• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    2022-08-24 12:56:58YoosefAbusharkAsifIrshadKhanFawazAlsolamiAbdulmohsenAlmalawiMdMottahirAlamAlkaAgrawalRajeevKumarandRaeesAhmadKhan
    Computers Materials&Continua 2022年7期

    Yoosef B.Abushark, Asif Irshad Khan,*, Fawaz Alsolami, Abdulmohsen Almalawi,Md Mottahir Alam, Alka Agrawal, Rajeev Kumarand Raees Ahmad Khan

    1Department of Computer Science, Faculty of Computing and Information Technology, King Abdulaziz University,Jeddah, 21589, Saudi Arabia

    2Department of Electrical and Computer Engineering, Faculty of Engineering, King Abdulaziz University, Jeddah, 21589,Saudi Arabia

    3Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, Uttar Pradesh,India

    4Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow, 226028, India

    Abstract: Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world.Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues.It is crucial in offering a proactive security system in the field of cybersecurity.In real time, cybersecurity protects information, information systems, and networks from intruders.In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches.At an increasing rate,intruders are breaching information security.Anomaly detection, software vulnerability diagnosis, phishing page identification, denial of service assaults and malware identification are the foremost cyber-security concerns that require efficient clarifications.Practitioners have tried a variety of approaches to address the present cybersecurity obstacles and concerns.In a similar vein,the goal of this research is to assess the idealness of machine learning-based intrusion detection systems under fuzzy conditions using a Multi-Criteria Decision Making (MCDM)-based Analytical Hierarchy Process (AHP) and a Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS).Fuzzy sets are ideal for dealing with decision-making scenarios in which experts are unsure of the best course of action.The projected work would support practitioners in identifying, prioritising, and selecting cybersecurityrelated attributes for intrusion detection systems, allowing them to design more optimal and effective intrusion detection systems.

    Keywords:Cybersecurity;machine learning;AHP-TOPSIS;fuzzylogic;intrusion detection systems

    1 Introduction

    The expansion of Information and Communications Technology (ICT) is one of the most evident trends in today’s globe.During the previous few decades, the technological revolution has had a major impact on the world, changing people’s thinking and behaviours.One of the most prominent and well-known technologies in this industry is machine learning.Machine learning was first established as a sub-domain of artificial intelligence by Arthur Samuel in 1959 [1,2].Succeeding that, machine learning tactics became broadly employed in a variety of fields, and it is now recognised as one of the most important and rapidly evolving technologies, particularly for addressing issues such as future event prediction, disease diagnosis, market analysis, email filtering, intrusion detection, image and speech recognition, and so on [3].Machine learning algorithms may learn from both structured and unstructured data, and they can assist in the automation of systems in a variety of scenarios.Machine learning allows algorithms to learn from earlier (historical) data.We all know that data is at the centre of the digital world.Scientists and researchers in this scenario use data mining and machine learning techniques to extract new and helpful insights from the data.

    There are several interesting patterns in the existing data that can help us forecast future events,both normal and aberrant.The data is initially delivered as a dataset as input to the developed machine learning frameworks, which then train themselves accordingly.Thesemachine learning-based frameworks learn from the data and enhance their performance as an outcome of machine learning algorithms.The suggested framework must be evaluated and verified with new yet relevant data after the training phase is completed in order to determine its efficiency and accuracy.It would thus be able to use learning behaviour to predict future occurrences and activities with minimal human participation and explicit programming [4].The input data programme improves its performance measure with each accurate judgement.A computer programme is said to learn from experience with regard to some class of tasks T and a performance measure P if its performance at tasks in T, as measured by P, improves with experience [2].The main focus is on these three things: a collection of tasks defined by T; performance estimation denoted by P; and E, which represents the program’s source of experience.

    In recent years, machine learning has acquired a lot of traction in the field of cyber security [5].In general, supervised and unsupervised machine learning approaches are two popular types of machine learning that researchers utilise to design and build small intrusion detection systems [6].Intrusion detection systems detect many sorts of intrusions and provide proactive security solutions.As the name implies, supervised machine learning-based intrusion detection systems operate in a supervised environment [7].It employs labelled historical data to train and test the frameworks it develops.Frameworks are built using supervised machine learning algorithms that map given inputs to outputs based on prior information [8].It infers an input object’s output class based on information gleaned from tagged samples of training data.In most cases, the input object is a vector of characteristics from the most perfect class with which it shares common traits.Unsupervised machine learning is a contrastive study against supervised machine learning in which unsupervised machine learning algorithms are implemented to build intrusion detection systems.In supervised machine learning,frameworks are completely subjected to labelled data and the efficiency and accuracy of frameworks are directly proportional to the quality of data.

    In contrast, unsupervised machine learning is a contrastive study against supervised machine learning, in which the efficiency and accuracy of frameworks are directly proportional to the quality of data.Frameworks are purely autonomous in their ability to compress internal representations of the given data based on their common traits [2], and the data is completely unlabeled in this context.Unsupervised machine learning frameworks analyse data, and significant insights are discovered from this data, which is then employed to categorise future data.Deep insights into several real-life domains are provided by machine learning, and cybersecurity is one of them.Malware training data sets, spam identification data sets, intuition detention data sets, unified host and network datasets,malicious Uniform Resource Locators (URLs), and other cybersecurity datasets must be utilised to train machine learning-based frameworks, which will then be employed to detect future cyber security risks.Considering the idealness and prioritisation of the ideal features at the first stages of intrusion, however, detection system development has become a difficult and fascinating subject for cybersecurity specialists and researchers.Characteristic prioritisation and identification is a decisionmaking problem that necessitates the input of specialists and extensive investigation [8].Furthermore,testing the proactive security preparation, efficacy, and accuracy of software security systems is a continual process that must be undertaken by specialists on a regular basis [9].

    As an outcome, the goal of this study is to examine the impact of cyber security qualities on intrusion detection systems and to use MCDM tactics to assess the idealness of machine learningbased intrusion detection systems owned by Indian hospitals under fuzzy settings.The experts’opinions are employed to identify and choose the relevant characteristics for this estimation.In the context of machine learning-based intrusion detection systems, this idealness estimation will assist researchers and cybersecurity experts in identifying and prioritising the ideal cybersecurity qualities.Aside from that, the findings of the study will aid in the development of more reliable and optimal intrusion detection systems.Researchers have employed MCDM tactics in a number of studies for numerous project estimations and estimations.However, we were unable to locate any research that employed fuzzy-based MCDM tactics to analyse the idealness of intrusion detection systems.As an outcome, the purpose of this research is to develop a novel approach to evaluate machine learningbased intrusion detection systems under fuzzy conditions by employing AHP-TOPSIS approaches.

