• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

    2022-08-24 07:01:50GhalibAlshammriAmaniSamhaEzzElDinHemdanMohammedAmoon1andWalidElShafai
    Computers Materials&Continua 2022年8期

    Ghalib H.Alshammri,Amani K.Samha,Ezz El-Din Hemdan,Mohammed Amoon1, and Walid El-Shafai

    1Department of Computer Science,Community College,King Saud University,Riyadh,28095,Saudi Arabia

    2Deanship of Scientific Research,Saudi Electronic University,Riyadh,Saudi Arabia

    3Management Information System Department,College of Business Administration,King Saud University,Riyadh,28095,Saudi Arabia

    4Department of Computer Science and Engineering,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    5Security Engineering Lab,Computer Science Department,Prince Sultan University,Riyadh,11586,Saudi Arabia

    6Electronics and Electrical Communications Eng.Depart.,Faculty of Electronic Engineering,Menoufia University,Menouf,32952,Egypt

    Abstract: Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process.In recent times,the most complex task in Software Defined Network (SDN) is security,which is based on a centralized,programmable controller.Therefore,monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment.Consequently,this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms:K-means,Farthest First,Canopy,Density-based algorithm,and Exception-maximization(EM),using the Waikato Environment for Knowledge Analysis (WEKA) software to compare extensively between these five algorithms.Furthermore,this paper presents an SDN-based intrusion detection system using a deep learning(DL)model with the KDD(Knowledge Discovery in Databases)dataset.First,the utilized dataset is clustered into normal and four major attack categories via the clustering process.Then,a deep learning method is projected for building an efficient SDN-based intrusion detection system.The results provide a comprehensive analysis and a flawless reasonable study of different kinds of attacks incorporated in the KDD dataset.Similarly,the outcomes reveal that the proposed deep learning method provides efficient intrusion detection performance compared to existing techniques.For example,the proposed method achieves a detection accuracy of 94.21%for the examined dataset.

    Keywords: Deep neural network;DL;WEKA;network traffic;intrusion and anomaly detection;SDN;clustering and classification;KDD dataset

    1 Introduction

    Recently,the SDN has been developed to be one of the talented answers for changing the future of global networks and the Internet[1-3].The new emerging technology SDN detaches the data and control planes separately.The control plane can manage the complete network security concerns[4-7].

    Deep learning(DL)is based on the extraction process of big data with complicated structures,so it is considered a type of machine learning model[8,9].It is valuable in the case of learning from the huge size of unsupervised data[10,11].The employment of deep learning achieves several advantages like higher classification performance and enhanced quality of produced samples.These benefits can realize superior machine learning results in applications like automatic natural language processing,speech recognition,computer vision,image recognition,and bioinformatics [12,13].Furthermore,there are numerous valuable attributes of the learned abstract descriptions using deep learning as pretty straightforward linear models can perform efficient performance[14].

    The network traffic,suspicious activities,and network administration can be controlled through the utilization of the IDS (Intrusion Detection System) [15,16].The IDS framework involves an analysis engine,sensors,and a reporting system.SDN-based security is an important model to control the malicious flows in SDN switches[17,18].Therefore,with the increasing amount of severe attacks and threats against a variety of computing systems such as a computer,network,cloud,and internet of things,the study of IDS has received a lot of attention from several researchers in the last decades in the security area [19].The spiteful attacks such as theft of information can be detected using the IDS model [20,21].The NIST (National Institute of Standards and Technology) [22]describes the incursion or intrusion as“an effort to negotiate the CIA(Availability,Integrity,and Confidentiality),or to evade the protection procedures of a network or computer”.

    The clustering-based IDS schemes are efficient compared to the traditional IDS schemes for detecting unknown attacks [23].Furthermore,the KDD (Knowledge Discovery in Databases) is employed to find out and extract valuable information from huge relational databases.Therefore,data mining is important for determining significant non-intuitive patterns and correlations for obtaining superior knowledge from small data[24,25].

    Intrusion detection using the unlabeled data technique,which is known as clustering,can group related records in the same clusters.Then,the common distance metrics on these clusters can be used to determine the anomalies[26].The clustering process is an unsupervised learning process that deals with unlabeled data [27].The machine learning (ML)-based intrusion detection analysis can help in detecting abnormal behavior in a network [28].Nevertheless,several algorithms are available for intrusion detection,but their performance is needed to improve.One subset of ML methods is DL.Deep learning gained a reputation due to its perspective for machine learning.

    For this reason,DL methods have been employed to identify some pattern types or cataloging.Furthermore,the application of deep learning can help to improve the accuracy and performance of IDS frameworks[29].To perform and understand data analysis for this work,there are several data mining process models as the following[30]:

    ? KDD(Knowledge Discovery in Databases):The KDD is a process of how specialists can extract patterns and insights from data.It consists of five stages:Interpretation/Evaluation,Data Mining,Transformation selection,and Preprocessing.This model is followed in this research to achieve the paper’s task of constructing an intrusion detection system.

    ? SEMMA (Sample,Explore,Modify,Model,and Access):The SEMMA model has a similar structure to KDD,nevertheless as it does not focus as deeply on data-specific phases,it is easier to apply to general data analysis tasks.

    ? CRISP-DM (Cross-Industry Standard Process for Data Mining):This model was formerly established in IBM for data mining tasks,finds it useful for almost all several data analytics projects.

