• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Detecting IoT Botnet in 5G Core Network Using Machine Learning

    2022-11-11 10:44:46YeEunKimMinGyuKimandHwankukKim
    Computers Materials&Continua 2022年9期

    Ye-Eun Kim,Min-Gyu Kim and Hwankuk Kim,*

    1Department of Electronics Information and System Engineering,Sangmyung University,Cheonan-si,Korea

    2Department of Information Security Engineering,Sangmyung University,Cheonan-si,Korea

    Abstract: As Internet of Things (IoT)devices with security issues are connected to 5G mobile networks, the importance of IoT Botnet detection research in mobile network environments is increasing.However,the existing research focused on AI-based IoT Botnet detection research in wired network environments.In addition,the existing research related to IoT Botnet detection in ML-based mobile network environments have been conducted up to 4G.Therefore, this paper conducts a study on ML-based IoT Botnet traffic detection in the 5G core network.The binary and multiclass classification was performed to compare simple normal/malicious detection and normal/threetype IoT Botnet malware detection.In both classification methods, the IoT Botnet detection performance using only 5GC’s GTP-U packets decreased by at least 22.99% of accuracy compared to detection in wired network environment.In addition, by conducting a feature importance experiment,the importance of feature study for IoT Botnet detection considering 5GC network characteristics was confirmed.Since this paper analyzed IoT botnet traffic passing through the 5GC network using ML and presented detection results,think it will be meaningful as a reference for research to link AI-based security to the 5GC network.

    Keywords:IoT botnet;5G;B5G;malware;machine learning

    1 Introduction

    With the rapidly evolving network environment,the connection of IoT devices is rapidly changing from the individual wired internet(wi-fi)and 4G network connections to 5G networks.As the number of IoT devices connected to 5G mobile networks is increased, the importance of the security of IoT devices is also increasing.However, due to various security issues in IoT devices, IoT devices are exposed to security threats such as falsification, improper access, and information leakage [1,2].Attackers exploit these IoT security vulnerabilities to create “IoT Botnet”of various malware types[3].IoT Botnet infected with malware causes massive distributed denial-of-service(DDoS)attacks on networks connected to IoT[4,5].Therefore,when the IoT device with weak security is connected to the 5G network,new security problem may occur in the 5G core network devices[6].This leads to major security concerns due to infringement of corporate or individual availability[7-9].Therefore,studies on the IoT Botnet traffic analysis and detection in the field of mobile network are required[10,11].

    5G has a service-based architecture(SBA)structure that segmented and virtualized into network function(NF)units.5G end-to-end security framework of ITU-T SG17 includes SBA security in 5G core network security [12], and 3GPP is conducting research for the security of 5G SBA NFs [13].With the development of AI technology,various studies are being conducted to native-AI in NFs.In particular,5G has started to provide network designs suitable for AI services by introducing Network Data Analytics Function(NWDAF)to 5GC network to implement AI-based network automation and optimize related network functions[14,15].Therefore, prior research that can be used to implement security functions using AI in core architecture of 5G and 6G networks is required.

    Existing studies on the IoT Botnet detection have primarily focused on detecting IP packets of wired network occurred by IoT devices using machine learning(ML).However,the research on MLbased IoT Botnet detection methods and features in the 5G mobile network environment according to the evolution of the hyperconnected network environment is insufficient.Herein,a method to detect the IoT Botnet traffic based on ML in a 5G mobile network environment is studied, experimented results are explained,and future research is presented.

    In this paper,the IoT Botnet detection was performed using packets collected from IoT devices and UPF in the 5G mobile network environment.The MedBIoT dataset [16] was used for the IP packet collected from the IoT devices.After replayed MedBIoT packets in the 5G mobile network simulated environment, the GTP-U packets collected by dumping directly from the UPF were used as the 5G mobile network packet.After this, the binary (benign/malicious)and multiclass(benign/bashlite/mirai/torii)were classified using the following ML algorithms: k-nearest neighbor(KNN),Support Vector Machine(SVM),Random Forest(RF)and Stacking ensemble and the results were compared.The purpose of this study was as follows:

    ○Comparison of the detection performance in wired and 5G mobile network environments

    ○Realization of a model with the highest detection performance

    ○Establishing the necessity of study on the features of the IoT Botnet detection in 5GC

    ○Comparison of binary and multiclass classification results

    The main contribution of this study can be summarized as follows: First, we conducted MLbased IoT botnet traffic detection study in the 5G core network paths.Second,binary and multiclass classification was performed to compare simple normal/malicious detection and normal/three type IoT Botnet malware detection.Previous studies focused on AI-based IoT botnet detection research in wired network environments, but this paper is meaningful as a reference for 5G security research by analyzing IoT Botnet traffic passing through the 5G core network and presenting detection results.Third, by comparing detection performance and feature importance in wired and 5G core network environments,the importance of feature research for IoT Botnet detection considering 5GC network characteristics was presented.

    The subsequent sections of this paper are arranged as follows.Section 2 describes the 5G Network,GTP-U protocol, and previous works on IoT Botnet detection.Section 3 describes the Botnet detection methodology.Section 4 describes and compares the experimental results of the binary and multiclass classification for three experimental methods.Section 5 summarizes the study and presents future research directions.

    2 Related Work

    2.1 Overview of 5G Core Network and GTP Protocol

    The structure of the 5G network consists of the 5G Radio Access Network(5G RAN)and 5GC,as shown in Fig.1.The 5G RAN is composed of User Equipment(UE)and gNodeB(gNB)and provides a radio interface to the UE.The gNB provides the UE with the protocols for the Control and User Planes,General Packet Radio Service Tunneling Protocol(GTP).GTP is a tunneling protocol defined to deliver General Packet Radio Service (GPRS)within a mobile network.Mobile subscribers can access the Internet using UE while on the go by maintaining a connection to a Packet Data Network(PDN).GTP comprises consists of control plane(GTP-C),user plane(GTP-U),and charging(GTP’derived from GTP-C)traffic[17].

    Figure 1:5G network

    5GC is composed of the Control and User Planes in charge of the control and data packet transmission, respectively.In the control plane, most mobility management is performed through Access and Mobility Management(AMF)and Session Management Function(SMF)in 5GC.AMF manages access and mobility in units of terminals through location service messages, and SMF allocates IP addresses to UEs and manages user plane services[18].AMF and SMF provide services through SBA’s single Service Based Interface(SBI).Each NF constituting SBA,network virtualization and software based network architecture,plays a role in controlling data transmission[19].NWDAF,one of the 5G SBA configuration NFs, plays a key role as a functional entity that collects and analyzes various information on various network domains and uses them to provide analysis-based statistics and predictive insights to 5GC network functions such as Policy Control Function (PCF).ML algorithms linked NWDAF can utilize multiple network information collected through NWDAF to perform tasks such as mobility prediction and optimization, anomaly detection, prediction QoS,and data correlation[20].The UPF of 5GC user plane is connected to the Data Network(DN)and handles the routing and forwarding of packets.

