• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks

    2022-08-24 03:31:10AbdelwahedBerguigaandAhlemHarchay
    Computers Materials&Continua 2022年5期

    Abdelwahed Berguigaand Ahlem Harchay

    Department of Computer Science,College of Science and Arts in Gurayat,Jouf University,Sakakah,Saudi Arabia

    Abstract: The success of Internet of Things (IoT) deployment has emerged important smart applications.These applications are running independently on different platforms, almost everywhere in the world.Internet of Medical Things(IoMT),also referred as the healthcare Internet of Things,is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems.Indeed,with the impact of the COVID-19 pandemic,a large number of interconnected devices designed to create smart networks.These networks monitor patients from remote locations as well as tracking medication orders.However,IoT may be jeopardized by attacks such as TCP SYN flooding and sinkhole attacks.In this paper, we address the issue of detecting Denial of Service attacks performed by TCP SYN flooding attacker nodes.For this purpose, we develop a new algorithm for Intrusion Detection System (IDS)to detect malicious activities in the Internet of Medical Things.The proposed scheme minimizes as possible the number of attacks to ensure data security,and preserve confidentiality of gathered data.In order to check the viability of our approach, we evaluate analytically and via simulations the performance of our proposed solution under different probability of attacks.

    Keywords: IoT; intrusion detection system; denial-of-service; TCP SYN flooding;attacks

    1 Introduction

    Internet of Things has become as a powerful industrial revolution by which a huge of heterogeneous objects such as sensors, mobile devices, cameras, and vehicles can connect with each other via Internet.These objects collect immense kinds of data and being further processed and analyzed in order to extract useful information.Internet of Things(IoT),specifically the Internet of Medical Things (IoMT) [1], is gaining importance to deal with the unprecedented COVID-19 pandemic.IoMT strategy has now become more exploring in many solutions such as heart rate variability(HRV), respiratory rate variability (RRV) affected by COVID-19 outbreak.Medical and healthcare professionals monitor and control vital signs of patients remotely and guarantees giving patients medicines and getting complete health care [2–4].Indeed, monitor remotely the status of infected patients,collect data,and analyze data deploy the concept of interconnected network for an effective flow and exchange of data.This enable interconnected devices/operations to be in connection with the service benefactors for discussing any issue and cooperation remotely [5].However, given that these devices are often constrained by limited resources (processing, memory, and power) a new routing protocol for Low-Power and Lossy network (RPL) was proposed as a standard for such constrained environments.Compared to classical routing protocols,RPL has many advantages such as energy efficiency and it is designed specifically for Low-Power and Lossy networks[6].However,as aforementioned,due to their limited capacity in terms of power,memory and computational capacity,RPL,like AODV protocol,does not provide security for these devices so these Low Lossy networks may be exposed to various threats and security attacks[7]such as sinkhole attacks,selective forward attacks,Sybil attack,replay attack,Denial-of-Service(DoS)attack,neighbor attack,etc.Therefore,an Intrusion Detection System (IDS), also known as first line of defense is typically used to ensure network security where all mobile objects operate in safe mode.The function of IDS is to monitor network operations and detect intrusions in network systems.In this article, we focus on security service attack,namely TCP SYN flooding attack,that is a subclass of Denial-of-Service attack.TCP SYN flooding attack is the critical DoS attack that can degrade the performance and lifetime of the network drastically.In TCP SYN attack,the attacker sends multiple TCP request packets to initiate the connection and thus resulting in slow down the distant node and consequently can weaken the network performance.

    The present paper is organized as follows:In Section 2, we review the various state-of-the-art literature on attack classification in IoT network.In Section 3,we analyzed and discussed analytically of DoS attack on network performance.Then, we introduce the proposed algorithm that can be implemented on IoT environment.The simulation implementation and results are presented and evaluated in Section 4.Finally,we conclude this paper in Section 5.

    2 Related Works

    Routing Protocol for Low-Power and Lossy Networks (RPL) is a new standard on Internet of Things(IoT)[8].Since its standardization by the IETF in 2011,RPL has rapidly become the routing protocol in the world of tiny and embedded networking device.RPL deploys the paradigm of a Destination-Oriented Directed Acyclic Graph(DODAG)that has a tree-like structure connected to a data sink of the graph,named DODAG root[9,10].This root is the final destination in the network architecture and it connects others descendant nodes to the Internet.Fig.1 illustrates an example of an RPL network that allows creating groups,known as instances,of multiple loop-free routing topologies[11].At the same time, an RPL node has the possibility to join to many instances on the network but only join one DODAG in an instance.On RPL networks, three traffic patterns are possible:(i)multipoint-to-point traffic (MP2P) where traffic is sent in upward routes, i.e., from end nodes to the root; (ii) point-to-multipoint traffic (P2MP) where traffic is sent in downward routes, i.e., from the root to end nodes; and (iii) point-to-point traffic (P2P) from one RPL node to another one on the same DODAG.