    This research paper investigates,discusses,and analyses five clustering algorithms:K-means,Farthest First,Canopy,Density-based algorithm,and Exception-maximization (EM),using the WEKA software to compare extensively between these five algorithms.The primary objective of this work is to analyze the NSL-KDD dataset.Furthermore,this paper presents an SDN-based intrusion detection system using a DL model with the NSL-KDD dataset.

    In conclusion,the contribution of this paper is as follows:

    ? Provide an extensive comprehensive analysis of intrusion network traffic data via the NSLKDD dataset.The utilized dataset is clustered into normal and four major attack categories.

    ? Develop a deep learning model for building a proficient SDN-based IDS.

    ? Conducting a systematic evaluation of the intrusion detection based on ML performances over the NSL-KDD dataset with the proposed model.

    ? The results provide a comprehensive analysis and a clear,reasonable study of various kinds of attacks incorporated in the NSL-KDD dataset.Similarly,the findings reveal that the suggested deep learning technique provides efficient IDS performance compared to existing procedures.

    The remainder of this paper is constructed as follows.Section 2 presents a brief discussion of IDS,intrusion detection methodologies,deep learning,and SDN-based IDS,while the recent related works are investigated and provided in Section 3.Section 4 illustrates the suggested intrusion databased clustering and detection scenarios,while the simulation outcomes and comparative analysis are presented in Section 5.Ultimately,the conclusion is stated in Section 6.

    2 Preliminary Knowledge

    This section presents a brief discussion of intrusion detection systems,intrusion detection methodologies,deep learning,and SDN-based IDS.

    2.1 Intrusion Detection Systems

    An IDS is considered a software or hardware system that checks a network’s activities or system for strategy malicious actions and creates reports to the management and administrative system.The key task of intrusion prevention and detection systems(IPS/IDS)is to recognize the attacks and intrusions.Additionally,they are used to prevent persons and exhibit document warnings from violating security procedures and recognize problems with security guidelines.

    The IDS/IPS has become a crucial matter for security purposes.Numerous techniques can be employed for the intrusion detection process [31].They are used to protect computer networks in the presence of several attacks.On the other hand,it may also discard the packets or dismiss the connection.The intrusion systems can be classified as follows[32,33].

    ? Host-based IDS(HIDS):The HIDS is exploited to protect a particular host.It includes agents or software modules.The software of the HIDS has operated runs on the network machines like routers,switches,and servers,etc.Thus,the agent of HIDS is operated like a consistent host.More information and details about HIDS can be found in[31,32].

    ? Network-based IDS (NIDS):This kind attempts to protect all machine systems in the IoT network.The architecture of NIDS(Network-based IDS).It comprises a group of sensors with particular functions located at a different location within the network.NIDS implementation can have a fantastic effect on the performance of the computer network.More information and details about HIDS can be found in[32,33].

    2.2 Intrusion Detection Methodologies

    Detection models are divided into two diverse types:signature or statistical-based models.The first type of signature model contrasts the traffic alongside a cluster of existing signatures.On the other side,the second type of statistical model preserves the users,hosts,applications,and connections profiles.Likewise,two key detection schemes are employed by the host or network:signature and anomaly-based models used to analyze the actions and discover intrusions.Consequently,there are three key intrusion detection methods,which are SD (Signature-based Detection),AD (Anomalybased Detection),and SPA(Stateful Protocol Analysis).Tab.1 demonstrates the prime disadvantages and advantages of the three detection methods.More information and details about the three key intrusion detection methods can be found in[31,34].

    Table 1:Types of intrusion detection methodologies with their advantages and disadvantages

    2.3 Deep Learning

    DL has been a pretty research subject in recent times for different domains [35].DL depends on the unsupervised or supervised processes to discover classified depictions in deep structures[36].The most aim of DL is to exploit the Artificial Neural Networks (ANN) to extract more levels of higher features.The categorization DL depends on the purpose and objective of structural design and procedures.The division of DL algorithms can be categorized.More information and details about the DL models and structures can be found in[37,38].

    2.4 Software Defined Network

    The SDN(Software Defined Network)is an adaptable,manageable,dynamic,and valuable infrastructure [11].It combines numerous network tools for dynamic and centralized computer network infrastructure management.It lets the administrator of a network manage the enterprise demands rapidly.The general architecture of the SDN consists of control,infrastructure,and application layers.It is noticed that the control and data planes are separated from the network devices’functionalities.More information and details about the SDN control and data planes can be found in[39,40].

    The architecture of SDN extremely confirms network analysis and observing tools through the programming feature of the SDN controller.In [39],the authors suggested SDN-based IDS is presented in Fig.1.This proposal aims to investigate the SDN network traffic for the malicious recognition process.The IDS is considered on the SDN controller identifies two procedures employed on the coming traffic from the switch to identify the intrusion attempts which decrease the performance of the SDN network infrastructure.Two main IDS techniques can be employed in SDN controllers:packet counter and time interval techniques.More information and details about the three key intrusion detection methods can be found in[39,40].

    Figure 1:SDN-based intrusion detection system

    3 Methodology and Implementation

    Over recent years,some research works have been available on intrusion detection using data mining procedures like traffic data clustering and intrusion detection and classification.Portnoy[40]presented a new kind of clustering-based IDS scheme known as anomaly intrusion detection,which trains on unlabeled data to identify new intrusions.The authors in[41]suggested a new NSL-KDD data set,which composes a complete KDD data set.

