• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    VPN and Non-VPN Network Traffic Classification Using Time-Related Features

    2022-08-24 07:00:34MustafaAlFayoumiMohammadAlFawarehandShadiNashwan
    Computers Materials&Continua 2022年8期

    Mustafa Al-Fayoumi,Mohammad Al-Fawa’reh and Shadi Nashwan

    1King Hussein School of Computing Sciences,Princess Sumaya University for Technology(PSUT),Amman,Jordan

    2College of Information Technology and Computer Science,Yarmouk University,Amman,Jordan

    3College of Computer and Information Sciences,Jouf University,Aljouf,Saudi Arabia

    Abstract: The continual growth of the use of technological appliances during the COVID-19 pandemic has resulted in a massive volume of data flow on the Internet,as many employees have transitioned to working from home.Furthermore,with the increase in the adoption of encrypted data transmission by many people who tend to use a Virtual Private Network (VPN) or Tor Browser (dark web) to keep their data privacy and hidden,network traffic encryption is rapidly becoming a universal approach.This affects and complicates the quality of service(QoS),traffic monitoring,and network security provided by Internet Service Providers (ISPs),particularly for analysis and anomaly detection approaches based on the network traffic’s nature.The method of categorizing encrypted traffic is one of the most challenging issues introduced by a VPN as a way to bypass censorship as well as gain access to geo-locked services.Therefore,an efficient approach is especially needed that enables the identification of encrypted network traffic data to extract and select valuable features which improve the quality of service and network management as well as to oversee the overall performance.In this paper,the classification of network traffic data in terms of VPN and non-VPN traffic is studied based on the efficiency of time-based features extracted from network packets.Therefore,this paper suggests two machine learning models that categorize network traffic into encrypted and non-encrypted traffic.The proposed models utilize statistical features (SF),Pearson Correlation(PC),and a Genetic Algorithm (GA),preprocessing the traffic samples into net flow traffic to accomplish the experiment’s objectives.The GA-based method utilizes a stochastic method based on natural genetics and biological evolution to extract essential features.The PC-based method performs well in removing different features of network traffic.With a microsecond perpacket prediction time,the best model achieved an accuracy of more than 95.02 percent in the most demanding traffic classification task,a drop in accuracy of only 2.37 percent in comparison to the entire statistical-based machine learning approach.This is extremely promising for the development of real-time traffic analyzers.

    Keywords: Network traffic-flow;traffic classification;time-based features;machine learning;VPN traffic analysis

    1 Introduction

    The continued expansion of the Internet and mobile networks has increased data security concerns.Nowadays,the constant expansion of the Internet and wireless technologies allows millions of people and devices to access the internet,with network capacity expanding as a result of the evergrowing number of machines and applications that are being used.In addition,this ever-growing access has resulted in a huge volume of data flow on the Internet.For example,the launch of the Internet of Things (IoT) requires both internet access and a high level of security to ensure privacy and functionality.Therefore,the need for more advanced techniques to enhance security services and cover all aspects of data assets and network quality of service (QoS) has arisen [1].For instance,in recent years,much effort has been devoted to studying and analyzing network traffic by characterizing it through the different protocols adopted,such as Transmission Control Protocol/Internet Protocol(TCP/IP).Accordingly,most web-based applications rely on an application layer according to the TCP/IP design nature.In the case of network traffic,there may have been additional issues about the data security being transmitted[2].

    This led to the adoption of a more advanced technique for tunneling IP traffic data,as in the case of VPN connectivity.This also led to the need to maintain a special mechanism for routing traffic between nodes on public networks,in addition to hiding the identity of the senders and the receivers in terms of the IPs.

    Furthermore,encryption is already ubiquitous on the Internet,making it possible to have secure conversations.As a result,the process of traffic classification becomes more difficult.Traffic classification can be divided into several categories depending on its final purpose:traffic classification based on encryption of traffic using HTTPS,traffic classification based on protocol encapsulation using IP Security protocol (IPSec) or VPN tunneling,traffic classification based on application port numbers,and traffic classification based on specific applications such as Facebook and Gmail.Through the use of multiple services,it becomes possible to identify the application and the tasks associated with it.

    Individuals,small businesses,and huge corporations now deal with network security,in the same manner,they deal with physical security.The global pandemic in the past years heightened the obstacles in facing multiple attacks and raised public awareness.Due to COVID 19,remote work requires a VPN.That is,employees had to work from home and then connect to a VPN to assure encrypted connections and avoid hazards.Understanding potential threats are critical to preventing assaults.The Internet is particularly vulnerable to threats and attacks.VPN,firewalls,and intrusion detection systems(IDS)are often utilized as preventative technologies[3].

    VPNs are a technology that allows safe communication over unprotected networks(such as the Internet).There are various sorts of VPN systems,each with its security strategy,pros and cons,and reliance on different protocols and standards.This evolution of VPN technology has made it the dominant method of routing Internet traffic between different internet-connected destinations.One of the most significant features of a VPN is the already encrypted IP traffic tunnel.It is practically hard to detect which program is running via the VPN tunnel ends since the IPSec protocol maintains packet-level encryption.

    Classification of VPN traffic is critical for network security and data tracking,as well as improving internet security.It is also a vital aspect in identifying networks such as VPN and non-VPN traffic.We can use bandwidth more efficiently by sorting packets before sending them across the network.For performance and usefulness,Internet Service Providers(ISPs)must classify traffic.It is also the first step in prioritizing network traffic.Packet classification is an important part of QoS.QoS is a set of policies that give network traffic priority over other traffic.In particular,real-time traffic stands out,as faults can be recognized instantly (VoIP).Assuring that key applications execute smoothly is the goal of QoS[4].

    However,analyzing such traffic data would require complex techniques for understanding the traffic type and its nature,and in particular VPN traffic and the applications using this type of network traffic [5,6].Managing and optimizing network capacity for QoS has grown more complicated.Traditionally,Network Monitoring Service(NMS)analyzes network and service traffic behavior.This system’s data can be used to identify the most essential links or apps that use the most bandwidth on the network,allowing network managers to quickly resolve issues and offer high-quality service to customers[7].

    In contrast to most researches in this field,which focuses on studying specific application types through machine learning and statistical analysis,we propose in this paper an analytic approach to classify the VPN and non-VPN network traffic using time-related variables.This classification analysis aids in understanding the most important thing in the network visibility,namely the traffic type of the network.The focus of our work was on differentiating encrypted traffic from un-encrypted traffic;i.e.,VPN and non-VPN traffic,respectively.This is a challenging issue since features always rely on the IP packet header.In addition,since encrypted traffic is the main concern,three network implementations fall within the scope of this work,namely the IPSec,P2P tunneling,and Secure Socket Layer(SSL).The machine learning classification technique used to achieve the modeling and analysis results is the random forest algorithm,which is a special and advanced implementation of decision trees to data classification.

