• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Impact Analysis of Resilience Against Malicious Code Attacks via Emails

    2022-11-11 10:45:54ChulwonLeeandKyunghoLee
    Computers Materials&Continua 2022年9期

    Chulwon Lee and Kyungho Lee

    1Department of Information Security,Korea University,Seoul,02841,Korea

    2Institute of Cyber Security&Privacy,Korea University,Seoul,02841,Korea

    Abstract: The damage caused by malicious software is increasing owing to the COVID-19 pandemic, such as ransomware attacks on information technology and operational technology systems based on corporate networks and social infrastructures and spear-phishing attacks on business or research institutes.Recently, several studies have been conducted to prevent further phishing emails in the workplace because malware attacks employ emails as the primary means of penetration.However,according to the latest research,there appears to be a limitation in blocking email spoofing through advanced blocking systems such as spam email filtering solutions and advanced persistent threat systems.Therefore, experts believe that it is more critical to restore services immediately through resilience than the advanced prevention program in the event of damage caused by malicious software.In accordance with this trend, we conducted a survey among 100 employees engaging in information security regarding the effective factors for countering malware attacks through email.Furthermore, we confirmed that resilience, backup,and restoration were effective factors in responding to phishing emails.In contrast,practical exercise and attack visualization were recognized as having little effect on malware attacks.In conclusion,our study reminds business and supervisory institutions to carefully examine their regular voluntary exercises or mandatory training programs and assists private corporations and public institutions to establish counter-strategies for dealing with malware attacks.

    Keywords:Cyberattack;resilience;malicious code;spear-phishing

    1 Introduction

    Cyberattacks are on the rise in society, owing to the COVID-19 pandemic, by 150% in the healthcare sector, 230% in the financial sector, and 350% in the phishing website [1].According to Google reports in April 2020,there were 18 million malicious and phishing emails,and more than 240 million daily spam messages pertaining to COVID-19 [2,3].Therefore, the damage caused by these cyberattacks has increased by 600%compared to that prior to the COVID-19 pandemic[4].Moreover,ransomware damage from these cyberattacks occurs in all areas of society, including healthcare,education,and finance.PCs or networks infected by malicious codes that paralyzed files in computers or network systems in organizations in the past can be easily restored by treating them.However,forprofit ransomware has recently tended to not only disable the social infrastructure and make corporate or personal data out of control for good but also expand its reach into the individual,business,and social infrastructure at large[5].The malicious code circulates through email attachments,malicious links,and infected storage devices.In particular,the TA505 hacking group uses spear-phishing emails containing attachments with malicious code to extract information from targeted organizations or individuals [6].According to the Symantec Internet Security Threat Report, 2019, 60% of cyber criminals used spear-phishing as the most common type of targeted attack [7].Spear-phishing, an attempt to extort sensitive information from targeted public organizations or ask for money through ransomware, is an increasingly common type of cyberattack, the case in which hackers took down the operating technology system of the Colonial Pipeline Co.in the US and hacked confidential information from the Korea Aerospace Industries(KAI)in Korea.Therefore,detecting and blocking malicious codes in advance, which are increasingly threatening, has technical limitations.Experts are now suggesting a change in thinking that augments fast resilience from malicious code attacks rather than blocking malware attacks.Minimizing downtime and quickly restoring to the normal state are considered effective measures to respond to malware attacks through emails in the event of cyberattacks,including spear phishing attacks.

    Our study contributes to finding factors influencing the effectiveness of malicious code through email in response to presentation, investigation and analysis of response modeling based on the methods of recent studies regarding malware attacks under the COVID-19 pandemic.

    2 Related Works

    A variety of studies have been c onducted to effectively respond to malicious codes via email,such as spam prevention solution, advanced persistent threat (APT)prevention, reconsideration with information security education,counter security exercise against cyberattacks,reinforcing cyber resilience, and cyberattack visualization.Luo et al.[5] suggested a framework consisting of four stages to prevent malicious code via email.First,formulating the reaction policies and establishing a procedure to implement them.Second,reinforcing the control of banning the downloads of suspicious files through the Internet and prohibiting the reading of unidentified emails.Third, building an operating system to manage patches or updates to protect computers.Finally, improving awareness that if employees read a malicious email,it could seriously impact their customers and organizations.Alexander [8] emphasized the visualization of real-time cyberattacks to effectively respond to them as air traffic control watched the planes entering the runway in real time because it was difficult to react to invisible attacks.Lee et al.[9] developed a method to estimate the effectiveness of security event visualization to overcome the limitations of massive data analysis related to security incidents under the continuous occurrence of serious security accidents.There were several evaluation factors that include the predictability of security incidents, contents of delivery, effectiveness, immediacy,efficiency,clarity,and diversity.Furthermore,there was a difference in perspectives on the evaluation factors of visualization among managers, operators, and security consultants: managers recognized the content of delivery as the most important factor,operators consider clarity and immediacy,and security consultants recognize work efficiency.A study on the visualization of intelligence for cyber threats was in progress to collect and analyze information on cyber security threats and react to them effectively [10].Bürkner [11] required practical exercises and simulations, such as fire drills,against cyberattacks to respond to security incidents.Resilience has been widely used in a variety of fields such as ecology,individual and organizational psychology,supply chain management,strategic management, and safety engineering.Resilience refers to the ability to bounce back to a steady state after disruption in these fields [12-18].Other definitions of resilience are as follows: Gallopín[19] regards system resilience as the ability to adapt to failures and security incidents, mitigate their impact, and cope with the outcomes of deformation caused by them using every available resource;Smith[20]considered cyber resilience in the context of a complicated system composed of physical,informational,cognitive,and social spheres;Kott et al.[21]considered the cyber resilience domain to consist of sensing,software,and hardware.Frenz et al.[22]proposed a plan for backup and restoration impact factors in a ransomware attack.Tab.1 shows the key ideas of the authors.