    The uplink flow through user plane of the 5G network traffic is shown in Fig.2.The IP packet generated by the UE is forwarded to the gNB and transmitted to the DN.When gNB receives an IP packet,it encapsulates the packet in the GTP-U header and is further encapsulated inside the IP and UDP headers before being sent to the UPF.The encapsulated IP packet and GTP-U header are GPDU(Protocol Data Unit).GTP-U header is composed of Message type,Tunnel Endpoint Identifier(TEID),Next Extension Header type,and QoS Flow Identifier(QFI).The Message type is fixed to decimal 255(0xff),indicating that G-PDU,and the Next Extension Header type are fixed to a binary number“1000 0101”(0x85)that was the PDU session container.The QFI identifies the QoS flow that the transmitted packet belongs.The TEID is a unique identifier assigned to each GTP user connection on each node.

    Figure 2:5G network flow-Uplink[21]

    2.2 Previous Work

    Recently, the increased use of IoT devices in various fields has been accompanied by increased IoT device attacks.Accordingly,research on detecting abnormal behavior generated by IoT Botnets using machine learning is being actively conducted-Tab.1.

    Table 1: Summary of previous studies related to IoT Botnet detection with ML

    Table 1:Continued

    Reference [22,23] proposed a model capable of improving IoT traffic detection performance in wired network environments using ML algorithms.[24,25] studied and proposed an ML-based IoT network anomaly detection model that can be applied to IoT gateways or IoT devices in wired networks.[26]performed a feature study to show good performance in detecting IoT traffic in wired networks regardless of the training dataset.As shown in [22-26], current studies related to IoT malicious traffic detection using ML are focused on detecting anomaly behavior in wired networks.In addition,since GTP data is not analyzed,there is a limit to applying it to the 5G core network.

    As IoT devices connected to mobile networks increase,research to detect IoT abnormal behaviors occurring in mobile networks is also being gradually progressed[27,28].[27]performed AI-based IoT traffic detection using GTP packets collected from Serving Gateway(SGW)of 4G mobile networks.Therefore, functions of 5GC were not considered in this study.[28] analyzed IoT anomaly traffic in the 5G mobile network environment and proposes a filtering-based IoT traffic security framework.As such,research on IoT malicious traffic in the 5G mobile network environment analyzes IoT traffic and even encapsulation-aware traffic filtering detection using it.Therefore,in this study,we determine the difference in anomaly packet detection in wired networks and 5G mobile network environment using various machine learning algorithms.

    3 Experimental Methods

    This study consists largely of the Basic IoT Botnet Dataset and ML based IoT Botnet Detection steps.Basic IoT Botnet Dataset is associated with selecting and collecting the datasets used in the experiment.ML based IoT Botnet Detection is concerned with detecting IoT malicious packets using Machine Learning (ML)and performs Pre-Processing, Training, Binary Classification, and Model Evaluation.Each stage proceeds,as shown in Fig.3,and is described in detail below.

    Figure 3:Methodology for IoT Botnet attacks detection

    3.1 Basic IoT Botnet Dataset

    3.1.1 Dataset Selection

    This study was conducted using MedBIoT [16] created by the Center for Digital Forensics and Cyber Security at Tallinn University of Technology in 2020.[16] was performed to solve the lack of datasets for IoT Botnet detection.The MedBIoT dataset was collected by deploying real malware(bashlite,mirai,torii)to real and emulated IoT devices(ex.83 devices)in a medium-sized network.[16]provides the dataset CSV containing the written extracted features and raw PCAP files.The MedBIoT dataset consists of about 4.3 and 12.54 million malicious and benign packets,respectively,as shown in Tab.2.

    Table 2: The number of packets in MedBIoT

    Therefore, packets are captured using various IoT devices, and MedBIoT, containing twice as much normal to malicious packets,is used as the dataset for this study.MedBIoT’s raw PCAP files are used as IoT device IP packets,and GTP-U tunneled packets are collected by replaying the raw PCAP file packets in the 5G simulation environment.Then,using ML,each classification of IoT device IP and GTP-U tunneling packets is performed and then compared.

    3.1.2 Dataset Collection GTP-U Tunneling Packets

    The Dataset Collection stage takes the GTP-U tunneled packets from the UPF in a 5G mobile network environment.This process was performed in the Open5GCore Rel.6 environment-Fig.4.This experiment performed GTP tunneling using only UE and gNB simulations, and UPF among the components of Open5GCore.

    Figure 4:Open5GCore Rel.6-5G testbed[29]

    First,the UE replayed the IP packets of the raw PCAP files of MedBIoT.The replayed packets pass the gNB into the GTP-U tunnel and delivered to the UPF.Then,GTP-U packets were collected by dumping packets using Wireshark in UPF.Only one fixed TEID appears because the packets are replayed at a specific UE and are captured at a specific UPF.Therefore,we changed TEID values to random TEID values according to the source and destination IPs/Ports of the IP packet of uplink or downlink.

    3.2 ML Based IoT Botnet Detection Methodology

    3.2.1 Pre-Processing

    The pre-Processing of selected and collected datasets is performed using Feature Extraction and Selection, Feature Encoding, and Random Sampling.The data input for Pre-Processing are IP and GTP-U tunneling packets from MedBIoT and UPF, respectively.The features that have undergone Pre-Processing are converted into to CSV format and inputted into the ML algorithms.

    Feature Extraction and Selection.MedBIoT dataset consist of original network packet as packet capture files(PCAPs).Therefore,we extracted header information from the IP and GTP-U tunneling packets of IoT devices and UPF using Tshark.Among them,the features per packet selected for input to the ML algorithm are shown in Tab.3.And features per packet and“l(fā)abel features”for binary and multiclass classification are stored in CSV format.

    Table 3: Feature selected per packet

    Feature Encoding.Encoding was performed on object-type features among 29 features(excluding the label feature)selected in Feature Selection.The IP address is converted to a decimal integer after removing“.”.All object-type features(MAC address,GTP TEID,GTP extension next header)except for IP addresses were converted from hexadecimal strings to decimal integers.And the missing values were replaced with 0.