    This paper’s major goal is to classify encrypted network traffic into appropriate traffic categories.The study’s objectives are as follows:

    ? Proposing a flow-based method for categorizing encrypted traffic into distinct categories,a flow-based method for detecting VPN traffic using time-related features,this will be achieved by utilizing three algorithms:statistical features(SF),Pearson Correlation(PC),and a Genetic Algorithm(GA).

    ? Proposing an ML analysis approach with the aid of a random forest algorithm to classify the traffic after considering the features reduction technique based on the variance and the correlated features with normalized data,i.e.,standardized features.

    ? Studying the ROC rate between the different traffic timeout datasets to prove its efficiency.

    ? Examining the proposed model’s strength and ability to classify network traffic on a real dataset.

    ? evaluating the proposed model by measuring the value of its accuracy on the ISCX-VPN2016 dataset.

    The remainder of the paper is organized as follows.Section 2 presents the literature review of network traffic classifications using machine learning.Section 3 introduces the dataset and the methodology used for performing a classification analysis of network traffic.The experimental setup and results for the adopted methodology are presented in Section 4.Section 5 presents the discussion of findings.Finally,the conclusions and recommendations for future work can be found in Section 6.

    2 Literature Review

    Many approaches for classifying network traffic have been proposed.Some of these approaches depend on the statistical features or characteristics extracted from the packet flow,whereas others are based on the signature of the application itself using the rule-based,black list,and white approaches.Given those approaches,research regarding the network packet attributes and flow classification began 30 years ago by Paxson [8].The authors assumed that some statistical features are suitable to classify the protocols.Such features are flow duration,packet length,and the time required for packets’arrival.A traffic classification model suggested by Gómez Sena et al.[9]was based on the statistical features of traffic flows.Real-time traffic classification is made possible by using statistics gathered from the first few packets of data traveling in both directions of flow.They proved that only 5 or 6 first packets are enough to get accurate results.Aceto et al.[10]proposed a payload signature-based classification method (PortLoad) based on header and application signatures.It is used to improve efficiency and the likelihood of real-time traffic classification.The high processing costs of this approach burden the network.This is because deep packet inspection(DPI)uses regular expressions to match packet payload data.Due to encryption and dynamic ports,DPI-based methods can only identify traffic encoded in the expression library.The amount of processing required by this method puts a lot of strain on the network.DPI also can’t decrypt encrypted traffic.Yeganeh et al.[11]proposed a new technique to identify the traffic based on signatures;this approach reduced the time needed to classify the traffic flow.Nevertheless,it caused an issue in the detection process of unknown flow or customized signatures.It is noticeable that all those studies were based on packets size and they looked at the first few packets of the network flow to extract the statistics to enhance the performance of the classification process with high-scale and high-speed networks.However,despite the diversity of those approaches,for all of them,the statistics were the main concern rather than adopting data modeling to identify the patterns in the network traffic.In addition,all of them failed to detect unknown or manually generated signatures.

    From another perspective,mostly related to data aggregations.Rao et al.in[12]focused in their research on characterizing video streams,namely Netflix and YouTube.Wang et al.[13]focused in their research on P2P traffic by extracting the features from many flows,which were then aggregated into clusters to detect P2P application behavior.From another point of view,others focused on the iMessage protocol and relied on it to extract the device type [14].Furthermore,the authors in [15]proposed a new technique to handle the privacy of connections through deep packet inspection.This was a proposal that can inspect the payload of encrypted traffic without decryption;however,there is was a limitation to this proposal,which is that it handled HTTPS traffic only.At the same time,others presented a technique to detect Web-Real-Time communication encrypted traffic[16].Mamun et al.[17]focused on identifying encrypted traffic by calculating the entropy of the payload of the packets.However,the novelty in those approaches relied on the communication type and the assets communicated.

    On the other hand,several machine learning classification techniques consider the network packet flow[18-24],where they mainly consider investigating further data features to identify the packets in terms of telling apart the encrypted ones from those that are not.In 2015,Velan et al.[25]provided a complete comparison of different classification methods based on their features and showed their strengths and weaknesses.They described the well-known encryption protocols used throughout the Internet.Therefore,the structure of the protocol showed the initiation of an encrypted connection and provides a large amount of information for the classification and analysis of encrypted traffic.They surveyed different methods of classification of the payload and feature-based classification of encrypted traffic and categorized them using a set taxonomy.They stated that different methods could be used to recognize the encrypted application protocol in addition to the encryption protocol.The majority of studies rely on a wired network that is managed by the same network management domain.

    In 2016,Draper-Gil et al.[26]studied the effectiveness of flow-based time-related features for detecting VPN traffic and categorizing encrypted traffic into several categories,such as browsing and streaming.To determine the validity of their features,they used two widely used machine learning approaches(C4.5 and KNN).As a result of their research,they asserted that time-related factors are effective classifiers for encrypting communications,providing excellent accuracy and performance.

    In 2017,Bagui et al.[27]worked on the same dataset used in this paper.They applied six(GBT,KNN,LR,NB,RF,and SVM) types of machine learning algorithms and compared the achieved results.In their results,a high accuracy rate was achieved with two shortlisted algorithms,namely GBT and RF;their accuracy was 0.946%and 0.944%,respectively.

    In 2018,Leroux et al.[28]proposed an approach based on encrypted streams.They employed machine learning techniques including Naive Bayes,Logistic Regression,and Random Forest to predict the sort of traffic passing through an IPsec or TOR tunnel.So they got packet size,interarrival time,and burst time,burst size from the encrypted streams.Experiments have shown that the proposed approach can be used in real-time applications such as QoS systems.In 2018,Zion et al.[29]created a new set of network traffic ML features.They gathered a dataset consisting of about 28,000-time frame samples and used it to demonstrate the high-performance categorization of mobile and desktop main and secondary traffic and desktop application activities,with accuracies of 81%,94%,and 93%,respectively.Furthermore,they demonstrated that,in contrast to existing approaches that rely on a small number of robust ML characteristics,their system is resilient and performs well even when intelligent users aggressively modify and conceal their traffic(e.g.,using a VPN).