    Panda et al.[42]proposed a hybrid intelligent approach using a combination of classifiers to make the decision intelligently so that the overall performance of the resultant model is enhanced.Kang et al.[43]proposed an optimal feature selection algorithm that tackles the problem of choosing the optimal subset of features from several commonly used features to detect network intrusion that requires extensive computing resources.Xiu-yu[44]proposed a model of online attack detection for computer forensics to collect crime evidence of the attack.Siddiqui et al.[45]introduced an analysis of 10%of the KDD cup’99 training dataset based on intrusion detection.Also,they focused on establishing a relationship between the attack types and the protocol used by the hackers,using clustered data.

    Subramanian et al.[46]presented an analysis of the effect of clustering the training data and test data in the classification efficiency of the Naive Bayes classifier.Kumar et al.[47]proposed a clustering approach based on a simple k-means clustering algorithm to analyze the NSL-KDD dataset.This proposed work provided a complete analysis of the NSL-KDD intrusion detection dataset.They tried to cluster the dataset into normal and four major attack categories such as DoS,Probe,R2L,U2R.

    This paper proposes a deep learning (DL) model for building an efficient software-defined network(SDN)-based intrusion detection system.The NSL-KDD dataset is extensively analyzed and investigated using different clustering algorithms,including the proposed model.The utilized dataset is clustered into normal and four major attack categories.The results provide a complete analysis and a clear comparative study of different kinds of attacks included in the NSL-KDD dataset.Likewise,the results reveal that the proposed deep learning technique provides efficient intrusion detection performance compared to existing techniques.

    4 Proposed Intrusion Data-Based Clustering and Detection Scenarios

    This section offers a detailed explanation of the proposed work for traffic data clustering and intrusion detection in software-defined networks.The entire hybrid suggested system for SDN-based intrusion data clustering and classification is shown in Fig.2.

    4.1 Traffic Data-Based Clustering Algorithms

    The clustering process is the data division into similar or dissimilar groups.The main benefit of the clustering process is the anomaly detection of intrusions deprived of preceding knowledge.This paper discusses the comparative study and investigation of five clustering algorithms:K-means,Farthest First,Canopy,Exception-maximization(EM),and Density-based algorithm.The description of the employed comparison clustering algorithms is introduced as follows.

    1) K-means clustering algorithm.The K-means clustering algorithm is a cluster analysis method where we define K disjoint clusters based on the feature value of the objects to be grouped.

    2) Farthest first clustering algorithm.It has the same procedure as the K-means algorithm;this also chooses centroids and assign the objects in the cluster but with max distance and initial seeds are the value which is at the largest distance to the mean of values,here cluster assignment is a different clustering algorithm,at initial cluster,we get a link with high Session Count,like at cluster-0 more than in cluster-1,and so on.

    3) Canopy clustering algorithm.It is a pre-clustering unsupervised scheme.It may be utilized as a pre-processing stage for the Hierarchical clustering scheme or the K-means scheme.It is a fast,simple,and accurate scheme in the clustering process,where each clustered object is arranged to be the only point within a multi-dimensional feature space.The canopy scheme utilizes two thresholds,T1>T2 and the fast approximate distance metric for processing purposes.

    4) Exception-maximization (EM) clustering algorithm.It is considered an expansion of the K-means scheme.It assigns the object to a cluster depending on a weight indicating the membership probability.So,there are no precise restrictions among different clusters.The EM scheme introduces a higher accuracy compared to the K-means scheme.

    5) Density-based clustering algorithm.It is a data clustering algorithm.In the case of given a set of points in some space,it groups together points that are closely packed together(points with many nearby neighbors),marking as outliers point that lie alone in low-density regions(whose nearest neighbors are too far away).

    Figure 2:Proposed hybrid system combined clustering and classification for intrusion detection in SDN

    4.2 SDN-Based IDS Using Deep Learning Model

    This part introduces the proposed SDN-based IDS using deep learning.The proposed system can help to identify malicious attacks as intrusion actions.The proposed SDN-based deep learning model for the IDS process is given in Fig.3.The dataset of NSL-KDD is utilized to evaluate the suggested SDN-based IDS using a DL scheme.All experiments have been performed using Python programming language on Spyder on Anaconda navigator software utilizing the Intel Core i5 GHz processor with 12 GB of RAM and 500 GB HD.

    Figure 3:SDN-based deep learning model for intrusion detection

    In this work,the NSL-KDD dataset is used to evaluate the results of applied algorithms.Dataset was introduced to resolve some intrinsic difficulties of the KDD-cup 1999 dataset[48,49].The original KDD’99 dataset was composed of the test and train datasets that were utilized previously to evaluate the performance of IDS models.It combines three different categories of features:traffic-based,content-based,and basic features.The NSL-KDD dataset is a modern description of the KDD dataset.Therefore,it is employed in this paper to assess the feature selection subsets efficiency of the suggested schemes.Attacks in the dataset are categorized into four categories of U2R (User to Root) attack,R2L(Remote to Local)attack,probing attack,and DoS(Denial of Service)attack according to their characteristics as shown in Tab.2.

    Table 2:Attack categories in the NSL-KDD dataset

    Therefore,the NSL-KDD dataset is utilized in this work to realize the evaluation and training of the suggested work.The NSL-KDD dataset has 41 attributes unfolding different traffic flow features,and a label is assigned either as a particular attack type or as normal data [50].The features in the NSL-KDD dataset are of different data types.The testing dataset contains 38 attack types,while the training dataset includes 24 attack types.Tab.3 presents the features with varying types of data in the NSL-KDD dataset.

    Table 3:Features with various data kinds in the NSL-KDD dataset[51]

    5 Results and Discussions

    This section illustrates the comparative results analysis,discussions and simulation environment setup of the proposed intrusion data-based clustering and detection scenarios.

