• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Deep Semisupervised Learning-Based Network Anomaly Detection in Heterogeneous Information Systems

    2022-11-09 08:14:00NazariiLutsivTarasMaksymyukMykolaBeshleyOrestLavrivVolodymyrAndrushchakAnatoliySachenkoLiberiosVokorokosandJurajGazda
    Computers Materials&Continua 2022年1期

    Nazarii Lutsiv,Taras Maksymyuk,*,Mykola Beshley,Orest Lavriv,Volodymyr Andrushchak,Anatoliy Sachenko,Liberios Vokorokos and Juraj Gazda

    1Lviv Polytechnic National University,Lviv,79013,Ukraine

    2West Ukrainian National University,Ternopil,46009,Ukraine

    3Technical University of Kosice,Kosice,04200,Slovakia

    Abstract: The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels.With the massive number of connected devices,opportunities for potential network attacks are nearly unlimited.An additional problem is that many low-cost devices are not equipped with effective security protection so that they are easily hacked and applied within a network of bots (botnet) to perform distributed denial of service (DDoS) attacks.In this paper,we propose a novel intrusion detection system (IDS) based on deep learning that aims to identify suspicious behavior in modern heterogeneous information systems.The proposed approach is based on a deep recurrent autoencoder that learns time series of normal network behavior and detects notable network anomalies.An additional feature of the proposed IDS is that it is trained with an optimized dataset,where the number of features is reduced by 94% without classification accuracy loss.Thus,the proposed IDS remains stable in response to slight system perturbations,which do not represent network anomalies.The proposed approach is evaluated under different simulation scenarios and provides a 99% detection accuracy over known datasets while reducing the training time by an order of magnitude.

    Keywords: DDoS;deep semisupervised learning;cybersecurity;anomaly detection

    1 Introduction

    Cybersecurity has always been a key part since the very beginning of the development of information and communication technologies.With the rapid proliferation of the Internet of Things (IoT),cybersecurity is becoming increasingly important because large volumes of personal data widely circulate in modern information systems.To this end,there are many technical solutions that aim to detect malicious behavior within a network.However,the continuous improvement on the attacker side has encouraged researchers and network equipment manufacturers to develop new advanced solutions,which handle new potential threats.Modern network attacks occur when malicious traffic is masqueraded as typical network traffic,which remains undetected via a brief overview of packet headers.Therefore,most current intrusion detection systems (IDSs) are based on deep packet inspection (DPI),which allows deep examination of the packet payload and identification of the corresponding application layer service [1-3].Despite the widespread use and great potential of DPI,this approach exhibits certain important limitations.First,DPI effectively detects known intrusions but easily fails to detect new intrusions.Second,attackers may even exploit DPI as a tool to perform malicious actions.Third,DPI adds more complexity to existing firewalls,which requires continuous updates to maintain a good performance.Finally,DPI is very slow in modern networks due to the limitation of the packet processing time.Recent studies have indicated that DPI works well if the data rate of incoming traffic reaches up to 1 Gbps.At higher data rates,modern DPI tools start to discard packets.For example,at a data rate of 10 Gbps,DPI discards approximately 20% of packets.Studies have shown that hardware acceleration through parallel DPI processing may provide a data rate up to 4 Gbps without any loss via field programmable gate arrays and up to 7.2 Gbps via application-specific integrated circuits [4,5].

    Nevertheless,with the widespread deployment of 5G networks,10-Gbps data rates can be expected for single small cells,which indicates data rates of several terabits per second via the transport network [6-8].At these data rates,even the most effective DPI solutions cannot be effectively scaled to provide the required tradeoff between service quality and security.Therefore,most recent studies have focused more on artificial intelligence (AI)-based techniques,which detect certain anomalies of data flows and prevent attacks without deep inspection of each packet.Among all AI-based solutions,the most promising are those based on deep learning,or more specifically deep neural networks [9-12].A detailed survey of existing solutions based on deep learning was reported in [13].Most modern solutions based on deep learning attain an accuracy higher than 90% in the detection of the most common network attacks.However,there is no simple solution among the various existing solutions that can be effectively applied under all network scenarios and types of attacks.Therefore,further research is needed to gain more insights into the proper selection of deep learning models for each particular cybersecurity problem.One of the main limitations of current systems is that they require extensive training over large datasets,which is not always feasible in real work applications.

    In this paper,we propose a new IDS based on deep learning,which is founded on a deep recurrent autoencoder that allows learning adequate network behavior and detection of any anomalies without extensive training over large datasets.The key feature of the proposed IDS is optimal feature extraction to reduce the computational complexity and improve the detection of previously unknown attacks.The proposed model may be implemented either as a standalone solution or as a part of a more complex IDS with other deep learning and DPI models.The performance of the proposed model is tested on different datasets in terms of distributed denial of service (DDoS) attacks.

    The remainder of this paper is organized as follows.Section 2 surveys the most recent AIbased IDS solutions.Section 3 describes the proposed IDS solution based on the deep recurrent autoencoder.Section 4 provides the simulation results and performance evaluation of the proposed model.Finally,we conclude the paper in Section 5.

    2 Recent Related Research on Existing AI-Based IDS Solutions

    2.1 Basic Requirements of DDoS Detection in Modern Information Systems

    DDoS attacks occur when malicious users infect a massive number of network nodes and turn them into networks of bots (botnets),which send numerous packets to a target victim server [14].DDoS attacks have been known for quite a long time,and we have observed tremendous growth in both the attack power and detection abilities of IDSs [15,16].With the current development of the IoT and the corresponding exponential growth of the number of devices connected to the Internet,attackers have more opportunities to deploy massive botnets composed of IoT devices [17-19].Considering that most of these devices are usually low-cost devices and not well protected,in the foreseen future,we can expect notable attacks from different IoT devices,such as smart kettles or home thermostats.Therefore,despite the many studies conducted over the last decade,IDS development against DDoS attacks remains of great interest.