    In 2020,Miller et al.[30]presented a computational approach to detect VPN traffic,where the flow statistics data found in captured network packets’TCP headers were extracted.A multi-layered perceptron neural network with 10-fold cross-validation was used.Experiments revealed that the suggested model could accurately categorize network traffic as VPN or non-VPN.The author focused on two types of VPN applications,namely OpenVPN and Stunnel OpenVPN.The overall accuracy of OpenVPN was 93.71%and Stunnel OpenVPN achieved 97.82%accuracy.

    In 2020,Pacheco et al.[31]proposed a new satellite-based Internet traffic classification approach to improve QoS.They used machine learning and deep learning techniques to classify Internet traffic.A complete assessment of the components necessary to connect an ML/DL solution to recognized satellite communication and QoS management infrastructure.A large and diverse set of Internet traffic was necessary to develop this solution.In this context,the data were generated using an emulated satellite communication environment,where other Internet communications are launched and captured.The proposed model focused on encrypted,unencrypted,and tunneling communications.Some experiments were conducted on a cloud platform to validate the proposal and set guidelines for its deployment over a satellite architecture.

    In 2020,Guo et al.[32]presented two deep learning models to categorize the traffic into VPN and non-VPN traffic.In this paper,the authors used Convolutional Auto-Encoding (CAE)and a Convolutional Neural Network (CNN) to distinguish encrypted network traffic.The traffic generated by six distinct applications was converted into session pictures to be suitable for the deep learning models;the CNN method used two-dimensional local features of the images.The CAEbased method focused on an unsupervised method to extract the hidden layer features.Learning the nonlinear link between input and output is achievable.Several experiments were conducted using these approaches,and the best accuracy achieved by the CCN was 92.92%,while the CAE model achieved 98.77% accuracy.The authors claimed that their models outperform more established methods of identification.

    The authors of[33]introduced a novel framework to carry out traffic classification at any layer on the radio network stack.An RNN-based baseline architecture was described,and its performance was benchmarked on three TC workloads at different radio stack layers.To evaluate their model,they integrated a waveform generator that was compliant with standards for 802.11 radio technology with packet traces from genuine communications.According to the results of the performance evaluations,the top model obtained an accuracy of more than 92%in the most challenging TC job.

    In 2021,Aswad et al.[34]used Apache Spark and an Artificial Neural Network (ANN) to identify VPN traffic based on time-related features.The proposed approach was based on a VPN with multiple node features.When a packet is received by a node,no further processing is required because all routing processing has already been completed;the node’s only responsibility is to transfer the packet to the proper next hop when the time arrives and it is visible to contact.The proposed implementation of the ANN prevents unnecessary processing and flooding occurs in standard VPN traffic classification.The dataset was divided into two parts:80% for training and 20% for testing,with 10 k folds with 50 epochs.ABN and the Apache Spark engine were used to implement VPN network traffic flow classification,to the best of our knowledge.Experiments showed that the precision for VPN classification was 96.76%,whereas for non-VPN it was 92.56%.The proposed model was evaluated using the CIC-Darknet2020 and ISCXVPN2016 datasets.The ANN+Spark Engine technique outperformed the convolutional neural network compared to the stacked auto-encoder network.

    In 2021,in Lu et al.’s work[35],the difficulties of traffic feature extraction efforts were avoided by focusing on DL to categorize network traffic as encrypted or not.The authors proposed an Inception-LSTM (ICLSTM) service to detect encrypted traffic,in which they converted the traffic data to gray images and then built an ICLSTM neural network to extract the important features and conduct effective traffic classification.In the training phase,the authors avoided the category imbalance problem by setting different weighting parameters for each category,which makes it more realistic and symmetrical for different types of encrypted traffic,and thus the detection effect is more balanced and reasonable.The proposed module was validated using a public dataset called ISCX 2016,where the accuracy for both encrypted and non-encrypted traffic was 98%.

    Tab.1 summarizes the related work regarding the classification of network traffic considering VPN traffic as one type of network traffic.

    Table 1:Summary of related studies and their techniques

    Table 1:Continued

    However,protocols used to hide users’identities and protect their privacy are challenging in terms of the classification for their encrypted properties.Nevertheless,as far as we know,few have proposed methods to classify VPN traffic based on the time-related features extracted from the network traffic and machine learning techniques.In addition,the previous experiments used Weka[36]and deployed KNN,C 4.5,and other supported algorithms in Weka.By contrast,this work is using the random forest algorithm considering the SCIKIT-LEARN python package[37],along with feature reduction coding practices based on correlations between the features and standardizing (normalization) of different packets’timeout,recorded in the given dataset and used to classify and obtain high score results.The only limitation or constraint that was experienced was the size of the dataset since this type of traffic analyzer is suitable for small to medium environments.

    3 Methodology

    Fig.1 describes in detail the steps followed in this research paper.In addition,the following subsections detail each step in the figure.

    3.1 Dataset

    The ISCX-VPN2016 dataset was used to develop a model in this study[26].The University of New Brunswick(UNB)made this dataset available for public use.It was collected by capturing experimental network traffic on a real-time basis in a customized lab.This data set takes into account seven different types of traffic:web browsing,email,chat,streaming,file transfer,VoIP,and P2P.In addition,the traffic that has been acquired has been divided into two types of traffic based on its characteristics.The first one is the normal traffic of these applications,and the second one is related to the traffic of these applications over VPN.The traffic was captured with Wireshark and TcpDump[38].The generated traffic was around 28 GB;other supporting tools were also used to construct this dataset,such as OpenVPN,which was used to generate VPN traffic,and FileZilla,for file transfer traffic.The dataset was then filtered to contain only the traffic that was just initiated by or targeted Alice and Bob IP addresses,which represent the two customized endpoints needed in the network to collect the required dataset.Finally,the ISCXFlowMeter tool [26]was used to extract the features from the dataset of traffic packets,representing the numerical inputs for the machine learning models’implementation in further stages of our experiments.

    Figure 1:Work methodology

    The final processed features dataset was then fed into two analysis scenarios:Scenario A was used to detect if the traffic is VPN or not and then tried to build classifiers to distinguish the type of encrypted traffic over VPN network connectivity.Scenario B used the labeled dataset,i.e.,VPN and non-VPN instances,to form the second labeled dataset,in which the applications used to conduct the network-generated traffic were used as another variation of the instances’labeling.

    This dataset gained extra value related to the type of the features,which were either packetbased or time-based.Packet-based are those features that rely more on the protocol of the networking concept conducted,such as IPs,ports,and the flow of bytes amount.By contrast,the time-based features are considered as another dimension for the analysis that does not rely only on the statistic elements of the data,but rather on the variability of the time-based features.Timeouts for the timebased features were captured according to the discrete values that were measured in seconds,including 15,30,60,and 120 s.

