• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Dynamic Threshold-Based Approach to Detect Low-Rate DDoS Attacks on Software-Defined Networking Controller

    2022-11-10 02:31:18MohammadAdnanAladailehMohammedAnbarIznanHasbullahAbdullahAhmedBahashwanandShadiAlSarawn
    Computers Materials&Continua 2022年10期

    Mohammad Adnan Aladaileh,Mohammed Anbar,Iznan H.Hasbullah,Abdullah Ahmed Bahashwan and Shadi Al-Sarawn

    National Advanced IPv6 Centre of Excellence,Universiti Sains Malaysia,Penang,Malaysia

    Abstract:The emergence of a new network architecture,known as Software Defined Networking (SDN),in the last two decades has overcome some drawbacks of traditional networks in terms of performance,scalability,reliability,security,and network management.However,the SDN is vulnerable to security threats that target its controller,such as low-rate Distributed Denial of Service (DDoS) attacks,The low-rate DDoS attack is one of the most prevalent attacks that poses a severe threat to SDN network security because the controller is a vital architecture component.Therefore,there is an urgent need to propose a detection approach for this type of attack with a high detection rate and low false-positive rates.Thus,this paper proposes an approach to detect low-rate DDoS attacks on the SDN controller by adapting a dynamic threshold.The proposed approach has been evaluated using four simulation scenarios covering a combination of low-rate DDoS attacks against the SDN controller involving(i)a single host attack targeting a single victim;(ii)a single host attack targeting multiple victims;(iii)multiple hosts attack targeting a single victim;and(iv)multiple hosts attack targeting multiple victims.The proposed approach’s average detection rates are 96.65%,91.83%,96.17%,and 95.33% for the above scenarios,respectively;and its average false-positive rates are 3.33%,8.17%,3.83%,and 4.67% for similar scenarios,respectively.The comparison between the proposed approach and two existing approaches showed that it outperformed them in both categories.

    Keywords:Attack detection;controller;dynamic threshold;entropy algorithm;distributed denial of service;software defined networking;static threshold

    1 Introduction

    For decades,defending network security has been a competitive process between attackers and security practitioners.Despite the advancement of technology,innovative new attack types and the tools to trigger them keep appearing that require sophisticated countermeasures[1].For example,DDoS attacks can cause significant network disruption and even destroy network infrastructure[2].However,the adoption of SDN architecture as a security measure has significantly reduced the destructive impact of DDoS attacks on the target network/victims[3,4].

    The controller provides significant functions in the SDN network,including configuring flow tables (rules),being able to monitor network components by constructing secure channels,and updating an infrastructure layer’s instructions flow table to identify new network traffic flows.[5-8].Furthermore,through an open API,the controller could control the complete network flow of traffic by serving as a controller between the infrastructure and application layers[9].Finally,the network traffic flow could be checked by the network traffic flow statistics the controller has collected to provide the attack detection approach in the traffic statistics.This way,the controller could figure out whether the network traffic flow is normal or abnormal.

    Any new network technology will encounter many security issues,especially with the explosion in Internet use.However,no network technology can guarantee absolute safety or security,including the SDN.The SDN controller is an attractive target for attackers aiming to break down entire SDN network operations[10].Nexusguard’s report showed a high increase in DDoS attacks in the first half of 2021,which reached 233%compared to years prior[11].

    Although the SDN network is vital in network management and provides flexibility to deal with the network traffic flows,it still faces many security issues because the centralized controller is the main component of the network serving as an operating system for all network functions.Therefore,if any threat to the controller is not addressed early,it will eventually slow down the entire network.For example,the primary objective of most DDoS attacks on SDN networks is the controller,typically achieved by bombarding it with a massive amount of spoofed IP packets to exhaust its resources,reducing its ability to process incoming packets[12,13].

    Many DDoS detection approaches for DDoS attacks on SDN controllers employ the entropy algorithm,which involves examining network traffic flow behavior.The entropy method can collect statistical information on traffic flows regarding the number of packets and the packet header features.However,the existing entropy-based approaches depend on the static threshold,which could degrade the performance of low-rate DDoS attack detection,which implies a high false-positive rate.Thus,this paper’s contribution is to adapt a dynamic threshold into an entropy algorithm to detect DDoS attacks on SDN controllers with a high detection rate and a low false-positive rate,regardless of the trigger source(single host attack or multiple host attacks)and the number of targets(single victim or multiple victims).

    The rest of the paper is structured as follows:The related work is presented in Section 2.Section 3 discusses adapting a dynamic threshold algorithm for detecting low DDoS attack traffic rates and provides a detailed explanation of the proposed detection approach.Section 4 elaborates on the experiments and evaluation in terms of the experiment setup and simulation scenarios for evaluating the performance of the detection approach and discusses the proposed approach results.It is followed by Section 5,which compares the proposed approach with existing detection approaches in terms of attack detection rate and false-positive rate metrics.Finally,Section 6 summarizes the study’s conclusion and recommends several directions for future research.for submission.It will speed up the review and typesetting process.

    2 Related Work

    As mentioned in Section 1,the SDN controller faces many security challenges due to its importance to the network,making it attractive as a target for attackers attempting to collapse the network since the controller is responsible for managing all network traffic flows.Hence,any successful attack against the controller could affect the entire network,especially the one launched with varying traffic rates toward single or multiple victims within the network,which is challenging to detect low DDoS attack traffic rate with a high detection rate and low false-positive rate.

    Dehkordi et al.[14]proposed a hybrid attack detection approach using the entropy method and machine learning(ML)executed on an SDN controller.The proposed approach comprises three parts:collector,entropy,and classification.The approach effectively detects DDoS attacks and attacks with a high detection rate.However,identifying an optimum threshold value is difficult when dealing with varying DDoS attack traffic rates.

