• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    PLC Protection System Based on Verification Separation

    2022-08-24 03:26:46XiaojunPanHaiyingLiXiaoyiLiLiXuandYanbinSun
    Computers Materials&Continua 2022年5期

    Xiaojun Pan,Haiying Li,Xiaoyi Li,Li Xu and Yanbin Sun,*

    1Cyberspace Institute of Advanced Technology,Guangzhou University,Guangzhou,510000,China

    2School of Science and Engineering,Laval University,Quebec,G1V0A6,Canada

    Abstract:Supervisory control and data acquisition systems(SCADAs)play an important role in supervising and controlling industrial production with the help of programmable logic controllers (PLCs) in industrial control systems(ICSs).A PLC receives the control information or program from a SCADA to control the production equipment and feeds the production data back to the SCADA.Once a SCADA is controlled by an attacker,it may threaten the safety of industrial production.The lack of security protection,such as identity authentication and encryption for industrial control protocols,increases the potential security risks.In this paper,we propose a PLC protection system combined with a monitor between a SCADA and a PLC and a physically separated monitoring station.By using the PLC protection system, identity verification and command verification are separated, and both the identity of the operator and the corresponding commands are recorded.Experiments show that even if the SCADA is controlled by an attacker,our system could still protect the PLC in the field and record the identity of the key command operator,which facilitates the tracing and forensics of malicious activities.

    Keywords: ICS;SCADA;PLC security

    1 Introduction

    Industrial control systems (ICSs) are widely used in power, sewage, petrochemical, and other social infrastructure industrial facilities.Industrial control systems generally consist of programmable logic controllers, human-machine interfaces (HMIs), remote terminal units (RTUs), etc.With the development of information technology and internet technology,traditional industrial control systems that used to be physically isolated from the internet are being networked and becoming more intelligent [1].To separate monitoring and control, traditional protocols in industrial systems are gradually adopting TCP from traditional networks.For example, the Modbus protocol is extended to be a Modbus TCP.However,the original industrial control protocols lack security measures such as authentication and data encryption.As these hidden dangers are gradually exposed, industrial systems connected to a public network or a corporate office network are becoming increasingly more vulnerable.

    HMIs and engineering stations have a high level of control over local PLCs, which could lead to production accidents and financial losses if attackers gain control of the HMIs and engineering stations.For example, Stuxnet used the vulnerabilities of the WinCC software in HMI to control WinCC,which can intercept the PLC data and send malicious commands[2].In 2011,the water supply SCADA in Illinois was hacked,causing damage to water pumps[3].In 2013,Israel’s transport sector was attacked by hackers,resulting in large-scale traffic congestion[4].In 2014,the Havex virus invaded the SCADA of the European and American Ministry of Energy[5].In 2015,in the Ukrainian blackout,an attacker took control of an engineering station and remotely controlled the PLC through the engineering station,causing grid failure[6].At the Black Hat Conference,hacker groups demonstrated a worm residing in a PLC.Once the worm infects a PLC,the worm can automatically seek out other PLCs on the LAN and replace the programs running in them,causing a massive infection[7].In 2019,the Norsk Hydro aluminum plant was attacked by hackers,resulting in production interruption,the closure of several factories,and a 1.2%rise in the global aluminum price[8].

    Fig.1 shows the data of China’s National Bureau of Statistics.The global industrial system is under increasingly more attacks.Industrial systems are widely used in water treatment,petrochemicals and other infrastructure.Industrial security is related to national security and people’s livelihood.Increasingly more countries have realized the importance of industrial system security.

    Figure 1:Attack trend of global industrial events

    Currently,in industrial control systems,there are many security threats to monitoring systems and PLCs.The main problems are as follows.

    (1) HMIs and engineering stations run on Windows or Linux operating systems with various vulnerabilities.Furthermore,the monitoring and configuration software running on them also has security vulnerabilities.Obviously, HMIs and engineering stations run in an unreliable environment.They are at risk of being controlled by attackers.

    (2) HMIs and engineering stations lack identity management and records of the command type and the command time,making it difficult to trace related operations[9].

    (3) The lack of authentication, data encryption, and other methods in industrial control system protocols makes communication traffic susceptible to eavesdropping and forging[10].There is no way to verify the source of commands and their legitimacy.

    (4) PLCs lack authentication and other security features.Their weak processing ability,firmware closure,lack of security control in industrial protocols and other reasons make them vulnerable.

    To solve the problems above, we investigate a PLC protection system based on verification separation.The system consists of a monitoring station and a monitor.The monitoring station is physically isolated from the industrial control network and the internet.It is used to monitor and intercept the data sent by the HMI, engineering station, or another component.Furthermore, the system uses data classification, traffic encryption, permission classification and other methods to ensure the safety of industrial production equipment when the HMI or engineering station is controlled by attackers.The key commands sent to the PLC are recorded, which is convenient for tracing the source of attack commands and traffic.

    The remainder of this paper is organized as follows.Section 2 introduces the related work on PLC security,Section 3 describes the system architecture studied and the related methods,Section 4 presents our experimental results and evaluations,and Section 5 outlines our summary and future research.

