• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Anomaly Detection Framework in Fog-to-Things Communication for Industrial Internet of Things

    2022-11-10 02:30:30TahaniAlatawiandAhamedAljuhani
    Computers Materials&Continua 2022年10期

    Tahani Alatawiand Ahamed Aljuhani

    College of Computing and Information Technology,University of Tabuk,Tabuk,71491,Saudi Arabia

    Abstract:The rapid development of the Internet of Things (IoT) in the industrial domain has led to the new term the Industrial Internet of Things(IIoT).The IIoT includes several devices,applications,and services that connect the physical and virtual space in order to provide smart,cost-effective,and scalable systems.Although the IIoT has been deployed and integrated into a wide range of industrial control systems,preserving security and privacy of such a technology remains a big challenge.An anomaly-based Intrusion Detection System (IDS) can be an effective security solution for maintaining the confidentiality,integrity,and availability of data transmitted in IIoT environments.In this paper,we propose an intelligent anomalybased IDS framework in the context of fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes) near the edge of the data source.The anomaly detection system utilizes minimum redundancy maximum relevance and principal component analysis as the featured engineering methods to select the most important features,reduce the data dimensionality,and improve detection performance.In the classification stage,anomaly-based ensemble learning techniques such as bagging,LPBoost,RUSBoost,and Adaboost models are implemented to determine whether a given flow of traffic is normal or malicious.To validate the effectiveness and robustness of our proposed model,we evaluate our anomaly detection approach on a new driven IIoT dataset called XIIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.The experimental results demonstrated that our proposed anomaly detection method achieved a higher accuracy rate of 99.91% and a reduced false alarm rate of 0.1% compared to other recently proposed techniques.

    Keywords:Anomaly detection;anomaly-based IDS;fog computing;Internet of Things(IoT);Industrial Internet of Things(IIoT);IDS;Industrial Control Systems(ICSs)

    1 Introduction

    The Internet of Things (IoT) has been deployed in many critical sectors,including healthcare,energy,transportation,and industrial.This emerging technology allows multiple connected devices to send,process,and receive data with little to no human intervention.The main concept behind the IoT paradigm is to transform regular“things”into“smart objects,”such as smart homes,smart vehicles,and smart factories,with the goal of facilitating human lives and improving quality of service[1,2].The technology has been significantly involved in the manufacturing and industrial domains to increase productivity and portability,leading to the Industrial Internet of Things(IIoT)[3].Consequently,many critical industrial systems have integrated the IoT technology as an integral part of their system‘s operation.Specifically,an industrial control system(ICS)is an essential component that many technologies adopt to support control systems of critical infrastructure,such as supervisory control and data acquisition(SCADA),remote terminal units,and human-machine interfaces[4].

    Although the deployment of IoT in industrials provides great features for both service providers and consumers,many security and privacy issues remain a major concern,some of which were inherited from the IoT[5-8].Cyberattacks threaten critical system infrastructure in IIoT environments,posing a significant challenge in detecting,responding to,and mitigating such attacks in a timely manner.Attacks such as distributed denial of service(DDoS)jeopardize system availability when an intruder sends a large number of malicious packets to the target,rendering the system unresponsive to its intended services and interrupting the system‘s operation,resulting in slow response or system failure[9,10].Another cyber risk that endangers data confidentiality in IIoT networks is reconnaissance.An attack of this type collects vital information about connected devices[11],which an intruder can use to disrupt system functionality.In another cyberattack known as“man-in-the-middle,”an attacker acts as a legitimate node between two authorized nodes.In such a situation,an intruder eavesdrops and intercepts the communication link,allowing an attacker to manipulate and discard messages[12,13].Such an attack is extremely dangerous and difficult to detect because a legitimate device continues to communicate with the wrong node believing it is the authentic node.Fig.1 depicts a typical attack scenario on industrial sensors in IIoT systems.

    Figure 1:Cyberattack scenario performed by intruder on industrial sensors in IIoT environment

    To preserve data confidentiality,integrity,and availability in IIoT environments,an intrusion detection system(IDS)can be deployed as an effective and efficient security solution to overcome many cybersecurity risks in the IIoT networks.The IDS is categorized in two main forms[14,15]:Signaturebased IDS and anomaly-based IDS.The signature-based IDS stores a list of attack signatures in the database,so whenever the incoming traffic matches the signature in the database,it is considered an attack.The main disadvantage of signature-based IDS is that it cannot detect unknown attacks(zero-day attacks).In addition,such a technique requires regular updating of the signature list to include new cyberattacks.As a result,experts must create,analyze,and update such new signature rules.The anomaly-based IDS technique overcomes the limitations of the signature-based IDS.The anomaly-based IDS technique can detect both known and unknown attacks by establishing a baseline of normal network traffic and activities.The anomaly-based IDS technique can compare the current state of network traffic to this baseline in order to detect patterns that are not normally present in traffic.Many traditional anomaly-based IDS techniques are developed for dedicated hardware or traditional networking architectures;less work has been put into designing anomaly-based IDS for IIoT environments[16].Although different techniques have been used in the development of anomalybased IDSs,such as statistical methods,rule-based models,and classical ML,these techniques have increased false positive rates[17].

    The IIoT system is a collection of heterogeneous networks that include sensors,communication devices,and actuators collaborating to achieve common goals[18].Anomaly detection in IIoT requires special services such as storage space,network bandwidth,and low latency to provide an efficient and effective anomaly detection mechanism.However,the traditional solutions which adapt a centralized approach of stand-alone cloud technology cannot fulfilled the security requirements of anomaly detection systems owing to resource constrains and computational overheads[19].To overcome these limitations,a new network paradigm named fog computing can improve security services by providing cost-effective and efficient security solutions.Fog computing offers a unique opportunity for offloading security features to multiple fog nodes and supporting the provision of cyberattack detection close to the data source[20].Because such a technology operates in a distributed architecture,the massive data generated from different sensors and actuators are processed locally to detect suspicious activities and anomalies.

    In this research,we propose an intelligent anomaly-based IDS framework in the context of fog-tothings communication to ensure data confidentiality,integrity,and availability in IIoT networks.The proposed anomaly detection employs two feature engineering techniques to select the most important features,reduce data dimensionality,and improve detection performance:Minimum redundancy maximum relevance(MRMR)and principal component analysis(PCA).In the classification design,we implement different ensemble learning models such as bagging,LPBoost,RUSBoost,and Adaboost to determine whether a given flow of traffic is normal or malicious.In addition,we suggest a deployment architecture for deploying the proposed anomaly detection system as Detection as a Service(DaaS)at the fog layer and Mitigation as a Service(MaaS)at the cloud layer.The proposed model is trained and validated by using the most recent intrusion detection dataset that is specified for IIoT environments called X-IIoTID,which includes new IIoT protocols,various cyberattack scenarios,and different attack protocols.We evaluate,analyze,and compare our proposed anomaly detection method with recent previous studies.The main contributions of our research can be summarized as follows:

    ■We propose an anomaly detection framework in fog-to-things communications to decentralize the cloud-based security solution into a distributed architecture(fog nodes)near the edge of the data source.

