• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    IQR-based approach for DDoS detection and mitigation in SDN

    2023-07-31 13:30:28RochkSwmiMynkDveVirenderRng
    Defence Technology 2023年7期

    Rochk Swmi ,Mynk Dve ,Virender Rng

    a Department of Computer Engineering, National Institute of Technology, Kurukshetra, India

    b Department of Information Technology, Delhi Technological University, Delhi, India

    Keywords:SDN DdoS IQR Controller CPU utilization Packet_in

    ABSTRACT Software-defined networking(SDN)is a trending networking paradigm that focuses on decoupling of the control logic from the data plane.This decoupling brings programmability and flexibility for the network management by introducing centralized infrastructure.The complete control logic resides in the controller,and thus it becomes the intellectual and most important entity of the SDN infrastructure.With these advantages,SDN faces several security issues in various SDN layers that may prevent the growth and global adoption of this groundbreaking technology.Control plane exhaustion and switch buffer overflow are examples of such security issues.Distributed denial-of-service(DDoS)attacks are one of the most severe attacks that aim to exhaust the controller's CPU to discontinue the whole functioning of the SDN network.Hence,it is necessary to design a quick as well as accurate detection scheme to detect the attack traffic at an early stage.In this paper,we present a defense solution to detect and mitigate spoofed flooding DDoS attacks.The proposed defense solution is implemented in the SDN controller.The detection method is based on the idea of an statistical measure -Interquartile Range (IQR).For the mitigation purpose,the existing SDN-in-built capabilities are utilized.In this work,the experiments are performed considering the spoofed SYN flooding attack.The proposed solution is evaluated using different performance parameters,i.e.,detection time,detection accuracy,packet_in messages,and CPU utilization.The experimental results reveal that the proposed defense solution detects and mitigates the attack effectively in different attack scenarios.

    1.Introduction

    In the generation of rapid deployment of cloud infrastructure for demanding applications,traditional network switching architectures are inefficient.This is because these architectures are difficult to reconfigure and program for changing requirements.The traditional switching networks are based on a strong coupling of data and control planes as these planes are tightly integrated with each other.Data plane include different forwarding devices such as routers,switches,etc.The control plane is responsible for implementing control logic for the forwarding decisions taken by the data plane devices.The network management tasks in these networks are complex,time-consuming,and costly.For example,in case of requiring an update or adding a new policy in the existing mechanisms,the essential modifications are to be made on all the forwarding devices in the entire network.Software-defined networking (SDN) technology has been developed recently to address such challenges.SDN enables the flexibility and automation in network configuration for current and future networks in order to improve the performance of the networks.SDN offers a centralized network intelligence in one network component (i.e.,control plane) by separating the control logic from forwarding devices[1,2].In SDN,the complete control logic is employed in the control plane that may consist of one or more controllers [3].The functions of the controller in SDN are to manage all the forwarding devices and to take the routing decisions.The communication between controller and forwarding devices is offered by an standard protocol such as OpenFlow [2,4,5].OpenFlow was developed by Open Net-working Foundation (ONF),and came into existence in 2008 [6].These properties of SDN provide a programmable,cost effective,and less time-consuming mechanism over traditional networks [7].However,this effective and intelligent technology also introduces several security vulnerabilities that already exist in traditional networks [8].The adversaries exploit vulnerabilities of traditional networks to launch various attacks.One of such popular attacks is known as Distributed denial-of-service(DDoS)attack[9].

    DDoS is considered as one of the most disastrous attacks that target government and business organizations.It aims to disrupt the normal functioning of the network by sending a massive amount of network traffic towards the victim and makes the normal users suffer from the unavailability of the service or network's resources [10-14].DDoS attacks are growing rapidly with time.The prime goal of DDoS attacks is to exhaust or overload the resources of the victim machine.DDoS attacks attempt to violate the availability of the system.In SDN,since controller is the most sensitive and intelligent entity of the complete network,it is,therefore,the most favorite target point of the attackers [15,16].Although,DDoS attack also affects switch and switch-controller channel,which creates switch’s flow table overflow and switchcontroller bandwidth consumption.The controller exhaustion can collapse the entire SDN network.By default,if the switch receives a new packet and does not find any matching flow rule in its flow tables,a message is forwarded to the controller in the form of packet_in message for taking an appropriate routing decision.The controller then sends a flow modification rule (Flow_Mod) to the switch to update its flow table as per the latest received flow rules.This Flow_Mod rule avoids the transferring of packet_in messages coming from the same source to the controller.This is because switch can take decisions by following the rules placed in flow table.In case of spoofed flooding DDoS attack,the attacker sends a large number of packets from various random IP addresses to the switch.When the switch does not find any matching rule in the flow tables for the incoming packet,a large number of packet_in messages is sent to controller for handling.This flooding of packets intends to exhaust the controller's resources,which creates a disruption to use the controller's services for normal users.Since the controller manages the complete network,DDoS attacks on the controller can jeopardize the working of the entire SDN network.Therefore,a defense solution against spoofed flooding DDoS attacks for SDN is necessary to be designed,which can provide timely detection and mitigation of the attacks.Various defense solutions to defend against such DDoS attacks have been proposed for SDN in the literature [17-28].Most of the presented solutions are classified into two categories,i.e.,statistical-based and machine learningbased.Statistical-based solutions are more preferable in the aspect of performance over machine learning-based solutions[29].This is because machine learning methods create a heavy computational burden and have challenging data requirements.Thus,statistical-based solutions are more favorable for real-time scenarios and motivate us to work on designing an statisticalbased defense solution.Therefore,in this research work,an statistical measure-Interquartile Range(IQR)based defense solution is proposed to detect the spoofed flooding DDoS attacks.IQR is based on the idea of placing the data values in different quartiles.Data values that violate the IQR-rule are considered as outliers.These outliers indicate a situation of suspicious network traffic and the respective source hosts of suspicious traffic are marked as attackers.SDN is capable enough to take appropriate defensive action if any malicious behaviour is detected.Thus,SDN-in-built functionalities are utilized to mitigate the attack after the detection of attackers.SYN flooding attack is one of the most used DDoS attacks as it can target the bandwidth,memory,and CPU of the controller in case of a large number of requests.This is the reason that we selected this attack to evaluate the proposed solution in this work.In the proposed work,SYN flooding attack is launched with a number of random spoofed IP addresses as illustrated in Fig.1.This type of DDoS attack affects the controller with more dangerous effects than a non-spoofed attack due to flooding from a large number of sources.An analysis related to this study has been presented in Ref.[30].

    Fig.1.Spoofed SYN flooding attack in SDN.

    The key contributions of the paper are summarized as follow:

    -We propose and implement a defense solution to detect and mitigate spoofed SYN flooding attack in SDN.The detection method is based on IQR measure,which is applied on the receivedpacket_inmessages at a time interval followed by attacker detection.After attack detection,the mitigation is performed by blocking the identified attackers.

    -We perform the experimental assessment considering different attack scenarios.The performance of the detection method(IQR)is evaluated in terms of detection time,detection accuracy in respect to the attacker's identification.