    2 Related Work

    This work seeks to solve the problem of engineering stations or HMIs being maliciously controlled to send malicious codes and commands to PLCs.Malchow et al.[11] designed a PLC guard that decodes the MC 7 code of all Siemens PLC programs and compares it with previous versions by adding a guard between the PLCs and engineering stations.An engineer approves or rejects the code upload by physically interacting with the PLC guard.However,this method is not used to detect the relevant data sent to the PLC and is only used to detect the PLC code,and there is no ability to block malicious data injection.Zonouz et al.[12] proposed a method based on the symbolic execution of PLC code to detect PLC malicious programs.The method first reverses the security requirements and generates the corresponding unsafe requirements (UR).Then, it finds the path P that satisfies the conditions, where P is the Cartesian product of TEG and UR.If there is no path that satisfies the conditions, the code meets the security requirements and can be executed safely.The method determines the malicious code automatically.There is a path explosion problem during the path solving process.The detection efficiency of the method is relatively low.Due to automatic judgment,there is a possibility of misjudgment.Clark et al.[13] proposed a new defense framework that uses a set of randomized encryption keys to authenticate the control commands sent by a system operator to a PLC.The framework uses cryptographic analysis, control theory, and game theory methods to quantify the impact of malicious control instructions and to judge the relevant control instructions.This type of automatic judgment also has a certain false alarm rate.The false alarms may be a serious threat to site production safety.Lin et al.[14], based on the in-depth analysis of the Modbus protocol in industrial protocols,proposed a malicious intrusion detection method based on automatic learning.The method also has the same problem that it cannot intercept the relevant commands and gives false positives.Ponomarev et al.[15]proposed a method for detecting the ICS of an intruding network by measuring and verifying the data transmitted over the network.The intrusion detection system was able to achieve 94.3%accuracy in detecting attackers and engineering stations on the same network and 99.5%accuracy in detecting attackers and engineering stations on different networks.This automated judgment also has some problems with false alarm rates.Yau et al.[16]proposed using semisupervised machine learning to detect anomalous PLC behavior based on captured PLC memory address values.Halas et al.[17]proposed using encryption algorithms to encrypt data on PLCs to achieve the goal of data integrity.This approach has compatibility issues with existing protocols in use.

    There is no effective way to solve the security problems of field equipment when an engineering station or HMI is controlled by an attacker.Bestak et al.[18]proposed an encryption algorithm for PLCs to encrypt data.This method has compatibility problems with the existing protocols and does not prevent a host computer from attacking a PLC after being controlled by hackers.Wardak et al.[19]believe that attacks on PLCs are all exploited to access PLCs without authorization vulnerability.

    They propose that data security modules between PLCs and other equipment can solve this problem.However, the attacker can still use the host computer to attack the on-site devices.Zhang et al.[20]designed a state-based no-depth network deep packet inspection (DPI) system that can detect the payload of malicious network packets.This system cannot prevent attacks on field devices when the host computer is controlled.Figueroa-Lorenzo et al.[21] proposed a new role-based access control model(RBAC).The model uses the method of message authorization for roles and unit IDs to ensure the legitimacy of access.A unit ID is a unique identifier used to authorize the Modbus frame.This method can only prevent the external equipment from illegally operating the field equipment and cannot guarantee the security of the host computer under the control of the attacker.Lin et al.[22]proposed a malicious intrusion detection method based on automatic learning.They believed that in order to penetrate an industrial network,the ICS network topology must first be determined.There must be some abnormal traffic when an attacker launches an attack.However, this method cannot avoid attacks on field equipment after the host computer is controlled.Yong et al.[23] analyzed the interactive behavior of industry control protocols and used machine learning methods to collect physical fingerprint information of devices to model PLCs and physical devices.Then, the method uses this information to discover the abnormal behavior of the protocol and PLC.

    3 PLC Protection System Based on Verification Separation

    3.1 Industrial System Security Issues

    A typical industrial control system architecture today, which includes an HMI, engineering stations,historical data servers,office networks,switches,firewalls,PLCs,and field devices,is shown in Fig.2[24].An HMI is a device that allows an operator to monitor and control a production process.An engineering station is a workstation for engineers to use to configure, program, and modify a computer system[25].A historical data server is a database server that records the history of the status of the process control system.The office network is connected to the production network through a firewall.A PLC,which can receive control commands from the HMI using industrial communication protocols, is a field device that can be connected directly to sensors, actuators, or other field devices[26].

    Figure 2:Industrial control system architecture

    An HMI and engineering stations can control PLCs[27].However,in industrial control systems,enterprise information networks and field control networks only use network firewalls for isolation.

    Attackers can penetrate enterprise information networks into industrial control networks to attack a PLC.APT attacks are also a persistent high-threat attack:the attackers infiltrate the field control networks through a range of means and then further control an HMI or engineering station to take control of the field devices.Once an HMI or engineering station is controlled by an attacker, the attacker can intercept and tamper with normal data from employees’operations to attack field devices.This type of data tampering comes from an HMI or engineering station,making it difficult to intercept.The general attack path is shown in Fig.3.Attackers use the vulnerabilities of the office network to attack the office network through the internet.The office network is then used to attack monitoring and collection systems,such as HMIs,engineering stations,or historical data servers.After controlling these devices, they use these devices to attack PLCs, such as through program tampering and data tampering.

    Figure 3:Attack path

    Fig.4 shows a simulation of an attack on a Ukrainian power plant.The attacker used the CVE-2014-4114 vulnerability in the office computer to attack the office computer.Then,the office computer was used to control the SCADA computer.This occurs because the SCADA computer is connected to the PLC.Access to the PLC does not require authentication,and the instructions are all in plain text.The attacker used the SCADA computer to send a stop command to the PLC to stop the field equipment,which caused a large-scale power outage.

    The current protection methods based on traffic analysis,access control,and device monitoring cannot prevent a host computer from attacking a PLC after being controlled by a hacker.We need a new protection strategy and method to prevent hackers from using a host computer to attack field equipment.If we can authenticate the commands sent by a PLC on the host computer,it will greatly reduce the occurrence of such incidents.We design a PLC protection system based on verification separation.While protecting the verification server,the system verifies the legality of the instructions sent to the PLC without affecting the existing architecture.