    Random Sampling.We randomly sampled normal and malicious packets for experiments that change the normal/malicious packets count ratio.To save the state of each stage according to the count ratio, the state of the randomly sampled packets was stored, and the sampled packets were continuously added.

    3.2.2 Training and Classification

    Malicious packet detection was performed using four ML classification algorithms(KNN,SVM,RF,and Stacking Ensemble).The Regression Model of the Stacking Ensemble algorithm used KNN,SVM,and RF,and the Meta-Regressor used Logistic Regression.Each ML classification algorithm was implemented using python’s Scikit-learn library.

    The classification was performed in two ways: binary and multiclass.The binary classification classified packets into benign(0)and malicious(1).The multiclass classification classifies packets into benign(0)or three malicious packets:bashlite(1),mirai(2),and torii(3).

    4 Experimental Results

    This study performed the binary and multiclass classification using the IP packets of MedBIoT and GTP-U packets collected via the GTP-U tunneling of MedBIoT’s IP packets.Then,the detection rates of both classification methods were compared.Each classification performed experiments and provided results under three experimental conditions in the following steps:

    (1)Derived the optimal ratio of the number of benign packets to malicious packets for the experiment after comparing the difference in the detection performance with respect to the change in the ratio of the number of benign packets to malicious packets.

    (2)Derived the optimal model and comparison of detection rates by each experimental method after performed the cross-validation using the optimal ratio of malicious to benign packets that derived in.

    (3)Calculated the feature importance and confirmation of influence for each of three experimental methods(Fig.5)in the experiment of.

    a)Performed the classification using the IP packet of IoT device

    b)Performed the classification using GTP-U packets collected from the UPF by replaying the IP packets of IoT device in 5G mobile network environment

    c)Performed the classification using the IP packet of IoT device and the GTP-U packet of UPF together

    Figure 5:Packet structure in 5GC network experimental environment

    4.1 Performance Evaluation Setup

    This study was conducted in the following experimental environment:Windows 10 Platform.Intel Core i9-10980XE(3.0 GHz/24.75MB),DDR4 32GB PC4-25600*4(128GB),NVIDIA GeForce RTX 3090 24GB.

    The IoT Botnet detection experiments proceeded with two classification methods (binary and multiclass classifications).Binary classification classified IoT Botnets into benign and malicious.Multiclass classification classified IoT Botnets into benign and three types of malware(bashlite,mirai,torii).Tab.4 shows the detailed settings for each classification method.The total number of packets used in both classification methods is 40,000.In the experiments performed in Sections 4.2 and 4.3,a certain packet is selected and used among 40,000 packets.In each experiment,detection performance was evaluated using k-fold cross validation to prevent overfitting.

    Table 4: Experiment setup by two classification methods

    The model evaluation for each experiment is evaluated by the ability to properly classify packets The possible results can be understood using the confusion matrix.In this study,accuracy,precision,recall, F1-score, receiver operating characteristic-area under the curve (ROC-AUC), and ROCCurve were used for evaluation.The confusion matrix of multiclass classification was calculated by transforming the multiclass classification into the binary classification.Moreover, the ROC-AUC and ROC-Curve were obtained by macro-averaging after One-hot encoding of predictive values for each class in a One-vs.-One method.The detailed description of the evaluation index used for the experimental evaluation is shown in Tab.5.

    Table 5: Evaluation metrics description and calculation

    4.2 Binary Classification

    Here we classify the IP packet of IoT device and GTP-U packet of UPF into benign (0)and malicious (1)and compare the difference in detection performance by each experimental method in Fig.5.First, the optimal ratio for the experiment was obtained by changing the ratio of the number of benign packets to malicious packets.Then, the performance detection rates for three experimental methods were compared using the optimal classification model score under the optimal ratio environment.Finally,confirmed the features having the high influence through a comparison of the feature importance in three experimental methods.

    4.2.1 Experiments Related to Balanced Datasets(Benign vs.Malicious)

    Experiment 4.2.1 was an experiment to find the optimal ratio of the number of benign to malicious packets that could compare the difference in detection performance through the binary classification of IP packets of IoT devices and GTP-U packets of the UPF.Thus,this experiment was performed by changing the ratio of the number of benign packets to malicious in a total of 40,000 randomly selected packets from 10%to 90%.The 3-malware benign and malicious packets provided by the experimented dataset MedBIoT were used at the same rate,and the binary classification was performed using the k-fold cross validation(cv=7).The experimented results of the classification used the IP packet and GTP-U packet were shown in Fig.6 and Tab.6.As experimented result,when the ratio of the number of benign and malicious packets was 50%,it was confirmed that the score(ACC,F1 and AUC)had a median value not biased toward one side compared to when the ratio of the number of packets was 10%or 90%.Thus,we considered it as the optimal environment to compare the detection performance difference of binary classification less biasedly when the ratio of benign:malicious packets was 50%.The experimented result in 4.2.1 was used as the ratio of the number of benign packets to malicious in the subsequent 4.2.2 and 4.2.3 experiments.

    Figure 6: (Continued)

    Figure 6:Benign classification experiment results changing benign packets count ratio-(a)Accuracy.(b)F1-score.(c)ROC-Curve that benign ratio 10%.(d)ROC-Curve that benign ratio 50%.(e)ROCCurve that benign ratio 90%

    Table 6: Binary classification score by benign packet count ratio-using IP and GTP-U packets

    4.2.2 Experiments Related to Optional ML Algorithm

    Experiment 4.2.2, confirmed the difference in detection performance for each algorithm in a low bias environment that the benign to malicious packets ratio was set as 50% derived experiment 4.2.1.Then, confirmed the optimal model for the binary classification, and compared the detection rates for each of the three experimental methods.These experiments were collected the benign and malware packets of three types of malware (bashlite, mirai, torii)at the same rate and performed by the k-fold cross-validation(cv=7).The experimented results in 4.2.2 used the three experimental methods in Fig.5 were shown in Fig.7 and Tab.7.In the experimental methods (a)and (b), the Stacking algorithm showed the highest accuracy(approximately 99.958%and 99.924%respectively),the F1-score(approximately 99.958%and 99.925%respectively),and the ROC-AUC(approximately 99.958% and 99.925% respectively).In the experimental method (c), Stacking showed the highest accuracy(approximately 76.967%)and the F1-score(approximately 76.761%),and showed the second highest ROC-AUC(approximately 76.967%).In the detection case used only GTP-U packets collected from the UPF of 5GC, it was reduced by approximately 22.99% compared to the detection used IP packets of the wired network.However,the IoT Botnet detection using both GTP-U packet and IP packet features showed similar performance with a difference of approximately 0.03% compared to the detection using IP packets.Through this,when performed the IoT Botnet detection by the binary classification in 5GC environment, it was confirmed that the same performance as that in a wired network can be obtained when the GTP-U packet feature and IP packet feature are used together.