    5.1 Simulation Results of the Traffic Data-Based Clustering Algorithms Environment

    The simulation results are performed with the WEKA environment using the NSL-KDD on a computer with a Core-i5 processor with 4 GB of RAM[52].We performed a normalization process in the range of 0-1 to all input dataset attributes before the employment of the clustering process,and the number of clusters is set up to four.

    The NSL-KDD dataset is analyzed using the K-means,Farthest First,Canopy,Exceptionmaximization (EM),and Density-based clustering algorithms,where the major attack types are presented in the training dataset.The performance of the aforementioned algorithms is evaluated based on the number of instances per cluster,the execution time,and incorrectly clustered instances.Tabs.4 to 8 and Figs.4 to 8 depict the outcomes of the tested simulation results.Four clusters are distributed for the clustered instances,clusters 0 to 3,including normal cases.The clustered instances distribution is classified into Normal,DoS,R2L,U2R,and Probe.

    Table 4:The simulation results of the K-means clustering algorithm

    Table 5:The simulation results of the farthest first clustering algorithm

    Table 6:The simulation results of the canopy clustering algorithm

    Table 7:The simulation results of the EM clustering algorithm

    Table 8:The simulation results of the density-based clustering algorithm

    Figure 4:Distribution of instances to clusters using the K-means clustering algorithm

    Fig.4 gives the clustered instances results using the K-means algorithm.The number of clustered instances in the case of each tested cluster is presented in Tab.4.Moreover,this table presents the distribution of the instances of each attack.It is noticed that the K-means scheme takes 4.51 s to build cluster models and the incorrectly clustered instances are 65108.Fig.5 shows the clustered instances results using the Farthest First algorithm.The number of clustered instances in the case of each tested cluster is introduced in Tab.5.Furthermore,this table presents the distribution of the instances of each attack.It is observed that the Farthest First scheme takes 0.39 s to build cluster models and the incorrectly clustered instances are 47143.

    Figure 5:Distribution of instances to clusters using the farthest first clustering algorithm

    Fig.6 presents the clustered instances results using the Canopy algorithm.The number of clustered instances in the case of each tested cluster is given in Tab.6.Moreover,this table presents the distribution of the instances of each attack.It is noticed that the Canopy scheme takes 2.53 s to build cluster models and the incorrectly clustered instances are 46628.Fig.7 shows the clustered instances results using the Exception-maximization(EM)algorithm.The number of clustered instances in the case of each tested cluster is presented in Tab.7.Furthermore,this table presents the distribution of the instances of each attack.It is observed that the EM scheme takes 40.48 s to build cluster models and the incorrectly clustered instances are 36667.

    Figure 6:Distribution of instances to clusters using the canopy clustering algorithm

    Fig.8 shows the clustered instances results using the Density-based clustering algorithm.The number of clustered instances in the case of each tested cluster is introduced in Tab.8.Moreover,this table presents the distribution of the instances of each attack.It is noticed that the Density-based clustering scheme takes 5.41 s to build cluster models and the incorrectly clustered instances are 48184.Tab.9 and Fig.9 show a comparison between the five clustering algorithms based on the number of instances between the four clusters.Tab.10 and Fig.10 show a comparison between the five algorithms based on the execution time.Tab.11 and Fig.11 show a comparison between five clustering algorithms based on the number of incorrectly clustered instances.

    Figure 7:Distribution of instances to clusters using the EM clustering algorithm

    Figure 8:Distribution of instances to clusters using the density-based clustering algorithm

    From all the presented simulation and comparison results,it is obvious that the distribution of instances is various from one cluster to another.It is also noticed that the Farthest First clustering algorithm takes less execution time among the five clustering algorithms.Moreover,the EM clustering algorithm gives a great number of incorrectly clustered instances among the five algorithms.

    Table 9:The comparison results between five clustering algorithms

    Figure 9:Comparison between clustering algorithms based many of instances

    Table 10:Comparison between the clustering algorithms based on execution time

    Figure 10:Comparison of results between the clustering algorithms based on execution time

    Table 11:Comparison of between the clustering algorithms based on the incorrectly clustered instances

    Figure 11:Comparison between the five clustering algorithms based on the number of incorrectly clustered instances

    5.2 Simulation Results of the SDN-Based IDS Using Deep Learning Model

    The deep learning-based IDS model is implemented for binary class attack classification.It classifies the input data whether it belongs to the normal or attack.The classification accuracy is evaluated for all 41 features,where the accuracy of detection of different attack classes was higher using the proposed deep learning model compared to other machine learning techniques such as LR,LDA,and NB as tabulated in Tab.12 and Fig.12.

    Table 12:Accuracy based comparison of different algorithm

    In the suggested model,the training percentage is 20%,epochs are 200,the batch size is 10,and the number of selected attributes is 16.The accuracy and loss percentage with different types of epochs are shown in Figs.13 and 14,wherewith increasing the number of epochs,the accuracy percentage is increased,and the loss percentage is decreased.

    Figure 13:Proposed deep learning model accuracy

    5.3 Comparative Analysis

    From Tab.13,the importance of the proposed scheme is quite evident.The proposed approach is an attempt to build an efficient software-defined network (SDN)-based intrusion detection system using deep learning.Besides,extensively analyzing and investigating the NSL-KDD dataset using different clustering algorithms into normal and four major attack categories.The results conceal that the proposed deep learning technique provides efficient intrusion detection performance compared to existing standard techniques.The results deliver a broad analysis and a rich comparative study of different kinds of attacks in this dataset.