    When it comes to handling hierarchical decision-making difficulties,AHP, anMCDMtactic, has a lot of promise.T L Saaty first offered the recommended approach in 1990 [9].Since then, the approach has seen significant refinements.It provides a mechanism for computing the weight of criteria that is simple to use (characteristics).Rather than just assigning a value, they specialise in arriving at the optimum decision for their aim and understanding of the issue [10].In addition, including fuzzy in this approach improves its efficiency and leads to more accurate outcomes [11].When making a decision in AHP, experts frequently suffer hesitancy and are unable to agree on a single value because they desire to go beyond or below the values.These values, on the other hand, are inaccessible [12,13].The fuzzy sets play a significant role in this scenario.Reluctant fuzzy sets are employed to reflect decision-makers’ preferences.When establishing an element’s membership in a fixed set is difficult, fuzzy logic can be employed to reduce uncertainty that may develop during the decision-making process.Conventional fuzzy logic [14] is insufficient to address such situations.The fuzzy collection has gotten a lot of attention from scholars both at home and abroad since its debut.Furthermore, the TOPSIS tactic is well-known for its capacity to generate the most alternative rankings imaginable [8].As a consequence, combining fuzzy logic with the AHP-TOPSIS tactic increases the study’s efficiency and qualifies it for evaluating the effectiveness of machine learning-based intrusion detection systems.

    AHP-TOPSIS is capable of solving MCDM problems with imprecise and uncertain data [13,14].AHP gives more accurate characteristic weights in fuzzy situations, outcomeing in more effective outcomes [15,16].TOPSIS under fuzzy conditions [13] is a more well-known tactic for ranking choices in MCDM problem resolution.This study uses eight cybersecurity elements as criteria, with ten machine learning-based intrusion detection systems as alternatives.Expert opinions and wellknown research studies are employed to identify and select the qualities.Our research team engaged domain specialists in this case.Our team has also conducted a number of research studies utilising numerous MCDM tactics.The experts selected and determined the appropriate characteristic sets for the described problem that required being solved using MCDM tactics based on their knowledge and experience in this domain.After consulting with domain experts (characteristic set), we were able to reduce redundancy, inconsistency, and ambiguity from the data.

    The study has also been broken down into the succeeding sections: The second section examines previous studies that are relevant.Section 3 describes the framework of cybersecurity characteristics related to machine learning-based intrusion detection systems; Section 4 elaborates on the tactic employed; Section 5 describes the mathematical calculations and outcomes; Section 6 incorporates the discussion; and Section 7 concludes the research.

    2 Machine Learning in Cybersecurity

    Machine learning, being a new technology, provides a lot of flexibility when it comes to extracting insights from enormous volumes of data.This, in turn, helps in analysing massive amounts of data and uncovering interesting patterns [17,18].Machine learning provides huge benefits to current industries and commercial organisations by gaining insights from previous data.Furthermore, one of the intriguing features of machine learning approaches is that they provide proactive security measures in the realm of cybersecurity [19].Intuition detection systems based on machine learning are an effective security strategy for tackling cybersecurity challenges, examining risks, and responding instinctively to intrusions and security incidents.Different machine learning tactics have been employed by cybersecurity experts and researchers to address numerous cybersecurity concerns [20,21].Decision trees, support vector machines, nave Bayes classifier, artificial neural networks, k-means clustering,convolutional neural networks, k-nearest neighbour, recurrent neural networks, restricted Boltzmann machines, and fuzzy c-means clustering are the most commonly employed machine learning algorithms for designing and developing intrusion detection systems [22,23].Researchers employ these algorithms to address cybersecurity challenges in a variety of working contexts.However, the goal of this study is to evaluate the idealness of these machine learning-based intrusion detection systems in terms of their stated cybersecurity qualities.

    A case study was carried out on ten machine learning-based intrusion detection systems installed in hospitals in Uttar Pradesh, India.The identification and selection of characteristics for evaluating machine learning algorithms is a collaborative choice based on the authors’expert perspectives and experience.For this study, eight cybersecurity characteristics related to machine learning were investigated,along with ten potential options for assessing the idealness of intrusion detection systems.A-1, A-2, A-3, A-4, A-5, A-6, A-7, and A-8, are the 8 options (intrusion detection systems).The alternative selection procedure is the outcome of a group decision made by domain experts and owners of intrusion detection systems from several Indian hospitals for a comparative cyber-security estimation.The 10 selected intrusion detection systems have been installed in numerous hospitals for the detection of numerous cyber-security assaults.Different machine learning tactics were applied in these detection systems, ranging from basic to complicated levels of integration and hybridization.To detect different sorts of threats, each A employs multiple machine learning algorithms.Furthermore,each intrusion detection system has been assigned a value between 0 and 1 for each of the detected characteristics, as the study’s authors employed fuzzy logic to make this determination.Furthermore,evaluators’subjective cognition outcomes in language words for each intrusion detection system are based on the scale and expert opinion stated in the tactic section.The process of estimation and quantitative outcomes for the 10 distinct intrusion detection systems have been reported in Section 5 of this study based on the identified characteristic set.The detected features and options are depicted in Fig.1.In the diagram below, the subsection descriptions and relevance of the identified features are discussed.

    Figure 1: A characteristic tree that evaluates the idealness of machine learning-based intrusion detection systems

    ?Spam Detection: Spam detection is a key aspect of machine learning-based intrusion detection systems, which are employed to detect spam.Spam is a technical term for unsolicited mass mail that is largely connected to electronicmessages.It is also known by other names, such as junk mail.Spammers employ several communications platforms to distribute unwanted and undesirable digital content [15].It usually manifests itself in the form of unwelcome and needless emails sent via the internet.Spams are frequently employed for commercial objectives and are generally unappealing.Spam messages, on the other hand, can be disastrous for both the system and the user.Spammers’ goal in this situation is to send malicious code, carry out phishing scams, and make money.

    ?Phishing Identification: Cyber intrusions are fairly common these days, and their prevalence has increased dramatically.Intruders utilise phishing as one of the most popular and fascinating social engineering attacks to steal personal data.Credit card numbers and login credentials are frequently included in the targeted data.Cyber fraudsters employ the notion of spoofing in phishing to impersonate a reputable and well-known source to the victim [14].They mostly use it to impersonate reputable organisations’websites so that victims can readily trust and disclose their personal information.Phishing attacks are also employed to spread malware that steals system cookies and records keystrokes.As an outcome, detecting phishing assaults has become one of the key capabilities of machine learning-based intrusion detection systems.

    ?MMalware Identification: Malware is a termemployed to describe a collection of harmful software that includes viruses, spyware, keyloggers, and ransomware.Malware is a type of computer code created by cyber-criminals with the goal of causing significant damage to the victim’s system or gaining unauthorised network access.In general, it is a coded file that is distributed by cyber-criminals over numerous communications tactics, such as e-mail, and needs the victim to run the virus.Intruders create several forms of malware programmes for numerous goals, and they are frequently employed to compromise the financial data of businesses and organisations [14].Researchers have developed machine learning tactics for bothmalware detection and classification intomultiple classes or families.As an outcome, one of the important aspects of machine learning-based intrusion detection systems is the identification of malware.

