• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Hybrid Approach for Network Intrusion Detection

    2022-11-09 08:13:06MavraMehmoodTalhaJavedJamelNebhenSidraAbbasRabiaAbidGiridharReddyBojjaandMuhammadRizwan
    Computers Materials&Continua 2022年1期

    Mavra Mehmood,Talha Javed,Jamel Nebhen,Sidra Abbas,*,Rabia Abid,Giridhar Reddy Bojja and Muhammad Rizwan

    1Department of Computer Science,Kinnaird College for Women,Lahore,54000,Pakistan

    2ASET Labs,Islamabad,Pakistan

    3Prince Sattam bin Abdulaziz University,College of Computer Science and Engineering,Alkharj,11942,Saudi Arabia

    4College of Business and Information Systems,Dakota State University,Madison,United States of America

    Abstract: Due to the widespread use of the internet and smart devices,various attacks like intrusion,zero-day,Malware,and security breaches are a constant threat to any organization’s network infrastructure.Thus,a Network Intrusion Detection System (NIDS) is required to detect attacks in network traffic.This paper proposes a new hybrid method for intrusion detection and attack categorization.The proposed approach comprises three steps to address high false and low false-negative rates for intrusion detection and attack categorization.In the first step,the dataset is preprocessed through the data transformation technique and min-max method.Secondly,the random forest recursive feature elimination method is applied to identify optimal features that positively impact the model’s performance.Next,we use various Support Vector Machine (SVM) types to detect intrusion and the Adaptive Neuro-Fuzzy System(ANFIS)to categorize probe,U2R,R2U,and DDOS attacks.The validation of the proposed method is calculated through Fine Gaussian SVM (FGSVM),which is 99.3% for the binary class.Mean Square Error(MSE) is reported as 0.084964 for training data,0.0855203 for testing,and 0.084964 to validate multiclass categorization.

    Keywords: Network security;intrusion detection system;machine learning;attacks;data mining;classification;feature selection

    1 Introduction

    Due to deep integration between the world and the internet,the network framework always experiences various kinds of attacks.Identification of these attacks is a technical issue and currently the area of concern these days.Intrusion violates fundamental privacy conditions,e.g.,confidentiality,integrity,accessibility,denial of services [1-3].The purpose of NIDS is to identify an intrusion on networks.They detect misuse of attempts either by a legal person or by third parties [4].Break-in security vulnerabilities,misuse of the system are attacks that the IDS can identify [5-9].Analysis of the transmitted packet in a network and through the collection of data,IDS worked [10-12].IDS is a classification problem to detect the behavior of data,either it is normal or anomalous [13,14].If network traffic is malicious,it will lie in any few of four attack categories: Denial of services,User-to-root,root-to-local,probing.

    In the research related to the intruder’s signature-based detection,activities that are not intrusive are also marked as anomalous behavior and generate false and false-positive results [15].Data set preprocessing is vital to achieving the maximum success rate through the classifier.Classifier results depend on input data.

    If input data is preprocessed,the results will be more accurate.However,it is a complex task and takes and more time [16].Pre-processing reduces data complexity,so it is easy to understand the nature of data,and data analysis will be performed more accurately.Several tools and methods are available to preprocess data,including sampling,normalization,discretization data transformation,and feature extraction.Problems that cater to data preprocessing are removing noise,replacing missing values,and inconsistency in data [17].

    The utilization of various data mining techniques and efficient NIDS is usually developed because they improve prediction performance,reduce computation time,and better understand data.The number of input variables is reduced to achieve desirable results to reduce computational modeling cost and increase performance.NSL KDD dataset has a large no of data that is needed to be filtered.Supervised and unsupervised are the two main feature selection techniques.The unsupervised feature selection technique works on finding the correlation between input variables [18,19] and ignores the target variable.Supervised feature selection removes the irrelevant features with the help of the target variable.

    Various machine learning methods are used to identify anomalies in networks,and,as a result,it helps the network administrator take the required precautions to avoid intrusion over its network.Machine learning conventional strategies are part of shallow learning and rely on inputs.Since the data requirements for classification methods differ from one another.The two categories of machine learning methods are supervised and unsupervised.Unsupervised machine learning methods have been proven to be the most powerful in an anomaly-based intrusion detection system.Machine learning systems are composed of several computing layers and learn various data representations with several abstraction levels that fall in deep learning classes.

    SVM1https://towardsdatascience.com/support-vector-machine-introduction-to-machine-learning-algorithmscan be used for classification and works by finding a hyperplane in N-dimensional space that separates n classes.Hyperplanes are of any possible type chosen to separate two different class data points a finding a hyperplane with maximum margin results in better accuracy.Data points closer to the hyperplane influence its position and orientation and are named support vectors.In the NSL-KDD dataset,there are 42 features,so it is pretty complex to draw it.The classifier’s margin is maximized with these support vectors’help,and they helped build an SVM.SVM works on the output of a linear function.If the output of a function is 1,it will classify to one class;if it is-1,then it will classify to other classes.

    Fuzzy logic works on the methodology of human decision-making.As the word fuzzy refers to vague things,so it deals with vague and imprecise information.Fuzzy logic2https://www.tutorialspoint.com/fuzzy_logic/fuzzy_logic_introductionis based on fuzziness instead of Boolean Logic that only results in true or false.The adaptive neuro-fuzzy inference system resembles artificial neural networks (ANN).For capturing the benefits of ANN and fuzzy in a single framework,it integrates principles of both techniques.Fuzzifier takes input and assigns a linguistic variable.If-then rules are defined in the rule base block.Rules have instructions on how to deal with different variations in data.Defuzzifier will convert data into the same category at which it came in the input.