    Figure 1:A RPL network with three DODAGs in two instances

    The root node on the DODAG acts as a Border Router (BR) to connect RPL nodes together and to the Internet.As aforementioned, given that RPL does not offer any security policies to low power networks,IoT services are vulnerable to a large variety of intruders and security attacks[12].Such attacks can be external attacks as well as internal attacks and has as targeting the exhaustion of network resources(energy,memory and power).According to this vulnerability,we can note some of the particular topology attacks including hello flood, Sinkhole, Sybil, Wormhole, Blackhole, etc.Therefore,IDS solutions are efficient to monitor the network behavior and detect the compromised nodes.Pongle et al.[13]survey four most widely used approaches in IDS;Event detection-based IDS,Signature detection-based IDS, Host based IDS, and Specification based IDS.In event detection method, IDS captures the event triggered in the network to analyze them.If the IDS detect an attack,it will raise alarm.Jun et al.[14]propose a specification of Event detection-based IDS where event pattern is defined and stored in database using SQL and EPL(Event Processing Language).In signature-based IDS system approach, a signature pattern is compared with one stored in the IDS internal database.If the pattern is matching, an alarm will be generated.Oh et al.[15] proposed an example of signature-based IDS for resource-constrained sensor network connected to IP network.Authors in [16] have proposed IDS of immunity-based intrusion detection technology and dynamic defense.Indeed,self-learning and self-adaptation is employed dynamically to detect malicious events.In host-based IDS method, known also as hybrid method, a detection module is implemented in every device of the RPL network.Each node on the network acts as a monitoring node.Authors in [17] have proposed host-based IDS for intrusion detection on RPL networks such as forged or altered information, and selective-forwarding.The proposed overhead is small enough to deploy it on low power networks.In specification-based IDS scheme, also known as software engineering based [18] or Finite state machine (FSM) based IDS [19], a network expert defines manually a set of rules that are used as references to the behavior of network peripherals.Intrusion is detected by the IDS when there is a suspicious activity and deviation from the defined rules.The proposed scheme is tested on the Contiki platform.An abstract of the normal operations of a network is built manually and malicious activities are detected based on some specifications for RPL.However,the proposed scheme is described without no validation nor simulations has been proposed.In [20]Abduvaliyev et al.deploy the combination between anomaly and misuse based intrusion detection techniques(defined as hybrid intrusion detection system).Indeed,this technique incurs high detection and low false positive rates.Shin et al.[21] developed IDS for wireless industrial sensor networks(WISNs).They proposed a hierarchical framework for intrusion detection and prevention for WISNs.Through simulations on NesC simulator, authors present detailed results about the accuracy of the proposed scheme.Loulianou et al.[22]proposed signature-based IDS to detect DDoS attacks in IoT networks.The proposed scheme comprises two units,namely IDS router and IDS detectors.These two modules are deployed in a hybrid manner.The IDS router, placed on the border gateway, performs detection and firewall functionalities.IDS detectors employ sensors to monitor traffic and forward information about malicious nodes to the gateway for further action.Authors in[23]proposed new knowledge-driven IDS,namely Kalis,which combines signature rules and anomaly detection processes to detect attacks on IoT networks.Indeed,Kalis collect autonomously knowledge about features and entities of the monitored network and prevents DoS attacks.According to the authors,the proposed system enables detection of DoS and routing attacks.However,Kalis requires installation of particular detection modules to focuses on routing attacks that limits its accuracy.Tab.1 gives the summary of attack on RPL with method used to detect intruders.

    Table 1:Summary of IDS Schemes

    3 Contribution

    Our proposal consists of an IDS which prevents any disruption against the network.It is considered as the first line of defense for security by monitoring network traffic.All network activities are analyzed and any abnormal traffic or malicious activity will be alerted by the IDS and appropriate actions should be taken.The main objective of our proposed scheme is to detect earlier TCP SYN attacks.Indeed, in this paper, an IDS is proposed to detect TCP SYN attack in IoT networks.Fig.2 illustrates the application scenario used in this study.We consider the case of remote medical monitoring application.We adopt the case of a patient that wears different wireless sensors collecting vital recordings such as respiration rate,saturation of peripheral oxygen(SpO2),electrocardiography(ECG), accelerometers, gyroscopes, etc.These sensor nodes are attached to the patient’s body and communicate,via access point,with servers in cloud.An attack model is composed of distant malicious attacker that is expected to act as a simple healthcare professional,but he violates the security policy and sending spoofed SYN packets to the victim sensor.The malicious healthcare professional starts a transmission by sending a SYN to the distant server.Then, the server allocates a buffer for the distant client and a SYN Acknowledge (ACK) packet is sent to the client in order to complete the connection setup.When the connection is complete,the attacker floods the victim with a large volume of traffic and continuous data stream disables the victim from providing services to the legitimate users(legitimate healthcare professional).

    Figure 2:Remote medical monitoring application

    The proposed solution in this paper aims to detect vulnerabilities to such attacks.We analyze and evaluate the proposed detection capability.In fact,detecting attack is considered as a first step towards obtaining a reliable estimate about TCP handshake protocol,which in turn facilitates eliminating the disruptive effects of missed-detection and false alarm.To satisfy this requirement and assuring good estimation performance of our proposed scheme,we use a relevant metric as a probability of misseddetection.This metric must be less than a given value.