    Singh et al.[15]proposed a novel technique utilizing a theory-based information approach(i.e.,Jensen Renyi Divergence(JRD)).The proposed approach detects high-rate and low-rate DDoS attacks in SDN-based network flows.This method has a lower computational requirement because there are fewer traffic features to calculate.The detection approach starts with time intervals and then extracts the relevant traffic features(i.e.,source and destination IP,source and destination port,and protocol operated).Finally,the procedure uses source IP addresses to calculate the information theory metrics for detection.However,the proposed approach achieves lower performance,particularly for low-rate DDoS attacks.

    Fan et al.[16]proposed a fusion entropy technique and a static threshold for calculating the randomness of network traffic.The proposed approach is expected to detect DDoS attacks in the SDN network environment.The proposed method was evaluated and tested using a real SDN dataset.However,the proposed approach achieves a low performance of 91.25%for the decline rate of entropy.Also,the proposed approach uses a static threshold value,which leads to low detection accuracy and high false-positive rates.In addition,the proposed method gives a lack of information about the dataset used and the features that could be used to detect DDoS attacks.Overall,this approach is limited to high-rate DDoS attacks.

    Meanwhile,Perez-Diaz et al.[17]proposed a flexible technique to detect and mitigate low DDoS attack traffic rate in SDN networks with characteristics similar to regular traffic.The approach relies on intrusion detection and prevention systems(IDS and IPS).Furthermore,the proposed approach uses six machine learning models for DDoS classification executed in the IDS.However,the proposed approach uses a fixed threshold,making the prevention method highly ineffective.

    Yu et al.[18]proposed a platform to detect DDoS attacks in vehicular networks that depend on the SDN environment by using machine learning(SVM).The proposed platform comprises the trigger detection model for packet-in,flow table features extraction and DDoS attack detection model.The proposed approach significantly reduces the time of DDoS attack detection.However,the proposed approach uses a predefined threshold,not considering varying attack traffic rates.

    Furthermore,Cui et al.[19]proposed an attack detection approach by combining the entropy method and cognitive-inspired computing,which depend on the SVM algorithm to detect DDoS attacks.Furthermore,the proposed approach depends on the periodic statistics of network traffic flows to calculate the uncertainty of packets in the network using packet header features(source and destination IP).However,the detection rate is still insufficient and uses a fixed threshold.

    Mousavi et al.[20]proposed an early detection approach that depends on an entropy algorithm relying on one header packet feature(destination IP address)for analyzing the network traffic flow statistics to calculate the uncertainty of the packets toward the controller.It decides if the network traffic flows have the DDoS attack by using a static threshold for comparing the threshold value with the entropy value.However,the proposed approach depends on a predefined threshold value,which affects its detection rate and may cause DoS to users in obtaining network services.

    Sahoo et al.[21]combining the information distance with the generalized entropy was proposed to detect a low attack traffic rate on the SDN controller.The number of packets within a predefined window size is used to calculate packets probability distribution in the network traffic flow,indicating DDoS attack existence.Despite their approach showing a high detection rate of DDoS,it faces difficulty setting a dynamic threshold corresponding to varying network traffic flows.

    The previous studies on detecting DDoS attacks with varying attack rates against SDN controllers show that no existing detection approach utilizes a dynamic threshold to respond to changing network traffic flow rates.The motivation of this study is to detect low DDoS attack traffic rate on SDN controller regardless of the attack traffic rates with a high detection rate and a low false-positive rate by adapting a dynamic threshold without additional load to the SDN controller.

    3 The Proposed Approach

    Dynamic threshold-based approaches can detect low DDoS attack traffic rate with higher detection rates and lower false-positive rates than static threshold-based approaches,which reduces the effectiveness of the DDoS attack detection rates and increases detection false-positive rates.Static threshold-based approaches cannot distinguish between regular and low-rate DDoS attack traffic,and they cannot handle the variation in attack traffic flow rates.In addition,the simple variation of lowrate DDoS attack traffic and regular traffic may affect detection approach performance depending on a predefined threshold[22].

    Consequently,a predefined static threshold is ineffective in reducing the false-positive rate.Furthermore,determining the threshold value is often time-consuming because it depends on observation and experimentation.However,dynamic thresholds are more flexible and can significantly improve DDoS detection performance because it can differentiate between low DDoS attack traffic rate and regular traffic rate.Therefore,Incoming network traffic’s dynamic threshold is being calculated in this section.For the calculation of the dynamic threshold,we utilize the following statistics:(i)the amount of incoming traffic that flows toward the controller over timet,(ii)the attack rate at which is directed towards the victim,(ii)the entropy value at timet.

    Eq.(1)calculates the randomness of these packets in the traffic flow(i.e.,source/destination IP address)within a particular time t.The attack behavior and legitimate packets behavior vary,which can cause fluctuations in the calculation of the threshold[23].The analysis of the incoming traffic finds the entropy used in the calculation of the dynamic threshold flows statistics.We calculate the dynamic threshold by adopting the exponentially weighted moving average(EWMA)method.

    whereP(Xi)is the likelihood of a specific features from the packet header features,nis the total number of the features in the network traffic in a particular time,andH(Xi)is the entropy value.

    This study calculates a dynamic threshold by adopting the EWMA method[24].Consequently,the dynamic threshold in this work relies on network traffic flow statistics that have been collected by controller and Entropy value,which reduces the time needed to calculate a suitable threshold for the proposed approach.Therefore,the DDoS attack detection effectiveness depends on the threshold value.Eq.(2)is the original EWMA equation.

    where,EWMAiis the current value of theEWMA,EWMAi-1is the previously estimatedEWMAvalue and the initial threshold value adopted in this research based on the calculation by[25].The process of calculating the dynamic threshold is as shown in Fig.1.