    ■We employ two feature engineering techniques to improve the anomaly detection performance by selecting the most important features:MRMR and PCA.

    ■We implement the anomaly detection-based ensemble learning method to determine whether a given flow of traffic is normal or malicious.

    ■To address the challenges of dynamic,heterogeneous,and homogenous networks such as IIoT,fog,and cloud,we present a framework for deploying security functions as Detection as a Service(DaaS)in the fog side and Mitigation as a Service(MaaS)in the cloud side.

    ■Most existing anomaly detection systems are evaluated using out-of-date datasets and do not support modern IIoT-based cyberattacks.However,the effectiveness of our proposed anomaly detection model is evaluated using X-IIoTID,the most recent intrusion detection dataset that is specified for IIoT environments.

    ■We train,validate,and evaluate our anomaly detection model in terms of accuracy,sensitivity,specificity,f1-score,false positive rate (FPR),positive predicative value (PPV),and negative predicative value(NPV).

    ■We analyze and compare our proposed anomaly detection model with other existing works and find that our proposed method outperforms other techniques,with an accuracy rate of 99.91%and a reduced false alarm rate of 0.1%.

    2 Related Works

    A number of related works have been proposed for anomaly-based IDS in IoT/IIoT networks.Muna in[21]proposed intrusion detection technique to compact several cyberattacks in industrial control systems.The proposed method used aut-encoder and deep learning techniques to classify different malicious traffic in IIoT networks.The proposed method achieved a higher detection rate and reduced false alarm comparing to other techniques.However,due to a lack of IIoT datasets,the proposed method was tested on two datasets:NSL-KDD and UNSW-NB15.

    A study by[22]proposed a deep learning technology-based detection model that can be trained and tested using data collected from remote telemetry unit streams in gas pipeline systems.Use sparse and denoising auto encoder techniques for unsupervised learning and deep neural networks for supervised learning to generate high-level data representations from unlabeled noisy data.Their results showed that the proposed model has excellent performance in identifying malicious activity.Intrusion Detection System monitors network traffic and detect network activity.However,such application is considered one of the most important security solutions to protect IIoT applications from attacks.Recently,it has been shown that applying machine and deep learning techniques can mitigate some security threats and improve intrusion detection performance.

    Another study by[23]proposed an integrated protection mechanism for IoT device networks that enables threat identification,activates secure mechanisms for information transfer,and adapts to the computing capabilities of industrial IoT.The proposed solution is presented as a viable mechanism for achieving the proposed goals and detecting and containing intruders within the IoT network.In some cases,it overcomes traditional detection mechanisms such as IDS.In addition,[24]briefly described the requirements and challenges of IIoT network security and provided an overview of existing methods for detecting network anomalies.It also described other ways to detect anomalies that are particularly applicable to IIoT networks.These methods take advantage of the deterministic properties of the physical world in detecting observed behavioral anomalies.

    Al-Hawawreh et al.[25]used different machine learning techniques to identify malicious traffic in IIoT.Authors created a new dataset for IIoT named X-IIoTID,and utilized different learning techniques such as decision tree,support vector machine,K-nearest Neighbor,logistic regression,na?ve bayes,and deep neural network.The best performance result was obtained by the decision tree model with accuracy rate of 99.54%.Authors in[26]proposed an ensemble technique for detecting anomalies utilizing deep learning methods.The suggested technique obtained a good accuracy result but with a higher false alarm rate.Another study by[27]proposed a feedforward neural network model for intrusion detection in IIoT environments.The proposed approach performed well in terms of accuracy metric;however,the dataset used was not designed for the IIoT environments.

    Sydney in[28]proposed an intrusion detection to secure IIoT networks from cyberattacks.The proposed method used the genetic algorithm in the feature selection phase.A set of classification techniques such as Extreme Gradient Boosting (EGB),Linear Regression,NB,ET,RF,and DT.The combination of genetic algorithm with RF achieved ten features for binary classification,and seven features for multi-class classification.The UNSW-NB15 was used to evaluate and validate the effectiveness of the proposed model.The proposed intrusion detection method obtained 87.61% as an accuracy rate,and the overall experimental results were acceptable in contrast with the existing intrusion detection models.Several limitations have been observed.For instance,using synthetic datasets rather than real-time IIoT traffic may affecting the detection performance.Another problem is that outdated datasets are limited to specific types of attacks and cannot detect modern cyberattack scenarios.Additionally,many anomaly-based IDS approaches do not use a suitable intrusion dataset for IIoT,which reflects the nature of such an environment to design and develop an effective anomaly detection approach.

    3 Proposed Method

    The proposed framework of anomaly-based ensemble learning for IIoT networks is divided into three phases:pre-processing,feature selection,and classification (see Fig.2).In the pre-processing phase,data cleaning,missing values compensation,and normalization are performed.In the feature selection phase,the best importance features are selected using two feature selection techniques:MRMR and PCA.In the classification phase,the following ensemble learning models are used to perform the predication:bagging,LPBoost,RUSBoost,and Adaboost.Further details concerning each phase will be illustrated in the following subsection.

    3.1 Preprocessing Phase

    The most significant aspects of the pre-processing stage are data cleansing,missing value compensation,and normalization.If the datatype is numeric,the process for this phase includes replacing the missing data with the mean value of that feature.If the data is nominal,the missing value is replaced with the mode value.The categorical values are encoded as integers.Following the cleaning of the dataset,the normalization process is performed to convert numeric values into new integer values ranging from 0 to 1.The Z-score algorithm is used to perform the normalization step,which is defined as follows:

    Figure 2:The architecture of proposed anomaly-based ensemble learning for IIoT

    3.2 Feature Selection Phase

    The feature selection stage plays a vital role in reducing data dimension,removing unnecessary features,and improving detection efficiency.We utilize MRMR and PCA as feature selection methods in our proposed anomaly detection framework.The following subsection details the MRMR and PCA methods.

