲男人的天堂狠狠| 久久精品国产自在天天线| 欧美极品一区二区三区四区| 亚洲综合色惰| 日本一本二区三区精品| 国产欧美日韩精品亚洲av| 高潮久久久久久久久久久不卡| 国产欧美日韩精品亚洲av| 国产精品电影一区二区三区| 噜噜噜噜噜久久久久久91| 国产亚洲精品av在线| 深爱激情五月婷婷| 国产精品乱码一区二三区的特点| 亚洲五月天丁香| 欧美日韩综合久久久久久 | aaaaa片日本免费| 国产精品久久久久久亚洲av鲁大| 在线看三级毛片| 精品人妻1区二区| 在线看三级毛片| 日韩欧美精品v在线| 极品教师在线视频| 国产高清激情床上av| 亚洲国产精品久久男人天堂| 久久久久久久久久黄片| 美女被艹到高潮喷水动态| 国产一区二区激情短视频| a级一级毛片免费在线观看| 淫秽高清视频在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 69av精品久久久久久| .国产精品久久| 成人无遮挡网站| 麻豆成人av在线观看| 国产亚洲av嫩草精品影院| 国产午夜福利久久久久久| 别揉我奶头~嗯~啊~动态视频| 久久久久久九九精品二区国产| 狂野欧美白嫩少妇大欣赏| 免费看a级黄色片| 欧美3d第一页| 国产伦精品一区二区三区视频9| 欧美国产日韩亚洲一区| 亚洲国产欧洲综合997久久,| 真人做人爱边吃奶动态| 免费看美女性在线毛片视频| 成人国产综合亚洲| 青草久久国产| 国产乱人视频| 亚洲第一欧美日韩一区二区三区| 久久久成人免费电影| 国产高清三级在线| 90打野战视频偷拍视频| 人妻制服诱惑在线中文字幕| 18禁裸乳无遮挡免费网站照片| 国产精品一区二区性色av| 三级毛片av免费| 午夜免费成人在线视频| 精品99又大又爽又粗少妇毛片 | 亚洲最大成人手机在线| 日韩欧美国产一区二区入口| 老司机福利观看| 国产精品一及| 国产激情偷乱视频一区二区| 深爱激情五月婷婷| 变态另类成人亚洲欧美熟女| 欧美成狂野欧美在线观看| ponron亚洲| 在线看三级毛片| 中文字幕人成人乱码亚洲影| 十八禁国产超污无遮挡网站| 亚洲av电影在线进入| 国产免费男女视频| 久久午夜福利片| 我的老师免费观看完整版| 老司机午夜十八禁免费视频| 国产不卡一卡二| 老女人水多毛片| 久久久久久国产a免费观看| 欧美激情国产日韩精品一区| 亚洲五月天丁香| 国产精品一区二区性色av| 精品无人区乱码1区二区| 成人特级黄色片久久久久久久| 久久九九热精品免费| 日韩精品青青久久久久久| 国产精品亚洲av一区麻豆| 国产精品av视频在线免费观看| 老女人水多毛片| 久久久久久久午夜电影| 又黄又爽又免费观看的视频| 成年人黄色毛片网站| 午夜福利在线在线| 亚洲avbb在线观看| 亚洲国产欧洲综合997久久,| 国产午夜精品论理片| 欧美成人a在线观看| 老熟妇乱子伦视频在线观看| 亚洲av免费高清在线观看| 亚洲精品在线观看二区| 国产久久久一区二区三区| 亚洲国产欧洲综合997久久,| 国产午夜精品论理片| 亚洲精华国产精华精| 亚洲成人久久性| 首页视频小说图片口味搜索| 九九久久精品国产亚洲av麻豆| 中文字幕久久专区| 欧美一区二区亚洲| 欧美不卡视频在线免费观看| 真人一进一出gif抽搐免费| 国产精品影院久久| 欧美国产日韩亚洲一区| 国产精品日韩av在线免费观看| 在线十欧美十亚洲十日本专区| 午夜老司机福利剧场| 亚洲 国产 在线| 亚洲av电影不卡..