    -The performance evaluation of the mitigation module is analyzed in terms of CPU utilization of controller andpacket_inmessages in three cases,i.e.,with no attack,under attack without defense,and with defense.

    The remaining paper is organized in different sections as follows.Section 2 provides an overview of the existing SDN-based DDoS detection and mitigation mechanisms.Section 3 discusses our proposed defense solution,including its important modules.Section 4 introduces the simulation setup used for the experiments and presents an explanation of the evaluation results.The paper is concluded in Section 5.

    2.Related work

    In this section,relevant existing research works to defend against flooding DDoS attacks present in the literature are discussed.Flooding attacks are the most frequent DDoS attacks that slow down or crash the services by exhausting the resources of a system.SYN flooding attack is the most attempted DDoS attack among all the flooding attacks.Various defense solutions have been proposed and suggested in recent years to analyze the impact of DDoS attacks by the researchers.A few defense solutions are based on SDN specific network traffic and implemented in the SDN components.Mohammadi et al.[36] proposed a defense mechanism “SLICOTS" to defend the SDN network against SYN flooding attack.The detection logic is deployed in the controller.The proposed mechanism is implemented in OpenDaylight controller as an extension module.As per the proposed mechanism,a record is maintained with the counts of different types of TCP flags for a particular host.When the count of the records of respective host reaches threshold value,the malicious packet is dropped,and a flow rule is placed in the flow table to make the dropping of malicious packets.Kumar et al.[17]suggested a defense system named“Safety" that provides mitigation of SYN flooding attack.The proposed system is based on entropy variation for attack detection.The entropy is computed on destination IP and TCP flags.Performance is evaluated using CPU usage of the victim and controller,and attack detection time.One more entropy based defense mechanism was introduced by Kalkan et al.[18].The proposed mechanism named joint entropy-based security scheme (JESS) detects and mitigates the DDoS attacks.For attack detection,entropy is computed on the destination IP and different attributes of TCP layer.This is the first defense mechanism with the integration of joint entropy metric for SDN.It has the capability to mitigate unknown attacks also.The performance assessment of JESS is measured in terms of accuracy and false positive rate.Results indicate that JESS performs effectively with good performance results.Piedrahita et al.[34] presented a lightweight and fast DDoS detection mechanism named as FlowFence for SDN.The proposed detection approach is based on a congestion condition used to check the bandwidth utilization.The switches in the SDN network monitor the network traffic,and if the congestion happens,the controller is notified about the situation.The controller takes appropriate action against the congestion.The results indicate that FlowFence reduces the congestion in the network but does not prevent the attack completely.In Ref.[37],Buragohain et al.proposed a defense system,namely,FlowTrApp for data centers in SDN.The defense logic works on metrics,i.e.,flow rate and flow duration.These metrics decide the sending rate and flow duration used by normal hosts.The defense mechanism decreases the controller’s burden.In Ref.[22],an entropy based flooding DDoS detection technique is proposed for SDN.The proposed detection method is implemented on POX controller.The performance of solution is not measured using any standard metric.Also,it does not provide any mitigation scheme to reduce the CPU usage of the controller.Niyaz et al.[19] suggested a defense mechanism based on deep learning against flooding attacks(TCP,UDP,and ICMP)for SDN.The detection module is deployed on the POX controller.The performance assessment is done considering the parameters,i.e.,accuracy,precision,recall,and F-measure.Conti et al.[33] presented a detection approach for the detection of DDoS attacks in SDN.An statistical method,i.e.,cumulative sum and adaptive threshold is used as a detection method in the presented approach.Performance of the detection method is analyzed using detection time and detection accuracy.However,it does not provide any mitigation for the real-time attack situation.In Ref.[32],a timeseries based detection method is studied.Dehkordi et al.[25]presented an entropy and classification based detection mechanism against both the low and higher rate DDoS attacks.Results indicate that the detection mechanism achieves high accuracy but does not provide any mitigation solution,i.e.,it does not improve the performance of the controller.

    Most of the existing statistical-based DDoS detection techniques utilized the concept of entropy in SDN.In this paper,we use IQR measure as a detection method.To the best of our knowledge,the IQR-based defense solution has been utilized for the first time in the SDN environment.More-over,few defense solutions provide the mitigation of the attacks in SDN.Our proposed defense solution detects the attack as well as reduces the impact of the attack on the controller.Details of some existing DDoS defense solutions are presented in Table 1.It also provides a theoretical comparison of existing defense solutions with the proposed solution.As per the comparison provided in Table 1,the research works [19,22,25,31-33] provide the detection of the DDoS attack.These works do not mitigate the DDoS attack,i.e.,do not reduce the impact of attack on the controller.But the proposed defense solution detects the attack as well mitigates the attack on the controller.Therefore,it can be said that the proposed work provides better performance as compared to other research works mentioned in Table 1.

    Table 1 Comparison of some existing defense mechanisms against DDoS attacks in SDN with the proposed defense solution.

    3.Proposed defense solution

    This section introduces the proposed defense solution that offers timely detection and mitigation of spoofed SYN flooding attack in SDN networks.Firstly,the base component of the proposed solution,i.e.,statistical measure -“Interquartile Range (IQR)" is discussed.Secondly,we present the designed architecture of the proposed solution and different modules in the form of algorithms.

    3.1.Interquartile Range (IQR)

    IQR is a popular outlier detection method.An outlier rep resents a value,which deviates from the overall pattern of data[38].Outlier detection has been widely used to detect anomalies.It can be defined in simple words as“something that is significantly different from others".There are various existing methods to identify the outliers,i.e.,Z-score,IQR(univariate)and Density-based clustering,distance-based outlier detection,isolation-forest (multi-variate).However,IQR is one of the most commonly used outlier detection methods.IQR can be defined as a measure of statistical dispersion.IQR is a univariate method in statistical modeling,which utilizes a measure “median" to locate the different data points.The use of measures like median,mean,and mode depends on two factors,i.e.,type of variability and presence of outliers.In the case of less variability and no outliers,mean and standard deviation are used as statistical measures to classify the data.But if there is a chance of much variability and outliers,median and IQR are preferred to use.

    IQR is computed by dividing number of data points into different quartiles.A quartile is a type of quantile that exactly divides the number of data points (ordered in ascending manner) into four quarters,which are of approximately equal sizes.The data points are separated using three quartiles indicated byQ1,Q2,andQ3,mathematically.Q1,Q2,Q3 represent first,second,and third quartile,respectively.In simple words,it can be said that the middle 50%of ascendingly ordered data resembles IQR.Mathematically,IQR is defined as the difference betweenQ3 andQ1,as shown in Eq.(1).

    The following steps are involved in determining the value of IQR.

    1.Compute median (Q2) of the whole data.

    2.Compute first(Q1)and third(Q3)quartiles by taking median of lower half and upper half of the data.

    3.Compute IQR using Eq.(1).