    3.2 Data Preprocessing

    In general,the work carried out concerning the data preprocessing started with and focused only on the 60 s dataset that has both labels;i.e.,VPN and non-VPN.The data cleaning took place,followed by a data normalization process,to study its effects on the learning achieved through further experiments modeled on machine learning.The normalization took place in terms of calculating the Z score values;i.e.,calculating the division of the values reduced from their mean by their standard deviation.The nominal features were dropped from the dataset to avoid tackling the models/performance.However,and for gaining a clear picture of the methodology adopted,the work on the dataset considered the time-based features in the later stages,but the cleaning and preparation for the data followed a standardized process that started loading the data and combined the classified files for VPN and non-VPN.Then,infinity literals and other literals that affect the modeling process were detected and fixed.Moreover,nulls were also checked to confirm the inexistence of the missed values in the given dataset.The final features set considered for the following analysis stages contained 24 features and 15545 instances.The features list included Class1,Duration,Flowbytespersecond,Flowpktspersecond,Label,Max_Active,Max_Biat,Max_Fiat,Max_Flowiat,Max_Idle,Mean_Active,Mean_Biat,Mean_Fiat,Mean_Flowiat,Mean_Idle,Min_Active,Min_Biat,Min_Fiat,Min_Flowiat,Min_Idle,Std_Active,Std_Flowiat,Std_Idle,Total_Biat,and Total_Fiat.The Class1 feature represents the applications used over the captured network traffic,while the Label feature is the binary one related to the traffic encryption state,i.e.,VPN or non-VPN.It is important to mention here that this work replaced the given infinity values with the mean along with the negative values before ML modeling.

    3.3 Exploratory Data Analysis

    We next explored the data for the given dataset;for example,we generated the correlation matrix for all of the features as shown in Fig.2 to study the effects of the features on each other using the Pearson correlation method.This correlation matrix shows that the Max_Flowiat-Max_Idle pair was highly correlated;other pairs were similarly correlated,thus necessitating dropping one of each pair to optimize the performance of the classifier by reducing the redundant features in the given dataset.Another important exploration step for understanding the classes’distribution within the given dataset instances was also conducted and found to be as shown in Fig.3,where 55.3%of the data instances were classified as non-VPN and the remaining,i.e.,44.7%,were classified as VPN when the time interval 60 s.In addition,Fig.3 also shows the distribution of the dataset in each class over different time intervals (15,30,120).Other exploration tasks were also conducted to better understand the dataset;those included understanding the outliers as shown in Fig.4,to determine whether the class imbalance problem will affect the analysis.

    3.4 Feature Engineering

    This work focuses on features’reduction and selection more than upon performing features extraction processes,as the ISCXFlowMeter tool has already done the job during the network packets’early preprocessing presented by the authors[26].

    Starting with feature reduction,two approaches were considered,where the first consists of using a small amount of variance to detect the weak features and hence pruning them.This approach yields no low variance-based features to reduce.The second approach consists in using the multicollinearity between the features.

    Figure 2:All features correlation matrix

    Fig.2 shows the multicollinear matrix found for the given dataset.Those mathematical and statistical relationships were discovered using the Spearman correlation coefficient.This approach yielded nine important and reduced features.These features are listed in Tab.2.As can be seen in Tab.2,after the feature reduction,we still have very important network traffic features.The first one is the duration of the network flow,which can give us an indicator of the network traffic type;for instance,TCP has an average duration time similar to UDP.Another feature related to the active session,which determines the time the flow was active before going idle,consists of three values,which can also indicate the type of network traffic in general and for VPN traffic in particular because in the case of VPN all of the traffic will be covered inside the VPN traffic.Another important feature is the flow byte per second;this value shows how many bytes are transmitted over each network flow and depends on the type of traffic itself.In addition,we have three values of the Biat feature,namely min,max,and mean;Biat is the time between two packets sent backward in the network flow.The resulting Spearman correlation matrix for those nine reduced features is shown in Fig.5.

    Figure 3:Classes distribution over different time intervals(15,30,60,120)

    Figure 4:Outliers comparison

    Another feature selection approach is GA-based feature selection,which picks optimum features by selecting a population at random and checking its fit to the environment using an objective function.It also employs a looped evolutionary process to enhance the population until it reaches the optimum[16].When GA was applied to the processed data,which had 24 features,eight were chosen as important features and the rest were disregarded during the model’s classification phase.The most important features after applying the GA were total_biat,max_fiat,max_biat,flowPktsPerSecond,flowBytesPerSecond,min_flowiat,max_flowiat,and mean_flowiat.

    3.5 Dataset Training and Testing

    Ten-fold cross-validation(CV)was utilized in this paper to evaluate the classification models.The data were randomly split into 10 sets of data using this approach;nine sets were utilized as training sets,while the tenth was kept aside for testing.With different training sets,this process was repeated 10 times.Cross-validation can be seen in Fig.6.

    Figure 5:Correlation matrix for reduced features set

    4 Experimental Practice and Setup

    Random forests [39]is an ensemble learning algorithm that is used to perform a binary classification process on the presented dataset.The dataset is either processed in the normal state or using a normalization process for the values given to the reduced features among all instances.Tab.5 summarizes the results of the classification experiments conducted,whereas Fig.7 summarizes the results achieved in terms of a receiver operating characteristic curve (ROC).In the proposed architecture,RF as a machine learning model is utilized,which is described in Algorithm 1.The general configurations for the RF classifier are proposed.Tab.3 summarizes the proposed model parameters configurations that are used to conduct the experiments for detecting network traffic.

    Figure 6:Cross-validation process

    Algorithm 1:Random Forest pseudocode Input Parameters:A training set S,set of Features F Output:Subset of features f Precondition:a training set S:==(x1, y1),···,(xn,yn),features F,and the number of trees in forest B.Function RandomForset(S, F){H ←0 for i ? 1,···, B{Si ←A bootstrap sample from S hi ←RandomizedTreeLearn(Si, F)H ←H ∪hi}return H}Function RandomizedTreeLearn(S, F){At each node:f ←very small subset of F Split on best feature in f return learned tree}

    Table 3:Proposed RF classifier model hyperparameters settings

    To get the best result from the model,the hyperparameter values of the genetic algorithm were built,tested,and set.They will be used to select the optimal features in the proposed final structure for classifying network traffic.Therefore,the general configurations for the GA algorithm are proposed.Tab.4 summarizes the GA algorithm parameters settings that are used to conduct the experiments for detecting network traffic.