    Figure 7: IoT botnet detection algorithm performance comparison by 3 experimental methods for binary classification-(a)Accurac.(b)F1-score.(c)ROC-Curve that using IP packets.(d)ROC-Curve that using GTP-U packets.(e)ROC-Curve of IP and GTP-U packets

    Table 7: Binary classification Score by algorithm-benign to malicious packets count ratio is 50%

    4.2.3 Experiments Related to Feature Importance in 5GC

    In this section, the feature importance was calculated for the binary classification for the three experimental methods in Fig.5 used the Stacking Ensemble and the optimal algorithm derived in 4.2.2, and the impact of IP packet features was confirmed-Tab.8.Results showed that 3 of the 10 features used in experimental method(b)used only GTP-U packets had importance values.Among them,the TEID feature showed the highest importance at approximately 0.590397,it was related to the IPs and ports of the source and destination of the IP packet.Experimental methods (a)and (c)using IP packets of a wired network were used 18 and 28 features,respectively,and the features related to the source and destination addresses showed the high importance.This showed that the IP packet features had a large influence in the IoT Botnet detection through binary classification.

    Table 8: Top 10 feature importance by 3 experimental methods for binary classification

    Table 8:Continued

    4.3 Multiclass Classification

    Section 4.3 is an experiment to multi-classify benign(0)and three types of malicious into bashlite(1),mirai(2)and torii(3)by using the IP packet of IoT device and the GTP-U packet of UPF,and to compare the difference in detection performance by each experimental method mentioned in Fig.5.The same as experiment process with Section 4.2,the optimal ratio of the number of packets for the experiment was found, the detection rates for each of the three experimental methods through the optimal model were compared,and then the features with high influence were confirmed through the feature importance comparison.

    4.3.1 Experiments Related to Balanced Datasets(Benign vs.Malicious)

    Experiment 4.3.1 is an experiment to find the optimal ratio of the number of benign to malicious packets which could compare the difference in detection performance through the multiclass classification of the IP packet of IoT device and the GTP-U packet of UPF.As same with experiment 4.2.1,this experiment was performed by changing the ratio of the number of benign packets to malicious for a total of 40,000 randomly selected packets from 10%to 90%.The benign and malicious packets of the 3-malware provided by the experimental dataset MedBIoT were used at the same rate,and the multiclass classification was performed using the k-fold cross validation (cv=7).The experimented results of the classification used the IP packet and GTP-U packet were as shown in Fig.8 and Tab.9.As experimented results,it was confirmed that,as same in the binary classification,the score(ACC,F1,AUC)had an unbiased intermediate value when the ratio of the number of benign and malicious packets was 50%.Thus, we considered the ratio of benign: malicious packets as 50% as the optimal environment for less biased comparison of the detection performance difference of the multiclass classification.The experimented result in 4.3.1 was used as the ratio of the number of benign packets to malicious in the followed experiments in 4.3.2 and 4.3.3

    Figure 8: (Continued)

    Figure 8:Multiclass classification experiment results changing benign packets count ratio-(a)Accuracy.(b)F1-score.(c)ROC-Curve that benign ratio 10%.(d)ROC-Curve that benign ratio 50%.(e)ROC-Curve that benign ratio 90%

    Table 9: Multiclass classification score by benign packet count ratio-using IP and GTP-U packets

    4.3.2 Experiments Related to Optimal ML Algorithm

    In experiment 4.3.2,the benign:malicious packets count ratio was set as 50%and confirmed the difference in detection performance for each algorithm in an environment with less bias.Through this,the optimal model for multiclass classification was confirmed,and the detection rates were compared for each of the three experimental methods mentioned in Fig.5.As same in 4.2.2 experiments,these experiments were collected the benign and malware packets of three malware(bashlite,mirai,and torii)at the same rate and performed by the k-fold cross validation (cv=7).The experimented results of 4.3.2 used the three experimental methods mentioned in Fig.5 were as shown in Fig.9 and Tab.10.In the experimental method(a),the Stacking showed the highest accuracy(approximately 98.716%),F1-score(approximately 98.231%),and ROC-AUC(approximately 98.904%).In the experimental method(b),the RF showed the highest accuracy(approximately 62.477%),F1-score(approximately 58.864%),and ROC-AUC(approximately 72.265%).In the experimental method(c),Stacking showed the highest accuracy(approximately 97.5%)and the ROC-AUC(approximately 97.785%),and showed the second highest F1-score (approximately 96.396%).This shows that the multiclass classification using IP packets has great performance when using the Stacking algorithm, and the multiclass classification using only GTP packets has great performance when using the RF algorithm.When compared the accuracy of the best algorithm for each experimental method,in the detection case used only GTPU packets collected from the UPF of 5GC, the accuracy was decreased by approximately 36.71%compared to the detection used the IP packets of wired network.However,the IoT Botnet detection used both GTP-U packet and IP packet features showed similar performance to the multiclass classification used the IP packet with an accuracy reduction of approximately 1.231%.Through this,when performed the multiclass classification on the benign and individual IoT Botnet malware in 5GC environment, it was confirmed that the performance similar to that in a wired network could be obtained when the GTP-U packet and IP packet features were used together as in the binary classification.

    Figure 9: (Continued)

    Figure 9: IoT Botnet detection algorithm performance comparison by 3 experimental methods for multiclass classification-(a)Accuracy.(b)F1-score.(c)ROC-Curve that using IP packets.(d)ROC-Curve that using GTP-U Packets.(e)ROC-Curve that using IP and GTP-U packets

    Table 10:Multiclass classification score by algorithm-benign to malicious packets count ratio is 50%

    4.3.3 Experiments Related to Feature Importance in 5GC

    In Experiment 4.3.3, the feature importance was calculated for the multiclass classification by using the optimal algorithm for each of the three experimental methods derived from 4.3.2 and confirmed the influence of IP packet features-Tab.11.As experimented results, in the experimental method(b)of multiclass classification used only GTP-U packets,three features had importance values.Among them,the TEID feature related to the IPs and ports of the source and destination of IP packet showed the highest importance by 0.570975.Experimental methods(a)and(c)used the IP packets of wired networks showed the high importance for features related to IP and port addresses.This shows that IP packet features have a large influence on IoT Botnet detection of multiclass classification in 5GC as in binary classification.