    Most existing IDSs exhibit a modular architecture that allows continuous updates and swift implementation of new features [20-24].In a modular architecture,a separate module is created for each data-particular IDS task with corresponding methods and data structures.The major limitation of the modular architecture in the modern IDS is the problem of dependency between the different modules and compatibility issues.Any change in program code results in updates of all related modules.Therefore,most IDSs are designed in a way that allows the implementation of new features with a minimum change in the whole system.

    The key challenge in the detection of modern DDoS attacks is that they usually do not contain common revealing attributes.The distributed nature of attacks does not allow their proper tracing nor determination of the identity of the attacker.Moreover,the large variety of connected devices with different types of connections and levels of security introduces an additional degree of uncertainty into the DDoS attack process.

    Therefore,so far,we have observed a growing interest in machine learning-based solutions for DDoS attack detection and prevention purposes.In general,machine learning for attack detection can be implemented as follows:

    · Supervised classification requires a training dataset with labeled classes of normal and anomalous system behaviors [25-27].

    · Unsupervised or semisupervised clustering requires only a training dataset of normal system behavior to form a corresponding cluster.Then,any event sufficiently different from the previously learned cluster is considered anomalous system behavior [28,29].

    In practical IDS applications,both aforementioned cases have usually been implemented to improve the detection capability.In the following section,we cover the recent related research on machine learning and AI approaches to DDoS attack detection.

    2.2 Recent Related Research on AI-Based DDoS Detection

    The advantage of AI-based detection systems is their ability to learn based on collected statistical information and accordingly modify detection rules without human input [30].Many different AI-based methods for DDoS attack detection have been developed so far based on various machine learning models.

    In [31],the authors proposed calculation of the packet score,upon which packets were discarded based on the Bayesian theoretic grade.In [32],a Bayesian inference prototype was applied in trust agreement among access routers to detect malicious routers.In [33],the authors presented a real-time DDoS attack detection method based on a naive Bayesian classifier of legitimate and malicious network packets and a signature-based IDS for attack detection.In [34],a signature-based IDS was proposed to identify DDoS attacks on HTTP servers.The proposed system adopted a naive Bayesian classifier,which achieved a detection accuracy up to 98%.Nevertheless,the proposed approach was useful only against low-rate DDoS attacks.

    Different models based on fuzzy logic function well when there is a need to analyze a large number of input parameters,such as the CPU load,traffic rate,and connection time [35].In [36],the integration of fuzzy logic with cross-correlation was proposed to improve the detection precision.However,the proposed system failed in regard to real-time detection due to its timeconsuming calculations.Real-time DDoS detection was achieved by Wang et al.via the application of fuzzy logic in Hurst factor analysis [37].Another recent study has proposed a reliable DPI method for anomaly detection via Hurst factor calculation considering different time frames [38].Authors have proposed threshold boundaries for the Hurst factor considering different timeframes to prevent false detection/misdetection of anomalous traffic.

    In [39],the authors proposed a method for the advanced detection of DDoS attacks by using the K-nearest neighbor method of traffic classification.Their approach is suitable for the initial detection phase because it considers only traffic variation.In [40],a more comprehensive model was developed considering different types of DDoS attacks.The proposed model achieved an accuracy ranging from 40-70% depending on the attack type.

    In [41],a new DDoS attack detection model based on several support vector machines(SVMs) was established.The authors analyzed the traffic attributes of attacks and achieved a high precision of early anomaly detection.Another SVM-based approach was proposed in [42] in regard to attack categorization.The authors adopted a two-step approach to initially recognize anomalous traffic and then performed a detailed classification of the attack type.

    Over the last few years,deep learning methods for DDoS attack detection have gained attention due to their promising outputs in many other tasks.Deep learning models based on different types of neural networks provide better results than those yielded by basic signature testing methods [43].In [44],the authors proposed a time delay neural network as an early DDoS detector.The proposed model employed a layered architecture to implement appropriate actions against DDoS attacks with an 82.7% accuracy.

    In [45],the authors mapped attributes of the neural network to recognize DDoS attacks based on traffic monitoring with a software-defined network (SDN) controller.Another SDN-based approach was proposed in [46] via multivector deep learning-based DDoS detection.However,the major drawback of both methods is that they struggle in the detection of low-rate attacks,usually considered legitimate traffic.

    A very promising research direction was reported in [30],where the authors developed a multilevel anti-DDoS framework for the IoT and cloud environment.The authors considered a typical state-of-the-art structure comprising intelligent IoT edges,fog computing and cloud computing levels.This framework was demonstrated to effectively neutralize DDoS attacks by exploiting early detection at IoT edges,local state analysis in the fog and powerful big data analytics in the cloud with deep learning tools.

    2.3 Existing Challenges of AI-Based Network Anomaly Detection

    The main advantage that drives the popularity of machine learning-based IDSs is their ability to quickly adapt to changes in the network environment.Modern heterogeneous information systems contain numerous available degrees of freedom that they do not allow us to predict all potential vulnerabilities in DDoS attack deployment and manually hardcode required security mechanisms.Summarizing the abovementioned related research,we conclude that AI-based methods overcome the limits of statistical approaches,which are based only on statistical parameters.While smart attackers may easily adjust the statistical properties of DDoS traffic,thereby rendering them undistinguishable from legitimate traffic,they are still unable to determine how many other latent attributes can be learned by deep neural networks.Nevertheless,an important challenge remains involving the training time and data availability for AI-based IDSs [47].

    Considering the real-time detection requirements and lack of time required for training over new possible attacks,it is important to extract the most important features of network traffic.By learning the most important features of network traffic,we can finely tune the deep learning model on normal system behavior so that potentially new attacks are easily detected by the IDS.Another advantage of optimal feature selection is that the computational complexity of detection is reduced and that the IDS is more compatible with real-time operation.To our knowledge,optimal feature extraction currently lacks attention in recent research of AI-based network anomaly detection.Therefore,further development of deep learning-based IDSs leveraging advanced feature extraction and optimization is of great interest for modern heterogeneous information systems.

