• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Comprehensive DDoS Attack Classification Using Machine Learning Algorithms

    2022-11-10 02:29:20OlgaUssatovaAidanaZhumabekovaYenlikBegimbayevaEricMatsonandNikitaUssatov
    Computers Materials&Continua 2022年10期

    Olga Ussatova,Aidana Zhumabekova,Yenlik Begimbayeva,Eric T.Matson and Nikita Ussatov

    1Al-Farabi Kazakh National University,Almaty,050040,Kazakhstan

    2Institute of Information and Computational Technologies,Almaty,050010,Kazakhstan

    3Satbayev University,Almaty,050013,Kazakhstan

    4Purdue University,West Lafayette,47907,IN,USA

    5Turan University,Almaty,050013,Kazakhstan

    Abstract:The fast development of Internet technologies ignited the growth of techniques for information security that protect data,networks,systems,and applications from various threats.There are many types of threats.The dedicated denial of service attack (DDoS) is one of the most serious and widespread attacks on Internet resources.This attack is intended to paralyze the victim’s system and cause the service to fail.This work is devoted to the classification of DDoS attacks in the special network environment called Software-Defined Networking(SDN)using machine learning algorithms.The analyzed dataset included instances of two classes:benign and malicious.As the dataset contained twenty-two features,the feature selection techniques were required for dimensionality reduction.In these experiments,the Information gain,the Chi-square,and the F-test were applied to decrease the number of features to ten.The classes were also not completely balanced,so undersampling,oversampling,and synthetic minority oversampling(SMOTE) techniques were used to balance classes equally.The previous research works observed the classification of DDoS attacks applying various feature selection techniques and one or more machine learning algorithms.Still,they did not pay much attention to classifying the combinations of feature selection and balancing methods with different machine learning algorithms.This work is devoted to the classification of datasets with eight machine learning algorithms:na?ve Bayes,logistic regression,support vector machine,k-nearest neighbors,decision tree,random forest,XGBoost,and CatBoost.In the experimental results,the Information gain and F-test feature selection methods achieved better performance with all eight ML algorithms than with the Chi-square technique.Furthermore,the accuracy values of the oversampled and SMOTE datasets were higher than that of the undersampled and imbalanced datasets.Among machine learning algorithms,the accuracy of support vector machine,logistic regression,and na?ve Bayes fluctuates between 0.59 and 0.75,while decision tree,random forest,XGBoost,and CatBoost allowed achieving values around 0.99 and 1.00 with all feature selection and class balancing techniques among all the algorithms.

    Keywords:Internet security;networks;systems;DDoS;software-defined networking;feature selection;class balancing;machine learning;XGBoost;CatBoost

    1 Introduction

    Information security is a set of technologies and management methods required to guarantee the integrity,confidentiality,and availability of information data.Information security aims to protect the information,systems,networks,and applications from accidental or deliberate threats[1].Today’s online world is full of malware attacks[2],threats[3],cyberattacks[4],and scams[5].However,implementing effective measures to protect and preserve information from such various threats is difficult since the variety of threats and attacks that can potentially damage information and computer networks is growing every day and uses more sophisticated attack methods.Fig.1 shows the impact of information threats on information security criteria.

    Figure 1:Influence of information threats on information security criteria

    A common menace is a possibility of compromising information security in any form[6].Various threats,attacks,and methods are used to access and damage the most important data.Phishing attacks,one of the most common threats over the years,pose a serious threat to information security,and the number of these threats is growing[7].The main purpose of a phishing attack is to gain access to consumers’confidential personal data and financial information through various technical and social engineering methods[8].The number of different methods and types of phishing methods is growing when the information technologies actively progress.Another popular type of software for unauthorized access to consumer information is spyware.These unwanted programs may compromise or steal the customer’s information privacy.Spyware is not a direct attack by hackers but an unauthorized,covert installation on a computer.Such spyware provides remote access to the user’s computer and information about its activities[9].One of the most serious threats to attacks on Internet resources is a denial of service(DoS)attack.This type of attack does not directly damage information but disrupts services by attempting to disable the normal operation of a computer or network.The most advanced type of DoS attack is dedicated denial of services (DDoS).Unlike a DoS attack,a DDoS attack is performed from multiple devices and addresses at once,as shown in Fig.2.

    Figure 2:DDoS architecture

    A DDoS attack is a hacker attack that paralyzes websites in a short period of time[10].DDoS attacks are not intended to disrupt the victim’s system but cause the service to fail[11].The most serious malware among industrial hazards is called Flame.This program is a type of threat designed to steal and attack various valuable data.It is highly feasible because the Flame program has a variety of features,such as keyboard and network traffic control,voice recording,and screenshots.It uses a local area network(LAN)or USB storage to distribute it to different systems.Information security tools need to be strengthened to ensure information security in order to protect against various attacks,such as the threats described above.The DDoS attacks became common in the traditional and Software-Defined Networking(SDN)environments.In the traditional environment,they are directed on servers,while the attacks are executed on the controller in the SDN.The controller fails to provide services for the forwarding data packages under a DDoS attack in the SDN.At the same time,in traditional networks,the server completely stops providing services for users.

