• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack

    2022-11-09 08:15:04MuhammadReazulHaqueSawChinTanZulfadzliYusoffKashifNisarRizaludinKaspinIramHaiderSanaNisarRodriguesBhawaniShankarChowdhryMuhammadAslamUqailiSatyaPrasadMajumderDandaRawatRichardEtenguandRajkumarBuyya0
    Computers Materials&Continua 2022年1期

    Muhammad Reazul Haque,Saw Chin Tan,Zulfadzli Yusoff,Kashif Nisar,Rizaludin Kaspin,Iram Haider,Sana Nisar,J.P.C.Rodrigues,Bhawani Shankar Chowdhry,Muhammad Aslam Uqaili,Satya Prasad Majumder,Danda B.Rawat,Richard Etengu and Rajkumar Buyya0

    1Faculty of Computing&Informatics,Multimedia University,Persiaran Multimedia,Cyberjaya,63100,Selangor,Malaysia

    2Faculty of Engineering,Multimedia University,Persiaran Multimedia,Cyberjaya,63100,Selangor,Malaysia

    3Faculty of Computing and Informatics,University Malaysia Sabah,Jalan UMS,Kota Kinabalu Sabah,88400,Malaysia

    4Telekom Malaysia Research&Development,TM Innovation Centre,63000,Cyberjaya,Selangor,Malaysia

    5Federal University of Piauí(UFPI),Teresina,PI,Brazil

    6Instituto de Telecomunica??es,6201-001,Covilh?,Portugal

    7National Center of Robotics and Automation-Condition Monitoring Systems Lab,MUET,Jamshoro,Pakistan

    8Department of Electrical and Electronic Engineering,BUET,Dhaka,1205,Bangladesh

    9Department of Electrical Engineering and Computer Science,Data Science and Cybersecurity Center,Howard University,Washington,DC,USA

    10Cloud Computing and Distributed Systems(CLOUDS)Laboratory,School of Computing and Information Systems,The University of Melbourne,Melbourne,VIC 3053,Australia

    Abstract: In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service (DDoS) attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS) attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.

    Keywords: SDN;smart algorithm;RTZLK-DAASCP;DDoS attack;DRDoS

    1 Introduction

    Software-defined networking (SDN) has attained evident quality worldwide since it is agile,programmable [1],cost-effective,besides the centralized networking system framework in contrast with the customary traditional computer,telecommunications,and satellite communication frameworks that are more confounded and harder to oversee.The focal point of SDN engineering is the controller that mediates among clients and assets to deliver services [2-4].SDN enables industry operators to reduce operational expenditure (OPEX) and capital expenditure (CAPEX) and create innovative,differentiated services [5].SDN’s principal function is to expedite and progress the network management system with high flexibility and reliability by separating the control plane from the data plane.Moreover,the capability to unlock more innovative opportunities is owed to the network programmability of SDN.Numerous researchers from both industrial and academic have been attracted to address SDN issues [6].Open Networking Foundation (ONF) states that SDN is a developing design that is dynamic,reasonable,financially savvy,and versatile,making it ideal for the high-bandwidth,dynamic nature of emerging applications [7].Before SDN was engineered,the goal to make a programmable networking system had for long been thought of by researcher;for instance,the scientists in [8-14] upheld fast programmable data handling.

    The brain of SDN is the controller,which comprises many uses giving united control usefulness through an open application program interface (API) to process the network data packet through an open interface.The SDN controller is a coherent control structure that runs the Network Operation System (NOS) [15].The equipment deliberations to the control plane,which can monitor the global view of the network architecture.The kernel brainchild of SDN is to separate the control plane and the data plane [16,17] by creating a particular software that allows the operating system of the network (software controller) of SDN to operate on separate hardware(physical controller) [18].Fig.1 shows a typical architecture of SDN.

    Figure 1:Simplified architecture of SDN [19]

    This separation not only provides a significant feature for future networks and telecommunication but also threatens SDN security.SDN is a structure designed to simplify and improve network management with high flexibility by splitting the control plane and data plane [20].

    Distributed denial of services (DDoS) attack attempts to make an online service or network unavailable by creating excessive requests from the OpenFlow switch to the controller.The various attack sources include all personal computers (PC),servers,smartphones,alarm systems,cameras,the Internet of things (IoT) devices,and sensors.DDoS attacks can paralyze SDN services by overwhelming servers,network links,and network devices (routers,switches,and controllers.) with illegitimate traffic.They can either cause service degradation or complete denial of service,causing huge losses [21].In Fig.2,we give an illustration of how the DDoS attack operated in general.

    Figure 2:DDoS attack on SDN controller

    Initially,attackers will infiltrate the controller via either a PC,smartphone,and IoT sensor.Through switches by using a botnet or a zombie.As a result,all the devices connected to the victim controller will eventually malfunction.Moreover,an infrastructure layer (switch) will typically request the controller to obtain new rules when it cannot handle data packets or forward data packets due to a mismatch in the flow table [22].Also,a large volume of DDoS attack traffic would occupy the entire bandwidth [23],causing congestion that would result in the controller becoming slow.Eventually,malfunction will occur after encountering DDoS attacks continuously.If the controller becomes the victim of a DDoS attack,all the switches connected to that controller will have malfunctioned and unable to serve the legitimate users.Hence,it is necessary to install an alternative controller to serve legitimate users.