    3 Proposed Semisupervised Intrusion Detection System Based on a Deep Recurrent Autoencoder

    3.1 System Model

    Usually,deep learning-based solutions for DDoS attack detection are based on supervised learning over a large dataset of known attacks mixed with normal network traffic.These datasets consist of input parameters,which are passed to the deep neural network and output labels are targeted so that the model can learn any hidden dependencies between the input and output.During training,the neural network evaluates the input features and predicts the output values.The output values are then compared to target values,and the corresponding loss function is calculated.With each iteration of the training process (epoch),the weight between neurons is updated to reduce the loss function.This training process continues until the loss function is minimized to an acceptable threshold.

    However,supervised learning alone is not feasible for modern IDSs because there are many possible attacks with different features,which renders the training process computationally expensive and time consuming.Therefore,most recent research works have applied autoencoders in IDSs and obtained promising outputs [48,49].An autoencoder is an unsupervised learning technique that uses neural networks for the so-called task of representation learning [50].The key function of the autoencoder is data dimensionality reduction so that hidden structures within the data can be discovered and represented as a compressed form.The important aspect of training an autoencoder for DDoS attack detection is to ensure that its learned compressed latent space representation comprises meaningful attributes of the input network traffic.The above compressed representation can be learned by limiting the number of neurons in the hidden layers so that the deep neural network is forced to reconstruct the original traffic from a much smaller number of features (Fig.1).

    3.2 Traffic Prediction Using a Long Short-Term Memory-Based Autoencoder

    Since supervised anomaly detection systems are naturally limited only to known types of network attacks over which the AI model has been trained,in this paper,we focus mostly on semisupervised anomaly detection using the deep autoencoder.Recently,semisupervised IDSs have gained attention from the industry as a promising solution to bridge the gap in supervised models.Instead of learning numerous patterns of different network attacks,semisupervised algorithms learn the features of legitimate network traffic and treat any traffic with notable differences as an anomaly.Nevertheless,the following unsolved problems of semisupervised anomaly detection based on autoencoders remain [51-53]:

    · The complex training process of the autoencoder occurs due to the large number of traffic parameters and corresponding features,which vary over time.

    · Frequent false detections of anomalous traffic behavior may occur when a notable variation in legitimate traffic is observed in the network.

    Figure 1:General architecture of autoencoder-based representation learning of traffic features

    To tackle the aforementioned problems,we propose a preliminary feature selection approach to determine the most important parameters of network traffic and train the most fitted autoencoder model over normal network behavior within long and short timeframes.

    We adopt an autoencoder structure based on the recurrent neural network (RNN).RNNs have been widely applied for time series prediction,analysis and classification,such as natural language processing [54],stock market prediction [55],and anomaly detection [56-58].Therefore,RNNs are suitable for IDSs to learn the different features of network traffic and recognize attacks.In particular,we employ an advanced RNN model,namely,the long short-term memory (LSTM)model [59,60].The LSTM model is composed of complex cells,which allows the learning of both long-and short-term dependencies.This feature is especially useful in network traffic analysis and important feature learning in different time frames.The LSTM cell contains four main blocks:input gate,forget gate,hidden state and output gate.

    The data processing workflow with an LSTM cell is described as follows: initially,the LSTM cell filters out the less relevant features of network traffic and removes them from the cell state via the forget gate.The function of the forget gate can be expressed as follows:

    whereσdenotes the sigmoid activation function andWxfandWhfare the input and hidden state weight matrices,respectively.After the operation within the parentheses in Eq.(1),a value between 0 and 1 is determined for each feature in the previous cell state.This value is then passed through the sigmoid activation function,which outputs a value of 0 for less important information and a value of 1 for more important information.Thus,the LSTM cell forgets less important features of the traffic time series while retaining the most significant features,which reflect the currently learned network behavior.

    After filtering out redundant information,the input gate decides what information should be memorized with the following function:

    whereσdenotes the sigmoid activation function andWxiandWhiare the input and hidden state weight matrices,respectively.The output of the input gate function is processed in the same way as that of the forget gate by the sigmoid activation function.

    When the relevant traffic features have been determined,the cell state is updated with new values to replace those removed by the forget gate as follows:

    Eqs.(3) and (4) reflect the LSTM cell state update process,which thus affects the learning process of neural networks.Thereafter,the LSTM cell calculates the output and transfers it to the next cell:

    Finally,the LSTM neural network outputs the predicted traffic based on the most recently learned features.

    Thus,with the LSTM-based autoencoder,we solve the uncertainty in network traffic variation over time because the IDS can now compare the predicted traffic with the LSTM to real network traffic and make a decision regarding potentially anomalous behavior.However,the most important task is to appropriately train the autoencoder and find the best generalized traffic representation,which must be robust to small fluctuations that are still distinguishable from anomalies.The uncertainty in this task is that we must attain a tradeoff between the number of features and model performance.While it may be intuitively expected that more features provide a better performance,in reality,this is not always the case.Too many features usually result in a more complex training process and high overhead of the model,while the elimination of redundant features makes the model vulnerable to specific target attacks.

    3.3 Feature Extraction from Network Traffic via Principle Component Analysis

    We describe the process of feature extraction in detail by using the CSE-CIC-IDS2018 dataset [61].CSE-CIC-IDS2018 contains information on different attacks,such as brute-force,botnet,DDoS,web,and many other attacks on the cloud datacenters and other information systems [62].The dataset is based on the logs of 80 features,which have been extracted from captured network traffic.To improve the efficiency of AI model training,we analyze the most important features,which are associated with the high variance in classification via the gradient boosting model.As a result,we obtain the numerical output weights of features to better understand their impact on the overall classification performance.To estimate the minimal number of features required to achieve a total weight close to 1,we calculate the cumulative feature importance.According to the obtained results,the total number of required features can be reduced from 80 to 20,without a notable loss in the cumulative importance for AI-based classification.