    Figure 14:Proposed deep learning model loss

    Table 13:Comparative analysis with the previously proposed systems

    6 Conclusion and Future Work

    In recent times,recognizing and detecting anonymous threats and risks is a significant task in providing a secure SND system by applying an efficient intrusion detection system.Therefore,this paper provides a clustering-based analysis of the NSL-KDD dataset using the K-means,Farthest First,Canopy,Exception-maximization (EM),and Density-based clustering algorithms.Likewise,it presents a deep learning system for building an efficient intrusion detection system to detect unknown malicious and illegitimate activities.The simulation results show that using the Farthest First scheme introduced superior instances distribution compared to the other four clustering schemes.The deep learning model also provides high-performance accuracy compared with existing algorithms in detecting intrusion events.For example,the proposed DL method achieved a high detection accuracy of 94.21%.In our future work,we intend to employ advanced artificial intelligence tools to detect the new versions of attacks in the SDN network.In addition,the real implementation of an IoT-based SDN network in cybersecurity applications will be developed and designed.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    大香蕉久久网| 亚洲激情五月婷婷啪啪| 国产黄a三级三级三级人| 嫩草影院入口| 亚洲不卡免费看| 亚洲性久久影院| 亚洲成人av在线免费| 只有这里有精品99| 免费av毛片视频| 久久久久久国产a免费观看| 超碰av人人做人人爽久久| 中国国产av一级| 久久午夜亚洲精品久久| 中文在线观看免费www的网站| 国产成人freesex在线| 欧美又色又爽又黄视频| 中文字幕熟女人妻在线| 亚洲成a人片在线一区二区| 欧美潮喷喷水| 又粗又爽又猛毛片免费看| 亚洲熟妇中文字幕五十中出| 国产片特级美女逼逼视频| 一本精品99久久精品77| 亚洲色图av天堂| av国产免费在线观看| 久久精品综合一区二区三区| 日本撒尿小便嘘嘘汇集6| 丝袜喷水一区| 三级经典国产精品| 热99在线观看视频| 亚洲欧美日韩卡通动漫| 99久久人妻综合| 伦理电影大哥的女人| 久久国产乱子免费精品| 69av精品久久久久久| 桃色一区二区三区在线观看| 亚洲欧美日韩东京热| 2022亚洲国产成人精品| 免费看美女性在线毛片视频| 国产精品久久久久久久久免| 亚洲色图av天堂| 久久精品久久久久久噜噜老黄 | 亚洲av免费高清在线观看| 尤物成人国产欧美一区二区三区| 国产精品1区2区在线观看.