• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Honeypot Game Theory against DoS Attack in UAV Cyber

    2023-10-26 13:13:10ShangtingMiaoYangLiandQuanPan
    Computers Materials&Continua 2023年9期

    Shangting Miao ,Yang Li and Quan Pan

    1School of Cybersecurity,Northwestern Polytechnical University,Xi’an,710129,China

    2School of Automation,Northwestern Polytechnical University,Xi’an,710129,China

    ABSTRACT A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especially suitable for attacking the UAV cyber.It is a robust security risk for UAV cyber and has recently become an active research area.Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network.In addition,the honeypot,an effective security vulnerability defense mechanism,has not been widely adopted or modeled for defense against DoS attack UAV cyber.With this motivation,the current research paper presents a honeypot game theory model that considers GCS and DoS attacks,which is used to study the interaction between attack and defense to optimize defense strategies.The GCS and honeypot act as defenses against DoS attacks in this model,and both players select their appropriate methods and build their benefit function models.On this basis,a hierarchical honeypot and G2A network delay reward strategy are introduced so that the defender and the attacker can adjust their respective strategies dynamically.Finally,by adjusting the degree of camouflage of the honeypot for UAV network services,the overall revenue of the defender can be effectively improved.The proposed method proves the existence of a mixed strategy Nash equilibrium and compares it with the existing research on no delay rewards and no honeypot defense scheme.In addition,this method realizes that the UAV cyber still guarantees a network delay of about ten milliseconds in the presence of a DoS attack.The results demonstrate that our methodology is superior to that of previous studies.

    KEYWORDS UAV cyber security;honeypot game-theoretical model;DoS attack

    1 Introduction

    UAVs differ from conventional information infrastructure because they have more application scenarios and can be used for military and civil purposes.Among them,military applications are primarily shown as decoy and fire guidance,as well as reconnaissance and surveillance.Civil use,notably for the creation of movies and television programs,navigation,traffic monitoring,protection of agricultural plants,mobile communications,fire detection,and human search and rescue.UAVs are also utilized in the fight against the new crown epidemic.UAVs are given more critical tasks,playing a bigger and bigger role as their use increases [1].With the production scale application of modern information technology in manufacturing UAVs,UAV cyber security has emerged as a crucial area for research and development.

    Cyber security is constantly evolving in response to increasingly sophisticated cyber attacks,so it is necessary to develop new ways to enhance the protection of UAVs.DoS attacks are now the leading cyber security issue for UAVs,gradually providing ineffective passive defense methods like firewalls,virus protection,and security scans.Their distinctive features are as follows.First,malicious code could be hidden in installed software,waiting for an opportunity to launch an attack.Second,because UAVs are not connected to public cyberspace,they can still be attacked.Third,it is tenacious and covert to avoid being discovered.The DoS attack is complicated to defend against because it can be launched to interfere with UAV service by inserting specific false information.

    As an active defense technology [2],honeypot is suitable for solving UAV cyber security issues such as various communication protocols,seriously lacking or conveying security authentication mechanisms,and other related problems.Therefore,the honeypot effectively complements UAV cyber security against DoS attacks[3].Unlike traditional security tools like firewalls and intrusion detection,honeypots could use GCS,UAV network services,or information as bait to detect and analyze the attacks.As we all know,there is almost no research on the use of honeypots in the UAV DoS attack and defense game.This study is motivated by the fact that the honeypot has not yet been applied to UAV cyber security.

    This paper introduces a honeypot game theory to lessen the possibility of maliciously stopping UAVs for DoS attacks.The attack-defense game theory is implemented to study the information security transmission problem of GCS in UAV cyber,specifically for DoS attacks,to reduce the risk of malicious interference in the information transmission process between UAV and GCS.Therefore,this paper proposes a honeypot game model against DoS attacks in UAV cyber.The GCS and honeypot are regarded as the defense.By employing a deception strategy,the honeypot could confuse the attackers and increases the attack’s cost.This paper uses the UAV network transmission delay as a reward evaluation to dynamically adjust the deception strategy of the honeypot.Concerning the UAV communication network,we also want to maintain low transmission delay while enhancing the payoff of GCS.The main contributions are summarized below.

    1.In this article,it incorporates an attack-defense game model into the UAV cyber to study the respective benefit functions of the defender and the attacker,and it utilizes mixed Nash equilibrium strategy analysis to show that Nash equilibrium may be obtained when the predicted benefits of the attacker and the defender are equal.

    2.This article also proposes using honeypots in the attack-defense game model to bait attackers,decrease the security impact of UAVs on cyberspace,and improve the security of data transmission in the G2A network.

    3.This article uses the network delay generated after GCS or honeypot,is attacked by DoS as a reward evaluation value to adjust the deception strategy of the hierarchical honeypot dynamically and comprehensively consider the network delay and the security of UAV information transmission.Under the condition of ensuring lower network delay,the security performance of information transmission in UAV cyber is improved.

    The rest of this paper is organized as follows:Section 2 provides a summary of the related work.Section 3 describes the network model of the UAV range,the model of the UAV network data link,and the reward model based on a DoS attack are all described.Section 4 describes the honeypot offensedefense game problem and proves the existence of the Nash equilibrium solution.Section 5,this paper conducts extensive numerical simulations using an OPNET-based UAV network co-simulation with MATLAB to evaluate the proposed approach.Finally,Section 6 concludes the paper.

    2 Related Work

    In this section,this paper briefly summarizes related work on UAV cyber security issues,a honeypot for DoS attacks,and modeling attack and defense processes using game theory.

    2.1 Security Issues in UAV Cyber

    This study is related to the recent global increase in malicious UAV activities,including the filming of the White House in the United States by an illegally controlled DJI UAV[4],the filming of Kuala Lumpur Airport in Malaysia by an illegally controlled UAV[5],and the illegal intrusion of the Japanese Prime Minister’s residence by a UAV carrying radioactive materials[6].

    Existing studies focus on UAV penetration.For example,Watkins et al.[7] discussed vulnerabilities in UAV components,including vulnerabilities in wireless cyber,GPS,embedded systems,and navigation systems.In their study of three typical UAVs attacks,Liu et al.[8]examined wireless signal spoofing,GPS spoofing,and an assault on wireless sensor hacking.Trust in the GCS is key to the attack’s success.