    ?DoS Attacks Detection: Confidentiality, Integrity, And Availability (CIA) are the three essential components of security or cyber-security.The CIA triad is a set of three components that are deemed essential for any system or network’s security.One of the most important aspects of all three is availability.Availability literally refers to the character that is to be employed or gained, but in the context of information security, it assures that authentic users have fast and reliable access to information and other resources [16].Denial of Service (DoS) assaults are employed by cyber intruders to disrupt the system’s operation and users’ access to system resources.By flooding a server with traffic, DoS assaults are employed to make online system resources unavailable to its users.Teardrop attacks, flooding attacks, IP fragmentation attacks, protocol attacks, and application-based attacks are all examples of DoS attacks [14].To detect DoS assaults, researchers employed a variety of machine learning tactics.As an outcome, detection of these attacks is a critical feature of machine learningbased intrusion detection frameworks.

    ?Misuse Detection: Misuse detection is a key feature of machine learning-based intrusion detection systems.Misuse detection ensures that cybersecurity attacks that are known to an intrusion detection system are identified [17].The intrusion detection system is already aware of the nature of these attacks and has signatures for them in its database of support.These existing signatures are employed to analyse and detect new assaults.As an outcome, detection systems that only have this feature have a hard time detecting unexpected assaults whose signatures are not in the supporting database.

    ?Anomaly Detection: The detection or identification of zero-day attacks (unknown attacks) is a difficult problem, and one of the key characteristics addressed by machine learning-based tactics.The framework’s supporting database does not record the behaviour of zero-day attack types.Based on its expertise and experience, an intelligent machine learning framework analyses numerous types of assaults and attempts to predict their class [17].As an outcome, a machine learning-based intrusion detection system must be able to detect zero-day assaults.It is critical in ensuring that a machine learning-based intrusion detection framework is suitable for use in an installation scenario.

    ?Implementation Complexity: As the name implies, it enumerates all of the complexities that must be considered during a system’s whole implementation process.It defines all of the complexity parameters that researchers, scientists, and other shareholders take into account when developing a machine learning-based intrusion detection system.It involves processing power, amount of training data, framework working complexity, algorithm implementation difficulty, overall framework cost,and other required resources, among other things.As an outcome, implementation complexity is an important characteristic to consider when evaluating a machine learning-based intrusion detection system, and it has been taken into account in our estimation.

    ?Accuracy: This is the metric for determining the degree of correctness and precision of any computation or process when compared to the appropriate standard.It is one of the most remarkable characteristics of machine learning algorithms.The accuracy of proposed machine learning-based frameworks in machine learning is determined by how successfully they generate the needed outputs[24].Precision, sensitivity, specificity, area under the curve, and other metrics are employed to assess it.When compared to other frameworksor tactics, it describes howaccurate a machine learning-based framework is.

    In some way, all of the aforementioned qualities apply to machine learning-based intrusion detectionsystems.Furthermore,all of the observed features play a key influence in the overall idealness of machine learning-based intrusion detection systems due to their implicit requirements.The study’s authors first defined a set of 20 traits that were important to the research.The domain experts’team was then contacted to complete the characteristic set.Experts undertook a group discussion about all of the discovered characteristics and eliminated any that were unnecessary or inconsistent.Individual expert arguments over characteristic selection were reduced, and after this expert group discussion,a set of eight cyber security characteristics were chosen.As an outcome, each of these characteristics was examined in this estimation.

    3 Proposed Hybrid Tactic

    From a cyber-security standpoint, the tactic for our proposed work lays out a sequential strategy for machine learning-based intrusion detection systems.Under hazy conditions, reluctant AHP and TOPSIS were employed to complete this task.This tactic assisted us in obtaining more precise outcomes.Fuzzy logic has gained a lot of momentum as an improved form of classical logic in sectors where the solution to a problem could be anything from absolutely true to completely false.It could be completely true, partially true, partially false, or completely false.It includes the ability to deal with unclear data [25-27].TheAHPis the best tactic for dealing with problems that have several hierarchical solutions.The problem is analysed in a hierarchical manner.AHP provides accurate estimations for both subjective and objective values of characteristics [28].TOPSIS is awell-known alternative ranking algorithm in the MCDM problem field that looks at the best alternative in a given set of alternatives[29].The weights of qualities are computed using AHP under fuzzy conditions, and the alternatives are then ranked using TOPSIS.Numerical equations are supplied in the next section to aid researchers in undertaking a numerical analysis of this work.

    As an outcome, we believe that the fuzzy AHP-TOPSIS tactic is excellent for dealing with situations like this.Prior research has found the importance and utility of findings acquired from the fuzzy AHP tactic.Experts have also pointed out that this review tactic has a number of disadvantages and repercussions.The authors devised another effective equivalent approach, the fuzzy TOPSIS, to address these implications and obstacles, which complement the fuzzy AHP and its consequences.

    In addition, the fuzzy AHP tactic was employed to generate a systematic tree-like framework of numerous selected parts as a strategy for analysing the characteristic’s impact on healthcare web apps.These variables were then subjected to the numerical equations.As a second first step in the examination, the practitioners converted the original weights of the characteristics supplied by experts into the Triangular Fuzzy Set Number (TFN).Further, TFN values are routinely demonstrated and validated to be between 0 and 1 for each characteristic [30].The succeeding headings are also discussed to provide a more descriptive knowledge of the tactics employed:

    Stage1: Succeeding the successful building of a tree framework, the practitioners established a function called membership by using the succeeding Eqs.(1) and (2).

    The upper limit is represented by limit 1, the medium is represented by mi, and the lower limit is represented by ui.

    Stage 2: The practitioners now construct TFN numbers for characteristics using the succeeding formulas as the next step in the examination.

    It is necessary to comprehend the representation mechanism in order to estimate triangular numbers.Eqs.(3)-(6) now performs the original dialogue for TFN [9].

    In the formulas above,Jijdrepresents a group of experts designated by the letters I and j.Furthermore, in the formula employed by the inspectors to estimate the variance between two particular components, d indicates the geometric mean value.Eqs.(7)-(9) stated the formulas for operating the intended GM value once it was calculated.

    Stage3: For estimation, the succeeding Eq.(10) is employed:

    Stage 4: It’s also time to create a choice-based matrix using the succeeding Eq.(12).

    Stage 5: In a tree-based framework, Eq.(13) is employed to calculate GM, and Eq.(14) provides an estimation step for specific weights.

    Stage 6: The practitioners now use Eqs.(15) and (16) to normalise the numbers after determining the particular weights for each characteristic.