    3.1 Network Model

    As aforementioned,we consider the case of a remote IoT-based monitoring and sensing system.We consider a set of randomly distributed sensor nodes(sensors wearable by patients).All sensor nodes are connected to a full function device carried by the patient[24].This full function device acts as a gateway,namelybody coordinator.It has the responsibility to forward all data received from wearable sensors to the distant medical monitoring platform.We consider a network composed of N nodes,N={n:n=1,...,N}.These nodes act as monitoring and collect data and vital signs or symptoms(glucose level,temperature,heart rates,breathing rates,etc.)from body coordinator carried by the patient.In the case of normal connection,client or distant medical monitoring platform starts transmission by sending a SYN to the body coordinator.

    On a legitimate TCP connection,the client initiates the connection by sending a SYN requesting to the distant server.Then,the server allocates some resources such as buffer for the client and replies with a SYN/ACK packet acknowledging receipt of the SYN packet.In this stage, we have a halfopen connection state and the server enter in the waiting state to complete the connection setup and begin transferring data.Indeed, the number of connections the server can be maintained while it is in the half-open connection is controlled in a limited backlog queue and when this number exceeds the queue size all subsequent incoming connections will be rejected, which will create a Denial of Service (DoS) condition.We consider a single server system composed of the body coordinator in our study case.This server serves N users.We assume that the system is slotted with unit fixed slott∈{0, 1, 2,...,T}.The server receives a large number of TCP SYN messages.We define A (t)the amount of packet arriving into the server’s queue at time slot t.We assume that A(t) is a stationary process and follows a Poisson distribution.The arrival rate of packets denoted asλ∈{λ1,λ2,...,λn},whereλn=E[A(t)].Let q(t)denote the backlog queue length of the server at time slott,with Q(0)=0.The dynamics of queue length of the server node in each discrete time slot is calculating using Eq.(1):

    given as

    Q(t+1)=[Q(t)+A(t)-D(t)]+

    whereγ+= max(γ,0).In general, its own arrival and departure processes characterize the server queue model.When departures are less than arrivals this lead to the growth of queue backlog.We denoted that the system is stable if the mean queue length of the server is finite.Q(t), μ(t) and A(t)are semantically stand for the queue backlog, the departure and arrival processes of the Server attrespectively, describing the quantity added/removed to the queue in the time slott.A queue is at finite-time stable if:

    Fig.3 depicts the arrive-departure process.Mostly, clients in the network send their own legal number of SYN request messages.In order to detect if there is SYN attacks,we propose a Threshold of SYN requests can be send by one node without opening a session and proceed a three-way handshake process.In other word,each node must send a number of SYN request smaller than a given threshold,indicated byThre.However, in the case of SYN attacks will exist malicious activity that desire to deteriorate the network performance by injecting a huge number of TCP SYN flood requests,greater than a threshold, and therefore exhausting the server workload and resources such as memory and queue length.

    Figure 3:Arrive-departure process at each time slot

    The Intrusion Detection System(IDS)is a good choice to monitor nodes behavior and detect if there is a begin of attack or not, and then issues alerts to Cybersecurity Operations Center (CsOC)for investigation.Indeed,once the TCP SYN request threshold limit is reached,the IDS issues a TCP SYN flood attack and filter out abnormal packets taking part in DoS attacks.LetReqthe number of request resources andThreis the threshold value that can made the maximum number of requests at time slott.Properly,the attack decision rule can be illustrated as follows:

    where D0 indicating the absenteeism of any TCP SYN flood attack and D1 indicating the presence of a legitimate attack [12].To address the behavior of our proposed IDS, we illustrate through the diagram on Fig.4 our research methodology.

    3.2 IDS Criteria

    To further enhance the detection rate and minimize the false alarm rate of IDS, network administrator must define an objective function to reduce the probability of false alarm as much as possible.Indeed,it can happen in some cases that the number of TCP SYN,due to a bad quality of connection,trigger a false alarms and others are labeled as unknown attacks.The IDS must be able to detect abnormal TCP SYN connection and classify them as unacceptable.Thus, without loss of generality,IDS must offer a high-quality detection’s precision and the trade-off between the ability to detect correctly the setup of many false positives and true positives attacks.Thereby,the metrics can be described as follows:

    ·True Positive(TP):when the number of actual attack is classified as an attack.

    ·True Negative(TN):when the number of actual normal is classified as normal.

    ·False Positive(FP):when the number of actual normal is classified as attack.

    ·False Negative(FN):when the number of actual attack is classified as normal.

    Tab.2 represents the Truth table for intrusion assertion by an IDS.Further, another main performance targets for any intrusion detection system involves precision, recall, accuracy, and specificity.

    If the probability of false alarm is less than a threshold probability, then the IDS triggers that particular sequence is abnormal.We can formulate the problem as follows:

    Figure 4:Research methodology

    Table 2:Summary of predictive classes

    wherePfais the probability of false alarm(false positive),i.e.,the flow is normal traffic and it is not an attack affected but it is wrongly classified as an attack.Pmissis the probability of missed detection(False negative),i.e.,the flow received by the server is an attack affected but it is wrongly classified as normal traffic.Indeed,in order to minimize the false negative errors,we need to fix an optimal trust thresholdβand therefore the missed detection must be smaller than a given valueβ.The threshold value can be searched to minimize the total cost for a specific cost ratio of false negative errors to false positive errors.