    This paper compares UAVs with traditional infrastructure in terms of security threat,security protection,and security management,as shown in Table 1.Several possible security threats related to UAV cyber security are summarized as follows:(i)The variety of UAV software may lead to unknown vulnerabilities;(ii)UAV communication protocols lack encryption,and attackers capture control data and commands sent from the GCS to the UAV for replay or data forgery attack;(iii)As the wireless environment is open,a malicious attacker can send a false wireless control command to take over the UAV illegally.

    Table 1:Comparison between UAV and traditional infrastructure

    2.2 Honeypot for Denial of Service Attack

    Existing studies focus on the discovery of security threats and attacks in UAV cyber,as well as the use of different security protection mechanisms for tampering with physical layer DoS attacks and the resource consumption of link layer DoS attack.Anti-UAV security research schemes include Wi-Fi jamming and cracking[9–11],replay[12,13],buffer overflow[14,15],ARP cache poisoning[16,17],injection and modification[18],and civilian GPS spoofing[19–22].In addition,honeypot solutions for DoS attacks have been studied in[23].The study suggests a method for simulating a product network in order to set up a honeypot,record an attack,and capture it.Although the honeypot can detect the attack early,the honeypot is not set according to the essential characteristics of the system,resulting in a low imitation degree.Therefore,the honeypot may effectively defend against DoS attacks in UAV cyber as an active defense technology.

    The developer tool kit(DTK)[24],launched on UNIX platforms by Cohen in 1997,was the most influential early honeypot software tool.It records the behavior of tool vulnerabilities by simulating many vulnerabilities on the system.Up to now,various honeypots have appeared in the fields of industrial control systems,IP voice and other fields in terms of simulation level and captured data quality,such as MiniCPS [25],IoTPOT [26],Iotcandyjar [27],Artemisa [28] and many innovative honeypot products.In addition,the creation technique of the deception simulation environment determines the veracity of the honeypot.It should be mentioned that the honeypot study of UAVs has not received enough attention.

    To the best of our knowledge,most research on DoS attacks is based on the energy-sensitive and resource-constrained characteristics of UAV networks.Wood et al.[29]studied various DoS attacks that may occur at various layers in sensor networks.Simple DoS attack attempts to deplete the available resources of the victim node by sending many unnecessary packets,thereby preventing legitimate network users from accessing services or resources to which they are entitled.Therefore,methods to protect local devices from DoS attacks at the source include source-based DWARD[30],traceback[31],path identification [32],etc.Raymond et al.[33] also explored defense mechanisms in wireless networks.However,the traditional method of defending against DoS attacks requires constant system traffic monitoring,which consumes resources and is unsuitable for UAVs.It should be mentioned that as an effective security vulnerability defense tool,it seems that there is no honeypot supports UAVspecific protocols.The use of honeypot as defense against UVA-based DoS attacks may have gone unnoticed in earlier research.

    2.3 Game Theory for Modeling

    The application of game theory in DoS modeling is studied in[34]and[35].In[36],La et al.introduced a two-player zero-sum game to deal with DoS traffic injection.In [37],Liu et al.proposed a dynamic attack-based game model to compute Nash equilibrium to solve the attack detection problem.Neither study could balance the energy consumption rate and attack detection rate.Therefore,the honeypot can consume fewer resources while protecting the UAV network.The attacker’s choice can be influenced or interfered with by it,and the intent also can be detected by it.However,the current study on the honeypot attack and defense game focuses on smart grids,intelligent transportation,and cloud computing.Ashok et al.[38] discussed cyber-physical security from the perspective of coordinated cyber attacks.They introduced a game-theoretic approach to improving the cyber defense performance of intelligent grids,aiming at the problem that the national grid and other critical infrastructures face the threat of cyber attack.Koutsoukos et al.[39]proposed a traffic signal detection model based on game theory to protect the traffic network from cyber threats.The model obtains the optimal defense strategy under high computational load through a heuristic algorithm.Xiao et al.[40] proposed a bounded rational game model based on prospect theory,which uses prospect theory to describe the bounded rational game process between the defender and the attacker of the cloud storage system.The simulation results show that exploiting the attacker’s bounded rational behavior can improve the defender’s profit.Compared with the above studies,this study is oriented towards the field of UAV and introduces honeypot technology as an active defense mechanism to trap DoS attacks.

    There is currently little research on the implementation of a honeypot to enhance the security of UAV cyber,and the majority of studies in the field of UAV cyber security mainly address the issue of attack detection.Then this paper considers applying the honeypot to the game model to deceive the attacker and increase the cost.

    3 Game Model for UAV Range

    In this section,the UAV range is a virtual simulation environment for simulating UAV cyber.Next,this paper describes its network model,and network data link model,and finally introduces the reward model for the DoS attack.This paper places the relevant symbol definitions in Table 2.

    Table 2:List of symbols

    3.1 Network Model

    Fig.1 depicts the four components of this game model: GCS,honeypot,malicious GCS,and UAV.Among them,the GCS is deployed by the service provider within the operating range of the UAV to provide efficient computing caching services for the UAV,such as UAV navigation and route conditions information sharing,which is essential for flight.This paper defines GCS in the same area asQ={1,2,3,...,Q}.Each GCS in the network is equipped with a cache server to provide cache services for the UAV network.

    This paper considers that the attacker can gain control of GCS through vulnerabilities and implement a DoS attack.At the same time,the UAV receives a large amount of garbage data,causing network interruption and security incidents.This paper defines the malicious GCS asA={1,2,3,...,A}.It affects the network transmission quality by interfering with the downlink.

    Figure 1:Game model of UAV range

    Generally speaking,UAVs need to obtain some services in real-time during the navigation process,such as map navigation,airborne missions,collision warning,etc.Then,this paper defines UAV asU={1,2,3,...,U},assuming that each UAV can obtain cache services from multiple GCS,and attackers may have hacked some.Then,this paper feeds back the network delay of the UAV to the GCS,and it judges whether it is under DoS attack according to the network delay.

    This paper deploys the honeypot near the GCS to hide the identity and define the honeypot as H={1,2,3,...,H}.When the UAV sends a request to the GCS,the honeypot and the GCS respond to the network request of the UAV at the same time,and the honeypot can transmit some information that hackers are interested in,such as the location information of the UAV user,or the UAV management background.Once the honeypot is successfully trapped,then this paper considers it to increase the attack cost.