    Stage 7: The succeeding Eq.(17) is employed to calculate the best characteristic and ranking list of selected qualities.

    The estimations that were carried out using the fuzzy AHP tactic are now finished.After defining the ranking list and the weights of the criteria, the practitioners utilise a fuzzy TOPSIS MCDM tactic to test the evaluated outcomes.TOPSIS is a tactic for creating a numeric testing plot that resembles real-life testing [31].The TOPSIS tactic is a powerful tool for assessing the efficiency and quality of fuzzy fuzzy AHPoutputs.The approach executes the estimation stages using some applications related to the field of hierarchy, and then employs them as an alternative in the estimation procedure.The headings below provide a concise overview of the tactic:

    Stage 1: The practitioners assign weights for specific characteristics to the specific options chosen by the writers as the first step in the estimation process.

    Stage 2: Apply Eq.(18) to create a matrix.

    Stage3: Furthermore, after constructing a systematic matrix using Eq.(18), practitioners must normalise the values identified in the preceding phase, as shown in Eqs.(19) and (20).

    The value of j is taken to be between 1 and 0.Furthermore, before the TFN values conversation,the normalisation tactic is widely employed.Stage 4: The practitioners obtains a numerical matrix for alternative estimation by applying Eq.(21).

    It’s worth noting that during the estimation, normalised values are frequently shown to represent TFN values between 0 and 1.

    Stage 5: To numerically quantify the +ve and -ve ideal solution value by applying Eqs.(22)-(25).

    Here,= (1,1,1)?= (Lwj,Mwj,Hwj);= (0,0,0),j= 1,2,3...n

    Stage 6: The practitioners use Eq.(26) to calculate the optimal gap degree of alternative values in this final step of the estimation.For ideal alternative testing, the calculation of coefficient gap degree must be reviewed [32,33].

    Using the above-mentioned systematic step-by-step tactic, this project will undertake a case study on machine learning-based intrusion detection systems for the idealness estimation from a cybersecurity aspect.The numerical computations for this examination are detailed in the next section of this article.

    4 Numerical Analysis

    Because quantitative estimation of a qualitative characteristic is a challenging procedure, evaluating the quality characteristics of any software-based system, including cybersecurity, is a difficult process [8].The numerical analysis presented in this paper will provide a quantitative estimation of machine learning-based intrusion detection systems.As an outcome, this article conducts a case study on 8 distinct machine learning-based intrusion detection systems in order to evaluate their optimum cybersecurity qualities.For this project, 8 different intrusion detection systems were chosen as possibilities.The tactic we adopted for our study requires the identification of alternatives and the ranking of those options.Furthermore, these 8 different intrusion detection systems were chosen as options for their comparative cyber-security estimation based on the collaborative choice of domain experts and intrusion detection system owners.To make this activity more corroborative and efficient,AHP-TOPSIS was employed under fuzzy conditions.This experiment looked at eight characteristics, including spam detection, phishing detection, malware detection, DoS attack detection, abuse detection, anomaly detection, implementation difficulty, and accuracy, to establish the idealness estimation of a machine learning-based intrusion detection system.In the succeeding research, the identified features were designated as F1, F2, F3, F4, F5, F6, F7, and F8.Idealness estimation of machine learning-based intrusion detection systems has been performed using AHP-TOPSIS under the succeeding conditions, as given in Eqs.(1)-(26) in Section 4 of this paper:

    Initially, the language concepts were translated into numeric values and later into fuzzy logic based crisp numeric values by considering Eqs.(1)-(9).The outcomes of the numerical calculations were then employed to generate a pair-wise comparison matrix, as shown in Tab.1.The procedure encountered the implementation of fuzzy wrappers by approaching Eq.(1); approaching Eqs.(2)and (5); estimation of trapezoidal numbers C = (l, m, n, o); and approaching Eqs.(6) and (7),and considering, which represents a number between (0-1), the 1st and 2nd weight types have been discovered.Finally, the experts calculated the pair-wise comparison matrix using Eqs.(8) and (9).We haven’t included the intermediate processes because they aren’t really important.

    Table 1: Trapezoidal fuzzy pair-wise comparison matrix at level 1

    The defuzzified values and normalised weights of the level 1 characteristic were computed using Eqs.(10)-(16), and the outcomes are displayed in Tab.2.In order to calculate Tab.2, the succeeding intermediate steps were employed: For the defuzzification procedure, Eq.(10) was employed to turn the pair-wise comparison matrixes into united defuzzified values.Then, to ensure matrix consistency,Eqs.(11) and (12) were employed to calculate the consistency index and consistency ratio (CR), and we found that CR=0.03485540 for this study, which equals 0.1, indicating that our evaluated matrix is consistent.After that, numerical calculations were performed to determine the geometric mean for row values and the most relevant qualities, using Eqs.(13) and (14) as a guide.Then, using Eqs.(15)and (16), the defuzzified data was analysed and converted to normalised weights.

    Table 2: Weights after defuzzification

    Succeeding that, this section of the paper gives a realistic estimation of the evaluated outcomes of extremely sensitive machine learning-based intrusion detection systems employed in Indian hospitals.The global ranking of competing alternatives was constructed using TOPSIS under fuzzy logic conditions after the defuzzified and normalised weights of characteristics were obtained using an AHP tactic under fuzzy logic conditions.The summarised outcomes displayed in Tab.3 were computed by combining the standard scale specified in the Tactic sub-section at step 10 and Eqs.(1) and (17) from the technological data of 8 machine learning-based intrusion detection systems.The AHP-derived characteristic weights are fed into the TOPSIS tactic under fuzzy logic conditions to get the ranking order for the alternatives.Tab.4 shows the normalised fuzzy decision-matrix for 8 qualities and 8 competitive options, which was calculated using certain intermediary operations and combining step 10 and Eq.(18).Using Eqs.(19)-(22), the normalised fuzzy decision-matrix cell values (performancevalues) are multiplied by each characteristic weight value, yielding a weighted fuzzy normalised decision-matrix, as shown in Tab.5.The final outcomes are listed in Tab.6 under the column headings dist+ and dist-, which were calculated using Eqs.(22) and (23) to determine the positive and negative idealness of each alternative for each characteristic.The CC-i satisfaction degree was then calculated as the relative closeness score for each choice using Eqs.(25) and (26), and the outcomes are shown in Tab.6 and Fig.2.