    Figure 1:Dynamic threshold calculation process

    The core contribution of this paper is the adaptation of the dynamic threshold to minimize the false positive rate and increase the detection rate for a low DDoS attack traffic rate detection approach regardless of the attack’s trigger sources(single host attack or multiple host attacks)and the number of victim targets(single victim or multiple victims).The dynamic threshold used the entropy value as the input.

    Most DDoS attack detection methods are entropy-based[26-28].However,entropy-based approaches share the same drawbacks with approaches that rely on a static threshold which degrades the attack detection rate and increases the false positive rate.Therefore,they struggle to detect low DDoS attack traffic rate on SDN controller that target single or multiple victim hosts.According to the proposed approach,using an entropy method with a dynamic threshold would significantly improve the accuracy for detecting low DDoS attack traffic rate regardless of the attack’s trigger sources that targeted a single victim host or multiple victim hosts.

    Finding the optimal dynamic threshold requires running multiple scenarios to see the effect of the entropy-based attack detection methods.These scenarios cover the attacks launched from a single host or multiple hosts on controller that targets a single victim host or multiple victim hosts.Consequently,since the behaviors of the incoming attack traffic flows are changing in network traffic flow by diverse attack sources based on specific window size,theEWMAis adopted to find a suitable dynamic threshold value.According to Eq.(2),the dynamic threshold calculation depends on each of the following:

    αis one ofEWMAparameters with a value between 0 to 1,so the new threshold will be more precise based on the experiments to limit the value of false-negative error;however,this choice is somewhat arbitrary[24].

    EWMAi+1is an estimated value (previous value) forEWMAiwith the value sets to 1.31 based on[25],which provides an accurate value to calculate the first value ofEWMAi.H(Xi)is currently measured,herein,theH(Xi)value has been adopted for each window size to suit all attack traffic rates in terms of the attack traffic intensity,whether it was a high DDoS attack traffic rate or a low DDoS attack traffic rate.

    After calculating dynamic threshold value,the comparison between the incoming traffic flows’randomness and the dynamic threshold will be made.The next stage is a key to deciding if there is a DDoS attack by using a rule-based detection approach.Fig.2 illustrates the flow of the dynamic threshold process.

    Figure 2:Dynamic threshold flowchart

    Based on Fig.2,theαvalue is 0.09,the initial value ofEWMAi-1= 1.31 and theH(Xi)value corresponds to the currently measured valueEWMAi=(1-0.09)*1.31+(0.09-H(Xi)).This value is for the first incoming flow,so for the subsequent incoming flow,EWMAi-1andEWMA0based on the previous value of theEWMAi+1will be based on the current value of entropyEWMAi-1.

    This study proposes a new rule-based attack detection to detect low DDoS attack traffic rate on the controller based on a statistical analysis of incoming network traffic flows.The rule is based on the entropyH(Xi)value and the dynamic threshold value within a specific window size.As stated in Section 3,a DDoS attack exists if is less than or equal toTh;otherwise,the incoming network traffic flow will be considered regular traffic.

    4 Experiments and Evaluation

    This section describes the experiments on low-rate DDoS attack detection approach adaptation of a dynamic threshold with entropy,evaluates the attack detection approach,and compares the results with the existing entropy-based attack detection approach[20]and information theory algorithmbased attack detection approach.This experiment uses a virtual SDN environment to implement and evaluate the dynamic threshold-based low-rate DDoS attack detection approach.

    4.1 Experiment Setup

    This section describes the setup of the experiment.The quantitative research evaluation uses Mininet version 3.7(32-bit)to simulate DDoS attack detection approaches covering different attack scenarios.Furthermore,selecting the implementation tool software and hardware in the testbed and setting up the simulation environment depends on the detection approach requirements.Tab.1 presents the detail of the topology of the experimental setup.

    Table 1:Description of the attack detection approach topology

    The workstation used for the experiment runs a 64-bit Microsoft?Windows 10 operating system on hardware with 2.6 GHz Intel?Core?i7-6700HQ CPU and 16 GB RAM.

    4.2 Experiment Setup

    This section describes the simulated scenarios that have been used to evaluate the performance of the proposed approach,compared with the existing DDoS detection approaches,and the evaluation metrics used to measure the effectiveness of the proposed approach for detecting low DDoS attack traffic rates on the SDN controller.

    This study tests several attack scenarios,such as attack sources(single or multiple attack hosts)and targeted victims (single or multiple victim hosts).The average of each scenario’s result will be reported every five minutes for 30 minutes.Furthermore,the five minutes are divided into n slots,so each slot is equal tomsecond,wheremis a configurable value for calculating the network traffic withmseconds.Eq.(4)is the formula used to calculate the time slot[29].

    In this study,based on trial and error,the distribution of the packet is reported every 5-minute(300 sec) window.Therefore,the proposed approach will report the result of 60 traffic flows,where each flow is a 5-second window aggregate.Therefore,the average detection rate and false-positive rate of 60 traffic flows will be reported every five minutes.

    In addition,a low-rate DDoS attack packet is sent at a rate of 5 packets/sec (1 packet every 0.2 seconds),as stated in[30].As a result,the attack ratio in a 5-second time window is calculated using Eq.(5)[21].