    3.2 UAV Network Data Link Model

    In this section,this paper assumes that the UAV is waiting to take off,and the network data transmission model is the line of sight (LOS) wireless transmission model.This paper applies it to network communication between UAV and GCS[41].First of all,this paper makes a relevant definition of the defender.At a particular time,the position of UAV is defined as(xu,yu,zu),wherezu=0,qis a fixed position,which is defined as(xq,yq),and the distance between GCS and UAV isdq,u(t)=.The honeypot is also a fixed location,and its location is defined as(xh,yh).This paper defines the confounding deception quality of a hierarchical honeypot asηh∈[0,10]and believes thatηh,between 7 and 10,represents the selection of a highly interactive honeypot.It makes the attacker easy to believe honeypot and attack.

    Then this paper defines the attacker.Attack is assumed to be(xa,ya),the initial position at the time.The hacker obtains permission to control the GCS by attacking.Thereby they can send a large amount of junk information to UAV,causing it to failure to receive average data.The distance betweenaanduisda,u(t)=.

    This paper defines the channel gain betweenqanduasαq,u(t),and the calculation formula is shown in(3-1).

    whereλrepresents the channel power gain,εis the path loss exponent,andε >1.

    Similarly,this paper defines the channel gain betweenaanduasβa,u(t),and the calculation formula is shown in(3-2).The channel gain betweenhanduis defined asγh,u(t),and the calculation formula is shown in(3-3).

    wherema={0,1},0 means no DoS attack,and 1 means DoS attack.This paper defines the power of network transmission betweenqanduaspq,q∈(1,2,3,...,Q),the power of network transmission betweenhanduasph,h∈(1,2,3,...,H),and the power of network transmission betweenaanduaspa,a∈(1,2,3,...,A).From the point of view of the signal noise ratio(SNR),this paper defines the background noise asN,assuming that the DoS attack will occur between 1qand 1a,affecting the data link layer of the wireless network.This paper defines the SNR ofuat the time as.Then its calculation formula is as follows:

    The attacker has attackedhwith a DoS without interfering with regular network communication if the data connection layer of the interaction betweenqanduis standard.Then,this paper definesqand SNR as,and its calculation formula is as follows:

    whereψ{-q,u}(t)represents the channel interference generated by otherqexcept the currentq,since there is no other redundantqinterference at present,here isψ{-q,u}(t)=0.

    In addition,from the point of view of the transmission rate of the data link layer,if the data link layer ofqinteracting withuis abnormal,it means thatqmay be DoS attacked.That is,there is real noise.According to Shannon’s theorem,this paper can define the transmission rate of the data link layer betweenqanduas,and its calculation formula is as follows:

    Analogously,if the network data link layer ofqis normal,this paper defines the data transmission rate of interaction betweenqanduas,and its calculation formula is as follows:

    3.3 Reward Strategy Based on Network Delay

    This paper also needs to consider the delay of the communication network after the DoS attackqas a reward signal.When initiates a DoS attack and affects data transmission,qandhneed to consider how to adjust the transmission strategy to obtain adequate data transmission.This paper wantsqto transmit as much information as possible touin a time period,butacan affect the quality of network information transmission.Therefore,this paper defines the computational data sent byqtourequest asV={1,2,3,...,V},and the data size asKv.

    When this paper assumes the first case,qis under DoS attack,the network transmission delay is,and its calculation formula is as follows:

    This paper also assumes the second case,whenqis not under DoS attack,the network transmission delay is,and its calculation formula is as follows:

    In addition,this paper uses the network transmission delay value as a reward.When the network transmission delay value is significant,the reward value is small,indicating that the trapping effect ofhis not good.At this time,the defense parameters ofhare evaluated.When the network transmission delay is slight,the reward value is enormous,indicating that the trapping effect ofhis good.Then,this paper defines the reward value asτ,and its calculation formula is as follows:

    whereσrepresents the parameters ofhto adjust the defense,σ=tu-t0,t0=,andturepresents the actual transmission delay of the UAV receiving the requested network data.The following table provides the honeypot deception quality update calculation formula:(3-11)[41].

    This paper analyzes the above formula.If the actual network transmission delay of the environment is much smaller than the specified,then the possibility of a DoS attack on the network communication is less.It means that thehadjustment parameter is more extensive now,indicating that the reward value is higher,Δη <0 and the updatedηhis lower.Vice versa,this paper needs to go through multiple rounds of iterations,and both the offensive and defensive sides constantly adjust their strategies to achieve a more stable balance.

    4 Optimal Defensive Strategy of Honeypot in UAV Cyber

    This section describes how to model the network interaction problem betweenq,handain the UAV range as an attack and defense game model and build a benefit function model for both parties.This section also sets up the rules of network delay reward evaluation.The defender and attacker can dynamically adjust their strategies and use the mixed strategy Nash equilibrium theory to obtain the optimal solution.The specific analysis is as follows.At the same time,this paper puts the definitions of symbols in Table 3 for easy reading.

    Table 3:List of symbols

    4.1 Problem Description of Honeypot Game for UAV Cyber

    Above all,this paper takesaas the attacker,qandhas the defender.At the same time,it introduces a honeypot trapping strategy.Hence,this paper wants to find their optimal Nash equilibrium through the benefit function of the offense and defense and the reward strategy of network delay.

    Then this paper establishes the game model.As far as the defender is concerned,this paper defines the transmission cost per unit of data link layer asπq,πq=πh.Therefore,when the transmission power of each unit network ispq,the total transmission cost ofqisφq=pqπq,and the total transmission cost of the attacker can also be calculated asφa=paπa.Similarly,this paper usesgq={0,1} to indicate whetherqcommunicates with the network.Whengq=1,it means thatqtransmits data tou.Whengq=0,it means that no data is transmitted.At the same time,ga={0,1}is used to indicate whether a DoS attack is performed.Whenga=1,it means thataconducts a DoS attack on the UAV.Whenga=0,it means there is no DoS attack.

    where this paper definesκas the adjustment parameter of the honeypot trapping rate,ηh∈[1,100]represents the decoy quality of the honeypot,and its calculation formula is as follows:

    Specifically,when the network data transmission delay is high,happropriately improves the interactivity and IP address emulation,and increases the attack cost by deceiving the DoS attacker.In addition,this paper also defines the benefit function ofaas{Ra}a∈A,and its calculation formula is as follows:

    In summary,Since the two sides are antagonistic,any one of them changing its strategy will change the benefits of both parties involved in the game.The advantage of using a zero-sum game to model this attack-defense interaction is that one party’s gain is the other’s loss,which better reflects the degree of opposition.Therefore,the zero-sum game can better reflect the confrontation betweenqandaso that both parties can maximize their utility.