    3.2.1 Minimum Redundancy Maximum Relevance

    MRMR[29]is used to find the“minimal-optimal”set of features.MRMR requires the user to choose only one option by indicating how many features they want to keep.MRMR is an iterative process that determines the optimal features based on rules.The selected features are added to the optimal feature list[29].When a feature is added to the list,it never comes out.The score is determined for every feature to be assessed at each iterative process(f).LetFrepresents a set of data features as suchfk{f1,f2,f3...,fk},andFI?FwhereFIis initially empty to store the best importance features which are selected by the algorithm(see algorithm 2).The MRMR technique choose the next feature between the set of unchosen features(F-FI).The score can be computed by using Eq.(2).

    Algorithm 1:Feature Selection Phase:MRMR Input:fk normalized{f1norm,f2norm,f3norm,...finorm}Output:FI optimal set:the selected features 1:Load the candidate feature vectors 2:Create an empty basket FI to store the best selected features 3:Initializing Minimum Redundancy Maximum Relevance 4:for each iteration i do 5:Compute the score:scorei(f)= relevance(f|target)redundancy(f|features selected until i-1)6:Selecthighest score:Maximum relevance&&minimum redundancy features 7:Append the selected features f into FI basket 8:end for

    3.2.2 PCA

    The PCA is a common feature extraction and dimensionality reduction technique that is frequently used in the data science field.The PCA method aims to minimize the dimensionality of a given dataset,which includes different variables correlated with each other,and projects the dataset into a new set of variables with fewer dimensions than the original[31].Such an anomaly detection method collects many data features from the network,resulting in high computation complexity and increased time for attack detection,which does not fulfil the requirement of early detection[32].The PCA technique can be an effective solution when combined with anomaly detection to reduce data features and detect anomalies in less time[32].LetSrepresents the original dataset with r rows and f columns{s1,s2,...,sf}.The dataset isrxfmatrix in which the transform data points are independent.LetMbe afxfcorrelation matrix of{s1,s2,...,sf}.Let(λ1,e1),(λ2,e2),...(λf,ef),befeigenvalue and eigenvector of such a matrixM.The PCA transformsSinto a new dataset of variablesNusing the transformation matrixMas follows[32]:

    We have the ithprincipal component as follows

    wherei= 1,2,3,...,f.

    The first principal component will have the highest variance,the second principal component will have the next highest variance,and so on.The total variance of all PCs added together equals the total variance of the original variables{s1,s2,...,sf}.The principal components are sorted by eigenvalue order of importance as such:λ1 <=λ2 <=λ3...<=λf>0.Algorithm 3 illustrates the process of PCA techniques.

    Algorithm 2:Feature Selection Phase:PCA Input:A set of data feature fk {f1, f2, f3..., fk},where 1 ≤i ≤N Output:FI:Important feature vectors 1:Standardize the data set 2:Construct the covariance matrix 3:Compute the eigenvectors and eigenvalues 4:Select the most important features 5:Obtain the new feature vectors

    3.3 Ensemble-Based Scheme for Anomaly Detection

    The modeling phase receives the most essential feature representations determined by the MRMR and PCA techniques after the feature selection step.To evaluate if a particular data flow is normal or an attack,several ensemble learning models,such as bagging,LPBoost,RUSBoost,and Adaboost,are used.Each ensemble learning model is described in depth in the subsections that follow.

    3.3.1 Bagging

    The bagging[33]technique,also known as bootstrap aggregation,is one of the ensemble learning techniques used to minimize the variance on such a training dataset.In bagging,random samples of training dataset are chosen with replacement;in other words,the individual training set can be selected more than once.Following the generation of several data samples,these weak learners will be trained independently for the classification task.In the bagging model,the decision is made from a group of learner models rather than an individual model to accomplish a more accurate estimate[34].Therefore,a weak learner model may not produce an accurate decision;however,when such a weak learner is aggregated,it can become a strong learner.Such a model collectively works with other strong learners to produce the final prediction decision.To begin,a number of bootstrap samples are created,each serving as a separate independent dataset derived from a real distribution.Aggregation is the final step in producing the final prediction decision by combining the votes from each model;the final decision is based on the majority vote.

    Input:

    Give a training data setS={(x1,y2),...(xn,yn)},whereLis samples of sets ofnelements fromS

    S1,S2,S3,...SL→Lfrom training sets

    Train a model on eachSi,i=1,...,Land get a sequence ofLoutputsf1(x),...fL(x).

    Output:

    Obtain the majority vote for classification problem.

    3.3.2 LPBoost

    The LPBoost is an ensemble learning technique that belongs to the boosting family of classifiers.The LPBoost works by maximizing the margin between training sets of several classes and considering a classification function that predicts samples from a spaceX,which contains both normal and attack traffic into one of two classes,either normal or an attack.The LPBoost model learns from a given set of training examples with known class labels.

    As in all boosting classifiers,the final classification function is of the form:

    whereσjrepresents a non-negative weighting for aweakclassifier.

    Any weak classifierhjcan be better than random;however,combining many weak learners can result in a strong learner and improve classification performance.The LPBoost startsFwith an empty pool of weak classifiers.Iteratively,a weak learner will become one of the other weak classifiers in such a group that includes all weak learners.The totally corrective property refers to the property that all learner weights are adjusted in each iteration.

    3.3.3 RUSBoost

    RUSBoost is a class labeled data boosting-based sampling strategy that tackles class imbalance[35].It reduces the time it takes to generate a model,which is useful when creating an ensemble of models.Information loss,which is the primary drawback of random under-sampling,is greatly minimized when random under-sampling is paired with boosting.Although some information may be absent from one of the models during creation,it will almost definitely be incorporated in the other models in the boosting ensemble.RUSBoost combines data sampling and boosting,providing a simple and efficient method for improving classification performance when training data is imbalanced.The RUSBoost Algorithm works as follow:

    ■First step,the weights of each example are initialized to

    ■Then,Tweak hypotheses are iteratively trained.

    ■AfterTiterations of step 2,the final hypothesis,H(x),is returned as a weighted vote of the weak hypotheses.

    3.3.4 Adaboost

    Adaptive Boost is an ensemble method that combines several weak learners(decision trees)into a single powerful learner[36].As a result,the system employs bagging and boosting techniques to create a more accurate predictor.The Adaboost technique is described in the following steps[37,38]:

    ■To separate the records,choose the best attribute using attribute selection measures.

    ■Compute the sample weights for each sample as follows:

    whereLis number of samples.

    Calculate the sample weight for each sample using the equation above.The sample weight will be equal in the first round.

    ■Creating a decision stump out of the feature with the lowest Gini index.The Gini Impurity will be calculated for each variable.