    Table 3: Subjective cognition outcomes

    Table 3: Continued

    Table 4: The normalized fuzzy-decision matrix

    Table 4: Continued

    Table 5: The weighted normalized fuzzy-decision matrix

    Table 6: Closeness coefficients of selected alternatives

    Figure 2: Graphical representation of satisfaction degree

    In an idealness estimation of machine learning-based cybersecurity, the numerical findings demonstrate that, based on the performance scores, the competitive alternative rankings (8 machine learning-based intrusion detection systems) are generated as: A-6, A-8, A-7, A-5, A-4, A-3,A-1, and A-2.The idealness estimation of 8 alternative machine learning-based intrusion detection systems based on defined criteria found that A-6 is more ideal and effective in addressing important cybersecurity problems and difficulties.Furthermore, the identified characteristics for the idealness estimation of machine learning-based intrusion detection systems have been prioritised in the succeeding order, using a TOPSIS approach under fuzzy logic conditions: accuracy, anomaly detection, misuse detection, DoS attack detection, malware detection, implementation complexity,spam detection, and phishing detection, with global normalised weights of 0.273937, 0.222015,0.127306, 0.122505, 0.10973, 0.053217, 0.052354, and 0.

    Furthermore, the applicability of our suggested research is not nil.As an alternative, we looked at 8 real-time intrusion detection systems from numerous Indian hospitals.According to current relevant research works [8-17], alternative estimation selection is an inherent aspect of our proposed tactic.For this case study, the alternative selection is the outcome of a group decision made by domain experts and owners of intrusion detection systems.Furthermore, the quantitative outcomes show that the A-6 has acquired the greatest number of qualities from the defined characteristic set for this research.Due to its hybrid properties, it integrates several machine learning tactics for the detection of different types of cyber-security assaults, which is the subject of our investigation.Similarly, other intrusion detection systems, receive a lower performance score in descending order for the identified qualities and domain of their detection of known cyber-security assaults.

    5 Discussion

    Cybersecurity protects information, information systems, and networks against intruders in real time.Over the last decade, there has been a massive surge in cybersecurity breaches, and cases of data theft are increasing by the day.Organizations have spent a significant amount of money to solve these cybersecurity vulnerabilities, and attempts to combat these incursions have already begun.Experts and researchers have employed a variety of tactics and strategies to develop trustworthy and effective security systems.Machine learning is one of the most well-known of them, and it plays an important role in cybersecurity [4].Machine learning has a proactive personality that can successfully manage cybersecurity challenges, assess risks, and respond to breaches and security incidents in a timely and instinctive manner [6-8].As an outcome, machine-learning approaches are better suited to identifying and classifying diverse types of cyber-attacks.In particular, supervised and unsupervised machine learning approaches are capable of addressing a wide range of cybersecurity concerns [9].Numerous intrusion detection systems have been developed and designed by cybersecurity experts and academics in the past few years to identify numerous types of cybersecurity threats [6].

    The major goal of this research was to examine the idealness of intrusion detection systems using integrated fuzzy-based AHP-TOPSIS tactics, as indicated.The features that were included in this estimation were identified and chosen using expert opinions and current relevant research findings.The accuracy characteristic has obtained the highest importance in AHP under fuzzy logic conditions, followed by anomaly detection, misuse detection, DoS attack detection, malware detection, implementation complexity, spam detection, and phishing detection.With a performance score of 0.355475 computed with respect to machine learning relevant cybersecurity characteristics,TOPSIS under fuzzy logic conditions shows that A-6 has earned the highest ranking, while A-2 has gained the lowest ranking.The findings show that A-6 provides better and more reliable cybersecurity than the other nine options.This study will contribute to the development of secure and dependable intrusion detection systems as well as machine learning-based cybersecurity characteristic estimations.

    According to the study’s findings, the intrusion detection system A-6 best matches the machine learning-based cyber security characteristics that were employed to evaluate the idealness of intrusion detection systems from a machine learning-based cybersecurity perspective.It was decided to be the best in terms of supplying an optimal and trustworthy machine learning-based cybersecurity mechanism against probable threats, with a performance score of 0.635660.The succeeding points summarise the study’s main findings and conclusions.

    The succeeding machine learning-based cybersecurity characteristics are prioritised in this research experiment: accuracy, anomaly detection, misuse detection, DoS attack detection, malware detection, implementation complexity, spam detection, and phishing detection, with global normalised weights of 0.273937, 0.222015, 0.127306, 0.122505, 0.10973, 0.053217, 0.052354, and 0.038937,respectively.

    In terms of recognised weighted machine learning-based cybersecurity qualities, after A-6, the succeeding competing alternatives are rated in order based on their produced performance scores:A-8, A-7, A-5, A-4, A-3, A-1, and A-2.

    Intrusion detection systems that use machine learning to provide cybersecurity are a difficult problem to solve, and our study provides correct recommendations for constructing optimal and effective machine learning-based intrusion detection systems.

    This research was carried out primarily for intrusion detection systems employed in healthcare settings.Because the estimation characteristics are determined on the basis of generalisation, they may be employed as a guideline for developing any type of ideal and successful intrusion detection system.

    6 Conclusions

    According to the conclusions of this study, cyber security issues and breaches have been a difficult challenge for researchers and security specialists in recent years.To construct trustworthy and effective security systems, experts and researchers have employed a number of approaches and strategies.One of the most well-known is machine learning, which plays an important role in cybersecurity.We employed fuzzy-based AHP-TOPSIS to investigate the impact of cyber security-related characteristics on intrusion detection systems in this league.Researchers and developers will be able to use this tactic to prioritise cyber security characteristics and design safer and more reliable intrusion detection systems using this tactic.Research, on the other hand, is a dynamic and ongoing endeavour.As an outcome, while our machine learning-based cybersecurity estimation is accurate, it falls short of achieving optimal outcomes.There are other MCDM tactics that can be employed to achieve more efficient outcomes.Nonetheless, our empirical data suggests that we employed a trustworthy strategy for this estimation.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research & Innovation,Ministryof Educationin Saudi Arabia for funding this research work through the project number“IFPHI: 268-611-2020”and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