    Table 11: Top 10 feature importance by 3 experimental methods for multiclass classification

    4.4 Comparison of Binary and Multiclass Classification Results

    In this section,the results of the binary classification and multiclass classification performed under the same conditions are compared.Both classification experiments were performed in an environment where the ratio of benign and malicious packets was 50% by using approximately 40,000 packets.Tab.12 shows the scores and feature importance top five for the algorithms that showed the best performance for each experimental method of each classification.

    Table 12: Comparison of the best algorithm,score,and feature importance of classification

    In binary classification, the Stacking ensemble algorithm showed the best performance.In multiclass classification, in the experimental methods (a)and (c)using IP packets showed the best performance in Stacking,and in the experimental methods(b)using GTP-U packets,RF showed the best performance.And,in the multiclass classification that required more sophisticated classification(normal/bashlite/mirai/torii), it could be confirmed that all scores were slightly reduced (maximum approximately 23.315%,minimum approximately 0.054%)than the binary classification.In particular,detection of IoT Botnet using only GTP-U packets decreased by up to 22.99%(binary classification)and 36.71% (multiclass classification)compared to detection using IP packets together.Also, the experimental method (b)used the GTP-U packet in both classifications (binary/multiclass)had the feature importance value of high TEID,and the next,features related to the packet length had high feature importance.Experimental methods(a)and(c)showed the high importance for features related to the source and destination addresses in both classifications(binary/multiclass).As a result of the experiment,it was confirmed that the GTP-U packet could not fully reflect the characteristics of the IP packet in both binary and multiclass classification.Therefore,in order to perform IoT Botnet detection in 5GC,feature research that can reflect the characteristics of both IP packet and GTP-U packet is required.

    5 Conclusion

    In this study, the IoT Botnet packets were detected, results were compared and studied for their detection efficiency through the ML-based binary and multiclass classification in the mobile network environment.In order to build the dataset, after collecting the IP packets of IoT devices,GTP-U Tunneling packets were collected by replaying them in the 5G simulation environment.Experiments for both classification methods (binary/multiclass)were proceeded in three stages for the three experimental methods(IoT device IP packet,UPF GTP-U packet,and IP packet+GTPU packet).In the first experiment, it was confirmed that the environment with the least bias was when the ratio of the number of benign to malicious packets was 50%.In the second experiment,IoT Botnet detection was performed using binary and multiclass classification.In the binary classification,the stacking ensemble algorithm showed the best detection rates with accuracies of approximately 99.958%, approximately 76.967%, and approximately 99.924% for each experimental method.Further, in the multiclass classification, when the experimental methods (a)and (c)were the Stacking algorithm, showed the highest accuracy (approximately 98.716%, approximately 97.5%), and when the experimental methods(b)was the RF,showed the highest accuracy(approximately 62.477%).In both classification methods,when IoT Botnet detection is performed using only GTP-U packets in the 5GC environment, the accuracy decreased by about 22.99% (binary)and about 36.71% (multiclass)compared to detection using IP packets.It showed that it was difficult to detect IoT Botnets in the 5GC environment using only the GTP-U packets for both binary and multiclass classification.Then,it was confirmed that the GTP-U packet and IP packet should be used together for the IoT Botnet detection in 5GC environment to obtain performance detection similar to that in wired network environment.In the third experiment,we confirmed that features related to IP packets show high importance for both binary and multiclass classification through feature importance comparison.Through this experiment,the importance of feature research for IoT Botnet detection considering 5GC network characteristics was confirmed for IoT Botnet detection in 5GC network path.

    There are various ways to utilize the ML-based security function experimented in this paper.In fact,6G has an AI-enabled architecture structure,and NWDAF is being discussed as a method.Before linking the ML-based security function with NWDAF,this paper conducted ML-based experiments using data collected from UPF and confirmed the possibility of NWDAF security function through AI-native.Therefore,we plan to study how to link ML-based security functions to NWDAF through NWDAF structure and procedure analysis in the future.In addition,the experiment proposed in the paper performed IoT Botnet detection using features extracted from individual IoT Botnet packets.Therefore,we plan to conduct a feature research so that IoT Botnet traffic for sampled traffic can be detected with good performance using IoT Botnet feature that reflects the characteristics of the 5GC environment.

    Funding Statement:This work was supported by Institute of Information & communications Technology Planning & Evaluation (IITP)grant funded by the Korea government (MSIT)(No.2021-0-00796,Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security)