    As shown in Tab.2,the attack packet is sent at a five packets/sec rate,almost the same as the normal traffic rate(one packet/sec).For reference,the total number of normal packets sent per second is 63 in the single attacker scenario since the testbed comprises 63 hosts (non-attackers);or 61 in the multiple attacker scenario(non-attacking hosts)since the testbed comprises three attacker hosts.Therefore,for a single attacker scenario,the total number of attacks and normal packets sent in five seconds is 25 and 63 × 5 = 315,respectively,regardless of the number of targets (single or multiple victims).As for the multiple attacker scenario,the total number of attacks and normal packets sent in five seconds is 75 and 61×5=305,respectively,regardless of the number of targets(single or multiple victims).However,due to the SDN characteristics that only forward a packet with a unique source IP address to the controller,only 63 or 61 packets are sent to the controller.As a result,using Eq.(5),the attack ratio within the 5-second window is 7%and 19%,respectively.

    Table 2:Single attacker traffic specifications against single or multiple targets using low-rate attack traffic

    4.3 Result

    In this study,the number of attack packets depends on the rate of attack traffic.For example,based on Tab.2,in five minutes,the number of attack packets in a low-rate DDoS attack triggered by a single host is 1,500,and the number of regular traffic is 18,900 packets.Meanwhile,when triggered by multiple hosts,the number of attack packets is 4,500 within five minutes,and the number of regular traffic is 18,300 packets within the same period.

    The single and multiple hosts attack scenarios aim to check the performance of the proposed approach in detecting low-rate DDoS attacks against the controller that targets single or multiple victims.The proposed approach depends on entropy and dynamic threshold values to detect low-rate DDoS attacks.Fig.3 shows the average values for each entropy and dynamic threshold values every 30 minutes;where SSL denotes a single host’s low-rate attack targeting a single victim host,SML is a single host’s low-rate attack targeting multiple victim hosts,MSL is multiple hosts’low-rate attacks targeting a single victim host,and MML is multiple hosts’low-rate attack targeting multiple victim hosts.

    As observed from Fig.3,the entropy values are slightly lower but very close to the dynamic threshold values within 30 minutes of the experiment,which indicates the presence of low-rate DDoS attacks in the network according to the rule-based attack detection.

    Indeed,the detection approach reports the packet distribution of each five-minute window size.Thus,the detection approach reports the findings of 60 network traffic flows according to Eq.(4),where each flow is the aggregate of packets within a 5-second window.The average detection rate and the average false-positive rate of 60 flows are reported every five minutes for 30 minutes.The proposed approach has been evaluated in terms of detection rate and false-positive rate.Figs.4a-4d illustrates the proposed approach’s detection rate and false-positive rate in detecting low-rate DDoS attack traffic.

    Figure 4:(Continued)

    Figure 4:(a)Average values of detection rate and false-positive rate of scenario SSL(b)Average values of detection rate and false-positive rate of scenario SML(c)Average values of detection rate and falsepositive rate of scenario MSL(d)Average values of detection rate and false-positive rate of scenario MML

    The figures above show that the DDoS attack traffic rate is low (0.2/sec),similar to regular traffic.Thereby,the proposed approach shows the ability to detect low-rate DDoS attacks with a range between 94%to 98%,which means the proposed approach can accurately detect low-rate DDoS attacks against the controller.Meanwhile,the false-positive rates range between 1.67% to 10%.The proposed approach’s effective performance is due to adopting a dynamic threshold that changes based on the attack rates according to the network traffic rates.Fig.5 below presents the average detection and false-positive rates in 30 minutes.

    As observed in Fig.5,when multiple hosts attacked a single host victim,both detection rate and low false-positive rate are high.However,the false-positive rate is high,and the detection rate is low when a single host attacks to multiple victims.The difference in detection rates and false-positive rates is because a single host attack distributes its attack traffic on more than one victim;therefore,the amount of attack traffic received by a single victimvs.multiple victims is noticeable.

    5 Comparison

    This section compares the proposed approach and the existing entropy-based approaches by[15,20].The approach[20]has been used as a comparison by all entropy variant approaches to evaluate the overall performance of the proposed detection approach that depends on the entropy method.Furthermore,the approach[15]has been used as a comparison to the proposed approach that depends on information theory algorithm to detect DDoS attacks based on analysis of the network traffic statistics collected from network traffic flows.By executing single or multiple host attack scenarios designed to detect low-rate DDoS attacks on single or multiple targets.The evaluation metrics used are detection rate and false-positive rate,which are widely used in measuring the performance of DDoS attack detection approaches against SDN controllers.

    The experimentation results show a high detection rate for detecting low-rate DDoS attacks against SDN controllers compared with the existing approaches because it relies on a dynamic threshold instead of a static threshold to detect DDoS attacks,which fulfills the aim of this study.Fig.6 shows the proposed approach has an accurate ability low attack rate detection triggered from single host attack or multiple hosts attacks toward a single victim or multiple victims.

    Figure 6:Average detection rate of proposed approach vs.existing approaches

    As observed in Fig.6,the proposed approach has a better detection rate than the existing approaches.It has a higher detection rate because the statistical analysis for the network traffic depends on packet header features(destination IP address)to calculate the randomness of the packet flow using an entropy algorithm and a dynamic threshold to detect the low-rate DDoS attack.In contrast,the existing approaches depend on a static threshold to analyze the network traffic,reducing its detection rate in this experiment.Fig.7 shows the average false-positive rate of proposed approachvs.existing approaches.

    Figure 7:Average false-positive rate of proposed approach vs.existing approaches

    As shown in Fig.7,the proposed approach performed better than the existing approaches regarding the false-positive rate.The proposed approach has a lower false-positive rate due to a combination of an entropy algorithm,a dynamic threshold,and a rule-based detection in detecting low-rate DDoS attacks in network traffic flows.In contrast,the existing approaches depend on a static threshold to analyze the network traffic,reducing its DDoS attack detection rate in this experiment.