    Gini Impurity=1 -(the probability pf True)2-(the probability pf False)2(16)

    Once you calculate the Gini Impurity of each node,the total Gini Impurity for each variable is the weighted average of the impurities of each node.

    ■Evaluate the performance of such a classifier in classifying the data using Eq.(17).

    ■Update the weights of the samples

    ■Normalize the weights and make a new data set.

    ■Repeat the previous step until we get enough number of models.

    ■Final prediction is performed by majority votes.

    4 Deployment of Proposed Anomaly Detection as DaaS at Fog Layer and MaaS at Cloud Layer

    This section presents the framework for deploying anomaly-based ensemble learning detection in IIoT environments,which can identify cyberattacks in scalable and heterogeneous IIoT networks.The IIoT network is made up of numerous devices placed at different locations.As a result,the anomaly detection system should be capable of managing the large amount of traffic generated from these devices to effectively mitigate cyberattacks in minimal time.In this case,the anomaly detection-based centralized approach is insufficient for providing a high-quality mitigation system against different IIoT cyberattacks owing to computational resources.The proposed anomaly detection framework employs a decentralized approach that is distributed through fog nodes to improve the robustness and effectiveness of anomaly detection system against different cyber threats in IIoT networks.As shown in Fig.3,the proposed anomaly detection framework comprises three layers:IIoT devices,fog layer,and cloud layer.

    Figure 3:Deployment of anomaly detection as DaaS at fog layer and MaaS at cloud layer

    The proposed anomaly-based ensemble learning framework leverages fog computing to provide a distributed anomaly detection system that utilizes a decentralized approach rather than a centralized architecture.Fog computing improves the security and privacy functions of data transmitted in such a network by providing scalable,resilient,and intelligent IIoT environments.Fog computing addresses many issues in the cloud including resource limitations,degradation,scalability,and high latencies.However,fog computing is not a replacement for the cloud;rather,it functions as an extension of the could that is located close to the end users.Therefore,our proposed anomaly detection framework follows fog-to-things architecture to provide end-to-end security protection.The collaborative anomaly-based ensemble detection as DaaS at the fog side contains a preprocessing engine and an anomaly detection engine.The preprocessing engine includes data cleansing,missing value compensation,and normalization.The anomaly detection engine is used to identify anomalies in the incoming traffic.The collaborative anomaly-based ensemble detection system is distributed at each fog node,in which each node hosts the detection parameters locally,exchanging data and learned parameters with its neighbors.The master node computes,updates,and distributes the ensemble learning parameters to each node.The architecture reveals that rather than having all operations—such as storing,training,and testing—computed at a central unit,the cloud,it distributes computation resources to each individual node,allowing it to detect anomalies efficiently and effectively near IoT devices.This is because such an approach allows to build a scalable and a lightweight detection mechanism that is compatible with the nature of IIoT networks.

    Because the fog layer is responsible for decreasing the computation load and solving the resource limitations of IoT devices,allowing for the design and development of a robust and lightweight anomaly detection system near to the applications,the cloud layer can adapt less-sensitive tasks without increasing computational overhead.The anomaly detection system at the fog layer will alert any detected anomalies and pass the traffic to the cloud for further security analysis.The MaaS in the cloud side can implement a second level of protection,such as classifying the type of anomalies or cyberattacks detected.When the type of cyberattacks is identified,the response unit applies appropriate mitigation mechanisms to prevent cyberattacks and provide information to the security analysis unit.The administrator evaluates,analyzes,and applies security policies as needed.Based on the information reported in the security analysis unit,the administrator evaluates the system‘s capabilities and performs required changes as needed to enhance future service quality.

    5 Performance Analysis

    This section presents the performance results of our proposed anomaly detection model.The experimental evaluation was obtained using Matlab software to create the model and using machine learning libraries to extract features,classify data,and obtain results.The tests were performed on an Intel Core i5 processor with 8 GB of RAM and Microsoft Windows 10 OS.To evaluate and analyze the proposed anomaly detection method,several performance metrics were used.These performance metrics include accuracy rate,sensitivity rate,specificity rate,F1-score,false positive rate (FPR),positive predicative value(PPV),and negative predicative value(NPV).

    5.1 Dataset

    A critical step in validating our anomaly-based IDS method was selecting an appropriate dataset,which includes real-time IIoT traffic.The proposed anomaly based-IDS method was analyzed and evaluated using the X-IIoTID dataset[25].The X-IIoTID dataset was created to fit the heterogeneity and interoperability of IIoT networks.The dataset framework is comprises of three tiers for accurately simulating IIoT networks in real-time scenarios.The first tier represents the foundation for traffic generation to IIoT networks.The second tier analyzes,processes,and labels data.The last tier presents the final IIoT dataset.The X-IIoTID dataset includes different IIoT connectivity protocols,including machine-to-machine,machine-to-human,and human-to-machine,as well as the most recent cyberattack strategies in industrial control systems,such as command and control,brute force,malicious insider,man-in-the-middle,and DDoS attacks.

    5.2 Results and Discussion

    5.2.1 Evaluation Results of Ensemble Models When Using MRMR

    Tab.1 presents the performance results of several ensemble learning techniques when MRMR is employed as a feature selection technique.As shown,the Adaboost and bagging ensemble models obtained the same accuracy rate of 99.91%,achieving the best accuracy result of all the ensemble learning models used.The LPBoost ensemble model achieved a similar accuracy result of 99.38%.The RUSBoost model obtained a lower accuracy rate of 86.83%,which is the lowest performance result of all ensemble models.The bagging model obtained good performance results compared with other ensemble methods in terms of sensitivity and specificity,with scores of 99.95% and 99.86%,respectively.The Adaboost model obtained similar sensitivity and specificity results of 99.91% and 99.90%,respectively.The RUSBoost achieved lower performance results in terms of sensitivity and specificity,with scores of 92.22% and 81.52%,respectively.In terms of the F1-score,the Adaboost and bagging ensemble models achieved the same results of 99.91%,whereas the LPBoost model obtained a score of 99.37%.The RUSBoost obtained the lowest F1-score of the ensemble models with 87.42%.Fig.4 shows the performance evaluation of different ensemble learning techniques when using MRMR.