    (A)Problem Statement

    Due to deep integration between the world and the internet,the network framework always experiences various kinds of attacks.Identification of these attacks is a technical issue and currently the area of concern these days.Intrusion violates fundamental privacy conditions,e.g.,confidentiality,integrity,accessibility,denial of services.The purpose of this research is to identify an intrusion on networks.

    B.Contribution

    Therefore,this paper makes the following contributions:

    · Propose an Adaptive Decision Support System for Network Intrusion detection using SVM and ANFIS(hybrid) model combined with feature selection.

    · Dataset is preprocessed through data transformation technique and min-max method.Secondly,Random Forest-recursive feature elimination method is applied to filter the dataset and identify optimal features that positively impact the model’s accuracy.

    · Next,SVM is used to decide the decision class,and the ANFIS is to detect probe,U2R,R2U,and DDOS attacks in network traffic.

    · The validation of the proposed method calculated through FGSVM is 99.3% for the binary class and MSE of 0.084964 for training data,MSE of 0.0855203 for testing,and MSE of 0.084964 for validation of multiclass in NSL-KDD data.

    The remaining part is composed in the following manner.Section II presents the related work.Furthermore,Section III presents the proposed methodology.Section IV presents the experiment results and analysis,and Section V presents the conclusion.

    2 Related Work

    No machine learning approaches have been used in prior studies.The compilation of data sets and their interpretation influence the success of the IDS.A similar data set is used for testing and training,which made difficult real-time intrusion detection.The author in [16] proposed selecting elect features from the NSLKDD data set through the correlation feature selection subset evaluation method.They then evaluate the performance by comparing their results with selected features without selecting features from the data set.According to research [17],a hybrid model in which optimal features from network transaction data are trained,and intrusion scope threshold degree can be estimated.Their proposed hybrid approach has a significant effect on algorithm time and complexity.According to [20],the author presented recurrent neural network techniques,does intrusion detection.They measure the performance of the proposed approach in both multiclass and binary class classification.They relate their suggested solution to the J48,the artificial neural network,and the random forest and support vector machines.

    According to research [21],the authors analyze six classifiers on the NSL-KDD data set.They detect normal and anomalous by using,Decision tree na?ve bayed,Ada boost MLP,Random forest,and SVM classifiers and implement them in python by using the spirit library.They achieved the largest accuracies from MLP 100%,and the decision tree is 98%.The authors in [22] show how to choose an appropriate classifier by testing different classifier results.Likewise,according to research [23],MLP detects the proposed recent multilayer perceptron(MLP) network system Artificial bee colony and fuzzy clustering process,irregularities in network traffic as MLP is trained using the ABC algorithm.The Sim Cloud was used as a tool and the NSL-KDD dataset.They describe the root mean square and say the absolute error as the evaluation criteria.According to the author in research [24],a hybrid solution was suggested,incorporating a synthetic minority oversampling method,a cluster sample,and the nearest neighbor.Data is preprocessed using the Leaving One Out Process.They have used the NSL-KDD dataset,and their analysis increases the Precision of U2R and R2Las identification relative to the base paper they use.According to the author in [25],a method unit uses statistical processing to detect intrusion traffic.These systems are designed inside a plan,and these models are intended to identify rare occurrences of intrusion.According to research [26],the author developed a hypervisor detector that detects anomalies in a cloud environment at the hypervisor layer.They deploy a neuro-fuzzy system to detect anomalies in a network with a hybrid backpropagation algorithm.

    According to research in [27] author discussed their work;a Wrapper Based Feature Extraction Unit (WFEU) is used to propose a Feedforward Deep Neural Network (FFDNN) wireless IDS system.UNSW-NB15 and the AWID intrusion detection datasets are used to find the effectiveness and efficiency of the WFEU-FFDNN.WFEU generates an optimal feature vector consisting of 22 attributes in the instance of the UNSW-NB15.Their approach achieved an overall accuracy of 77.16% for multiclass and 87.10% for the binary class using this input vector.Similarly,A reduced input vector of 26 attributes was generated by the WFEU in the instance of the AWID,and the experiments demonstrated that our method obtained overall accuracies of 99.6% for binary and 99.77% for the multiclass classification configurations.Authors in [28]proposed work for IDS.A wrapper feature selection algorithm to binarize a continuous pigeoninspired optimizer is presented.Compared to the traditional way for binarizing continuous swarm intelligent algorithms,the algorithm’s performance was compared to the conventional method for binarizing continuous swarm intelligent algorithms,using three popular KDDCUP99,NLSKDD,and UNSW-NB15 datasets.According to research [29],the author discussed their work;new network architecture software-defined networking (SDN) appeared to address these challenges and provides distinctive features to cope with organizational business needs.A machine learning approach is used to design the IDS of SDN.To achieve better efficiency and accuracy,a deep learning approach is also being explored.DS as a security solution is explained to explain the SDN with its security concerns.

    The author in research [30] discusses bout the security threats by the keynotes.They proposed an AlphaLogger,which is based on an android application.It typed alphabets keys by a soft touch.They use hardware sensors in smartphones to make the application more effective,with a 90.2% accuracy rate.The author in [31] represents an approach for detecting Botnet Attacks at the initial stage.The proposed scenario used machine learning algorithms for detection and compared the decision tree,PNN,SMO,and Adaboost classification technique.The author in [32],a hybrid approach has been used to defend an android application from malware attacks.This research is based on a comparison of deep learning classification techniques that studies its performance and accuracy rate.