    6 Conclusion

    This paper proposed an approach to detect low DDoS attack traffic rate on the SDN controllers that target single victim or multiple victims.It used an entropy method to improve the attack detection rate and reduce the false-positive rate by adapting a dynamic threshold and proposing a new rule-based detection mechanism.The performance of the proposed approach was evaluated using four simulation scenarios using a low attack traffic rate.The results of the four simulation scenarios show considerable improvements in terms of attack detection rate and false-positive rate.In addition,the comparison of the proposed approach with the existing approaches showed that the proposed approach overcomes the limitations of the existing approaches and outperforms it in all evaluation metrics.Finally,future work could incorporate a dynamic threshold to detect high DDoS attack traffic rate with high detection rates and low false positive rates.

    Acknowledgement:We would like to express our gratitude to Universiti Sains Malaysia(USM)for all the support and facilities that enable the completion of this research.

    Funding Statement:This work was supported by Universiti Sains Malaysia under external grant(Grant Number 304/PNAV/650958/U154).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    aaaaa片日本免费| 久久久久久免费高清国产稀缺| 91麻豆精品激情在线观看国产| 视频区欧美日本亚洲| 日韩欧美国产一区二区入口| 老汉色∧v一级毛片| 高潮久久久久久久久久久不卡| 性色av乱码一区二区三区2| 国产精品乱码一区二三区的特点 | 久久久精品欧美日韩精品| 在线观看一区二区三区| 国产精品香港三级国产av潘金莲| www.999成人在线观看| 变态另类丝袜制服| 少妇熟女aⅴ在线视频| 国产在线精品亚洲第一网站| 黄色a级毛片大全视频| 窝窝影院91人妻| 中文字幕人妻熟女乱码| 国产熟女午夜一区二区三区| 黄色视频,在线免费观看| 韩国精品一区二区三区| 丰满的人妻完整版| 他把我摸到了高潮在线观看| 亚洲性夜色夜夜综合| 国产伦人伦偷精品视频| 男女之事视频高清在线观看| 电影成人av| 久99久视频精品免费| 国产人伦9x9x在线观看| 久久久久久久久免费视频了| 两性午夜刺激爽爽歪歪视频在线观看 | 99久久99久久久精品蜜桃| 中文字幕最新亚洲高清| 最新美女视频免费是黄的| 一卡2卡三卡四卡精品乱码亚洲| 国产日韩一区二区三区精品不卡| 在线十欧美十亚洲十日本专区| 国产99白浆流出| 国产亚洲精品第一综合不卡| 女性生殖器流出的白浆| 免费在线观看亚洲国产| 色婷婷久久久亚洲欧美| 欧美午夜高清在线| 亚洲人成电影观看| 国内精品久久久久精免费| 午夜两性在线视频| 国产精品一区二区三区四区久久 | 69精品国产乱码久久久| 亚洲中文日韩欧美视频| 久久久国产欧美日韩av| 性色av乱码一区二区三区2| 十分钟在线观看高清视频www| 色播在线永久视频| 国产又爽黄色视频| 国产成人精品无人区| 久久精品国产99精品国产亚洲性色 | 中文字幕精品免费在线观看视频| 精品久久久久久,| 国产高清视频在线播放一区| 亚洲全国av大片| 国产成人av教育| 亚洲精品粉嫩美女一区| 日本a在线网址| 亚洲成人国产一区在线观看| 精品人妻在线不人妻| 亚洲色图av天堂| 免费观看精品视频网站| 精品久久久久久久人妻蜜臀av | 国产视频一区二区在线看| av中文乱码字幕在线| 亚洲,欧美精品.