• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Improved Jump Spider Optimization for Network Traffic Identification Feature Selection

    2023-10-26 13:14:20HuiXuYalinHuWeidongCaoandLongjieHan
    Computers Materials&Continua 2023年9期

    Hui Xu,Yalin Hu,Weidong Cao and Longjie Han

    School of Computer Science,Hubei University of Technology,Wuhan,430068,China

    ABSTRACT The massive influx of traffic on the Internet has made the composition of web traffic increasingly complex.Traditional port-based or protocol-based network traffic identification methods are no longer suitable for today’s complex and changing networks.Recently,machine learning has been widely applied to network traffic recognition.Still,high-dimensional features and redundant data in network traffic can lead to slow convergence problems and low identification accuracy of network traffic recognition algorithms.Taking advantage of the faster optimizationseeking capability of the jumping spider optimization algorithm (JSOA),this paper proposes a jumping spider optimization algorithm that incorporates the harris hawk optimization(HHO)and small hole imaging(HHJSOA).We use it in network traffic identification feature selection.First,the method incorporates the HHO escape energy factor and the hard siege strategy to form a new search strategy for HHJSOA.This location update strategy enhances the search range of the optimal solution of HHJSOA.We use small hole imaging to update the inferior individual.Next,the feature selection problem is coded to propose a jumping spiders individual coding scheme.Multiple iterations of the HHJSOA algorithm find the optimal individual used as the selected feature for KNN classification.Finally,we validate the classification accuracy and performance of the HHJSOA algorithm using the UNSW-NB15 dataset and KDD99 dataset.Experimental results show that compared with other algorithms for the UNSW-NB15 dataset,the improvement is at least 0.0705,0.00147,and 1 on the accuracy,fitness value,and the number of features.In addition,compared with other feature selection methods for the same datasets,the proposed algorithm has faster convergence,better merit-seeking,and robustness.Therefore,HHJSOA can improve the classification accuracy and solve the problem that the network traffic recognition algorithm needs to be faster to converge and easily fall into local optimum due to high-dimensional features.

    KEYWORDS Network traffic identification;feature selection;jumping spider optimization algorithm;harris hawk optimization;small hole imaging

    1 Introduction

    Network traffic identification provides the foundation and basis for subsequent network protocol involvement,network operation management,and network traffic scheduling.It also provides means for detecting network attacks and traffic cleaning in network security [1].In the process of network protocol design,we provide data support for network design and application design by classifying network traffic and profoundly analyzing the evolutionary trend of traffic.In network operation management,traffic classification can identify abnormal and spam traffic.Traffic classification can also optimize network bandwidth resources and improve operational efficiency.In network traffic scheduling,network traffic classification can be used to control different application traffic differently and improve the quality of service.In network abnormal traffic detection,it detects abnormal and attacking behaviors in the network by establishing a model of the normal behavior of network traffic,which provides an essential guarantee for network security.Network traffic identification is of great significance.

    The port-based traffic identification method has a more significant advantage in the early days.This method matches corresponding network traffic applications by detecting the port number in TCP/UDP packet headers.However,with the changing development of network applications,this simple and fast port identification method is becoming less and less applicable.Moore et al.[2,3]pointed out as early as 2004 to 2005 that port-based network traffic identification methods identified less and less network traffic with lower and lower accuracy.In addition to port-based techniques,traffic classification based on deep packet inspection(DPI)has been proposed.This technique has a higher classification accuracy,but the DPI technique takes longer to analyze the feature string and is not very timelier.And the DPI technique has a relatively high false detection rate for encrypted traffic[4].In addition,as protocol versions are constantly changing,new private protocols emerge,and current protocol versions need to be re-parsed.Traditional methods based on network protocol parsing are also not widely used.The use of traditional traffic classification identification methods has yet to meet the needs of Internet traffic identification.

    Machine learning has now been applied to network traffic identification.However,most of the current network traffic classification methods are based on traditional machine learning approaches,and the classification performance depends on the design of traffic features.Designing a set of features that can accurately characterize the traffic requires a lot of manual experience and feature engineering skills.Traffic feature selection and extraction is the method’s most essential and computationally intensive part.Deep learning methods are used to build end-to-end deep learning models by autonomously learning from the original traffic set to high-dimensional features [5].In this case,the classification process is entirely unknowable,and the process between the input and output is like a black box.To eliminate the impact of redundant and irrelevant features on network traffic identification,researchers have begun to use metaheuristics for high-dimensional data feature selection by taking advantage of the greater flexibility and self-organization of metaheuristics.However,traditional violent search or meta-inspired search algorithms have limitations in slow convergence and low search efficiency.How to determine the better feature search strategy has a significant impact on the network traffic classification results.The jumping spider optimization algorithm (JSOA) has fewer parameters and simple principles.It has a faster convergence speed and search capability than traditional Arithmetic Optimization algorithms(AOA)and harris hawk optimization(HHO)algorithms[6].