    It is necessary to choose information security tools,considering the compatibility of their functions and the effectiveness of their use.Excessive reinsurance can lead to high costs.A variety of methods and tools are used to identify threats.Machine learning (ML) is one of the most important and effective methods[12].This method is used to identify information system objects more accurately.The ML method is now popular for many real-time tasks using sophisticated algorithms.This field is closely related to computational statistics,making predictions using complex algorithms based on statistical data.ML uses data to determine the most effective algorithm based on the data’s volume,quality,and nature.The development of ML algorithms for detecting Internet threats has demonstrated very effective results for classifying normal and malicious traffic in networks.Nevertheless,ML algorithms show good results with datasets that include a reasonable set of features.

    Furthermore,new effective methods called neural networks started to be used to identify different kinds of threats[13-15].Neural networks[13]are an ML discipline that mimics the way neurons work in the human brain.Neural networks[14]are specially proposed to determine the typical characteristics of system users and their statistically significant deviations.Neural networks consist of input,latent,and output nodes,and they represent the information that enters the network.Input nodes are associated with hidden nodes,and these input nodes receive the information passed to them.Each hidden node has a limit:It is activated if all aggregate inputs reach a certain value.

    Despite the beginning of the use of ML and neural networks methods in the threat identification systems for the last years,the existing articles did not observe all of the aspects of DDoS attacks,all kinds of environments in which the network devices operate.Moreover,it is important to use four metrics such as accuracy,precision,recall,and F1-score to measure the efficiency of classification algorithms.Unfortunately,many research works display only one or two metrics in the experimental results section.In applying ML algorithms to DDoS threat classification,the feature selection techniques play an important role in the choice of the best features in the dataset.The list of the most popular methods includes the Information Gain (IG),Chi-square Test,F-test,Fisher’s Score,Correlation Coefficient,Variance Threshold,etc.In the experimental part of this work,three feature selection techniques (IG,Chi-square,and F-test) are chosen for the evaluation.Another important problem that was not touched on in the previous research works of the DDoS threats classification is the imbalanced datasets.This problem occurs when there are unequal classes in the training dataset.This case decreases the values of evaluation metrics,and it is generally not a good situation in classification problems.Random oversampling,random undersampling,and synthetic minority oversampling(SMOTE)techniques are applied to solve this problem and make classes equal in size.

    This paper is devoted to the supervised ML-based approach that is very rapid in computations and exhibits promising classification results.The rest of the paper is organized in the following way:Section 2 gives the literature review.Then the analyzed dataset,data scaling and feature selection techniques,class balancing,and ML algorithms are presented in Section 3.The experimental results,their analysis,and discussion are provided in Section 4.Finally,in Section 5,we briefly describe all the steps taken,suggest the best ML models,and outline directions for future research.

    2 Literature Review

    Cyber attackers usually update the software they use on a daily basis.Therefore,risk detection systems are developed daily to combat malware.To this end,there is a lot of literature research,and new research is being done to improve the performance of protection systems.In addition,there is a significant amount of research on identifying hazards using various ML methods.Therefore,this section focuses on observing ML and neural networks techniques to mitigate the existing threats.The research works devoted to the internet threats problems are shown in Tab.1.

    Table 1:Research works and their features

    Table 1:Continued

    Table 1:Continued

    The DDoS attack consists of a large number of incoming packets that overload network resources.The server generally starts to drop the packets and becomes unavailable for other incoming legitimate packets for a definite period.As modern computer networks are commonly represented by the following list of main network devices such as hubs,switches,and routers,network management remains a challenging task.In order to overcome these difficulties,a new network approach,called Software-Defined Networking (SDN),where forwarding hardware is decoupled from the control decisions,is utilized.In this approach,the network functionalities are centralized in software-based controllers,and network devices can be programmed with an open interface.In[22],DDoS attacks in a Software-Defined Networking(SDN)environment are evaluated with the use of ML algorithms.RF,k-NN,and SVM algorithms are very efficient and show the values of accuracy,precision,recall,and F1-score above 98%.The observation of DDoS attacks in the SDN environment is also done in[23],where six characteristics of the switch flow table are extracted.A DDoS attack model is built with the application of the SVM classification algorithm.The SDN significantly simplifies network management and makes it very efficient.In the experimental results,this model achieves an accuracy of 95.24%with a small flow.[24]proposes a deep learning neural network model for detecting DDoS attacks with such performance metrics as an average delay,packet loss,packet delivery ratio,and throughput.The KDD Cup,SSE,and mixed datasets are utilized for the analysis of this model’s performance.The suggested technique correspondingly shows 98.9%,99%,and 98.1%accuracy values for the mentioned datasets.[25]uses a real-time solution to detect DDoS attacks in hardware.CAIDA DDoS,MIT DARPA,and TUIDS datasets are used to evaluate the effectiveness of the proposed method.The experimental results demonstrate a very high accuracy of 99%for all three datasets with less than one microsecond to identify an incoming attack.