    Table 1: Comparison of related works

    3 Materials and Methods

    3.1 Research Model

    This research model highlights the importance of resilience in responding to malicious code using email.In particular,attack visualization,practical exercise,and backup and restoration are required to improve resilience.Fig.1 demonstrates the research model.

    Figure 1:Research model

    Effective factors for countering malicious codes include installing software such as antiviruses or blocking systems such as IPS,which has been considered important in the past,information protection education for employees, and sanctions.Other than disciplinary actions, all factors are considered effective measures that can be taken in advance before a hacking attack occurs.This proactive control is a control factor, as opposed to resilience, which weighs the recovery ability after hacking.Also,disciplinary actions can be classified as a control element to prevent recurrence after hacking incidents,unlike resilience, which aims to normalize services under hacking attacks.Three factors affecting resilience were selected because of their importance in recent studies.

    The blocking of malicious code attacks through email in advance seems to have reached its limit.Therefore,rather than responding to the goal of blocking all attacks,it can be said that an approach to how quickly an attack can be returned to normal when it occurs is important.As Fig.1 shows,the research model indicates that resilience is of paramount importance to effectively respond to malicious code attacks through email.Also, there are three factors selected on the basis of recent studies as factors significantly affecting resilience.Attack visualization points out that when a cyberattack occurs,visualizing which attack is occurring from which direction impacts resilience.Practical exercise considers that it is important for resilience in the event of an actual cyberattack to implement practical response training before a cyberattack occurs.In Backup and restore, a backup system for quick recovery in the case of failure to defend against an initial attack is considered an important factor in resilience.Tab.2 lists detailed definitions of the terms used in the model.

    Table 2: Definitions of terms

    3.1.1 Necessity of Cyber System Resilience

    The extent of damage from cyber threats is becoming large-scale and wide-ranging owing to a volatile cyber environment caused by COVID-19, as well as the improvement in internet speed and the expansion of connected devices such as IoT [2].The Interpol Secretary General warned that cyber criminals were developing a new attack at an alarming rate using COVID-19 to exploit the fear and uncertainty caused by an unstable society and grim economic conditions[2].There are growing concerns about the traditional approach to strengthening systems owing to the unpredictability and uncertainty caused by the swift evolution of cyber threats to systems.Thus,resilience enables systems to adapt to cyberattacks.In other words, it is important to have the ability to restore or regenerate degraded systems in the aftermath of cyberattacks[21].Therefore,we hypothesize the following:

    H1: Improving the resilience of cyber systems will have a positive effect on responding to malicious code.

    3.1.2 Visualizaion of Malicious Code Email Attack

    An increase in cyberattacks hampers security control by augmenting the events of security systems,such as firewalls,IPS,and antivirus software.Also,the analysis of spot cyberattacks from massive trade data is also becoming complicated owing to the increased complexity between the local system and cloud systems because of the growing use of cloud systems.Visualizing malicious code attacks is an important factor for determining them at a glance because restrictions hinder us from implementing security control practically monitoring all of them in the massive amount of log data one by one[9].Therefore,we hypothesize the following:

    H2:Visualizing malicious code attacks will have a positive effect on improving resilience.

    3.1.3 Practical Excercise

    Patriciu et al.[23]stated that cybersecurity exercises were very effective in protecting information.They provided practical ways to implement cyber exercises and guidelines for evaluating the indicators of the effectiveness of exercises.Kick [24] focused on having a sense of reality in scenario-based training that mixed actual events during cyber exercises.Several organizations are executing exercises for employees to respond to malicious code using email,expecting their performance.Chatchalermpun et al.[25]conducted an empirical study comparing the exercise results of phishing emails for 21,000 employees in a financial firm in Thailand.Therefore,we hypothesize the following:

    H3: Practical exercises responding to malicious code using email will have a positive effect on improving resilience.

    3.1.4 Backup and Restore

    Frenz et al.[22]stated that the plan for backup and restoration was important for reacting to a ransomware attack.Richardson and North[26]highlighted the importance of exercise and backup in preventing ransomware attacks.Therefore,we hypothesize the following:

    H4:Backup and restoration will have a positive effect on improving resilience.