    Considering the abovementioned problems,we propose a jumping spider optimization algorithm incorporating HHO and small hole imaging (HHJSOA).We use it in network traffic identification feature selection.A coding scheme for jumping spider individuals is proposed to find the optimal individuals by multiple algorithm iterations.The optimal individuals are used as the selected features for KNN classification.We use the UNSW-NB15 dataset and the KDD99 dataset.Then compare the proposed method with feature selection methods based on other algorithms to verify the effectiveness of our proposed HHJSOA algorithm.The main contributions of this paper are as follows:

    1.A new feature selection method for network traffic identification is proposed.The method solves the drawback that the redundant data in the network traffic dataset leads to slow convergence of network traffic identification algorithm and falls into local optimum.The performance of the proposed method is compared with other methods using benchmark test functions and two different datasets.

    2.Propose a new HHJSOA algorithm based on the JSOA algorithm.HHJSOA has a robust global search capability and local development capability.

    3.The HHJSOA algorithm is a network traffic identification feature selection method.We use the binary version of HHJSOA to select the optimal combination of features,i.e.,the optimal jump spider individual.

    4.Fusion of HHO constitutes a novel search strategy for HHJSOA.Small hole imaging updates inferior jumping spider individuals to prevent JSOA from falling into local optimum.The escape energy factor of HHO,hard siege strategy,and small hole imaging play an essential role in the feature selection process of HHJSOA.

    The rest of this paper is organized as follows: Section 2 introduces the research related to network traffic identification.Section 3 introduces some basic concepts.Section 4 introduces our proposed method.Section 5 provides the experimental design and analysis.The last section outlines the limitations and future directions of this study.

    2 Related Work

    2.1 Network Traffic Identification Methods Based on Traditional Methods

    In the current network environment,achieving high accuracy in network traffic identification is no longer possible by relying on port numbers alone.Traditionally,DPI is the most accurate classification technique.Sen et al.[7] analyzed the packet load content by tracing and parsing the network packets.Afterwards,the internally embedded application signature is identified to identify P2P traffic accurately.This approach addresses the limitations of port number-based application classification.Bujlow et al.[8] compared traffic classification tools based on DPI identification methods,including commercial and open-source tools.The results demonstrate that the DPI-based classification method can classify traffic well in practical applications.Seddiki et al.[9]proposed an architecture for FlowQoS that facilitates users to configure the quality of service based on applications and devices.The two components of FlowQoS include a flow classifier and an SDN-based rate shaper.The classifier is used to identify flows under different protocols.Existing home routers cannot assign priority to each flow,so a dual-switch topology is used to implement flow-by-flow quality of service.Once the classifier determines the application type of the flow,the SDN rate shaper assigns the appropriate rate to the flow,thus classifying it.However,it is not widely deployed and used due to complexity and compatibility issues.However,this method cannot identify encrypted traffic and is less time-sensitive.

    These traditional methods can meet the needs of network traffic classification to some extent but still have limitations for the current network environment.