    Funding Statement:Funding for this study was received from the Ministry of Education and Deanship of Scientific Research at King Abdulaziz University, Kingdom of Saudi Arabia under the Grant No.IFPHI-268-611-2020.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    a级片在线免费高清观看视频| 免费一级毛片在线播放高清视频 | 国产精品久久久久成人av| 天堂影院成人在线观看| 一边摸一边抽搐一进一出视频| 午夜免费成人在线视频| 欧美av亚洲av综合av国产av| 久久午夜综合久久蜜桃| 露出奶头的视频| 成人三级黄色视频| 午夜两性在线视频| 亚洲午夜精品一区,二区,三区| 高清欧美精品videossex| 女人爽到高潮嗷嗷叫在线视频| 国产亚洲精品综合一区在线观看 | 中文字幕av电影在线播放| 美女福利国产在线| 中文字幕av电影在线播放| 丝袜美足系列| 香蕉久久夜色| 欧美日韩av久久| 亚洲精品在线观看二区| 51午夜福利影视在线观看| 日本vs欧美在线观看视频| 热re99久久国产66热| 身体一侧抽搐| 视频区欧美日本亚洲| 国产熟女午夜一区二区三区| 麻豆一二三区av精品| 亚洲成人久久性| 国产成年人精品一区二区 | 老汉色∧v一级毛片| 久久中文看片网| 色精品久久人妻99蜜桃| 日本三级黄在线观看| 一边摸一边抽搐一进一出视频| 久久国产精品男人的天堂亚洲| 国产一区二区三区在线臀色熟女 | 免费少妇av软件| 久久久久久大精品| e午夜精品久久久久久久| 黑人操中国人逼视频| 91字幕亚洲| 欧美激情极品国产一区二区三区| 久久久精品国产亚洲av高清涩受| 国产熟女xx| 99国产极品粉嫩在线观看| 在线天堂中文资源库| 欧美人与性动交α欧美精品济南到| 国产精品一区二区免费欧美| 老司机靠b影院| 亚洲av成人av| 久久久精品国产亚洲av高清涩受| 亚洲va日本ⅴa欧美va伊人久久| 欧美日本亚洲视频在线播放| 精品福利永久在线观看| 久久久久国产一级毛片高清牌| 一本大道久久a久久精品| 国产精品99久久99久久久不卡| 在线观看日韩欧美| 亚洲人成网站在线播放欧美日韩| 亚洲 欧美一区二区三区| 搡老乐熟女国产| 91大片在线观看| 久久影院123| 国产亚洲欧美精品永久| 亚洲黑人精品在线| 亚洲九九香蕉| 女人高潮潮喷娇喘18禁视频| 国产精品影院久久| 午夜精品国产一区二区电影| 欧美av亚洲av综合av国产av| 亚洲男人天堂网一区| 成人手机av| 丰满迷人的少妇在线观看| 国产视频一区二区在线看| 精品国产美女av久久久久小说| 视频在线观看一区二区三区| 国产在线精品亚洲第一网站| 91字幕亚洲| 亚洲狠狠婷婷综合久久图片| 国产亚洲欧美精品永久| 在线观看www视频免费| 99热只有精品国产| 真人一进一出gif抽搐免费| 天堂影院成人在线观看| 高清欧美精品videossex| 午夜成年电影在线免费观看| 丰满的人妻完整版| 亚洲国产看品久久| 亚洲成av片中文字幕在线观看| 19禁男女啪啪无遮挡网站| 国产有黄有色有爽视频| 亚洲国产欧美一区二区综合| 69精品国产乱码久久久| 女人精品久久久久毛片| 亚洲精品国产色婷婷电影| 亚洲av片天天在线观看| 亚洲色图av天堂| 国产亚洲精品久久久久久毛片| 一进一出抽搐gif免费好疼 | 亚洲国产欧美一区二区综合| 别揉我奶头~嗯~啊~动态视频| 亚洲一区高清亚洲精品| 多毛熟女@视频| 中文亚洲av片在线观看爽| 亚洲精品美女久久久久99蜜臀| 一边摸一边做爽爽视频免费| 黄片小视频在线播放| 日韩视频一区二区在线观看| 亚洲av熟女| 国产成人精品无人区| 日韩免费av在线播放| 免费少妇av软件| 国产一区二区三区综合在线观看| 亚洲av熟女| 在线观看日韩欧美| √禁漫天堂资源中文www| 亚洲精品久久午夜乱码| 国产免费男女视频| 久久精品91蜜桃| 亚洲精品在线观看二区| 日韩欧美一区二区三区在线观看| 大陆偷拍与自拍| 91国产中文字幕| 日本三级黄在线观看| 国产伦一二天堂av在线观看| 看黄色毛片网站| 桃红色精品国产亚洲av| 日本wwww免费看| 成人影院久久| 欧美精品亚洲一区二区| 亚洲五月色婷婷综合| 波多野结衣高清无吗| 久久欧美精品欧美久久欧美| 欧美一区二区精品小视频在线| 搡老岳熟女国产| 他把我摸到了高潮在线观看| 欧美日韩亚洲综合一区二区三区_| 欧美精品一区二区免费开放| 欧美一级毛片孕妇| 窝窝影院91人妻| 一边摸一边抽搐一进一出视频| 精品电影一区二区在线| 午夜福利欧美成人| 亚洲精品国产精品久久久不卡| 国产精品 国内视频| 桃色一区二区三区在线观看| 黑人猛操日本美女一级片| 欧美人与性动交α欧美软件| 亚洲片人在线观看| 热99re8久久精品国产| 超碰成人久久| a级片在线免费高清观看视频| 操出白浆在线播放| 国产精品99久久99久久久不卡| 欧美黑人欧美精品刺激| av福利片在线| 真人做人爱边吃奶动态| 一级毛片女人18水好多| 一进一出好大好爽视频| 亚洲激情在线av| 国产蜜桃级精品一区二区三区| 中文字幕人妻丝袜一区二区| 丝袜美腿诱惑在线| 波多野结衣一区麻豆| 十分钟在线观看高清视频www| xxx96com| 两性午夜刺激爽爽歪歪视频在线观看 | 国产精品久久电影中文字幕| 成人永久免费在线观看视频| 午夜免费成人在线视频| 精品久久久久久久毛片微露脸| 麻豆国产av国片精品| 老司机福利观看| 国产成人精品无人区| av网站在线播放免费| 侵犯人妻中文字幕一二三四区| 午夜免费观看网址| av超薄肉色丝袜交足视频| 波多野结衣一区麻豆| 黑人欧美特级aaaaaa片| 国产亚洲精品综合一区在线观看 | 99久久久亚洲精品蜜臀av| 久久精品国产亚洲av香蕉五月| 一个人免费在线观看的高清视频| 最近最新免费中文字幕在线| 美女扒开内裤让男人捅视频| 