| 亚洲成人中文字幕在线播放| 亚洲国产精品成人综合色| 国产精品蜜桃在线观看 | 精品久久国产蜜桃| 熟女人妻精品中文字幕| 亚洲国产日韩欧美精品在线观看| 亚洲精品成人久久久久久| 在线观看美女被高潮喷水网站| 人妻系列 视频| 赤兔流量卡办理| 国产精品综合久久久久久久免费| 亚洲最大成人av| 91久久精品国产一区二区成人| 嘟嘟电影网在线观看| 国产午夜精品论理片| 午夜福利在线在线| 69av精品久久久久久| 99热这里只有精品一区| 插逼视频在线观看| 天堂√8在线中文| 久久午夜亚洲精品久久| av专区在线播放| 一区二区三区高清视频在线| 激情 狠狠 欧美| 能在线免费观看的黄片| 国产午夜精品论理片| 欧美日本亚洲视频在线播放| 欧美性猛交╳xxx乱大交人| 在现免费观看毛片| 一级毛片aaaaaa免费看小| 成人永久免费在线观看视频| 国内精品久久久久精免费| 99热这里只有是精品50| 国产高清三级在线| 国产精品免费一区二区三区在线| 97人妻精品一区二区三区麻豆| 小蜜桃在线观看免费完整版高清| 国产av麻豆久久久久久久| 内地一区二区视频在线| 免费不卡的大黄色大毛片视频在线观看 | 亚洲电影在线观看av| 国产亚洲精品久久久久久毛片| 波野结衣二区三区在线| 看十八女毛片水多多多| 人妻制服诱惑在线中文字幕| 国语自产精品视频在线第100页| 老熟妇乱子伦视频在线观看| 不卡一级毛片| 两个人的视频大全免费| 1000部很黄的大片| 国内揄拍国产精品人妻在线| 日韩欧美三级三区| 欧美xxxx性猛交bbbb| 看黄色毛片网站| 蜜臀久久99精品久久宅男| 欧美性感艳星| 久久精品国产亚洲av天美| 三级经典国产精品| 精品久久国产蜜桃| 中文字幕免费在线视频6| 亚洲av二区三区四区| 免费av毛片视频| 午夜精品在线福利| 久久亚洲国产成人精品v| 日本色播在线视频| 一本久久精品| 日韩一区二区视频免费看| 国产乱人视频| 偷拍熟女少妇极品色| 人妻久久中文字幕网| 亚洲色图av天堂| 久久中文看片网| 久久久国产成人免费| 精品久久久久久久人妻蜜臀av| 2021天堂中文幕一二区在线观| 国产黄色小视频在线观看| 中文字幕制服av| 成人高潮视频无遮挡免费网站| 亚洲欧洲国产日韩| 久久久国产成人免费| 在线播放无遮挡| 成人三级黄色视频| 美女cb高潮喷水在线观看| 午夜精品一区二区三区免费看| 欧美一区二区精品小视频在线| 亚洲18禁久久av| 国产精品久久久久久精品电影小说 | 久久久久久久久久久丰满| 全区人妻精品视频| 久久久久久久午夜电影| 欧美成人免费av一区二区三区| 久久精品国产亚洲av涩爱 | 亚洲av成人精品一区久久| 欧美精品一区二区大全| 成人午夜高清在线视频| 99热精品在线国产| 五月伊人婷婷丁香| 久久久国产成人免费| 色5月婷婷丁香| 婷婷六月久久综合丁香| 国产真实乱freesex| 国产精品麻豆人妻色哟哟久久 | 永久网站在线| 深爱激情五月婷婷| 天堂影院成人在线观看| 欧美又色又爽又黄视频| 高清毛片免费观看视频网站| 国产亚洲精品av在线| 亚洲欧美精品专区久久| 一本久久精品| 精品少妇黑人巨大在线播放 | 日韩欧美精品免费久久| 中文字幕av在线有码专区| 欧美日韩精品成人综合77777| 一级毛片我不卡| 99热精品在线国产| 国产 一区精品| 午夜免费激情av| 99久久精品一区二区三区| 国产三级在线视频| 国产精品嫩草影院av在线观看| 午夜视频国产福利| 亚洲美女视频黄频| 中文字幕精品亚洲无线码一区| 天天一区二区日本电影三级| 亚洲18禁久久av| 欧美丝袜亚洲另类| 久久久久久久久久久免费av| 亚洲18禁久久av| 成年免费大片在线观看| 亚洲第一区二区三区不卡| 色综合站精品国产| 老师上课跳d突然被开到最大视频| 悠悠久久av| 免费观看人在逋| 级片在线观看| 18禁黄网站禁片免费观看直播| 日韩欧美精品免费久久| 卡戴珊不雅视频在线播放| 国产久久久一区二区三区| 日本黄大片高清| 综合色丁香网| 99热精品在线国产| 国内揄拍国产精品人妻在线| 欧美色欧美亚洲另类二区| 婷婷亚洲欧美| 成年女人永久免费观看视频| 久久久久久久久久久丰满| 日韩av不卡免费在线播放| 最近中文字幕高清免费大全6| 日韩欧美国产在线观看| 精品久久久久久久久亚洲| 久久久色成人| av天堂中文字幕网| 我要搜黄色片| 欧美最黄视频在线播放免费| 深夜a级毛片| 久久九九热精品免费| 国产久久久一区二区三区| av黄色大香蕉| 69人妻影院| 国产亚洲av嫩草精品影院| 高清毛片免费看| 少妇熟女aⅴ在线视频| 久久中文看片网| 久久99热6这里只有精品| 成人亚洲欧美一区二区av| a级毛片a级免费在线| 内地一区二区视频在线| 91aial.com中文字幕在线观看| 亚洲婷婷狠狠爱综合网| 少妇的逼水好多| 黄片wwwwww| 一本一本综合久久| 一级黄色大片毛片| 亚洲精品国产成人久久av| 成年av动漫网址| 男的添女的下面高潮视频| 国产高清有码在线观看视频| 久久久a久久爽久久v久久| 久久99精品国语久久久| 精品久久久久久久末码| 亚洲丝袜综合中文字幕| 91麻豆精品激情在线观看国产| 日韩一区二区三区影片| ponron亚洲| 青青草视频在线视频观看| 亚洲美女搞黄在线观看| 国产三级中文精品| 成人无遮挡网站| 91精品一卡2卡3卡4卡| 亚洲综合色惰| 如何舔出高潮| 亚洲精品久久久久久婷婷小说 | 岛国在线免费视频观看| 国产成人午夜福利电影在线观看| 深夜精品福利| 高清毛片免费看| 亚洲精品久久久久久婷婷小说 | 成年免费大片在线观看| 男女啪啪激烈高潮av片| 男人和女人高潮做爰伦理| 亚洲最大成人中文| 中文字幕熟女人妻在线| 成人美女网站在线观看视频| 精品一区二区免费观看| 中文字幕免费在线视频6| 日日啪夜夜撸| 成人av在线播放网站| 亚洲av二区三区四区| 欧美性猛交╳xxx乱大交人| 亚洲av成人精品一区久久| 26uuu在线亚洲综合色| 精品无人区乱码1区二区| 成人亚洲欧美一区二区av| 观看美女的网站| 精品国内亚洲2022精品成人| 深夜精品福利| 国产大屁股一区二区在线视频| 哪个播放器可以免费观看大片| 亚洲国产精品成人久久小说 | 简卡轻食公司| 国产一级毛片七仙女欲春2| 亚洲av熟女| 亚洲精华国产精华液的使用体验 | 中文资源天堂在线| 色综合站精品国产| 日韩一区二区视频免费看| 色吧在线观看| 色尼玛亚洲综合影院| 国产真实伦视频高清在线观看| 国产精品一区www在线观看| 国产精品.