• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Novel Architecture of Security Orchestration,Automation and Response in Internet of Blended Environment

    2022-11-10 02:28:24MinkyungLeeJulianJangJaccardandJinKwak
    Computers Materials&Continua 2022年10期

    Minkyung Lee,Julian Jang-Jaccard and Jin Kwak

    1ISAA Lab,Department of Cyber Security,Ajou University,Suwon,16499,Korea

    2Department of Computer Science and Information Technology,Massey University,Auckland,0745,New Zealand

    3Department of Cyber Security,Ajou University,Suwon,16499,Korea

    Abstract:New technologies that take advantage of the emergence of massive Internet of Things (IoT) and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response (SOAR) in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment (IoBE) where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response (SOAR) part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT.

    Keywords:Blended threat (BT);collaborative units for blended environment(CUBE);internet of blended environment (IoBE);security orchestration,automation and response(SOAR)

    1 Introduction

    According to the World Economic Forum,Information and Communication Technology(ICT),such as artificial intelligence,big data,and Internet of Things(IoT)in the fourth industrial revolution has advanced to convergence technology of nanotechnology,biotechnology,information technology,and cognitive science,maximizing the connectivity between various technologies[1].For example,with the emergence of massive IoT,a hyper-connected network environment has emerged which connects millions of devices at a high density.An evolution to a hyper-connected society is underway,where data generation,collection,and sharing activities occur ceaselessly for people,objects,and spaces using the Internet as a medium[2].Furthermore,various convergence environments,such as smart factories,smart buildings,and cooperative intelligent transport systems(C-ITS)have emerged.Internet technology (IT) is combined and applied in these environments to connect each other producing complex services and data[3,4].New advanced security threats exploiting various security vulnerabilities in different architecture services used in these new environments have been found[5,6].A variety of response technologies cyberattacks utilizing conventional Instruction Prevention Systems(IPS)and Security Information and Events Management(SIEM)have been offered to respond to such advanced security threats[7-12].However,the need to detect and respond automatically to these new types of cyberattacks without the intervention of security personnel has emerged by integrating various existing security technologies cyberattacks.However,the concern over the management of the various types of log data produced from heterogeneous security technologies and the operations of effective security response mechanisms on different architectures has been raised[13].This research possesses various contributions in the future environment such as IoBE:

    ? First,it has prepared for the blended environment by analyzing massive IoT and various convergence environments.

    ? Second,the variety of attack surfaces has been explored in IoBE by analyzing attack surfaces in the environment.

    ? Third,future environment such as IoBE has been explored by defining and analyzing the environment where various convergence environments are connected.

    ? Finally,countermeasure has explored how to respond to numerous security incidents in IoBE including various convergence by analyzing SOAR and proposing SOAR-CUBE.

    In this paper,we propose a security orchestration,automation and,response with collaborative units of blended environment (SOAR-CUBE) architecture to respond to newly emerging security threats rapidly and efficiently.In Section 2,we analyze massive IoT,a hyper-connected network environment,and analyze SOAR that automates the response process of various security threats.In Section 3,we define a number of terms used in the new environment,namely Internet of Blended Environment(IoBE)and Blended Threat(BT).Section 4 newly proposes a SOAR-CUBE architecture that can be applied to a complex environment by integrating heterogeneous security technologies to respond to BT efficiently in IoBE,and Section 5 provides the conclusion.

    2 Basic Definitions

    In this section,we describe the definitions of massive IoT as millions of devices are all connected at a high density and the definitions of SOAR as automation processes of various threats to counter security incidents with minimal human intervention.They have already been defined by Gartner.

    2.1 Massive IoT

    Massive IoT refers to a hyper-connected network environment,in which millions of devices are all connected at a high density.The emergency of the massive IoT has been brought through the development of low-power wide-area (LPWA) network technology (e.g.,Sigfox and LoRa) that facilitates broad communication with the devices using low-power consumption which enabled a largescale IoT connected within a specific range.Tab.1 shows the key requirements for the construction of massive IoT in terms of key requirements and descriptions[14].

    Table 1:Key requirements for massive IoT

    Tab.2 illustrates different environments where massive IoT applications are deployed and the descriptions of how the massive IoT applications are used in each environment.

    Table 2:The environment of massive IoT applications

    With the recent progress and advancement in the IT,various environments have been increasingly combined,for example,smart factories integrated within a smart building.With the increasing combination of different environments for massive IoT applications—call it a convergence environment,it is expected that the architecture and platform that house the combination of massive IoT-applied environments will become complex.In addition,the number of sensors and data-processing capacity have been growing with the continuous development of IoT devices and technology.They are evolving into intelligent smart sensors as the data processing and analysis functions are combined[15].However,malicious attacks or unintended information breaches can occur while collecting and processing the data produced in various convergence environments.This is due to an increase in the processing amount of data from massive IoT devices.There is also a concern that cyberattacks will become highly advanced because of an increase in the processing capacity of IoT devices and reduction in the processing costs[16].The advancement of new types of networks(e.g.,5G,LPWA,and wireless networks)which connect to the architectures and devices of massive IoT is becoming diverse.This new style of connection in the new convergence environments is expected to massively expand the attack surfaces where the security threats can occur.