    2.2 Network Traffic Identification Methods Based on Machine Learning

    To address the limitations of traditional network traffic identification methods,more and more machine learning methods are applied to network traffic identification.Moore et al.[10]designed 249 statistical features for the labeled dataset to describe the traffic,including a large amount of statistical information in addition to IP and port numbers.Most of the features applied to machine learning algorithms in subsequent studies are derived from this,and by combining different algorithms,the classification of network traffic is achieved.However,the effectiveness of network traffic classification based on traditional machine learning depends primarily on whether the manually designed network traffic features can represent the characteristics of the traffic well.Facing the increasingly complex network environment,it becomes increasingly difficult to create suitable traffic features.Zhou et al.[11]proposed to combine entropy estimation and artificial neural network (ANN) to optimize the classification model further and select suitable traffic features.In IoT cloud security,Elaziz et al.[12]proposed an intrusion detection method using deep learning and a roll tail search algorithm.CNN learns significant features in network traffic autonomously,and features with minimum fitness value are evaluated using the CapSA algorithm and KNN.The relevance of the features is improved while reducing the data dimensionality.Has high classification performance on multiple datasets.Rago et al.[13] proposed a traffic classification method based on a convolutional neural network.They use raw traffic data as input and convolutional neural networks to implement autonomous feature learning and improve classification accuracy.However,the abovementioned methods are prone to over-fitting problems on data sets with unbalanced samples.Dong [14] proposed a cost-sensitive support vector machine (SVM) model.An SVM-based traffic classification model was constructed using network traffic features,and the SVM model was further optimized.The classification accuracy is improved while reducing the computational cost and solving the data imbalance problem.Although deep learning can autonomously learn the high-dimensional features of network traffic,which solves the shortcomings of traditional machine learning to design traffic features manually,its black-box property determines that its classification process is uninterpretable and cannot provide network managers with more basis for decision-making.

    Intelligent optimization algorithms are more self-organizing and have optimization capabilities.It can control the behavior of the whole group through the interaction of individuals without supervision,and the algorithm is easy to implement.Liu et al.[15]used the optimization ability of HHO to solve the shortcomings of clustering algorithms that tend to fall into local optimum.A data traffic classification method combining a clustering algorithm and improved HHO is proposed.The improved HHO is used to generate initial clustering centers.The initial center position is the guiding centroid for data traffic classification.Good classification results have been achieved in datasets.Sayed et al.[16]proposed an improved extreme optimization (EO) version.Optimization of EO search efficiency by chaotic mapping and transfer function.Apply it to the feature selection task of machine learning.Alrowais et al.[17]proposed a new intrusion detection method.This method uses an AOA to initialize the cluster set and the AOA algorithm to optimize the parameters of the classification model.This method optimizes the recognition effect of the model.Yang et al.[18]proposed an adaptive integration model.In this method,the salp swarm algorithm(SSA)is used to form the wrapper selection feature,and SSA is applied to the weight optimization of the matrix.Then,a new classifier is integrated with an adaptive weighted voting method to realize the accurate identification of abnormal traffic in multiple dimensions.These methods use an intelligent optimization algorithm to optimize the machine learning algorithm or improve the network traffic identification model combined with the machine learning algorithm,achieving good results in high-dimensional feature selection.

    From the no-free lunch theorem[19],it is clear that no single algorithm can solve all optimization problems.Some algorithms still have the drawback of falling into local optimum after improvement,and algorithms with more robust search capability are needed to solve the network traffic identification feature selection problem.

    3 Preliminary Work

    3.1 Jumping Spider Optimization Algorithm

    A new group intelligence algorithm called JSOA was proposed in 2021,which is conceptually simple,easy to implement,and efficient in finding the best.The jumping spider attack and search behaviors are switched randomly,and JSOA uses a position migration equation to update individual positions of low information rate jumping spiders.

    3.1.1 Attack

    The attack behavior of jumping spiders corresponds to the development of algorithms with persecution attacks and jumping attacks.Jumping spiders choose their attacks by the size of r,a random number between[0,1].Whenr <0.5,jumping spiders attacked their prey persecution.The persecution equation is as follows:

    xi(t+1)is the new position of the jumping spider individual,xiis the position of theithjumping spider,is the position vector of theithjumping spider,xr(t)is the position vector of therthrandom jumping spider,ir.

    Whenr<0.5,the jumping spider jumps to attack its prey with the following jumping equation:

    The size ofv0is 100 mm/seg,the gravitational forcegis 9.80665 m/s∧2,and theαangle is determined using a value for theφangle at random between(0,1).

    3.1.2 Search

    The search behavior of the jumping spider corresponds to the exploration of the algorithm,including global and local search,and the search method is selected by the size of r.

    Whenr<0.5,a local search is performed:

    Whenr>0.5,a global search is performed:

    3.1.3 Pheromone Ratio

    The jumping spiders with low pheromone ratios less than or equal to 0.3 for the current iteration were relocated.The model for calculating the pheromone ratio of jumping spiders is as follows:

    FitnessmaxandFitnessminrepresent the worst and best fitness values of the current iteration of the population,respectively,andFitness(i)is the fitness value of theithcurrent jumping spider.The positional migration equation is as follows:

    3.2 Learning Algorithms

    This paper uses the KNN learning algorithm to calculate the classification accuracy of selected feature subsets.The KNN algorithm finds the nearest K points of the sample to be predicted by the Euclidean distance and gives the prediction based on the majority of K points.The Euclidean distance is as follows:

    XandYdenote two points with n dimensions.