久久久| 舔av片在线| 国产成人精品一,二区 | 成人永久免费在线观看视频| 中国国产av一级| 99精品在免费线老司机午夜| 国产精品av视频在线免费观看| 久久人人爽人人片av| 成年女人看的毛片在线观看| 男人的好看免费观看在线视频| 日韩,欧美,国产一区二区三区 | 韩国av在线不卡| 日本-黄色视频高清免费观看| 少妇猛男粗大的猛烈进出视频 | 男人的好看免费观看在线视频| 黄色配什么色好看| 亚洲av一区综合| 国产精品野战在线观看| 久久精品影院6| 亚洲天堂国产精品一区在线| 亚洲av.av天堂| 成熟少妇高潮喷水视频| eeuss影院久久| 国产69精品久久久久777片| 一进一出抽搐gif免费好疼| 午夜老司机福利剧场| 亚洲国产精品合色在线| 日本av手机在线免费观看| 久久久久久久久中文| 变态另类丝袜制服| 国产精品电影一区二区三区| 国产男人的电影天堂91| 成人综合一区亚洲| 九色成人免费人妻av| 国产大屁股一区二区在线视频| 热99在线观看视频| 日本在线视频免费播放| 国产伦精品一区二区三区视频9| 啦啦啦啦在线视频资源| 亚洲欧美日韩无卡精品| 亚洲一区高清亚洲精品| 黄片无遮挡物在线观看| 一级av片app| 久久久久久九九精品二区国产| 一本久久中文字幕| 变态另类成人亚洲欧美熟女| 亚洲精品久久国产高清桃花| 国产老妇女一区| 亚洲高清免费不卡视频| 一级黄色大片毛片| 插阴视频在线观看视频| 女同久久另类99精品国产91| 亚洲av熟女| 国产探花极品一区二区| 欧美性猛交╳xxx乱大交人| 中文字幕av在线有码专区| 精品久久国产蜜桃| 中文字幕av在线有码专区| 色哟哟·www| 天堂网av新在线| 亚洲av男天堂| 一本精品99久久精品77| 黑人高潮一二区| 人妻久久中文字幕网| 精华霜和精华液先用哪个| 婷婷色av中文字幕| av天堂在线播放| 亚洲人与动物交配视频| 日日啪夜夜撸| 有码 亚洲区| 国产大屁股一区二区在线视频| 99久久精品热视频| 国产又黄又爽又无遮挡在线| 国产精品免费一区二区三区在线| 亚洲在线自拍视频| av又黄又爽大尺度在线免费看 | 中文资源天堂在线| 亚洲精品国产成人久久av| 免费观看精品视频网站| 九色成人免费人妻av| 联通29元200g的流量卡| 欧美性猛交黑人性爽| 国产午夜精品一二区理论片| 欧美性猛交黑人性爽| 欧美变态另类bdsm刘玥| 91久久精品国产一区二区三区| 可以在线观看毛片的网站| 变态另类丝袜制服| 日韩欧美在线乱码| 听说在线观看完整版免费高清| 欧美日本视频| 一级毛片电影观看 | 婷婷亚洲欧美| 成人无遮挡网站| 九九在线视频观看精品| 美女内射精品一级片tv| 美女脱内裤让男人舔精品视频 | 伦理电影大哥的女人| 少妇猛男粗大的猛烈进出视频 | 狂野欧美白嫩少妇大欣赏| 一进一出抽搐gif免费好疼| 人妻少妇偷人精品九色| 亚洲精品自拍成人| a级毛色黄片| 村上凉子中文字幕在线| 久久草成人影院| 国产 一区精品| 亚洲欧美精品综合久久99| 美女大奶头视频| 男人狂女人下面高潮的视频| 黄片wwwwww| 欧美高清性xxxxhd video| 国产伦精品一区二区三区视频9| 久久精品国产鲁丝片午夜精品| 免费av毛片视频| 真实男女啪啪啪动态图| 天堂√8在线中文| av专区在线播放| 91久久精品国产一区二区三区| 国产精品不卡视频一区二区| av在线播放精品| 国产白丝娇喘喷水9色精品| 夜夜爽天天搞| 日本-黄色视频高清免费观看| 亚洲欧美日韩高清专用| 日日啪夜夜撸| 中文字幕制服av| 日韩制服骚丝袜av| 久久久精品大字幕| 久久久久久国产a免费观看| 看黄色毛片网站| 久久综合国产亚洲精品| 免费无遮挡裸体视频| 成人无遮挡网站| 亚洲欧美精品自产自拍| 日韩 亚洲 欧美在线| 亚洲精品自拍成人| 国产v大片淫在线免费观看| 亚洲欧美成人综合另类久久久 | 寂寞人妻少妇视频99o| 国产精品一区www在线观看| 此物有八面人人有两片| 性欧美人与动物交配| 91av网一区二区| 午夜精品国产一区二区电影 | 亚洲av不卡在线观看| 少妇丰满av| 又爽又黄a免费视频| 五月玫瑰六月丁香| 日韩在线高清观看一区二区三区| 精品免费久久久久久久清纯| av天堂中文字幕网| 精品一区二区三区视频在线| 2021天堂中文幕一二区在线观| 国产精品蜜桃在线观看 | 成熟少妇高潮喷水视频| 日韩欧美一区二区三区在线观看| 中文字幕人妻熟人妻熟丝袜美| 在线免费观看的www视频| 一级毛片aaaaaa免费看小| 