    3.3 Materials and Methods

    3.3.1 The Conway–Maxwell–Poisson Distribution Model and Probability Function

    The CMP distribution is a generalization of the Poisson distribution.It is a natural two-parameter that was originally developed in 1962 by Conway and Maxwell to model queues and services rates.Let Y denote a Conway–Maxwell–Poisson distributed random variable denoting the number of TCP SYN attacks during a single time slot.The probability mass function(pmf)of P(X=x)using the CMP distribution is given by:

    Parameterλis the CMP “l(fā)ocation” (intensity) andνis the dispersion parameter, i.e., Y ~CMP(λ,ν).Z(λ,ν)is often called the“Z-function”and represents a normalizing constant.The CMP distribution is a generalization of some well-known discrete distributions.Whenν= 1 (and thusZ(λ,?)=expλan ordinary Poisson(λ)distribution results)Eq.(5)can be written as:

    Therefore,based on the decision rule in Eq.(5),Pmissis calculated as follows:

    Our proposed IDS implements an algorithm to calculate the probability of missed attack in each time slot.This probability is compared with a threshold value and depending on the comparison result,an appropriate alarm or signal is handled.This missed detection probability must be smaller thanβ.The complete process of attack detection is described in Algorithm 1.Firstly,two variables are fixed by the system administrator,namelyPfaandβ,which represent the probability of false alarm and the upper bound on the false alarm probability,respectively.On each iteration,we calculate the probability of missed detection and the threshold value based on equation adopted on Eq.(7).

    Algorithm 1:IDS detection algorithm Input:Pfa, β Output:mthre 1:procedure IDS PROCEDURE 2:Pfa ←0 3:mthre ←0 4:loop:5:if Pfa <β then 6:Pfa ←Pfa+P(X =mthre)7:mthre ←mthre+1(Continued)

    Algorithm 1:Continued 8:goto loop.9:close;10:end if 11:end procedure

    4 Performance Evaluation

    This section describes the simulation model used on this study and evaluate the IDS performance against any TCP SYN attack.Simulations carried out using the Matlab programming environment.To simplify our analysis,we assume that we have an IoT network composed of N=50 source nodes.Each node sends one TCP SYN request packet per time slot.Packets sent has an average length ofλs=40bytes.All received packets are stored on the server queue(coordinator node)to be served later with an average rate ofμ=1950bytes per time slot.The Time simulation employed on this study is at horizon of T=1500 time slots.We consider a network with TCP SYN attack without the admission of the Intrusion Detection System.We calculate the backlog queue for an optimal trust thresholdβ=0.2 and different probability values such as Pa={0;0.3;0.6;0.9}.Fig.5 illustrates the backlog queue under different probability values of attack.As expected,we can see that the backlog queue linearly increases as probability of attack increases.

    Figure 5:Attack probabilities without IDS

    As well, Fig.6 shows that the backlog queue with probability Pa=0.9 is quite large compared to one who has Pa=0.3.Indeed, when the probability attack increases this lead in growing queue length.If these attacks traffic condition persist for a long time,the queue will block all other traffics that can be normal traffic and therefore cause bad influence on resource performance.To evaluate our proposed scheme,we illustrate on Fig.6 the queue length of the server in the presence of the IDS.Fig.6 has been illustrated with a probability of attack Pa=0.6,β= 0.2, and L=40B.Fig.6 shows the queue length of the server in the case where there is no attack,the case of an attack occurs without IDS deployment,and the case with the presence of the IDS with probability Pa=0.6.As we can see,without IDS the queue length grows to a value of 2874 Bytes.However,when we apply an IDS in the front of the server queue,we show clearly that the number of queue size decreases.This is due to the comparison of the number of requests against the threshold value.If the number of requests exceed a specific threshold, as defined by network administrator, all other request packets from such node will be handled as attack messages and should be rejected.Fig.6 shows the effect of probability of attack with the IDS deployment on the queue length size.As expected,place IDS to cover attacks for different probabilities of attacks can minimize as possible server congestion and thus reducing network overload

    Figure 6:Attack probabilities with IDS

    5 Conclusion and Future Works

    In this paper, we proposed an anomaly-based IDS for medical IoT networks.Indeed, open environment of Internet of Medical Things (IoMT) can be a potential primary target for various attacks.The proposed approach permits to identify suspicious network traffic and anomalies against IoT networks based on the network parameters, which allows us checking whether the medical IoT network is under TCP SYN attacks or not.Empirical results obtained by the proposed IDS solution seems to provide reasonable solution to predict probability of attacks on medical IoT networks.The proposed IDS has been evaluated analytically and via Matlab simulations.Results obtained show valuable contribution to the IoT architecture.In our plane for future work,more number of attacks will be considered and we plan to implement the proposed architecture in a real-world IoT environment.This will be achieved by importing the IDS system to ContikiOS devices and study several other factors affecting the detection process.

    Acknowledgement:The authors extend their appreciation to the Deanship of Scientific Research at Jouf University for funding this work through research Grant No(DSR-2021-02-0103).