    3.2 Research Methods

    3.2.1 Study Design and Data Collection

    Structural equation modeling (SEM)was used as a multivariate method to prove the causal relationships between factors.Also, we used analysis of moment structures (AMOS)as an SEM tool because of its convenient graphical user interface(GUI)and data compatibility with SPSS and EXCEL.Also, SEM has several advantages: controlling measurement errors, convenience of using mediating variables,and enabling statistical model evaluation[27].Therefore,this study was conducted using SEM(see Fig.2).

    Figure 2:Process of research

    Online surveys were conducted with employees of the security department in Korea using Google Forms to collect data for model verification.Among them,100 replied to the survey,Tab.3 shows the demographic information of the respondents.

    Table 3: Demographic information of respondents

    Table 3:Continued

    3.2.2 Constructs and Measurement

    We used six items adopted by [9] to measure how effectively organizations could respond to malicious code attacks using emails.Six items adopted by [28] were used to measure the resilience of systems that could run properly under malicious code attacks via emails.Six items adopted by[9]were used to measure visualization of cyberattack vectors, such as its starting or destination point,and the types of attacks during malicious code attacks via emails.Six items adopted by[23,24]were used to measure the effectiveness of cyberattack response exercises against security incidents.Six items adopted by[25]were used to measure resilience to determine how effective restoration from backup data could occur during damage caused by malicious code attacks via emails(Tab.4 lists the survey scale items).

    Table 4: Survey scale items

    Table 4:Continued

    4 Results

    4.1 Validity and Reliability

    First, we tested the unidimensionality of the measurements using confirmatory factor analysis(CFA).A valuation basis for model fit was used(see Tab.5).

    To obtain the optimal value of reliability,we deleted problematic items using the squared multiple correlation (SMC).A repeated process was used to obtain the desired result, in which the reference value was 0.4,which was less than that of SMC.Thus,we obtained the results shown in Tab.6.The final variables were believed to satisfy reliability requirements because all constructs and measuring indicators(CMIN/DF,P,RMR,GFI,AGFI,CFI,NFI,RMESA)are fulfilled on the basis of Tab.5.

    Table 5: Reference value of Model-fit

    Table 6: Results of confirmatory factor analysis(CFA)

    Second,our measurement model was analyzed based on the aforementioned CFA.After optimizing the adequacy of the survey questions(partly by deleting measured variables)based on the SMC values,our data yielded the following results(see Tab.7).

    Table 7: Results of the measurement model’s analysis

    As shown in Tab.7,critical ratio(CR)indicates the t value,and the regression weight is significant when the value is greater than±1.96.Notably,all CR values are greater than 1.96.SMC indicates the ability to demonstrate the observed variables for latent variables.Therefore,SMC can tolerate variables based on a reference value of 0.4.As shown in Tab.5,the standards for model fit are as follows:P is greater than 0.05;RMR is less than 0.05(as well as less than 1);GFI,AGFI,CFI,NFI,and IFI are greater than 0.9;RMSEA is less than 0.08(as well as less than 1).The results of the model analysis are acceptable because all values satisfy the reference values.

    Third,a reliability analysis was performed using two tests:convergent and discriminant validity.Construct reliability was used to assess convergent validity[31],and average variance extracted(AVE)was used to assess discriminant validity[32].Eqs.(1)and(2)was used to determine construct reliability and AVE.

    Tab.8 presents the analysis results.

    Table 8: Validation of the measurement model

    The results showed that convergent validity was demonstrated with construct reliability values(0.896 to 0.989 for all constructs greater than 0.7).Moreover, discriminant validity is demonstrated because the AVEs(0.680 to 0.969)of all variables are greater than the largest correlation coefficient(resilience:0.815)of the square root(0.664)[32].

    4.2 Result of Analysis

    Malware attacks via emails have grown in number in the following ways:ransomware cyberattacks on organizations and social infrastructures,and information capture through spear-phishing attacks.According to several experts,resilience has emerged owing to the limitations of advanced prevention systems in the face of a variety of efforts to tackle the damages caused by malicious email attacks.Thus,we established a new model to demonstrate the relationship among three factors:attack visualization,practical exercise, and backup and restore, which affected resilience against malware attacks via email.As Tab.9 shows,the estimates from SEM were within tolerable levels for the proposed model,such that CMIN=38.565,CMIN/DF=0.838,P=0.774,GFI=0.939,AGFI=0.897,CFI=1.000,RMR=0.065, RMSEA=0.000, NFI=0.961, and IFI=1.008.Therefore, the model fit was appropriate for comparison with reference values(CMIN/DF<2,P>0.05,GFI ≥0.9,AGFI ≥0.85,CFI≥0.9,NFI ≥0.9,RMR ≤0.1,and RMSEA ≤0.1).