    3 Methodology

    This work performs the classification of DDoS attacks[26]in the SDN environment[27].In the first step,the required dataset is chosen and thoroughly analyzed.In the second step,the categorical features in the dataset are encoded into numerical form.The optimal data scaling and feature selection techniques used for the dataset’s normalization and suitable feature selection for the training model step are described in the third and fourth steps.Then the undersampling,oversampling,and SMOTE class balancing techniques are explained in detail.An important step of class balancing is realized,making classes equal in size.Finally,the principles of ML algorithms used in the experimental part are explained.

    3.1 Dataset

    There is a number of datasets containing information about various DDoS attacks[28,29]online,but the current work focuses on processing data for the attacks on the SDN.The corresponding dataset is shared by the following link by its authors[30].This dataset includes benign TCP,UDP,and ICMP traffic and malicious traffic that presents the collection of TCP Syn,UDP flood,and ICMP attacks.It consists of 23 features extracted from switches.The list of the features and their descriptions are presented in Tab.2.The dataset includes 104345 rows with 63335 benign and 40504 malicious labels(Fig.3).

    Table 2:Features of the dataset

    Table 2:Continued

    Figure 3:Benign and malicious classes

    3.2 Label Encoding

    In the presented dataset,some of the features like the source IP address,the destination IP address,and the protocol are categorical.It is necessary to transform them into a numerical form before applying the scaling step.Therefore,the categorical features are replaced with a numerical value between 0 and the number of classes minus 1.

    3.3 Data Scaling

    The values of the dataset’s features are measured at different scales,and they do not contribute equally to the model fitting.Therefore,if an ML model is trained with these features unchanged,it can create a bias,making the model unprecise.Normalization techniques[31]are used to deal with this problem.Mean normalization,Min-Max normalization,and Standardization are the most frequently used scaling methods.

    Mean normalization is calculated by the following formula

    3.4 Feature Selection Techniques

    Building an ML model almost rarely requires the use of all features.When redundant features are added to the model,it increases the complexity,the cost,and the running time.Therefore,feature selection techniques[32]such as the Information gain(IG),the Chi-square,and the F-test are used to overcome this problem.

    The IG measures a connection between each feature in the context of the target feature.It is presented by the following formula

    The Chi-square is utilized for testing the independence of two events.Having two features is necessary to get countOand expected countE.The Chi-square estimates howEandOdeviate from each other.

    where,Ois observed values,Eis expected values,andcis degrees of freedom.

    The F-test is a statistical test that computes the ratio between variances values.The results of the test are effectively used for feature selection.The F-test is calculated by the formula

    where,MST is mean square treatments,and MSE is a mean square error.

    3.5 Class Balancing

    A class imbalance is a term that determines that the number of elements in one class is higher than in the other class.The class imbalance is commonly a big problem in ML because it increases the model’s accuracy by straightly labeling all elements as a majority class.However,it performs weakly in classifying the other class,and the values of precision,recall,and F1-score become lower than the accuracy.Generally,the class imbalance appears in such domains as spam classification,fraud detection,disease screening,and DDoS attacks.Three effective class balancing techniques called random oversampling,random undersampling (Fig.4),and synthetic minority oversampling(SMOTE)are used to overcome this problem[33].

    Figure 4:Class balancing:random undersampling and random oversampling

    In random oversampling,elements from the minority class are randomly selected for duplication to make this class equal to the majority class.In random undersampling,the opposite operation is done.Random elements in the majority class are deleted to decrease the size and equalize it with the minority class.The disadvantage of undersampling is the loss of a large part of valuable data.In random oversampling,oppositely,the important information is kept.

    SMOTE is another very efficient oversampling technique where the synthetic elements are generated for the minority class.This algorithm focuses on the feature space for generating new elements that are synthesized between the existing ones.The created elements also preserve very valuable information.

    3.6 Machine Learning Algorithms

    ML text classification has been implemented with the following algorithms:NB,SVM,Logistic regression(LR),k-NN,DT,RF,XGBoost,and CatBoost.These algorithms were chosen because they are considered advanced and widely used for data classification tasks.

    An NB classifier[8]uses the Bayes’theorem as a probabilistic model for classification.An important assumption that the features are independent is used here.That is the reason this algorithm is called na?ve.The Bayes formula is written below

    whereX=(x1,x2,x3,...,xn),andx1,x2,x3,...,xnis a list of features of the dataset.The expansion of the chain rule gives the following formula

    As the denominator does not change for all entries in the dataset,it can be removed.

    An SVM classifier[11]defines a hyperplane,dividing the input data into several classes.This hyperplane tries to separate the data in the best way.The main objective is to find the hyperplane with the maximum distance between data points of two classes(Fig.5).The hyperplane is defined by the following formula

    Figure 5:The hyperplane separating classes

    where,d(x,y)is the distance between two points;xiandyiare the feature vectors ofxandypoints correspondingly;nis a length of the feature vector.

    A DT is a popular and widely used ML algorithm for data classification.A DT represents a structure with N nodes containing the conditions related to the features of the points in the dataset.First,the points whose feature values satisfy this condition are put to one side of the tree.Otherwise,they are put to the other side of the tree.This process continues while propagating through the whole built tree towards its leaf nodes.An RF(Fig.6)is an ensemble method of DTs[19].Each DT classifies a new data point independently,and the class is defined by the largest number of votes of all trees in the ensemble.