    Table 4:Proposed GA algorithm hyperparameters settings

    4.1 Generalizing the Approach for the Other Datasets

    The same approach for the analysis also expanded to handle the rest of the datasets that were originally split in terms of the timeout factor during the construction process.Those datasets are either 15,30,or 120 s.Tab.5 summarizes the results of the classification experiments conducted,whereas Fig.7 summarizes the results achieved in terms of a receiver operating characteristic curve(ROC).

    Table 5:Experimental results

    Fig.7 depicts a ROC curve in three cases:RF with time-related features,RF with PC,and RF with GA,where the experiments were conducted with different time intervals 15,30,60 and 120 s).As shown in Fig.7 the highest ROC in all cases is RF with time-related features.

    Figure 7:ROC result clusters in terms of feature reduction impact

    4.2 Evaluation Metrics

    The discrimination evaluation of the best (optimal) solution during classification training can be defined for binary classification analysis using the confusion matrix,as illustrated in Tab.6.The predicted class is represented by the table’s columns whereas the actual class is represented by the table’s row.TP and TN denote the number of correctly recognized positive and negative instances in this confusion matrix.FP and FN,on the other hand,represent the number of misclassified negative and positive cases,respectively[40].

    The receiver operating characteristic curve(ROC curve)is a graphical representation of sensitivity.The ROC curve plots sensitivity (TPR) against specificity (FPR) for various test cut-off points.For various test cut-off points,the sensitivity(TPR)on the y-axis and(1-specificity)(FPR)on the x-axis are plotted.For the sake of simplicity,it is typically depicted as a square box,with both axes ranging from 0 to 1.

    Table 6:Confusion matrix

    Tab.6 can be used to construct a variety of regularly used metrics,such as equations ranging from(1) to (3).The recall (R) is a metric that indicates how well a dataset can be searched for relevant instances,while the precision (P) expresses the proportion of the data points that the model says was relevant and where relevant.Finally,the F-Measure(FM)can be used to calculate the harmonic mean of recall and precision.There are,however,a slew of additional options.However,they can all be utilized to calculate classification and,as a result,to judge the model’s quality in classification procedures[33].

    4.3 Experimental Machine

    All of the previously described analyses as well as the results of all experiments were carried out on machines with the hardware specifications shown in Tab.7.

    Table 7:Experimental environment HW specifications

    5 Discussion of Results

    The experimental results show that the effectiveness of this approach is very high.However,the results show that data with the timeout length of 15 s always yielded the best results in terms of precision and recall,as well as the derived F1 measure and accuracy,for both reduced and nonreduced feature sets,except for GA.However,the experiments showed another important result for the classification process with other timeout values(30,60,and 120 s),where the reduced features and the non-reduced features experiments yielded similar results,especially for the 15 s timeout dataset,where the accuracy reached 95.02%,94.12%,93.06%and 93.50%for 15,30,60 and 120 s,respectively when all-time features were used.However,using the GA with 15 and 30 s timeouts achieved the same ROC.It is also worth noting that class imbalance issues have been addressed since the classes began employing the SMOTE algorithm,and the classes are now balanced.

    The achieved accuracy rate for the proposed models was 95%.In comparison to previous studies (as stated in Tab.8),the proposed approach can distinguish between encrypted and nonencrypted queries more efficiently,with acceptable FP and FN rates.In conclusion,the proposed model is adequate to build a network traffic classifier that organizations can rely on to protect their environment.

    Table 8:Comparison of our model and other studies(where A:accuracy,P:precision)

    6 Conclusion

    This paper’s goal was to classify encrypted network traffic data into the appropriate traffic category.This could help ISPs provide a better quality of service to their clients,as well as monitoring and controlling the network,safeguarding the network from viruses and attacks,and performing appropriate network planning and troubleshooting.To achieve this,time-related features have been used to characterize VPN and non-VPN traffic.In addition,we proposed an ML analysis approach with the aid of a random forest algorithm to classify the traffic after considering the features reduction technique based on the variance and the correlated features with normalized data;i.e.,standardized features.The proposed approach achieved a high ROC rate of between 95%and 98.6%for the different traffic timeout datasets,which proves its efficiency.Accordingly,we applied the same approach to the rest of the datasets(15,30,and 120 s)to consider the different timeout recordings,and the same results of accuracies were achieved.It should be noted that results obtained while not carrying out the required feature reduction would yield lower accuracies along with model overfitting problems.It seems that this approach will provide valuable benefits to the literature due to its ability to classify data while maintaining privacy for the VPN traffic networks.In the future,we will increase the number of traffic classes that the behavior analyzer can detect.Furthermore,advanced methods will be applied for hyperparameter optimization and feature selection,such as earthworm optimization algorithm and PCA.

    Acknowledgement:We are very grateful to the reviewers for their valuable comments that helped improve the paper.We wish to express our gratitude to all members of our colleges,Princess Sumaya University for Technology(PSUT),Jouf University,and Yarmouk University,for their support.