    Table 9: Results of the model

    The test results of the proposed hypotheses H1 and H4 were supported within the 95%confidence interval with P<0.05, and C.R.>± 1.96.Thus, backup and restoration has a positive effect on improving resilience, which positively affects responses against malicious code attacks via emails.However, the proposed hypotheses H2 and H3 are not supported, with P>0.05 and C.R.<± 1.96.Thus,attack visualizaton and practical exercise did not influence resilience(see Fig.3).

    Figure 3: Results of the model, All path coefficients are standardized estimates corresponding to P <0.05,and CR >±1.96.Note that the CR values are within parentheses.Grayed-out arrows indicate that the hypotheses are not supported

    5 Discussion

    Our study investigated the effectiveness of resilience,attack visualization,practical exercise,and backup and restoration, which recently became important in response to malicious code emails.Because only the necessity of each factor was mentioned in the previous study,we newly investigated how each factor interacted with the effectiveness of the response against malicious codes through resilience.To this end,we used a confirmatory research method using SEM.The results showed that resilience,backup and restoration were effective in responding to malicious code email;however,attack visualization and practical exercise had no meaningful effect.Attack visualization did not have a considerable effect because the attack visualization solutions currently used by companies did not show the attack situation properly.In other words, the current technology for attack visualization did not provide a function that was beneficial to security practitioners.Moreover, in the case of practical exercise, employees became insensitive to training due to frequent exercise.Therefore, our study showed that attack visualization technology required to be improved effectively to assist security practitioners in responding,and the email response exercise required to be completely reformed.

    5.1 Research Contributions

    As malicious code email attacks have become more intelligent and expanding, experts continue to argue that resilience is required in addition to the existing defense system, which is verified by our research.Meanwhile, companies in Korea are also conducting regular email mock training to block malicious code emails, and various policies are in place, such as mandatory submission of response training results to supervisory authorities once a year;however,the current method required to be changed.Furthermore,our study show that resilience is important for effectively responding to malicious code emails, which requires backup.Therefore, it is meaningful to provide a rationale for companies to build a more robust backup system.In addition, it is necessary to review policies for offline backup and real-time backup in preparation for ransomware.

    5.2 Limitations and Future Research

    This study had several limitations.First, it was based on a subjective evaluation of employees performing information protection work in Korea.Therefore,different countries might have different results depending on the region.

    Second, because this study was modeled mainly based on resilience, which had been frequently mentioned recently in the field of information protection,all factors that were effective in responding to malicious code might not have been reviewed.

    Third,the effects of attack visualization and practical exercise were found to be insignificant in this study.Therefore,the subject of future research might be regarding the factors that increased the effectiveness of attack visualization and practical exercise.

    Malicious code and distributors have become increasingly intelligent, and they rapidly take advantage of recent social phenomena.Therefore,when a new technology appears or a change in the social environment appears in the future, the method of dealing with malicious code might change;thus,new studies reflecting such trends must be continued in the future.

    6 Conclusions

    Owing to the impact of COVID-19, non-face-to-face activities have increased, due to which malicious code attacks such as ransomware and spear-phishing have grown in number, along with advancements in their technology.Various technical control devices such as the existing spam mail blocking solution,APT blocking system,and email isolation solution are being installed and running to block malicious code email.However,we are facing a situation that makes it incapable to completely block the emails using these technical control measures,and experts are calling for a paradigm change regarding resilience.Therefore,we developed a malware response model that fits this new paradigm,collected data from 100 information protection experts in Korea using a Google survey,and tested our model through SEM to ensure that resilience and backup were effective in responding to malicious code emails.Therefore,it is expected that our research will be of remarkable interest for establishing a strategy to deal with malicious code attacks.

    Acknowledgement:The authors would like to thank Editage (https://www.editage.co.kr)for their English language editing.

    Funding Statement:This study was supported by a grant from the Korean Health Technology RD Project,Ministry of Health and Welfare,Republic of Korea(HI19C0866).

    Conflicts of Interest: Theauthors declare that they have no conflicts of interest to report regarding this study.