    Figure 6:An RF classifier

    XGBoost[33]is one of the most advanced ML algorithms released in 2014.It provides a parallel tree boosting and is significantly efficient in performance.One specification of the algorithm is that diversions of ensemble predictions are calculated at each iteration.CatBoost was developed by Yandex in 2017.This algorithm is also based on gradient boosting and focuses on categorical features in a dataset.It is also very fast and effective,allowing GPU usage during the training step.

    4 Experiments and Discussion

    The experimental part utilized the Python programming language with Scikit-learn,Imbalancelearn,Matplotlib,and Seaborn libraries.

    First,the categorical features of the dataset were encoded with the label encoding technique.Then all features were scaled with the Min-Max normalization.The IG,Chi-square,and F-test feature selection techniques were applied to the dataset getting the ten most important features.The dataset was balanced with undersampling,oversampling,and SMOTE techniques,randomly divided into training 70% and testing 30% parts,and classified with eight ML algorithms from Section 3.5.The hold-out split method instead of k-fold cross-validation was chosen because the classification with three feature selection techniques,four balancing methods,and eight ML algorithms requires much time.The cross-validation would take a decent time to run all the experiments and compose all the obtained data together.

    The performance was evaluated by accuracy,precision,recall,and F1-score measures[26].

    where,TP(true positive) is a correctly classifiedpositiveinstance;TN(true negative) is a correctly classifiednegativeinstance;FP(false positive) is a wrongly classifiedpositiveinstance;FN(false negative)is a wrongly classifiednegativeinstance.

    The classification of the dataset with Chi-square,IG,and F-test feature selection methods is presented in Tab.3.

    Table 3:Classification of the imbalanced and oversampled datasets

    Table 3:Continued

    The experimental results showed that the IG and F-test feature selection methods achieved the best performance metrics with all ML algorithms.In addition,the processing of the oversampled dataset gave better results with SVM,LR,and NB ML algorithms than the imbalanced dataset.Among ML models[27],DT,RF,XGBoost,and CatBoost demonstrated significantly better results than NB,SVM,and LR.In most experiments,the accuracy,precision,recall,and F1-score values reached 0.99 and 1.00.

    The classification of the dataset with Chi-square,IG,and F-test feature selection methods is presented in Tab.4.

    Table 4:Classification of the undersampled and SMOTE datasets

    Table 4:Continued

    The results of the classification of undersampled and SMOTE datasets proved that the IG and F-test feature selection techniques allowed to achieve superior results than the Chi-square feature selection.DT,RF,k-NN,CatBoost,and XGBoost ML algorithms also classified these datasets better than other algorithms.The experiments support the statements that these algorithms are the most advanced in classifying Internet threats.

    The obtained experimental results generally revealed that the imbalanced data classification showed the lowest performance in all three feature selection techniques compared to models trained on the oversampled,undersampled,and SMOTE models.

    5 Conclusion

    As the number of different threats is growing,and the earlier methods of the systems’protection are becoming less effective and more vulnerable to the various attacks,a need for more advanced methods appeared.One of these most serious threats is a DDoS attack[28]that disables the normal operation of servers,networks,and systems.This work observed DDoS attacks in the SDN network[29],where all the functionalities are centralized in software-based controllers.DDoS attacks are especially dangerous for the SDN network[30,34],and an effective approach is required to detect them accurately and fast.ML algorithms proved to be very useful in revealing malicious traffic in these kinds of networks.

    The dataset containing benign and malicious traffic instances was processed and analyzed in the experiments.The IG,Chi-square,and F-test feature selection methods retrieved the most important features.Then three balancing techniques were used to balance the classes,and eight very efficient ML algorithms(NB,SVM,LR,k-NN,DT,RF,XGBoost,and CatBoost)were applied to train the classification models.The classification performance was evaluated by accuracy,precision,recall,and F1-score measures.DT,RF,k-NN,XGBoost,and CatBoost ML algorithms showed the best results with all feature selection and class balancing techniques with the accuracy,precision,recall,and F1-score values of 0.99 and 1.00.

    In future works,the ML classifiers will be tested on the datasets containing different kinds of Internet threats such as smurf,phishing,man-in-the-middle,SQL injection,password attacks,and others.