    Funding Statement:Funding for this study was received from the Deanship of Scientific Research(DSR) at Jouf University, Sakakah, Kingdom of Saudi Arabia under the Grant No:DSR-2021-02-0103.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久久久网色| 丝袜喷水一区| 久久久欧美国产精品| 黄色配什么色好看| 日韩av在线免费看完整版不卡| 草草在线视频免费看| 精品一区二区免费观看| 人人妻人人添人人爽欧美一区卜| av不卡在线播放| 妹子高潮喷水视频| 亚洲精品一区蜜桃| 国产精品不卡视频一区二区| 纵有疾风起免费观看全集完整版| 精品国产一区二区久久| 狂野欧美激情性xxxx在线观看| 国产精品久久久久久av不卡| 国产精品久久久久久精品古装| 在线观看人妻少妇| 久久久久久久久久久免费av| 成人黄色视频免费在线看| 亚洲综合色网址| 久久精品久久精品一区二区三区| 国产乱来视频区| av线在线观看网站| 欧美+日韩+精品| 天天操日日干夜夜撸| 亚洲av男天堂| 热re99久久国产66热| 超碰97精品在线观看| 午夜免费观看性视频| 国产有黄有色有爽视频| av免费在线看不卡| 婷婷色综合www| 精品亚洲乱码少妇综合久久| 成人亚洲精品一区在线观看| 亚洲色图 男人天堂 中文字幕 | 大香蕉久久成人网| 中文字幕最新亚洲高清| 少妇熟女欧美另类| 另类亚洲欧美激情| 亚洲精品视频女| 亚洲av福利一区| 91精品国产国语对白视频| 欧美日韩av久久| 又黄又爽又刺激的免费视频.| www.av在线官网国产| 亚洲精品久久久久久婷婷小说| 中文精品一卡2卡3卡4更新| 精品国产国语对白av| 丝袜在线中文字幕| 国产探花极品一区二区| 亚洲av成人精品一二三区| 亚州av有码| 一区二区三区免费毛片| av线在线观看网站| 国产av精品麻豆| 亚洲国产av影院在线观看| 免费观看性生交大片5| 国产精品一二三区在线看| 日韩欧美一区视频在线观看| 免费av不卡在线播放| 欧美日韩视频精品一区| av在线播放精品| 国产精品国产三级国产专区5o| 久久这里有精品视频免费| 全区人妻精品视频| 自拍欧美九色日韩亚洲蝌蚪91| 人妻人人澡人人爽人人| videos熟女内射| 岛国毛片在线播放| 国产伦精品一区二区三区视频9| 人人澡人人妻人| 亚洲精品第二区| 国产又色又爽无遮挡免| 男人操女人黄网站| 一区二区三区免费毛片| 久久国产精品男人的天堂亚洲 | 日本wwww免费看| 热re99久久国产66热| 十八禁高潮呻吟视频| 亚洲成人av在线免费| 久久久久久伊人网av| 欧美日韩国产mv在线观看视频| 亚洲精品一区蜜桃| 久久久久久久久久久久大奶| 国产精品一区二区在线不卡| a级毛色黄片| 欧美激情国产日韩精品一区| 草草在线视频免费看| 人妻人人澡人人爽人人| 热99久久久久精品小说推荐| 美女主播在线视频| 国语对白做爰xxxⅹ性视频网站| 乱人伦中国视频| 女性生殖器流出的白浆| 97超视频在线观看视频| 少妇人妻精品综合一区二区| 日韩,欧美,国产一区二区三区| 观看av在线不卡| 91久久精品国产一区二区成人| 日本黄色片子视频| 国产精品一区www在线观看| 51国产日韩欧美| 18禁在线无遮挡免费观看视频| 亚洲av综合色区一区| 国产精品一区二区三区四区免费观看| 九九久久精品国产亚洲av麻豆| 国产免费一区二区三区四区乱码| 99热这里只有精品一区| 99视频精品全部免费 在线| 国产精品国产三级国产av玫瑰| 久久国内精品自在自线图片| 欧美老熟妇乱子伦牲交| 少妇人妻 视频| 最后的刺客免费高清国语| 午夜福利视频在线观看免费| 高清黄色对白视频在线免费看| 一本色道久久久久久精品综合| 国产精品国产三级国产av玫瑰| a级毛片免费高清观看在线播放| 成人影院久久| 久久人人爽人人片av| 国产成人午夜福利电影在线观看| 国产欧美日韩综合在线一区二区| 亚洲精品日本国产第一区| 久久久欧美国产精品| 亚洲熟女精品中文字幕| 国产精品久久久久成人av| 大又大粗又爽又黄少妇毛片口| 久久热精品热| 免费观看性生交大片5| 伊人久久国产一区二区| 中文天堂在线官网| 天堂8中文在线网| 如何舔出高潮| 永久网站在线| 午夜免费鲁丝| 男人添女人高潮全过程视频| 只有这里有精品99| 