    Table 1:Performance results of different ensemble learning techniques when using MRMR method

    Figure 4:Performance evaluation of different ensemble learning techniques when using MRMR method

    Fig.5 depicts the NPV and PPV metrics for various ensemble learning models when MRMR is used in the feature selection phase.As Fig.5 shows,the bagging ensemble model achieved the best NPV performance with 99.95%,while Adaboost and LPBoost achieved similar NPV results of 99.91%and 99.32%,respectively.The RUSBoost ensemble model yielded a lower NPV of 91.40%.In the case of the PPV measure,the Adaboost ensemble model outperformed other techniques with 99.90%,and the bagging model obtained a similar PPV result of 99.86%.The RUSBoost ensemble model produced a lower PPV of 83.09%.Fig.6 presents the confusion matrix of ensemble models when using MRMR.

    Figure 5:Negative predictive and positive predictive values of different ensemble learning models when using MRMR method

    Figure 6:(Continued)

    Figure 6:Confusion matrix of different ensemble learning models when using MRMR

    5.2.2 Evaluation Results of Ensemble Models When Using PCA

    Tab.2 presents the performance results of several ensemble learning techniques when PCA is employed as a feature selection technique.As shown,the Adaboost and bagging ensemble models obtained similar accuracy rate with 99.46% and 99.68%,respectively.The bagging model outperformed all other ensemble models in terms of accuracy rate(99.68%).The LPBoost model achieved similar accuracy result of 99.07%,while the RUSBoost model obtained a lower accuracy rate of 88.75%,which is the lowest performance result of all ensemble models.The bagging model obtained a good performance results compared with other ensemble methods in terms of sensitivity and specificity,with scores of 99.79%and 99.58%,respectively.Whereas the Adaboost model obtained similar sensitivity and specificity results with 99.38%and 99.53%,respectively.The RUSBoost achieved lower performance results in terms of sensitivity and specificity with 87.51% and 89.98%,respectively.In terms of the F1-score,the bagging model obtained 99.68%,whereas the Adaboost and LPBoost obtained a similar performance result with 99.45%and 99.06%,respectively.The RUSBoost obtained the lowest F1-score of the ensemble models with 88.54%.Fig.7 shows the performance evaluation of different ensemble learning techniques when using PCA.

    Table 2:Performance results of different ensemble learning techniques when using PCA

    Figure 7:Performance evaluation of different ensemble learning models when using PCA technique

    Fig.8 depicts the NPV and PPV metrics for various ensemble learning models when PCA is used in the feature selection phase.As Fig.8 shows,the bagging ensemble model achieved the best NPV performance with 99.79%,while Adaboost and LPBoost achieved similar NPV results of 99.39%and 99.14%,respectively.The RUSBoost ensemble model yielded a lower NPV of 87.98%.In the case of the PPV measure,the bagging ensemble model outperformed other techniques with 99.57%,and the Adaboost model obtained a similar PPV result of 99.53%.The RUSBoost ensemble model produced a lower PPV of 89.59%.Fig.9 presents the confusion matrix of ensemble models when using PCA.

    Figure 8:Negative predictive and positive predictive values of different ensemble learning models when using PCA technique

    Figure 9:Confusion matrix of different ensemble learning models when using PCA

    5.2.3 Comparative Study

    Fig.10 depicts the accuracy rates of ensemble learning models when PCA and MRMR are employed in the feature selection phase.As Fig.10 shows,the MRMR method achieved a higher accuracy than the PCA method in all ensemble learning techniques except for the RUSBoost model.The Adaboost ensemble model obtained a higher accuracy rate than all other ensemble techniques when MRMR is used as a feature selection method.However,the bagging model achieved a higher accuracy rate than all other ensemble models when using PCA as the feature selection method.Overall,the Adaboost and bagging models achieved good performance results in contrast to the LPBoost and RUSBoost models.

    Tab.3 compares the proposed method to existing methods.Our anomaly detection method outperformed a recently proposed approach in[28],who employed the genetic algorithm in the feature selection phase and the random forest model for attack classification;our method improved the accuracy rate by 12.3%.In comparison to the proposed method in[26],our proposed anomaly model improved the accuracy rate by 7.42%while significantly lowering the FPR by 14.6%.In comparison to Al-Hawawreh et al.[22],who used deep learning techniques for attack classifications in IIoT networks,our proposed method increased the accuracy rate by 1.31%,and reduced the FPR by 1.7%.Another study by Awotunde et al.[27],who used a feedforward neural network model for attack detection in IIoT environments,our method enhanced accuracy rate by 1.01%and decreased FPR by 1.0%.Tab.3 compares the proposed method‘s classification accuracy and FPR with existing anomaly detection techniques.