    Acknowledgement:We would like to thank colleagues for their support.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久久国产一区二区| 亚洲情色 制服丝袜| 人妻人人澡人人爽人人| 女人被躁到高潮嗷嗷叫费观| 欧美午夜高清在线| 精品国产一区二区三区久久久樱花| 青草久久国产| 久久国产精品人妻蜜桃| 精品福利观看| 欧美av亚洲av综合av国产av| 狠狠婷婷综合久久久久久88av| 亚洲激情五月婷婷啪啪| 国产精品 欧美亚洲| av电影中文网址| 国产亚洲一区二区精品| 午夜福利,免费看| 亚洲黑人精品在线| 亚洲成国产人片在线观看| 丁香六月欧美| 亚洲国产欧美日韩在线播放| 啦啦啦 在线观看视频| 视频在线观看一区二区三区| 国产高清videossex| 黑人操中国人逼视频| 悠悠久久av| 国产91精品成人一区二区三区 | 亚洲av日韩精品久久久久久密| 黄片大片在线免费观看| www.熟女人妻精品国产| 欧美成人午夜精品| 亚洲av美国av| 如日韩欧美国产精品一区二区三区| √禁漫天堂资源中文www| 两性午夜刺激爽爽歪歪视频在线观看 | 国产成人影院久久av| 久久久久国产一级毛片高清牌| 国产成人精品久久二区二区免费| 国产深夜福利视频在线观看| 国产精品自产拍在线观看55亚洲 | 最近最新中文字幕大全免费视频| 婷婷丁香在线五月| 777久久人妻少妇嫩草av网站| 免费少妇av软件| 久久国产精品大桥未久av| 国产av又大| 男女国产视频网站| 天堂俺去俺来也www色官网| 日韩电影二区| 最新的欧美精品一区二区| 欧美另类亚洲清纯唯美| 欧美国产精品va在线观看不卡| 极品少妇高潮喷水抽搐| 狠狠狠狠99中文字幕| 99久久精品国产亚洲精品| 亚洲 欧美一区二区三区| 日韩一区二区三区影片| www.999成人在线观看| 中国美女看黄片| 欧美国产精品一级二级三级| 秋霞在线观看毛片| 91精品三级在线观看| 久久性视频一级片| 国精品久久久久久国模美| 性色av一级| 18禁国产床啪视频网站| 日韩大码丰满熟妇| 久久99热这里只频精品6学生| 国产精品国产三级国产专区5o| 日韩欧美一区视频在线观看| 人人妻人人澡人人爽人人夜夜| 欧美精品一区二区免费开放| 窝窝影院91人妻| 少妇猛男粗大的猛烈进出视频| 欧美精品啪啪一区二区三区 | 国产淫语在线视频| 亚洲精品国产色婷婷电影| 法律面前人人平等表现在哪些方面 | 少妇 在线观看| 国产成人欧美| 日本91视频免费播放| 国产欧美日韩精品亚洲av| 国产男女超爽视频在线观看| 亚洲av欧美aⅴ国产| 亚洲天堂av无毛| 国产成人欧美在线观看 | 国产亚洲欧美在线一区二区| 啪啪无遮挡十八禁网站| 亚洲国产av新网站| 国产高清videossex| 久久人人爽av亚洲精品天堂| 叶爱在线成人免费视频播放| tocl精华| 国产精品一区二区在线不卡| 男人爽女人下面视频在线观看| 精品亚洲成a人片在线观看| 男人添女人高潮全过程视频| 日本黄色日本黄色录像| 日本精品一区二区三区蜜桃| 国产精品久久久久久人妻精品电影 | 久久久久久久久久久久大奶| 国产成人影院久久av| 欧美精品一区二区免费开放| 性少妇av在线| 欧美精品av麻豆av| 欧美激情久久久久久爽电影 | 亚洲国产av新网站| 两人在一起打扑克的视频| 多毛熟女@视频| 热re99久久国产66热| 一级黄色大片毛片| 亚洲国产成人一精品久久久| 久久久精品免费免费高清| 女性生殖器流出的白浆| 久久精品成人免费网站| 菩萨蛮人人尽说江南好唐韦庄| www.熟女人妻精品国产| 咕卡用的链子| 欧美亚洲日本最大视频资源| 精品一品国产午夜福利视频| 丝袜美腿诱惑在线| 欧美另类一区| 亚洲精品国产区一区二| 99国产综合亚洲精品| 亚洲成国产人片在线观看| 国产精品熟女久久久久浪| 日韩精品免费视频一区二区三区| 国产黄色免费在线视频| 亚洲国产精品一区三区| 亚洲精品一区蜜桃| 麻豆av在线久日| 青春草亚洲视频在线观看| 国产亚洲一区二区精品| 国产av精品麻豆| 亚洲精品乱久久久久久| 亚洲三区欧美一区| 成人亚洲精品一区在线观看| 高清av免费在线| 少妇 在线观看| 久久中文看片网| 免费观看a级毛片全部| 丁香六月欧美| 久久精品熟女亚洲av麻豆精品| 啪啪无遮挡十八禁网站| 国产av国产精品国产| 99久久人妻综合| 少妇裸体淫交视频免费看高清 | 亚洲三区欧美一区| 