    2.2 Security Orchestration,Automation and Response

    In recent years,many companies have been adopting various security technologies,such as antivirus software,firewalls,and intrusion detection systems[17],and implementing SIEM to detect security threats by managing and analyzing various produced logs.However,according to the 2020 Cyber Resilient Organization report from IBM,51%of companies had no computer security incident response plan across the organization,and 53% responded that the time required for detecting and responding to cyberattacks was increasing[18].Furthermore,according to Baker Hosteller,security experts required at least 104 days for detecting,analyzing,and notifying attacks in 2020,as opposed to 87 days before that year[19].The frequency of security incidents occurring in organizations and companies as well as the time required for detecting,analyzing,and responding to security incidents are on the rise because the manpower and time are required to perform integrated management and analysis of heterogeneous solutions[18].With the requirement for automation,Gartner introduced the concept of SOAR.According to Gartner,SOAR automates response processes of various threats to respond to security incidents with minimal human intervention.It is a security automation platform that helps employees to respond to advanced security threats according to the standardized work process when an incident that requires human intervention occurs.For such automated responses to security incidents,SOAR consists of Security Orchestration and Automation (SOA),Security Incident Response Platform(SIRP),and Threat Intelligence Platform(TIP)[20],which are described as follows:

    ? Security Orchestration and Automation (SOA):Data generated from heterogeneous security solutions are collected and the workflows between the security solutions are automated to identify monotonous and/or repetitive tasks of the security response team and reduce the time consumed on security incident response work.

    ? Security Incident Response Platform (SIRP):By automating the security threat response processes,tasks are assigned and managed according to the processes predetermined by the internal security incident response policy for each incident type when a security incident occurs.

    ? Threat Intelligence Platform(TIP):Information on threat elements is provided in association with the company’s existing security systems or response solutions by performing correlation analysis on threat data collected in real-time from various sources to support the analysis work of the security threats occurring in the organization.This increases the proactive responsiveness of the security personnel.

    Studies are underway on the need for SOAR to receive threat element information and facilitate the automation of security threat response systems through correlation analyses of data between heterogeneous security tools.However,there is a lack of studies on the development of a model for practically applying and managing the SOAR in convergence environments.Islam et al.[21]proposed a hierarchical architecture model consisting of(i)security tools,(ii)integration,(iii)data processing,(iv)semantic,(v)orchestration,and(vi)user interface layer to design a SOAR platform.They verified an automated incident response process by automatically integrating security technologies.However,they did not offer a comprehensive study conducted on TIP for collecting threat data and performing correlation analysis.Zheng et al.proposed security automation and orchestration framework for continuous monitoring and automatic patches of security of heterogeneous devices for reasons such as the complexity of patch application caused by an increase in attack surfaces of massive IoT[22].Their study requires further research in various domains,such as authentication and network security focusing on IoT system security.In addition,many companies are developing security products,as listed in Tab.3[23-26].These SOAR technologies are insufficient in that they do not provide all the key functions for SOA,SIRP,and TIP,and studies on SOAR applicable to complex environments.To fill these research gaps,we propose an architecture that can efficiently apply SOAR in various environments connected with IT.

    Table 3:Analysis of key functions of related works about SOAR

    3 New Definitions

    In this section,weprovide the definitions of Internet of Blended Environment (IoBE) as an environment where smart factories,digital healthcare,smart grids,etc.are interconnected for efficient analysis of the complexly connected convergence environment.Blended Threat(BT)is one in which various security threats are combined throughout the vulnerable surface where security attacks can occur in IoBE.We provide a comprehensive analysis of different attack surfaces raised from each environment in IoBE along with the types of security threats raised from BT.We also define Collaborative Units of Blended Environment(CUBE)to indicate a dynamic combination of possible BT and response technologies on IoBE.

    3.1 Internet of Blended Environment(IoBE)

    In a convergence environment a variety of ITs,such as sensing,networking,big data,artificial intelligence(AI),and cloud are fused[27].In such a convergence environment,the threat prone attack surfaces are on the rise because of the emergence of massive IoT.Various studies have been underway to find effective responses on these attack surfaces to prevent and respond to data corruption and forgery in the processes of the data life cycle,such as data collection,processing,and storage[28,29].However,convergence environments,such as digital healthcare and smart grid,can be connected to each other.For example,the energy waste can be tracked through an energy consumption pattern analysis of an entire city.This is perfomred by analyzing the data from the energy management system that monitors the energy consumption of the smart grids and the data from the power consumption monitoring system of smart buildings.In this case,various convergence environments can become very complex as each connected environment becomes more diverse.

    The convergence environments,in which IoBE can be constructed,include smart factories,smart grids,and digital healthcare,as described in Tab.4.

    Table 4:Applicable area in IoBE

    Table 4:Continued

    Consequently,the data communication in the convergence environment is expected to become more complex for collecting,processing,and storing data.Fig.1 illustrates how IoBE can interact with various convergence environments for the process of the data lifecycle.The flow of the data in IoBE is as follows:

    1.Data acquisition:It refers to the process of collecting data generated from systems,such as digital healthcare,smart factory and smart grid.In data acquisition,various types of data are collected through different domains and paths,such as Digital Imaging and Communications in Medicine (DICOM) which communicates digital images of medical devices in digital healthcare.

    2.Data storage:It is the process of storing the collected data at a data center.Note that data are stored in various formats.

    3.Data processing:It involves processing the stored data and includes a process of converting raw data into high-level information required by services or systems.Through a process of forming and analyzing the relationships between different data,new data that can be used by the services or systems within the IoBE are created.