    4 HHJSOA for Network Traffic Identification Feature Selection

    4.1 A New and Enhanced Search Strategy Incorporating Harris Hawk Optimization

    The division of the search phase of the JSOA algorithm is based entirely on the size of random numbers,which prevents the global and local stages of the algorithm from being correctly balanced.On the one hand,the search space of jumping spiders is more extensive,and it is difficult to miss critical search information.On the other hand,the local exploration of JSOA is poor,and it is easy to fall into the local optimum.HHO is an intelligent population algorithm proposed in 2019,where HHO decreases prey’s energy and enters the local exploitation phase as the number of iterations increases.Due to Lévy wandering,HHO is highly resistant to local optima and disturbances and can successfully prevent the algorithm from“prematurely.”Therefore,this paper introduces the HHO prey escape energy factor E to form a seamless transition from global to local search in JSOA.The following is the equation for the escape energy factor E:

    E0is the random number of(-1,1)energy primaries,tis the current iteration,andTis the total number of iterations.

    According to the escape energy factor E,We divide the jumping spider predation process into an intensive search phase,a search phase,and an attack phase.This search strategy solves the shortcomings of unbalanced global exploration and local development stages of JSOA and JSOA,easily falling into local optimization.

    Several steps of the algorithm are listed below:

    When E>1,jumping spiders jump and search for prey,and prey are found and hide in the nearby area,and the population updates its position using Eq.(2);

    When 0.5

    When E<0.5,the prey’s energy is depleted,and according to the persecutory attack Eq.(1),the jumping spider starts its attack to catch it.

    However,the persecution attack has only information interaction between the current individual and random individuals and lacks global exploration.The escape energy factor E is always less than one at the end of the iteration.This situation will lead the algorithm to a local optimum.Therefore,consider introducing the hard siege equation of HHO.The equation relies on the current position and the optimal individuals to achieve a diverse information interaction process.The following is the jumping spider hard siege equation:

    4.2 Poor Solution Update Mechanism Using the Small Hole Imaging

    If the child performs worse than the parent,the parent will be kept by the following generation without any improvements,according to the JSOA algorithm’s flow.This type of update wastes the computational resources used for this iteration,slows down the method’s convergence,and leads it to inferior accuracy of its converge.The process is assumed to enter the next iteration without improving the parent.In this case,the small hole imaging concept [20] is used to overcome this deficiency of the primary jump spider optimization process and regenerate the reverse solution.If the new solution outperforms the previous one,the old key is changed to a better one.Fig.1 shows how small hole imaging works.

    wmaxandwminare 0.9 and 0.4,respectively;tis the number of iterations,nor(0,1)is the random number between 0 and 1,nis the parameter,and whenn=1,the small hole imaging is the general backward learning strategy.In this paper,it is known that the convergence speed and convergence accuracy are the best whenn=2 after several experiments.

    Figure 1:Small hole imaging diagram

    The hybrid algorithm forms a new type of jumping spider search strategy.The global exploration capability of the original algorithm is retained,and the convergence is faster and more exploitable.The HHJSOA process is shown in Fig.2.

    Figure 2:HHJSOA flow chart

    4.3 HHJSOA for Network Traffic Identification Feature Selection

    For the feature selection problem in traffic recognition,the following main processes are used to optimize the problem in this paper.To obtain a better feature subset scheme and classification accuracy.The flowchart of HHJSOA for the network traffic identification feature selection method is given in Fig.3.

    Figure 3:HHJSOA for network traffic identification feature selection flowchart

    A jumping spider is a search agent using the HHJSOA algorithm for feature selection.Each jump spider is encoded as a binary string,representing the feature selection scheme.The feature selection scheme is to select an acceptable 0/1 string.Each dimension takes 1(selected)and 0(unselected)values in the feature selection process.As shown in Fig.3,according to the feature optimization method in this paper,the feature selection method for network traffic identification based on HHJSOA mainly has the following process:

    Step 1:Load the dataset,pre-clean,and generalize the training data to get the collated dataset D.

    Step 2: Set the search agent population size N,the maximum number of iterations T,and the initialization parameters.