    The controller is the most critical component in the SDN network.Hence,controller placement in SDN planning is one of the critical criteria for providing uninterrupted services.Lately,it accounted for intimidation based on Distributed Denial of Service (DDoS) or Ransom Denial of Service (RDoS),an attacker professing to attack ‘Lazarus’.The attacker was threatening to dispatch a DDoS attack against the customer’s entire organization if the owner does not pay the installment within six days.DDoS attacks do not generally accompany a payment interest,yet,given that even one hour of downtime can cost organizations up to $100K sometimes,this sort of RDoS attacks merits viewing appropriately and relieving against services.The highest attacking data packet was 700 GigaByte Per Second (Gbps) or 6,012,951,135,769 bits per second,depicted in Fig.3 [24].

    In the first few weeks of January 2021,DRDoS and RDoS attacks on German organizations and government offices have gotten increasingly continuous.Cybercriminals are utilizing the force of volumetric reflection attacks to coerce enormous ransoms.A Distributed Reflected Denial of Service (DRDoS) attack is an exceptional type of DDoS.For this situation,malevolent solicitations do not start from the actual attacker or a botnet setup.However,from specific Internet services [25],So DRDoS attack is an upcoming strong threat for SDN controllers with DDoS attack.Assurance for SDN networks is winding up being logically more essential in the field of security.This condition is being experienced despite that SDN can give a rich network.In any case,SDN faces different security challenges [26],simultaneously,for example,DDoS attack,network hindering,switch information spillage,management classification,and different principle attacks in traditional networks [27].From this time forward,it is imperative to pass on various reinforcement controllers to give non-stop SDN services under different DDoS attacks.Here,we proposed a smart algorithm to estimate the numbers of backup controllers required to be deployed at any specific location or node where DDoS occurred.

    Figure 3:Gbps of DDoS attacks per day as observed in 2020

    We organized this paper as follows.In the next section,we presented related work and the development of our proposed backup controller placement smart algorithm,Reazul Tan Zul Lee Kashif (called RTZLK) DDoS Attack Aware SDN Smart Controller Placement Algorithm (called DAASCPA).The flowchart of the proposed algorithm is disclosed in Section 3.Evaluation of the proposed smart algorithm under various scenarios will be conducted,and the result of the layout plan diagrams is shown in Section 4.A vision and future directions are discussed in Section 5.Finally,a conclusion is drawn in Section 6.

    2 Related Work

    First,the authors in [28] proposed the SDN controller placement by utilizing the k-median,comparing the advancement issue heuristic algorithm and the k-center,and the related improvement issue heuristic algorithm.Their work centered around the controller’s latency,the controller’s reaction time and did not address the controller placement under DDoS attack.In [29],the authors raised a standard system to change the connection between the controller and the switches dependent on the conduct of the controller position issue.The authors in [30] considered the need to augment the unwavering quality of the SDN controllers utilizing heuristic algorithms and brute force.In [31],the authors considered the controller placement issue was decreasing the most noticeably awful dormancy of the control ways under satisfying the heap limitation of SDN controllers.In [32],without referencing the DDoS attack,the author presented another upgraded model for the SDN controller placement just as switches and connections in the SDN.The authors in [33] focused on the need to delineate the weakness of SDN to DDoS attacks in cloud computing.They researched the new inclination and highlight of DDoS attacks in the cloud computing environment and gave a comprehensive measure of walled-in area systems against DDoS attacks utilizing SDN.In [34],the authors presented a DDoS attack safeguard by DDoS hindering framework by utilizing OpenFlow interface.In light of expeditiousness,flexibility,and exactness,the authors proposed a DDoS attack discovery technique in [35].

    The authors in [36] proposed a multi-line SDN controller planning algorithm dependent on the time cut assignment procedure identified with controller placement in SDN.Based on attack traffic,attack scale,and courses of events,the work in [37] addressed the location of DDoS attacks in cloud services.Nevertheless,their proposed algorithm is a simple link to identify attacks that made the controllers break down,which brought about the interferences of services.In [38],the authors presented pSMART,a lightweight,security-mindful assistance work chain orchestration in a multi-space NFV/SDN circumstance,which cannot uphold during the colossal volume of DDoS attack traffic.In [39],the authors’proposed algorithms for exact and heuristic assessments of the resulting and completed in the Matlab-based POCO framework for the Paretobased Optimal Controller placement.At this point,it does not fulfill the need to offer help during DDoS.The authors in [40] proposed a multi-target ILP definition introduced to derive the related controller position.However,security dangers like DDoS attacks are not considered to offer constant types of assistance.In [41],the authors built up a Parameter Optimization Model (POM) for the heuristic figuring applied to the CPP.The heuristic algorithm can sufficiently disentangle the CPP by using the high-level limits procured in POM.The work does not consider components for securing the SDN controller and framework.In [42],the authors proposed a hypothetical idea of smart controller placement for SDN engineering.Essentially,SDN is poised to apply future applications,for example,voice over IP (VoIP) [43-45],fiber optic [46-48],worldwide interoperability for microwave access (WiMAX) [49-51],and artificial intelligence (AI) and machine learning (ML) [52],deep learning (DL) [53] unmanned aerial vehicle(UAV) and autonomous electric vehicle (AEV) through satellite [54].The above works neither considered intelligent reinforcement controller algorithm nor DDoS attack danger.In this paper,we proposed a smart algorithm for planning the deployment of SDN controllers under DDoS attack situations,which comprises additional backup reinforcement controllers notwithstanding the current controllers to guarantee the support of real clients without interruption.