    4.Data archive:It is the process that facilitates quick retrieval of data through the creation of metadata to consider the long-term retention of the collected and processed data.

    5.Data dissemination:It is the process of disseminating or sending data to users through user interfaces.It can be used in application services,such as medical treatment and statistical analysis.

    Figure 1:IoBE as an environment where a variety of IT such as sensing,networking,big data,AI,and cloud are blended

    The IoBE can create a smart city environment.Furthermore,based on the technological advancement in the future,it is expected that the connections between smart cities in the IoBE will facilitate the creation of a broader smart society and smart nation.

    3.2 Blended Threat(BT)

    The addition of new environments to various convergence environments constiituting an IoBE is expected to cause complex security threats that exploit security vulnerabilities existing in the numerous components of the IoBE,such as device architectures,network protocols,and platforms[2,35].Therefore,an analysis is required for the attack surfaces where security threats can be found in IoBE.Tabs.5-9 below provide comprehensive analysis of the attack surfaces that can cause security vulnerabilities in each convergence environment of IoBE.

    Table 5:Examples of attack surface in smart factory

    Table 5:Continued

    Table 6:Examples of attack surface in smart grid

    Table 6:Continued

    Table 7:Examples of attack surface in digital healthcare

    Table 7:Continued

    Table 8:Examples of attack surface in smart building

    Table 8:Continued

    Table 9:Examples of attack surface in C-ITS

    Table 9:Continued

    As attack surfaces in each convergence environment increase,additional attack surfaces may occur.As such,the complexity of security threats that currently threaten the society may also increase.The security threats are expected to increase because various components will become even more complex as new environments are added and connected to other environments in the IoBE.Furthermore,even for the same type of security threats,such as Distributed Denial of Service(DDoS)attacks and malware infection,attacks may occur through different attack surfaces and vulnerabilities depending on the environment[71].Therefore,the BT in our context refers to the security threats that occur as various security threats are converged and combined through attack surfaces in an IoBE,as shown in Fig.2.

    Attack scenarios can be caused by blending security threats that may occur because of the connection relationship between each component in the IoBE,as shown in Tab.10.

    Table 10:Attack scenario using BT in IoBE

    To respond to BT,a response measure is required based on the vulnerability analysis of each component,and an analysis of the attack surfaces where cyberattacks may occur is required through the analysis of the connection relationship between the components.

    Figure 2:Blended threat in IoBE

    3.3 Collaborative Units of Blended Environment(CUBE)

    The data in IoBE are generated in complex environments and transmitted through multiple domains through different paths.Therefore,security threats are different for different components,such as the wireless LAN and edge network sections,and the security level required to respond to these threats is also different[72-74].Furthermore,because new environments are combined in IoBE,the security technologies used in various environments are diverse.Therefore,automatic detection and response to cyberattacks is required to minimize the damage casued by a BT.We define a pair of security threat and response technology for each security threat as a unit to provide distributed deployment of existing security technologies for efficient responses.Although there is no security technology corresponding to the recent intelligent security threats,mitigation method has been designed to minimize damage in the event of a security threat.It can define a pair of security threat and response technology including mitigation methods for each security threats.In addition,several such units can be dynamically combined as collaborative units to respond flexibly to different BTs.In short,CUBE can be considered as a dynamic combination of possible security threats and response technologies in IoBE.The CUBE defined to respond to BT is shown in Fig.3.

    ? Unit:It is a pair of security threats and mitigation technology for each security threat.For example,the response technologies include malicious mail pattern-based spam-mail blocking and unidentified-sender blocking for a security threat that disseminates e-mails such as phishing e-mails containing malicious code,for example,a worm and virus to induce the execution by users[75].

    ? Collaborative Units:It refers to a dynamic combination of mitigation technologies according to the cyber kill chain,which is a stage where cyber-attack occurs.The cyber kill chain stage is an attack chain,which is a path that the attacker takes to infiltrate the system to incapacitate the attacking target[76].By modeling a BT,it is possible to appropriately mitigate appropriately to the security threat at each stage based on the hierarchical structure of the complex security threats.

    Figure 3:Definition of CUBE

    ? Collaborative Units for Blended Environment:It refers to a dynamic combination of possible security threats and mitigation technologies in IoBE.It can change dynamically according to different security policies and response systems in the IoBE,which is the attack target of a blended attack.

    3.4 Security Orchestration and Response with Collaborative Units of Blended Environment

    In this paper,we define SOAR-CUBE as an architecture that applies CUBE to SOAR.SOARCUBE consists of the followings components.

    ? Threat Intelligence Platform with Collaborative Units of Blended Environment(TIP-CUBE):This platform collects threat data based on blended attacks occurring in the IoBE and analyzes the data correlations.Therefore,the attack information such as the origin can be identified by backtracking the occurrence path of the BT through the correlations between the data.Furthermore,the cyber-attack response time can be minimized through the BT by predicting vectors that may occur based on the linkage with existing security solutions that are used in the IoBE,i.e.,the environment in which SOAR-CUBE is operated.For example,it is possible to predict BT through system connectivity within the IoBE by analyzing the components constituting the IoBE and threat intelligence to analyze security vulnerabilities that may occur in these components.In addition,a unit which comprises a pair of security threats and a mitigation technology for each security threat can be built based on the predicted BT and mitigation technologies operated by organizations or companies.