    a级毛片在线看网站| 国产精品偷伦视频观看了| 高清在线视频一区二区三区| 美女视频免费永久观看网站| 免费少妇av软件| 少妇的逼水好多| h视频一区二区三区| 亚洲精品美女久久久久99蜜臀 | 少妇 在线观看| 999精品在线视频| 国产乱人偷精品视频| 久久婷婷青草| 精品酒店卫生间| 国产有黄有色有爽视频| 亚洲精品视频女| 久久久精品国产亚洲av高清涩受| 哪个播放器可以免费观看大片| 国产97色在线日韩免费| 亚洲精品,欧美精品| 国产毛片在线视频| 亚洲av综合色区一区| 日日撸夜夜添| av国产精品久久久久影院| 观看美女的网站| 国产激情久久老熟女| av.在线天堂| 只有这里有精品99| 亚洲av福利一区| 观看美女的网站| 亚洲欧美一区二区三区久久| 免费在线观看视频国产中文字幕亚洲 | 国产精品国产三级专区第一集| 黄频高清免费视频| 国产精品国产三级专区第一集| 99热网站在线观看| 久久 成人 亚洲| 久久精品夜色国产| 欧美av亚洲av综合av国产av | 亚洲美女搞黄在线观看| 91成人精品电影| av在线app专区| 丁香六月天网| 国产精品麻豆人妻色哟哟久久| 少妇的逼水好多| 波野结衣二区三区在线| 狠狠婷婷综合久久久久久88av| 性高湖久久久久久久久免费观看| 女性生殖器流出的白浆| 欧美日韩综合久久久久久| 老鸭窝网址在线观看| 精品一区二区三区四区五区乱码 | 成人国产av品久久久| 日韩,欧美,国产一区二区三区| 两个人免费观看高清视频| 少妇精品久久久久久久| 中文字幕人妻丝袜一区二区 | 香蕉国产在线看| 中文欧美无线码| 亚洲欧洲国产日韩| 国产片内射在线| 久久 成人 亚洲| 欧美日韩av久久| 亚洲精品一区蜜桃| 久久毛片免费看一区二区三区| 亚洲精品一二三| 精品一区二区免费观看| 制服丝袜香蕉在线| 精品国产乱码久久久久久男人| 精品亚洲成a人片在线观看| 欧美+日韩+精品| 国产黄色免费在线视频| 国产男女内射视频| 日韩免费高清中文字幕av| 999久久久国产精品视频| 亚洲国产精品999| 色94色欧美一区二区| 亚洲中文av在线| 永久免费av网站大全| 99国产综合亚洲精品| 午夜福利,免费看| 久久精品国产亚洲av天美| 天天躁日日躁夜夜躁夜夜| 男女下面插进去视频免费观看| 欧美日韩亚洲国产一区二区在线观看 | av不卡在线播放| 天美传媒精品一区二区| 黄色怎么调成土黄色| 欧美日韩视频高清一区二区三区二| av电影中文网址| 精品久久蜜臀av无| 婷婷成人精品国产| 久久精品亚洲av国产电影网| 成人亚洲精品一区在线观看| 亚洲三级黄色毛片| 久久精品国产亚洲av高清一级| 久久久精品国产亚洲av高清涩受| 午夜福利视频精品| 欧美 日韩 精品 国产| 午夜精品国产一区二区电影| 亚洲精品一区蜜桃| 激情视频va一区二区三区| 美女福利国产在线| 国产 精品1| 妹子高潮喷水视频| av在线老鸭窝| 久久久久精品人妻al黑| 在线观看免费日韩欧美大片| 成人国产av品久久久| 日韩av免费高清视频| 街头女战士在线观看网站| 亚洲精品视频女| 欧美日韩一区二区视频在线观看视频在线| 免费观看av网站的网址| 纵有疾风起免费观看全集完整版| 国产黄色免费在线视频| 国产一区二区在线观看av| 中文欧美无线码| 99re6热这里在线精品视频| 亚洲成人av在线免费| 另类亚洲欧美激情| 永久网站在线| 久久久久久久久久人人人人人人| 在线精品无人区一区二区三| 久久久亚洲精品成人影院| 亚洲精品自拍成人| 久久精品久久久久久噜噜老黄| 日韩三级伦理在线观看| 91在线精品国自产拍蜜月| 又粗又硬又长又爽又黄的视频| 岛国毛片在线播放| 亚洲综合精品二区| 少妇熟女欧美另类| 天天躁狠狠躁夜夜躁狠狠躁| av.