    However,considering highly heterogeneous network traffic,which is generated by the very large number of different personal,industrial and other IoT applications,there exists a high possibility that feature weights vary over time.Thus,straightforward elimination of redundant features could result in IDS vulnerability to new types of traffic anomalies in the future.

    Therefore,in the proposed IDS model,we implement preliminary feature extraction from network traffic with the principal component analysis (PCA) algorithm [63].Similar to gradient boosting,the key idea of PCA is to realize informative visualization of each input data feature to find those features more important to the correct classification between normal network traffic and network attacks.However,the key difference of PCA is that it applies an orthogonal linear transformation of the input data to obtain a new coordinate system as follows:

    where W is a matrix of the weights of size K×K,K is the number of input traffic features,and X is a matrix of the input traffic features contained in the CSE-CIC-IDS2018 dataset.The columns of W are eigenvectors of XTX,so that each feature in matrix T is related to all features in input matrix X.

    The cumulative contribution of the output features produced by PCA to the variance score of the features is shown in Fig.2.According to the results,to maintain the total variance at 98.75%,it is enough to consider only 3 traffic features,while 5 features provide a total variance of 99.55%.

    Figure 2:Cumulative variance score of the traffic features after PCA

    The result of data clustering into benign and malicious traffic behaviors based on the 3 most important features of the CSE-CIC-IDS2018 dataset is shown in Fig.4a.For a more detailed assessment of the data clustering representation,we also apply the t-distributed stochastic neighbor embedding (t-SNE) algorithm based on the 3 most important features (Fig.3b) [64].

    Figure 3:Distribution of the benign and malicious traffic clusters based on the 3 most important features before (a) and after (b) application of the t-SNE algorithm

    As shown in Fig.3b,the benign and malicious traffic clusters are easily distinguished by using only the 3 most important features.Therefore,we can assume that these 3 features sufficiently train a robust autoencoder for network anomaly detection.The interesting result,which is observed in Fig.4,is that the benign class can be further classified into 3 different clusters.Hence,the obtained features allow us to train other AI-based traffic analyzers,which can be employed to classify different types of network services while applying the corresponding quality of service policies.However,these aspects are beyond the scope of the current paper.

    To maximize the variance score of the training dataset,we consider the top 5 most important features,which account for 99.55% of the total variance score.Note that further increasing the number of features is inefficient because 0.45% is almost evenly distributed among 75 statistically insignificant features,while the computational complexity of training exponentially increases with each additional feature.A scatter matrix of the top 5 selected features for the training dataset is shown in Fig.4.

    4 Simulations and Performance Analysis of Anomaly Detection Based on the Deep Recurrent Autoencoder

    In the previous section,we explained the key steps undertaken to prepare the dataset for training.In the current section,we describe the process of autoencoder training over the improved dataset.We train an LSTM-based autoencoder considering only the time series of benign traffic,which narrows our problem to regression instead of binary classification.Therefore,we choose a mean square error (MSE) loss function to minimize it during training [65].The MSE calculates the squared differences between the true and predicted values as follows:

    wherexis the real value andx‘is the value predicted by the neural network.

    Figure 4:Scatter matrix of the top 5 selected features for the training dataset

    The training objective is to minimize the MSE by iteratively updating the weights between the neurons (i.e.,the LSTM cells).The training process is conducted by using an optimizer algorithm that updates the weights of the neural network until the MSE is minimized.In our system,we implement an Adam optimizer,which adjusts the learning rate based on the mean and uncentered variance moments of the gradient [66].More specifically,the Adam optimizer calculates exponential moving average values of the gradient and the squared gradient and controls their decay rates by adjusting parametersβ1andβ2.

    During training,we selected 216800 samples of normal traffic behavior,while during testing,we considered 90033 samples of normal traffic behavior and 360833 samples of anomalous traffic behavior.An additional part,which contains 54001 samples,was adopted for validation to learn the model and avoid overfitting (see Tab.1).

    Table 1:Description of the training parameter distribution

    The training process was conducted over 50 epochs.The batch size was set to 100,i.e.,the weights of the neural network were updated once per 100 data samples.The result of autoencoder training over the training dataset is shown in Fig.5.The level of the decision-making error is determined by the last error value for the validation dataset,which equals 0.005.Simulation results of the anomaly detection error for the testing dataset are shown in Fig.6.

    Figure 5:Result of autoencoder training over the dataset with the optimized features

    Numerical results of the anomaly detection accuracy of the trained IDS are listed in Tab.2.According to the results,the decision accuracy to recognize a DDoS attack is 100%.However,confusion remains when recognizing normal traffic.

    Figure 6:Simulation results of the anomaly detection error for the testing dataset

    Table 2:Simulation results of the anomaly detection performance

    According to the results in Tab.2,the accuracy of normal traffic recognition is 99.97%,i.e.,21 out of 90012 normal samples are recognized as an anomaly.To assess the efficiency of dataset decomposition with the PCA algorithm,we provide an additional training cycle of the deep neural network with all 80 available features.The dataset is split into training,validation and test parts at the same proportions as those defined in Tab.1.Corresponding training results of the deep recurrent autoencoder without feature optimization are shown in Figs.7 and 8.

    According to the results shown in Fig.8,we observe that the absolute accuracy of the autoencoder trained on the dataset with all 80 features is only 0.03% higher than that of the autoencoder trained on the dataset with the optimized features (Tab.3).However,it is important to understand that this performance level is idealistic due to the limited dataset,and we should not expect a 100% accuracy in real-world deployment.However,the key advantage of the proposed approach of feature optimization is the much faster convergence and notably shorter training time.This result verifies that the proposed IDS solution achieves a better performance in real-world traffic testing.Therefore,in our further research,we will provide much deeper insights and experimental verification of the proposed solution under various scenarios of network deployment,such as fixed enterprise networks,5G mobile networks,and massive IoT deployments.A generalized flow diagram of network anomaly detection with the proposed IDS based on feature optimization and a deep recurrent autoencoder is shown in Fig.9.