    In Ref.[39],Tukey et al.presented 1.5×IQR-fences to be used as IQR-rule to mark the possible outliers.According to the proposed IQR-rule (1.5 × IQR),two Eq.(2) and Eq.(3) are utilized as lower bound and upper bound,respectively.The data values that are below lower bound and that are above upper bound are flagged as outliers.

    3.2.Architecture and functionalities

    In this section,the working of the proposed defense solution is discussed.Fig.2 presents a flowchart of the overall architecture of the defense solution.The overall architecture is based on two working modules: detection module and mitigation module.The detection module is responsible for the detection of malicious traffic.The proposed solution utilizes the concept of outlier detection to identify malicious traffic.Detection method is based on IQR statistical measure acting as a classifier to classify the traffic into attack and normal classes.The key objective of the detection module is to identify the hosts that present significantly different behaviour.The host that shows anomalous behaviour is called an outlier host.As per the proposed detection method,the host from where a large amount of malicious traffic received is marked as an outlier host.There are two equations (Eq.(2) and Eq.(3)) for calculating IQR.To detect the spoofed SYN flooding attack,Eq.(3)is used in the proposed defense solution.The existing Eq.(3) adds some delay in the attack detection.Therefore,the equation is modified as per the requirement of the detection method.For the required modification,many experiments are conducted to determine an appropriate value ofupper bound.The selection ofupper bounddepends on the improvement in the attack detection time.The modified Eq.(3) is shown in Eq.(4),where y is a tuning parameter.In the proposed solution,tuning parameter is used to enhance the performance of the detection method in terms of responsiveness (attack detection time).

    Fig.2.Flowchart for proposed defense solution.

    The working logic of the detection method can be understood in the context of our work as follows.When network traffic is monitored in the case of spoofed SYN flooding DDoS attack,it can be observed that the victim host receives a large number of SYN requests from attacker hosts as compared to other normal hosts.These spoofed SYN requests are sent to controller aspacket_in.On the receiving a number ofpacket_inmessages,some important measures likeQ1,Q2,Q3,IQR,andupper boundare computed at a time interval.Theupper boundis utilized as a threshold to check the number ofpacket_inmessages received at the controller.It acts as an essential condition to decide if a host is suspicious or normal.In the normal (non-attack) scenario,thepacket_inreceived at the controller by switch are below theupper bound.Thus,there is no outlier (malicious behaviour) detected.However,in an attack scenario,the count ofpacket_inreceived is greater than theupper boundlimit.This kind of behaviour will be flagged as an attack scenario.The victim host and source of the attack are the output provided by the detection module.The source of the malicious traffic can be identified as an outlier.This logic is deployed as an attack detection method in the proposed solution.In the proposed work,source of the attack is located withdpid(datapath identifier)of the respective switch and itsin_port.When the attachment point of the attacker host (dpid,in_port) is identified,working of the mitigation module is started.

    The proposed defense solution consists of three procedures:

    PAcket_IN_HANDLER,DETECTION_MODULE,andMITIGATION.Pseudo-codes of these procedures are presented in Algorithms 1,2,and 3.Table 2 lists out different symbols and their respective explanations used in the proposed algorithms.

    Table 2 Symbols and definitions.

    3.3.Description of PAcket_IN_HANDLER procedure

    Pseudo-code ofPAcket_IN_HANDLERprocedure is presented in Algorithm1.ThePAcket_IN_HANDLERprocedure is implemented as a modified version ofpacket_in_handler,i.e.,standard method of the SDN controller (Ryu).packet_in_handleris executed after the reception of thepacket_inmessage from the SDN switch.This method is responsible for the handling ofpacket_inmessages and installing the new flow rules in the switch to process the further incoming packets.Similarly,PAcket_IN_HANDLERprocedure is executed whenever apacket_inmessage is received at the controller.According to the proposed solution,rules are set in the switches in such a way that spoofed SYN packets are sent to the controller by default.In the proposed solution,two threshold values are used to check on the suspicious traffic.Firstly,upper_boundacts as a threshold for identifying if the respective host is normal or suspicious.After that,dcount(p)is used as a block threshold.The block threshold reduces the chance of permanent blocking of falsely detected hosts as suspicious.This is why,when an attack scenario is identified,corresponding dpid,inport(attachment point of the suspicious host)as the source of malicious traffic are stored in a suspicious state.The network traffic from such a suspicious host is allowed to the victim host until the block threshold meets its limit condition.The source of the victim host is permanently blocked when the block threshold reaches its threshold and marked as an attacker.We have considered the value of p as 5.In theupper_boundcondition,a tuning parameter (y) is also used to quickly detect the attack situation.

    This procedure performs some major functions:

    -Early detection of the blacklisted host and dropping the malicious packet without going through the whole detection process

    -Maintains an info table(info)to store the information related to the incoming packet_in messages

    -ExecutesDETECTION_MODULEprocedure after fixed time interval to check on the suspicious hosts.

    3.4.Description of DETECTION_MODULE procedure

    TheDETECTION_MODULEprocedure is an important part of the proposed defense solution.This procedure is responsible for two major functions: Checks and identifies the malicious hosts as outliers present in the info table (info);Maintains a blacklist table(blacklist) to store the information related to suspected and permanently blocked hosts.Pseudo code ofDETECTION_MODULEis presented in Algorithm 2.The necessary computations(i.e.,Q1andQ2) are made on the count ofpacket_inmessages received from different hosts to detect the malicious hosts.InDETECTION_MODULEprocedure,the IQR method is deployed to compute the thresh old (i.e.,upper_bound).All the hosts ininfoare checked againstupper_boundand if any of the host does not satisfy the threshold condition,a“suspicious scenario situation"is labeled,and then the victim host(dstip)with their respectivedpid,inportis inserted into the blacklist table (black list).After the victim host is detected,itsdpidof the corresponding switch andinportare identified as the source of the victim host.The source host is marked as an attacker and blocked permanently if it is under suspicion for p times.Then the attachment point(dpid,inport)from where attack traffic comes,is passed to theMITIGATIONprocedure.MITIGATIONprocedure is executed every time upon detection of the attacker host.Also,the entry of the located attacker host is removed frominfo.

    Algorithm 1.Psuedo-code of PAcket_IN_HANDLER procedure

    3.5.Description of MITIGATION procedure

    After the processing ofDETECTION_MODULEis over,mitigation of the attack is performed.The pseudo-code of theMITIGATIONprocedure is presented in Algorithm 3.The primary function of the mitigation module is to prohibit malicious packets.This is achieved by SDN-in-built functionalities.As per these functionalities,a flow modification rule is installed in the flow table of switch,enabling the dropping of packets from the detected attachment point(dpid,inport)of the attacker host.The working flow of mitigation strategy is described in Fig.3.

    Fig.3.Mitigation procedure after attacker's detection in the proposed defense solution.