在线天堂| 在线观看三级黄色| 午夜福利影视在线免费观看| 国产无遮挡羞羞视频在线观看| 精品一区二区三卡| 欧美+日韩+精品| 肉色欧美久久久久久久蜜桃| 久久久久国产网址| 国产白丝娇喘喷水9色精品| 欧美日韩一区二区视频在线观看视频在线| 1024视频免费在线观看| 免费高清在线观看视频在线观看| 男女免费视频国产| 大香蕉久久成人网| 欧美日韩成人在线一区二区| 免费av中文字幕在线| 国产成人91sexporn| 国产亚洲精品第一综合不卡| 自线自在国产av| 日本欧美视频一区| 亚洲第一青青草原| 国产探花极品一区二区| 一级毛片我不卡| 欧美日韩综合久久久久久| 精品国产一区二区三区久久久樱花| 寂寞人妻少妇视频99o| 天堂中文最新版在线下载| 亚洲一区二区三区欧美精品| 欧美最新免费一区二区三区| 啦啦啦视频在线资源免费观看| 午夜福利影视在线免费观看| 晚上一个人看的免费电影| 男人添女人高潮全过程视频| 亚洲国产精品一区二区三区在线| 婷婷色综合大香蕉| 人人妻人人添人人爽欧美一区卜| 久热久热在线精品观看| www.av在线官网国产| 观看av在线不卡| 久久午夜福利片| videos熟女内射| 亚洲av日韩在线播放| 国产亚洲欧美精品永久| 欧美人与性动交α欧美软件| 久久久久人妻精品一区果冻| 爱豆传媒免费全集在线观看| 黑人猛操日本美女一级片| 亚洲国产精品一区三区| 青春草国产在线视频| 蜜桃在线观看..| 免费观看在线日韩| 又粗又硬又长又爽又黄的视频| 欧美少妇被猛烈插入视频| 又黄又粗又硬又大视频| 亚洲精品一区蜜桃| www.av在线官网国产| 边亲边吃奶的免费视频| 在线天堂中文资源库| 纵有疾风起免费观看全集完整版| 国产国语露脸激情在线看| 久久久久久久精品精品| 精品少妇久久久久久888优播| 精品少妇内射三级| 午夜激情av网站| 婷婷成人精品国产| 精品人妻在线不人妻| 波野结衣二区三区在线| 男女边摸边吃奶| 有码 亚洲区| 国产日韩一区二区三区精品不卡| 国产乱来视频区| 免费在线观看完整版高清| 国产精品国产三级专区第一集| 菩萨蛮人人尽说江南好唐韦庄| 国产精品无大码| 搡老乐熟女国产| 一区二区三区激情视频| 黑人巨大精品欧美一区二区蜜桃| 一个人免费看片子| 国产xxxxx性猛交| 午夜福利一区二区在线看| 久久久久国产网址| 亚洲国产毛片av蜜桃av| 国产片特级美女逼逼视频| 啦啦啦啦在线视频资源| 亚洲美女搞黄在线观看| 黑丝袜美女国产一区| 亚洲色图 男人天堂 中文字幕| 午夜福利影视在线免费观看| 午夜福利一区二区在线看| 亚洲熟女精品中文字幕| 日韩欧美精品免费久久| 国产精品香港三级国产av潘金莲 | 欧美 亚洲 国产 日韩一| 侵犯人妻中文字幕一二三四区| 老女人水多毛片| 永久免费av网站大全| 亚洲情色 制服丝袜| 青春草国产在线视频| 国产精品久久久av美女十八| 黄色配什么色好看| 九草在线视频观看| 国产精品 国内视频| 18禁裸乳无遮挡动漫免费视频| 午夜91福利影院| 狂野欧美激情性bbbbbb| 免费在线观看完整版高清| 纵有疾风起免费观看全集完整版| 人人妻人人爽人人添夜夜欢视频| 亚洲精品视频女| 亚洲av国产av综合av卡| 69精品国产乱码久久久| 中文字幕色久视频| 黄片播放在线免费| 又黄又粗又硬又大视频| 女的被弄到高潮叫床怎么办| 亚洲在久久综合| 日产精品乱码卡一卡2卡三| 免费av中文字幕在线| 午夜老司机福利剧场| 亚洲精品久久午夜乱码| 亚洲综合色惰| av视频免费观看在线观看| 亚洲精品aⅴ在线观看| 多毛熟女@视频| 免费黄色在线免费观看| 精品人妻在线不人妻| 人成视频在线观看免费观看| 免费久久久久久久精品成人欧美视频| 91精品伊人久久大香线蕉| 国产视频首页在线观看| 精品人妻在线不人妻| 考比视频在线观看| 免费高清在线观看视频在线观看| 中国国产av一级| 中文字幕色久视频| 七月丁香在线播放| 亚洲欧洲国产日韩| 在现免费观看毛片| 天堂8中文在线网| 蜜桃国产av成人99| 肉色欧美久久久久久久蜜桃| 69精品国产乱码久久久| 亚洲国产精品一区二区三区在线| 国产极品粉嫩免费观看在线| 少妇被粗大猛烈的视频| 亚洲精品av麻豆狂野| 美女视频免费永久观看网站| 永久网站在线| 国产精品欧美亚洲77777| 一级a爱视频在线免费观看| 国产淫语在线视频| 高清视频免费观看一区二区| 亚洲精品自拍成人| 女人精品久久久久毛片| 一本大道久久a久久精品| 久久这里有精品视频免费| 26uuu在线亚洲综合色| 中文字幕av电影在线播放| 欧美精品高潮呻吟av久久| 成年美女黄网站色视频大全免费| 观看av在线不卡| 高清欧美精品videossex| kizo精华| 哪个播放器可以免费观看大片| 国产男人的电影天堂91| 丰满迷人的少妇在线观看| 国产在线视频一区二区| 亚洲av中文av极速乱| 丰满迷人的少妇在线观看| 国产欧美日韩一区二区三区在线| 久久久久精品人妻al黑| 国产淫语在线视频| 成人手机av| av在线播放精品| www.