    4.2 Offensive and Defensive Utility Function Matrix

    In the process of analyzing the offensive and defensive game of the UAV range,qandahave their strategies.Since both sides have two strategies to choose from,there are four strategies after the combination.The details of these four strategies are as follows.

    In the first strategyS1,qtransmits network data tou,andainitiates a DoS attack.This paper defines the benefit function ofqasRq,q∈Q,and its calculation formula is shown in (4-4).The benefit function ofais defined asRa,a∈A,and its calculation formula is shown in(4-5).

    In the second strategyS2,qdoes not transmit network data tou,andainitiates a DoS attack.This paper defines the benefit function ofqasRq,q∈Q,its calculation formula is shown in(4-6).The benefit function ofais defined asRa,a∈A,and its calculation formula is shown in(4-7).

    In the third strategyS3,qtransmits network data tou,andadoes not initiate a DoS attack.This paper defines the benefit function ofqasRq,q∈Q,and its calculation formula is shown in (4-8).The benefit function ofais defined asRa,a∈A,and its calculation formula is shown in(4-9).

    In the fourth strategyS4,qdoes not transmit network data tou,andadoes not initiate a DoS attack.This paper defines the benefit function ofqasRq,q∈Q=0,and the benefit function ofais defined asRa,a∈A=0.

    Then,this paper assumes that in one case,the transmission benefits of GCS and honeypot outweigh the cost of maintaining security,and GCS has reason to have network interactions with UAV.Finally,this paper shows the payoff function matrix of the offensive and defensive sides under different strategies in Table 4.

    Table 4:Attack and defense payoff function matrix

    4.3 Mixed Strategy Nash Equilibrium Analysis

    In the last subsection,this paper regards UAV cyber’s offensive and defensive game as a zerosum game.Both offensive and defensive sides have their strategies combined into four situations.Meanwhile,this paper assumes that the hackers and honeypot deployers in the game are rational,and they have to consider the cost.With the same benefits,participants need to consider lower-cost attack and defense methods.As a result,both players in the game must select an effective tactic to maximize their gains.Because both sides have their optimal strategies,this paper needs to use mixed strategy Nash equilibrium analysis to solve the problem.

    To evaluate the UAV range honeypot game,this paper defines the probability distribution of the participants onχasf,f=(f1,f2,f3,...fr)∈R≥0,where=1.Then,this paper defines the probability of safe network transmission asFTand the probability of unsafe transmission asFNT.Analogously,we define the probability ofalaunching a DoS attack asFAand the probability of not launching a DoS attack asFNA,as shown in Table 5.

    Table 5:Benefit function matrix of offensive and defensive strategies

    Specifically,according to the definition of mixed Nash equilibrium,when the expected benefits of the defender and the attacker are equal,the players no longer care about the choice of strategy.Therefore,in the honeypot game model of the UAV range,the mixed strategy gives the attacker the same expected benefit when generating a DoS attack or not generating a DoS attack.

    When this paper setsE(FA)-E(FNA)=0 andE(FT)-E(FNT)=0,the mixed Nash equilibrium strategies of both sides of the game are obtained,and their calculation formulas are as follows:

    In summary,this paper obtains the probability of each strategy by calculating and getting the mixed Nash equilibrium,that is,the obtained probability set,in the process of the offensive and defensive game of the UAV range.In this probability set,the benefits of both parties can reach the optimal situation simultaneously.Assuming that both parties abide by the regulations,neither party will change the strategy to break the balance,that is,to achieve the mixed Nash equilibrium of the honeypot attack and defense game in the UAV range.

    5 Numerical Results

    In this section,this paper mainly introduces the experimental simulation environment and the result analysis.This paper uses Matlab R2016a to conduct the simulation environment of the UAV cyber evolutionary game experiment.The test running environment is Intel(R)Xeon(R)CPU E5-1603@2.80 GHz processor,the running memory is 8 GB,and the operating system is Windows 10 64-bit.In addition,the scene of the UAV range consists of GCS,honeypot,malicious ground station and UAV.Where GCS provides network data transmission services for UAV,the honeypot is responsible for disguising as GCS to trick attackers into conducting DoS attacks.Expressly,the number of GCSs,UAVs,and malicious GCSs is set to 1,whereas the number of honeypots is set to 3.

    To investigate the advantages of GCS during a DoS assault,this paper adopted the honeypot defense strategy (UDRH) proposed in this paper and compared it with the no honeypot defense scheme(NHDS)in[42].As shown in Fig.2.This paper can see that the change range is relatively gentle in the early stage of the iteration,and the attacker and defender continue to interact and play the game.In the case of a DoS attack,the benefits of GCS tend to be those without a DoS attack,indicating that the honeypot defense strategy can resist to a certain extent.DoS attacks improve the defense’s effectiveness.In the absence of DoS attacks,the benefits of GCS are higher overall.By contrast,the overall benefit of GCS in the UDRH strategy was higher than that of the NHDS strategy.

    Figure 2:GCS benefit in the case of a DoS attack

    In particular,this paper divides the hierarchical honeypot into three types:high,middle and low,and their deception quality is 1–10.To this end,this paper can analyze the cyber security probability and DoS attack probability from Fig.3.In general,this paper equates the degree of emulation of a honeypot with its trapping quality,which is mainly determined by its interactivity.When the deception quality is between 7–10,it is a highly interactive honeypot,and the probability of the UAV communication network being attacked by DoS is reduced.In addition,as the degree of honeypot camouflage has increased,network transmission security has improved,significantly reducing the probability of a DoS attack.The honeypot protects the security of UAV cyber,making it difficult for the attacker to conduct a DoS attack effectively.