    Algorithm 2.Psuedo-code of DETECTION_MODULE procedure

    Algorithm 3.Psuedo-code of Mitigation procedure

    4.Simulation setup and performance analysis

    In this section,the required network setup to carry out the experiments is discussed.The experimental topology is presented in Section 4.1.Section 4.2 provides a discussion of the considered parameters to evaluate the performance of the proposed solution and analyzes the performance results.All the experiments are performed on an SDN emulator -Mininetv2.3.0d6 [40].Mininet creates a virtualized network scenario consisting of hosts,switches,and links on a single Linux kernel and provides the flexibility of custom topologies.The OpenFlow supported Open vSwitch (OVS)v2.9.5[41]is used,which supports the virtual ports and routing of network traffic.In SDN network,a 64-bit identifier calleddpid(Datapath Identifier) is associated with each virtual switch(OpenFlow-based).Eachdpidcontains some virtual ports identified byin_port.Ryuv4.32[42]is utilized as SDN controller,on which the defense solution is implemented.A standard protocol “OpenFlow"v1.3 is used to make the communication between switches and controller possible.For generating TCP traffic,a Python based packet generation tool named Scapy [43] is used.For conducting experiments,attacker host is allowed to send attack traffic for 600 s.The detection module is executed repeatedly after every 25 s to check for suspicious hosts.Table 3 presents a brief overview of the setup details.

    Table 3 Experimental setup.

    4.1.Experimental topology

    The experimental topology consists of 1 OVS and 21 hosts.All the hosts use a bandwidth of 100 Mbps.Open vSwitch is connected with Ryu controller.The simulations are con-ducted on different attack scenarios (as presented in Fig.4).Each attack scenario consists of number of attacker and normal hosts (non-attacker).In all the scenarios,every attacker sends the spoofed SYN packets at rates varying from 50 to 300(50,100,150,200,250,300)packets/second.These scenarios are discussed as below:

    Fig.4.SDN topology used in the experiments.

    -Scenario-A1:In this scenario,the number of attacker and normal hosts are 1 and 4,respectively.The attacker sends spoofed SYN packets at different rates.One host is considered as a victim.

    -Scenario-A2: The number of attackers is 2 and 8 hosts act as normal hosts inScenario-A2.Each of the attackers sends the spoofed SYN packets at different rates as similar toScenario-A1.One host acts as a victim.

    -Scenario-A3: In this scenario,3 hosts are used as attackers and 12 hosts are used as normal hosts.All the attackers send the spoofed SYN packets at different packet rates.

    -Scenario-A4:In this scenario,the number of attacker and normal hosts is 4 and 16,respectively.The attack is simulated at different packet rates from all the attacker hosts.

    4.2.Performance evaluation

    This section discusses an analysis of the results of the proposed defense solution in respect of different performance parameters.

    4.2.1.Evaluation parameters

    The effectiveness of the proposed defense solution is measured using different evaluation parameters.The proposed solution is based on two working modules,i.e.,detection and mitigation.The detection module is evaluated in terms of detection time and detection accuracy.The impact of spoofed SYN flooding attack on the controller is analyzed in terms ofpacket_inmessages received and CPU usage of the controller under attack with mitigation strategy.The definitions of the evaluation parameters are as follows:

    -Average attacker's detection time(AADT):It is defined as the time interval between the first SYN packet sent by the attacker and attack detection by the SDN controller.AADTis presented in Eq.(5).

    wheretdetectioniandtlaunchiare the time of attacker detection and initiation of the first attack packet from theith attacker.nattactersis the number of attackers present in the network.

    whereatrue,ntruerepresent the number of correctly detected attackers and normal hosts (non-attackers),respectively.afalse,nfalseare wrongly detected attackers and normal hosts,respectively.

    -Attacker's detection accuracy(ADA): It is defined as the ratio of total number of correctly detected observations (attackers and normal hosts) over all the observations made by the detection method.ADA is shown in Eq.(6).

    -Number of packet_in messages:It represents the total number ofpacket_inmessages received at the controller.These are sent by the switch as they are unable to handle the spoofed packets.Packet_inis an OpenFlow message that can be captured on an OpenFlow port by monitoring the respective interface.

    -Average CPU usage of the controller: It is defined as the CPU consumption of the running SDN controller.The CPU usage is calculated by monitoring the respective process id (PID) of the controller for a duration.In this work,CPU usage is monitored for the Ryu controller.

    4.3.Simulation results

    For performance evaluation of the proposed defense solution,many experiments are conducted on all the scenarios as discussed in Section 4.1.In this section,the performance of the proposed detection method is analyzed in terms of attacker's detection time and detection accuracy.We also analyze the impact of spoofed SYN flooding attack on the controller in terms of CPU usage and receivedpacket_inmessages for both the cases,i.e.,under attack with and without defense.

    4.3.1.Performance of detection method in terms of attacker's detection time

    The timely detection of any malicious behaviour is very important for the applications of cyber security.Considering this major aspect,we have evaluated the performance of the proposed detection method in terms of detection time.Fig.5 presents average attacker detection time to identify the present attackers in the SDN network with varying packet rates for all the scenarios.The detection time is computed by calculating an average of the time taken to detect each attacker in a scenario.These scenarios are indicated byScenarioA1,Scenario-A2,Scenario-A3,andScenario-A4.It can be seen that attacker’s detection time does not increase over 157 s for all the scenarios.Scenarios-A1 outperforms all other attack scenarios(A2,A3,and A4) over all the other packet rates in terms of attacker detection time.The detection time increases when the number of attackers is increased.The proposed mechanism achieves maximum detection time to detect the most aggressive attackers in the case of Scenario A4,i.e.,attack at the packet rate of 300 packets/second.It can be concluded from the achieved results that an increase in number of attackers and attack packet rate does not affect the detection time as much.Although,it takes less time to detect only one attacker at less packet rate than multiple attackers at a higher rate as shown in Fig.5.

    Fig.5.Average detection time to detect attackers with varying packet rates for different scenarios.