    Figure 7:Result of autoencoder training over the dataset with all features

    Figure 8:Simulation results of the anomaly detection error for the testing dataset

    Table 3:Simulation results of the anomaly detection performance

    Figure 9:Flow diagram of the network anomaly detection procedure with the proposed IDS based on feature optimization and a deep recurrent autoencoder

    5 Conclusions

    In this paper,we have proposed a novel semi-supervised learning-based IDS system to detect traffic anomalies caused by DDoS attacks.The main novelty of the proposed system is in the preliminary feature extraction from the original network traffic to reduce the number of input features for the training dataset by 94%.Then,the optimized dataset is used to train the deep LSTM based autoencoder.Training has been conducted in the semi-supervised manner,i.e.,only normal traffic behavior has been used for training.Then the trained autoencoder is used to detect any traffic,which is not recognized as the learned normal behavior as an anomaly.By combination of the dataset features optimization and LSTM regression capabilities to learn time series relations,we have reduced the training time by 10 times,while losing only 0.03% of accuracy.This advantage of the proposed IDS provides a wide range of possible use cases in the real world network deployment with highly dynamic environment,such as modern 5G networks with massive number of IoT devices.

    Acknowledgement: The authors are thankful to the administration of the Lviv Polytechnic National University and the Technical University of Kosice for providing the necessary equipment to conduct this research.

    Funding Statement: This work was supported by the Slovak Research and Development Agency,project number APVV-18-0214,by the Scientific Grant Agency of the Ministry of Education,science,research and sport of the Slovak Republic under the contract: 1/0268/19,and by the Ukrainian government projects No.0120U102201 “Development the methods and unified software-hardware means for the deployment of the energy efficient intent-based multi-purpose information and communication networks,” and No.0120U100674,“Designing the novel decentralized mobile network based on blockchain architecture and artificial intelligence for 5G/6G development in Ukraine.”