亚洲人成77777在线视频| 国产成人一区二区三区免费视频网站| 一级毛片电影观看| 97精品久久久久久久久久精品| 国产精品影院久久| 91av网站免费观看| 国产激情久久老熟女| 久久人人爽人人片av| 精品少妇黑人巨大在线播放| 精品久久久久久电影网| 久热爱精品视频在线9| www.999成人在线观看| 国产熟女午夜一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲九九香蕉| 制服人妻中文乱码| 人人妻,人人澡人人爽秒播| 欧美xxⅹ黑人| 两个人看的免费小视频| 亚洲成人免费av在线播放| 最近最新中文字幕大全免费视频| av国产精品久久久久影院| 国产精品影院久久| 18在线观看网站| 国产99久久九九免费精品| 极品少妇高潮喷水抽搐| 亚洲国产欧美一区二区综合| 国产男人的电影天堂91| 欧美乱码精品一区二区三区| 50天的宝宝边吃奶边哭怎么回事| 免费人妻精品一区二区三区视频| 国精品久久久久久国模美| 99久久综合免费| 九色亚洲精品在线播放| 亚洲精品一区蜜桃| 在线天堂中文资源库| 免费高清在线观看视频在线观看| 国产成人欧美在线观看 | 国产一区二区三区综合在线观看| 又大又爽又粗| 夫妻午夜视频| 美女国产高潮福利片在线看| 97在线人人人人妻| 黄片小视频在线播放| 男女之事视频高清在线观看| 免费久久久久久久精品成人欧美视频| 丰满饥渴人妻一区二区三| 国产免费现黄频在线看| 国产精品欧美亚洲77777| 黑人巨大精品欧美一区二区mp4| 啦啦啦 在线观看视频| 99热国产这里只有精品6| 免费在线观看日本一区| 亚洲国产成人一精品久久久| 欧美日韩中文字幕国产精品一区二区三区 | 日韩人妻精品一区2区三区| 一区二区av电影网| 黑人操中国人逼视频| 另类精品久久| 久久亚洲精品不卡| 在线看a的网站| 99久久国产精品久久久| 免费一级毛片在线播放高清视频 | 欧美大码av| 欧美人与性动交α欧美软件| 日本欧美视频一区| 满18在线观看网站| av网站在线播放免费| 在线观看舔阴道视频| 老汉色∧v一级毛片| av欧美777| 美女脱内裤让男人舔精品视频| 国产熟女午夜一区二区三区| 窝窝影院91人妻| 国产一级毛片在线| 满18在线观看网站| 久久久久精品国产欧美久久久 | 男女免费视频国产| 亚洲精品中文字幕一二三四区 | 亚洲美女黄色视频免费看| 777米奇影视久久| 中国国产av一级| 99香蕉大伊视频| 久久综合国产亚洲精品| 超碰97精品在线观看| 深夜精品福利| 国产熟女午夜一区二区三区| 久久99热这里只频精品6学生| 久久人人爽人人片av| 丁香六月天网| 久久精品人人爽人人爽视色| bbb黄色大片| 国产成人免费无遮挡视频| 建设人人有责人人尽责人人享有的| 免费少妇av软件| 国产成人精品久久二区二区91| 免费不卡黄色视频| 精品高清国产在线一区| 午夜视频精品福利| 午夜福利,免费看| 这个男人来自地球电影免费观看| 欧美另类一区| a 毛片基地| 国产精品香港三级国产av潘金莲| 亚洲欧美精品自产自拍| 9色porny在线观看| 午夜免费观看性视频| 18禁黄网站禁片午夜丰满| 欧美精品啪啪一区二区三区 | 日韩人妻精品一区2区三区| 日日爽夜夜爽网站| 国产不卡av网站在线观看| 精品熟女少妇八av免费久了| 欧美成人午夜精品| 国产精品久久久久久人妻精品电影 | 欧美另类亚洲清纯唯美| videos熟女内射| 国产精品偷伦视频观看了| 欧美乱码精品一区二区三区| 精品少妇黑人巨大在线播放| 亚洲精品国产一区二区精华液| 久久久久久人人人人人| 亚洲精品日韩在线中文字幕| 免费日韩欧美在线观看| 亚洲精品美女久久av网站| 2018国产大陆天天弄谢| 动漫黄色视频在线观看| 日本精品一区二区三区蜜桃| 高清视频免费观看一区二区| a级片在线免费高清观看视频| 大香蕉久久网| 日韩视频一区二区在线观看| 欧美成狂野欧美在线观看| 精品国产乱子伦一区二区三区 | 国产精品一区二区在线观看99| 在线观看免费午夜福利视频| 国精品久久久久久国模美| 久久精品国产a三级三级三级| 国产欧美亚洲国产| 国产精品秋霞免费鲁丝片| 国产av国产精品国产| 美女视频免费永久观看网站| 国产在线免费精品| 热99re8久久精品国产| 中文字幕精品免费在线观看视频| 国产亚洲av片在线观看秒播厂| 肉色欧美久久久久久久蜜桃| 久久久久视频综合| 黑人猛操日本美女一级片| 国精品久久久久久国模美| 老司机福利观看| 欧美性长视频在线观看| 免费黄频网站在线观看国产| 