    Figure 10:Comparison of MRMR and PCA with different ensemble models

    Table 3:Comparison of the proposed method with existing methods

    6 Conclusion

    In this paper,we proposed an anomaly-based IDS to overcome different types of cyberattacks in IIoT environments.The proposed method used two feature selection techniques,MRMR and PCA,to improve the anomaly detection performance for efficiently detecting several IIoT cyberattacks.In the classification stage,several ensemble learning models were used to determine whether a given traffic flow is normal or an attack.At the validation step,we evaluated,analyzed,and compared our proposed anomaly detection method with recent previous studies.With an accuracy rate of 99.91%and a reduced false alarm rate of 0.1%,our proposed method outperformed other techniques.In the future,we will extend our method to classify different types of cyberattacks for a multiclassification problem.Also,we will investigate more feature-selection techniques and use deep learning algorithms for cyberattack classifications in IIoT networks.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产老妇伦熟女老妇高清| 亚洲成人手机| 国产一级毛片在线| a级片在线免费高清观看视频| 少妇高潮的动态图| 国产精品无大码| 国产精品免费大片| 亚洲欧美中文字幕日韩二区| 国产一区有黄有色的免费视频| 亚洲经典国产精华液单| 精品人妻偷拍中文字幕| 久久久国产一区二区| 久久国内精品自在自线图片| 在线观看人妻少妇| 久久女婷五月综合色啪小说| 精品国产一区二区久久| 欧美日韩视频高清一区二区三区二| 久久97久久精品| 观看美女的网站| 国产亚洲午夜精品一区二区久久| 伦理电影免费视频| 天美传媒精品一区二区| 卡戴珊不雅视频在线播放| 99久久综合免费| 午夜老司机福利剧场| 老司机亚洲免费影院| 午夜精品国产一区二区电影| 女人被躁到高潮嗷嗷叫费观| 又黄又爽又刺激的免费视频.| 人妻 亚洲 视频| 在线精品无人区一区二区三| 亚洲av国产av综合av卡| 国产综合精华液| 丰满饥渴人妻一区二区三| 免费看不卡的av| 亚洲精品自拍成人| 99热国产这里只有精品6| 黄色一级大片看看| 麻豆乱淫一区二区| 日韩 亚洲 欧美在线| 国产爽快片一区二区三区| 乱码一卡2卡4卡精品| 欧美变态另类bdsm刘玥| 国产伦理片在线播放av一区| 午夜福利,免费看| 国产毛片在线视频| 岛国毛片在线播放| 性高湖久久久久久久久免费观看| 国产免费福利视频在线观看| 午夜日本视频在线| 日本与韩国留学比较| 草草在线视频免费看| 日韩大片免费观看网站| 久久久久人妻精品一区果冻| 精品国产国语对白av| 欧美 日韩 精品 国产| 亚洲精品久久成人aⅴ小说| 伦精品一区二区三区| 尾随美女入室| 美国免费a级毛片| 国产高清国产精品国产三级| 午夜福利影视在线免费观看| 18禁观看日本| 考比视频在线观看| 最近中文字幕2019免费版| 视频在线观看一区二区三区| 日韩精品有码人妻一区| 九色成人免费人妻av| 日本av手机在线免费观看| 综合色丁香网| av不卡在线播放| a级毛片黄视频| a级毛色黄片| 内地一区二区视频在线| 九九爱精品视频在线观看| 午夜影院在线不卡| 高清视频免费观看一区二区| 久久久久久久久久久免费av| 成人毛片60女人毛片免费| 2022亚洲国产成人精品| 久久久久久伊人网av| 久久影院123| 老司机影院成人| 高清毛片免费看| 精品人妻在线不人妻| 中文字幕人妻丝袜制服| 五月玫瑰六月丁香| 美女国产高潮福利片在线看| 亚洲成av片中文字幕在线观看 | 高清黄色对白视频在线免费看| 婷婷色综合大香蕉| 成年美女黄网站色视频大全免费| 精品亚洲成国产av| 久久久精品免费免费高清| 国产毛片在线视频| 日韩一本色道免费dvd| av又黄又爽大尺度在线免费看| 大片免费播放器 马上看| 国产乱来视频区| 一级爰片在线观看| 捣出白浆h1v1| 亚洲av中文av极速乱| 免费不卡的大黄色大毛片视频在线观看| 国产视频首页在线观看| 一二三四在线观看免费中文在 | 另类亚洲欧美激情| 捣出白浆h1v1| av.在线天堂| 日韩制服骚丝袜av| 欧美国产精品一级二级三级| 美女xxoo啪啪120秒动态图| 成人无遮挡网站| 亚洲国产精品成人久久小说| 亚洲国产欧美日韩在线播放| 国产成人精品一,二区| 伦精品一区二区三区| 99视频精品全部免费 在线| freevideosex欧美| 一本色道久久久久久精品综合| 亚洲国产精品一区三区| 18禁在线无遮挡免费观看视频| 免费黄色在线免费观看| 国产爽快片一区二区三区| 欧美老熟妇乱子伦牲交| 女人久久www免费人成看片| 亚洲天堂av无毛| 久久久精品94久久精品| 免费黄网站久久成人精品| 免费女性裸体啪啪无遮挡网站| 啦啦啦在线观看免费高清www| 97精品久久久久久久久久精品| 国产成人一区二区在线| 最黄视频免费看| av国产精品久久久久影院| 午夜91福利影院| 欧美人与性动交α欧美精品济南到 | 久久国内精品自在自线图片| 欧美亚洲日本最大视频资源| 日韩一区二区视频免费看| 久久精品人人爽人人爽视色| 久久99精品国语久久久| 十分钟在线观看高清视频www| 看免费av毛片| 亚洲国产精品成人久久小说| 97在线人人人人妻| 