    The authors in [33] provided a deep analysis of the phishing attacks by covering machine learning,deep learning,hybrid learning,and a similar scenario-based approach to make the root cause of the attack more comprehensive.Likewise,the research [34] proposed a method for intrusion detection in the vehicular module.The study is based on the combination of CNN framework and GRU-based attention named CANintelliDS.The proposed model achieved a 10.79% intrusion testing rate.The author in [35] presented an AI-based efficient complexity solver that has been proposed,which can help many engineers.It can also be helpful for IoT infrastructure and environment for automatic applications line Healthcare systems and smart stations for monitoring.Tab.1 represents the previous work on many datasets for classification,clustering,increasing efficiency,cost-effectiveness,and many more.

    Table 1:Relevant literature review

    3 Proposed Framework

    This section describes the proposed approach for network intrusion detection.In this work,the hybrid approach SVM with ANFIS is applied for effective detection.Fig.1 shows the proposed approach.

    Figure 1:Proposed approach for intrusion detection

    3.1 Dataset Selection

    DARPA99 is the first data set created for the intrusion detection system at Lincoln laboratory in 1998.KDD99is the enhanced version of DARPA.Since the elimination of duplicate records in the KDD99 set of data has a substantial effect on the output of NSL-KDD [26] systems,the data set is considered a standard for the identification of Trespass in organizational structures.The usage of the NSL-KDD data set has the following benefits.Fig.2 is a Visualization of some attributes of the NSL-KDD Data Set.

    · Results are not biased because the train data set have no redundant records.

    · Significant degradation rates owing to the lack of redundant information in the test sample.

    · The chosen record is inversely proportional to each particular class category in the original KDD data collection.

    3.2 Dataset Preprocessing

    Data preprocessing is an important task to achieve accurate results through classifiers.Preprocessing of the original NSL-KDD data set is performed in MATLAB,which renders it an acceptable input to the classifier.Various data preprocessing techniques are available,but we use the following: Dataset Transformation and Dataset Normalization.

    a) Data Transformation

    In data transformation of nominal features to numeric value has been done.All the categorical values of attributes are transformed into numeric form.We assign random numbers to them.NSL-KDD Train 20% data set to have approximately 25192 Connection instances.Each connection instance has 42 features,including attack type.Value to the target class has also been assigned in the same way.Zero is set for the normal class,and one will be for attack or any other deviation.

    b) Data Normalization

    Data set normalization is necessary when we have a large dataset that includes thousands of rows in training and testing files.The NSL-KDD dataset is large,so for accurate results of the classifier for intrusion detection.In this paper,we used the Min-Max method for the normalization of the dataset.

    3.3 Feature Selection

    Feature selection techniques are built to eliminate the number of input variables that are considered most appropriate for the model to predict the target variable.Random Forest (RFRFE) is a machine-learning approach that could be perfect for integrating omics data commonly works well for high-dimensional problems and can classify strong predictors of a given outcome without making assumptions about the underlying model.Tree considers a different subset of randomly selected predictors,of which the best predictor is selected and split on at each node.In recursive features,elimination features are rank according to their importance score in a particular context.The significance of each feature is calculated at each iteration,and features with less importance are eliminated.Over a different subset of features,the importance of the same 46 feature can significantly vary while f evaluating highly correlated features.Protocol-type,loggedin,error-rate,srv-s error-rate,same-srv-rate are the features that are selected after applying the RF-RFE method.

    3.4 Classification Process

    SVM is a statistically supervised machine learning method that has been commonly used in the last few years.Classifies data inputs to various groups by creating a hyperplane.To conduct binary classification on data,SVM used a large dimensional space to figure out the hyperplane.The goal of optimizing the separation margin between the two groups is to find a hyperplane.SVM is used to identify input features into two distinct normal and attack classes.A line hyperplane separates a two-dimensional linearly separable input training data.The general function for the line is one Eq.(1):

    By replacing x with y1 and Y with y2 in 1 so we get Eq.(2):

    If we define Y=(y1,y2) and c=(a,-1) so 2 become Eq.(3):

    The data points above on the hyperplane consider class [+1],and the points that are smaller from the hyperplane are considered class [-1],shown in Eq.(4):

    The function of the hypothesis is in Eq.(4) h (yi).When the hyperplane is constructed,it makes predictions using the Eq.above.

    ANFIS is the second technique used in this process,based on the Takagi-Sugeno-fuzzy inference system.Due to the overlapping values among the pattern,ANFIS helps to check the dataset to eradicate vagueness.It will test the uncertainty between probe,U2R,DDOS,and R2U patterns,and their fuzziness will be eliminated.Input and output are two vectors that are used to train ANFIS.Premise functions for membership function may be identified using only a training dataset.

    Let us assume that ‘a(chǎn)’and ‘b’are two input values for fuzzy and ‘c’output.Two basic if-then rules for the first-order Sugeno model are followed by Eqs.(5)-(8):

    Rule1: If a is A1 and b is B1 then,f1=p1a+q1b+r1

    Rule2: If a is A2 and b is B2 then,f2=p2a=q2b=r2

    Layer 1: Each nth node throughout the layer is just an adaptive node,and the node function in the layer is O1;n seems to be the output node in layer 1.

    In Eqs.(9) and (10),a,b are the inputs to node ith node at layer 1.Ai and Bi are the linguistic variables.

    ai and ci are the parameters in 15 is set with the change in these values bell shape function also changes.Layer 2: Each node within that layer is labeled as ANFIS,and the fixed node output is created by taking the product of all the coming signals as shown in Eq.(12):

    The output of each node represents a rule firing strength.

    Layer 3: The ratio of nth rule n firing power to the total of all rules firing power is measured at the nth node,and the output at layer 3 is often referred to as normalized firing power in Eq.(13).

    Layer 4: At layer 4,each node n is an adaptive node with the function of the b node.