    ? Security Orchestration and Automation with Collaborative Units of Blended Environment(SOA-CUBE):This is the security orchestration and automation technology in CUBE.Because various security technologies corresponding to BT are dynamically combined and used in the CUBE,collaboration and linkage between various tools are required.The linkage between heterogeneous security tools is facilitated through workflow modeling that links different inputs and outputs between security tools such as security solutions and response technologies and dynamic playbook creation that informs the human intervention point based on a response system composed with a series of logics for cyber-attack response[77,78].

    ? Security Incident Response Platform with Collaborative Units of Blended Environment(SIRPCUBE):This component is an automation technology of the response system in the event of cyberattacks and security incidents,such as blended attacks in an IoBE.In other words,this technology automates the mitigation technology in CUBE,which is defined as a dynamic combination of security threats and mitigation technologies.The automation of response systems can be achieved through the development of BT-type classification techniques and blended attack detection and response techniques for efficient responses through minimal human intervention in millions of security incidents occurring in various manners.

    4 Conceptual Architecture

    Fig.4 illustrates the architecture of the SOAR-CUBE and the terms and components used in the architecture is described in Tab.11.The illustration as to how SOAR-CUBE detects and responds to different BT follows.

    Table 11:Components of SOAR-CUBE architecture

    Figure 4:A conceptual architecture for SOAR-CUBE

    4.1 Monitoring&Anomaly Detection(Step 1)

    In this step,the attacker attempts to penetrate the SOAR-CUBE architecture-applied environment through various attack surfaces in the IoBE.The anomalies are detected using the security devices designed in advance through this process.The attack patterns mainly used in cyberattacks are defined in advance to block the attacker based on these patterns.If the attacker cannot be blocked in advance(e.g.,because the blended attack bypasses the pre-defined patterns),the anomaly is detected through the analysis of data,such as security events and logs generated by security technologies constructed in the IoBE.Existing IPS/IDS or SIEM can be used in this step.

    4.2 Inspection Team(Step 2)

    This step is performed by the inspection team if an anomaly is detected in Step 1.The attack data produced through TIP are collected,and the threat types are classified based on the collected data.Furthermore,the attack data can be comparatively analyzed with the open threat data of the Open Source Intelligence(OSINT)to define the intrusion indicators in advance or identify the attack patterns.If the attack pattern is difficult to be identified owing to an unknown or intelligent attack,the BT attack path can be deduced through correlation analysis of the log data in the IoBE system.In addition,no BT is detected or analyzed in the CUBE,the inspection team can generate a CUBE considering the BT based on the analysis performed by other companies or organizations through threat intelligence.

    4.3 Response Team(Step 3)

    This step is for protecting the assets in the IoBE via the response team after the BT analysis of Step 2 performed by the inspection team.It includes SOA-CUBE and SIRP-CUBE.The process of creating the security technology’s workflow and the dynamic playbook is undergone according to the cyber-kill chain stage and attack type of the BT detected through SOA-CUBE.In SOA-CUBE,the orchestration that connects each input/output of security technology for inter-operation is required before the occurrence of the BT.Afterward,the automated response is performed according to the cyber kill chain stage via SIRP-CUBE.It includes the process of automating the simple and repetitive response according to the response system based on the dynamic playbook.Because each component environment in the IoBE is operated based on different policies,the response system can change dynamically depending on the environment applied in SIRP-CUBE.

    4.4 Management Team(Step 4)

    This step is for performing the maintenance and repair of SOAR-CUBE.It includes the process of recovering the damaged system and data after responding to a blended attack.In the maintenanceand-repair step,the log data generated in the SOAR-CUBE architecture are analyzed and managed to identify similar types of BT in the future.Furthermore,if the response to a blended attack is managed,it will be possible to respond more efficiently when the same attack occurs again.In this step,refactoring and geometry management are performed,including performance improvement and error correction for the existing SOAR-CUBE architecture.

    5 Conclusion

    Recently,various devices such as control equipment and medical devices,have been connected to networks in convergence environments.Furthermore,new platforms have been developed;this has opened up large and new attack surfaces.Different convergence environments can be interconnected to provide new services and platforms.As various convergence environments have emerged and have been connected to each other,the complexity of the attack surfaces where security threats can occur has increased.To address this security issue,we first offered the definition of IoBE as an environment in which various convergence environments are interconnected.We also defined a BT as a security threat that uses multiple security vulnerabilities through various attack surfaces in the IoBE.As the surfaces exposed to BT in the IoBE have increased,the frequency of security incidents in organizations and companies has also increased.Furthermore,manpower and time are required for integrated management and analysis of heterogeneous security solutions,thus,increasing the time consumed in detecting,analyzing,and responding to the security incidents after their occurrence.Therefore,we proposed a new concept called CUBE,which facilitates dynamic changes according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to a BT.

    We also proposed a SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.It can be used to perform modeling of a workflow that links heterogeneous security technologies and threat intelligence function that collects threat data and performs a correlation analysis of the data.Furthermore,it facilitates efficient responses to complex BTs through security orchestration,automation function,and response automation function based on the dynamic playbook creation.In the future,we plan to further study the prediction of complexly-connected data-communication paths through service and system predictions in the future environment and investigate complex attack surfaces,where cyberattacks such as data corruption and forgery,can occur in the data life cycle.Furthermore,we plan to incorporate and standardize the input-output data created or used in different security technologies(for example,firewall andIPS)to interlock them.In conclusion,we will simulate our proposed architecture in IoBE and verify that it will be efficient and accurate.