| 久久国产精品影院| 一区二区三区高清视频在线| 少妇粗大呻吟视频| 亚洲国产精品sss在线观看| 19禁男女啪啪无遮挡网站| 久久中文字幕一级| av视频在线观看入口| 国产私拍福利视频在线观看| 两个人免费观看高清视频| 宅男免费午夜| 欧美成人一区二区免费高清观看 | 日本欧美视频一区| 国产亚洲精品久久久久久毛片| 日韩欧美国产一区二区入口| 欧美午夜高清在线| 精品国产乱码久久久久久男人| 黄片大片在线免费观看| 在线观看日韩欧美| 操出白浆在线播放| 亚洲欧美激情综合另类| www.精华液| 日日夜夜操网爽| 久久久国产精品麻豆| 久久婷婷人人爽人人干人人爱 | 国产熟女午夜一区二区三区| 激情在线观看视频在线高清| 亚洲精品粉嫩美女一区| 亚洲精品av麻豆狂野| 嫁个100分男人电影在线观看| 精品久久蜜臀av无| 黄色丝袜av网址大全| 99国产精品一区二区三区| 免费看a级黄色片| 女生性感内裤真人,穿戴方法视频| 国产真人三级小视频在线观看| 久久久久久久午夜电影| 18美女黄网站色大片免费观看| 国内精品久久久久久久电影| 中文字幕最新亚洲高清| 亚洲va日本ⅴa欧美va伊人久久| 亚洲精品中文字幕在线视频| 国产主播在线观看一区二区| 国产一区二区三区综合在线观看| 日本 欧美在线| 女人精品久久久久毛片| 啦啦啦观看免费观看视频高清 | av有码第一页| 一区二区三区精品91| 久久草成人影院| 国产成人免费无遮挡视频| 又黄又爽又免费观看的视频| 亚洲av成人不卡在线观看播放网| 1024香蕉在线观看| 亚洲精品中文字幕一二三四区| 精品欧美国产一区二区三| 欧美另类亚洲清纯唯美| 亚洲国产日韩欧美精品在线观看 | 丝袜美足系列| 亚洲中文字幕一区二区三区有码在线看 | 村上凉子中文字幕在线| 国产成年人精品一区二区| 免费搜索国产男女视频| 欧美丝袜亚洲另类 | 欧美日本视频| 国产成人欧美| 色综合亚洲欧美另类图片| 日本a在线网址| 日韩一卡2卡3卡4卡2021年| 久久人人爽av亚洲精品天堂| 97人妻天天添夜夜摸| 最好的美女福利视频网| 变态另类丝袜制服| 亚洲五月婷婷丁香| 亚洲avbb在线观看| 搡老熟女国产l中国老女人| 亚洲国产欧美日韩在线播放| 他把我摸到了高潮在线观看| 亚洲一码二码三码区别大吗| 国内精品久久久久久久电影| 国产在线精品亚洲第一网站| 黄色毛片三级朝国网站| 久久香蕉精品热| 久热这里只有精品99| 亚洲欧美一区二区三区黑人| 精品国产一区二区久久| 久久热在线av| 老司机在亚洲福利影院| 国产又爽黄色视频| 欧美黄色片欧美黄色片| cao死你这个sao货| 老司机午夜十八禁免费视频| 男男h啪啪无遮挡| 99久久久亚洲精品蜜臀av| 久久天堂一区二区三区四区| 欧美在线一区亚洲| 婷婷丁香在线五月| 国产亚洲精品一区二区www| 国产精品一区二区精品视频观看| 亚洲成人精品中文字幕电影| 90打野战视频偷拍视频| 欧美日韩一级在线毛片| 国产在线精品亚洲第一网站| 黑人巨大精品欧美一区二区mp4| 啦啦啦免费观看视频1| 欧美激情 高清一区二区三区| 亚洲精华国产精华精| 美女扒开内裤让男人捅视频| 91在线观看av| 女人被躁到高潮嗷嗷叫费观| 宅男免费午夜| 日韩高清综合在线| 伦理电影免费视频| 日日爽夜夜爽网站| 国产成人系列免费观看| 大陆偷拍与自拍| 好男人在线观看高清免费视频 | √禁漫天堂资源中文www| 天天一区二区日本电影三级 | 亚洲精品久久成人aⅴ小说| 亚洲七黄色美女视频| 日本vs欧美在线观看视频| 久久伊人香网站| 免费久久久久久久精品成人欧美视频| 我的亚洲天堂| 亚洲 欧美一区二区三区| 亚洲专区中文字幕在线| 色精品久久人妻99蜜桃| 色播在线永久视频| 中文字幕人妻丝袜一区二区| 中文字幕色久视频| 999久久久精品免费观看国产| 亚洲人成77777在线视频| 首页视频小说图片口味搜索| 纯流量卡能插随身wifi吗| 18禁美女被吸乳视频| 久久影院123| 女人高潮潮喷娇喘18禁视频| 久久久国产成人免费| 亚洲va日本ⅴa欧美va伊人久久| 精品乱码久久久久久99久播| 精品欧美一区二区三区在线| 波多野结衣高清无吗| 亚洲黑人精品在线| 伦理电影免费视频| 波多野结衣av一区二区av| 久久性视频一级片| 777久久人妻少妇嫩草av网站| 亚洲熟妇熟女久久| 亚洲精品国产色婷婷电影| 日本五十路高清| 久久天躁狠狠躁夜夜2o2o| 男男h啪啪无遮挡| 美女大奶头视频| 99riav亚洲国产免费| 村上凉子中文字幕在线| 少妇裸体淫交视频免费看高清 | 51午夜福利影视在线观看| 啦啦啦免费观看视频1| 青草久久国产| 亚洲自偷自拍图片 自拍| 亚洲成av片中文字幕在线观看| 十分钟在线观看高清视频www| 亚洲国产高清在线一区二区三 | 日本a在线网址| 高潮久久久久久久久久久不卡| 亚洲第一av免费看| 日本vs欧美在线观看视频| 天天一区二区日本电影三级 | 一级毛片女人18水好多| 国产av一区二区精品久久| 99久久国产精品久久久| 国产精品一区二区精品视频观看| 视频区欧美日本亚洲| 欧美在线一区亚洲| videosex国产| 欧美日韩中文字幕国产精品一区二区三区 | 热99re8久久精品国产| 精品久久久精品久久久| 波多野结衣高清无吗| 