    In pn,qn,rn in Eq.(14) are the corresponding parameters that are placed.

    Layer 5: The cumulative output shown in Eq.(15) is determined by summing up all incoming signals within layer 5.

    4 Experimental Analysis and Results

    First data is categorized into two distinct normal and attack classes by using the FGSVM classifier.Compared with other traditional classification techniques,FGSVM gives the best accuracy in the classification of data with fine-tuning.Thus,nonlinear separation can be accomplished in the feature space as the FGSVM discovers a hyperplane in the portion space.

    4.1 Performance Measures

    FGSVM detects the attack and normal classes in the NSL-KDD dataset with the help of classification techniques so,accuracy,recall Precision,and F-score are performance metrics.Tab.2 showed some accuracy measure and their description.Tab.3 shows the terms to visualize the performance of the confusion matrix of Fig.3.A prediction summary of results on the classification problem is given in the confusion matrix.The numbers of true and false predictions done by the classifier are summarized with count values.Fig.4 shows the ROC curve.Recall or the true positive rate is how many true positives attack classes get predicted from all the dataset’s network records.It is sometimes also called sensitivity.Recall The false-positive rate is a plot against the true positive rate in the receiver operating curve.A model’s accuracy based on recall and Precision can be measure by finding an f-score.The usefulness of the test is compared by using the ROC curve.

    Table 2:Performance analysis of the proposed work

    Table 3:Terms to visualize performance of confusion matrix

    Figure 3:Confusion matrix

    Figure 4:ROC curve

    Accuracy given in Tab.3 is how particular classification techniques perform well at a classification of data.FGSVM gave 99.3% accuracy in the classification of data into the attack and normal class.A recall is a total number of correctly classified positive data divided by the entire positive data.The higher the value of recall higher the accuracy rate of the predicted class.The Recall value which is attained in the FGSVM model is 0.992%.The Precision shows that the positive values in data after classification are labeled as positives.The Precision of FGSVM is 0.99% which shows 99% of data is accurately classified as attack class.Precision and sensitivity weighted average is measure in F-measure.Classified abnormal Patterns are separated from the dataset,and the feature selection method is applied before input data to fuzzy.RF-RFE method is used to select essential predictors from the dataset.Fig.5 represents the predictors according to their importance by constructing many decision trees.Features are ranked according to their importance scores attained after running RF once.After running it recursively,feature importance is measured,and the less relevant one is removed at each iteration.The most relevant features that are selected are protocol-type,logged-in,error-rate,SRV-error-rate,same-SRV-rate.

    Figure 5:Features ranking based on their importance

    4.2 Implementation of ANFIS

    Data is classified into normal and attacked classes using fine Gaussian SVM.To deal with computational uncertainty,ANFIS is used,which includes the degree of truthiness instead of conventional Boolean Logic.Fig.6 shows the ANFIS structure to eliminate the inherent fuzziness of the patterns classified through SVM.ANFIS is used for the exact identification of probe,U2R,R2U,and DDOS.We have used 20% of the dataset as training data,test 21% for testing,and kept 15% for checking.Finally,the exact identification results can be seen through the surface viewer that illustrates the significance of two input variables and their effect on output in Fig.7.

    Figure 6:Fuzzy inference system

    Figure 7:Surface viewer

    4.3 Fuzzy Rules

    The rule base seems to be the characterizing aspect of the fluffy reasoning approach,and the Precision and quality of the methodology depend on the fluffy criteria.Some of the rules that are specified for detecting attacks are as followed in Tab.4:

    (1) If (protocol-type is high) and (logged-in is medium) and (error-rate is high) and (SRVerror-rate is medium) and (same-SRV-rate is medium) then (AttackType is DDOS) (1)

    (2) If(protocol-type is high) and (logged-in is medium) and (serror-rate is high) and (srv-serrorrate is high) and (same-srv-rate is low) then (AttackType is DDOS) (1)

    (3) If (protocol-type is medium) and (logged-in is high) and (serror-rate is high) and (srvserror-rate is medium) and (same-srv-rate is medium) then (AttackType is U2R) (1)

    (4) If (protocol-type is medium) and (logged-in is medium) and (serror-rate is low) and (srvserror-rate is medium) and (same-srv-rate is high) then (AttackType is U2R) (1)

    (5) If (protocol-type is medium) and (logged-in is low) and (serror-rate is high) and (srv-serrorrate is medium) and (same-srv-rate is medium) then (AttackType is R2L) (1)

    (6) If (protocol-type is high) and (logged-in is medium) and (serror-rate is medium) and (srvserror-rate is high) and (same-srv-rate is high) then (AttackType is R2L) (1)

    (7) If (protocol-type is high) and (logged-in is medium) and (serror-rate is medium) and (srvserror-rate is high) and (same-srv-rate is high) then (AttackType is R2L) (1)

    (8) If (protocol-type is medium) and (logged-in is medium) and (serror-rate is low) and (srvserror-rate is medium) and (same-srv-rate is low) then (AttackType is Probe) (1)

    (9) If (protocol-type is low) and (logged-in is high) and (serror-rate is medium) and (srv-serrorrate is medium) and (same-srv-rate is high) then (AttackType is Probe) (1) These are one of few rules out of 46 that are defined in fuzzy to detect either the coming traffic is normal or malicious.

    Table 4:Ranges of MF for input variables

    The proposed technique’s findings were addressed in this segment utilizing the alternative (hybrid)solution to identifying attack identification in an organization that has been carried out.One of the main obstacles to the current solution is to identify data and then detect attacks accurately.Preprocessing on dataset increase SVM accuracy rate,and the SVM accuracy rate for classification of the NSL-KDD dataset is 99.3%.