    3 SDN RTZLK-DAASCP Algorithm

    Here,we present a DDoS attack-aware smart controller placement algorithm that comprises additional savvy reinforcement controllers notwithstanding the current controllers to guarantee the services for genuine clients without interruption.

    3.1 Input:

    R is the number of types of switches in setS,Set of the switchS={s1,s2,s3...sR}, AvlSis the available data packet in each switch that needs to be processed by the controller,kis the number of types of the controllers in set C,Set of controllerC={c1,c2,c3...ck},Available controller in setC=c1=2,c2=1,c3=3, PrpCis the processing power of the controllerC=c1,c2,c3,...ck,PortCis the port of the controller,CoCis the cost of the controller,AvlCis the availability of the Controller,mis the number of types of the backup controller,Set of the smart backup controllerBC={bc1,bc2,bc3...bm}, Prpbcis the processing power of the backup controller,Portbcis the Port of the backup controller,Cobcis the cost of the smart backup controller,Avlbcis the availability of the smart backup controller,wis the number of the nodes,n={n1,n2 n3,...nw}is the node to place controller and smart backup controller,Distance between nodes to place controller=200 m, DDoSnis the DDoS attack on node n, Affc=affected controller inC={c1,c3},andAffn=affected node inn={n1,n3}.

    3.2 Output:

    The controller and the smart backup controller placement matrixTcn,TBCn.

    3.3 Algorithm:

    1:Start

    Initialization:

    The controller placement matrixTcnto0for controller type c at all node n,cp=The controller placement,temporary controller placement listTcplist=0,Smart backup controller placement matrixTBCnto0for the smart backup controller typebat all noden,bcp=The smart backup controller placement,Temporary smart backup controller placement listTbcplist=0,AvlS=The available data packet in the switch that needs to be processed by the controller,CocMin=The minimum cost of the controllers,CobMin=The minimum cost of the smart backup controllers,cs=Controller’s subset,SPPcs=The sum of the processing power of the controller’s Subset,SPortCS=The sum of port of the controller’s subset,SCoCS=The sum of the cost of the controller’s subset,SCoCSMin=The minimum cost of the controller’s subset,Reqn=The number of the required node,P=Power setz[P(C)]=The number of element(controller)in Power Set.

    2:foreachitems in the controller’s setC={c1,c2,c3...,ck}

    3:CreateaUnion of setwith available controllers of each type of the controller fromSet C

    c1∪c2∪c3...∪ck={c1[1],c1[2],c2[1],c3[1],c3[2],c3[3]...,ck[k]}

    4:Updateit in setC={c1[1],c1[2],c2[1],c3[1],c3[2],c3[3]...,ck}

    5:Create a Power Set P(C)for the set of theController C={c1[1],c1[2],c2[1],c3[1],c3[2],c3[3]...,ck}

    For set C={c1[1],c1[2],c2[1],c3[1],c3[2],c3[3]...,ck}calculate the following subsets

    Subsets with 0 controller-{?}{?}(the empty set)

    Subsets with 1 controller-{c1[1]},{c1[2]},{c2[1]},{c3[1]},{c3[2]},{c3[3]}...{ck[k]}

    Subsets with 2 controllers-

    {c1[1],c1[2]},c1[1],c2[1],c1[1],c3[1]},{c1[1],c3[2]},{c1[1],c3[3]},{c1[1],ck[k]},{c1[2],c2[1]},{c1[2],c3[1]},{c1[2],e},{c1[2],c3[3]},{c1[2],ck[k]},{c2[1],c3[1]},{c2[1],c3[2]},{c2[1],c3[3]},{c2[1],ck[k]},{c3[1],c3[2]},{c3[1],c3[3]},{c3[1],ck[k]},{c3[2],c3[3]},{c3[2],ck[k]},{c3[3],ck[k]}

    Subsets with k controllers-{c1[1],c1[2],c2[1],c3[1],c3[2],c3[3]...ck}

    3.4 Flowchart of The Algorithm

    We illustrated the flowchart of the RTZLK-DAASCP algorithm in Fig.4.

    Figure 4:Flowchart of RTZLK-DAASCP algorithm

    4 Result and Diagrams

    Our proposed algorithm has been developed using A Mathematical Programming Language(AMPL) [55],which supports formulation,testing &deployment,and IBM ILOG CPLEX [56]with Intel (R) Core (TM) i7-6700 CPU@3.40 GHz,RAM 8 GB,and virtual memory 128 GB machine.The proposed smart algorithm is evaluated in several different scenarios.The obtained data from the result presented in Tabs.1-4.The diagrams from the results show the connection between the controller and a smart backup controller,controllers to controllers,DDoS attacks,and controllers to switches under four typical practical networks given in Figs.5-8.