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    色噜噜av男人的天堂激情| 国产免费视频播放在线视频 | 国产精品美女特级片免费视频播放器| 久久精品久久久久久噜噜老黄 | av又黄又爽大尺度在线免费看 | 精品人妻视频免费看| 国产精品久久久久久久电影| 欧美日韩综合久久久久久| 国产熟女欧美一区二区| 日本黄大片高清| 久久欧美精品欧美久久欧美| 国产极品天堂在线| 国产精品av视频在线免费观看| 欧美三级亚洲精品| 别揉我奶头 嗯啊视频| 精品久久久久久久久亚洲| 亚洲欧洲国产日韩| 久久久成人免费电影| 国产精品一及| 日韩中字成人| 国产一区二区在线观看日韩| 亚洲怡红院男人天堂| 国产高潮美女av| 国产一级毛片七仙女欲春2| 精品国产一区二区三区久久久樱花 | 国产成人免费观看mmmm| 国产精品久久久久久精品电影| 日韩大片免费观看网站 | 18禁裸乳无遮挡免费网站照片| 大香蕉97超碰在线| 欧美色视频一区免费| 建设人人有责人人尽责人人享有的 | 国产一级毛片七仙女欲春2| 晚上一个人看的免费电影| 亚洲图色成人| 一级毛片aaaaaa免费看小| 美女被艹到高潮喷水动态| 成人综合一区亚洲| 两性午夜刺激爽爽歪歪视频在线观看| 一个人看的www免费观看视频| 久久久久久九九精品二区国产| 色噜噜av男人的天堂激情| 国产在线一区二区三区精 | 99久久精品一区二区三区| 亚洲性久久影院| 大话2 男鬼变身卡| 亚洲成人精品中文字幕电影| 成年版毛片免费区| 我的老师免费观看完整版| 久久国产乱子免费精品| 亚洲最大成人av| 老司机影院成人| 如何舔出高潮| 中文字幕久久专区| 岛国毛片在线播放| 在线天堂最新版资源| 色视频www国产| 男人的好看免费观看在线视频| 欧美色视频一区免费| 51国产日韩欧美| 18禁动态无遮挡网站| 真实男女啪啪啪动态图| 黄色配什么色好看| 日本免费一区二区三区高清不卡| 午夜日本视频在线| 男人舔女人下体高潮全视频| av又黄又爽大尺度在线免费看 | 国产免费视频播放在线视频 | 免费在线观看成人毛片| 99久久人妻综合| 午夜精品一区二区三区免费看| 亚洲中文字幕日韩| 国产精品日韩av在线免费观看| 日韩 亚洲 欧美在线| 午夜视频国产福利| 免费观看a级毛片全部| 国产黄色小视频在线观看| 又爽又黄无遮挡网站| 国产探花极品一区二区| 久久精品久久久久久噜噜老黄 | 久久久久久九九精品二区国产| 久久久久久国产a免费观看| 久久精品夜色国产| 亚洲最大成人中文| 午夜a级毛片| 99久久无色码亚洲精品果冻| 亚洲在线观看片| 日本黄大片高清| 麻豆国产97在线/欧美| 亚洲成人久久爱视频| 麻豆一二三区av精品| 欧美又色又爽又黄视频| 日韩av在线大香蕉| 午夜精品一区二区三区免费看| 成人毛片a级毛片在线播放| 97人妻精品一区二区三区麻豆| 免费观看性生交大片5| 久久久久久久国产电影| 麻豆久久精品国产亚洲av| АⅤ资源中文在线天堂| 美女高潮的动态| 国产成人freesex在线| 国内揄拍国产精品人妻在线| 国产精品熟女久久久久浪| av专区在线播放| 国产精品国产三级专区第一集| 99九九线精品视频在线观看视频| 国产在视频线在精品| 欧美日韩一区二区视频在线观看视频在线 | 国产精品久久电影中文字幕| 寂寞人妻少妇视频99o| 国国产精品蜜臀av免费| 久久久国产成人精品二区| 九草在线视频观看| 精品国产三级普通话版| 一本久久精品| 尾随美女入室| 免费av毛片视频| 日本欧美国产在线视频| 日韩一区二区视频免费看| 午夜日本视频在线| 18禁在线无遮挡免费观看视频| 又黄又爽又刺激的免费视频.| 三级国产精品欧美在线观看| 一级毛片久久久久久久久女| 午夜久久久久精精品| 国产一级毛片七仙女欲春2| 久久久久久久午夜电影| 亚洲人成网站在线播| 精品国产一区二区三区久久久樱花 | 99久国产av精品国产电影| 免费一级毛片在线播放高清视频| 自拍偷自拍亚洲精品老妇| 日本爱情动作片www.在线观看| 欧美高清性xxxxhd video| 国产午夜福利久久久久久| 久久精品综合一区二区三区| 亚洲美女搞黄在线观看| 午夜福利高清视频| 男女视频在线观看网站免费| 久久久久久久亚洲中文字幕| 日韩欧美精品v在线| 久久韩国三级中文字幕| 精品久久久久久久人妻蜜臀av| 亚洲成人精品中文字幕电影| 大香蕉97超碰在线| 色5月婷婷丁香| 色噜噜av男人的天堂激情| 午夜福利视频1000在线观看| 亚洲av中文字字幕乱码综合| 男人舔女人下体高潮全视频| 最近2019中文字幕mv第一页| 精品酒店卫生间| 国产精品人妻久久久影院| 久久精品夜色国产| 久久亚洲国产成人精品v| 国内揄拍国产精品人妻在线| 在线免费观看不下载黄p国产| 欧美高清成人免费视频www| av国产免费在线观看| 97热精品久久久久久| 秋霞伦理黄片| 国产精品无大码| 97热精品久久久久久| 美女被艹到高潮喷水动态| 国产 一区精品| 一级毛片我不卡| 国产激情偷乱视频一区二区| 精品久久久久久久久亚洲| 国产亚洲av嫩草精品影院| 国产色婷婷99| 草草在线视频免费看| 亚洲精品国产av成人精品| 成人午夜精彩视频在线观看| 日韩精品有码人妻一区| 久久精品夜色国产| 中文亚洲av片在线观看爽| 亚洲婷婷狠狠爱综合网| 午夜久久久久精精品| 日韩av在线免费看完整版不卡| 免费观看性生交大片5| 亚洲人成网站高清观看| 男人舔女人下体高潮全视频| 国产黄色视频一区二区在线观看 | 一区二区三区四区激情视频| 99热精品在线国产| 菩萨蛮人人尽说江南好唐韦庄 | av.