    Funding Statement:This work was supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(No.2021R1A2C2011391)and was supported by the Ajou University research fund.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    Table 12:A list of abbreviations

    Table 12:Continued

    久久久色成人| 国产伦精品一区二区三区视频9| 99视频精品全部免费 在线| 欧美不卡视频在线免费观看| 国产伦精品一区二区三区四那| 久久久久精品国产欧美久久久| 国产精品美女特级片免费视频播放器| 成人无遮挡网站| 午夜福利在线观看吧| 舔av片在线| 淫秽高清视频在线观看| 一进一出好大好爽视频| 一区二区三区高清视频在线| 欧美日韩综合久久久久久 | 精品久久久久久久久久久久久| 久久久国产成人精品二区| 别揉我奶头~嗯~啊~动态视频| 一边摸一边抽搐一进一小说| 一夜夜www| 深爱激情五月婷婷| 色综合站精品国产| 亚洲精品粉嫩美女一区| 波多野结衣高清作品| 免费不卡的大黄色大毛片视频在线观看 | 国产乱人伦免费视频| av在线亚洲专区| 韩国av一区二区三区四区| netflix在线观看网站| 国产在线男女| 真实男女啪啪啪动态图| 尤物成人国产欧美一区二区三区| 欧美国产日韩亚洲一区| 欧美成人免费av一区二区三区| 91精品国产九色| 亚洲欧美清纯卡通| 亚洲aⅴ乱码一区二区在线播放| 超碰av人人做人人爽久久| 琪琪午夜伦伦电影理论片6080| 天堂动漫精品| 黄色女人牲交| 99久久精品热视频| 久久久久久伊人网av| 日韩欧美一区二区三区在线观看| 一a级毛片在线观看| 18禁黄网站禁片免费观看直播| 亚洲成人中文字幕在线播放| 亚洲成人精品中文字幕电影| 男人舔奶头视频| 此物有八面人人有两片| 国内精品美女久久久久久| 久久精品91蜜桃| 亚洲国产高清在线一区二区三| 久久精品国产亚洲av涩爱 | 久久亚洲精品不卡| av国产免费在线观看| 国产一区二区三区av在线 | 色视频www国产| 久久99热6这里只有精品| 国产成人av教育| 成人性生交大片免费视频hd| 热99re8久久精品国产| 51国产日韩欧美| 亚洲人与动物交配视频| 人妻少妇偷人精品九色| 亚洲欧美清纯卡通| 中国美女看黄片| 国国产精品蜜臀av免费| 搡老岳熟女国产| 午夜日韩欧美国产| 精品人妻熟女av久视频| 亚洲18禁久久av| 日本黄色视频三级网站网址| 国产大屁股一区二区在线视频| 亚洲欧美日韩高清专用| 国产免费av片在线观看野外av| 亚洲成人久久性| 在线国产一区二区在线| 麻豆精品久久久久久蜜桃| 男女之事视频高清在线观看| 一级a爱片免费观看的视频| 国产白丝娇喘喷水9色精品| 老熟妇乱子伦视频在线观看| 在线天堂最新版资源| 久久欧美精品欧美久久欧美| 精品人妻偷拍中文字幕| av在线观看视频网站免费| 日韩中字成人| 搡女人真爽免费视频火全软件 | 日韩,欧美,国产一区二区三区 | 婷婷精品国产亚洲av| 在线观看66精品国产| 色综合色国产| 国产精品国产高清国产av| 国产视频一区二区在线看| 国产熟女欧美一区二区| 永久网站在线| 麻豆成人av在线观看| 国产精品一区二区三区四区免费观看 | 欧美3d第一页| 特大巨黑吊av在线直播| 精品午夜福利视频在线观看一区| 欧美高清性xxxxhd video| 精品久久久久久久久久免费视频| 免费人成在线观看视频色| 亚洲无线观看免费| 伦精品一区二区三区| 一级黄色大片毛片| 国产乱人视频| 草草在线视频免费看| 国产伦精品一区二区三区视频9| 亚洲国产欧洲综合997久久,| 色综合站精品国产| 国内毛片毛片毛片毛片毛片| 在线观看美女被高潮喷水网站| 午夜福利在线观看吧| 欧美色视频一区免费| 国产精品伦人一区二区| 一卡2卡三卡四卡精品乱码亚洲| 中文在线观看免费www的网站| 国产精品电影一区二区三区| 91在线观看av| 少妇熟女aⅴ在线视频| 麻豆成人av在线观看| 久久精品91蜜桃| 一进一出抽搐gif免费好疼| av在线观看视频网站免费| avwww免费| 哪里可以看免费的av片| 免费大片18禁| 久久午夜亚洲精品久久| 久久久久久大精品| 全区人妻精品视频| 国内精品宾馆在线| 又粗又爽又猛毛片免费看| 狂野欧美白嫩少妇大欣赏| 精品人妻偷拍中文字幕| 