人妻人人澡人人爽人人| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 一区二区日韩欧美中文字幕 | 亚洲国产av影院在线观看| 2021少妇久久久久久久久久久| 精品一品国产午夜福利视频| 婷婷色综合大香蕉| 女性被躁到高潮视频| 亚洲人成网站在线观看播放| 99热网站在线观看| 美女cb高潮喷水在线观看| 日韩精品免费视频一区二区三区 | 少妇人妻 视频| 亚洲av免费高清在线观看| av专区在线播放| 亚洲熟女精品中文字幕| 国产精品久久久久久精品电影小说| 热99久久久久精品小说推荐| 一区在线观看完整版| 一级毛片我不卡| 久久狼人影院| 最黄视频免费看| 插阴视频在线观看视频| 麻豆成人av视频| 亚洲av成人精品一二三区| 中文乱码字字幕精品一区二区三区| 免费看不卡的av| 日本色播在线视频| 日韩欧美精品免费久久| 亚洲国产精品999| 菩萨蛮人人尽说江南好唐韦庄| 免费日韩欧美在线观看| 91精品三级在线观看| 国产一区二区在线观看av| 人妻少妇偷人精品九色| 日韩熟女老妇一区二区性免费视频| 精品久久蜜臀av无| 晚上一个人看的免费电影| 久久人妻熟女aⅴ| 亚洲国产精品一区三区| 在线观看人妻少妇| 一区在线观看完整版| 美女cb高潮喷水在线观看| 国产又色又爽无遮挡免| 各种免费的搞黄视频| 青春草国产在线视频| 伦理电影大哥的女人| 免费不卡的大黄色大毛片视频在线观看| 国产成人aa在线观看| 日本黄色日本黄色录像| 精品久久久久久久久av| 韩国高清视频一区二区三区| 免费av不卡在线播放| 国产男人的电影天堂91| 久久久久国产精品人妻一区二区| 国产高清不卡午夜福利| 美女xxoo啪啪120秒动态图| 亚洲精品乱码久久久v下载方式| 美女大奶头黄色视频| 久久综合国产亚洲精品| 国产色婷婷99| 2022亚洲国产成人精品| 久久影院123| 乱人伦中国视频| 久久精品人人爽人人爽视色| 亚洲av.av天堂| 久久精品夜色国产| 国产av精品麻豆| 亚洲av电影在线观看一区二区三区| 九九爱精品视频在线观看| 国产女主播在线喷水免费视频网站| 91在线精品国自产拍蜜月| 久久久久久久亚洲中文字幕| 看非洲黑人一级黄片| 久久午夜福利片| 亚洲精品乱码久久久v下载方式| 国产白丝娇喘喷水9色精品| 日韩人妻高清精品专区| 国产精品国产三级国产av玫瑰| av卡一久久| 亚洲丝袜综合中文字幕| 国产一区二区在线观看av| 在线免费观看不下载黄p国产| 精品酒店卫生间| 又粗又硬又长又爽又黄的视频| 成人二区视频| 男女啪啪激烈高潮av片| 日本欧美国产在线视频| 伦理电影大哥的女人| 欧美少妇被猛烈插入视频| 久久精品国产鲁丝片午夜精品| 这个男人来自地球电影免费观看 | 亚洲精品亚洲一区二区| 热99国产精品久久久久久7| 日本黄色日本黄色录像| 制服人妻中文乱码| 亚洲三级黄色毛片| 中国三级夫妇交换| 精品99又大又爽又粗少妇毛片| 交换朋友夫妻互换小说| 人妻人人澡人人爽人人| 国产白丝娇喘喷水9色精品| 亚洲欧洲精品一区二区精品久久久 | 麻豆精品久久久久久蜜桃| 欧美最新免费一区二区三区| 亚洲欧美日韩卡通动漫| 国产 精品1| a级片在线免费高清观看视频| 少妇丰满av| 国产精品久久久久久精品电影小说| videosex国产| 伦理电影免费视频| 亚洲三级黄色毛片| 久久久久视频综合| 欧美成人午夜免费资源| 亚洲色图 男人天堂 中文字幕 | 香蕉精品网在线| 成人毛片60女人毛片免费| 国产成人a∨麻豆精品| 日韩在线高清观看一区二区三区| 国产亚洲午夜精品一区二区久久| 在线观看一区二区三区激情| 女人精品久久久久毛片| 成年av动漫网址| freevideosex欧美| 狂野欧美激情性bbbbbb| 99精国产麻豆久久婷婷| 毛片一级片免费看久久久久| 热99久久久久精品小说推荐| 又粗又硬又长又爽又黄的视频| 亚洲美女搞黄在线观看| 哪个播放器可以免费观看大片| 国产精品久久久久久精品电影小说| 免费av不卡在线播放| 综合色丁香网| 亚洲性久久影院| 色哟哟·www| 丁香六月天网| 亚洲av男天堂| 自线自在国产av| 欧美亚洲 丝袜 人妻 在线| 在线 av 中文字幕| 久久久久久久久久人人人人人人| 国精品久久久久久国模美| 亚洲欧美成人精品一区二区| 十分钟在线观看高清视频www| 亚洲国产成人一精品久久久| av免费观看日本| 九色亚洲精品在线播放| 国产成人精品无人区| 国精品久久久久久国模美| 少妇被粗大的猛进出69影院 | 丰满乱子伦码专区| 日本欧美视频一区| 亚洲一级一片aⅴ在线观看| 