    Author Contributions:Conceptualization,methodology and writing—original draft preparation,all authors;writing—review and editing,M.Al-Fayoumi.All authors have read and agreed to the published version of the manuscript.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    成人影院久久| 日韩制服骚丝袜av| 亚洲熟女精品中文字幕| 中文精品一卡2卡3卡4更新| 天美传媒精品一区二区| 亚洲精品成人av观看孕妇| 久久国产精品男人的天堂亚洲 | 国产免费又黄又爽又色| 人体艺术视频欧美日本| 五月伊人婷婷丁香| 国产成人免费无遮挡视频| a级毛色黄片| av专区在线播放| 免费观看在线日韩| 777米奇影视久久| 一区二区三区四区激情视频| 亚洲av综合色区一区| 美女中出高潮动态图| 全区人妻精品视频| 精品午夜福利在线看| 最后的刺客免费高清国语| 亚洲精品国产av蜜桃| 久久毛片免费看一区二区三区| 久久99一区二区三区| 成人国产av品久久久| 一区二区三区乱码不卡18| 女的被弄到高潮叫床怎么办| 伦理电影大哥的女人| 精华霜和精华液先用哪个| 国产亚洲欧美精品永久| 亚洲精品国产成人久久av| 久久精品久久久久久噜噜老黄| 日本91视频免费播放| 国产在线一区二区三区精| 人妻少妇偷人精品九色| 国产视频首页在线观看| 亚洲熟女精品中文字幕| a级毛片在线看网站| 亚洲欧美一区二区三区黑人 | 啦啦啦啦在线视频资源| 人妻系列 视频| 热re99久久精品国产66热6| 国产69精品久久久久777片| 午夜福利视频精品| a级毛片免费高清观看在线播放| 国产成人免费观看mmmm| 最黄视频免费看| 一区在线观看完整版| 久久精品久久久久久噜噜老黄| 97超视频在线观看视频| 久久ye,这里只有精品| 天美传媒精品一区二区| 少妇高潮的动态图| 黄色配什么色好看| 国产午夜精品一二区理论片| 99久久精品一区二区三区| 久久久a久久爽久久v久久| av在线app专区| 黄色欧美视频在线观看| 伦理电影大哥的女人| 免费观看av网站的网址| 日本免费在线观看一区| 人人妻人人爽人人添夜夜欢视频 | 中文字幕制服av| 热re99久久精品国产66热6| 另类精品久久| 国产无遮挡羞羞视频在线观看| 国产91av在线免费观看| 美女中出高潮动态图| 伊人久久精品亚洲午夜| 大陆偷拍与自拍| 久久久久久久亚洲中文字幕| 晚上一个人看的免费电影| 国产黄色视频一区二区在线观看| 国产精品一区www在线观看| 最后的刺客免费高清国语| 黄色视频在线播放观看不卡| 麻豆精品久久久久久蜜桃| 晚上一个人看的免费电影| 亚洲三级黄色毛片| 成人美女网站在线观看视频| 国产爽快片一区二区三区| 少妇熟女欧美另类| 少妇 在线观看| 亚洲精品日本国产第一区| 亚洲国产色片| 纯流量卡能插随身wifi吗| 成人综合一区亚洲| 亚洲精华国产精华液的使用体验| 简卡轻食公司| 18禁在线播放成人免费| 国精品久久久久久国模美| 啦啦啦中文免费视频观看日本| 热re99久久国产66热| 国产精品一区www在线观看| 色视频www国产| 丝瓜视频免费看黄片| 美女视频免费永久观看网站| 婷婷色av中文字幕| 日韩 亚洲 欧美在线| 超碰97精品在线观看| 久久精品国产亚洲av天美| 亚洲av在线观看美女高潮| 国产精品不卡视频一区二区| 最黄视频免费看| 精品少妇久久久久久888优播| 中文字幕精品免费在线观看视频 | 欧美成人精品欧美一级黄| 一区二区三区乱码不卡18| 一区二区三区乱码不卡18| 老司机影院成人| 国产一级毛片在线| 99久久精品一区二区三区| 午夜福利,免费看| 男人添女人高潮全过程视频| 乱码一卡2卡4卡精品| 国产一区有黄有色的免费视频| 男人添女人高潮全过程视频| 色5月婷婷丁香| 大陆偷拍与自拍| 爱豆传媒免费全集在线观看| 一本一本综合久久| 久久国产精品男人的天堂亚洲 | 少妇被粗大猛烈的视频| 国产亚洲5aaaaa淫片| 男的添女的下面高潮视频| 中文欧美无线码| 久久久久久伊人网av| 亚洲精品国产成人久久av| 成年人午夜在线观看视频| 国产精品一二三区在线看| 亚洲av不卡在线观看| 特大巨黑吊av在线直播| av线在线观看网站| 国产精品不卡视频一区二区| 亚洲性久久影院| 成人亚洲精品一区在线观看| 久久99精品国语久久久| 免费久久久久久久精品成人欧美视频 | 日韩,欧美,国产一区二区三区| 啦啦啦视频在线资源免费观看| 18禁在线播放成人免费| 亚洲婷婷狠狠爱综合网| 少妇熟女欧美另类| 久久久a久久爽久久v久久| 亚洲国产精品999| 国产精品久久久久久久电影| 日本与韩国留学比较| 啦啦啦在线观看免费高清www| 久久午夜综合久久蜜桃| 曰老女人黄片| 在线观看一区二区三区激情| 人体艺术视频欧美日本| 成人黄色视频免费在线看| a级毛片免费高清观看在线播放| 久久韩国三级中文字幕| 亚洲国产最新在线播放| 99久久精品国产国产毛片| 99热这里只有是精品在线观看| 免费看日本二区| 国产欧美日韩一区二区三区在线 | 欧美成人午夜免费资源| 内射极品少妇av片p| 日产精品乱码卡一卡2卡三| 黑人高潮一二区| 国产成人精品婷婷| 国产av国产精品国产| 亚洲高清免费不卡视频| 久久99热6这里只有精品| av黄色大香蕉| 亚洲中文av在线| 日韩伦理黄色片| 人人妻人人添人人爽欧美一区卜| 99热这里只有是精品在线观看| 国产免费又黄又爽又色| 久久av网站| 精品少妇黑人巨大在线播放| av福利片在线观看| 两个人的视频大全免费| 成人国产av品久久久| 高清午夜精品一区二区三区| 国产成人91sexporn| 久久青草综合色| 亚洲av免费高清在线观看| 久久6这里有精品| 国产黄片视频在线免费观看| 曰老女人黄片| 男女无遮挡免费网站观看| 国产男女超爽视频在线观看| 