    Figure 4:Ukrainian power outage

    3.2 System Architecture

    In order to solve the problems above, considering compatibility with existing industrial control systems, we designed a system that separates authentication from existing data transmission.Its architecture is shown in Fig.5.

    Figure 5:Validating the separated PLC system architecture

    The system consists of a monitor, monitoring station and high-speed wireless network.The monitor is physically connected directly with the PLC while it is connected to the monitoring station using an independent high-speed wireless network.The monitor intercepts the commands transmitted to the PLC,encrypts the commands and transmits them to the monitoring station through the highspeed wireless network.The relevant commands are recorded for subsequent queries.The monitoring station determines the legitimacy of the commands and authenticates the identity and privileges of the person who verifies the command.The high-speed wireless network uses a low latency network for communication between the monitoring station and the monitor.The high-speed wireless network is not connected to the existing industrial network to ensure physical isolation from the industrial network.

    Its workflow is shown in Fig.6.After the monitor receives the command from the HMI or the engineering station, it determines the type of command.If the command is a memory operation or a stop/start operation, the data will be encrypted and sent to the monitoring station.Then, the staff confirms the security of the data and sends an accept or reject command to the monitor.The monitor receives the command from the monitoring station and decides whether to discard the packet or forward it to the PLC device.

    Figure 6:System workflow

    The monitoring station is physically isolated from the industrial network,and unauthorized access to external devices is prohibited to ensure the credibility of the monitor’s operating environment.The monitoring station and the monitor use encrypted communication methods to ensure the reliability of communication.The monitor is able to record the commands to ensure their traceability.The monitor will not forward data without the permission of the monitoring station,ensuring that external attacks cannot control the PLC.

    3.3 PLC Protection System Model Based on Verification Separation

    The data transmitted in industrial communication networks are divided into two types:realtime data and non-real-time data[28].Non-real-time data include user program data,configuration data, and partial system state monitoring data.These data are not harsh regarding their real-time requirements and allow relatively long time delays [29].Process monitoring and control application packet loss and jitter are less sensitive, and they can tolerate second-class transmission delays [30].Therefore, we intercept the data transmitted from the HMI or engineering station to the PLC and analyze the commands.If the command is a memory operation command,such as uploading a data block,deleting a data block,writing memory,shutdown,or startup,we will send the encrypted data to the monitoring station through a high-speed wireless network.Considering that machine learning or deep learning methods have a certain false alarm rate,the accuracy of the model built for program changes or data changes will be drastically reduced for such data;therefore,we adopt the staff method to verify whether the data have been maliciously altered to ensure data security.We classify our staff members into four levels,as shown in Tab.1 below.

    Table 1:Employee privilege levels

    We also record the identities of the people in charge of the checks to ensure the traceability of such dangerous operations,thus providing some protection against malicious actions by internal employees.To ensure the uniqueness of the identity and the security of the key,we use a two-key method.These two types of keys are shared keys and private keys.The monitor transmits encrypted data to the monitoring station using a shared key that can be changed.Each staff member has his own unique private key.After the staff member reviews the data uploaded by the monitor, they encrypt the commands sent to the monitor with their own private key.The advantage is that even if the shared key is cracked or leaked, the data uploaded by the monitor may be tampered with, and the commands issued by the staff can still be guaranteed to have not been tampered with.In the case where the private key of a staff member is leaked,since everyone has their own unique private key and permission restrictions,the risk of the system being under complete control can also be reduced.

    In order to reduce the security risk of the database, we separate the databases.The monitoring station and the monitor each have a database.The database of the monitoring station is used to store staff information, including permission information, communication keys, ID information,creators,creation information and the key index of the monitoring station.The key index stored by the monitoring station is the index of the staff keys in the monitor,which can be used to reduce table lookup time.The database in the monitor stores staff IDs,staff keys,creators,and permission information and records the relevant commands and times.

    The model of the system is shown in Fig.7.

    The monitor consists of an encryption module, a decryption module, a control module, an authentication module,a database,and network card devices.The encryption module is responsible for encrypting the data from engineering stations or HMIs.The decryption module is responsible for decrypting the data from the monitoring station.The database is used to record information such as legal identity,authority level,private key,etc.The authentication module is responsible for classifying the data from engineering stations or HMIs.The network card is responsible for forwarding the data.

    Figure 7:System model

    The decryption module of the monitoring station is responsible for decrypting the data from the monitor.The encryption module is responsible for encrypting the data sent by staff to the monitor,such as commands,identities,and times.The client module is responsible for displaying the data sent by the monitor and verifying the identity of the staff.The database is used to store the staff’s identity,the staff’s private key,the private key index in the monitor and other data.

    The engineering station and HMI are responsible for sending relevant commands or monitoring the PLC in the field.They consist of a control or monitoring program and a network card.

    The engineering station sends the data to the monitor.The monitor encrypts the data and sends it to the monitoring station.The monitoring station performs command display,identity verification and command verification.Then the monitoring station encrypts the data and sends it to the monitor.The monitor confirms the identity based on the data and performs corresponding actions.

    3.4 System Workflow

    To ensure secure communication between the monitor and the monitoring station, we use an encryption method.Mainstream encryption algorithms are divided into symmetric and asymmetric encryption algorithms.An asymmetric encryption algorithm requires high computing resources and is generally only used for digital signatures.Therefore,we adopt symmetric encryption for encryption.The characteristics of the mainstream encryption methods are shown in Tab.2[31].The AES algorithm has advantages in running speed,security,and resource consumption.Therefore,we adopt a 128-bit AES algorithm for encryption.