在线天堂| 国产亚洲最大av| 国产91av在线免费观看| 身体一侧抽搐| 亚洲五月天丁香| 久久这里有精品视频免费| 亚洲精品日韩av片在线观看| 亚洲成人久久爱视频| 大香蕉久久网| 91久久精品国产一区二区三区| 女的被弄到高潮叫床怎么办| 中文亚洲av片在线观看爽| 亚洲精品乱久久久久久| 中文字幕亚洲精品专区| 22中文网久久字幕| 日韩欧美精品免费久久| 中文资源天堂在线| 国产av不卡久久| 亚洲av不卡在线观看| 久久精品国产亚洲av涩爱| 色噜噜av男人的天堂激情| 中文乱码字字幕精品一区二区三区 | 久久久久久久久久成人| 国产一区二区亚洲精品在线观看| 91精品国产九色| 大话2 男鬼变身卡| 最近中文字幕高清免费大全6| 一级爰片在线观看| 久久亚洲精品不卡| 欧美丝袜亚洲另类| 久久精品91蜜桃| 综合色丁香网| 成人美女网站在线观看视频| av国产免费在线观看| 麻豆成人午夜福利视频| 国产熟女欧美一区二区| 久久韩国三级中文字幕| 亚洲在久久综合| 亚洲av成人精品一二三区| 能在线免费观看的黄片| 亚洲av二区三区四区| 国产精品爽爽va在线观看网站| 亚洲图色成人| 久久久午夜欧美精品| 97热精品久久久久久| 日日摸夜夜添夜夜添av毛片| 麻豆国产97在线/欧美| 亚洲久久久久久中文字幕| 亚洲精品乱码久久久久久按摩| av卡一久久| 午夜免费男女啪啪视频观看| 国产男人的电影天堂91| 成人亚洲精品av一区二区| 一区二区三区高清视频在线| 亚洲国产最新在线播放| 亚洲色图av天堂| 狂野欧美激情性xxxx在线观看| 在线播放国产精品三级| 国产不卡一卡二| 国产精品美女特级片免费视频播放器| 国产一级毛片七仙女欲春2| 日日摸夜夜添夜夜爱| 国产伦精品一区二区三区四那| 最新中文字幕久久久久| 免费在线观看成人毛片| 日本免费一区二区三区高清不卡| 亚洲四区av| 国产精品一区二区三区四区免费观看| 嫩草影院精品99| 国产又黄又爽又无遮挡在线| 哪个播放器可以免费观看大片| 国产淫片久久久久久久久| 久久久久国产网址| 18禁在线播放成人免费| 波多野结衣巨乳人妻| 色吧在线观看| 尤物成人国产欧美一区二区三区| 91av网一区二区| 狂野欧美白嫩少妇大欣赏| 高清午夜精品一区二区三区| 亚洲精品影视一区二区三区av| 国产伦理片在线播放av一区| 亚洲最大成人av| 精品久久久噜噜| 久久精品夜夜夜夜夜久久蜜豆| 免费黄色在线免费观看| av.在线天堂| 18禁在线播放成人免费| 联通29元200g的流量卡| 亚洲国产欧美在线一区| 精品人妻一区二区三区麻豆| 午夜a级毛片| 麻豆av噜噜一区二区三区| 国产精品一区二区性色av| 欧美成人a在线观看| 亚洲成av人片在线播放无| 国产男人的电影天堂91| 久久久久久久亚洲中文字幕| 免费电影在线观看免费观看| 精品久久久久久久久久久久久| 日韩欧美精品v在线| 午夜老司机福利剧场| 国产毛片a区久久久久| 亚洲精品乱久久久久久| 尤物成人国产欧美一区二区三区| 国产精品av视频在线免费观看| 免费看av在线观看网站| 亚洲精品,欧美精品| 国产人妻一区二区三区在| 99视频精品全部免费 在线| 两个人视频免费观看高清| 欧美日本视频| 日韩强制内射视频| 天堂av国产一区二区熟女人妻| 国产极品天堂在线| 久久人人爽人人片av| 纵有疾风起免费观看全集完整版 | 性插视频无遮挡在线免费观看| 欧美日韩国产亚洲二区| 一级毛片电影观看 | 搡女人真爽免费视频火全软件| 桃色一区二区三区在线观看| 亚洲精品,欧美精品| 亚洲欧美一区二区三区国产| 午夜福利高清视频| 国产成人aa在线观看| 成年女人看的毛片在线观看| 午夜福利视频1000在线观看| 久久精品91蜜桃| 国产精品久久视频播放| 免费av不卡在线播放| 久久6这里有精品| 91狼人影院| 久久精品综合一区二区三区| 小蜜桃在线观看免费完整版高清| 97在线视频观看| 国产精品久久电影中文字幕| 精品人妻视频免费看| 久久人人爽人人片av| 日本免费一区二区三区高清不卡| 亚洲欧美中文字幕日韩二区| 亚洲精品aⅴ在线观看| 春色校园在线视频观看| 天堂中文最新版在线下载 | 五月玫瑰六月丁香| 精品久久久噜噜| 97超视频在线观看视频| 国产精品麻豆人妻色哟哟久久 | 午夜免费激情av| 看十八女毛片水多多多| 国产精品久久视频播放| 国产老妇女一区| 亚洲婷婷狠狠爱综合网| 99热网站在线观看| 青春草国产在线视频| 久久欧美精品欧美久久欧美| 99热这里只有是精品在线观看| 午夜福利在线观看免费完整高清在| 岛国在线免费视频观看| 亚洲国产精品合色在线| 国产高清视频在线观看网站| 亚洲在线观看片| 久久久久久久久久黄片| 99热这里只有是精品50| 又粗又硬又长又爽又黄的视频| 99热这里只有是精品50| 久久精品影院6| 天堂影院成人在线观看| 久久婷婷人人爽人人干人人爱| 午夜精品国产一区二区电影 | 九草在线视频观看| av卡一久久| 国语自产精品视频在线第100页| 国产高清有码在线观看视频| 日韩国内少妇激情av| 久久精品久久久久久噜噜老黄 | 高清日韩中文字幕在线| 亚洲av成人精品一区久久| 国产欧美另类精品又又久久亚洲欧美| 亚洲在线观看片| 国产高清视频在线观看网站| 国产欧美日韩精品一区二区| 国产精品日韩av在线免费观看| a级一级毛片免费在线观看| 国产亚洲午夜精品一区二区久久 | videos熟女内射| 九九久久精品国产亚洲av麻豆| 色尼玛亚洲综合影院| 国产伦精品一区二区三区视频9| 晚上一个人看的免费电影| 亚洲精品成人久久久久久| 午夜福利成人在线免费观看| 菩萨蛮人人尽说江南好唐韦庄 | 少妇被粗大猛烈的视频| 亚洲精品一区蜜桃| 在线免费观看的www视频| 国产 一区 欧美 日韩| 亚洲综合色惰| 亚洲在线观看片| 又粗又硬又长又爽又黄的视频| 联通29元200g的流量卡| 国产精品爽爽va在线观看网站| 91精品一卡2卡3卡4卡| 嫩草影院精品99| 国产伦在线观看视频一区| 成人漫画全彩无遮挡| 国产精品99久久久久久久久| 国产高清有码在线观看视频| av天堂中文字幕网| 亚洲综合精品二区| 国产成人精品久久久久久| 在现免费观看毛片| 日韩精品青青久久久久久| 中文字幕精品亚洲无线码一区| 久久精品91蜜桃| 精品一区二区三区视频在线| 2022亚洲国产成人精品| 人妻系列 视频| 亚洲乱码一区二区免费版| a级毛色黄片| 久久国产乱子免费精品| 国产精品永久免费网站| 