特大巨黑吊av在线直播| 91aial.com中文字幕在线观看| a级毛片黄视频| 黑丝袜美女国产一区| 日韩成人av中文字幕在线观看| 成人综合一区亚洲| 日日撸夜夜添| 中文字幕人妻熟人妻熟丝袜美| 少妇被粗大猛烈的视频| 在线亚洲精品国产二区图片欧美 | 午夜精品国产一区二区电影| 在线观看免费日韩欧美大片 | 欧美人与性动交α欧美精品济南到 | 久久精品久久久久久噜噜老黄| 国产成人aa在线观看| 寂寞人妻少妇视频99o| 亚洲精品av麻豆狂野| 国产精品人妻久久久久久| 日韩av免费高清视频| 97在线人人人人妻| 国产极品粉嫩免费观看在线 | 美女大奶头黄色视频| 中文字幕精品免费在线观看视频 | 国产一区二区在线观看av| 超碰97精品在线观看| 久久久亚洲精品成人影院| 在现免费观看毛片| 高清黄色对白视频在线免费看| 插阴视频在线观看视频| 成人亚洲欧美一区二区av| 久久精品久久精品一区二区三区| 伦精品一区二区三区| a级毛片免费高清观看在线播放| 丝袜喷水一区| 国产欧美另类精品又又久久亚洲欧美| 97在线人人人人妻| 我的女老师完整版在线观看| 十八禁高潮呻吟视频| 亚洲av成人精品一二三区| 国产日韩欧美视频二区| 亚洲无线观看免费| 91国产中文字幕| 最后的刺客免费高清国语| 大香蕉久久网| 日日摸夜夜添夜夜爱| 国产精品99久久久久久久久| 久久综合国产亚洲精品| 国产探花极品一区二区| 亚洲精品av麻豆狂野| 国产在线视频一区二区| 日日摸夜夜添夜夜爱| 伦精品一区二区三区| 久久影院123| 日本欧美视频一区| 大码成人一级视频| 黄色欧美视频在线观看| 少妇的逼好多水| 国产成人精品一,二区| 色婷婷av一区二区三区视频| av黄色大香蕉| 我的女老师完整版在线观看| 国产一区有黄有色的免费视频| 成人国语在线视频| 老女人水多毛片| 七月丁香在线播放| 精品亚洲成国产av| 97超视频在线观看视频| 精品一区二区三卡| 国产男女内射视频| 精品人妻在线不人妻| 亚洲欧洲日产国产| 国产精品国产av在线观看| 国产精品三级大全| 国产不卡av网站在线观看| 伦理电影免费视频| 伦精品一区二区三区| 黑人欧美特级aaaaaa片| 伊人久久精品亚洲午夜| 中文字幕av电影在线播放| 一个人看视频在线观看www免费| 成人漫画全彩无遮挡| kizo精华| 免费大片18禁| 在线精品无人区一区二区三| 国产黄片视频在线免费观看| 国产成人精品福利久久| 毛片一级片免费看久久久久| 在线天堂最新版资源| 精品久久久精品久久久| 国产精品久久久久久久电影| 欧美 亚洲 国产 日韩一| 欧美日韩一区二区视频在线观看视频在线| 美女cb高潮喷水在线观看| 亚洲第一区二区三区不卡| 亚洲欧美清纯卡通| 满18在线观看网站| 国产精品99久久99久久久不卡 | 中文字幕亚洲精品专区| 日韩精品有码人妻一区| 精品亚洲乱码少妇综合久久| 久久久久视频综合| 成人午夜精彩视频在线观看| 在线观看国产h片| 麻豆成人av视频| 久久青草综合色| 久久鲁丝午夜福利片| 一区二区三区四区激情视频| 亚洲成色77777| 性色avwww在线观看| 免费观看在线日韩| 亚洲人与动物交配视频| 蜜臀久久99精品久久宅男| 青春草国产在线视频| 亚洲熟女精品中文字幕| 亚洲av在线观看美女高潮| 日本vs欧美在线观看视频| 久久久a久久爽久久v久久| 国产男人的电影天堂91| av视频免费观看在线观看| 亚洲精品国产色婷婷电影| 人妻一区二区av| 色视频在线一区二区三区| 伊人久久精品亚洲午夜| av国产久精品久网站免费入址| 在线天堂最新版资源| 国产老妇伦熟女老妇高清| 天天操日日干夜夜撸| 亚洲五月色婷婷综合| 超色免费av| 亚洲精品中文字幕在线视频| 成人国产麻豆网| 女性被躁到高潮视频| 在线看a的网站| 老司机亚洲免费影院| 永久免费av网站大全| 少妇人妻精品综合一区二区| 哪个播放器可以免费观看大片| 亚洲人成网站在线播| 菩萨蛮人人尽说江南好唐韦庄| 久久久a久久爽久久v久久| 九色成人免费人妻av| 午夜视频国产福利| 啦啦啦中文免费视频观看日本| 伦理电影大哥的女人| 国产成人a∨麻豆精品| 亚洲人成77777在线视频| 99久国产av精品国产电影| 永久免费av网站大全| 一级毛片我不卡| 欧美激情国产日韩精品一区| 夫妻午夜视频| 久久婷婷青草| 校园人妻丝袜中文字幕| 精品国产一区二区三区久久久樱花| 老司机亚洲免费影院| 午夜日本视频在线| 丝袜在线中文字幕| 最近最新中文字幕免费大全7| 久久国产精品男人的天堂亚洲 | 国产精品99久久99久久久不卡 | 久久久国产欧美日韩av| 