久久中文字幕一级| 国产亚洲午夜精品一区二区久久| 淫妇啪啪啪对白视频 | 建设人人有责人人尽责人人享有的| 久久这里只有精品19| 久久午夜综合久久蜜桃| 一本综合久久免费| 欧美日韩精品网址| 国产高清视频在线播放一区 | 高清视频免费观看一区二区| 免费女性裸体啪啪无遮挡网站| 精品国产乱码久久久久久小说| 777米奇影视久久| 国产成人免费观看mmmm| 成年女人毛片免费观看观看9 | 高清av免费在线| 国产精品久久久久久精品电影小说| 精品一区二区三卡| 国产黄频视频在线观看| 美女福利国产在线| 乱人伦中国视频| 母亲3免费完整高清在线观看| 婷婷丁香在线五月| 欧美日韩黄片免| 亚洲国产日韩一区二区| 欧美成狂野欧美在线观看| 日本av手机在线免费观看| 久久久久久免费高清国产稀缺| 国产一区二区三区综合在线观看| 99热国产这里只有精品6| 欧美国产精品va在线观看不卡| 1024香蕉在线观看| 欧美日韩视频精品一区| 不卡av一区二区三区| 欧美激情 高清一区二区三区| 日韩一卡2卡3卡4卡2021年| 一边摸一边做爽爽视频免费| 女人久久www免费人成看片| 亚洲色图 男人天堂 中文字幕| 国产在视频线精品| 精品一品国产午夜福利视频| 操出白浆在线播放| 97人妻天天添夜夜摸| 日韩熟女老妇一区二区性免费视频| 国产精品 欧美亚洲| av天堂在线播放| 在线看a的网站| 正在播放国产对白刺激| 老熟女久久久| 欧美在线一区亚洲| 99香蕉大伊视频| 亚洲五月色婷婷综合| 91精品三级在线观看| 国产精品欧美亚洲77777| 女人被躁到高潮嗷嗷叫费观| 亚洲七黄色美女视频| 啦啦啦视频在线资源免费观看| 欧美av亚洲av综合av国产av| 免费人妻精品一区二区三区视频| 午夜日韩欧美国产| 日韩欧美一区二区三区在线观看 | 欧美少妇被猛烈插入视频| 亚洲三区欧美一区| 国产精品一区二区在线观看99| 亚洲国产中文字幕在线视频| 欧美激情久久久久久爽电影 | 久久99热这里只频精品6学生| 亚洲全国av大片| 一个人免费在线观看的高清视频 | 美国免费a级毛片| 亚洲欧美色中文字幕在线| 1024视频免费在线观看| svipshipincom国产片| 亚洲精品成人av观看孕妇| 国产一区二区激情短视频 | 在线观看人妻少妇| 啪啪无遮挡十八禁网站| 男男h啪啪无遮挡| 久久精品国产亚洲av香蕉五月 | 欧美av亚洲av综合av国产av| 亚洲精华国产精华精| 一级毛片女人18水好多| 亚洲国产看品久久| 两性夫妻黄色片| 9191精品国产免费久久| 欧美变态另类bdsm刘玥| 国产欧美日韩综合在线一区二区| 91九色精品人成在线观看| 欧美黄色片欧美黄色片| 91老司机精品| 国产欧美日韩精品亚洲av| 国产成人av激情在线播放| 男女床上黄色一级片免费看| 91老司机精品| 国产在线免费精品| 国产成人a∨麻豆精品| 久久精品人人爽人人爽视色| 多毛熟女@视频| 国产深夜福利视频在线观看| 精品视频人人做人人爽| 欧美激情 高清一区二区三区| 爱豆传媒免费全集在线观看| 一边摸一边抽搐一进一出视频| 亚洲国产日韩一区二区| 国产成人啪精品午夜网站| 老熟女久久久| 老鸭窝网址在线观看| 午夜日韩欧美国产| 国产精品国产av在线观看| 亚洲精品日韩在线中文字幕| 国产片内射在线| 成人av一区二区三区在线看 | 亚洲 欧美一区二区三区| 国产又爽黄色视频| 电影成人av| 大码成人一级视频| 国产无遮挡羞羞视频在线观看| 99精国产麻豆久久婷婷| 大片电影免费在线观看免费| 9191精品国产免费久久| 亚洲国产欧美日韩在线播放| 欧美日本中文国产一区发布| 午夜老司机福利片| 国产精品熟女久久久久浪| 国产91精品成人一区二区三区 | 日韩精品免费视频一区二区三区| 亚洲精华国产精华精| 一区二区三区四区激情视频| 飞空精品影院首页| 国产伦理片在线播放av一区| 国产免费现黄频在线看| 男人操女人黄网站| 咕卡用的链子| 精品人妻一区二区三区麻豆| 精品国产一区二区三区四区第35| 亚洲少妇的诱惑av| 亚洲美女黄色视频免费看| 国产一区二区在线观看av| 欧美日韩精品网址| 宅男免费午夜| av又黄又爽大尺度在线免费看| 纯流量卡能插随身wifi吗| 交换朋友夫妻互换小说| 亚洲国产精品一区三区| av欧美777| 亚洲国产av新网站| 丰满饥渴人妻一区二区三| 在线看a的网站| 精品国产乱子伦一区二区三区 | 婷婷丁香在线五月| 操出白浆在线播放| www.