    Step 3:Initialize the position of each jumping spider in the jumping spider population;since the jumping spider’s positions are decimal numbers,they need to be mapped to 0 or 1 by the mapping function,shown in Eqs.(15)and(16).

    Xidrepresents the value of theithjumping spider individual in thedthdimension,and random means the random number in[0,1].The values of the jumping spider individuals are mapped to[0,1]by the conversion of the equation.The updated binary value of each dimension of the jumping spider individual is obtained.

    According to the mapping scheme,let the jumping spider position of HHJSOA beXi=(Xi1,Xi2,Xi3,...,Xid),and each element represents the selected feature.The value ofXidis 0 or 1.The updated setDnewis obtained,and the fitness value of the jumping spider individual is calculated according to the feature fitness function.Based on the fitness value,the quality of each jumping spider individual is evaluated,and the best jumping spider is retained.The feature selection fitness function in this paper is shown in Eq.(17).

    whereaγ(D)indicates classification error rate,γis the number of feature subsets selected,Nis the original number of characteristics;αandβare weighted,α∈[0,1] andβ=1-α[21].We takeα=0.99 andβ=0.01.

    Step 4: Binary decoding is performed for each jumping spider individual,and the jumping spider individual position is updated according to the HHJSOA search strategy;the jumping spider individual is mapped between[0,1]according to Eq.(15),and the jumping spider individual position is updated using Eq.(16).

    Step 5: Decode each jumping spider individual again,compare the updated jumping spider individual fitness value to the fitness value of the original jumping spider individual,and keep the better jumping spider individual.

    Step 6:Determine whether the iteration reaches the termination condition;if yes,end the iteration.Otherwise,execute Step 4.

    5 Experimental Design and Analysis

    Section 5 is divided into two parts—the first part experiments with the effectiveness analysis of the HHJSOA algorithm.The second part validates the algorithm HHJSOA performance in network traffic identification on the UNSW-NB15 and KDD99 datasets.The experiments use an NVIDIA GeForce MX130 graphics card and Intel(R)Core(TM)i5-8265U(1.80 GHz)processor.The software environment is Windows 10,and the experiments are executed in Matlab2018b.

    5.1 Data Set Selection

    This section uses the UNSW-NB15 dataset for comparison experiments.UNSW-NB15 has 2540004 data and contains 49 features in ten categories,including one normal type and nine attack types.Table 1 records the details of UNSW-NB15.The attack types are“Fuzzers,”“Analysis,”“Backdoors,”“DoS,“Exploits,”“Generic,”“Reconnaissance,”“Shellcode,”and“Shellcode”and“Worms.”The original UNSW-NB15 dataset has redundant samples.The feature values are the same,but the categories are different.Therefore,we use a subset version of the UNSW-NB15 dataset.175,341 data in the training set and 82,332 in the test set of the subset version of the UNSW-NB15 dataset,containing 41 features.A random sample of 10% of the data from the training and test sets of the subset is taken as the training and test sets,respectively.

    Table 1:Test functions

    The KDD99 dataset contains 41 categories,of which 38 are numeric features,and 3 are characterbased features.Each connection record in the dataset can be categorized as“Normal,”“DOS,”“R2L”,“U2R,”and“Probing.”We processed 10% of kddcup.data_10_percent_corrected,and the test dataset was corrected.After that,10% of the data are randomly selected from the training and test sets as the experimental dataset.

    5.2 HHJSOA Performance Analysis

    Six standard test functions were chosen to test whether the HHJSOA algorithm significantly improved performance.The search space,dimensionality,and theoretical optimum of the test functions are described in Table 1.f1is a single-peaked high-dimensional function.f2is a single-peaked low-dimensional function.f3andf4are multi-peaked high-dimensional functions.f5andf6are multipeaked low-dimensional functions.All the functions we used are solved for the minimum values.

    HHJSOA was compared with JSOA,jumping spider optimization with chaotic drifts (CJSOA)[22],Nonlinear-based chaotic harris hawks optimization (NCHHO) [23],An improved grey wolf optimizer (IGWO) [24],JSOA,and Tunicate Swarm Algorithm (TSA) [25].Set the number of populationsn=30 and the dimension of the functionD=30 orD=2.Comparative analyses were performed in terms of comparative analysis of solution quality,analysis of robustness and convergence speed of the algorithm,and Friedman and Wilcoxon tests,respectively.The maximum number of evaluations is 500×D.Each algorithm was run 20 times independently on each of the six test functions,and the mean error(MAE)and standard deviation(Std)were calculated.Table 2 shows the mean error and standard deviation of the six algorithms.Fig.4 shows the convergence curves of fitness values of the 6 algorithms on partial functions.The convergence curve reflects the convergence speed of the algorithm and the ability to jump out of the local optimum.