    Table 1:Four SDN controllers placement with 9 switches without DDoS attack

    Table 2:Two SDN controllers placed with 3 switches with 1 backup controller under DDoS attack

    The entirety of the over four DDoS attack situations demonstrated that our smart algorithm could guarantee the SDN operation is uninterrupted even under the different frequency of DDoS attack by placing the extra smart backup controller in addition to the existing SDN controller.

    Table 3:Eight SDN controllers placement with 13 switches and 1 backup controller under DDoS attack

    Table 4:Five SDN controllers placement with 9 switches and 7 backup controllers under DDoS attack

    The vital cost concerning repeat of attacks plotted as exhibited in Fig.9.The cost is going from USD 30,000 for no attack to around USD 50,000 for the triple attack.It will in general be contemplated that insignificant exertion for the low attack,the medium cost is typical for a medium attack and higher cost for the higher attack.Compare to the recently proposed Lightweight algorithm [57] and boosting algorithm [58],The results obtained show that our proposed RTZLK-DAASCP smart algorithm provides uninterrupted SDN services against DDoS attacks with high accuracy and minimum cost.

    Figure 5:Diagram from the result data of Tab.1

    Figure 6:Diagram from the result data of Tab.2

    5 Vision and Future Directions

    The impact of the design and planning of SDN infrastructure varies from different geolocations.It is necessary to implement the proposed algorithm in real heterogeneous network topologies based on heterogeneous geo-locations.

    Figure 7:Diagram from the result data of Tab.3

    5.1 Vision

    IoT devices and sensors,computers,ISPs,telecommunication,satellite communication,and datacenter networking system need SDN to empower dynamic provisioning,advanced network usage,and the making of new wellsprings of income.

    5.2 Future Direction

    In SDN deployment,there are additional challenges that we should address.One such challenge is that many ISP,Telecommunication or satellite communication operators or equipment manufacturers will require extra preparation,training and activities instruments to exploit SDN,and at last streamline their tasks and the SDN control plane must have the option to help multiarea,multi-layer asset portion and advancement.Our proposed model is suitable for planning and deployment in a real-world networking topology for these two Geo locations: IBM (USA) and KREONET (South Korea) [59].We are furnishing diagram and real-time dataset [60] from the Internet Topology Zoo and converted using yEd [61],a powerful diagramming program,depicted in Figs.10 and 11.

    Figure 8:Diagram from the result data of Tab.4

    Figure 9:The total expense for single or multiple smart backup controllers placements

    5.2.1 Geo Location:IBM(USA)

    Figure 10:The real topology diagram of IBM (USA),data executed by using yEd

    5.2.2 Geo Location:KREONET(South Korea)

    Figure 11:The real topology diagram of KREONET (South Korea),data converted by using yEd

    6 Conclusions and Future Work

    The outcomes got from our proposed RTZLK-DAASCP smart algorithm display that we have accomplished the target of limiting complete expense by advancing the necessity of numerous backup controllers dependent on hypothetical frequencies of DDoS attack.The obtained results show that one smart backup controller is installed at a specific location if a solitary attack happens in SDN.A few smart backup controllers will place if SDN experienced twofold or triple attacks.The discoveries exhibited that the proposed smart controller is lithe to confront DDoS attacks by placing a smart backup controller at fitting hubs to guarantee that authentic SDN clients stay continuous.The principle multifaceted nature of the smart algorithm is that it will require more time to plan and design any large-scale SDN.We will stretch out the proposed smart algorithm to deployment of Next Generation SDN (NG-SDN) Infrastructure in future work.We will develop RTZLK-DAA smart controller using DevOps and Mendix via IBM cloud access to the most advanced Quantum Computers and Google Quantum AI to resist DRDoS types of attack.This new research will be a milestone for future design and planning of IoT,telecommunication,and satellite communication systems using SDN.

    Acknowledgement: The authors would like to thank the editors of CMC and anonymous reviewers for their time and review of this manuscript and Professor Dr.Yong-Jin Park (IEEE Life member and former Director IEEE Region 10) valuable comments and suggestions on improving the paper.

    Funding Statement: TM R&D Sdn Bhd fully supports this research work under Project RDTC160902.S.C.Tan and Z.Yusoff received the fund.Sponsors’Website: https://www.tmrnd.com.my.

    Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲天堂国产精品一区在线| 99热全是精品| 精品久久久久久成人av| 国产精品人妻久久久久久| 熟妇人妻久久中文字幕3abv| av在线观看视频网站免费| 国产一区二区在线观看日韩| 久久人人爽人人爽人人片va| 亚洲欧美日韩高清专用| 啦啦啦韩国在线观看视频| 91狼人影院| 久久精品人妻少妇| 欧美性猛交黑人性爽| 99久久无色码亚洲精品果冻| 免费黄网站久久成人精品| 亚洲,欧美,日韩| 97碰自拍视频| 男女做爰动态图高潮gif福利片| 免费av毛片视频| 欧美在线一区亚洲| 蜜桃久久精品国产亚洲av| 国内精品一区二区在线观看| 欧美日韩精品成人综合77777| 我要看日韩黄色一级片| 日韩 亚洲 欧美在线| 国内精品久久久久精免费| 夜夜看夜夜爽夜夜摸| 国产蜜桃级精品一区二区三区| 色播亚洲综合网| 亚洲一区高清亚洲精品| 搡老熟女国产l中国老女人| 国产三级中文精品| 久久久精品欧美日韩精品| 可以在线观看的亚洲视频| 人妻丰满熟妇av一区二区三区| 欧美日韩一区二区视频在线观看视频在线 | 最近最新中文字幕大全电影3| 少妇高潮的动态图| 看非洲黑人一级黄片| 搡老妇女老女人老熟妇| 精品日产1卡2卡| 欧美人与善性xxx| 亚洲真实伦在线观看| 成人特级av手机在线观看| 午夜爱爱视频在线播放| 91在线观看av| 欧美又色又爽又黄视频| 日本免费a在线| 亚洲成a人片在线一区二区| 久久亚洲国产成人精品v| 日本五十路高清| 久久久久久大精品| 非洲黑人性xxxx精品又粗又长| 小蜜桃在线观看免费完整版高清| 欧美激情久久久久久爽电影| 精品国产三级普通话版| 高清毛片免费观看视频网站| 啦啦啦啦在线视频资源| 亚洲天堂国产精品一区在线| 三级国产精品欧美在线观看| 国产一区二区在线av高清观看| 亚洲欧美日韩高清专用| 少妇的逼水好多| 欧美+亚洲+日韩+国产| 国国产精品蜜臀av免费| 久久久久性生活片| 国产成人freesex在线 | 国产精品一区二区免费欧美| 精品一区二区三区人妻视频| 成年女人永久免费观看视频| 欧美丝袜亚洲另类| 日韩欧美在线乱码| 人人妻,人人澡人人爽秒播| or卡值多少钱| 久久草成人影院| 两性午夜刺激爽爽歪歪视频在线观看| 搡老熟女国产l中国老女人| 欧美日本亚洲视频在线播放| 狠狠狠狠99中文字幕| 精品午夜福利视频在线观看一区| 亚洲色图av天堂| 搡女人真爽免费视频火全软件 | 老女人水多毛片| 欧美区成人在线视频| 国产精品,欧美在线| 午夜福利视频1000在线观看| 国产精品电影一区二区三区| 日日啪夜夜撸| 美女xxoo啪啪120秒动态图| 色视频www国产| 国产伦一二天堂av在线观看| 在线观看一区二区三区| 少妇猛男粗大的猛烈进出视频 | 在线观看免费视频日本深夜| 国产精品人妻久久久影院| 亚洲欧美日韩高清专用| av在线亚洲专区| 美女大奶头视频| 岛国在线免费视频观看| av在线老鸭窝| 99久久久亚洲精品蜜臀av| 国产av不卡久久| 乱系列少妇在线播放| 中文字幕av在线有码专区| 此物有八面人人有两片| av视频在线观看入口| 蜜桃久久精品国产亚洲av| 99视频精品全部免费 在线| 久久久久久久久久黄片| 成人性生交大片免费视频hd| 成人永久免费在线观看视频| 国产精品av视频在线免费观看| 亚洲婷婷狠狠爱综合网| 美女被艹到高潮喷水动态| 日韩av不卡免费在线播放| 国产精品女同一区二区软件| 亚洲国产精品久久男人天堂| 色哟哟哟哟哟哟| 亚洲国产欧美人成| 蜜桃亚洲精品一区二区三区| 欧美不卡视频在线免费观看| 亚洲av免费在线观看| 麻豆国产av国片精品| 午夜日韩欧美国产| 国产伦精品一区二区三区视频9| 日本a在线网址| 亚洲图色成人| 国产精品综合久久久久久久免费| 中国国产av一级| 毛片一级片免费看久久久久| 国产色爽女视频免费观看| 一进一出抽搐gif免费好疼| eeuss影院久久| 日韩欧美精品免费久久| 亚洲精华国产精华液的使用体验 | 亚洲七黄色美女视频| 97超碰精品成人国产| 欧美人与善性xxx| 噜噜噜噜噜久久久久久91| 国产精品一区www在线观看| 真实男女啪啪啪动态图| 欧美激情国产日韩精品一区| 婷婷精品国产亚洲av在线| 成年女人永久免费观看视频| 男女边吃奶边做爰视频| 久久久久九九精品影院| 亚洲欧美日韩卡通动漫| 在线看三级毛片| 