亚洲天堂av无毛| 少妇裸体淫交视频免费看高清| 超碰97精品在线观看| 亚洲国产日韩一区二区| 街头女战士在线观看网站| 精品久久久久久久久亚洲| 大码成人一级视频| 国产综合精华液| 五月天丁香电影| 免费人成在线观看视频色| 国产男女超爽视频在线观看| 婷婷色综合大香蕉| 一级毛片久久久久久久久女| 中文字幕久久专区| 少妇丰满av| 久久午夜福利片| av黄色大香蕉| 亚洲av二区三区四区| 午夜福利网站1000一区二区三区| 国产永久视频网站| 国产精品无大码| 亚洲伊人久久精品综合| 久久精品久久精品一区二区三区| 欧美xxxx性猛交bbbb| 秋霞伦理黄片| 观看av在线不卡| 色婷婷久久久亚洲欧美| 大香蕉久久网| 色婷婷av一区二区三区视频| 人妻人人澡人人爽人人| 免费黄网站久久成人精品| 日韩欧美一区视频在线观看 | 亚洲av成人精品一二三区| 亚洲精品国产色婷婷电影| 蜜臀久久99精品久久宅男| 亚洲av二区三区四区| 国内少妇人妻偷人精品xxx网站| 少妇人妻一区二区三区视频| 色吧在线观看| 亚洲欧美日韩卡通动漫| 久久精品国产亚洲网站| av线在线观看网站| 少妇裸体淫交视频免费看高清| 精品久久久久久电影网| 2018国产大陆天天弄谢| 日本黄色片子视频| av.在线天堂| √禁漫天堂资源中文www| 热re99久久精品国产66热6| 黑丝袜美女国产一区| 一边亲一边摸免费视频| 精品99又大又爽又粗少妇毛片| 亚洲国产日韩一区二区| 男女国产视频网站| 亚洲av综合色区一区| 最近中文字幕2019免费版| 国产亚洲最大av| 亚洲成人一二三区av| 在线天堂最新版资源| 成人漫画全彩无遮挡| 国产日韩欧美亚洲二区| 国产黄频视频在线观看| 亚洲欧美清纯卡通| 伦理电影大哥的女人| 免费久久久久久久精品成人欧美视频 | 一本久久精品| 国产又色又爽无遮挡免| 亚洲自偷自拍三级| 九九爱精品视频在线观看| 天天躁夜夜躁狠狠久久av| 热re99久久国产66热| 大又大粗又爽又黄少妇毛片口| 深夜a级毛片| 好男人视频免费观看在线| 久久毛片免费看一区二区三区| 国产伦精品一区二区三区视频9| 乱系列少妇在线播放| 性高湖久久久久久久久免费观看| 99九九线精品视频在线观看视频| 成年女人在线观看亚洲视频| 亚洲欧美成人综合另类久久久| 下体分泌物呈黄色| 全区人妻精品视频| 91精品国产国语对白视频| 日韩一区二区视频免费看| 人人妻人人澡人人看| 久久久久国产精品人妻一区二区| av.在线天堂| 一区二区三区四区激情视频| 91精品一卡2卡3卡4卡| 丰满人妻一区二区三区视频av| 成人二区视频| 纵有疾风起免费观看全集完整版| 一区二区三区免费毛片| 人妻制服诱惑在线中文字幕| 99久久综合免费| 国产又色又爽无遮挡免| 免费久久久久久久精品成人欧美视频 | 精品久久久久久久久亚洲| 国产精品一区www在线观看| 亚洲av二区三区四区| 搡老乐熟女国产| 精品亚洲成国产av| av免费观看日本| 国产精品99久久99久久久不卡 | 国产伦精品一区二区三区视频9| 青春草国产在线视频| 国产成人精品久久久久久| 日日爽夜夜爽网站| 久久av网站| 自拍欧美九色日韩亚洲蝌蚪91 | 国产亚洲91精品色在线| 日本91视频免费播放| 亚洲精品日韩av片在线观看| 麻豆精品久久久久久蜜桃| 制服丝袜香蕉在线| 丰满少妇做爰视频| 色94色欧美一区二区| 亚洲情色 制服丝袜| 免费少妇av软件| 视频区图区小说| 青春草国产在线视频| 纵有疾风起免费观看全集完整版| 2021少妇久久久久久久久久久| 久久鲁丝午夜福利片| 多毛熟女@视频| 国产亚洲av片在线观看秒播厂| 少妇人妻一区二区三区视频| 麻豆乱淫一区二区| 国产免费一级a男人的天堂| 精品少妇内射三级| 岛国毛片在线播放| 日本av手机在线免费观看| 欧美变态另类bdsm刘玥| 国产亚洲欧美精品永久| 久久久久久久亚洲中文字幕| 一级毛片 在线播放| 中文字幕制服av| 欧美亚洲 丝袜 人妻 在线| 国产淫片久久久久久久久| 欧美日韩综合久久久久久| 天美传媒精品一区二区| 色5月婷婷丁香| 日韩av免费高清视频| 亚洲国产精品国产精品| 亚洲欧洲国产日韩| 久久久久久久国产电影| 26uuu在线亚洲综合色| 国产日韩欧美视频二区| 亚洲精品亚洲一区二区| 日韩 亚洲 欧美在线| 亚洲欧美一区二区三区黑人 | 人妻夜夜爽99麻豆av| 午夜91福利影院| www.av在线官网国产| 国产日韩一区二区三区精品不卡 | 一个人看视频在线观看www免费| 多毛熟女@视频| 精品一区二区三卡| 一级毛片 在线播放| 欧美成人午夜免费资源| 日韩不卡一区二区三区视频在线| 女的被弄到高潮叫床怎么办| 亚洲熟女精品中文字幕| 国产精品伦人一区二区| 少妇人妻一区二区三区视频| 91精品国产九色| 日本与韩国留学比较| 国产黄色视频一区二区在线观看| 男的添女的下面高潮视频| 99久久精品国产国产毛片| 久久女婷五月综合色啪小说| 王馨瑶露胸无遮挡在线观看| av福利片在线观看| 美女内射精品一级片tv| 久久国产精品大桥未久av | 亚洲欧美精品自产自拍| 国产亚洲精品久久久com| 国产免费一级a男人的天堂| 精品久久久精品久久久| 欧美区成人在线视频| 热re99久久国产66热| 女人久久www免费人成看片| 亚洲精品久久午夜乱码| 麻豆成人av视频| 久久影院123| 欧美一级a爱片免费观看看| 亚洲精品乱久久久久久| 国产色婷婷99| 午夜激情久久久久久久| 久久狼人影院| 国产欧美另类精品又又久久亚洲欧美| 国产免费又黄又爽又色| 精品久久久久久电影网| 久久久a久久爽久久v久久| 日日撸夜夜添| 精品亚洲成国产av| 中文精品一卡2卡3卡4更新| 国产色爽女视频免费观看| 国产成人免费观看mmmm| tube8黄色片| 99久久中文字幕三级久久日本| 又爽又黄a免费视频| www.