    4.3.2.Performance of detection method in terms of attacker's detection accuracy

    Accuracy is another important parameter to evaluate the performance of a designed scheme.We assessed the detection accuracy of the proposed defense solution in different attack scenarios,as shown in Fig.6.It shows the performance of the defense solution in terms of accuracy,considering the presence of both the attackers and normal hosts.Fig.6 shows the achieved accuracy concerning elapsed time and different packet rates.Fig.6(a) presents the achieved accuracy by the proposed solution in case of attackScenarioA1.It can be seen from the figure that the accuracy of the defense solution is perfect as 100% inScenario-A1at all the packet rates.Also,accuracy does not get affected by the elapsed time with the presence of normal hosts.Accuracy achieved by defense solution in case of attackScenario-A2is presented in Fig.6(b).It can be observed that in the case ofScenario-A2,the defense solution performs best by achieving 100%detection accuracy at the packet rates of 100,150,200,250,and 300 packets/second during the elapsed time.With the packet rate of 50 also,it achieves 100% detection accuracy initially.Later,accuracy decreases with time after some time has elapsed,and it reaches 90%.Similarly,Fig.6(c) and (d)present the accuracy variation as per the time and different packet rates in the case ofScenario-A3andScenario-A4,respectively.It can be observed from the results that in theScenario-A3also,accuracy remains 100%initially with all the packet rates.With the time elapsed,accuracy decreases to 93%at the packet rate of 50 packets/second.In the case ofScenario-A4,the defense solution performs with accurate detection of attackers and normal hosts at the packet rates of 50,100,and 150 during the elapsed time.Whereas the detection accuracy at the packet rates of 200,250,and 300 varies as per the elapsed time.Initially,the proposed solution achieves 50% accuracy at the rate of 300.After that,accuracy increases to its maximum of 100% with the detection of all the attackers correctly.Finally,it decreases to the maximum of 95%as per the time.With the packet rates of 200 and 250 also,accuracy decreases with the time duration and the proposed defense solution achieves the overall accuracy of 95%.The detection accuracy decreases after some time because after detection of all the attackers correctly,some normal hosts can be identified as attackers mistakenly.However,by considering all the attack scenarios with all the used packet rates,it can be concluded that the proposed defense solution achieves a maximum of 100% accuracy in case of(Scenario-A1).In the DDoS attack scenarios (Scenario-A2,A3,A4),the defense scheme performs better by achieving a maximum of 95% and a minimum of 93% accuracy concerning time and all the packet rates.The number of attackers and normal hosts are added incrementally with respect to the network topologies used in the different attackScenario-A2,A3,A3.This creates an increase in the transmission ofpacket_inmessages even from the normal hosts,making the normal hosts suspected as an attacker due to being detected as an outlier.However,the block threshold(β)avoids the permanent blocking of normal hosts.

    Fig.6.Detection accuracy of the proposed defense scheme.

    4.3.3.Impact on controller in terms of packet_in messages

    In the case of spoofed flooding attack,a large number ofpacket_inmessages is forwarded to the controller by the SDN switch.This flooding ofpacket_inmessages creates a huge CPU overhead on the controller to be handled.Thepacket_inmessages are important to analyze the impact of the attack on the controller.Reducing the controller’s burden is one of the prime requirements of the SDN network in case of flooding DDoS.Therefore,in our work,we analyze the performance of the proposed solution in terms of number of packet_in messages received at the controller.Fig.7 shows a comparison of packet_in messages received in the case of under attack without defense and with defense for all the different attack scenarios (Scenario-A1,A2,A3,A4) with varying packet rates (50,100,150,200,250,300 packets/second).Increasing the packet rate and the number of attackers intends to the increased number of packet_in messages on the controller.It can be observed from the results that total number of packet_in messages increases with more intensity with the increase of number of attackers as compared to increase in the packet rate,which overburdens the controller.This is ensured from the comparison of packet_in messages values of Scenario-A1UnderAttack,A2UnderAttack,Scenario-A3UnderAttack,and Scenario-A4UnderAttackat different packet rates.Average value of packet_in messages received in case of Scenario-A1UnderAttackand Scenario-A1UnderAttack With Defense at different packet rates are 39080 and 15171,respectively.The average value of packet_in messages received in case of Scenario-A2UnderAttackand Scenario-A2UnderAttackWithDefenseat different packet rates are 82766 and 33365,respectively.Similarly,the average value of the packet_in messages received in the case of Scenario-A3UnderAttack,Scenario-A3UnderAttackWithDefenseand Scenario-A4UnderAttack,Scenario-A4UnderAttackWithDefenseat different packet rates are 129964,51038,and 176486,62378,respectively.It can be seen that the proposed solution reduces the number of incoming packet_in messages at the controller after identification of the potential attackers.This happens because the proposed solution firstly detects the existing attackers and blocks the respective dpid and in_port of the attacker to drop the attack packets.This blocking mitigates the impact of flooding attack on the controller effectively.

    Fig.7.Number of packet_in messages with varying packet rates for different scenarios.

    4.3.4.Impact on controller in terms of CPU usage

    The controller manages all the crucial functionalities for the entire SDN network making it the most attractive target point of the attackers.Spoofed flooding attacks exhaust the CPU on the controller by forwarding a large number ofpacket_inmessages as discussed in Ref.[30].This exhaustion of the controller degrades the performance of the network.Thus,the controller's CPU usage is one of the essential factors to be per second forScenario-A1,Scenario-A2,Scenario-A3,andScenario-A4,respectively.The monitored CPU utilization for the case of without attack remains consistent at a very less amount for all the scenarios.It can be seen in Fig.8(a)that the CPU usage lies between 16.43%and 30.1%at an increasing packet rate.The proposed solution reduces the CPU usage up to a maximum of 62.35%and a minimum of 37.07%in case of Scenario-A1UnderAttackWithDefense.The attack Scenario-A2UnderAttackWithoutDefenseconsumes the controller's CPU between the range of 26.45%and 40.15%.The solution decreases the CPU consumption up to a maximum of 57.11%and a minimum of 51.68%as shown in Fig.8(b).The CPU utilization for Scenario-A3UnderAttackWithoutDefenselies between 31.06%and 51.53%.Fig.8(c)shows the performance of the mitigation solution under the running attack traffic (Scenario-A3UnderAttackWithDefense),which reduces the CPU usage up to a maximum of 56.91% and a minimum of 50.99%.The average CPU usage of the controller in case of Scenario-A4UnderAttackWithoutDe-fensevaries between 36.10% and 66.34% as shown in Fig.8(d).The improvement in the CPU consumption observed in the case of Scenario-A4UnderAttackWithDefensevaries between 42.43% and 57.58%.The proposed solution reduces the CPU consumption in the case of attack.The CPU usage initially goes at a higher value,and then it decreases suddenly.It happens because the defense solution detects the attackers present in the network and then instructs the switch to drop the attack packets by blocking the correspondingdpid,in_portof the attacker.It can be concluded that the proposed defense solution is capable of mitigating the DDoS attack traffic coming from attackers and reducing the impact of attack on the controller’s CPU.

    Fig.8.Average CPU usage with varying packet rates for different attack scenarios.

    5.Conclusions and future work

    The SDN controller is the most attractive target point of the DDoS attackers due to its centralized nature.Currently,securing the controller from such attacks is the biggest challenging task in SDN.In this paper,we presented an statistical measure Interquartile Range(IQR)based technique to secure SDN networks from spoofed SYN flooding attack.The detection logic is applied to thepacket_inmessages received at the controller in every fixed time interval.After detection,mitigation is performed by blocking the identified attackers.The performance of the proposed defense solution is evaluated in terms of detection time,detection accuracy,packet_inmessages,and CPU utilization of the controller.The proposed defense solution is capable of timely detection as well as mitigation of the attack at the switch itself.The proposed solution has been designed to detect a single type of DDoS attack.Further,the defense solution is not evaluated on a large scale of normal hosts (nonattacker).In future,we aim to evaluate the proposed solution for various DDoS attacks on a larger scale in SDN.