    5 Conclusion

    In this research,a detection system is projected on the NSLKDD dataset by applying data transformation and maximization and minimization methods.FGSVM is used to classify the NSLKDD dataset into two classes normal class and attack class.Substantial results obtained from FGSVM have shown 99.03% to identify DDOS,probe,U2R,and R2L.FGSVM identified abnormal patterns are stimulated through ANFIS.According to their importance scores and prediction role,five features are selected for training,testing,and validation procedures of ANFIS.Error tolerance and epochs are set from zero and 100.During training,the MSE is 0.08523,and on testing and validation,the MSE is 0.08496,which reflects reasonable accuracy rates for the precise identification of DDOS,Probe,R2U,and U2R.To find out the intrusion and to prevent the network from it,ANFIS quickly build previously extracted connections and record-based measures as it is a rule-based method.FGSV‘M and ANFIS can be robust potential solutions that significantly boost their efficiency as more machine learning.In the future,deep learningbased classifiers are available to classify data and make systems more accurate and cost-effective.Advanced machine learning and AI-based systems are improving in intrusion detection with a higher accuracy rate.

    Acknowledgement: The authors would like to thank the Deanship of Scientific Research at Prince Sattam bin Abdul-Aziz University,Saudi Arabia.

    Funding Statement: The authors would like to thank the Deanship of Scientific Research at Prince Sattam bin Abdul-Aziz University,Saudi Arabia.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    国产高清三级在线| 亚洲内射少妇av| 亚洲av第一区精品v没综合| 在线看三级毛片| 特级一级黄色大片| 国产精品一及| 动漫黄色视频在线观看| 欧美三级亚洲精品| 国产高清视频在线播放一区| 在线国产一区二区在线| 日本一本二区三区精品| 亚洲国产色片| 亚洲av日韩精品久久久久久密| 亚洲真实伦在线观看| 欧美一级a爱片免费观看看| 99久久成人亚洲精品观看| 狂野欧美白嫩少妇大欣赏| 欧美日韩福利视频一区二区| 日本一二三区视频观看| 午夜精品在线福利| а√天堂www在线а√下载| 一区二区三区免费毛片| 天天躁日日操中文字幕| 国产精品爽爽va在线观看网站| 观看美女的网站| av在线天堂中文字幕| 桃红色精品国产亚洲av| 国内精品久久久久久久电影| 女人被狂操c到高潮| 国产高清videossex| 蜜桃久久精品国产亚洲av| 国产精品 欧美亚洲| a级一级毛片免费在线观看| 成年版毛片免费区| 亚洲中文字幕一区二区三区有码在线看| 亚洲国产精品999在线| 最新中文字幕久久久久| 国产一区二区在线av高清观看| 97人妻精品一区二区三区麻豆| 国产一区二区三区视频了| 手机成人av网站| 亚洲一区二区三区不卡视频| 欧美大码av| 欧美中文综合在线视频| 精品久久久久久久久久久久久| 亚洲人成网站高清观看| 久久久久久久久中文| 国产精品一区二区三区四区免费观看 | 亚洲一区二区三区不卡视频| 非洲黑人性xxxx精品又粗又长| 国产成人av教育| 精品无人区乱码1区二区| 操出白浆在线播放| av女优亚洲男人天堂| 