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    国产成人啪精品午夜网站| 亚洲午夜精品一区,二区,三区| 性色av乱码一区二区三区2| 久久精品影院6| 成人国产一区最新在线观看| 国产成人欧美在线观看| 国产野战对白在线观看| 一本精品99久久精品77| 18禁美女被吸乳视频| 婷婷六月久久综合丁香| 久久精品91蜜桃| 无限看片的www在线观看| 人妻丰满熟妇av一区二区三区| 久久国产精品人妻蜜桃| 欧美丝袜亚洲另类 | 亚洲全国av大片| 一级毛片精品| 欧美最黄视频在线播放免费| 国产精品久久电影中文字幕| 欧美色欧美亚洲另类二区| 两个人视频免费观看高清| 在线视频色国产色| 国产精品国产高清国产av| 欧美日韩一级在线毛片| 听说在线观看完整版免费高清| 麻豆久久精品国产亚洲av| 亚洲 欧美一区二区三区| www国产在线视频色| 午夜免费激情av| 一个人免费在线观看的高清视频| 一区福利在线观看| 日韩欧美一区视频在线观看| 国产99白浆流出| 国产精品野战在线观看| 国产97色在线日韩免费| 午夜免费激情av| 久久久久久久久久黄片| 亚洲国产高清在线一区二区三 | 欧美日韩瑟瑟在线播放| 侵犯人妻中文字幕一二三四区| 窝窝影院91人妻| 久久国产亚洲av麻豆专区| 中文资源天堂在线| 中文字幕精品免费在线观看视频| 一级毛片女人18水好多| 国产99久久九九免费精品| 中文字幕av电影在线播放| 日本撒尿小便嘘嘘汇集6| 亚洲中文av在线| 波多野结衣巨乳人妻| 日本免费a在线| 女人高潮潮喷娇喘18禁视频| 神马国产精品三级电影在线观看 | 亚洲av五月六月丁香网| 国产又黄又爽又无遮挡在线| 国产精品亚洲av一区麻豆| 亚洲人成伊人成综合网2020| 老司机福利观看| 欧美另类亚洲清纯唯美| 色av中文字幕| 伦理电影免费视频| 人人澡人人妻人| 一级毛片精品| 亚洲av成人一区二区三| 久久人妻av系列| 中文字幕最新亚洲高清| 亚洲男人的天堂狠狠| 日本在线视频免费播放| 日本一本二区三区精品| 精品久久久久久久久久免费视频| 亚洲在线自拍视频| 人人妻人人看人人澡| 久久精品国产99精品国产亚洲性色| 亚洲精品中文字幕一二三四区| 久久久久久九九精品二区国产 | 99久久综合精品五月天人人| 国产精品爽爽va在线观看网站 | 国产免费av片在线观看野外av| 好男人电影高清在线观看| 无限看片的www在线观看| 精品卡一卡二卡四卡免费| 欧美国产精品va在线观看不卡| 美国免费a级毛片| 久久香蕉精品热| 亚洲中文字幕日韩| 亚洲av成人不卡在线观看播放网| 亚洲专区中文字幕在线| www.自偷自拍.com| 日韩成人在线观看一区二区三区| 午夜a级毛片| 国产精品,欧美在线| 长腿黑丝高跟| 午夜免费观看网址| 免费在线观看完整版高清| 哪里可以看免费的av片| 88av欧美| 精品久久久久久久毛片微露脸| 国产精品自产拍在线观看55亚洲| www.999成人在线观看| av中文乱码字幕在线| 亚洲精品一卡2卡三卡4卡5卡| 99国产精品一区二区三区| 欧美一级毛片孕妇| 村上凉子中文字幕在线| 中文字幕高清在线视频| 国产又黄又爽又无遮挡在线| 欧美中文综合在线视频| 精品无人区乱码1区二区| 午夜免费激情av| 青草久久国产| 中亚洲国语对白在线视频| 搞女人的毛片| 亚洲成av人片免费观看| 91国产中文字幕| av福利片在线| 午夜激情福利司机影院| 欧美中文日本在线观看视频| xxxwww97欧美| 老司机福利观看| 亚洲精品av麻豆狂野| 国产成+人综合+亚洲专区| 亚洲专区国产一区二区| 日韩中文字幕欧美一区二区| 亚洲色图av天堂| 中文在线观看免费www的网站 | 国内毛片毛片毛片毛片毛片| 亚洲人成77777在线视频| 大型av网站在线播放| 久久香蕉国产精品| 免费在线观看完整版高清| 久久久国产精品麻豆| 黄频高清免费视频| 欧美日韩一级在线毛片| 亚洲欧美激情综合另类| 特大巨黑吊av在线直播 | 男人舔奶头视频| 2021天堂中文幕一二区在线观 | 成年免费大片在线观看| 精品日产1卡2卡| 国产成人啪精品午夜网站| 我的亚洲天堂| 亚洲国产日韩欧美精品在线观看 | 母亲3免费完整高清在线观看| 免费在线观看完整版高清| 国产一区二区激情短视频| 男人舔奶头视频| 成人国产综合亚洲| 香蕉久久夜色| 精品欧美一区二区三区在线| 亚洲色图 男人天堂 中文字幕| 亚洲一码二码三码区别大吗| 久久久久久久精品吃奶| 男人操女人黄网站| 欧美另类亚洲清纯唯美| 国产激情欧美一区二区| 国产精品1区2区在线观看.| 亚洲精品中文字幕在线视频| 韩国精品一区二区三区| 国产主播在线观看一区二区| 欧美黑人欧美精品刺激| 欧美性猛交╳xxx乱大交人| 一个人观看的视频www高清免费观看 | 国内揄拍国产精品人妻在线 | 成人亚洲精品一区在线观看| 国产成人精品久久二区二区91| 99精品久久久久人妻精品| 国产欧美日韩一区二区精品| 免费看十八禁软件| 国产亚洲av嫩草精品影院| 国产亚洲av嫩草精品影院| 69av精品久久久久久| 亚洲av电影在线进入| 19禁男女啪啪无遮挡网站| 久久精品影院6| av视频在线观看入口| 久久香蕉激情| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲成人久久爱视频| 国产极品粉嫩免费观看在线| 麻豆国产av国片精品| 又大又爽又粗| 后天国语完整版免费观看| 午夜免费激情av| 久久久久久久精品吃奶| 极品教师在线免费播放| 欧美黑人巨大hd| 视频在线观看一区二区三区| 99久久国产精品久久久| 日本三级黄在线观看| 中文资源天堂在线| 在线观看66精品国产| 欧美+亚洲+日韩+国产| 国产不卡一卡二| 色综合婷婷激情| 91九色精品人成在线观看| netflix在线观看网站| 我的亚洲天堂| 色综合婷婷激情| 少妇 在线观看| av中文乱码字幕在线| 日韩欧美一区视频在线观看| 国产精品av久久久久免费| 国产色视频综合| 两性夫妻黄色片| 99久久国产精品久久久| 亚洲第一电影网av| 好看av亚洲va欧美ⅴa在| 午夜两性在线视频| 男女下面进入的视频免费午夜 | 这个男人来自地球电影免费观看| 熟女少妇亚洲综合色aaa.