国产毛片a区久久久久| 成人国产综合亚洲| 亚洲第一区二区三区不卡| 欧美又色又爽又黄视频| 久久久久久伊人网av| 天美传媒精品一区二区| 久久久国产成人免费| 久久久国产成人精品二区| 久久久精品大字幕| 欧美人与善性xxx| 动漫黄色视频在线观看| 亚洲精品成人久久久久久| 国产精品,欧美在线| 床上黄色一级片| 一区二区三区四区激情视频 | 日韩精品青青久久久久久| 深夜a级毛片| 波多野结衣高清作品| 岛国在线免费视频观看| 99riav亚洲国产免费| 免费看日本二区| 十八禁国产超污无遮挡网站| 成人永久免费在线观看视频| 又紧又爽又黄一区二区| 大型黄色视频在线免费观看| 国产精品一及| 婷婷色综合大香蕉| 久久精品国产清高在天天线| 校园人妻丝袜中文字幕| 亚洲黑人精品在线| 日本欧美国产在线视频| 97超级碰碰碰精品色视频在线观看| 亚洲不卡免费看| 国产精品99久久久久久久久| 亚洲狠狠婷婷综合久久图片| 免费大片18禁| 久久久久久国产a免费观看| www.www免费av| 欧美中文日本在线观看视频| 赤兔流量卡办理| 熟女电影av网| 色在线成人网| 天堂动漫精品| 亚洲欧美日韩卡通动漫| 少妇人妻精品综合一区二区 | 亚洲精品在线观看二区| 少妇被粗大猛烈的视频| 色哟哟·www| 日韩高清综合在线| 女人被狂操c到高潮| 亚洲人成网站高清观看| 国产精品99久久久久久久久| 一进一出抽搐gif免费好疼| 男人舔女人下体高潮全视频| 国产精品日韩av在线免费观看| 国产精品久久久久久av不卡| 亚洲人成伊人成综合网2020| 成人美女网站在线观看视频| 国产黄片美女视频| 亚洲欧美日韩无卡精品| 亚洲美女黄片视频| 一a级毛片在线观看| 欧美性猛交╳xxx乱大交人| 很黄的视频免费| 免费人成在线观看视频色| 老熟妇乱子伦视频在线观看| av天堂在线播放| 国产蜜桃级精品一区二区三区| 日本a在线网址| 美女高潮的动态| 99久久精品一区二区三区| 人妻夜夜爽99麻豆av| 久久婷婷人人爽人人干人人爱| 亚洲最大成人av| 国产精品嫩草影院av在线观看 | 天天一区二区日本电影三级| 12—13女人毛片做爰片一| 一进一出好大好爽视频| 两个人视频免费观看高清| 久久久久性生活片| 淫妇啪啪啪对白视频| 精品一区二区三区视频在线观看免费| 亚洲国产精品sss在线观看| 国产成人福利小说| 男人的好看免费观看在线视频| 精品99又大又爽又粗少妇毛片 | 久久精品综合一区二区三区| 日本一二三区视频观看| 天堂影院成人在线观看| h日本视频在线播放| 亚洲成人精品中文字幕电影| 女生性感内裤真人,穿戴方法视频| 亚洲欧美清纯卡通| 99久久成人亚洲精品观看| 老司机深夜福利视频在线观看| 又紧又爽又黄一区二区| av国产免费在线观看| 国产黄色小视频在线观看| 女人被狂操c到高潮| 人人妻人人看人人澡| 日韩人妻高清精品专区| 成年女人永久免费观看视频| 狂野欧美白嫩少妇大欣赏| 啦啦啦观看免费观看视频高清| 女同久久另类99精品国产91| www日本黄色视频网| 极品教师在线免费播放| 狂野欧美白嫩少妇大欣赏| 免费一级毛片在线播放高清视频| ponron亚洲| 男女边吃奶边做爰视频| 欧美色视频一区免费| 九色国产91popny在线| 在线观看66精品国产| 亚洲自拍偷在线| 深爱激情五月婷婷| 熟女人妻精品中文字幕| 天堂网av新在线| 网址你懂的国产日韩在线| 少妇被粗大猛烈的视频| 一区二区三区四区激情视频 | 国产91精品成人一区二区三区| 欧美黑人巨大hd| 日本黄色片子视频| 国产午夜精品论理片| 亚洲成人精品中文字幕电影| 舔av片在线| 熟女人妻精品中文字幕| 亚洲三级黄色毛片| 国产一级毛片七仙女欲春2| 亚洲熟妇熟女久久| 国内精品宾馆在线| 黄色欧美视频在线观看| 欧美日韩黄片免| 一进一出好大好爽视频| 久久久久国内视频| 欧美国产日韩亚洲一区| h日本视频在线播放| eeuss影院久久| 亚州av有码| 亚洲成人免费电影在线观看| 中文亚洲av片在线观看爽| 国产午夜福利久久久久久| 国产三级中文精品| 免费看a级黄色片| 亚洲精品一区av在线观看| 日本 av在线| 成人美女网站在线观看视频| 91麻豆av在线| 日本三级黄在线观看| 99久久成人亚洲精品观看| 国内精品久久久久精免费| 国产精品电影一区二区三区| 少妇的逼水好多| 亚洲欧美日韩东京热| 在线观看免费视频日本深夜| 亚洲成人久久性| 五月伊人婷婷丁香| 免费av毛片视频| 亚洲精品国产成人久久av| 少妇猛男粗大的猛烈进出视频 | 欧美高清性xxxxhd video| 亚洲经典国产精华液单| 