69av精品久久久久久| 亚洲av电影在线进入| 制服丝袜大香蕉在线| 国产精品三级大全| 欧美成人a在线观看| 97超级碰碰碰精品色视频在线观看| 真实男女啪啪啪动态图| 国产成+人综合+亚洲专区| 真实男女啪啪啪动态图| 亚洲欧美精品综合久久99| 97超视频在线观看视频| 婷婷六月久久综合丁香| 每晚都被弄得嗷嗷叫到高潮| 国产爱豆传媒在线观看| 精品人妻偷拍中文字幕| 日韩欧美国产一区二区入口| 午夜福利18| 搡老岳熟女国产| 少妇丰满av| 亚洲激情在线av| 国产精品精品国产色婷婷| 丰满的人妻完整版| 国产精品av视频在线免费观看| 美女免费视频网站| 亚洲精品粉嫩美女一区| 九九热线精品视视频播放| 日韩av在线大香蕉| 国内毛片毛片毛片毛片毛片| 亚洲精品久久国产高清桃花| 天美传媒精品一区二区| 桃红色精品国产亚洲av| 欧美中文日本在线观看视频| 成人一区二区视频在线观看| 国产免费男女视频| 12—13女人毛片做爰片一| 精品久久久久久,| 变态另类丝袜制服| 男女视频在线观看网站免费| 女人被狂操c到高潮| 欧美精品啪啪一区二区三区| 丰满的人妻完整版| 日韩亚洲欧美综合| 欧美绝顶高潮抽搐喷水| 久久中文看片网| 99久久无色码亚洲精品果冻| 国产成人a区在线观看| 国产极品精品免费视频能看的| 国产成年人精品一区二区| 欧美成狂野欧美在线观看| 亚洲在线观看片| 两个人的视频大全免费| 国产精品自产拍在线观看55亚洲| 人妻久久中文字幕网| 老熟妇乱子伦视频在线观看| 亚洲精品色激情综合| 日韩亚洲欧美综合| 18+在线观看网站| 日韩欧美精品v在线| 51午夜福利影视在线观看| 欧美成人免费av一区二区三区| 国产精品乱码一区二三区的特点| 精品一区二区三区人妻视频| 国产亚洲精品综合一区在线观看| 亚洲国产欧美网| 色综合婷婷激情| 国产色婷婷99| 熟妇人妻久久中文字幕3abv| 日韩欧美 国产精品| 精品国产三级普通话版| 99国产综合亚洲精品| 欧美乱妇无乱码| 精品日产1卡2卡| 亚洲中文日韩欧美视频| 国产精品亚洲一级av第二区| 亚洲美女黄片视频| 99精品欧美一区二区三区四区| 69人妻影院| 三级毛片av免费| 国产 一区 欧美 日韩| 色老头精品视频在线观看| 波野结衣二区三区在线 | 欧美日韩亚洲国产一区二区在线观看| 亚洲成a人片在线一区二区| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 老司机午夜十八禁免费视频| 级片在线观看| 亚洲va日本ⅴa欧美va伊人久久| 嫩草影视91久久| 中文字幕人妻丝袜一区二区| 国产精品久久久久久人妻精品电影| 99热6这里只有精品| 亚洲人成网站高清观看| 国产精品1区2区在线观看.| 人人妻人人澡欧美一区二区| 日韩欧美三级三区| 国产精品久久视频播放| 18+在线观看网站| 日韩 欧美 亚洲 中文字幕| 欧美xxxx黑人xx丫x性爽| 一级毛片女人18水好多| 久久国产乱子伦精品免费另类| 欧美成人a在线观看| 天堂网av新在线| av中文乱码字幕在线| 在线观看美女被高潮喷水网站 | 可以在线观看的亚洲视频| 看片在线看免费视频| 97人妻精品一区二区三区麻豆| 成人无遮挡网站| 人妻丰满熟妇av一区二区三区| 男人舔奶头视频| 乱人视频在线观看| 一本精品99久久精品77| 91av网一区二区| 午夜老司机福利剧场| 精品一区二区三区av网在线观看| 国产av在哪里看| 精品免费久久久久久久清纯| 国产淫片久久久久久久久 | 国内少妇人妻偷人精品xxx网站| 18禁黄网站禁片免费观看直播| 男女床上黄色一级片免费看| 在线视频色国产色| 国产精品一及| 国产高清有码在线观看视频| 夜夜夜夜夜久久久久| 国产欧美日韩精品一区二区| 欧美最新免费一区二区三区 | 精品国产亚洲在线| 国产精品香港三级国产av潘金莲| 天美传媒精品一区二区| 99久国产av精品| 人人妻人人看人人澡| 欧美三级亚洲精品| 高清日韩中文字幕在线| 夜夜爽天天搞| 成人亚洲精品av一区二区| 内地一区二区视频在线| 亚洲精品在线美女| 国产精品自产拍在线观看55亚洲| 精品一区二区三区av网在线观看| 搡老岳熟女国产| 亚洲最大成人手机在线| 精品福利观看| 亚洲性夜色夜夜综合| 丰满人妻熟妇乱又伦精品不卡| 1000部很黄的大片| 91在线精品国自产拍蜜月 | 午夜亚洲福利在线播放| 久久人妻av系列| 国产精品久久久久久亚洲av鲁大| 高清毛片免费观看视频网站| 国产精品一区二区三区四区免费观看 | 人妻久久中文字幕网| 999久久久精品免费观看国产| 久久久久久久午夜电影| 精品久久久久久久久久免费视频| 男女午夜视频在线观看| 一本一本综合久久| 99久久九九国产精品国产免费| 亚洲av免费在线观看| 夜夜夜夜夜久久久久| 亚洲中文字幕日韩| 亚洲黑人精品在线| 真人做人爱边吃奶动态| 男女床上黄色一级片免费看| 国内久久婷婷六月综合欲色啪| 国产精品综合久久久久久久免费| 久久天躁狠狠躁夜夜2o2o| 麻豆一二三区av精品| 欧美bdsm另类| 国产日本99.