    Declaration of competing interest

    The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

    欧美不卡视频在线免费观看| 精品午夜福利在线看| 中文字幕久久专区| 精品久久久久久久末码| 久久精品国产亚洲av香蕉五月| 91狼人影院| 在线看三级毛片| 久久久久久大精品| 国产乱人视频| 波多野结衣巨乳人妻| 国产 一区 欧美 日韩| 久久6这里有精品| 国产 一区精品| 国产精品一区二区三区四区免费观看 | 亚洲男人的天堂狠狠| 干丝袜人妻中文字幕| 免费看av在线观看网站| 亚洲欧美精品综合久久99| 欧美日韩亚洲国产一区二区在线观看| 欧美高清性xxxxhd video| 成年女人毛片免费观看观看9| 成人亚洲精品av一区二区| 亚洲av电影不卡..在线观看| 亚洲国产精品久久男人天堂| 成人综合一区亚洲| 韩国av一区二区三区四区| 国产精品野战在线观看| 午夜视频国产福利| 成人综合一区亚洲| 欧美最黄视频在线播放免费| 天堂av国产一区二区熟女人妻| av专区在线播放| 国产探花极品一区二区| 婷婷亚洲欧美| 熟女电影av网| 午夜福利高清视频| 中文字幕av成人在线电影| 亚洲真实伦在线观看| 深夜a级毛片| 精品久久久久久久久亚洲 | 国产精华一区二区三区| 欧美色视频一区免费| 国产成人aa在线观看| 狂野欧美白嫩少妇大欣赏| 亚洲精品456在线播放app | 美女免费视频网站| 香蕉av资源在线| 88av欧美| 亚洲国产欧美人成| 黄色视频,在线免费观看| 久久久精品欧美日韩精品| 国产精品爽爽va在线观看网站| 校园人妻丝袜中文字幕| 天天躁日日操中文字幕| 给我免费播放毛片高清在线观看| 久久久久九九精品影院| a在线观看视频网站| 日韩高清综合在线| 俺也久久电影网| 日本一二三区视频观看| 1024手机看黄色片| bbb黄色大片| 很黄的视频免费| 精品午夜福利视频在线观看一区| 国产亚洲欧美98| 乱码一卡2卡4卡精品| 看黄色毛片网站| 免费看光身美女| 网址你懂的国产日韩在线| 免费在线观看影片大全网站| 日韩人妻高清精品专区| 午夜影院日韩av| 成人国产麻豆网| 国产精品精品国产色婷婷| 日日干狠狠操夜夜爽| 99精品久久久久人妻精品| 免费看日本二区| 乱码一卡2卡4卡精品| 色综合婷婷激情| 网址你懂的国产日韩在线| 欧美日韩黄片免| 2021天堂中文幕一二区在线观| 日韩精品有码人妻一区| 我的女老师完整版在线观看| 国产伦精品一区二区三区视频9| 午夜免费成人在线视频| 国产高清激情床上av| 女生性感内裤真人,穿戴方法视频| 一级毛片久久久久久久久女| 一个人观看的视频www高清免费观看| 亚洲四区av| 韩国av在线不卡| 国产精品久久久久久久久免| 国产又黄又爽又无遮挡在线| 窝窝影院91人妻| 看免费成人av毛片| 国产亚洲精品久久久久久毛片| 国产高清视频在线播放一区| 深夜a级毛片| 亚洲av日韩精品久久久久久密| 99riav亚洲国产免费| 又爽又黄无遮挡网站| 成人精品一区二区免费| 亚洲成av人片在线播放无| 又紧又爽又黄一区二区| 精品人妻1区二区| 亚洲一级一片aⅴ在线观看| 校园人妻丝袜中文字幕| 日韩亚洲欧美综合| 亚洲av不卡在线观看| 久久久精品大字幕| 在线观看av片永久免费下载| www日本黄色视频网| 国产黄a三级三级三级人| 一区二区三区免费毛片| 久久草成人影院| 国产激情偷乱视频一区二区| 婷婷亚洲欧美| 国产精品久久久久久亚洲av鲁大| 99久久中文字幕三级久久日本| а√天堂www在线а√下载| 麻豆国产av国片精品| 亚洲久久久久久中文字幕| 日韩一区二区视频免费看| 白带黄色成豆腐渣| 亚洲专区中文字幕在线| 热99在线观看视频| 成人特级av手机在线观看| 日本欧美国产在线视频| 亚洲av电影不卡..在线观看| 欧美高清成人免费视频www| 欧美三级亚洲精品| 久久国产乱子免费精品| a级毛片免费高清观看在线播放| 免费观看的影片在线观看| 亚洲男人的天堂狠狠| 国产伦在线观看视频一区| av在线观看视频网站免费| 国产av不卡久久| 午夜免费激情av| 亚洲不卡免费看| 中文字幕av在线有码专区| 麻豆成人av在线观看| 日韩人妻高清精品专区| 99久久中文字幕三级久久日本| 一个人观看的视频www高清免费观看| 精品一区二区三区视频在线| 99热这里只有精品一区| 日韩在线高清观看一区二区三区 | 亚洲精品粉嫩美女一区| 日本一二三区视频观看| 亚洲人成网站在线播| 搞女人的毛片| 嫩草影视91久久| 成年女人永久免费观看视频| 禁无遮挡网站| 久久久久精品国产欧美久久久| 欧美日韩瑟瑟在线播放| 日本免费一区二区三区高清不卡| 男人舔女人下体高潮全视频| 偷拍熟女少妇极品色| 国产麻豆成人av免费视频| 免费在线观看日本一区| 精品不卡国产一区二区三区| 最好的美女福利视频网| a级毛片a级免费在线| 一本一本综合久久| 国产精品一区二区免费欧美| 人妻制服诱惑在线中文字幕| 深夜a级毛片| 少妇裸体淫交视频免费看高清| 中文字幕精品亚洲无线码一区| 国产探花在线观看一区二区| 久久精品91蜜桃| 久久精品久久久久久噜噜老黄 | 亚洲男人的天堂狠狠| 国产精品亚洲美女久久久| av在线观看视频网站免费| 亚洲无线在线观看| 一进一出抽搐动态| 麻豆一二三区av精品| 国产极品精品免费视频能看的| 男女做爰动态图高潮gif福利片| 我要看日韩黄色一级片| 国产亚洲精品久久久com| 久久精品国产亚洲av天美| 熟妇人妻久久中文字幕3abv| 国产女主播在线喷水免费视频网站 | 欧美极品一区二区三区四区| 欧美精品啪啪一区二区三区| 美女大奶头视频| 欧美性猛交╳xxx乱大交人| 可以在线观看的亚洲视频| 高清在线国产一区| 黄色一级大片看看| 深夜a级毛片| 亚洲最大成人av| 韩国av在线不卡| 国产精品不卡视频一区二区| 午夜福利在线在线| 国产黄a三级三级三级人| 