久久精品国产亚洲av涩爱| 成人毛片60女人毛片免费| 成人国产av品久久久| 男人爽女人下面视频在线观看| 午夜av观看不卡| 亚洲av福利一区| 午夜福利视频精品| 激情视频va一区二区三区| 秋霞伦理黄片| 国产精品久久久久久久电影| 精品国产乱码久久久久久小说| av天堂久久9| 久久久久网色| 国产亚洲av片在线观看秒播厂| 久久久久精品人妻al黑| 91午夜精品亚洲一区二区三区| 国产精品国产三级国产av玫瑰| 一区二区三区四区激情视频| 久久人人爽人人片av| 久久狼人影院| 亚洲欧美一区二区三区黑人 | 欧美bdsm另类| 久久久久网色| 波野结衣二区三区在线| 一级片'在线观看视频| 三级国产精品片| 波野结衣二区三区在线| 黄片播放在线免费| 国产xxxxx性猛交| 91国产中文字幕| 丰满少妇做爰视频| 欧美激情国产日韩精品一区| 久久久久视频综合| 中文字幕制服av| 国产免费福利视频在线观看| 久久国产亚洲av麻豆专区| 久久久久久久亚洲中文字幕| 精品国产乱码久久久久久小说| 国产精品嫩草影院av在线观看| 中国美白少妇内射xxxbb| 欧美bdsm另类| 三级国产精品片| 国产高清不卡午夜福利| 国产综合精华液| 在线观看人妻少妇| av播播在线观看一区| 国语对白做爰xxxⅹ性视频网站| 午夜视频国产福利| 国产极品粉嫩免费观看在线| 熟女人妻精品中文字幕| 九九在线视频观看精品| 午夜免费鲁丝| 亚洲精品久久成人aⅴ小说| 99香蕉大伊视频| 中文乱码字字幕精品一区二区三区| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 亚洲国产精品专区欧美| 99热这里只有是精品在线观看| 国产男女超爽视频在线观看| 亚洲精品国产色婷婷电影| 高清毛片免费看| 天天躁夜夜躁狠狠久久av| 中文字幕av电影在线播放| 国产淫语在线视频| 美女国产视频在线观看| 国产一级毛片在线| 男女免费视频国产| 亚洲欧美日韩卡通动漫| 国产精品不卡视频一区二区| av又黄又爽大尺度在线免费看| 婷婷成人精品国产| 日本-黄色视频高清免费观看| 欧美日韩视频高清一区二区三区二| 国产一区有黄有色的免费视频| 日本av免费视频播放| 高清欧美精品videossex| 人妻一区二区av| 亚洲精品乱久久久久久| 内地一区二区视频在线| 国产一区二区三区av在线| 99久国产av精品国产电影| 欧美激情国产日韩精品一区| 精品一区在线观看国产| 巨乳人妻的诱惑在线观看| 黄片无遮挡物在线观看| 少妇人妻精品综合一区二区| 尾随美女入室| 亚洲欧美成人综合另类久久久| 汤姆久久久久久久影院中文字幕| 日韩制服骚丝袜av| 春色校园在线视频观看| 亚洲伊人色综图| 你懂的网址亚洲精品在线观看| 美女国产视频在线观看| 欧美人与性动交α欧美软件 | 一级,二级,三级黄色视频| 99热国产这里只有精品6| 99久国产av精品国产电影| 蜜桃在线观看..| 亚洲av成人精品一二三区| 九色亚洲精品在线播放| 久久狼人影院| 高清黄色对白视频在线免费看| 国产国拍精品亚洲av在线观看| 国产成人aa在线观看| 久久av网站| 看非洲黑人一级黄片| 中文字幕av电影在线播放| 久久精品国产亚洲av天美| 亚洲在久久综合| 观看av在线不卡| 亚洲伊人久久精品综合| 亚洲色图综合在线观看| 热99国产精品久久久久久7| 国产免费又黄又爽又色| 欧美xxⅹ黑人| 婷婷色综合大香蕉| 久久国产亚洲av麻豆专区| 欧美丝袜亚洲另类| 九草在线视频观看| 一级,二级,三级黄色视频| 亚洲精品av麻豆狂野| 欧美+日韩+精品| 久久免费观看电影| 2018国产大陆天天弄谢| 亚洲欧洲日产国产| 少妇熟女欧美另类| 欧美+日韩+精品| 精品一区二区免费观看| 一本—道久久a久久精品蜜桃钙片| 国产精品女同一区二区软件| 免费看av在线观看网站| 国产日韩欧美在线精品| 久久99一区二区三区| 一级,二级,三级黄色视频| 99热网站在线观看| 丰满少妇做爰视频| 中文字幕精品免费在线观看视频 | 亚洲精品色激情综合| 成人漫画全彩无遮挡| 九色亚洲精品在线播放| 国产午夜精品一二区理论片| 大香蕉久久网| xxx大片免费视频| 亚洲欧美一区二区三区国产| 国产亚洲av片在线观看秒播厂| 国产有黄有色有爽视频| 久久久久久伊人网av| 丝袜脚勾引网站| av在线app专区| 亚洲成人av在线免费| 久久久久精品久久久久真实原创| 久久韩国三级中文字幕| 国产色爽女视频免费观看| 日韩人妻精品一区2区三区| www.熟女人妻精品国产 | 高清黄色对白视频在线免费看| 亚洲欧洲精品一区二区精品久久久 | 欧美日韩亚洲高清精品| 免费看光身美女| 26uuu在线亚洲综合色| 亚洲欧洲日产国产| 亚洲欧美中文字幕日韩二区| 国产不卡av网站在线观看| 婷婷色麻豆天堂久久| 有码 亚洲区| 久久精品夜色国产| 在线观看一区二区三区激情| 亚洲国产日韩一区二区| 精品一区二区三区四区五区乱码 | 三级国产精品片| 青春草视频在线免费观看| 久久鲁丝午夜福利片| 成人国产av品久久久| 精品国产一区二区三区四区第35| 熟女av电影| 亚洲精品日韩在线中文字幕| 色视频在线一区二区三区| 久久99热6这里只有精品| 亚洲精品美女久久av网站| 免费不卡的大黄色大毛片视频在线观看| 国产精品国产三级国产专区5o| 日韩在线高清观看一区二区三区| 午夜av观看不卡| 亚洲av免费高清在线观看| 亚洲av在线观看美女高潮| 一级片免费观看大全| √禁漫天堂资源中文www| 婷婷色av中文字幕| 伦理电影大哥的女人| 十分钟在线观看高清视频www| 国产精品久久久久久久久免| 99re6热这里在线精品视频| 18在线观看网站| 一区二区三区乱码不卡18| 天天躁夜夜躁狠狠躁躁| 国产免费一级a男人的天堂| 在线观看国产h片| 国产亚洲av片在线观看秒播厂| 国产福利在线免费观看视频| 夫妻午夜视频| 亚洲人与动物交配视频| 亚洲丝袜综合中文字幕| 日韩av不卡免费在线播放| 亚洲,一卡二卡三卡| 精品亚洲成国产av| 国产熟女午夜一区二区三区| 亚洲欧美清纯卡通| 国产在线视频一区二区| 一边亲一边摸免费视频| 晚上一个人看的免费电影| 国产伦理片在线播放av一区| 亚洲精品久久久久久婷婷小说| 免费观看性生交大片5| 国产又色又爽无遮挡免| 日本av免费视频播放| 日日爽夜夜爽网站| 亚洲av综合色区一区| 美女大奶头黄色视频| 最后的刺客免费高清国语| 欧美+日韩+精品| 中国三级夫妇交换| 性色avwww在线观看| 高清视频免费观看一区二区| 日韩大片免费观看网站| 久久人人爽人人片av| 黑丝袜美女国产一区| 一边亲一边摸免费视频| 亚洲伊人色综图| 国产精品偷伦视频观看了| 免费日韩欧美在线观看| 在线观看一区二区三区激情| 伊人亚洲综合成人网| 春色校园在线视频观看| 另类亚洲欧美激情| 国产一区亚洲一区在线观看| 九九爱精品视频在线观看| 久久久亚洲精品成人影院| 亚洲精品久久午夜乱码| 国产精品国产av在线观看| 久久99蜜桃精品久久| 观看美女的网站| 欧美日韩亚洲高清精品| 岛国毛片在线播放| 日韩精品有码人妻一区| 国语对白做爰xxxⅹ性视频网站| 色94色欧美一区二区| 亚洲 欧美一区二区三区| 国产不卡av网站在线观看| 99久久中文字幕三级久久日本| 熟女人妻精品中文字幕| 午夜福利在线观看免费完整高清在| 国产精品女同一区二区软件| 天堂中文最新版在线下载| 人人澡人人妻人| 精品亚洲成国产av| 如日韩欧美国产精品一区二区三区| 亚洲四区av| 国产在线免费精品| www.