    Table 2:Mean error and standard deviation of the six algorithms(D=30,2)

    As seen from Table 2,HHJSOA achieves similar results to IGWO onf6and the same results as CJSOA onf2.HHJSOA reaches at least 10 of minus 100 orders of magnitude improvement in the optimality finding accuracy on different types of functions compared to JSOA.In addition,HHJSOA achieves the optimal mean error and standard deviation on five different kinds of functions with convergence accuracy almost to the optimal solution.The overall robustness of the HHJSOA algorithm is better than the comparison algorithm,the convergence accuracy is higher,and the optimization is stable to the theoretical optimum.As seen from Fig.4,f1,andf3indicate that HHJSOA has a stronger ability to jump out of the local optimum.f2andf6show that HHJSOA has faster convergence and stronger optimization capability.The integration of HHO and small hole imaging balance the global search and local search of HHJSOA,improving search efficiency and solution quality.

    Figure 4:Convergence curves of the fitness values of the 6 algorithms on partial functions

    To make a more objective evaluation of the algorithms,we used the Friedman and Wilcoxon tests in mathematical statistics to make an overall comparative analysis of the convergence ability of the algorithms.Table 3 shows the results of the Fireman test for all algorithms for six functions(D=30,50,100,2).The smaller the Ranking value,the stronger the optimization ability of the algorithm.Table 4 shows the Wilcoxon test results of the six algorithms on the functions.It is determined whether there is a significant difference between the algorithms.

    As seen from Table 3,the ranking values of HHJSOA are 1.71,1.69,and 1.69 for different dimensions.This ranking is the smallest among all the algorithms.It is smaller than the basic JSOA algorithm by 2.24,2.26,and 2.25,respectively.For the other algorithms,HHJSOA is at least 1.00,1.00,and 0.99 smaller,respectively.Therefore,the algorithm’s overall performance suits both high and lowdimensional functions.Compared with the comparison algorithms,HHJSOA has a better competitive edge.As seen from Table 4,ata=0.05,the differences are significant for the other two algorithms,CJSOA and NCHHO,and highly significant to IGWO,JSOA,TSA,and HHJSOA.The convergence performance of the HHJSOA algorithm is further demonstrated to be better than the comparison algorithm by Wilcoxon discrepancy analysis.

    5.3 HHJSOA for Network Traffic Identification Feature Selection Performance Analysis

    Set the population size N=30 and the maximum number of iterations T=500.Fig.5 shows the convergence curves of the fitness values of the six algorithms HHO,EO,WOA,GWO,JSOA,and HHJSOA on different datasets.The convergence curve of the fitness value reflects the convergence speed of the algorithm and the ability of the algorithm to jump out of the local optimum.A boxplot is a statistical graph describing the dispersion of a set of data.It can also reflect the stability of the optimization effect.The size of the interquartile range (IQR) is used in the boxplot to describe the dispersion of the optimization effect.To avoid experimental errors,the experiments were recorded 20 times the optimal fitness value for each algorithm.Fig.6 shows the boxplot of HHJSOA with the other five algorithms on the two datasets.

    As seen from Fig.5,the JSOA algorithm converges quickly in the early stage,but the results are not good in the later stage.As the number of iterations of the algorithm increases,the algorithm keeps falling into and jumping out of the local optimum.On the UNSW-NB15 dataset,after 200 generations,JSOA can no longer jump out of the local optimum.The other algorithms fall into a local optimum on both data sets after about 100 generations and cannot jump out.On the KDD99 dataset,HHO has the ability to jump out of the current local optimum at a later stage,but no longer has a stronger local search capability after 500 generations.The GWO algorithm achieves comparable results to HHJSOA on the KDD99 dataset.But in contrast,HHJSOA converges faster in comparison.Collectively,HHJSOA is more capable of jumping out of local optimum and converging faster.