禁无遮挡网站| 国产综合懂色| 免费无遮挡裸体视频| 精品国产三级普通话版| 免费观看人在逋| 国内精品久久久久久久电影| 看片在线看免费视频| 99久久久亚洲精品蜜臀av| 深夜精品福利| 99久久精品国产国产毛片| 蜜桃久久精品国产亚洲av| 国产精品乱码一区二三区的特点| 深夜a级毛片| 成人午夜高清在线视频| 校园春色视频在线观看| 日本熟妇午夜| 搡女人真爽免费视频火全软件 | 亚洲18禁久久av| 乱系列少妇在线播放| 可以在线观看毛片的网站| 三级国产精品欧美在线观看| 免费电影在线观看免费观看| 色精品久久人妻99蜜桃| 精品日产1卡2卡| 18+在线观看网站| 国产极品精品免费视频能看的| 国产高清视频在线观看网站| 毛片女人毛片| 国产精品一区二区免费欧美| 亚洲成人免费电影在线观看| 欧美黑人欧美精品刺激| 日本一二三区视频观看| 亚洲天堂国产精品一区在线| 成年女人看的毛片在线观看| 日本精品一区二区三区蜜桃| 久久午夜亚洲精品久久| 看片在线看免费视频| 少妇人妻一区二区三区视频| 我要搜黄色片| 久久久国产成人精品二区| 国产精品乱码一区二三区的特点| 无遮挡黄片免费观看| 久久久久久久精品吃奶| 色尼玛亚洲综合影院| 小说图片视频综合网站| 国产免费av片在线观看野外av| 久久九九热精品免费| 精品久久久噜噜| 91久久精品电影网| 女生性感内裤真人,穿戴方法视频| 国产精品嫩草影院av在线观看 | 大型黄色视频在线免费观看| 成年女人永久免费观看视频| 97超级碰碰碰精品色视频在线观看| 亚洲无线观看免费| 成人国产麻豆网| 午夜老司机福利剧场| 精品一区二区三区av网在线观看| 麻豆久久精品国产亚洲av| 淫秽高清视频在线观看| 中文字幕精品亚洲无线码一区| 国产午夜精品论理片| avwww免费| 99久久精品国产国产毛片| 国产成人a区在线观看| 亚洲成人久久性| 美女黄网站色视频| 久99久视频精品免费| 午夜日韩欧美国产| 五月伊人婷婷丁香| 中国美女看黄片| 成人精品一区二区免费| www日本黄色视频网| 欧美成人一区二区免费高清观看| 亚洲天堂国产精品一区在线| 精品人妻偷拍中文字幕| 嫩草影院精品99| 99热这里只有是精品在线观看| 两性午夜刺激爽爽歪歪视频在线观看| 2021天堂中文幕一二区在线观| 国产黄色小视频在线观看| 国产aⅴ精品一区二区三区波| ponron亚洲| 偷拍熟女少妇极品色| 亚洲国产精品久久男人天堂| 精品一区二区三区视频在线观看免费| 色哟哟·www| 亚洲欧美精品综合久久99| 小说图片视频综合网站| 免费高清视频大片| 国产美女午夜福利| 韩国av一区二区三区四区| 国内揄拍国产精品人妻在线| 成年人黄色毛片网站| 国产伦一二天堂av在线观看| 搡女人真爽免费视频火全软件 | 综合色av麻豆| 精品99又大又爽又粗少妇毛片 | 一边摸一边抽搐一进一小说| 欧美高清性xxxxhd video| 不卡一级毛片| 日韩欧美免费精品| 人妻久久中文字幕网| 三级国产精品欧美在线观看| 亚洲狠狠婷婷综合久久图片| 欧美极品一区二区三区四区| 女同久久另类99精品国产91| 波多野结衣高清作品| 韩国av在线不卡| 色综合色国产| 国产精品人妻久久久影院| 精品人妻熟女av久视频| 成人永久免费在线观看视频| 久久精品国产亚洲av香蕉五月| 嫁个100分男人电影在线观看| 看片在线看免费视频| 美女免费视频网站| 欧美xxxx黑人xx丫x性爽| 大又大粗又爽又黄少妇毛片口| 人人妻,人人澡人人爽秒播| 国产黄色小视频在线观看| 99在线视频只有这里精品首页| 成人一区二区视频在线观看| 一区二区三区激情视频| av国产免费在线观看| 午夜老司机福利剧场| 美女被艹到高潮喷水动态| 国产 一区精品| 亚洲精华国产精华精| 精品一区二区三区av网在线观看| 午夜福利在线在线| 男女之事视频高清在线观看| 午夜福利成人在线免费观看| 九九在线视频观看精品| 久久人人爽人人爽人人片va| 少妇人妻精品综合一区二区 | 精品乱码久久久久久99久播| 亚洲欧美日韩高清专用| 国产精品不卡视频一区二区| 在线观看一区二区三区| 色精品久久人妻99蜜桃| 免费观看精品视频网站| 2021天堂中文幕一二区在线观| 国产精品久久视频播放| 国产伦精品一区二区三区四那| 久久精品国产自在天天线| 午夜免费激情av| 日日摸夜夜添夜夜添av毛片 | 内地一区二区视频在线| 久久久久久九九精品二区国产| 亚洲av熟女| av专区在线播放| 午夜福利欧美成人| 国内精品宾馆在线| 亚洲成av人片在线播放无| 国内揄拍国产精品人妻在线| 简卡轻食公司| 伦理电影大哥的女人| 琪琪午夜伦伦电影理论片6080| 久久久精品大字幕| 午夜福利在线观看免费完整高清在 | 中文字幕人妻熟人妻熟丝袜美| 国产高清视频在线播放一区| 日本爱情动作片www.在线观看 | 国产精品人妻久久久久久| 久久精品夜夜夜夜夜久久蜜豆| 美女cb高潮喷水在线观看| 亚洲午夜理论影院| www.色视频.com| 亚洲国产色片| 熟妇人妻久久中文字幕3abv| 色吧在线观看| 欧美3d第一页| 亚洲一区二区三区色噜噜| 美女xxoo啪啪120秒动态图| 久久精品国产鲁丝片午夜精品 | 在线免费观看不下载黄p国产 | 欧美成人一区二区免费高清观看| 国产精品野战在线观看| 午夜福利欧美成人| 热99re8久久精品国产| 色综合色国产| 国产一区二区亚洲精品在线观看| 欧美极品一区二区三区四区| 一区二区三区高清视频在线| 亚洲aⅴ乱码一区二区在线播放| 免费观看精品视频网站| 少妇被粗大猛烈的视频| 亚洲av免费高清在线观看| 国产探花极品一区二区| 国产高清视频在线观看网站| 日本撒尿小便嘘嘘汇集6| 亚洲人成网站在线播放欧美日韩| 丰满乱子伦码专区| 国产久久久一区二区三区| 最好的美女福利视频网| 国产亚洲av嫩草精品影院| 老司机深夜福利视频在线观看| 97超视频在线观看视频| 性欧美人与动物交配| 动漫黄色视频在线观看| 日本免费a在线| 久久久久久久亚洲中文字幕| 