国产精品人妻久久久影院| 啦啦啦韩国在线观看视频| 日本猛色少妇xxxxx猛交久久| 亚洲人成网站在线观看播放| 精品免费久久久久久久清纯| 三级男女做爰猛烈吃奶摸视频| 亚洲欧美清纯卡通| 边亲边吃奶的免费视频| 国产精品一二三区在线看| 黄片无遮挡物在线观看| 高清毛片免费看| 日韩大片免费观看网站 | 99热网站在线观看| 联通29元200g的流量卡| 欧美性猛交╳xxx乱大交人| 伊人久久精品亚洲午夜| 97热精品久久久久久| 亚洲欧美精品自产自拍| 少妇人妻精品综合一区二区| 国产一区二区三区av在线| 亚洲人成网站在线播| 国产精品一及| 夜夜爽夜夜爽视频| 中国国产av一级| 黄色配什么色好看| 性色avwww在线观看| av国产免费在线观看| 国产精品美女特级片免费视频播放器| 蜜臀久久99精品久久宅男| 久久精品久久久久久久性| 日本午夜av视频| 欧美成人午夜免费资源| 亚洲熟妇中文字幕五十中出| 国产精品电影一区二区三区| 我要搜黄色片| .国产精品久久| 一本一本综合久久| 波多野结衣高清无吗| 晚上一个人看的免费电影| 免费av毛片视频| 精品国内亚洲2022精品成人| 一级二级三级毛片免费看| 久久精品国产亚洲av涩爱| 六月丁香七月| 1000部很黄的大片| 亚洲av免费高清在线观看| 熟妇人妻久久中文字幕3abv| 亚洲五月天丁香| 身体一侧抽搐| 成人鲁丝片一二三区免费| 日本五十路高清| 国产91av在线免费观看| 亚洲av福利一区| 在线播放无遮挡| av在线播放精品| 全区人妻精品视频| 少妇熟女欧美另类| 亚洲精品成人久久久久久| 亚洲天堂国产精品一区在线| 精品久久国产蜜桃| 日韩,欧美,国产一区二区三区 | 两个人的视频大全免费| 乱系列少妇在线播放| 国产精品国产三级专区第一集| 亚洲av不卡在线观看| 日本色播在线视频| 国产乱来视频区| 黄片wwwwww| 久久久久久久亚洲中文字幕| 欧美性猛交╳xxx乱大交人| 国产白丝娇喘喷水9色精品| 久久国内精品自在自线图片| 日韩,欧美,国产一区二区三区 | 亚洲精品日韩在线中文字幕| 91精品国产九色| 亚洲一级一片aⅴ在线观看| 麻豆一二三区av精品| 国产精品精品国产色婷婷| 欧美激情久久久久久爽电影| 国产亚洲精品久久久com| 汤姆久久久久久久影院中文字幕 | 99热这里只有是精品50| 偷拍熟女少妇极品色| av福利片在线观看| 亚洲欧美一区二区三区国产| 久久精品久久久久久噜噜老黄 | 一个人免费在线观看电影| 欧美区成人在线视频| 最近的中文字幕免费完整| 国产不卡一卡二| 午夜精品一区二区三区免费看| 18禁在线播放成人免费| 中文亚洲av片在线观看爽| 一级黄片播放器| 草草在线视频免费看| 国产精品电影一区二区三区| 最近视频中文字幕2019在线8| 色5月婷婷丁香| 欧美成人一区二区免费高清观看| 最近的中文字幕免费完整| av国产免费在线观看| 国产成人精品一,二区| 中国国产av一级| 亚洲成人av在线免费| 一个人观看的视频www高清免费观看| 国内精品美女久久久久久| 久久99热6这里只有精品| 久久久久久久久大av| 小蜜桃在线观看免费完整版高清| 嫩草影院入口| 日韩精品青青久久久久久| 高清毛片免费看| 国产精品日韩av在线免费观看| 精品酒店卫生间| 国产真实乱freesex| eeuss影院久久| 成人综合一区亚洲| 两个人视频免费观看高清| 三级国产精品欧美在线观看| 国产精品蜜桃在线观看| 国产黄a三级三级三级人| 久久鲁丝午夜福利片| 亚洲欧美清纯卡通| 国产真实伦视频高清在线观看| 老女人水多毛片| 久久久久久大精品| 国产精品一区二区在线观看99 | 日韩一区二区三区影片| 精品久久久久久电影网 | 嫩草影院入口| 婷婷色麻豆天堂久久 | 91久久精品国产一区二区三区| 国产精品一区二区在线观看99 | av线在线观看网站| 国产精品爽爽va在线观看网站| 亚洲成人av在线免费| 国产精品国产三级国产专区5o | 亚洲欧美成人精品一区二区| 插阴视频在线观看视频| 国产真实伦视频高清在线观看| 男女那种视频在线观看| 久久99热这里只频精品6学生 | 插阴视频在线观看视频| 中文欧美无线码| 亚洲在线观看片| 日日干狠狠操夜夜爽| 中文天堂在线官网| 亚洲一区高清亚洲精品| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 99热全是精品| 亚洲一级一片aⅴ在线观看| 欧美激情国产日韩精品一区| 2021少妇久久久久久久久久久| 哪个播放器可以免费观看大片| 国产淫语在线视频| 一二三四中文在线观看免费高清| 日韩av在线免费看完整版不卡| 级片在线观看| 观看美女的网站| 亚洲精品aⅴ在线观看| 欧美成人午夜免费资源| 最近视频中文字幕2019在线8| 你懂的网址亚洲精品在线观看 | 亚洲一级一片aⅴ在线观看| 小蜜桃在线观看免费完整版高清| 99国产精品一区二区蜜桃av| 午夜福利高清视频| 在线播放国产精品三级| 在线观看美女被高潮喷水网站| 我的老师免费观看完整版| 99热这里只有精品一区| 舔av片在线| 国产成人精品久久久久久| 中文字幕免费在线视频6| 欧美一区二区国产精品久久精品| 在线a可以看的网站| 干丝袜人妻中文字幕| АⅤ资源中文在线天堂| 波野结衣二区三区在线| 啦啦啦啦在线视频资源| 床上黄色一级片| av天堂中文字幕网| 超碰97精品在线观看| 国产欧美另类精品又又久久亚洲欧美| 国内精品一区二区在线观看| 免费黄色在线免费观看| 国产欧美另类精品又又久久亚洲欧美| 国产毛片a区久久久久| 99热6这里只有精品| 国产精品人妻久久久影院| 成年版毛片免费区| 桃色一区二区三区在线观看| 长腿黑丝高跟| 亚洲成人av在线免费| 国产一级毛片在线| 麻豆国产97在线/欧美| 99视频精品全部免费 在线| 欧美成人精品欧美一级黄| 综合色av麻豆| 寂寞人妻少妇视频99o| 久久精品国产亚洲av天美| 青春草亚洲视频在线观看| 夜夜看夜夜爽夜夜摸| 99热这里只有精品一区| 色哟哟·www| 人人妻人人澡人人爽人人夜夜 |