| 99久久99久久久精品蜜桃| 亚洲成人免费电影在线观看| 村上凉子中文字幕在线| 99在线人妻在线中文字幕| 丝袜人妻中文字幕| 亚洲欧美精品综合久久99| 国产成人精品久久二区二区免费| 女同久久另类99精品国产91| 国产不卡一卡二| 免费高清在线观看日韩| 欧美乱妇无乱码| 一卡2卡三卡四卡精品乱码亚洲| 成人手机av| 18禁黄网站禁片午夜丰满| 黄片大片在线免费观看| 欧美成人一区二区免费高清观看 | 日韩欧美国产在线观看| 校园春色视频在线观看| www.熟女人妻精品国产| 老司机午夜十八禁免费视频| 久久精品国产亚洲av高清一级| 国产欧美日韩一区二区三| 国产精品,欧美在线| 亚洲精品美女久久久久99蜜臀| 午夜福利一区二区在线看| 欧美午夜高清在线| 国产免费av片在线观看野外av| 国产av一区二区精品久久| 88av欧美| 国产一区二区激情短视频| 俄罗斯特黄特色一大片| 黄色视频,在线免费观看| 女生性感内裤真人,穿戴方法视频| 国产欧美日韩精品亚洲av| 亚洲第一青青草原| 十八禁网站免费在线| 国产精品久久久人人做人人爽| 午夜a级毛片| 老司机靠b影院| 国产精品一区二区精品视频观看| 两个人看的免费小视频| 99久久国产精品久久久| 日本a在线网址| 国产精品精品国产色婷婷| 黑丝袜美女国产一区| 岛国视频午夜一区免费看| 一进一出好大好爽视频| 亚洲精品美女久久av网站| 一个人免费在线观看的高清视频| а√天堂www在线а√下载| 免费看十八禁软件| 99热6这里只有精品| 亚洲精品国产一区二区精华液| 国产精品电影一区二区三区| 岛国在线观看网站| 丝袜在线中文字幕| 久久国产精品男人的天堂亚洲| 天堂动漫精品| 成在线人永久免费视频| 嫁个100分男人电影在线观看| 国产成人一区二区三区免费视频网站| 最新在线观看一区二区三区| www.精华液| 两个人看的免费小视频| 激情在线观看视频在线高清| 人人妻,人人澡人人爽秒播| 色综合站精品国产| 久久午夜亚洲精品久久| 啦啦啦韩国在线观看视频| 亚洲人成网站在线播放欧美日韩| 国产又色又爽无遮挡免费看| 俄罗斯特黄特色一大片| 国产成人av教育| 亚洲av中文字字幕乱码综合 | 亚洲精品粉嫩美女一区| 麻豆国产av国片精品| 国内久久婷婷六月综合欲色啪| 搞女人的毛片| 久久国产乱子伦精品免费另类| 99国产综合亚洲精品| 香蕉国产在线看| 性欧美人与动物交配| 制服人妻中文乱码| 国产亚洲精品av在线| 黄网站色视频无遮挡免费观看| 国产精品香港三级国产av潘金莲| 性色av乱码一区二区三区2| 国产精品亚洲一级av第二区| 亚洲电影在线观看av| 精品久久久久久,| or卡值多少钱| 中文字幕精品亚洲无线码一区 | www日本在线高清视频| 亚洲精品在线观看二区| 国产一区二区激情短视频| 午夜精品久久久久久毛片777| 国产精品一区二区免费欧美| 在线十欧美十亚洲十日本专区| 亚洲美女黄片视频| 狠狠狠狠99中文字幕| 亚洲第一电影网av| 国语自产精品视频在线第100页| 男女下面进入的视频免费午夜 | 欧美成人免费av一区二区三区| 在线十欧美十亚洲十日本专区| 日本五十路高清| 91av网站免费观看| 婷婷丁香在线五月| 久久精品亚洲精品国产色婷小说| 少妇熟女aⅴ在线视频| 日本免费一区二区三区高清不卡| 日本黄色视频三级网站网址| 搞女人的毛片| 国产av在哪里看| 国产精品久久久av美女十八| 叶爱在线成人免费视频播放| 搡老妇女老女人老熟妇| 久久久久九九精品影院| 成人18禁在线播放| 9191精品国产免费久久| 伊人久久大香线蕉亚洲五| 亚洲男人天堂网一区| 给我免费播放毛片高清在线观看| 夜夜躁狠狠躁天天躁| 12—13女人毛片做爰片一| 美女高潮喷水抽搐中文字幕| 青草久久国产| 成人精品一区二区免费| 国产男靠女视频免费网站| 色综合站精品国产| 国产麻豆成人av免费视频| 一区二区三区国产精品乱码| 波多野结衣av一区二区av| 叶爱在线成人免费视频播放| 狂野欧美激情性xxxx| 免费无遮挡裸体视频| 91成人精品电影| 极品教师在线免费播放| 亚洲成a人片在线一区二区| 啦啦啦韩国在线观看视频| 日本成人三级电影网站| 男女午夜视频在线观看| 亚洲精品粉嫩美女一区| 免费搜索国产男女视频| 女警被强在线播放| 亚洲天堂国产精品一区在线| 欧美国产精品va在线观看不卡| 亚洲精品在线观看二区| 长腿黑丝高跟| 18禁裸乳无遮挡免费网站照片 | 人妻丰满熟妇av一区二区三区| 亚洲熟女毛片儿| 免费av毛片视频| 母亲3免费完整高清在线观看| 人妻久久中文字幕网| 欧美性长视频在线观看| 村上凉子中文字幕在线| 99国产综合亚洲精品| 日本一区二区免费在线视频| 国产精品一区二区免费欧美| 麻豆成人av在线观看| 国产不卡一卡二| 一夜夜www| 人妻久久中文字幕网| 国产亚洲精品一区二区www| 久久欧美精品欧美久久欧美| 免费看美女性在线毛片视频| 国产v大片淫在线免费观看| 变态另类成人亚洲欧美熟女| 岛国视频午夜一区免费看| 精品一区二区三区四区五区乱码| 天天一区二区日本电影三级| 亚洲第一青青草原| 日韩一卡2卡3卡4卡2021年| 亚洲自偷自拍图片 自拍| 精品国产美女av久久久久小说| 后天国语完整版免费观看| 成人永久免费在线观看视频| 久久精品国产亚洲av香蕉五月| 久久午夜亚洲精品久久| 亚洲一区二区三区不卡视频| av在线播放免费不卡| 最近最新免费中文字幕在线| 久99久视频精品免费| 欧美最黄视频在线播放免费| 国产一级毛片七仙女欲春2 | 无人区码免费观看不卡| 日韩国内少妇激情av| 久久99热这里只有精品18| tocl精华| 级片在线观看| 精品人妻1区二区| 51午夜福利影视在线观看| 十分钟在线观看高清视频www| 无限看片的www在线观看| 午夜a级毛片| 99在线视频只有这里精品首页| 一区二区三区国产精品乱码| 