在线观看| 国产高清视频在线观看网站| 特级一级黄色大片| 午夜老司机福利剧场| 国产三级中文精品| 99热这里只有精品一区| 国产成人福利小说| 成人国产综合亚洲| 别揉我奶头~嗯~啊~动态视频| 亚洲国产精品sss在线观看| 国产aⅴ精品一区二区三区波| a级毛片a级免费在线| h日本视频在线播放| 能在线免费观看的黄片| 久久精品久久久久久噜噜老黄 | 91久久精品电影网| 男人狂女人下面高潮的视频| 我的女老师完整版在线观看| 日日摸夜夜添夜夜添av毛片 | av在线老鸭窝| 一级毛片久久久久久久久女| 成人特级黄色片久久久久久久| 日本撒尿小便嘘嘘汇集6| 少妇被粗大猛烈的视频| 中文字幕免费在线视频6| 男人舔女人下体高潮全视频| 国产精品久久电影中文字幕| 精华霜和精华液先用哪个| 麻豆av噜噜一区二区三区| 国产精品综合久久久久久久免费| 99在线视频只有这里精品首页| 一区二区三区高清视频在线| 日韩高清综合在线| 婷婷亚洲欧美| 俄罗斯特黄特色一大片| 欧美激情国产日韩精品一区| 久久久久久久精品吃奶| 在线a可以看的网站| 欧美成狂野欧美在线观看| 欧美一区二区精品小视频在线| 国产中年淑女户外野战色| 日韩成人在线观看一区二区三区| 日本黄色片子视频| 日本与韩国留学比较| 美女高潮的动态| 3wmmmm亚洲av在线观看| 中文字幕免费在线视频6| 国产主播在线观看一区二区| 精品人妻一区二区三区麻豆 | 亚洲久久久久久中文字幕| 3wmmmm亚洲av在线观看| 蜜桃亚洲精品一区二区三区| 男女下面进入的视频免费午夜| 国产成人啪精品午夜网站| 国产伦精品一区二区三区视频9| 直男gayav资源| 国产伦精品一区二区三区视频9| 免费在线观看成人毛片| 日本黄大片高清| 亚洲成人久久爱视频| 亚洲 欧美 日韩 在线 免费| 一区二区三区四区激情视频 | 欧美日本亚洲视频在线播放| 老司机午夜福利在线观看视频| 五月伊人婷婷丁香| www.熟女人妻精品国产| 五月玫瑰六月丁香| 午夜视频国产福利| 制服丝袜大香蕉在线| 久久久久国产精品人妻aⅴ院| 亚洲精品久久国产高清桃花| 日本成人三级电影网站| 国产麻豆成人av免费视频| 亚洲综合色惰| 搞女人的毛片| 国产欧美日韩一区二区精品| 国内揄拍国产精品人妻在线| 看免费av毛片| 日本 欧美在线| av在线观看视频网站免费| 久久久久久久亚洲中文字幕 | 精品一区二区三区人妻视频| 精品久久久久久成人av| 国产一区二区三区在线臀色熟女| 亚洲 欧美 日韩 在线 免费| 色综合欧美亚洲国产小说| 亚洲熟妇熟女久久| av天堂中文字幕网| 成人鲁丝片一二三区免费| 国产av不卡久久| 波野结衣二区三区在线| 在线看三级毛片| 天堂动漫精品| 国语自产精品视频在线第100页| 97超级碰碰碰精品色视频在线观看| 欧美黑人欧美精品刺激| 免费无遮挡裸体视频| xxxwww97欧美| 久久人人爽人人爽人人片va | 69人妻影院| 嫩草影视91久久| 男女那种视频在线观看| 69人妻影院| 男人舔奶头视频| 亚洲人成网站高清观看| 国产精品久久久久久人妻精品电影| 欧美+亚洲+日韩+国产| av在线老鸭窝| 亚洲国产精品成人综合色| 人人妻人人澡欧美一区二区| 国产探花在线观看一区二区| 欧美成人一区二区免费高清观看| 国产野战对白在线观看| 怎么达到女性高潮| 成人无遮挡网站| www日本黄色视频网| 99久久99久久久精品蜜桃| 日韩亚洲欧美综合| 丰满的人妻完整版|