    Table 2:Comparison of commonly used symmetric algorithms[32]

    As shown in Fig.8,first,the engineering station or HMI sends data to monitor[33].The monitor receives the data and fetches the command to determine whether it is a memory operation, stop or start command.If the command is one of these commands, the monitor will encrypt the monitor’s mac address, timestamp and data using PKr, a key shared with the monitoring station, to form the message{PKr(data,mac,Ts)}.Then,the monitor will send the message to the monitoring station.If this does not occur,the data will be forwarded directly to the PLC.Furthermore,the time monitoring will be started.After 30 s,if the monitoring station does not give a command,then the data will be discarded.

    After receiving the data from the monitor, the monitoring station decrypts the data using PKr.Then,it verifies the timestamp Ts and mac to verify whether a message is a replay attack.Additionally,time monitoring is started.If there is no operation after 30 s, the message will be ignored.After an employee accepts or rejects command R,the monitoring station queries its own database to verify the identity ID and obtains the employee’s private key PKIDand the key’s index in the monitor.Then,the monitoring station uses PKIDto encrypt the command R,the employee’s identity ID and the timestamp to form a message(PKID{ID,R,Ts},index)with the index to send to the monitor.

    The monitor takes out the index among the messages obtained from the monitoring station and queries the database with the index to obtain the employee’s private key PKID,which is used later to decrypt the employee’s ID, R, and Ts.Then, the monitor verifies Ts to prevent replay attacks and verifies the ID to ensure that the identity is legitimate.If R is a receiving command,it will record the employee’s ID,data and Ts to the file and send the data to the PLC.If R is a rejecting command,the employee’s ID,data and Ts are recorded in the file,and the data are discarded.

    When the monitor receives the data sent by the PLC,the data are forwarded directly to the HMI or engineering station.

    4 Experimental Evaluation

    4.1 System Verification

    We used a MacBook Pro as the monitor and simulated an HMI and engineering station being controlled to send data to a PLC.The network topology is shown in Fig.9.The monitoring station and the monitor are on the same LAN.They communicate wirelessly.The HMI and the monitor are on the same LAN,and the monitor and the PLC are on the same LAN.

    In this experiment,we intercepted the commands 0×05(write),0×29(stop PLC),and 0×28(start PLC) of the Siemens S7 protocol.The experiment showed that no host (including HMI and engineering stations)has access to make changes to the PLC memory without personnel verification,which can protect the industrial equipment in the field well.Fig.10 is our experimental equipment.

    We sent a write command to the PLC,as shown in Fig.11.The command is written(0×05).The data length is 3 bytes,and the data are 0×00000000.

    Figure 8:Sequence of communication between the HMI/engineering station and the monitoring station

    Figure 9:Network topology

    Figure 10:Experimentalequipment

    Figure 11:Data sent by a simulated attack

    Fig.12 shows that the monitoring station receives data from the monitor.The received data are encrypted binary data.After decryption, the data content is restored.The operating command is written.The data length is 3 bytes.The data address block is 1,and the data are 00000000.

    Figure 12:Monitoring station data

    Fig.13 shows the ID of the employee, the time and the accepted data recorded by the monitor after receiving the command.The accepted data are recorded as the raw data sent by the HMI.

    Figure 13:Employee behavior data

    Since we are intercepting various HMI commands that operate on PLC memory and this type of command is more affected by human behaviors,the time delay measurement of such commands is of little significance.However,some programs,such as monitoring programs and database programs,are constantly querying PLC data.In our system,we need to intercept the data sent by the HMI to determine the command.If a command is a memory operation command,then it will be encrypted and sent to the monitoring station.If a command is a query command,then it will be directly forwarded to the PLC.Therefore,the process adds a certain time delay.Hence,we performed a time delay test on the query command.We performed 200 tests for each query data length and then averaged the results.The time delay is shown in Fig.14.The horizontal axis represents the length of our query data.The vertical axis represents the time delay.The yellow column is the time delay without the query data in our system.The blue column is the time delay after the query data were added to our system.The increase in the time delay after query data join our system is below 6%,which could be ignored.The variances are shown in Fig.15.The variance increases after adding our system, which means that the network fluctuation increases.However,the increase is very small,which means that the network fluctuation tends to be stable.This shows that the addition of our system has a relatively small impact on monitoring functions such as queries.

    4.2 Protection Verification

    As shown in Fig.16,we simulated a scenario where a SCADA was attacked by APT.We designed an Excel file that contains an attack command,which can shut down the on-site PLC.If we open this Excel file,it will automatically send a stop command to the PLC.When the Excel file is opened,the on-site equipment will stop running.After joining our equipment without our protection system,the on-site equipment was operating normally,and information such as the time when the command was sent was recorded.Fig.17 is our experimental equipment.

    Figure 14:Time delay

    Figure 15:Variance in time delay

    Figure 16:Simulated attack

    Figure 17:Experimental equipment

    5 Summary and Future Work

    We designed a PLC protection system based on verification separation.The system will not affect the operations of the original system.In addition,the increased time delay is less than 6%.Different from other protection systems, this system does not encrypt the original protocol for compatibility.Because of the existence of the monitor, we can intercept some of the more important commands and send them to another server that is isolated from the industrial control external network through encryption.Some unimportant instructions,such as read instructions,are not processed.This greatly reduces the time delay.In addition,we also recorded the sending time of each critical command and confirmed the identity of the operator.This is of great help to the location and source tracing of some attacks.We can use this information to quickly locate the relevant attack time and attack.Because the system can intercept and reproduce the commands sent by the host computer,it can intercept some command substitutions and attacks where the host computer is controlled.This is something that other protection methods based on identity authentication and traffic identification cannot do.