久久香蕉国产精品| 亚洲aⅴ乱码一区二区在线播放 | 伊人久久大香线蕉亚洲五| 亚洲人成77777在线视频| 国产麻豆69| 丁香六月欧美| 99re在线观看精品视频| 成人国语在线视频| 韩国精品一区二区三区| 久久久国产成人免费| 免费无遮挡裸体视频| 亚洲精品国产精品久久久不卡| 午夜成年电影在线免费观看| 精品人妻1区二区| 久久午夜亚洲精品久久| 在线观看免费视频日本深夜| 丝袜美腿诱惑在线| 黄色a级毛片大全视频| av欧美777| 99久久国产精品久久久| 成人特级黄色片久久久久久久| 亚洲欧美一区二区三区黑人| av电影中文网址| 国产黄a三级三级三级人| 十分钟在线观看高清视频www| 免费在线观看影片大全网站| 国产精品久久视频播放| 亚洲av片天天在线观看| 亚洲精品国产精品久久久不卡| 91老司机精品| 巨乳人妻的诱惑在线观看| 国产麻豆成人av免费视频| 欧美日韩瑟瑟在线播放| 91av网站免费观看| 91在线观看av| 国产成人精品在线电影| 一级毛片精品| www.999成人在线观看| 精品欧美一区二区三区在线| 久久国产乱子伦精品免费另类| 国产亚洲av嫩草精品影院| 亚洲国产欧美网| 天堂动漫精品| 精品欧美一区二区三区在线| 日韩成人在线观看一区二区三区| 两人在一起打扑克的视频| 国产精品一区二区精品视频观看| 久久久国产精品麻豆| 精品一区二区三区av网在线观看| 国产私拍福利视频在线观看| 久久草成人影院| 男人舔女人的私密视频| 中文字幕另类日韩欧美亚洲嫩草| 精品高清国产在线一区| 免费在线观看完整版高清| 性欧美人与动物交配| 嫩草影视91久久| 如日韩欧美国产精品一区二区三区| 99国产精品一区二区三区| 亚洲国产精品sss在线观看| 午夜福利在线观看吧| 久久 成人 亚洲| 国产精品,欧美在线| 精品日产1卡2卡| 日韩中文字幕欧美一区二区| 免费看十八禁软件| 亚洲精品一卡2卡三卡4卡5卡| 日本免费a在线| 一区二区三区国产精品乱码| 日韩三级视频一区二区三区| 免费在线观看日本一区| 99在线人妻在线中文字幕| 最新美女视频免费是黄的| 两个人免费观看高清视频| 欧美中文日本在线观看视频| 亚洲欧美日韩无卡精品| 久久精品国产99精品国产亚洲性色 | 99精品欧美一区二区三区四区| www.熟女人妻精品国产| 国产欧美日韩一区二区三| 熟女少妇亚洲综合色aaa.| 91成人精品电影| 国产精品秋霞免费鲁丝片| 精品不卡国产一区二区三区| 国产成人影院久久av| 9热在线视频观看99| 久久精品国产亚洲av高清一级| 久久精品国产综合久久久| 19禁男女啪啪无遮挡网站| 午夜免费鲁丝| 亚洲熟妇中文字幕五十中出| 中文字幕最新亚洲高清| 日韩欧美三级三区| 久久人妻av系列| 少妇被粗大的猛进出69影院| 亚洲男人的天堂狠狠| 美女午夜性视频免费| 精品久久蜜臀av无| 亚洲国产高清在线一区二区三 | 久久这里只有精品19| 亚洲 国产 在线| 中文字幕人妻熟女乱码| 伊人久久大香线蕉亚洲五| 欧美日韩福利视频一区二区| 大型黄色视频在线免费观看| 国内精品久久久久久久电影| 久久人人精品亚洲av| 狠狠狠狠99中文字幕| 不卡av一区二区三区| 亚洲av日韩精品久久久久久密| 中文字幕av电影在线播放| 一二三四社区在线视频社区8| 成人三级做爰电影| av中文乱码字幕在线| 亚洲欧美激情综合另类| 无遮挡黄片免费观看| 无人区码免费观看不卡| 午夜福利高清视频| 国内精品久久久久久久电影| 午夜福利18| aaaaa片日本免费| 国产男靠女视频免费网站| 精品国产一区二区久久| 午夜福利18| 国产单亲对白刺激| 国产一区在线观看成人免费| 欧美国产日韩亚洲一区| 日韩欧美三级三区| 免费在线观看日本一区| 亚洲av日韩精品久久久久久密| 波多野结衣巨乳人妻| 成人免费观看视频高清| 国产亚洲精品一区二区www| 免费看美女性在线毛片视频| 日韩精品中文字幕看吧| 中国美女看黄片| 欧美成人午夜精品| 国产色视频综合| 欧美亚洲日本最大视频资源| 国产成人av教育| 婷婷精品国产亚洲av在线| 日本vs欧美在线观看视频| 国产三级在线视频| 中出人妻视频一区二区| 日韩精品免费视频一区二区三区| 国产精品 欧美亚洲| 在线永久观看黄色视频| 50天的宝宝边吃奶边哭怎么回事| 美女高潮到喷水免费观看| 看黄色毛片网站| 91成年电影在线观看| 精品卡一卡二卡四卡免费| 极品教师在线免费播放| 亚洲最大成人中文| 18美女黄网站色大片免费观看| 久久香蕉精品热| 香蕉国产在线看| 不卡一级毛片| 一进一出抽搐动态| 国产三级在线视频| 校园春色视频在线观看| 一进一出好大好爽视频| 国内精品久久久久精免费| 亚洲精品国产精品久久久不卡| 久久久久久久久中文| 国产精品av久久久久免费| 日日夜夜操网爽| 亚洲激情在线av| 亚洲欧美精品综合久久99| 欧美亚洲日本最大视频资源| 日日干狠狠操夜夜爽| 看免费av毛片| 国产高清激情床上av| 桃红色精品国产亚洲av| 久久久久国产精品人妻aⅴ院| 黄色视频不卡| 亚洲欧洲精品一区二区精品久久久| 亚洲精品一区av在线观看| 两性夫妻黄色片| 一级a爱视频在线免费观看| 国产高清有码在线观看视频 | 长腿黑丝高跟| 