午夜a级毛片| 禁无遮挡网站| 免费在线观看视频国产中文字幕亚洲| 国产精品亚洲美女久久久| 男人舔女人的私密视频| 欧美成人性av电影在线观看| 男女那种视频在线观看| 午夜福利在线在线| av视频在线观看入口| 中文字幕av电影在线播放| 亚洲自拍偷在线| 丝袜人妻中文字幕| 99久久99久久久精品蜜桃| 欧美午夜高清在线| 可以在线观看的亚洲视频| 色婷婷久久久亚洲欧美| 黄网站色视频无遮挡免费观看| 伊人久久大香线蕉亚洲五| 久久精品影院6| 中文字幕人妻熟女乱码| 黑人欧美特级aaaaaa片| 亚洲专区中文字幕在线| 免费在线观看完整版高清| 国产熟女午夜一区二区三区| 国产aⅴ精品一区二区三区波| 亚洲精品一卡2卡三卡4卡5卡| 在线观看一区二区三区| 精品免费久久久久久久清纯| 国产欧美日韩一区二区三| 99国产综合亚洲精品| 亚洲国产中文字幕在线视频| 国产一级毛片七仙女欲春2 | 色尼玛亚洲综合影院| 精品电影一区二区在线| 日本a在线网址| 九色国产91popny在线| 少妇粗大呻吟视频| 俄罗斯特黄特色一大片| 久久久久久亚洲精品国产蜜桃av| 精品高清国产在线一区| 精华霜和精华液先用哪个| 午夜精品在线福利| 波多野结衣巨乳人妻| 国产精品久久久av美女十八| 这个男人来自地球电影免费观看| 精品国内亚洲2022精品成人| 亚洲精品一区av在线观看| 啪啪无遮挡十八禁网站| 啦啦啦观看免费观看视频高清| 97碰自拍视频| 51午夜福利影视在线观看| 日韩欧美国产在线观看| 久久久国产欧美日韩av| 日日干狠狠操夜夜爽| 50天的宝宝边吃奶边哭怎么回事| 日本免费一区二区三区高清不卡| 18禁美女被吸乳视频| 天堂影院成人在线观看| av天堂在线播放| 麻豆av在线久日| 成人欧美大片| 在线观看一区二区三区| 国产成人一区二区三区免费视频网站| 国产亚洲精品久久久久久毛片| 亚洲第一青青草原| 99riav亚洲国产免费| 一本精品99久久精品77| 妹子高潮喷水视频| 一二三四社区在线视频社区8| 久99久视频精品免费| 搡老熟女国产l中国老女人| 久久国产乱子伦精品免费另类| 国产黄色小视频在线观看| 成人国语在线视频| 好看av亚洲va欧美ⅴa在| 伊人久久大香线蕉亚洲五| 岛国视频午夜一区免费看| 中国美女看黄片| 午夜福利成人在线免费观看| 一本综合久久免费| 久久久国产欧美日韩av| 亚洲精品中文字幕一二三四区| 午夜久久久在线观看| 国产精品1区2区在线观看.| 久久久久久久久久黄片| 国产成人影院久久av| 亚洲天堂国产精品一区在线| 午夜两性在线视频| 男女床上黄色一级片免费看| 日本 欧美在线| 人妻久久中文字幕网| 激情在线观看视频在线高清| 国产免费av片在线观看野外av| 欧美成人一区二区免费高清观看 | 一二三四在线观看免费中文在| 欧美激情高清一区二区三区| 精品卡一卡二卡四卡免费| 国产精品二区激情视频| 色av中文字幕| 国产野战对白在线观看| 可以在线观看的亚洲视频| 在线观看66精品国产| 欧美激情高清一区二区三区| 波多野结衣巨乳人妻| 国产成年人精品一区二区| 欧美中文综合在线视频| 亚洲美女黄片视频| 精品熟女少妇八av免费久了| 国产亚洲av高清不卡| 国产成人精品久久二区二区91| 国产伦在线观看视频一区| 哪里可以看免费的av片| 中文在线观看免费www的网站 | 老汉色∧v一级毛片| 中国美女看黄片| 在线观看66精品国产| 视频区欧美日本亚洲| 欧洲精品卡2卡3卡4卡5卡区| 国产男靠女视频免费网站| 一本久久中文字幕| 一级a爱视频在线免费观看| 国产欧美日韩精品亚洲av| 首页视频小说图片口味搜索| 成人国产一区最新在线观看| 国产成人精品久久二区二区91| 男女那种视频在线观看| 亚洲成人国产一区在线观看| 无人区码免费观看不卡| 午夜激情av网站| 国产成人精品无人区| 看免费av毛片| 99re在线观看精品视频| av片东京热男人的天堂| 亚洲欧美精品综合一区二区三区| 欧美激情极品国产一区二区三区| 亚洲第一电影网av| 人人妻,人人澡人人爽秒播| 久9热在线精品视频| 国产乱人伦免费视频| 听说在线观看完整版免费高清| 免费观看精品视频网站| 亚洲精品久久成人aⅴ小说| 国产单亲对白刺激| 男女午夜视频在线观看| 亚洲人成伊人成综合网2020| 少妇被粗大的猛进出69影院| 色av中文字幕| 亚洲片人在线观看| √禁漫天堂资源中文www| 午夜福利一区二区在线看| 在线播放国产精品三级| 亚洲国产精品sss在线观看| 成年免费大片在线观看| 日韩精品青青久久久久久| 别揉我奶头~嗯~啊~动态视频| 久久香蕉精品热| 日韩大码丰满熟妇| 亚洲欧美精品综合一区二区三区| 国产成人系列免费观看| 这个男人来自地球电影免费观看| 免费无遮挡裸体视频| 欧美成人性av电影在线观看| 国产熟女xx| 免费高清在线观看日韩| 成人精品一区二区免费| 国产精品一区二区三区四区久久 | 国产亚洲精品av在线| 午夜福利免费观看在线| 淫妇啪啪啪对白视频| 久久婷婷人人爽人人干人人爱| 精品欧美一区二区三区在线| 精品人妻1区二区| 亚洲色图 男人天堂 中文字幕| 国产精品免费视频内射| 欧美在线一区亚洲| 免费在线观看视频国产中文字幕亚洲| 成人免费观看视频高清| 怎么达到女性高潮| 99精品欧美一区二区三区四区| 观看免费一级毛片| 精品国产美女av久久久久小说| 午夜久久久在线观看| 欧美在线黄色| 欧美成人免费av一区二区三区| 亚洲国产精品sss在线观看| 亚洲免费av在线视频| 欧美又色又爽又黄视频| 99热6这里只有精品| 亚洲av成人不卡在线观看播放网| 欧美人与性动交α欧美精品济南到| 一边摸一边做爽爽视频免费| 中亚洲国语对白在线视频| 激情在线观看视频在线高清| 天堂动漫精品| 亚洲免费av在线视频| 国产视频一区二区在线看| 99国产综合亚洲精品| 亚洲欧洲精品一区二区精品久久久| 午夜福利高清视频| 日本 欧美在线| 成人精品一区二区免费| 久热这里只有精品99| 18禁黄网站禁片午夜丰满| 午夜激情av网站| 天天添夜夜摸| 怎么达到女性高潮|