国产精品国产三级国产av玫瑰| 99久久精品国产国产毛片| 国产精品野战在线观看| 男女啪啪激烈高潮av片| 国产一区二区在线av高清观看| 日本撒尿小便嘘嘘汇集6| 亚洲精华国产精华液的使用体验 | 老女人水多毛片| 全区人妻精品视频| 成人特级av手机在线观看| 给我免费播放毛片高清在线观看| 真实男女啪啪啪动态图| 国内精品一区二区在线观看| 99久久精品热视频| 午夜精品在线福利| 小蜜桃在线观看免费完整版高清| 美女大奶头视频| 俺也久久电影网| 精品国内亚洲2022精品成人| 久久欧美精品欧美久久欧美| 欧美在线一区亚洲| 九色国产91popny在线| 22中文网久久字幕| 日本a在线网址| 国产aⅴ精品一区二区三区波| 成年女人看的毛片在线观看| 精品久久久久久久久av| 久久99热6这里只有精品| 色综合色国产| 国产av不卡久久| 干丝袜人妻中文字幕| 国产乱人伦免费视频| 久久久久久久久久黄片| 别揉我奶头~嗯~啊~动态视频| 91在线观看av| 久久精品久久久久久噜噜老黄 | 欧美极品一区二区三区四区| 亚洲成人免费电影在线观看| 国产一区二区在线av高清观看| 三级毛片av免费| 99久久九九国产精品国产免费| 日本精品一区二区三区蜜桃| 国产麻豆成人av免费视频| 日韩精品中文字幕看吧| 他把我摸到了高潮在线观看| 99精品久久久久人妻精品| 国产亚洲精品综合一区在线观看| 久久精品久久久久久噜噜老黄 | 大又大粗又爽又黄少妇毛片口| 亚洲美女黄片视频| 日本 欧美在线| 日日夜夜操网爽| 日本与韩国留学比较| 久久久久久久精品吃奶| 美女被艹到高潮喷水动态| 亚洲精品日韩av片在线观看| 亚洲va在线va天堂va国产| 中国美白少妇内射xxxbb| 搡女人真爽免费视频火全软件 | 免费大片18禁| 别揉我奶头 嗯啊视频| 国产高清视频在线播放一区| 舔av片在线| 欧美另类亚洲清纯唯美| av.在线天堂| 天美传媒精品一区二区| 国内精品久久久久精免费| 久久国产乱子免费精品| 1024手机看黄色片| 欧美激情国产日韩精品一区| 亚洲一级一片aⅴ在线观看| 啦啦啦啦在线视频资源| 动漫黄色视频在线观看| 成人特级av手机在线观看| 九九爱精品视频在线观看| 12—13女人毛片做爰片一| 深爱激情五月婷婷| 又爽又黄a免费视频| av.在线天堂| 偷拍熟女少妇极品色| 午夜久久久久精精品| 久久欧美精品欧美久久欧美| 免费人成视频x8x8入口观看| 成人美女网站在线观看视频| 一a级毛片在线观看| 国产欧美日韩一区二区精品| 两性午夜刺激爽爽歪歪视频在线观看| 色吧在线观看| 夜夜夜夜夜久久久久| 免费观看在线日韩| 一夜夜www| 啦啦啦观看免费观看视频高清| 午夜影院日韩av| 麻豆国产av国片精品| 婷婷亚洲欧美| 久久精品综合一区二区三区| 欧美极品一区二区三区四区| 久久久久久九九精品二区国产| 91久久精品国产一区二区成人| 99精品在免费线老司机午夜| 久久国产乱子免费精品| 久久国内精品自在自线图片| 人妻制服诱惑在线中文字幕| 床上黄色一级片| 久久久久精品国产欧美久久久| 1000部很黄的大片| 亚洲国产欧美人成| 欧美成人免费av一区二区三区| 永久网站在线| 91在线精品国自产拍蜜月| 别揉我奶头 嗯啊视频| 久久久久久九九精品二区国产| 男女视频在线观看网站免费| 国产亚洲精品综合一区在线观看| 国产精品一及| 亚洲精品456在线播放app | 亚洲国产精品成人综合色| 午夜福利在线观看免费完整高清在 | 欧美在线一区亚洲| 日日夜夜操网爽| 久久亚洲精品不卡| 欧美色欧美亚洲另类二区| 身体一侧抽搐| 久久久久久久精品吃奶| 午夜免费男女啪啪视频观看 | 九色成人免费人妻av| 国产精品永久免费网站| 亚洲成人精品中文字幕电影| 1024手机看黄色片| .国产精品久久| 九九热线精品视视频播放| 国产又黄又爽又无遮挡在线| 自拍偷自拍亚洲精品老妇| 99在线视频只有这里精品首页| 波野结衣二区三区在线| 舔av片在线| 黄色欧美视频在线观看| 婷婷六月久久综合丁香| 久久99热6这里只有精品| 两个人的视频大全免费| 亚洲精品久久国产高清桃花| 又黄又爽又免费观看的视频| 欧美日韩中文字幕国产精品一区二区三区| 国产大屁股一区二区在线视频| 制服丝袜大香蕉在线| 亚洲内射少妇av| 亚洲天堂国产精品一区在线| 人人妻人人澡欧美一区二区| 日本欧美国产在线视频| 成人一区二区视频在线观看| 亚洲国产精品sss在线观看| 狂野欧美白嫩少妇大欣赏| 动漫黄色视频在线观看| 一个人观看的视频www高清免费观看| 一个人看视频在线观看www免费| АⅤ资源中文在线天堂| 