    In Fig.4,this paper analyzes the network security probability under the UDRH strategy.With the change of iteration time,it is higher when there is no DoS attack than when there is a DoS attack.It shows that the attacker floods the communication channel between the UAV and the GCS with garbage data.As a result,the UAV cannot usually receive messages,reducing the cyber security rate.Meanwhile,in the presence or absence of a DoS attack,the UDRH strategy has a higher network security rate than the NHDS,which shows that honeypot defense is of great significance for improving UAV cyber security performance.In addition,after a period of iteration,the cyber security probability of the UDRH strategy under the presence or absence of a DoS attack is equal,reaching the final balance.

    Figure 3:The deceptive quality of hierarchical honeypot

    Analogously,this paper can analyze from Fig.5 that the network transmission delay changes with the iteration time.In the presence of a DoS attack,the network transmission delay is higher than when there is no DoS attack.It shows that the DoS attack intensity is high.However,this paper adopts a reward adjustment strategy.After a period of iteration,the network transmission delay continues to approach the situation without a DoS attack.The honeypot defense strategy can resist the DoS attack.If the honeypot is absent compared to the NHDS scheme,there is a higher chance that the UAV network transmission may be interrupted.

    In this paper,Fig.6 compares the expected benefits of the defender with the degree of honeypot camouflage under different schemes.The honeypot strategy based on the zero-sum game proposed in this paper has apparent advantages over the other two schemes.It can improve the expected benefits of the defense more efficiently.The NHDS is that in the case of no honeypot defense,the mixed Nash equilibrium strategy selects its actions,resulting in lower expected returns.While adopting the honeypot defensive technique,the drone reward scheme (DRS) [43] lacks the time-delay feedback evaluation to dynamically change attack and defense strategies.In addition,when the degree of camouflage of the honeypot is low,the expected benefits of the UDRH and the DRS are similar.However,as the degree of honeypot camouflage increases,the expected benefit value of UDRH and DRS gradually increases.Simultaneously,the advantages of UDRH are steadily reflected.

    Figure 6:Comparison of benefits under different schemes

    6 Conclusion

    UAV gives a promising future to brilliant intelligent cities.With the advances in UAV technology,UAVs will become a part of the human environment.However,due to the openness of the G2A network,the transmission of UAV security information has become a challenging issue.UAV is vulnerable to cyber attacks,causing harm such as loss of confidential data and productivity.Given the vulnerability of UAVs to DoS attacks,a method to reduce the impact of UAV network delay in the environment of cyber attacks is proposed.This paper uses hierarchical honeypots and delayed rewards to establish a honeypot game model.The experimental results show that this method is suitable for effectively mitigating the impact of G2A network communication by DoS attack.In the offensive and defensive game model we use,the ground station’s strategy is choosing network transmission,and the strategy of the malicious ground station is choosing a DoS attack.It is regarded as a zero-sum game model.Among them,the behavior of defender is to improve its confusion,while the attacker mainly provides prerequisites for the network delay.Finally,we give a detailed analysis of the experiment.In the presence of a DoS attack,the UDRH strategy can guarantee that the G2A network delay is about 10.2 milliseconds,while the G2A network delay under the NHDS strategy is about 58.6 milliseconds.For the future,it is intended to improve the security of UAV cyber through the analysis of honeypot data.

    Acknowledgement:Previous UAV data link security is the basis of our research.We are grateful to all the researchers and applications that have guided us in developing the honeypot system for UAVs.

    Funding Statement:Basic Scientific Research program of China JCKY2020203C025 funding is involved in this study.

    Author Contributions:All authors contributed to the study conception and design.Material preparation,data collection and analysis were performed by Shangting Miao,Yang Li and Quan Pan.The first draft of the manuscript was written by Shangting Miao and all authors commented on previous versions of the manuscript.All authors read and approved the final manuscript.

    Availability of Data and Materials:Part of the data comes from the DroneWars website.

    Conflicts of Interest:The authors declare they have no conflicts of interest to report regarding the present study.