精华液| 国产野战对白在线观看| 国产欧美日韩一区二区精品| 九色亚洲精品在线播放| 国产伦人伦偷精品视频| 99九九在线精品视频| 在线永久观看黄色视频| 午夜久久久在线观看| 久久国产精品男人的天堂亚洲| 亚洲国产av新网站| 日韩制服丝袜自拍偷拍| 中文欧美无线码| 男男h啪啪无遮挡| 欧美午夜高清在线| 亚洲精品乱久久久久久| 亚洲熟女毛片儿| 黄频高清免费视频| 国精品久久久久久国模美| 亚洲少妇的诱惑av| 美女视频免费永久观看网站| 免费观看av网站的网址| 中文字幕最新亚洲高清| 国产精品一二三区在线看| 肉色欧美久久久久久久蜜桃| 高清在线国产一区| 国产亚洲av高清不卡| 久久久国产精品麻豆| 欧美精品av麻豆av| 在线观看免费视频网站a站| a级毛片在线看网站| 一本大道久久a久久精品| 精品久久久久久久毛片微露脸 | 亚洲av电影在线观看一区二区三区| 男女午夜视频在线观看| 国产欧美日韩一区二区精品| 日韩 亚洲 欧美在线| 黑丝袜美女国产一区| 精品国内亚洲2022精品成人 | 国产国语露脸激情在线看| 啦啦啦在线免费观看视频4| 深夜精品福利| 国产成人啪精品午夜网站| 无遮挡黄片免费观看| 日本一区二区免费在线视频| 建设人人有责人人尽责人人享有的| 麻豆av在线久日| 国产精品国产三级国产专区5o| 人成视频在线观看免费观看| 国产精品99久久99久久久不卡| 国产成人精品久久二区二区91| 两性午夜刺激爽爽歪歪视频在线观看 | 大陆偷拍与自拍| 99久久99久久久精品蜜桃| 亚洲国产日韩一区二区| 国产高清videossex| 国产又爽黄色视频| 狠狠狠狠99中文字幕| 亚洲av成人一区二区三| 久久亚洲国产成人精品v| a在线观看视频网站| 亚洲人成电影观看| 99久久综合免费| 亚洲精品粉嫩美女一区| 高清在线国产一区| 美女午夜性视频免费| 国产麻豆69| 麻豆乱淫一区二区| 嫁个100分男人电影在线观看| 97精品久久久久久久久久精品| 亚洲av国产av综合av卡| 亚洲成人免费电影在线观看| 亚洲激情五月婷婷啪啪| 一边摸一边做爽爽视频免费| a在线观看视频网站| 亚洲精品中文字幕在线视频| 成人手机av| 亚洲欧美激情在线| 国产精品 国内视频| 下体分泌物呈黄色| 日韩视频一区二区在线观看| 中文字幕最新亚洲高清| 国产免费av片在线观看野外av| 多毛熟女@视频| 精品一品国产午夜福利视频| 国产一区二区三区在线臀色熟女 | 成人影院久久| 日本五十路高清| 久久这里只有精品19| av线在线观看网站| 免费在线观看黄色视频的| 丝袜在线中文字幕| 又大又爽又粗| 麻豆乱淫一区二区| 亚洲人成电影观看| 国产无遮挡羞羞视频在线观看| 一区在线观看完整版| 亚洲成人免费电影在线观看| 国产成人精品无人区| 亚洲专区国产一区二区| 亚洲一区二区三区欧美精品| 又紧又爽又黄一区二区| a在线观看视频网站| 亚洲精品中文字幕在线视频| 欧美精品一区二区免费开放| 动漫黄色视频在线观看| 免费人妻精品一区二区三区视频| 97精品久久久久久久久久精品| 国产欧美日韩一区二区三 | 性少妇av在线| 国产一区有黄有色的免费视频| 亚洲国产欧美在线一区| 久久精品熟女亚洲av麻豆精品| 亚洲综合色网址| 国产一区有黄有色的免费视频| 亚洲avbb在线观看| 国产欧美日韩一区二区三 | 午夜视频精品福利| 亚洲伊人久久精品综合| 国产日韩欧美亚洲二区| 日韩大片免费观看网站| 天天影视国产精品| 久久久久久亚洲精品国产蜜桃av| 91成人精品电影| 一本—道久久a久久精品蜜桃钙片| 老汉色∧v一级毛片| 一区在线观看完整版| www.自偷自拍.com| 日韩大片免费观看网站| 欧美精品高潮呻吟av久久| 美女扒开内裤让男人捅视频| 在线观看免费视频网站a站| 久久久精品94久久精品| 99国产精品免费福利视频| 一级毛片精品| 国产av精品麻豆| 久久综合国产亚洲精品| 亚洲情色 制服丝袜| 午夜福利一区二区在线看| 伦理电影免费视频| 午夜福利,免费看| 国产av国产精品国产| 91成年电影在线观看| 又黄又粗又硬又大视频| 狠狠狠狠99中文字幕| 亚洲欧美清纯卡通| 亚洲黑人精品在线| 一二三四在线观看免费中文在| 国产色视频综合| 国产深夜福利视频在线观看| 亚洲第一欧美日韩一区二区三区 | 9191精品国产免费久久| 在线看a的网站| 久久国产精品影院| 久久香蕉激情| 精品亚洲成a人片在线观看| 亚洲国产欧美在线一区| 久久亚洲精品不卡| 中国国产av一级| 精品少妇黑人巨大在线播放| 久久久久国产一级毛片高清牌| 久久影院123| 亚洲精品一二三| 久久人人爽av亚洲精品天堂| 国产亚洲欧美在线一区二区|