自偷自拍.com| 一级片免费观看大全| 青春草亚洲视频在线观看| 少妇精品久久久久久久| 国产黄色免费在线视频| 中文字幕最新亚洲高清| 亚洲精品中文字幕在线视频| 久久婷婷青草| 如日韩欧美国产精品一区二区三区| 一本大道久久a久久精品| 国产伦理片在线播放av一区| 一本—道久久a久久精品蜜桃钙片| 日韩中文字幕欧美一区二区 | 如日韩欧美国产精品一区二区三区| 国产在视频线精品| 黄片播放在线免费| 丝瓜视频免费看黄片| a级毛片在线看网站| av国产久精品久网站免费入址| 久久久精品区二区三区| 精品少妇黑人巨大在线播放| 国产精品国产三级专区第一集| 日本猛色少妇xxxxx猛交久久| 中文字幕亚洲精品专区| 美女脱内裤让男人舔精品视频| 欧美另类一区| tube8黄色片| 丝袜人妻中文字幕| 美国免费a级毛片| 人人妻人人爽人人添夜夜欢视频| 日韩三级伦理在线观看| 最近2019中文字幕mv第一页| 人人妻人人爽人人添夜夜欢视频| 少妇人妻 视频| 不卡av一区二区三区| 国产野战对白在线观看| 国产在视频线精品| 涩涩av久久男人的天堂| 中文字幕人妻丝袜制服| 精品久久久久久电影网| 欧美 亚洲 国产 日韩一| 精品视频人人做人人爽| 欧美日韩成人在线一区二区| 国产精品久久久久成人av| 久久久精品免费免费高清| 成人国语在线视频| 在线亚洲精品国产二区图片欧美| 亚洲国产精品一区二区三区在线| 啦啦啦在线免费观看视频4| 日韩制服丝袜自拍偷拍| 亚洲av国产av综合av卡| 国产精品嫩草影院av在线观看| 国产一区二区三区综合在线观看| 777米奇影视久久| 国产爽快片一区二区三区| 久久久亚洲精品成人影院| 一级毛片我不卡| 黄片小视频在线播放| 精品一区二区免费观看| 男人舔女人的私密视频| 卡戴珊不雅视频在线播放| 天堂8中文在线网| 亚洲欧洲日产国产| 欧美日韩精品网址| videosex国产| 精品一区二区三区四区五区乱码 | 18禁观看日本| 婷婷色麻豆天堂久久| 男男h啪啪无遮挡| 午夜91福利影院| 婷婷成人精品国产| 亚洲人成电影观看| 久久韩国三级中文字幕| 熟女av电影| 一本—道久久a久久精品蜜桃钙片| 天堂俺去俺来也www色官网| 精品人妻偷拍中文字幕| 久久国内精品自在自线图片| 国产在线视频一区二区| 国产片内射在线| 欧美97在线视频| av免费观看日本| 亚洲欧美一区二区三区国产| 99国产综合亚洲精品| 日本爱情动作片www.在线观看| 1024香蕉在线观看| 精品久久久久久电影网| 麻豆精品久久久久久蜜桃| 免费女性裸体啪啪无遮挡网站| 久久久久视频综合| 日本wwww免费看| 秋霞在线观看毛片| 大陆偷拍与自拍| 亚洲成国产人片在线观看| 精品少妇内射三级| 久久精品aⅴ一区二区三区四区 | www.av在线官网国产| a级片在线免费高清观看视频| 国产一区二区在线观看av| 性色av一级| 在线看a的网站| 亚洲美女视频黄频| 国产视频首页在线观看| 美女视频免费永久观看网站| 宅男免费午夜| 日本色播在线视频| 热re99久久国产66热| 久久精品久久久久久久性| 97精品久久久久久久久久精品| 国产老妇伦熟女老妇高清| 欧美人与善性xxx| 午夜激情久久久久久久| 国产在线一区二区三区精| 成人手机av| 啦啦啦视频在线资源免费观看| 久久av网站| 中文欧美无线码| 99久国产av精品国产电影| 成人亚洲精品一区在线观看| 青春草亚洲视频在线观看| 精品亚洲乱码少妇综合久久| 人成视频在线观看免费观看| 中文字幕精品免费在线观看视频| 不卡视频在线观看欧美| 男女边吃奶边做爰视频| 97在线人人人人妻| 两性夫妻黄色片| 国产精品无大码| 岛国毛片在线播放| 一级片免费观看大全| 咕卡用的链子| 亚洲精品一二三| 国产精品欧美亚洲77777| 国产在线一区二区三区精| 亚洲精品视频女| 不卡av一区二区三区| 欧美日本中文国产一区发布| 伦理电影免费视频| 精品亚洲乱码少妇综合久久| 久久女婷五月综合色啪小说| 一级毛片电影观看| 久久精品夜色国产| 狠狠婷婷综合久久久久久88av| 高清av免费在线| 三上悠亚av全集在线观看| 久久99一区二区三区| 一二三四中文在线观看免费高清| 成年女人在线观看亚洲视频| 欧美人与性动交α欧美精品济南到 | 人妻一区二区av| 多毛熟女@视频| 美女国产高潮福利片在线看| 欧美国产精品va在线观看不卡| 