    午夜免费观看网址| 高清在线国产一区| 国产精品电影一区二区三区 | 日韩视频一区二区在线观看| 操出白浆在线播放| 久久久久久久久免费视频了| 麻豆乱淫一区二区| 久热这里只有精品99| 视频区欧美日本亚洲| 制服诱惑二区| 欧美大码av| 国产精品1区2区在线观看. | 99热网站在线观看| 亚洲自偷自拍图片 自拍| 十八禁高潮呻吟视频| 成人免费观看视频高清| tocl精华| 高清av免费在线| 亚洲情色 制服丝袜| 黄色毛片三级朝国网站| 国产亚洲精品一区二区www | 狠狠狠狠99中文字幕| 午夜福利在线观看吧| 亚洲一卡2卡3卡4卡5卡精品中文| 两性夫妻黄色片| 国产欧美日韩综合在线一区二区| 日本撒尿小便嘘嘘汇集6| 国产成人啪精品午夜网站| 久久久久久久久免费视频了| 亚洲国产欧美网| av不卡在线播放| 老汉色∧v一级毛片| 欧美老熟妇乱子伦牲交| 如日韩欧美国产精品一区二区三区| 久久ye,这里只有精品| 国产精品98久久久久久宅男小说| 久久天堂一区二区三区四区| 久9热在线精品视频| 国产在线精品亚洲第一网站| 久久久久久人人人人人| 人人妻人人澡人人爽人人夜夜| 操出白浆在线播放| 亚洲自偷自拍图片 自拍| 亚洲成人免费av在线播放| 国产三级黄色录像| 最新在线观看一区二区三区| 激情在线观看视频在线高清 | 国产在线精品亚洲第一网站| 大型黄色视频在线免费观看| 久久天堂一区二区三区四区| 精品国产乱码久久久久久男人| 亚洲七黄色美女视频| 一区二区三区精品91| 亚洲免费av在线视频| 久久久久精品国产欧美久久久| 91在线观看av| 欧美激情久久久久久爽电影 | 精品无人区乱码1区二区| 国产成人欧美在线观看 | 少妇被粗大的猛进出69影院| 欧美黑人欧美精品刺激| 国产一区二区三区综合在线观看| 成在线人永久免费视频| 久久亚洲真实| 午夜老司机福利片| 国产精品 欧美亚洲| 久久 成人 亚洲| 亚洲色图av天堂| 飞空精品影院首页| avwww免费| 国产欧美日韩精品亚洲av| 亚洲av日韩精品久久久久久密| 精品国产乱码久久久久久男人| 99riav亚洲国产免费| 99热网站在线观看| svipshipincom国产片| 一级毛片女人18水好多| 亚洲一区二区三区不卡视频| 久热爱精品视频在线9| 成人国产一区最新在线观看| 久久精品熟女亚洲av麻豆精品| 91精品三级在线观看| 最近最新中文字幕大全免费视频| 日本wwww免费看| 免费观看精品视频网站| 国产精品免费视频内射| 精品人妻熟女毛片av久久网站| 国产熟女午夜一区二区三区| 亚洲一区二区三区不卡视频| 午夜福利乱码中文字幕| 波多野结衣一区麻豆| 亚洲精品av麻豆狂野| 亚洲 国产 在线| 免费高清在线观看日韩| 欧洲精品卡2卡3卡4卡5卡区| 欧美 日韩 精品 国产| 国产av一区二区精品久久| 欧美日韩亚洲综合一区二区三区_| 欧美日韩视频精品一区| 亚洲欧美一区二区三区久久| 日韩欧美一区视频在线观看| 午夜精品在线福利| 精品久久久精品久久久| 亚洲视频免费观看视频| 国产麻豆69| av电影中文网址| 亚洲国产看品久久| 久久亚洲真实| 亚洲欧美激情综合另类| 国产精品一区二区在线观看99| 成人亚洲精品一区在线观看| 精品一区二区三区四区五区乱码| 黑人操中国人逼视频| 亚洲av成人不卡在线观看播放网| 亚洲人成77777在线视频| 久9热在线精品视频| 大片电影免费在线观看免费| 黄色毛片三级朝国网站| 亚洲成人免费电影在线观看| 国产又色又爽无遮挡免费看| 美女高潮到喷水免费观看| 亚洲国产精品一区二区三区在线| 69精品国产乱码久久久| 高清av免费在线| 午夜91福利影院| 身体一侧抽搐| 久久精品国产清高在天天线| 高清黄色对白视频在线免费看| av福利片在线| 国产高清videossex| 王馨瑶露胸无遮挡在线观看| 国产99白浆流出| 在线观看一区二区三区激情| 美女高潮到喷水免费观看| 欧美日韩福利视频一区二区| 成年人午夜在线观看视频| 日韩欧美一区二区三区在线观看 | 久久青草综合色| 黑人巨大精品欧美一区二区蜜桃| 亚洲国产欧美一区二区综合| 啦啦啦视频在线资源免费观看| 精品亚洲成a人片在线观看| 亚洲一码二码三码区别大吗| 露出奶头的视频| 国产极品粉嫩免费观看在线| 女性被躁到高潮视频| 1024香蕉在线观看| 精品一区二区三区四区五区乱码| 九色亚洲精品在线播放| 90打野战视频偷拍视频| 国产精品 欧美亚洲| 色婷婷久久久亚洲欧美| 国产在线一区二区三区精| 在线天堂中文资源库| 国产精品久久久久久人妻精品电影| 午夜精品久久久久久毛片777| 高清在线国产一区| 不卡av一区二区三区| 身体一侧抽搐| 五月开心婷婷网| 亚洲成国产人片在线观看| 亚洲av片天天在线观看| 国产精品乱码一区二三区的特点 | 悠悠久久av| 在线观看免费视频网站a站| 欧美日韩中文字幕国产精品一区二区三区 | 女人被狂操c到高潮| 亚洲欧美一区二区三区久久| 日本五十路高清| 久久中文字幕一级| 老司机午夜福利在线观看视频| 老司机亚洲免费影院| tube8黄色片| 露出奶头的视频| 香蕉国产在线看| 老司机午夜十八禁免费视频| 久久人人爽av亚洲精品天堂| 国产精品一区二区精品视频观看| av天堂在线播放| 一二三四社区在线视频社区8| 亚洲av熟女| 日本vs欧美在线观看视频| 中文字幕av电影在线播放| 久久婷婷成人综合色麻豆| 亚洲九九香蕉| 精品国产乱子伦一区二区三区| 亚洲成人免费av在线播放| 久久精品成人免费网站| 9191精品国产免费久久| 深夜精品福利| 欧美中文综合在线视频| 日本五十路高清| 免费看十八禁软件| 在线十欧美十亚洲十日本专区| 欧美激情 高清一区二区三区| 久99久视频精品免费| 岛国在线观看网站| 一二三四社区在线视频社区8| 久久精品国产99精品国产亚洲性色 | 久久性视频一级片| 老熟妇乱子伦视频在线观看| 久久久久久久午夜电影 | 9热在线视频观看99| 一二三四社区在线视频社区8| 少妇的丰满在线观看| 