熟女人妻精品国产 | 色婷婷av一区二区三区视频| 国产精品久久久久久久久免| 丝袜人妻中文字幕| 亚洲精品日本国产第一区| 男的添女的下面高潮视频| 免费黄色在线免费观看| 哪个播放器可以免费观看大片| 纯流量卡能插随身wifi吗| 精品久久久久久电影网| 久久久久久久亚洲中文字幕| 丰满乱子伦码专区| 国产在线视频一区二区| 午夜福利视频精品| 亚洲欧美精品自产自拍| 下体分泌物呈黄色| 日本与韩国留学比较| 如何舔出高潮| 美女国产视频在线观看| 成年动漫av网址| 狂野欧美激情性xxxx在线观看| 欧美人与善性xxx| 国产1区2区3区精品| 大陆偷拍与自拍| 国产精品嫩草影院av在线观看| 日韩人妻精品一区2区三区| 青春草国产在线视频| 亚洲熟女精品中文字幕| 新久久久久国产一级毛片| 自拍欧美九色日韩亚洲蝌蚪91| 两个人免费观看高清视频| 九色成人免费人妻av| 国产免费又黄又爽又色| 只有这里有精品99| 蜜臀久久99精品久久宅男| 性色avwww在线观看| 国产一区二区三区综合在线观看 | 一边摸一边做爽爽视频免费| 满18在线观看网站| 99久久精品国产国产毛片| 90打野战视频偷拍视频| 高清不卡的av网站| 亚洲,欧美,日韩| 激情五月婷婷亚洲| 夜夜爽夜夜爽视频| 26uuu在线亚洲综合色| 久久精品夜色国产| 插逼视频在线观看| av国产精品久久久久影院| 熟女av电影| 97在线视频观看| 我的女老师完整版在线观看| 丝袜喷水一区| 欧美另类一区| www.av在线官网国产| 精品久久久精品久久久| 国产永久视频网站| 亚洲精品456在线播放app| 亚洲伊人久久精品综合| 精品视频人人做人人爽| 校园人妻丝袜中文字幕| 香蕉丝袜av| 人妻少妇偷人精品九色| 男人操女人黄网站| 免费黄频网站在线观看国产| 精品一区在线观看国产| 久久久久久久久久久免费av| 曰老女人黄片| 香蕉国产在线看| 高清在线视频一区二区三区| 亚洲欧洲日产国产| 亚洲国产日韩一区二区| 国内精品宾馆在线| 免费人妻精品一区二区三区视频| 国产在线一区二区三区精| 少妇的逼好多水| 亚洲成av片中文字幕在线观看 | 国产老妇伦熟女老妇高清| 亚洲av国产av综合av卡| 日韩制服丝袜自拍偷拍| 亚洲综合色网址| 国产精品不卡视频一区二区| 国产免费一区二区三区四区乱码| 天天躁夜夜躁狠狠久久av| 欧美 日韩 精品 国产| 色吧在线观看| 热99久久久久精品小说推荐| 精品少妇内射三级| 交换朋友夫妻互换小说| 18禁动态无遮挡网站| av又黄又爽大尺度在线免费看| 日韩在线高清观看一区二区三区| 亚洲婷婷狠狠爱综合网| 亚洲激情五月婷婷啪啪| 日韩制服丝袜自拍偷拍| 多毛熟女@视频| 欧美激情极品国产一区二区三区 | 黄片无遮挡物在线观看| 在线观看人妻少妇| 精品第一国产精品| 人体艺术视频欧美日本| 麻豆乱淫一区二区| 精品一区二区三区四区五区乱码 | 少妇的丰满在线观看| 18禁国产床啪视频网站| 亚洲国产最新在线播放| 18在线观看网站| 乱人伦中国视频| 欧美另类一区| 波野结衣二区三区在线| 在线免费观看不下载黄p国产| 国产国语露脸激情在线看| 成年女人在线观看亚洲视频| 免费观看无遮挡的男女| av网站免费在线观看视频| 18禁动态无遮挡网站| 一级片'在线观看视频| 亚洲国产日韩一区二区| 精品一区二区三区视频在线| 中文字幕人妻熟女乱码| h视频一区二区三区| 日日爽夜夜爽网站| 伊人亚洲综合成人网| 精品99又大又爽又粗少妇毛片| 国产男女内射视频| 久久久国产精品麻豆| 日韩 亚洲 欧美在线| 亚洲av成人精品一二三区| 两个人免费观看高清视频| 91精品伊人久久大香线蕉| 日韩人妻精品一区2区三区| 亚洲美女搞黄在线观看| av一本久久久久| 国产精品一区二区在线观看99| 亚洲人与动物交配视频| 精品久久久久久电影网| 欧美老熟妇乱子伦牲交| 春色校园在线视频观看| 亚洲色图 男人天堂 中文字幕 | 精品久久久久久电影网| 18禁国产床啪视频网站| 一本久久精品| 香蕉国产在线看| 国产xxxxx性猛交| 国产av国产精品国产| 亚洲av欧美aⅴ国产| 中文字幕免费在线视频6| 国产精品欧美亚洲77777| 国产成人精品福利久久| 国产成人aa在线观看| 久久这里只有精品19| 18+在线观看网站| av电影中文网址| 91aial.com中文字幕在线观看| 国产成人精品一,二区| 日本爱情动作片www.在线观看| 最近最新中文字幕大全免费视频 | 免费久久久久久久精品成人欧美视频 | 亚洲一区二区三区欧美精品| 内地一区二区视频在线| 搡老乐熟女国产| 久久鲁丝午夜福利片| 精品国产国语对白av| 午夜福利在线观看免费完整高清在| 亚洲精品日本国产第一区| 中文天堂在线官网| 少妇熟女欧美另类| 两性夫妻黄色片 | 欧美日本中文国产一区发布| 午夜免费鲁丝| 欧美+日韩+精品| 精品少妇内射三级| 成年美女黄网站色视频大全免费| a 毛片基地| 亚洲一区二区三区欧美精品| 999精品在线视频| 精品国产一区二区久久| 亚洲国产毛片av蜜桃av| 一级a做视频免费观看| 亚洲国产精品999| 少妇猛男粗大的猛烈进出视频| 国产av码专区亚洲av| 男人爽女人下面视频在线观看| 久久99精品国语久久久| 18禁观看日本| 精品午夜福利在线看| 免费看不卡的av| 国产av国产精品国产| 全区人妻精品视频| 免费在线观看黄色视频的| 高清在线视频一区二区三区| 国产精品免费大片| 亚洲经典国产精华液单| 久久久精品区二区三区| xxx大片免费视频| 亚洲经典国产精华液单| 久久精品久久久久久久性| 2018国产大陆天天弄谢| 亚洲成色77777| 亚洲av综合色区一区| 精品久久国产蜜桃| 精品国产一区二区三区久久久樱花| 亚洲精品456在线播放app| 丰满乱子伦码专区| 亚洲第一区二区三区不卡| 成年av动漫网址| 国产精品女同一区二区软件| av网站免费在线观看视频| 国产亚洲av片在线观看秒播厂| 国精品久久久久久国模美| 蜜臀久久99精品久久宅男|