亚洲男人天堂网一区| 欧美精品国产亚洲| 国产日韩欧美亚洲二区| 亚洲精品自拍成人| 99热网站在线观看| 日韩一卡2卡3卡4卡2021年| 国产亚洲一区二区精品| 欧美日韩一区二区视频在线观看视频在线| 精品一区二区三区四区五区乱码 | 9色porny在线观看| 高清在线视频一区二区三区| 少妇人妻 视频| 国产亚洲一区二区精品| 日韩av在线免费看完整版不卡| 欧美 亚洲 国产 日韩一| 欧美激情极品国产一区二区三区| 99热网站在线观看| 麻豆乱淫一区二区| 肉色欧美久久久久久久蜜桃| 黑人猛操日本美女一级片| 飞空精品影院首页| 汤姆久久久久久久影院中文字幕| 久久韩国三级中文字幕| 国产毛片在线视频| 免费不卡的大黄色大毛片视频在线观看| 国产爽快片一区二区三区| 日韩精品有码人妻一区| 午夜老司机福利剧场| 中文字幕制服av| 叶爱在线成人免费视频播放| 亚洲欧洲国产日韩| 亚洲精品国产av蜜桃| 少妇被粗大猛烈的视频| 男人舔女人的私密视频| 亚洲欧洲国产日韩| 自线自在国产av| 十分钟在线观看高清视频www| 丁香六月天网| 最近最新中文字幕免费大全7| 中文字幕色久视频| 亚洲欧洲精品一区二区精品久久久 | 看十八女毛片水多多多| 成人影院久久| 国产亚洲av片在线观看秒播厂| 亚洲欧洲国产日韩| 精品99又大又爽又粗少妇毛片| 中文字幕人妻熟女乱码| 自线自在国产av| 一区二区av电影网| 亚洲欧美一区二区三区国产| 久久久亚洲精品成人影院| 侵犯人妻中文字幕一二三四区| 午夜日本视频在线| 久久久精品区二区三区| 国产熟女午夜一区二区三区| 亚洲精品中文字幕在线视频| 91aial.com中文字幕在线观看| 亚洲欧美清纯卡通| 久久精品国产a三级三级三级| 亚洲av男天堂| 日韩精品免费视频一区二区三区| 多毛熟女@视频| 亚洲久久久国产精品| 亚洲,一卡二卡三卡| 久久久久久久久久久免费av| 亚洲婷婷狠狠爱综合网| 丝袜美腿诱惑在线| 我要看黄色一级片免费的| 伊人亚洲综合成人网| 久久精品久久久久久久性| 国产欧美日韩综合在线一区二区| 熟妇人妻不卡中文字幕| 日本wwww免费看| 日本欧美视频一区| 成人影院久久| 五月开心婷婷网| 国产精品熟女久久久久浪| 视频在线观看一区二区三区| 久久人人爽人人片av| 中文欧美无线码| 伊人久久大香线蕉亚洲五| 国产成人精品婷婷| 国产色婷婷99| 男女高潮啪啪啪动态图| 伦精品一区二区三区| 国产av国产精品国产| 丝袜美腿诱惑在线| 一级a爱视频在线免费观看| 国产精品成人在线| 最近的中文字幕免费完整| 欧美日韩视频精品一区| 三上悠亚av全集在线观看| 美女国产视频在线观看| 9热在线视频观看99| 男女免费视频国产| 国产黄色视频一区二区在线观看| 午夜av观看不卡| 久久精品国产a三级三级三级| 大片电影免费在线观看免费| 1024香蕉在线观看| 色播在线永久视频| 亚洲欧美精品自产自拍| 久久精品夜色国产| 欧美bdsm另类| 日本91视频免费播放| 亚洲国产av新网站| 男女无遮挡免费网站观看| www.熟女人妻精品国产| 欧美+日韩+精品| 天天躁日日躁夜夜躁夜夜| 欧美精品一区二区大全| 超碰97精品在线观看| 又大又黄又爽视频免费| 在线观看一区二区三区激情| 亚洲内射少妇av| 亚洲,欧美精品.| 午夜日韩欧美国产| 亚洲精品aⅴ在线观看| 黄网站色视频无遮挡免费观看| 国产欧美日韩综合在线一区二区| 天天影视国产精品| 国产精品女同一区二区软件| 久久国产精品大桥未久av| 亚洲四区av| 久久精品亚洲av国产电影网| 香蕉精品网在线| 女人精品久久久久毛片| 久久久精品免费免费高清| 日日爽夜夜爽网站| 狠狠婷婷综合久久久久久88av| 国产精品99久久99久久久不卡 | 不卡视频在线观看欧美| 91精品国产国语对白视频| 日韩熟女老妇一区二区性免费视频| 亚洲欧美一区二区三区久久| 纵有疾风起免费观看全集完整版| 久久久精品区二区三区| 波多野结衣一区麻豆| 97在线人人人人妻| 亚洲内射少妇av| 尾随美女入室| 黄色怎么调成土黄色| 久久久久国产网址| 美国免费a级毛片| 男的添女的下面高潮视频| 一区二区三区激情视频| 日韩精品有码人妻一区| 欧美成人午夜免费资源| 爱豆传媒免费全集在线观看| 亚洲视频免费观看视频| 欧美bdsm另类| av在线老鸭窝| 国产精品 欧美亚洲| 亚洲,欧美精品.|