    The system architecture also has some shortcomings.For example,PLC-to-PLC communication cannot be verified manually due to its high requirements for latency and its large data communication.Considering that monitoring devices and databases are reading PLC data in real time,we do not detect or intercept the reading-data action,which may cause privacy leakage.In the future,we will implement the automated judgment of key commands in PLC-to-PLC communication.Due to the high data flow and the peculiarities of the production site,the automated judgment process does not allow false alarms,which is a challenge to the reliability and accuracy of the system.

    Funding Statement:This work is funded by the National Key Research and Development Plan(Grant No.2020YFB2009503), the National Natural Science Foundation of China (No.62072130,61702223, 61702220, 61871140, 61872420), the Guangdong Province Key Area R&D Program of China (No.2019B010137004), the Guangdong Basic and Applied Basic Research Foundation(Nos.2020A1515010450, 2021A1515012307), Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019), and Guangdong Higher Education Innovation Group (No.2020KCXTD007), Guangzhou Basic and Applied Basic Research Foundation (No.202102020867,202102021207) and Guangzhou Higher Education Innovation Group (No.202032854), Industrial Internet innovation and development project of MIIT NO.TC200H01 V.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    色网站视频免费| 亚洲欧美精品综合一区二区三区 | 久久免费观看电影| 成年人免费黄色播放视频| 国产免费又黄又爽又色| 飞空精品影院首页| 在线观看免费高清a一片| 婷婷色麻豆天堂久久| 国产免费又黄又爽又色| 久久精品夜色国产| 一本色道久久久久久精品综合| 人人妻人人澡人人爽人人夜夜| 国产在线一区二区三区精| 欧美人与性动交α欧美软件| 免费久久久久久久精品成人欧美视频| 久久99精品国语久久久| 大陆偷拍与自拍| 久热这里只有精品99| 韩国高清视频一区二区三区| 男男h啪啪无遮挡| 9色porny在线观看| av网站免费在线观看视频| 色播在线永久视频| 久久99热这里只频精品6学生| 亚洲内射少妇av| 少妇人妻久久综合中文| 亚洲一区二区三区欧美精品| 亚洲在久久综合| 国产精品久久久av美女十八| 少妇人妻精品综合一区二区| 99九九在线精品视频| 97在线视频观看| 99香蕉大伊视频| 超色免费av| 午夜福利网站1000一区二区三区| 国产精品av久久久久免费| 亚洲人成77777在线视频| 午夜免费观看性视频| 在线观看www视频免费| 国产精品嫩草影院av在线观看| 欧美bdsm另类| 久久女婷五月综合色啪小说| 国产在线一区二区三区精| 久久国产亚洲av麻豆专区| 欧美日韩成人在线一区二区| 狠狠精品人妻久久久久久综合| 看免费av毛片| 久久人人爽av亚洲精品天堂| 十分钟在线观看高清视频www| 美女主播在线视频| 国产精品无大码| 伊人亚洲综合成人网| 久久亚洲国产成人精品v| 纵有疾风起免费观看全集完整版| 精品一区二区三卡| 欧美亚洲日本最大视频资源| 免费av中文字幕在线| 中文天堂在线官网| 成年人免费黄色播放视频| 美女中出高潮动态图| 亚洲精品在线美女| 亚洲欧美清纯卡通| 久久97久久精品| www.