999久久久精品免费观看国产| 欧美日韩乱码在线| 中文字幕av电影在线播放| 久久精品熟女亚洲av麻豆精品| 一级作爱视频免费观看| 侵犯人妻中文字幕一二三四区| 成人免费观看视频高清| 国产精品一区二区免费欧美| 在线观看一区二区三区激情| 午夜老司机福利片| 欧美 亚洲 国产 日韩一| 亚洲精品中文字幕在线视频| 免费久久久久久久精品成人欧美视频| 国产成+人综合+亚洲专区| 欧美日韩黄片免| 在线永久观看黄色视频| 51午夜福利影视在线观看| 99久久精品国产亚洲精品| 好看av亚洲va欧美ⅴa在| 亚洲成人国产一区在线观看| 精品午夜福利视频在线观看一区| 999久久久国产精品视频| 久久天躁狠狠躁夜夜2o2o| 亚洲中文日韩欧美视频| 亚洲精品美女久久久久99蜜臀| 亚洲精品乱久久久久久| 欧美亚洲日本最大视频资源| 大型av网站在线播放| 丁香六月欧美| 亚洲男人天堂网一区| 自拍欧美九色日韩亚洲蝌蚪91| 黄色 视频免费看| av网站免费在线观看视频| 真人做人爱边吃奶动态| 一本一本久久a久久精品综合妖精| 久久精品国产99精品国产亚洲性色 | 岛国毛片在线播放| 母亲3免费完整高清在线观看| 欧美日本中文国产一区发布| 国产成人精品无人区| 女人被狂操c到高潮| 国产亚洲精品一区二区www | 狠狠婷婷综合久久久久久88av| 国产成人一区二区三区免费视频网站| 国产精品电影一区二区三区 | 国产成人一区二区三区免费视频网站| 一本综合久久免费| 深夜精品福利| 国产精品免费大片| 人人妻,人人澡人人爽秒播| 91国产中文字幕| www日本在线高清视频| 国产免费现黄频在线看| 人妻丰满熟妇av一区二区三区 | 日本vs欧美在线观看视频| 超碰97精品在线观看| 69av精品久久久久久| 亚洲午夜理论影院| 亚洲熟妇中文字幕五十中出 | av免费在线观看网站| 99精国产麻豆久久婷婷| 国产1区2区3区精品| 国产在线一区二区三区精| 满18在线观看网站| 狂野欧美激情性xxxx| 大片电影免费在线观看免费| 黄色毛片三级朝国网站| 美女国产高潮福利片在线看| 12—13女人毛片做爰片一| 亚洲人成77777在线视频| 黄片播放在线免费| 久久精品熟女亚洲av麻豆精品| aaaaa片日本免费| 动漫黄色视频在线观看| 露出奶头的视频| 一级作爱视频免费观看| 人人妻人人澡人人爽人人夜夜| 午夜精品久久久久久毛片777| 久久ye,这里只有精品| 建设人人有责人人尽责人人享有的| 国产精品久久久人人做人人爽| 后天国语完整版免费观看| 丁香六月欧美| 一级毛片高清免费大全| 高清在线国产一区| 亚洲五月色婷婷综合| 国产欧美亚洲国产| av网站在线播放免费| 身体一侧抽搐| 亚洲九九香蕉| 久久人人爽av亚洲精品天堂| 巨乳人妻的诱惑在线观看| 亚洲熟女精品中文字幕| 色综合婷婷激情| 亚洲精品一二三| 国产97色在线日韩免费| 国产精品久久久久久精品古装| 久久精品国产亚洲av高清一级| 成人影院久久| 日韩制服丝袜自拍偷拍| cao死你这个sao货| 亚洲 欧美一区二区三区| 在线观看免费视频网站a站| 日本一区二区免费在线视频| 亚洲一区中文字幕在线| 日韩三级视频一区二区三区| 久久精品国产99精品国产亚洲性色 | 午夜日韩欧美国产| 国产在线观看jvid| 久久精品91无色码中文字幕| 法律面前人人平等表现在哪些方面| 国产精品99久久99久久久不卡| a级片在线免费高清观看视频| 午夜精品久久久久久毛片777| 脱女人内裤的视频| 国产男靠女视频免费网站| 国产伦人伦偷精品视频| 校园春色视频在线观看| 天堂俺去俺来也www色官网| 黄色视频不卡| 亚洲一区高清亚洲精品| 欧美激情久久久久久爽电影 | 亚洲午夜精品一区,二区,三区| 中文字幕人妻丝袜一区二区| e午夜精品久久久久久久| 欧美日韩av久久| 久久精品人人爽人人爽视色| 黑人猛操日本美女一级片| 少妇 在线观看| 黄色丝袜av网址大全| 日韩欧美国产一区二区入口| 在线看a的网站| 成人国语在线视频| 中文字幕高清在线视频| tube8黄色片| 99riav亚洲国产免费| netflix在线观看网站| 亚洲精品一二三| 久久久精品国产亚洲av高清涩受| 窝窝影院91人妻| 久久国产精品影院| 人成视频在线观看免费观看| 成人亚洲精品一区在线观看| 国产有黄有色有爽视频| 50天的宝宝边吃奶边哭怎么回事| 久久国产精品影院| 交换朋友夫妻互换小说| 久久精品亚洲熟妇少妇任你| 国产免费现黄频在线看| 高潮久久久久久久久久久不卡| 丝瓜视频免费看黄片| 精品国产乱码久久久久久男人| 久久久久久久久免费视频了| av在线播放免费不卡| 如日韩欧美国产精品一区二区三区| 午夜福利视频在线观看免费| 男男h啪啪无遮挡| 身体一侧抽搐| 国产免费av片在线观看野外av| 一级,二级,三级黄色视频| 久久午夜综合久久蜜桃| 黄网站色视频无遮挡免费观看| 露出奶头的视频| 99久久精品国产亚洲精品| 水蜜桃什么品种好| a级片在线免费高清观看视频| 欧美日韩福利视频一区二区| 国产精品电影一区二区三区 | 首页视频小说图片口味搜索| 国产成人av激情在线播放| 激情视频va一区二区三区| 99热只有精品国产| 欧美乱妇无乱码| 国产99久久九九免费精品| 亚洲精品在线美女| 在线天堂中文资源库| 91国产中文字幕| 亚洲精品久久午夜乱码| 好男人电影高清在线观看| 精品免费久久久久久久清纯 | 老汉色∧v一级毛片| avwww免费| 露出奶头的视频| 欧美在线一区亚洲| 一级片'在线观看视频| 国产99久久九九免费精品| 亚洲欧美激情在线| 欧美日本中文国产一区发布| 亚洲人成电影免费在线| 怎么达到女性高潮| 中文字幕制服av| 五月开心婷婷网| 美女 人体艺术 gogo| ponron亚洲| 99香蕉大伊视频| 纯流量卡能插随身wifi吗| 一区在线观看完整版| 每晚都被弄得嗷嗷叫到高潮| 午夜老司机福利片| 波多野结衣av一区二区av| 18禁裸乳无遮挡动漫免费视频| 日韩成人在线观看一区二区三区| 婷婷丁香在线五月| 黄色女人牲交| 