日韩在线高清观看一区二区三区| 国产乱人视频| 九色成人免费人妻av| 国内精品宾馆在线| av黄色大香蕉| 久久久久国产网址| 国产 一区精品| 久久久精品欧美日韩精品| 国产精品美女特级片免费视频播放器| 99热这里只有是精品50| 成人亚洲欧美一区二区av| 99久久精品热视频| 一区二区三区四区激情视频 | 久久人人爽人人片av| 真人做人爱边吃奶动态| 成人特级黄色片久久久久久久| 色噜噜av男人的天堂激情| 国产黄色小视频在线观看| 国产精品美女特级片免费视频播放器| 成人综合一区亚洲| 亚洲人成网站在线播放欧美日韩| 少妇被粗大猛烈的视频| 男女之事视频高清在线观看| aaaaa片日本免费| 黄色欧美视频在线观看| 精品不卡国产一区二区三区| 少妇被粗大猛烈的视频| 亚洲性夜色夜夜综合| 成人性生交大片免费视频hd| 真实男女啪啪啪动态图| 精品不卡国产一区二区三区| 婷婷六月久久综合丁香| 日韩成人av中文字幕在线观看 | 最好的美女福利视频网| 九色成人免费人妻av| 午夜激情福利司机影院| 午夜视频国产福利| 国产精品1区2区在线观看.| 波野结衣二区三区在线| 成人亚洲欧美一区二区av| 国产高清视频在线播放一区| 久久久久久久久大av| 两个人视频免费观看高清| 午夜爱爱视频在线播放| 国产色婷婷99| 看免费成人av毛片| 你懂的网址亚洲精品在线观看 | 国产精品一区www在线观看| 性欧美人与动物交配| 99热精品在线国产| a级毛色黄片| 成人精品一区二区免费| 高清午夜精品一区二区三区 | 欧美+亚洲+日韩+国产| 亚洲美女黄片视频| 亚洲一级一片aⅴ在线观看| 日日摸夜夜添夜夜爱| 直男gayav资源| 99久久九九国产精品国产免费| 国产高清视频在线播放一区| 久久精品国产清高在天天线| 岛国在线免费视频观看| 熟女人妻精品中文字幕| 亚洲第一电影网av| 91在线观看av| 1000部很黄的大片| 免费不卡的大黄色大毛片视频在线观看 | 伦理电影大哥的女人| 欧美又色又爽又黄视频| АⅤ资源中文在线天堂| 美女cb高潮喷水在线观看| 欧美成人免费av一区二区三区| 色5月婷婷丁香| 日本免费一区二区三区高清不卡| 国产精品一及| 69av精品久久久久久| 国产日本99.免费观看| 看片在线看免费视频| av在线蜜桃| 我的女老师完整版在线观看| 91久久精品国产一区二区成人| 少妇人妻精品综合一区二区 | 99久久精品国产国产毛片| 直男gayav资源| 黄色一级大片看看| 日本色播在线视频| 国产精品精品国产色婷婷| 麻豆国产av国片精品| 又爽又黄a免费视频| 人人妻人人澡人人爽人人夜夜 | 国产爱豆传媒在线观看| 国产亚洲91精品色在线| 麻豆成人午夜福利视频| 国产综合懂色| 免费av不卡在线播放| 九九久久精品国产亚洲av麻豆| av卡一久久| 国产综合懂色| 精品熟女少妇av免费看| 亚洲一级一片aⅴ在线观看| 午夜老司机福利剧场| 99久久成人亚洲精品观看| av天堂中文字幕网| 久久精品久久久久久噜噜老黄 | 人妻夜夜爽99麻豆av| 亚洲自偷自拍三级| 亚洲国产色片| 精品一区二区三区av网在线观看| 中文亚洲av片在线观看爽| 亚洲av.av天堂| 性色avwww在线观看| 国产在视频线在精品| 国语自产精品视频在线第100页| 男人舔女人下体高潮全视频| 亚洲欧美日韩卡通动漫| 欧洲精品卡2卡3卡4卡5卡区| 小说图片视频综合网站| 色综合亚洲欧美另类图片| 最后的刺客免费高清国语| 日韩欧美国产在线观看| 亚洲国产高清在线一区二区三| 国产蜜桃级精品一区二区三区| 国产成人a∨麻豆精品| 欧美国产日韩亚洲一区| 一级黄色大片毛片| 色吧在线观看| 中国美女看黄片| 久久精品国产鲁丝片午夜精品| 色综合色国产| 一进一出好大好爽视频| 亚洲婷婷狠狠爱综合网| 国产又黄又爽又无遮挡在线| 一进一出抽搐gif免费好疼| 久久久精品94久久精品| 非洲黑人性xxxx精品又粗又长| 国产伦一二天堂av在线观看| av国产免费在线观看| 97热精品久久久久久| 国产精品电影一区二区三区| 亚洲真实伦在线观看| 最近中文字幕高清免费大全6| 成人亚洲精品av一区二区| 成年版毛片免费区| 日韩制服骚丝袜av| 最近手机中文字幕大全| 成人美女网站在线观看视频| 国产三级中文精品| 午夜亚洲福利在线播放| 99热这里只有精品一区| 亚洲第一区二区三区不卡| 淫秽高清视频在线观看| 成熟少妇高潮喷水视频| 免费av不卡在线播放| 日韩三级伦理在线观看| 