亚洲第一电影网av| 18禁黄网站禁片免费观看直播| 欧美xxxx性猛交bbbb| 国产极品精品免费视频能看的| 男女视频在线观看网站免费| 国产成人一区二区在线| 国产av不卡久久| 中文字幕人妻熟人妻熟丝袜美| 久久精品久久久久久噜噜老黄 | 啦啦啦观看免费观看视频高清| 久久99热这里只有精品18| 91精品国产九色| 国产精品福利在线免费观看| 精品人妻熟女av久视频| 午夜福利在线观看免费完整高清在 | 夜夜夜夜夜久久久久| 日韩精品青青久久久久久| 午夜爱爱视频在线播放| 一区二区三区激情视频| 国模一区二区三区四区视频| 免费无遮挡裸体视频| 一夜夜www| 国产成人一区二区在线| 综合色av麻豆| 看片在线看免费视频| 日韩欧美三级三区| 黄色丝袜av网址大全| 最新中文字幕久久久久| 女人被狂操c到高潮| 国产精品久久久久久亚洲av鲁大| 麻豆国产av国片精品| 99视频精品全部免费 在线| 一个人观看的视频www高清免费观看| 久久精品国产亚洲av涩爱 | 夜夜看夜夜爽夜夜摸| 午夜福利在线观看吧| 成年版毛片免费区| 制服丝袜大香蕉在线| 麻豆一二三区av精品| 免费高清视频大片| 乱码一卡2卡4卡精品| 热99在线观看视频| 特大巨黑吊av在线直播| 亚洲精品日韩av片在线观看| 欧美丝袜亚洲另类 | 性色avwww在线观看| h日本视频在线播放| 精品免费久久久久久久清纯| 国产伦一二天堂av在线观看| 我要看日韩黄色一级片| 看黄色毛片网站| 国产精品爽爽va在线观看网站| 国产 一区 欧美 日韩| 成人国产麻豆网| 精品久久久久久成人av| 一级a爱片免费观看的视频| 国产精品伦人一区二区| 精品久久久久久,| 少妇人妻精品综合一区二区 | 一边摸一边抽搐一进一小说| 在线天堂最新版资源| 男插女下体视频免费在线播放| 国产精品久久久久久久电影| 日韩欧美精品免费久久| 女同久久另类99精品国产91| 亚洲精华国产精华精| 成人高潮视频无遮挡免费网站| 免费看美女性在线毛片视频| 中国美白少妇内射xxxbb| 日韩强制内射视频| 亚洲午夜理论影院| 淫秽高清视频在线观看| 18+在线观看网站| or卡值多少钱| 中国美白少妇内射xxxbb| 欧美一区二区亚洲| 亚洲无线观看免费| 欧美性感艳星| 欧美人与善性xxx| 久久久久久国产a免费观看| 黄色欧美视频在线观看| 十八禁网站免费在线| 精品久久久久久久久久免费视频| 亚州av有码| 精品久久久噜噜| 哪里可以看免费的av片| 国产av麻豆久久久久久久| АⅤ资源中文在线天堂| 天堂av国产一区二区熟女人妻| 男女边吃奶边做爰视频| 日韩一区二区视频免费看| 欧美性猛交黑人性爽| 久久久久久久久中文| 久久久精品欧美日韩精品| 赤兔流量卡办理| 国产伦一二天堂av在线观看| 国产私拍福利视频在线观看| 国产高清三级在线| 久久久久久久久久黄片| 精品久久久久久久久久免费视频| 深夜精品福利| 成人综合一区亚洲| 麻豆国产97在线/欧美| 中文字幕高清在线视频| 舔av片在线| 搞女人的毛片| 国产高清有码在线观看视频| 亚洲av二区三区四区| 性色avwww在线观看| 三级国产精品欧美在线观看| 精品人妻熟女av久视频| 日日啪夜夜撸| 国产v大片淫在线免费观看| 日韩精品有码人妻一区| 色尼玛亚洲综合影院| 精品乱码久久久久久99久播| 黄色欧美视频在线观看| 久久人人爽人人爽人人片va| 波多野结衣巨乳人妻| 俄罗斯特黄特色一大片| 少妇熟女aⅴ在线视频| 亚洲欧美日韩卡通动漫| 国产精品98久久久久久宅男小说| 18禁裸乳无遮挡免费网站照片| 三级男女做爰猛烈吃奶摸视频| 嫁个100分男人电影在线观看| 国产极品精品免费视频能看的| 亚洲国产色片| 99国产极品粉嫩在线观看| 久久草成人影院| 久久精品夜夜夜夜夜久久蜜豆| 直男gayav资源| 国产91精品成人一区二区三区| 亚洲三级黄色毛片| 久久久久久大精品| 亚洲欧美日韩东京热| 一区二区三区免费毛片| 国产极品精品免费视频能看的| 无人区码免费观看不卡| 亚洲自拍偷在线| 久久精品国产亚洲av天美| 国产精品一区二区三区四区久久| 日日摸夜夜添夜夜添小说| 超碰av人人做人人爽久久| 白带黄色成豆腐渣| 久久九九热精品免费| 又粗又爽又猛毛片免费看| 免费看日本二区| 日韩欧美一区二区三区在线观看| 亚洲欧美日韩高清在线视频| 亚洲最大成人av| 老司机深夜福利视频在线观看| 日本 欧美在线| av在线蜜桃| 欧美丝袜亚洲另类 | 久久精品国产99精品国产亚洲性色| 欧美bdsm另类| 国产又黄又爽又无遮挡在线| 国产一区二区亚洲精品在线观看| 熟妇人妻久久中文字幕3abv|