免费观看| 亚洲中文字幕日韩| 18禁美女被吸乳视频| 国产精品一区二区免费欧美| 一级a爱片免费观看的视频| 亚洲av免费高清在线观看| 少妇熟女aⅴ在线视频| www.999成人在线观看| 午夜福利成人在线免费观看| 好男人电影高清在线观看| 欧美成人一区二区免费高清观看| 亚洲国产欧美网| 91麻豆精品激情在线观看国产| 亚洲人成伊人成综合网2020| 日韩欧美 国产精品| 天天躁日日操中文字幕| 欧美精品啪啪一区二区三区| 18禁在线播放成人免费| 日日摸夜夜添夜夜添小说| 午夜a级毛片| 国产麻豆成人av免费视频| 国产精品99久久99久久久不卡| 精品久久久久久久毛片微露脸| 丰满人妻熟妇乱又伦精品不卡| 2021天堂中文幕一二区在线观| 亚洲av免费高清在线观看| 色老头精品视频在线观看| 欧美日韩中文字幕国产精品一区二区三区| 内地一区二区视频在线| www日本黄色视频网| tocl精华| 在线a可以看的网站| 噜噜噜噜噜久久久久久91| 丰满人妻熟妇乱又伦精品不卡| 国产三级在线视频| 亚洲成人久久爱视频| 国产视频一区二区在线看| 99国产综合亚洲精品| 一级毛片女人18水好多| 亚洲精品色激情综合| 精品99又大又爽又粗少妇毛片 | 精品国产亚洲在线| 欧美黑人巨大hd| 欧美日韩国产亚洲二区| 嫩草影院精品99| 免费观看精品视频网站| 宅男免费午夜| 欧洲精品卡2卡3卡4卡5卡区| 亚洲成人中文字幕在线播放| 国产单亲对白刺激| 国产av在哪里看| 午夜精品久久久久久毛片777| 婷婷亚洲欧美| 香蕉丝袜av| 久久久久久久亚洲中文字幕 | 老鸭窝网址在线观看| 99久久99久久久精品蜜桃| 亚洲熟妇中文字幕五十中出| 日韩欧美国产在线观看| 国产精品香港三级国产av潘金莲| 99久久综合精品五月天人人| 日韩成人在线观看一区二区三区| 欧美日韩一级在线毛片| 精品不卡国产一区二区三区| 中国美女看黄片| 熟妇人妻久久中文字幕3abv| 香蕉丝袜av| 午夜视频国产福利| 变态另类丝袜制服| 99精品在免费线老司机午夜| www.色视频.com| 国产成人欧美在线观看| 久久人人精品亚洲av| 午夜精品久久久久久毛片777| 久久香蕉精品热| 成人午夜高清在线视频| 特级一级黄色大片| 欧美性感艳星| 亚洲午夜理论影院| 欧美性猛交黑人性爽| 国产探花在线观看一区二区| 天堂√8在线中文| 最新美女视频免费是黄的| 国产免费男女视频| 性色av乱码一区二区三区2| 日韩大尺度精品在线看网址| 高清日韩中文字幕在线| 高清在线国产一区| 精品国产美女av久久久久小说| 可以在线观看的亚洲视频| 亚洲一区二区三区色噜噜| 91久久精品国产一区二区成人 | 久久久久久久午夜电影| 淫妇啪啪啪对白视频| 国产不卡一卡二| x7x7x7水蜜桃| 嫩草影视91久久| 99精品久久久久人妻精品| 欧美日韩瑟瑟在线播放| 听说在线观看完整版免费高清| 美女被艹到高潮喷水动态| 18禁国产床啪视频网站| av黄色大香蕉| 亚洲片人在线观看| 欧美极品一区二区三区四区| 亚洲精品成人久久久久久| 亚洲一区高清亚洲精品| 男女午夜视频在线观看| 欧美3d第一页| 国产精品久久久久久亚洲av鲁大| 免费在线观看成人毛片| 波多野结衣高清无吗| 青草久久国产| 精品一区二区三区视频在线观看免费| 免费人成视频x8x8入口观看| 国产精品99久久99久久久不卡| 床上黄色一级片| 女人被狂操c到高潮| 免费无遮挡裸体视频| 久久久久久久久中文| 在线观看av片永久免费下载| 听说在线观看完整版免费高清| 免费观看的影片在线观看| 亚洲av电影不卡..在线观看| 亚洲成人免费电影在线观看| 久久久久久久久久黄片| 首页视频小说图片口味搜索| 国产乱人伦免费视频| 久久久久久久久大av| 亚洲欧美激情综合另类| 亚洲色图av天堂| 变态另类丝袜制服| 欧美极品一区二区三区四区| 两个人的视频大全免费| 亚洲av熟女| 国产伦精品一区二区三区四那| av国产免费在线观看| 最近在线观看免费完整版| 少妇高潮的动态图| 深夜精品福利| 在线看三级毛片| 亚洲人成网站在线播放欧美日韩| 综合色av麻豆| 欧美中文综合在线视频| 亚洲精品在线观看二区| 免费看十八禁软件| 亚洲av五月六月丁香网| 欧美成人a在线观看| h日本视频在线播放| 欧美在线一区亚洲| 白带黄色成豆腐渣| 午夜福利在线观看吧| 日本成人三级电影网站| 一本一本综合久久| 成人国产一区最新在线观看| 亚洲人成伊人成综合网2020| 在线视频色国产色| 法律面前人人平等表现在哪些方面| 精品国产三级普通话版| 中文在线观看免费www的网站| 久久久成人免费电影| 亚洲天堂国产精品一区在线| 亚洲av成人av| 日日摸夜夜添夜夜添小说| 色综合站精品国产| 国产精品99久久久久久久久| 免费搜索国产男女视频| 网址你懂的国产日韩在线| 亚洲欧美日韩卡通动漫| 波野结衣二区三区在线 | 欧美绝顶高潮抽搐喷水| 女人十人毛片免费观看3o分钟| 免费无遮挡裸体视频| 久久精品91无色码中文字幕| 欧美日韩黄片免| 99精品久久久久人妻精品| 亚洲 国产 在线| 日本撒尿小便嘘嘘汇集6| 亚洲真实伦在线观看| 国产成人欧美在线观看| 国产精品av视频在线免费观看| 尤物成人国产欧美一区二区三区| 亚洲av美国av| 免费观看精品视频网站| 黄色视频,在线免费观看| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲五月天丁香| 黄色日韩在线| 禁无遮挡网站| 亚洲精品亚洲一区二区| 国产精品久久久久久久久免 | 十八禁网站免费在线| 精品久久久久久久久久免费视频| 亚洲内射少妇av| 脱女人内裤的视频| 久久久国产精品麻豆| 国产午夜精品论理片| 亚洲av熟女| 在线a可以看的网站| 欧美乱妇无乱码| 