熟女人妻精品国产| 亚洲国产av新网站| 国产精品国产三级专区第一集| 色网站视频免费| 成年动漫av网址| 国产精品久久久久久久久免| 国产精品99久久99久久久不卡 | 久久毛片免费看一区二区三区| 国产深夜福利视频在线观看| 如何舔出高潮| www.自偷自拍.com| 欧美日韩亚洲高清精品| 欧美成人午夜免费资源| 亚洲精品一区蜜桃| 亚洲精品日本国产第一区| 亚洲,一卡二卡三卡| 一级毛片电影观看| 国产成人免费观看mmmm| 两性夫妻黄色片| 午夜福利在线观看免费完整高清在| 不卡视频在线观看欧美| 80岁老熟妇乱子伦牲交| 亚洲国产毛片av蜜桃av| 999久久久国产精品视频| 最近的中文字幕免费完整| 一本久久精品| 久久精品久久精品一区二区三区| 大片电影免费在线观看免费| 亚洲国产av影院在线观看| 成人手机av| 久久免费观看电影| 国产免费福利视频在线观看| 大香蕉久久网| 人妻一区二区av| 日韩欧美一区视频在线观看| 新久久久久国产一级毛片| tube8黄色片| 成人国产麻豆网| 久久精品亚洲av国产电影网| 国产高清不卡午夜福利| 国产一区二区三区综合在线观看| 久热这里只有精品99| 国产成人精品一,二区| 香蕉精品网在线| 久久久久久免费高清国产稀缺| 在线免费观看不下载黄p国产| 亚洲国产色片| 亚洲国产最新在线播放| 久久97久久精品| 久久久久久久久免费视频了| 有码 亚洲区| 一本—道久久a久久精品蜜桃钙片| 哪个播放器可以免费观看大片| 亚洲av国产av综合av卡| 一级片免费观看大全| 熟女电影av网| 久久女婷五月综合色啪小说| 国产成人精品福利久久| 深夜精品福利| 免费看不卡的av| 人体艺术视频欧美日本| 久久久亚洲精品成人影院| 久久人妻熟女aⅴ| 熟女电影av网| 国产av精品麻豆| 大香蕉久久网| 国产一区二区激情短视频 | 久久精品国产鲁丝片午夜精品| 一二三四中文在线观看免费高清| 国产精品欧美亚洲77777| 亚洲欧洲日产国产| 欧美日韩亚洲国产一区二区在线观看 | 天堂8中文在线网| 国产精品免费大片| 啦啦啦在线观看免费高清www| 国产精品亚洲av一区麻豆 | 少妇的逼水好多| 国产又爽黄色视频| 美国免费a级毛片| 91久久精品国产一区二区三区| 成人黄色视频免费在线看| 成人手机av| 香蕉国产在线看| 久久精品亚洲av国产电影网| 亚洲精品久久久久久婷婷小说| 麻豆av在线久日| 精品福利永久在线观看| 成年美女黄网站色视频大全免费| 欧美最新免费一区二区三区| 久久久久国产网址| 免费大片黄手机在线观看| 久久鲁丝午夜福利片| 欧美日本中文国产一区发布| 国产探花极品一区二区| 欧美人与善性xxx| 午夜福利,免费看| 亚洲男人天堂网一区| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 亚洲国产日韩一区二区| 国产精品.久久久| 亚洲经典国产精华液单| 女人久久www免费人成看片| 伦精品一区二区三区| 91精品三级在线观看| 国产一区二区三区综合在线观看| 十八禁网站网址无遮挡| 久久久久精品人妻al黑| 日本黄色日本黄色录像| 亚洲在久久综合| 岛国毛片在线播放| 看免费成人av毛片| 夫妻性生交免费视频一级片| 国产av精品麻豆| 久久人妻熟女aⅴ| 国产福利在线免费观看视频| 男的添女的下面高潮视频| 成人毛片a级毛片在线播放| 人成视频在线观看免费观看| 男女啪啪激烈高潮av片| 91午夜精品亚洲一区二区三区| 一级,二级,三级黄色视频| 男女边摸边吃奶| 自拍欧美九色日韩亚洲蝌蚪91| 大话2 男鬼变身卡| 制服丝袜香蕉在线| 成人毛片a级毛片在线播放| 免费高清在线观看视频在线观看| 欧美亚洲 丝袜 人妻 在线| 两性夫妻黄色片| 99热国产这里只有精品6| 亚洲国产av影院在线观看| 最近最新中文字幕免费大全7| 爱豆传媒免费全集在线观看| 国产男人的电影天堂91| 丰满乱子伦码专区| 国产日韩一区二区三区精品不卡| 国产综合精华液| 亚洲精品av麻豆狂野| 丰满少妇做爰视频| www日本在线高清视频| 欧美精品亚洲一区二区| 精品少妇一区二区三区视频日本电影 | 欧美老熟妇乱子伦牲交| 精品人妻熟女毛片av久久网站| 国产免费现黄频在线看| 99国产综合亚洲精品| 日本wwww免费看| 免费久久久久久久精品成人欧美视频| 免费av中文字幕在线| 观看美女的网站| 久久 成人 亚洲| 不卡av一区二区三区| 久久精品久久久久久噜噜老黄| 国产成人欧美| 飞空精品影院首页| 在线观看一区二区三区激情| 日本欧美视频一区| 国产成人午夜福利电影在线观看| 五月开心婷婷网| 美女脱内裤让男人舔精品视频| 高清黄色对白视频在线免费看| 国产精品国产三级专区第一集| 日韩中字成人| 精品久久蜜臀av无| 激情五月婷婷亚洲| 校园人妻丝袜中文字幕| 王馨瑶露胸无遮挡在线观看| 777久久人妻少妇嫩草av网站| 韩国高清视频一区二区三区| 欧美成人午夜免费资源| 美女中出高潮动态图| 亚洲男人天堂网一区| 免费高清在线观看日韩| 亚洲一码二码三码区别大吗| 美女脱内裤让男人舔精品视频| 久久99一区二区三区| 18在线观看网站| 69精品国产乱码久久久| 日日撸夜夜添| 日本猛色少妇xxxxx猛交久久| 我的亚洲天堂| 王馨瑶露胸无遮挡在线观看| 免费日韩欧美在线观看| 