777米奇影视久久| 侵犯人妻中文字幕一二三四区| 少妇被粗大的猛进出69影院| 中文字幕另类日韩欧美亚洲嫩草| av片东京热男人的天堂| 热99国产精品久久久久久7| 久久久精品免费免费高清| 欧美色视频一区免费| 欧美久久黑人一区二区| 亚洲自偷自拍图片 自拍| 国产真人三级小视频在线观看| 老鸭窝网址在线观看| av片东京热男人的天堂| 午夜91福利影院| 精品人妻1区二区| 精品福利永久在线观看| 国产高清videossex| 999久久久国产精品视频| 狠狠婷婷综合久久久久久88av| 美女扒开内裤让男人捅视频| 日本黄色视频三级网站网址 | 丁香六月欧美| 亚洲性夜色夜夜综合| 日韩免费高清中文字幕av| 日本a在线网址| 曰老女人黄片| 视频在线观看一区二区三区| 欧美亚洲日本最大视频资源| 免费在线观看亚洲国产| 免费少妇av软件| 法律面前人人平等表现在哪些方面| 在线永久观看黄色视频| 黄色怎么调成土黄色| 色94色欧美一区二区| 成人永久免费在线观看视频| 欧美精品人与动牲交sv欧美| 超碰97精品在线观看| www.自偷自拍.com| cao死你这个sao货| 欧美久久黑人一区二区| 久久国产乱子伦精品免费另类| 亚洲色图 男人天堂 中文字幕| a级毛片黄视频| 亚洲九九香蕉| 亚洲色图综合在线观看| 两个人免费观看高清视频| 三级毛片av免费| 妹子高潮喷水视频| 国产精品自产拍在线观看55亚洲 | 婷婷成人精品国产| 日韩人妻精品一区2区三区| 中文字幕av电影在线播放| 日本欧美视频一区| 很黄的视频免费| 亚洲精品在线美女| 亚洲黑人精品在线| 午夜福利影视在线免费观看| 大香蕉久久网| 国产精品一区二区免费欧美| 国产不卡一卡二| 美女 人体艺术 gogo| 身体一侧抽搐| 久久天躁狠狠躁夜夜2o2o| 黑人操中国人逼视频| 乱人伦中国视频| 18禁裸乳无遮挡免费网站照片 | 久久青草综合色| 亚洲第一青青草原| 国产精品秋霞免费鲁丝片| 亚洲欧美日韩另类电影网站| 国产av精品麻豆| 久久国产精品大桥未久av| 久久久久久亚洲精品国产蜜桃av| 亚洲中文字幕日韩| 久久99一区二区三区| 一级毛片高清免费大全| 欧美午夜高清在线| 欧美成人免费av一区二区三区 | 99在线人妻在线中文字幕 | 亚洲国产看品久久| 欧美丝袜亚洲另类 | 午夜老司机福利片| 国产亚洲精品久久久久久毛片 | 欧美丝袜亚洲另类 | 久久性视频一级片| 欧美激情久久久久久爽电影 | 国产精品1区2区在线观看. | 黄片大片在线免费观看| 国产在线精品亚洲第一网站| 久久精品国产a三级三级三级| 亚洲黑人精品在线| 色婷婷久久久亚洲欧美| 一夜夜www| 亚洲成人手机| 亚洲精品一二三| 久99久视频精品免费| 免费少妇av软件| 日本vs欧美在线观看视频| 国产高清视频在线播放一区| 亚洲五月天丁香| 老司机深夜福利视频在线观看| 女人久久www免费人成看片| 9色porny在线观看| 日韩欧美国产一区二区入口| 亚洲精品美女久久久久99蜜臀| 欧美在线一区亚洲| 一级片'在线观看视频| 国产精品综合久久久久久久免费 | 亚洲精品久久午夜乱码| 另类亚洲欧美激情| 免费久久久久久久精品成人欧美视频| 乱人伦中国视频| 日韩有码中文字幕| 一区二区三区激情视频| 亚洲七黄色美女视频| 看黄色毛片网站| 捣出白浆h1v1| 黑人欧美特级aaaaaa片| 国产不卡av网站在线观看| 精品欧美一区二区三区在线| 伊人久久大香线蕉亚洲五| 国产成人影院久久av| 亚洲欧美一区二区三区久久| 欧美老熟妇乱子伦牲交| 日韩一卡2卡3卡4卡2021年| 国产免费男女视频| 亚洲精品美女久久久久99蜜臀| 国产精品久久电影中文字幕 | 亚洲av日韩精品久久久久久密| 正在播放国产对白刺激| 精品一区二区三卡| 亚洲成国产人片在线观看| 天天躁夜夜躁狠狠躁躁| 国产精华一区二区三区| 下体分泌物呈黄色| 亚洲国产精品一区二区三区在线| 日韩免费高清中文字幕av| 色94色欧美一区二区| 亚洲在线自拍视频| 亚洲第一青青草原| 欧美中文综合在线视频| 亚洲国产毛片av蜜桃av| 黄色怎么调成土黄色| 狠狠狠狠99中文字幕| 丝袜在线中文字幕| av网站在线播放免费| 久久久久精品人妻al黑| 女性被躁到高潮视频| 一级作爱视频免费观看| 一区二区日韩欧美中文字幕| 中文字幕高清在线视频| 1024视频免费在线观看| 精品亚洲成国产av| 精品久久久久久久久久免费视频 | 午夜精品在线福利| 午夜福利欧美成人| 国产成人免费无遮挡视频| 久久亚洲真实| 亚洲av成人不卡在线观看播放网| 国产高清国产精品国产三级| 久久人妻福利社区极品人妻图片| 精品一区二区三区视频在线观看免费 | 狠狠狠狠99中文字幕| 午夜精品国产一区二区电影| 国产片内射在线| 亚洲九九香蕉| 悠悠久久av| 法律面前人人平等表现在哪些方面| 国产精品一区二区在线观看99| 国产精品亚洲一级av第二区| 成年女人毛片免费观看观看9 | 国产人伦9x9x在线观看| 国产有黄有色有爽视频| 欧美 日韩 精品 国产| 免费av中文字幕在线| 免费高清在线观看日韩| 久久久精品区二区三区| 欧美成人免费av一区二区三区 | 午夜免费鲁丝| 免费人成视频x8x8入口观看| 婷婷精品国产亚洲av在线 | 精品国产乱码久久久久久男人| 老汉色∧v一级毛片| 国产精品欧美亚洲77777| 国内毛片毛片毛片毛片毛片| 每晚都被弄得嗷嗷叫到高潮| 男女高潮啪啪啪动态图| 久久人妻福利社区极品人妻图片| 免费在线观看影片大全网站| 熟女少妇亚洲综合色aaa.| 久久国产精品大桥未久av| 亚洲精品中文字幕在线视频| 国产成人啪精品午夜网站| 国产精品自产拍在线观看55亚洲 | 中文字幕色久视频| 久久久久久久午夜电影 | 十八禁网站免费在线| 国产精品1区2区在线观看. | 国产深夜福利视频在线观看| 亚洲情色 制服丝袜| 精品福利永久在线观看| 涩涩av久久男人的天堂| 国产99久久九九免费精品| 国产黄色免费在线视频| 亚洲国产毛片av蜜桃av| 男男h啪啪无遮挡|