一a级毛片在线观看| 欧美黑人巨大hd| 人人妻人人看人人澡| 一区福利在线观看| 人妻少妇偷人精品九色| 亚洲色图av天堂| 综合色av麻豆| 国产成人a区在线观看| 精品久久久久久久久亚洲 | 国产亚洲精品久久久久久毛片| 丰满乱子伦码专区| 天堂影院成人在线观看| 深夜a级毛片| 国产真实乱freesex| 夜夜看夜夜爽夜夜摸| 久久6这里有精品| 国产亚洲精品av在线| 国产亚洲91精品色在线| 久久精品国产鲁丝片午夜精品 | 成人二区视频| 日韩精品青青久久久久久| 国产成人影院久久av| 日韩国内少妇激情av| 黄色视频,在线免费观看| av在线老鸭窝| 午夜福利欧美成人| 午夜激情欧美在线| 12—13女人毛片做爰片一| 桃红色精品国产亚洲av| 少妇高潮的动态图| 久久久精品欧美日韩精品| 欧美潮喷喷水| 免费电影在线观看免费观看| 精品久久久久久成人av| 2021天堂中文幕一二区在线观| 亚洲av免费高清在线观看| 黄色日韩在线| 国产伦人伦偷精品视频| 亚洲成av人片在线播放无| 五月玫瑰六月丁香| 国产精品永久免费网站| 国产一区二区三区av在线 | 国产精品久久久久久精品电影| 性欧美人与动物交配| 波多野结衣高清无吗| 人妻少妇偷人精品九色| 一区二区三区激情视频| 欧美xxxx黑人xx丫x性爽| 久久久久国产精品人妻aⅴ院| 久久久久久久午夜电影| 亚洲人成网站高清观看| 亚洲av.av天堂| 欧美高清性xxxxhd video| 深夜a级毛片| 国内精品久久久久久久电影| 国产精品一区二区性色av| 成人无遮挡网站| 少妇熟女aⅴ在线视频| 极品教师在线免费播放| 中文字幕久久专区| 99热6这里只有精品| 欧美最黄视频在线播放免费| 久久精品国产清高在天天线| 女的被弄到高潮叫床怎么办 | 国产视频内射| 12—13女人毛片做爰片一| 久久九九热精品免费| 在线观看66精品国产| 亚洲av熟女| 特级一级黄色大片| 最近视频中文字幕2019在线8| 免费一级毛片在线播放高清视频| 亚洲国产欧洲综合997久久,| 国产大屁股一区二区在线视频| 国产不卡一卡二| 亚洲一区高清亚洲精品| 久久久午夜欧美精品| 18禁黄网站禁片午夜丰满| 色哟哟哟哟哟哟| 18禁裸乳无遮挡免费网站照片| 黄色日韩在线| 性插视频无遮挡在线免费观看| 人妻制服诱惑在线中文字幕| 欧美一区二区亚洲| 韩国av一区二区三区四区| 国产精品一区二区三区四区久久| 国产 一区 欧美 日韩| 免费电影在线观看免费观看| 直男gayav资源| avwww免费| 人妻久久中文字幕网| 最好的美女福利视频网| 非洲黑人性xxxx精品又粗又长| 中文字幕av成人在线电影| 伊人久久精品亚洲午夜| 九九热线精品视视频播放| 国产欧美日韩精品一区二区| www日本黄色视频网| 免费在线观看成人毛片| 特级一级黄色大片| 国内揄拍国产精品人妻在线| 桃红色精品国产亚洲av| 亚洲av中文字字幕乱码综合| 国产真实伦视频高清在线观看 | 亚洲人成网站在线播| 日韩,欧美,国产一区二区三区 | 天堂动漫精品| 亚洲第一电影网av| 91av网一区二区| 久久久久性生活片| 午夜影院日韩av| 美女高潮的动态| 少妇人妻一区二区三区视频| 99热这里只有是精品在线观看| 大型黄色视频在线免费观看| 精品人妻熟女av久视频| 亚洲专区中文字幕在线| 午夜精品久久久久久毛片777| 女同久久另类99精品国产91| 久久天躁狠狠躁夜夜2o2o| 久久久久国产精品人妻aⅴ院| 搡老妇女老女人老熟妇| 熟妇人妻久久中文字幕3abv| 我要搜黄色片| 国产伦在线观看视频一区| 一夜夜www| 成人国产综合亚洲| 欧美在线一区亚洲| 人妻制服诱惑在线中文字幕| 亚洲七黄色美女视频| 人妻制服诱惑在线中文字幕| 日本免费a在线| 日韩,欧美,国产一区二区三区 | 国产淫片久久久久久久久| 免费在线观看影片大全网站| 1024手机看黄色片| 12—13女人毛片做爰片一| 无人区码免费观看不卡| 波多野结衣高清无吗| 欧美丝袜亚洲另类 | 国产伦精品一区二区三区四那| 亚洲中文日韩欧美视频| av在线天堂中文字幕| 99热精品在线国产| 琪琪午夜伦伦电影理论片6080| 91在线观看av| 国产精品女同一区二区软件 | or卡值多少钱| 久久久久久久久久成人| 亚洲欧美日韩卡通动漫| 成年版毛片免费区| 国产亚洲av嫩草精品影院| 12—13女人毛片做爰片一| 久久久色成人| 婷婷精品国产亚洲av在线| 啦啦啦啦在线视频资源| 国产精品久久久久久亚洲av鲁大| 在线看三级毛片| 精品一区二区三区人妻视频| 熟女人妻精品中文字幕| 人人妻,人人澡人人爽秒播| 长腿黑丝高跟| 亚洲人成网站高清观看| 波多野结衣高清作品| 欧美潮喷喷水| 淫秽高清视频在线观看| 久久精品国产亚洲av涩爱 | 国产成人一区二区在线| 日本a在线网址| 免费无遮挡裸体视频| 久久久久九九精品影院| av在线蜜桃| 两人在一起打扑克的视频| 美女大奶头视频| 别揉我奶头 嗯啊视频| 99久久中文字幕三级久久日本| 啦啦啦韩国在线观看视频| 极品教师在线免费播放| 国内精品一区二区在线观看| 欧美xxxx黑人xx丫x性爽| 国产免费一级a男人的天堂| 无人区码免费观看不卡| 色在线成人网| 久久精品国产鲁丝片午夜精品 | 国产av麻豆久久久久久久| 黄色视频,在线免费观看| 亚洲av五月六月丁香网| 久久久久九九精品影院| 日韩人妻高清精品专区| 成人二区视频| 九九久久精品国产亚洲av麻豆| 免费观看精品视频网站| 超碰av人人做人人爽久久| 免费无遮挡裸体视频| 一本一本综合久久| 亚洲 国产 在线| 国产精品伦人一区二区| 九九久久精品国产亚洲av麻豆| 99热精品在线国产| 在线观看美女被高潮喷水网站| 看十八女毛片水多多多| 精品一区二区三区av网在线观看| 亚洲内射少妇av| 成人高潮视频无遮挡免费网站| 久久午夜福利片| 成人国产一区最新在线观看| 午夜福利成人在线免费观看| 亚州av有码| 中文资源天堂在线| 成人无遮挡网站| 久久精品人妻少妇|