飞空精品影院首页| 日本vs欧美在线观看视频| 精品一区二区三卡| 国产精品女同一区二区软件| 女性生殖器流出的白浆| 国产老妇伦熟女老妇高清| 男女边摸边吃奶| 欧美3d第一页| 女人精品久久久久毛片| 少妇被粗大的猛进出69影院 | 国语对白做爰xxxⅹ性视频网站| 在线看a的网站| 青春草国产在线视频| 国产国语露脸激情在线看| 午夜影院在线不卡| 18禁在线播放成人免费| 亚洲人成77777在线视频| 久久国内精品自在自线图片| 免费高清在线观看视频在线观看| 欧美 日韩 精品 国产| 国产一区二区在线观看av| 国产淫语在线视频| 久久久久人妻精品一区果冻| 少妇高潮的动态图| 国产精品久久久久成人av| 亚洲av国产av综合av卡| 欧美日韩亚洲高清精品| 精品午夜福利在线看| 欧美激情 高清一区二区三区| 国产av国产精品国产| 黑丝袜美女国产一区| 精品人妻熟女av久视频| 欧美日韩视频精品一区| 少妇精品久久久久久久| 日韩强制内射视频| 夫妻性生交免费视频一级片| 亚洲人与动物交配视频| av福利片在线| 欧美97在线视频| 国产日韩一区二区三区精品不卡 | 精品少妇久久久久久888优播| 人体艺术视频欧美日本| 久久久久国产精品人妻一区二区| 日韩精品有码人妻一区| 免费人成在线观看视频色| 校园人妻丝袜中文字幕| 亚洲欧美精品自产自拍| 麻豆精品久久久久久蜜桃| 菩萨蛮人人尽说江南好唐韦庄| 亚洲精品久久成人aⅴ小说 | 18+在线观看网站| 亚洲精品av麻豆狂野| 寂寞人妻少妇视频99o| 欧美丝袜亚洲另类| 日日撸夜夜添| 熟女av电影| 欧美日韩国产mv在线观看视频| 日韩av不卡免费在线播放| 香蕉精品网在线| av又黄又爽大尺度在线免费看| 97超碰精品成人国产| 91精品国产国语对白视频| 边亲边吃奶的免费视频| 三上悠亚av全集在线观看| 国产亚洲欧美精品永久| 国产成人一区二区在线| 美女cb高潮喷水在线观看| 在线观看免费日韩欧美大片 | 国产精品一区二区在线不卡| 免费高清在线观看日韩| 狂野欧美激情性bbbbbb| 亚洲美女视频黄频| 久久久欧美国产精品| 精品国产国语对白av| 午夜日本视频在线| 国产日韩欧美亚洲二区| 欧美性感艳星| 在线天堂最新版资源| 国产精品一二三区在线看| 我的女老师完整版在线观看| 午夜福利,免费看| 美女cb高潮喷水在线观看| 街头女战士在线观看网站| tube8黄色片| 人人妻人人添人人爽欧美一区卜| 国产免费福利视频在线观看| 特大巨黑吊av在线直播| 色哟哟·www| 久久久久久久久久久免费av| 久久久久国产精品人妻一区二区| 日韩制服骚丝袜av| 熟女av电影| 春色校园在线视频观看| 成人黄色视频免费在线看| 国产色婷婷99| 一二三四中文在线观看免费高清| 久久久亚洲精品成人影院| 久久久久久久久久久丰满| av天堂久久9| 夜夜看夜夜爽夜夜摸| 国产精品久久久久久精品古装| 在线观看三级黄色| 日韩,欧美,国产一区二区三区| av女优亚洲男人天堂| 人人妻人人澡人人看| 免费看不卡的av| 婷婷色综合www| 一区在线观看完整版| 日韩电影二区| 亚洲成人手机| 一区二区三区精品91| 丁香六月天网| 日本爱情动作片www.在线观看| 亚洲精品aⅴ在线观看| 高清毛片免费看| 制服人妻中文乱码| 午夜福利在线观看免费完整高清在| 飞空精品影院首页| √禁漫天堂资源中文www| 夫妻性生交免费视频一级片| 国产69精品久久久久777片| 777米奇影视久久| 女性生殖器流出的白浆| 一边摸一边做爽爽视频免费| 亚州av有码| 大香蕉久久网| 亚洲精品成人av观看孕妇| 各种免费的搞黄视频| 九草在线视频观看| 99热6这里只有精品| 免费不卡的大黄色大毛片视频在线观看| 十八禁网站网址无遮挡| 精品人妻熟女av久视频| 99热网站在线观看| 国产成人freesex在线| a级毛片黄视频| 亚洲欧美成人综合另类久久久| 亚洲精品一二三| 免费日韩欧美在线观看| 搡女人真爽免费视频火全软件| 国产精品人妻久久久久久| 国产亚洲精品久久久com| 五月伊人婷婷丁香| 国产午夜精品一二区理论片| 美女cb高潮喷水在线观看| 国产一区二区在线观看日韩| 国产成人午夜福利电影在线观看| 大香蕉97超碰在线| 免费播放大片免费观看视频在线观看| 91精品一卡2卡3卡4卡| 免费观看的影片在线观看| 婷婷色综合大香蕉| 18+在线观看网站| 一本一本综合久久| 久久精品久久久久久噜噜老黄| 熟女av电影| 国产精品久久久久久精品电影小说| 美女国产视频在线观看| 日韩,欧美,国产一区二区三区| 一级黄片播放器|