色视频.com| av黄色大香蕉| 最近最新中文字幕免费大全7| 国产日韩欧美亚洲二区| 亚洲自偷自拍三级| h视频一区二区三区| 亚洲内射少妇av| 精品视频人人做人人爽| 黑人猛操日本美女一级片| av视频免费观看在线观看| 一级毛片电影观看| 91精品一卡2卡3卡4卡| 18禁在线播放成人免费| 人妻制服诱惑在线中文字幕| 美女内射精品一级片tv| 日本-黄色视频高清免费观看| 春色校园在线视频观看| 人妻夜夜爽99麻豆av| 丝袜脚勾引网站| 久久热精品热| 日韩一区二区三区影片| 欧美日韩在线观看h| 亚洲精品中文字幕在线视频 | 亚洲人与动物交配视频| 国产亚洲5aaaaa淫片| 建设人人有责人人尽责人人享有的| 国产精品国产三级专区第一集| 国产亚洲一区二区精品| 69精品国产乱码久久久| 亚洲精品乱码久久久v下载方式| 国产成人91sexporn| 极品少妇高潮喷水抽搐| 久久久国产一区二区| h视频一区二区三区| 亚洲精品国产色婷婷电影| 熟女av电影| 欧美日韩视频高清一区二区三区二| 内射极品少妇av片p| 免费观看性生交大片5| 日韩熟女老妇一区二区性免费视频| 嫩草影院入口| 日本-黄色视频高清免费观看| 女性被躁到高潮视频| 国内少妇人妻偷人精品xxx网站| 国产黄色视频一区二区在线观看| 街头女战士在线观看网站| 99热6这里只有精品| 黄片无遮挡物在线观看| 黑人巨大精品欧美一区二区蜜桃 | 日本午夜av视频| 国产爽快片一区二区三区| 亚洲伊人久久精品综合| 男女无遮挡免费网站观看| 性高湖久久久久久久久免费观看| 精品少妇内射三级| 亚洲av日韩在线播放| 亚洲欧美一区二区三区国产| 欧美日韩在线观看h| 内地一区二区视频在线| 爱豆传媒免费全集在线观看| 国产午夜精品一二区理论片| 在线观看美女被高潮喷水网站| 黄色配什么色好看| 亚洲精品国产av成人精品| 我的老师免费观看完整版| 少妇 在线观看| 午夜av观看不卡| 国产91av在线免费观看| 国产欧美另类精品又又久久亚洲欧美| 免费看不卡的av| 嫩草影院新地址| 国产黄片美女视频| 亚洲四区av| 亚洲激情五月婷婷啪啪| 久久久久久久大尺度免费视频| 草草在线视频免费看| 涩涩av久久男人的天堂| 2018国产大陆天天弄谢| 久久久久久久久久成人| 国产免费一区二区三区四区乱码| 国产成人精品无人区| 少妇熟女欧美另类| 亚洲欧美成人综合另类久久久| 久久久久久久亚洲中文字幕| 久久影院123| 国产白丝娇喘喷水9色精品| 人妻人人澡人人爽人人| 亚洲精品自拍成人| 如何舔出高潮| 我的女老师完整版在线观看| a级一级毛片免费在线观看| 日本av手机在线免费观看| 亚洲成人av在线免费| 国产精品嫩草影院av在线观看| 日产精品乱码卡一卡2卡三| 中文字幕制服av| 爱豆传媒免费全集在线观看| 欧美老熟妇乱子伦牲交| 99久久综合免费| 交换朋友夫妻互换小说| 另类精品久久| 亚洲综合色惰| 人人妻人人看人人澡| 国精品久久久久久国模美| 精品熟女少妇av免费看| 国产亚洲一区二区精品| 桃花免费在线播放| 国产欧美日韩精品一区二区| 久久97久久精品| 免费观看av网站的网址| 三级国产精品片| 九九久久精品国产亚洲av麻豆| 欧美精品高潮呻吟av久久| 噜噜噜噜噜久久久久久91| 三级经典国产精品| 精品一区二区三区视频在线| 欧美日韩在线观看h| 精品亚洲成a人片在线观看| 国产国拍精品亚洲av在线观看| 中国美白少妇内射xxxbb| 精品少妇内射三级| 日韩av不卡免费在线播放| 特大巨黑吊av在线直播| 自拍欧美九色日韩亚洲蝌蚪91 | 一级毛片我不卡| 22中文网久久字幕| 欧美成人精品欧美一级黄| 我的女老师完整版在线观看| a级片在线免费高清观看视频| 午夜福利视频精品| 中文天堂在线官网| 精品99又大又爽又粗少妇毛片| 又粗又硬又长又爽又黄的视频| 午夜福利,免费看| 午夜91福利影院| 亚洲av国产av综合av卡| 亚洲精品乱码久久久v下载方式| 亚洲欧洲日产国产| 国产在线免费精品| 亚洲国产色片| 精品久久久久久久久亚洲| 国产免费又黄又爽又色| 啦啦啦中文免费视频观看日本| 亚洲av日韩在线播放| 久热久热在线精品观看| 亚洲国产欧美在线一区| 久久久久久久久久成人| 老司机亚洲免费影院| 欧美日韩视频精品一区| 一个人免费看片子| 日韩成人av中文字幕在线观看| 欧美三级亚洲精品| 国产一级毛片在线| 在线观看三级黄色| 精品人妻熟女毛片av久久网站| 18禁在线无遮挡免费观看视频| 日韩人妻高清精品专区| 亚洲不卡免费看| 色哟哟·www| 91精品一卡2卡3卡4卡| 久久久久久久精品精品| 国产高清不卡午夜福利| 午夜激情福利司机影院| 最新中文字幕久久久久| 新久久久久国产一级毛片| 亚洲精品色激情综合| 尾随美女入室| 亚洲综合精品二区| 街头女战士在线观看网站| 亚洲久久久国产精品| 国语对白做爰xxxⅹ性视频网站| 国产极品天堂在线| 国产日韩欧美亚洲二区| 在线观看美女被高潮喷水网站| 亚洲欧美一区二区三区黑人 | 97超视频在线观看视频| 人妻一区二区av| 欧美 亚洲 国产 日韩一| 69精品国产乱码久久久| 秋霞伦理黄片| 久久 成人 亚洲| 高清黄色对白视频在线免费看 | 在线观看三级黄色| av有码第一页| 久久精品夜色国产| 国产极品粉嫩免费观看在线 | 国产在线视频一区二区| 国产淫片久久久久久久久| 人人妻人人澡人人看| 在线播放无遮挡| 大香蕉97超碰在线| 国产熟女午夜一区二区三区 | 国内少妇人妻偷人精品xxx网站| 亚洲不卡免费看| 国产日韩一区二区三区精品不卡 | 国产精品偷伦视频观看了| 在线观看一区二区三区激情| av在线播放精品| 亚洲精品视频女| 亚洲国产精品国产精品| 欧美日韩视频高清一区二区三区二| 高清黄色对白视频在线免费看 | 精品久久国产蜜桃| 国产精品一区二区在线观看99| 99热全是精品| xxx大片免费视频| 黄色配什么色好看| 在线免费观看不下载黄p国产| 菩萨蛮人人尽说江南好唐韦庄| 国产成人一区二区在线| 下体分泌物呈黄色| 亚洲av男天堂| 国产欧美亚洲国产| 秋霞在线观看毛片| 中文精品一卡2卡3卡4更新| 亚洲经典国产精华液单| 妹子高潮喷水视频| 亚洲欧洲日产国产| 高清午夜精品一区二区三区| 国产精品久久久久久久久免| 多毛熟女@视频| 欧美三级亚洲精品| 九九爱精品视频在线观看|