不卡av一区二区三区| 国产成年人精品一区二区| 亚洲国产精品久久男人天堂| 色在线成人网| 18禁黄网站禁片午夜丰满| 久热爱精品视频在线9| 欧美黑人欧美精品刺激| 怎么达到女性高潮| 国产午夜精品久久久久久| 亚洲av片天天在线观看| 国产av精品麻豆| 欧美日韩瑟瑟在线播放| 久久久久九九精品影院| 国产精品综合久久久久久久免费 | 久久国产亚洲av麻豆专区| 俄罗斯特黄特色一大片| 国产精品99久久99久久久不卡| 一边摸一边抽搐一进一小说| 欧美一区二区精品小视频在线| a在线观看视频网站| 999精品在线视频| 99riav亚洲国产免费| 国产免费男女视频| 99国产综合亚洲精品| 国产精品自产拍在线观看55亚洲| 免费在线观看亚洲国产| 在线观看66精品国产| 俄罗斯特黄特色一大片| 午夜成年电影在线免费观看| 午夜福利欧美成人| 欧美成人免费av一区二区三区| 在线观看66精品国产| 色综合站精品国产| 免费在线观看日本一区| 午夜福利,免费看| 国产av一区在线观看免费| 在线观看一区二区三区| 婷婷丁香在线五月| 亚洲国产毛片av蜜桃av| x7x7x7水蜜桃| 18禁观看日本| 欧美日韩福利视频一区二区| 身体一侧抽搐| 久久午夜亚洲精品久久| 精品国产超薄肉色丝袜足j| 这个男人来自地球电影免费观看| 亚洲午夜精品一区,二区,三区| 亚洲精品中文字幕一二三四区| 久久精品亚洲精品国产色婷小说| 国产精品精品国产色婷婷| 亚洲av片天天在线观看| 久久久国产精品麻豆| 看片在线看免费视频| 午夜福利欧美成人| 亚洲欧美精品综合久久99| 动漫黄色视频在线观看| 一本久久中文字幕| 欧美精品啪啪一区二区三区| 一夜夜www| 亚洲中文日韩欧美视频| 久久精品人人爽人人爽视色| 久久国产亚洲av麻豆专区| 亚洲熟妇熟女久久| 精品久久久久久久久久免费视频| 国产成年人精品一区二区| 91老司机精品| 啦啦啦 在线观看视频| 亚洲精品av麻豆狂野| 1024香蕉在线观看| 制服人妻中文乱码| 亚洲成av片中文字幕在线观看| 免费观看精品视频网站| 国产精品一区二区三区四区久久 | 黄色视频不卡| 最近最新中文字幕大全免费视频| 欧美乱色亚洲激情| 搡老妇女老女人老熟妇| 精品久久久久久久久久免费视频| 91成人精品电影| 色综合欧美亚洲国产小说| 成人三级黄色视频| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲 国产 在线| 在线观看日韩欧美| 国产欧美日韩一区二区三区在线| 精品熟女少妇八av免费久了| 91字幕亚洲| e午夜精品久久久久久久| 美女免费视频网站| 色av中文字幕| av中文乱码字幕在线| 母亲3免费完整高清在线观看| 不卡av一区二区三区| 久久久久久久午夜电影| 久久国产亚洲av麻豆专区| 亚洲第一青青草原| 午夜免费鲁丝| 国产黄a三级三级三级人| 国产精品野战在线观看| 一个人免费在线观看的高清视频| 亚洲国产欧美网| 91av网站免费观看| 色婷婷久久久亚洲欧美| 夜夜爽天天搞| 亚洲欧美精品综合一区二区三区| 在线观看午夜福利视频| 亚洲熟女毛片儿| 成年人黄色毛片网站| 国产高清视频在线播放一区| 99久久国产精品久久久| 亚洲少妇的诱惑av| 欧美丝袜亚洲另类 | 国产99白浆流出| av福利片在线| 乱人伦中国视频| 欧美黄色淫秽网站| 亚洲国产精品999在线| 欧美久久黑人一区二区| 中文字幕另类日韩欧美亚洲嫩草| 亚洲精品国产区一区二| av片东京热男人的天堂| 99精品欧美一区二区三区四区| 不卡av一区二区三区| 国产熟女午夜一区二区三区| 亚洲片人在线观看| 久久人妻av系列| 国产一区二区三区综合在线观看| 成人欧美大片| 免费高清在线观看日韩| 看黄色毛片网站| 黑丝袜美女国产一区| 亚洲精品av麻豆狂野| 久久久精品欧美日韩精品| 国产熟女xx| 制服丝袜大香蕉在线| 一边摸一边抽搐一进一出视频| 一级,二级,三级黄色视频| 精品国产超薄肉色丝袜足j| 日本一区二区免费在线视频| 神马国产精品三级电影在线观看 | 亚洲成av片中文字幕在线观看| 成人精品一区二区免费| 欧美激情高清一区二区三区| 欧美日韩精品网址| 国产色视频综合| 韩国精品一区二区三区| 亚洲成国产人片在线观看| 国产主播在线观看一区二区| 国产日韩一区二区三区精品不卡| 在线天堂中文资源库| 亚洲av成人一区二区三| 亚洲欧美一区二区三区黑人| 精品少妇一区二区三区视频日本电影| 男人操女人黄网站| 日本五十路高清| 亚洲男人的天堂狠狠| 人人妻人人爽人人添夜夜欢视频| 一级毛片精品| 国产伦人伦偷精品视频| 亚洲专区国产一区二区| 午夜精品久久久久久毛片777| 男女午夜视频在线观看| 亚洲男人的天堂狠狠| 男女床上黄色一级片免费看| 91九色精品人成在线观看| 国产精品 国内视频| 18禁观看日本| 久久草成人影院| 丰满的人妻完整版| 成人欧美大片| 18禁美女被吸乳视频| 欧美成人午夜精品| 精品无人区乱码1区二区| 亚洲国产欧美日韩在线播放| 丝袜美腿诱惑在线| 黑人巨大精品欧美一区二区mp4| 久久久精品国产亚洲av高清涩受| 欧美黑人精品巨大| 91麻豆av在线| 欧美黑人欧美精品刺激| 搞女人的毛片| 欧美成人一区二区免费高清观看 |