一本久久中文字幕| 久久久久久久久中文| www日本黄色视频网| 最后的刺客免费高清国语| 可以在线观看毛片的网站| 亚洲自拍偷在线| 嫩草影院入口| 午夜精品一区二区三区免费看| 久久欧美精品欧美久久欧美| 日日摸夜夜添夜夜爱| av在线老鸭窝| 两个人的视频大全免费| 日韩强制内射视频| 一级av片app| 成人亚洲欧美一区二区av| 麻豆国产97在线/欧美| 免费看日本二区| 免费黄网站久久成人精品| 欧美不卡视频在线免费观看| 精品人妻视频免费看| 欧美xxxx黑人xx丫x性爽| 精品久久久久久久久久免费视频| 91久久精品电影网| 欧美激情在线99| 国产成人a区在线观看| 日本与韩国留学比较| 六月丁香七月| 99热精品在线国产| 精品人妻视频免费看| 国模一区二区三区四区视频| 亚洲人成网站高清观看| 婷婷精品国产亚洲av在线| 99国产精品一区二区蜜桃av| 最近最新中文字幕大全电影3| av在线蜜桃| 日韩欧美免费精品| 国内久久婷婷六月综合欲色啪| 国产爱豆传媒在线观看| 69av精品久久久久久| 精品久久久噜噜| 亚洲自拍偷在线| 亚洲精品影视一区二区三区av| 99热精品在线国产| 精品久久久久久久久亚洲| 男人和女人高潮做爰伦理| 国产亚洲精品av在线| 一a级毛片在线观看| 国产淫片久久久久久久久| 免费看光身美女| 天堂√8在线中文| 一级av片app| 三级国产精品欧美在线观看| 日韩欧美免费精品| 国产又黄又爽又无遮挡在线| 神马国产精品三级电影在线观看| 一区二区三区四区激情视频 | 黄色欧美视频在线观看| 2021天堂中文幕一二区在线观| av卡一久久| 天堂av国产一区二区熟女人妻| 日本 av在线| 国产人妻一区二区三区在| 亚洲色图av天堂| 成年女人永久免费观看视频| 欧美极品一区二区三区四区| 国产精品一区二区性色av| 天美传媒精品一区二区| 成人一区二区视频在线观看| 日本色播在线视频| 国产美女午夜福利| 人人妻人人澡人人爽人人夜夜 | 亚洲最大成人av| 国产aⅴ精品一区二区三区波| 嫩草影视91久久| 成人无遮挡网站| 黄色欧美视频在线观看| 国产不卡一卡二| 麻豆国产av国片精品| 亚洲国产精品合色在线| 亚洲精品色激情综合| 成年免费大片在线观看| .国产精品久久| 久久久精品94久久精品| 亚洲国产精品国产精品| 国产三级中文精品| 午夜免费激情av| 国产成人一区二区在线| 国产男人的电影天堂91| 成人鲁丝片一二三区免费| 成年女人看的毛片在线观看| 日本免费a在线| 大又大粗又爽又黄少妇毛片口| 搡女人真爽免费视频火全软件 | 天堂网av新在线| 日韩精品有码人妻一区| 最近的中文字幕免费完整| 亚洲经典国产精华液单| 丰满乱子伦码专区| 日本三级黄在线观看| 亚洲精品一区av在线观看| 日韩高清综合在线| 欧美日本视频| 香蕉av资源在线| 成人鲁丝片一二三区免费| 国产高清视频在线播放一区| 欧美成人a在线观看| 国产亚洲精品综合一区在线观看| 久久这里只有精品中国| 午夜激情欧美在线| 中文亚洲av片在线观看爽| 欧美日韩乱码在线| 亚洲在线观看片| 欧美日韩在线观看h| 成人av在线播放网站| 小说图片视频综合网站| 亚洲av一区综合| a级一级毛片免费在线观看| 91麻豆精品激情在线观看国产| 最新在线观看一区二区三区| 麻豆久久精品国产亚洲av| 亚洲欧美日韩卡通动漫| 午夜免费男女啪啪视频观看 | 国内久久婷婷六月综合欲色啪| 午夜福利在线在线| 国产精华一区二区三区| 少妇高潮的动态图| 成年女人永久免费观看视频| 直男gayav资源| 少妇人妻一区二区三区视频| 1024手机看黄色片| 亚洲经典国产精华液单| or卡值多少钱| 淫妇啪啪啪对白视频| av国产免费在线观看| 久久人人爽人人片av| 麻豆久久精品国产亚洲av| 亚洲精品影视一区二区三区av| 成人永久免费在线观看视频| 波多野结衣高清作品| 午夜精品国产一区二区电影 | 老司机午夜福利在线观看视频| 我的老师免费观看完整版| 欧美成人a在线观看| 欧美人与善性xxx| 久久久久久国产a免费观看| 观看免费一级毛片| 欧美bdsm另类| 久久人人爽人人片av| 日本-黄色视频高清免费观看| 色播亚洲综合网| 寂寞人妻少妇视频99o| 男人舔奶头视频| av卡一久久| 熟妇人妻久久中文字幕3abv| 麻豆国产97在线/欧美| 精品人妻一区二区三区麻豆 | 噜噜噜噜噜久久久久久91| 啦啦啦韩国在线观看视频| 菩萨蛮人人尽说江南好唐韦庄 | 