热re99久久国产66热| 999精品在线视频| 他把我摸到了高潮在线观看| 免费搜索国产男女视频| 久久久国产一区二区| 757午夜福利合集在线观看| 久久久久亚洲av毛片大全| 91成人精品电影| 国产精品99久久99久久久不卡| 色在线成人网| 国产精品av久久久久免费| av片东京热男人的天堂| 91在线观看av| 亚洲自拍偷在线| 中文字幕人妻丝袜制服| 久久精品国产99精品国产亚洲性色 | 极品教师在线免费播放| 两人在一起打扑克的视频| 热re99久久国产66热| 亚洲国产欧美日韩在线播放| 另类亚洲欧美激情| 欧美在线一区亚洲| 91麻豆av在线| 国产精品乱码一区二三区的特点 | 欧美在线黄色| 大型av网站在线播放| av超薄肉色丝袜交足视频| 午夜老司机福利片| 欧美日韩黄片免| 91av网站免费观看| 精品高清国产在线一区| 他把我摸到了高潮在线观看| 老司机福利观看| 纯流量卡能插随身wifi吗| 露出奶头的视频| www国产在线视频色| 国产亚洲精品综合一区在线观看 | 12—13女人毛片做爰片一| 十八禁网站免费在线| 久久九九热精品免费| 精品久久久久久久久久免费视频 | 亚洲av成人av| 人人妻人人澡人人看| 热re99久久国产66热| 亚洲精品一区av在线观看| 国产精品自产拍在线观看55亚洲| 久久这里只有精品19| 国产熟女xx| 一级a爱片免费观看的视频| av网站免费在线观看视频| 欧美大码av| 欧美av亚洲av综合av国产av| 国产欧美日韩综合在线一区二区| 超碰97精品在线观看| 亚洲国产精品一区二区三区在线| 亚洲中文日韩欧美视频| 久久久水蜜桃国产精品网| www.精华液| 嫩草影视91久久| 一边摸一边抽搐一进一小说| 老司机亚洲免费影院| 亚洲av日韩精品久久久久久密| 国产精品 欧美亚洲| 99久久人妻综合| 国产精华一区二区三区| 久久国产精品影院| 交换朋友夫妻互换小说| 亚洲专区字幕在线| 国产一区二区激情短视频| 国产精品 欧美亚洲| 亚洲精品一区av在线观看| 午夜精品在线福利| 一级黄色大片毛片| 久久久久久久久久久久大奶| 欧美 亚洲 国产 日韩一| 亚洲精品美女久久av网站| 午夜久久久在线观看| 99久久人妻综合| 久久九九热精品免费| 欧美不卡视频在线免费观看 | 高清在线国产一区| 亚洲av片天天在线观看| 国产野战对白在线观看| 亚洲一码二码三码区别大吗| 午夜久久久在线观看| 亚洲成人免费电影在线观看| 日韩三级视频一区二区三区| e午夜精品久久久久久久| 超碰成人久久| 美女午夜性视频免费| 18美女黄网站色大片免费观看| 人人澡人人妻人| 91字幕亚洲| 极品教师在线免费播放| 久久精品国产99精品国产亚洲性色 | 久久精品亚洲av国产电影网| 精品少妇一区二区三区视频日本电影| 亚洲av熟女| 欧美最黄视频在线播放免费 | 国产精品亚洲av一区麻豆| 每晚都被弄得嗷嗷叫到高潮| 国产精品成人在线| 亚洲熟女毛片儿| 亚洲av熟女| 精品国产国语对白av| 黄色视频不卡| 黄片播放在线免费| 丰满的人妻完整版| 久久伊人香网站| 精品久久久久久,| 69精品国产乱码久久久| 免费在线观看影片大全网站| 成人手机av| 又紧又爽又黄一区二区| 一级片免费观看大全| 欧美 亚洲 国产 日韩一| 成人免费观看视频高清| 99国产精品99久久久久| 日本精品一区二区三区蜜桃| 淫妇啪啪啪对白视频| 午夜a级毛片| 国产精品亚洲av一区麻豆| 三上悠亚av全集在线观看| 中文欧美无线码| 国产精品免费视频内射| 最近最新免费中文字幕在线| 亚洲av五月六月丁香网| 国产精品 国内视频| 高清欧美精品videossex| 日本精品一区二区三区蜜桃| 青草久久国产| 啦啦啦 在线观看视频| 中文欧美无线码| 可以在线观看毛片的网站| 免费看a级黄色片| 精品福利永久在线观看| 人人澡人人妻人| 波多野结衣高清无吗| 国产成人精品久久二区二区91| 丰满迷人的少妇在线观看| 999久久久国产精品视频| 亚洲七黄色美女视频| 99久久国产精品久久久| 国产精品乱码一区二三区的特点 | 身体一侧抽搐| 亚洲九九香蕉| 男女高潮啪啪啪动态图| 12—13女人毛片做爰片一| 国产有黄有色有爽视频| 精品第一国产精品| 国产精品影院久久| 母亲3免费完整高清在线观看| 可以在线观看毛片的网站| 在线视频色国产色| 如日韩欧美国产精品一区二区三区| 咕卡用的链子| 精品国产美女av久久久久小说| 欧美不卡视频在线免费观看 | 窝窝影院91人妻| 成人永久免费在线观看视频| 日韩免费av在线播放| 琪琪午夜伦伦电影理论片6080| 国产97色在线日韩免费| 成年版毛片免费区| 欧美日本中文国产一区发布| 女人被狂操c到高潮| 亚洲三区欧美一区| 亚洲九九香蕉| 亚洲avbb在线观看| 女人被躁到高潮嗷嗷叫费观| 国产欧美日韩精品亚洲av| 国产欧美日韩综合在线一区二区| 亚洲va日本ⅴa欧美va伊人久久| 十八禁网站免费在线| 国产成人欧美在线观看| 国产精品1区2区在线观看.| 国产精品一区二区三区四区久久 | 午夜精品国产一区二区电影| 18禁美女被吸乳视频| tocl精华| 91老司机精品| 天天躁夜夜躁狠狠躁躁| 亚洲成av片中文字幕在线观看| 午夜精品久久久久久毛片777| 女人爽到高潮嗷嗷叫在线视频| 另类亚洲欧美激情| 国产成人av教育| 欧美日韩av久久| 亚洲人成77777在线视频| 国产激情久久老熟女| 999久久久国产精品视频| 男女下面插进去视频免费观看| 丁香六月欧美| 在线观看一区二区三区| 欧美日韩福利视频一区二区| 9热在线视频观看99| 国产欧美日韩精品亚洲av| 熟女少妇亚洲综合色aaa.