亚洲一级一片aⅴ在线观看| 国产精品蜜桃在线观看 | 人妻久久中文字幕网| 国产蜜桃级精品一区二区三区| 国产成人a区在线观看| 久久精品综合一区二区三区| 日韩,欧美,国产一区二区三区 | 亚洲人成网站高清观看| 国产视频首页在线观看| 大香蕉久久网| 一本一本综合久久| 最好的美女福利视频网| 亚洲久久久久久中文字幕| 99热网站在线观看| 欧美最黄视频在线播放免费| 免费大片18禁| 国语自产精品视频在线第100页| 18禁裸乳无遮挡免费网站照片| 两个人的视频大全免费| 性欧美人与动物交配| 九九久久精品国产亚洲av麻豆| 精品日产1卡2卡| 2022亚洲国产成人精品| 中文字幕精品亚洲无线码一区| 成人三级黄色视频| 中文字幕免费在线视频6| 日本色播在线视频| 亚洲av不卡在线观看| 亚洲一级一片aⅴ在线观看| 日韩一区二区视频免费看| 超碰av人人做人人爽久久| 人人妻人人看人人澡| 九色成人免费人妻av| 国产午夜精品论理片| 国产成人a∨麻豆精品| 国产成人精品久久久久久| 久久精品国产亚洲网站| 男女做爰动态图高潮gif福利片| 日本一本二区三区精品| 欧美性猛交黑人性爽| 黄色配什么色好看| 精品欧美国产一区二区三| 人人妻人人澡欧美一区二区| 国产久久久一区二区三区| 久久人人爽人人爽人人片va| 日日摸夜夜添夜夜添av毛片| 欧美成人a在线观看| 亚洲成人久久性| 亚洲一区高清亚洲精品| 我的女老师完整版在线观看| 麻豆一二三区av精品| 国产黄色小视频在线观看| 九九在线视频观看精品| 久久精品国产亚洲网站| 久久久成人免费电影| 亚洲三级黄色毛片| 一个人免费在线观看电影| 国产高清不卡午夜福利| 在线免费观看不下载黄p国产| 26uuu在线亚洲综合色| 黄色欧美视频在线观看| 精品免费久久久久久久清纯| 亚洲第一区二区三区不卡| 国产视频内射| 久久婷婷人人爽人人干人人爱| 亚洲丝袜综合中文字幕| 日日摸夜夜添夜夜爱| 1000部很黄的大片| 欧美成人精品欧美一级黄| 99久久中文字幕三级久久日本| 国产精品人妻久久久久久| 亚洲精品影视一区二区三区av| ponron亚洲| 亚洲av电影不卡..在线观看| 亚洲国产欧美在线一区| 免费看光身美女| 亚洲四区av| 久久99精品国语久久久| 老女人水多毛片| 欧美性猛交╳xxx乱大交人| av天堂中文字幕网| 免费在线观看成人毛片| 国产蜜桃级精品一区二区三区| a级一级毛片免费在线观看| 免费人成视频x8x8入口观看| 国内少妇人妻偷人精品xxx网站| 成人亚洲精品av一区二区| АⅤ资源中文在线天堂| 岛国毛片在线播放| 精品一区二区三区视频在线| 国产一区二区在线观看日韩| 国产精品电影一区二区三区| 91久久精品国产一区二区成人| 边亲边吃奶的免费视频| 晚上一个人看的免费电影| 国产成人精品婷婷| 国产免费男女视频| 久久国内精品自在自线图片| 国产三级在线视频| 99热这里只有是精品50| 热99在线观看视频| 人人妻人人看人人澡| videossex国产| 99国产极品粉嫩在线观看| 中文字幕人妻熟人妻熟丝袜美| 中国国产av一级| 中文亚洲av片在线观看爽| 久久久久性生活片| 美女国产视频在线观看| 91狼人影院| 久久久久九九精品影院| 国产真实伦视频高清在线观看| 国产成人a区在线观看| 搡老妇女老女人老熟妇| 国内精品美女久久久久久| 婷婷色av中文字幕| 天堂√8在线中文| 99久久九九国产精品国产免费| 国产成人aa在线观看| 菩萨蛮人人尽说江南好唐韦庄 | 国产老妇女一区| 国产亚洲欧美98| 亚洲一级一片aⅴ在线观看| 搞女人的毛片| 老司机影院成人| 18禁黄网站禁片免费观看直播| 99热精品在线国产| 嫩草影院入口| 午夜福利高清视频| 尤物成人国产欧美一区二区三区| 偷拍熟女少妇极品色| 亚洲一区二区三区色噜噜| 极品教师在线视频| 男女边吃奶边做爰视频| 亚洲成人av在线免费| 欧美3d第一页| 长腿黑丝高跟| 欧美激情久久久久久爽电影| 熟女人妻精品中文字幕| 亚洲av男天堂| 伊人久久精品亚洲午夜| 国产淫片久久久久久久久| 亚洲美女视频黄频| av在线亚洲专区| 1024手机看黄色片| 男人舔女人下体高潮全视频| 看黄色毛片网站| 午夜福利视频1000在线观看| 国产一区二区在线观看日韩| 久久久欧美国产精品| 99久久精品国产国产毛片| 97人妻精品一区二区三区麻豆| 日韩一区二区视频免费看| 日韩欧美精品免费久久| 哪个播放器可以免费观看大片| 免费一级毛片在线播放高清视频| 性插视频无遮挡在线免费观看| 2021天堂中文幕一二区在线观| 啦啦啦观看免费观看视频高清| 亚洲婷婷狠狠爱综合网| 欧美日韩在线观看h| 国产精品野战在线观看| 性色avwww在线观看| 亚洲精品成人久久久久久| 久久久久久久久中文| 国产亚洲精品久久久com| 午夜a级毛片| 91狼人影院| 国产人妻一区二区三区在| 高清日韩中文字幕在线| 人妻制服诱惑在线中文字幕| 美女 人体艺术 gogo| 国产高清视频在线观看网站| 一个人看的www免费观看视频| 欧美色欧美亚洲另类二区| 久久人人爽人人爽人人片va| 国产高清不卡午夜福利| 中出人妻视频一区二区|