免费黄色在线免费观看| 国产精品久久久久久久久免| 新久久久久国产一级毛片| av在线老鸭窝| 国产精品不卡视频一区二区| 岛国毛片在线播放| 男女免费视频国产| 免费高清在线观看视频在线观看| 观看av在线不卡| 极品人妻少妇av视频| 国产亚洲午夜精品一区二区久久| 国产一级毛片在线| 国产极品粉嫩免费观看在线| av福利片在线| 自拍欧美九色日韩亚洲蝌蚪91| 免费在线观看视频国产中文字幕亚洲 | 夫妻性生交免费视频一级片| 国产黄频视频在线观看| 亚洲伊人久久精品综合| 天美传媒精品一区二区| 免费观看性生交大片5| 制服人妻中文乱码| 亚洲精品乱久久久久久| 亚洲av国产av综合av卡| 精品国产一区二区三区久久久樱花| 欧美xxⅹ黑人| 国产精品无大码| 国产亚洲欧美精品永久| 亚洲国产最新在线播放| 性色av一级| 国产午夜精品一二区理论片| 午夜福利网站1000一区二区三区| 搡女人真爽免费视频火全软件| 欧美日韩视频高清一区二区三区二| 久久久久久免费高清国产稀缺| 巨乳人妻的诱惑在线观看| 色94色欧美一区二区| 91国产中文字幕| 精品久久蜜臀av无| 99九九在线精品视频| 麻豆乱淫一区二区| 日韩视频在线欧美| 国产成人精品久久久久久| 免费观看a级毛片全部| 夫妻午夜视频| 久久国内精品自在自线图片| 99久久人妻综合| 国产在线视频一区二区| 日产精品乱码卡一卡2卡三| 日韩av免费高清视频| 99久国产av精品国产电影| 三上悠亚av全集在线观看| 亚洲男人天堂网一区| 2022亚洲国产成人精品| 精品一区在线观看国产| 欧美成人午夜精品| 精品亚洲乱码少妇综合久久| 亚洲欧美色中文字幕在线| 免费大片黄手机在线观看| 叶爱在线成人免费视频播放| 国产熟女午夜一区二区三区| 成人18禁高潮啪啪吃奶动态图| 黄色视频在线播放观看不卡| 女人高潮潮喷娇喘18禁视频| 女人久久www免费人成看片| 亚洲熟女精品中文字幕| 亚洲 欧美一区二区三区| 91成人精品电影| 天天躁夜夜躁狠狠久久av| 中文精品一卡2卡3卡4更新| 啦啦啦视频在线资源免费观看| 国产精品久久久久久精品古装| 欧美老熟妇乱子伦牲交| 亚洲av欧美aⅴ国产| 免费不卡的大黄色大毛片视频在线观看| 少妇猛男粗大的猛烈进出视频| 飞空精品影院首页| 国产探花极品一区二区| 日本av免费视频播放| 伦理电影免费视频| av国产久精品久网站免费入址| 一区二区三区乱码不卡18| 999久久久国产精品视频| 久久亚洲国产成人精品v| 欧美精品一区二区大全| 爱豆传媒免费全集在线观看| 精品卡一卡二卡四卡免费| 欧美日韩亚洲高清精品| 欧美黄色片欧美黄色片| 国产黄色免费在线视频| 制服人妻中文乱码| 人妻系列 视频| 亚洲第一青青草原| 纵有疾风起免费观看全集完整版| www.熟女人妻精品国产| 成年人午夜在线观看视频| 久久精品熟女亚洲av麻豆精品| 99国产综合亚洲精品| 日韩制服骚丝袜av| 国产免费视频播放在线视频| 18禁观看日本| www.av在线官网国产| 久久这里只有精品19| 天天躁日日躁夜夜躁夜夜| 一级黄片播放器| 久久久久久久国产电影| 老女人水多毛片| 十八禁网站网址无遮挡| 9热在线视频观看99| 亚洲一区二区三区欧美精品| 欧美亚洲 丝袜 人妻 在线| 久久精品久久久久久噜噜老黄| 一本色道久久久久久精品综合| 伦理电影免费视频| 日日爽夜夜爽网站| 又黄又粗又硬又大视频| 国产精品99久久99久久久不卡 | 亚洲精品,欧美精品| 婷婷色综合大香蕉| 中国三级夫妇交换| 国产视频首页在线观看| 免费观看无遮挡的男女| 欧美精品亚洲一区二区| 亚洲国产欧美网| 国产精品女同一区二区软件| 欧美中文综合在线视频| 国产一区亚洲一区在线观看| 午夜免费鲁丝| 天堂俺去俺来也www色官网| videos熟女内射| 精品国产乱码久久久久久男人| 国产精品一国产av| 亚洲av电影在线观看一区二区三区| 婷婷成人精品国产| 看免费成人av毛片| 亚洲欧洲国产日韩| 亚洲成人手机| 国产日韩欧美在线精品| 国产精品 国内视频| 中国国产av一级| 飞空精品影院首页| 90打野战视频偷拍视频| 国产97色在线日韩免费| 女性被躁到高潮视频| 考比视频在线观看| 人成视频在线观看免费观看| 2018国产大陆天天弄谢| 咕卡用的链子| 亚洲国产精品国产精品| 天堂中文最新版在线下载| 日韩大片免费观看网站| 一本大道久久a久久精品| 欧美精品高潮呻吟av久久| 寂寞人妻少妇视频99o| 午夜激情久久久久久久| 97人妻天天添夜夜摸| kizo精华| 国产 一区精品| 久久韩国三级中文字幕| 国产乱人偷精品视频| 肉色欧美久久久久久久蜜桃| 一边亲一边摸免费视频| 亚洲精品第二区| 人妻一区二区av| 亚洲av成人精品一二三区| 热99国产精品久久久久久7| 久久狼人影院| 青草久久国产| 精品少妇内射三级| 亚洲国产看品久久| 欧美亚洲 丝袜 人妻 在线| 日韩成人av中文字幕在线观看| 久久久久久久国产电影| 大陆偷拍与自拍| 18禁裸乳无遮挡动漫免费视频| 亚洲国产成人一精品久久久| 日日撸夜夜添| 9191精品国产免费久久| 天天躁狠狠躁夜夜躁狠狠躁| 日韩一本色道免费dvd| 在线观看美女被高潮喷水网站| av在线app专区| av有码第一页| 99热网站在线观看| 