| 欧美日韩黄片免| 狠狠狠狠99中文字幕| 久久国产亚洲av麻豆专区| 在线永久观看黄色视频| 99久久精品国产亚洲精品| 国产99白浆流出| 国产精品 国内视频| 无限看片的www在线观看| 欧美激情极品国产一区二区三区| 中出人妻视频一区二区| 亚洲精品中文字幕在线视频| 日韩欧美免费精品| 亚洲精品国产色婷婷电影| 女同久久另类99精品国产91| 成年人免费黄色播放视频| 久久影院123| 国产野战对白在线观看| 国产精华一区二区三区| 免费在线观看视频国产中文字幕亚洲| 99在线人妻在线中文字幕| 99久久综合精品五月天人人| 国产精品综合久久久久久久免费 | 中文字幕最新亚洲高清| 成人特级黄色片久久久久久久| 欧美日韩乱码在线| 国产99久久九九免费精品| 美女午夜性视频免费| 亚洲成a人片在线一区二区| 亚洲欧美日韩另类电影网站| 乱人伦中国视频| 黄色 视频免费看| 香蕉丝袜av| 91大片在线观看| 精品久久久久久,| 国产精品成人在线| 欧美不卡视频在线免费观看 | 午夜亚洲福利在线播放| 国产成人啪精品午夜网站| 18禁观看日本| 91国产中文字幕| 美女国产高潮福利片在线看| 免费高清在线观看日韩| 亚洲在线自拍视频| av欧美777| 欧美中文日本在线观看视频| 无遮挡黄片免费观看| 国产精品亚洲av一区麻豆| 国产又色又爽无遮挡免费看| 亚洲精品国产一区二区精华液| 男女做爰动态图高潮gif福利片 | 精品一区二区三区av网在线观看| 老汉色av国产亚洲站长工具| 男男h啪啪无遮挡| 叶爱在线成人免费视频播放| 女性被躁到高潮视频| 在线观看午夜福利视频| 久久久久久免费高清国产稀缺| 一进一出抽搐动态| 色在线成人网| 午夜成年电影在线免费观看| 国产精品国产av在线观看| 国产高清国产精品国产三级| 99热只有精品国产| 窝窝影院91人妻| 久久久精品欧美日韩精品| 老司机亚洲免费影院| 丝袜人妻中文字幕| 老熟妇仑乱视频hdxx| 亚洲免费av在线视频| 美女大奶头视频| 久久这里只有精品19| 久久国产乱子伦精品免费另类| 午夜福利在线免费观看网站| 亚洲情色 制服丝袜| 丰满的人妻完整版| 女人被狂操c到高潮| ponron亚洲| 桃红色精品国产亚洲av| 欧美日韩av久久| 国产伦人伦偷精品视频| 91在线观看av| 国产黄a三级三级三级人| 正在播放国产对白刺激| 国产又色又爽无遮挡免费看| 国产区一区二久久| 久久欧美精品欧美久久欧美| 中文字幕人妻熟女乱码| 亚洲国产欧美日韩在线播放| 男人的好看免费观看在线视频 | 性色av乱码一区二区三区2| 国产精品乱码一区二三区的特点 | 成人18禁高潮啪啪吃奶动态图| 老汉色av国产亚洲站长工具| 99久久99久久久精品蜜桃| 欧美成人性av电影在线观看| 亚洲三区欧美一区| aaaaa片日本免费| 亚洲国产看品久久| 欧美大码av| 久久久久久久午夜电影 | 嫁个100分男人电影在线观看| 12—13女人毛片做爰片一| 首页视频小说图片口味搜索| 日韩欧美一区二区三区在线观看| 真人做人爱边吃奶动态| 亚洲国产精品一区二区三区在线| 亚洲 欧美 日韩 在线 免费| 日韩一卡2卡3卡4卡2021年| 亚洲国产看品久久| 久久青草综合色| 亚洲狠狠婷婷综合久久图片| 精品福利观看| 国产熟女午夜一区二区三区| 新久久久久国产一级毛片| 欧洲精品卡2卡3卡4卡5卡区| 男女床上黄色一级片免费看| 韩国av一区二区三区四区| 免费人成视频x8x8入口观看| 久久婷婷成人综合色麻豆| 亚洲成国产人片在线观看| 久久精品aⅴ一区二区三区四区| 脱女人内裤的视频| 国内毛片毛片毛片毛片毛片| 一区二区三区激情视频| 日本vs欧美在线观看视频| 久久精品国产亚洲av香蕉五月| 亚洲精品久久午夜乱码| 狠狠狠狠99中文字幕| 黄网站色视频无遮挡免费观看| 午夜老司机福利片| 午夜a级毛片| 可以在线观看毛片的网站| 免费女性裸体啪啪无遮挡网站| 一区二区三区激情视频| 亚洲成a人片在线一区二区| 精品国产美女av久久久久小说| 黄色毛片三级朝国网站| 久久久久久久精品吃奶| 纯流量卡能插随身wifi吗| 中出人妻视频一区二区| www.999成人在线观看| 国产伦一二天堂av在线观看| 国产精品偷伦视频观看了| 日韩欧美国产一区二区入口| 高清在线国产一区| 90打野战视频偷拍视频| 亚洲五月色婷婷综合| 午夜老司机福利片| 欧美午夜高清在线| 9191精品国产免费久久| a在线观看视频网站| 波多野结衣高清无吗| 黄色丝袜av网址大全| 亚洲av日韩精品久久久久久密| 一边摸一边抽搐一进一出视频| 中文字幕人妻熟女乱码| 亚洲国产看品久久| 在线观看免费高清a一片| 久久99一区二区三区| 免费在线观看影片大全网站| 熟女少妇亚洲综合色aaa.| 国产欧美日韩精品亚洲av| 又黄又爽又免费观看的视频| 国产av又大| 国产精品久久久av美女十八| 亚洲色图综合在线观看| 精品免费久久久久久久清纯| 欧美日韩亚洲高清精品| 精品日产1卡2卡| 日本黄色日本黄色录像| 无限看片的www在线观看| 国产黄色免费在线视频| 亚洲成人精品中文字幕电影 | 日韩 欧美 亚洲 中文字幕| 黄片播放在线免费| 亚洲七黄色美女视频| 999久久久精品免费观看国产| 老司机午夜福利在线观看视频| 免费在线观看完整版高清| 日韩免费高清中文字幕av| 如日韩欧美国产精品一区二区三区| 欧美日本亚洲视频在线播放| 50天的宝宝边吃奶边哭怎么回事| 99精国产麻豆久久婷婷| 天堂俺去俺来也www色官网| 成人国语在线视频| 99热只有精品国产| 岛国在线观看网站| 精品熟女少妇八av免费久了| 一区福利在线观看| 91精品国产国语对白视频| 亚洲五月天丁香| 男女午夜视频在线观看| 久久人妻av系列| 日本免费a在线| 亚洲中文字幕日韩| 亚洲成国产人片在线观看| 成年人免费黄色播放视频| 亚洲国产精品合色在线| 午夜老司机福利片| 男女午夜视频在线观看| 午夜久久久在线观看| 久久中文看片网| 免费观看人在逋| 丰满迷人的少妇在线观看| 天堂动漫精品| 一级毛片精品| 免费观看人在逋| 97人妻天天添夜夜摸| 高清毛片免费观看视频网站 | 亚洲精品在线观看二区| 成人影院久久| 久久中文字幕人妻熟女| 丝袜在线中文字幕| 校园春色视频在线观看| 淫秽高清视频在线观看| 亚洲欧美激情在线| 在线av久久热| av有码第一页| 777久久人妻少妇嫩草av网站| 老司机午夜十八禁免费视频| 他把我摸到了高潮在线观看| av电影中文网址| 99香蕉大伊视频| 国产精品香港三级国产av潘金莲| 久久精品国产综合久久久| 欧美精品一区二区免费开放| 国产高清激情床上av| 咕卡用的链子|