免费观看在线日韩| 日日摸夜夜添夜夜爱| 国产免费男女视频| 久久久久久久午夜电影| 99热精品在线国产| av免费在线看不卡| 亚洲久久久久久中文字幕| 一级a爱片免费观看的视频| 成人性生交大片免费视频hd| 小说图片视频综合网站| 日日摸夜夜添夜夜爱| 久久精品国产亚洲av涩爱 | 亚洲aⅴ乱码一区二区在线播放| 午夜日韩欧美国产| 长腿黑丝高跟| 老女人水多毛片| avwww免费| 又爽又黄无遮挡网站| 国产一级毛片七仙女欲春2| 久久午夜福利片| 国产精品乱码一区二三区的特点| 日韩强制内射视频| 国产欧美日韩精品一区二区| 波多野结衣高清作品| 精品一区二区三区av网在线观看| 久久久久久久久大av| 欧美高清性xxxxhd video| www日本黄色视频网| 国产精品伦人一区二区| 亚洲美女黄片视频| 少妇熟女欧美另类| 男女啪啪激烈高潮av片| 熟女人妻精品中文字幕| 国产女主播在线喷水免费视频网站 | or卡值多少钱| 成人欧美大片| 国产精品免费一区二区三区在线| 日本在线视频免费播放| 少妇丰满av| 欧美另类亚洲清纯唯美| 婷婷色综合大香蕉| 亚洲成a人片在线一区二区| 波多野结衣高清无吗| 狂野欧美白嫩少妇大欣赏| 国产高潮美女av| 久久午夜亚洲精品久久| 寂寞人妻少妇视频99o| 18禁裸乳无遮挡免费网站照片| 精品不卡国产一区二区三区| videossex国产| 欧美最新免费一区二区三区| 午夜福利在线观看吧| 九九在线视频观看精品| 欧美xxxx黑人xx丫x性爽| av福利片在线观看| 一边摸一边抽搐一进一小说| 两性午夜刺激爽爽歪歪视频在线观看| 免费大片18禁| 国产精品亚洲美女久久久| 激情 狠狠 欧美| 日日摸夜夜添夜夜添av毛片| 丰满乱子伦码专区| 小蜜桃在线观看免费完整版高清| 波多野结衣高清作品| 99热这里只有是精品50| 亚洲精品色激情综合| 中文字幕人妻熟人妻熟丝袜美| 久久精品夜夜夜夜夜久久蜜豆| 干丝袜人妻中文字幕| 亚洲美女黄片视频| 久久久国产成人精品二区| 欧美又色又爽又黄视频| 韩国av在线不卡| 99国产极品粉嫩在线观看| 美女 人体艺术 gogo| 大型黄色视频在线免费观看| 精品无人区乱码1区二区| 嫩草影视91久久| 久久人人爽人人片av| 99国产极品粉嫩在线观看| 美女高潮的动态| 美女大奶头视频| 女的被弄到高潮叫床怎么办| 精华霜和精华液先用哪个| 特大巨黑吊av在线直播| 男女下面进入的视频免费午夜| 欧美另类亚洲清纯唯美| 成人国产麻豆网| 免费黄网站久久成人精品| 久久这里只有精品中国| 国产av一区在线观看免费| 热99在线观看视频| 国产乱人偷精品视频| 久久中文看片网| 亚洲av成人精品一区久久| 日韩欧美三级三区| 国内精品久久久久精免费| 国产一区二区亚洲精品在线观看| 亚洲人成网站在线观看播放| 欧美一区二区国产精品久久精品| 久久亚洲国产成人精品v| 一级毛片久久久久久久久女| 一个人看视频在线观看www免费| 91久久精品国产一区二区成人| 日韩精品中文字幕看吧| 欧美激情在线99| 国产精品1区2区在线观看.| 一级毛片我不卡| 我的老师免费观看完整版| 一进一出抽搐动态| 97碰自拍视频| 亚洲一区高清亚洲精品| 国产真实伦视频高清在线观看| 欧美极品一区二区三区四区| 久久婷婷人人爽人人干人人爱| 别揉我奶头 嗯啊视频| 免费电影在线观看免费观看| 精品久久久噜噜| 久久久精品94久久精品| 中文资源天堂在线| 亚洲国产高清在线一区二区三| 禁无遮挡网站| 一进一出抽搐gif免费好疼| 国产黄色视频一区二区在线观看 | videossex国产| 欧美+日韩+精品| 亚洲av一区综合| 黄色一级大片看看| 久久99热6这里只有精品| 少妇人妻一区二区三区视频| 亚洲精品456在线播放app| 国产高清激情床上av| 国产精品一区二区免费欧美| 天堂√8在线中文| 国产亚洲精品av在线| 日本a在线网址| av天堂中文字幕网| 免费观看的影片在线观看| 国内精品美女久久久久久| 国产精品美女特级片免费视频播放器| 欧美又色又爽又黄视频| 老司机福利观看| 国产蜜桃级精品一区二区三区| 精品一区二区三区av网在线观看| a级毛片免费高清观看在线播放| 内射极品少妇av片p| 99国产精品一区二区蜜桃av| 在线天堂最新版资源| av女优亚洲男人天堂| 国产真实伦视频高清在线观看| 亚洲人成网站在线播| 国产一区亚洲一区在线观看| 国产亚洲精品综合一区在线观看| 亚洲七黄色美女视频|