亚洲欧美精品综合一区二区三区 | 久久精品人人爽人人爽视色| 欧美精品国产亚洲| 韩国高清视频一区二区三区| 国产一区二区激情短视频 | 国产精品国产三级专区第一集| 青春草亚洲视频在线观看| 中文字幕亚洲精品专区| 精品国产乱码久久久久久男人| 日韩大片免费观看网站| 国产老妇伦熟女老妇高清| 一区二区日韩欧美中文字幕| 免费在线观看黄色视频的| 曰老女人黄片| 亚洲婷婷狠狠爱综合网| 亚洲精品中文字幕在线视频| 日韩视频在线欧美| 午夜福利在线免费观看网站| 制服诱惑二区| 精品一区在线观看国产| 又黄又粗又硬又大视频| 免费黄网站久久成人精品| 国产av一区二区精品久久| 精品国产一区二区三区久久久樱花| av免费观看日本| 亚洲内射少妇av| 一本久久精品| 自线自在国产av| 欧美黄色片欧美黄色片| 9191精品国产免费久久| 亚洲图色成人| 欧美日韩综合久久久久久| 少妇人妻久久综合中文| 亚洲欧美清纯卡通| 亚洲欧美色中文字幕在线| 久久久亚洲精品成人影院| 欧美少妇被猛烈插入视频| 国产成人aa在线观看| videosex国产| 欧美精品国产亚洲| 三级国产精品片| 欧美激情极品国产一区二区三区| 久久久久国产一级毛片高清牌| 麻豆乱淫一区二区| 叶爱在线成人免费视频播放| 黑人欧美特级aaaaaa片| 久久精品国产亚洲av天美| 成年美女黄网站色视频大全免费| 国产一区二区 视频在线| 亚洲国产毛片av蜜桃av| 香蕉国产在线看| 夜夜骑夜夜射夜夜干| 80岁老熟妇乱子伦牲交| 欧美日韩一级在线毛片| 午夜福利影视在线免费观看| 18+在线观看网站| 日本wwww免费看| 亚洲欧美清纯卡通| 久久久精品免费免费高清| 日本色播在线视频| 国产精品久久久久成人av| 免费在线观看完整版高清| 国产精品亚洲av一区麻豆 | 看免费av毛片| 国产xxxxx性猛交| 中文字幕人妻熟女乱码| 一级a爱视频在线免费观看| 九草在线视频观看| 欧美另类一区| 在线观看人妻少妇| 91aial.com中文字幕在线观看| 夜夜骑夜夜射夜夜干| 日本黄色日本黄色录像| av网站在线播放免费| 丰满饥渴人妻一区二区三| 久久鲁丝午夜福利片| 亚洲美女视频黄频| 91久久精品国产一区二区三区| 老女人水多毛片| 免费在线观看黄色视频的| 亚洲精品国产av成人精品| 亚洲成av片中文字幕在线观看 | 久久精品久久精品一区二区三区| 精品亚洲成a人片在线观看| 亚洲激情五月婷婷啪啪| 久久韩国三级中文字幕| 久久久精品免费免费高清| 极品人妻少妇av视频| 秋霞在线观看毛片| 欧美激情高清一区二区三区 | 日韩三级伦理在线观看| 久久精品久久久久久久性| 亚洲国产精品一区二区三区在线| 99久久综合免费| 欧美激情 高清一区二区三区| 免费不卡的大黄色大毛片视频在线观看| 久久久久久久国产电影| 亚洲激情五月婷婷啪啪| 最近手机中文字幕大全| 久久久国产精品麻豆| 国产视频首页在线观看| 久久狼人影院| 少妇人妻久久综合中文| 飞空精品影院首页| 亚洲精品,欧美精品| 99久久综合免费| 赤兔流量卡办理| 最近最新中文字幕免费大全7| 激情视频va一区二区三区| 在线天堂最新版资源| 日本av手机在线免费观看| 久久狼人影院| 久久久久久伊人网av| 超碰97精品在线观看| 边亲边吃奶的免费视频| 人妻人人澡人人爽人人| 国产探花极品一区二区| 亚洲欧洲日产国产| 十八禁高潮呻吟视频| 久久精品久久精品一区二区三区| 我的亚洲天堂| av视频免费观看在线观看| 久久久久国产一级毛片高清牌| 亚洲图色成人| 搡女人真爽免费视频火全软件| 久久久久久人妻| 亚洲美女视频黄频| 高清在线视频一区二区三区| 亚洲天堂av无毛| 亚洲成人一二三区av| 国产精品国产三级专区第一集| 侵犯人妻中文字幕一二三四区| 国产免费福利视频在线观看| 欧美 亚洲 国产 日韩一| 美女脱内裤让男人舔精品视频| 一二三四中文在线观看免费高清| 欧美激情极品国产一区二区三区| 精品少妇久久久久久888优播| 欧美+日韩+精品| 丰满迷人的少妇在线观看| 欧美老熟妇乱子伦牲交| 丰满乱子伦码专区| 日韩一区二区视频免费看| 一边亲一边摸免费视频| 国产日韩欧美在线精品| 性色av一级| 久久久久久久久久久久大奶| 女性被躁到高潮视频| 永久网站在线| 一级毛片我不卡| 在线天堂最新版资源| 美国免费a级毛片| 国产有黄有色有爽视频| av电影中文网址| 欧美激情高清一区二区三区 | 欧美中文综合在线视频| 日韩电影二区| 夫妻午夜视频| 1024香蕉在线观看| 中文字幕最新亚洲高清| 亚洲精品一二三| 两个人看的免费小视频| 国产伦理片在线播放av一区| 久久综合国产亚洲精品| 捣出白浆h1v1| 中文字幕av电影在线播放| 女性生殖器流出的白浆| 色播在线永久视频| 最近中文字幕2019免费版| 午夜福利影视在线免费观看| 丝袜美腿诱惑在线| 高清欧美精品videossex| 满18在线观看网站| 亚洲欧美中文字幕日韩二区| 视频在线观看一区二区三区| 精品国产超薄肉色丝袜足j| 久久99蜜桃精品久久| 老汉色∧v一级毛片| 欧美bdsm另类| 国产免费福利视频在线观看| 国产av精品麻豆| 亚洲欧美一区二区三区久久| 亚洲av电影在线进入| 人妻人人澡人人爽人人| 免费观看av网站的网址|