中文字幕av成人在线电影| e午夜精品久久久久久久| av中文乱码字幕在线| 99久国产av精品| 久久婷婷人人爽人人干人人爱| 两个人看的免费小视频| 床上黄色一级片| 国产亚洲精品av在线| 18禁美女被吸乳视频| 国产精品98久久久久久宅男小说| 欧美成人一区二区免费高清观看| 在线天堂最新版资源| 久久久久九九精品影院| 国产高潮美女av| 在线观看免费午夜福利视频| 少妇人妻一区二区三区视频| 身体一侧抽搐| 亚洲国产欧洲综合997久久,| 亚洲在线观看片| 亚洲av成人av| 91麻豆av在线| 伊人久久大香线蕉亚洲五| 男女视频在线观看网站免费| 无限看片的www在线观看| 色综合站精品国产| 国产欧美日韩精品一区二区| 精品国产美女av久久久久小说| 亚洲男人的天堂狠狠| 搡老岳熟女国产| 国产成人欧美在线观看| 亚洲精品一区av在线观看| 男人和女人高潮做爰伦理| 小说图片视频综合网站| 99国产精品一区二区蜜桃av| 亚洲成av人片在线播放无| 亚洲av日韩精品久久久久久密| 美女被艹到高潮喷水动态| 久久精品综合一区二区三区| 中文字幕av在线有码专区| 久久精品国产清高在天天线| 久久草成人影院| 好男人电影高清在线观看| 欧美乱妇无乱码| 草草在线视频免费看| 少妇人妻精品综合一区二区 | 久久伊人香网站| 亚洲美女黄片视频| 欧美色欧美亚洲另类二区| 国产爱豆传媒在线观看| 久久九九热精品免费| 亚洲成人免费电影在线观看| 国产精品自产拍在线观看55亚洲| 欧美高清成人免费视频www| 乱人视频在线观看| 真人做人爱边吃奶动态| 五月玫瑰六月丁香| svipshipincom国产片| 日韩成人在线观看一区二区三区| 亚洲人与动物交配视频| 老熟妇仑乱视频hdxx| 一本一本综合久久| 久久香蕉精品热| 18美女黄网站色大片免费观看| 欧美日韩瑟瑟在线播放| 日本免费a在线| 内射极品少妇av片p| 99国产综合亚洲精品| 在线观看舔阴道视频| 天天添夜夜摸| 国产亚洲精品综合一区在线观看| 久久久久久大精品| 9191精品国产免费久久| 欧美一区二区亚洲| 内射极品少妇av片p| 99国产精品一区二区蜜桃av| 欧美日本视频| 色哟哟哟哟哟哟| 黄色视频,在线免费观看| 国产亚洲精品综合一区在线观看| 天天添夜夜摸| 欧美日韩国产亚洲二区| 亚洲av日韩精品久久久久久密| 丁香六月欧美| 十八禁网站免费在线| 亚洲在线自拍视频| 99精品欧美一区二区三区四区| 亚洲在线自拍视频| 国产av不卡久久| 成人欧美大片| 麻豆国产97在线/欧美| 国产亚洲精品av在线| 一夜夜www| 99久久九九国产精品国产免费| 一个人观看的视频www高清免费观看| 精品福利观看| 18美女黄网站色大片免费观看| av福利片在线观看| 免费搜索国产男女视频| 婷婷精品国产亚洲av| 午夜老司机福利剧场| 精品国产亚洲在线| 1024手机看黄色片| 日本黄大片高清| 精品熟女少妇八av免费久了| 欧美+亚洲+日韩+国产| 亚洲成a人片在线一区二区| 亚洲国产精品sss在线观看| 欧美极品一区二区三区四区| 九九久久精品国产亚洲av麻豆| 亚洲不卡免费看| АⅤ资源中文在线天堂| 国产毛片a区久久久久| 真人一进一出gif抽搐免费| av国产免费在线观看| 脱女人内裤的视频| 免费人成视频x8x8入口观看| 久久精品人妻少妇| 国产高清videossex| 极品教师在线免费播放| 国产视频一区二区在线看| e午夜精品久久久久久久| 精品乱码久久久久久99久播| 久久精品国产亚洲av涩爱 | 国产精品久久久久久久久免 | 亚洲av第一区精品v没综合| 精品国产亚洲在线| 99久久综合精品五月天人人| 亚洲精品粉嫩美女一区| 白带黄色成豆腐渣| 精品无人区乱码1区二区| 18禁国产床啪视频网站| 久久精品国产亚洲av涩爱 | 亚洲国产欧美网| 99riav亚洲国产免费| 婷婷精品国产亚洲av在线| 黄色丝袜av网址大全| 叶爱在线成人免费视频播放| 国产精品久久久久久久电影 | 高清日韩中文字幕在线| 又黄又粗又硬又大视频| 亚洲国产色片| 国产免费av片在线观看野外av| 91在线观看av| 久久午夜亚洲精品久久| 最新中文字幕久久久久| 免费av观看视频| 免费观看的影片在线观看| 啦啦啦免费观看视频1| 免费一级毛片在线播放高清视频| 成人无遮挡网站| 在线视频色国产色| 国产欧美日韩精品一区二区| 一区二区三区免费毛片| 色在线成人网| 国产激情欧美一区二区| 啪啪无遮挡十八禁网站| 国产男靠女视频免费网站| 精品一区二区三区av网在线观看| 丝袜美腿在线中文| av天堂在线播放| 观看免费一级毛片| 久久6这里有精品| 日韩欧美国产一区二区入口| 黑人欧美特级aaaaaa片| 日韩av在线大香蕉| 女人高潮潮喷娇喘18禁视频| 亚洲欧美日韩高清在线视频| 日本 欧美在线| 无遮挡黄片免费观看| 国产色婷婷99| 国产精品久久视频播放| 少妇人妻一区二区三区视频| 丁香六月欧美| 亚洲五月婷婷丁香| 男女下面进入的视频免费午夜| 在线播放无遮挡| 最近在线观看免费完整版| 国产精品久久久人人做人人爽| 又黄又粗又硬又大视频| bbb黄色大片| 91麻豆精品激情在线观看国产| 少妇熟女aⅴ在线视频| 午夜激情福利司机影院| 五月玫瑰六月丁香| 欧美最新免费一区二区三区 | 亚洲av成人精品一区久久| 99久久无色码亚洲精品果冻| 亚洲乱码一区二区免费版| 丁香六月欧美| 久久性视频一级片|