    Figure 5:Comparison convergence curves of each algorithm on different datasets

    Figure 6:Boxplot for each algorithm on different datasets

    As seen from Fig.6,the WOA,GWO,and JSOA algorithms produce outliers among the twenty optimal results on the UNSW-NB15 dataset.They are 0.00784,0.00858,and 0.00632,respectively.This situation indicates that WOA,GWO,and JSOA easily fall into the local optimum.The median of HHJSOA is 0.00552,and the median of HHO,EO,WOA,GWO,and JSOA algorithms are 0.00977,0.00665,0.00979,0.00682,and 0.00882,respectively.The median of HHJSOA is the lowest,at least 0.00113,smaller than the other algorithms.Therefore,HHJSOA each time produced the best quality jumping spider individual compared to several different algorithms.The IQR of HHJSOA is 0.00139,and the IQRs of the HHO,EO,WOA,GWO,and JSOA algorithms are 0.00148,0.00110,0.00100,0.00060,and 0.00140,respectively.The IQR of HHJSOA is 0.00039 larger than that of EO,but overall,HHJSOA achieves a better fitness value each time is better.On the KDD99 dataset,WOA,GWO,and JSOA also produce outliers of 0.00122,0.00212,and 0.00166,respectively.The median of HHJSOA is 0.00122,and the IQR is 0.00015.The IQR and median of HHJSOA are the smallest among the remaining three algorithms.This indicates that the optimal fitness value obtained by the HHJSOA algorithm is the least discrete among the six algorithms.

    To show the experimental results more clearly,we record each algorithm’s correct rate,fitness value,and number of features after 20 independent runs in Table 5.

    Table 5:Feature selection results for each algorithm on the UNSW-NB15 dataset

    As seen from Table 5,HHJSOA achieves an accurate rate of 92.50%,while HHO,EO,WOA,GWO,and JSOA are 80.30,85.45,75.10,79.20,and 82.40,respectively.Compared with the basic JSOA algorithm,HHJSOA achieves a 10.1% improvement in the accuracy rate and at least a 7.05%improvement compared with other algorithms.The HHO classification accuracy is higher,but the convergence speed is slower.It shows that HHJSOA converges faster while improving classification accuracy.Regarding the number of features,WOA and GWO are 7,and HHJSOA is 6.HHO,EO,and JSOA achieve the same results as HHJSOA.However,from the average fitness value,HHJSOA is only 0.00531,the smallest among several algorithms.It indicates that the HHJSOA algorithm converges faster and has a more vital ability to jump out of the local optimum while ensuring a higher classification accuracy.

    6 Conclusion and Future Directions

    Traffic identification is crucial for network structure design,operation management,quality assurance,and security.To address the problem that high-dimensional features make machine learning algorithms take a long time to converge,and classification algorithms easily fall into local optimum.In this paper,we propose an improved jumping spider optimization algorithm HHJSOA.Firstly,we fuse HHO and use the escape energy factor and hard siege strategy to balance the global and local search of JSOA.Secondly,the original optimal solution is optimized using small hole imaging.The shortcomings of the original algorithm JSOA with poor convergence and easy fall into local optimum are solved.The effectiveness of the HHJSOA algorithm is verified by solving six different benchmark functions.The HHJSOA algorithm solves the network traffic identification feature selection problem.The results show that HHJSOA performs best compared with HHO,EO,WOA,GWO,and JSOA algorithms on the UNSW-NB15 dataset and KDD99 dataset.However,the correct classification rate of HHJSOA is less than 95%.The classification effectiveness of the HHJSOA-based feature selection method for network traffic identification used in this paper is related to the optimal feature subset evaluator.However,the selected optimal feature subset is evaluated only on the KNN classification algorithm.In future work,other classification algorithms can be added for comparative study to choose a classifier more suitable for HHJSOA to solve the high-dimensional network traffic identification feature selection problem.

    Acknowledgement:The authors would like to thank the anonymous reviewers for their valuable comments,which improved the quality of our original manuscript.

    Funding Statement:This work is funded by the National Natural Science Foundation of China under Grant No.61602162.

    Author Contributions:study conception and design: X.H,H.Y,C.W,and H.L;data collection: H.Y;analysis and interpretation of results:X.H,H.Y,and C.W;draft manuscript preparation:X.H,H.Y,C.W,and H.L,All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The datasets used in this study are all publicly available datasets,which you can access in the following websites.https://www.kaggle.com/datasets/mrwellsdavid/unswnb15.http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    精品一区二区三区四区五区乱码 | 日本猛色少妇xxxxx猛交久久| 高清不卡的av网站| 亚洲精品国产区一区二| 秋霞伦理黄片| 在线天堂最新版资源| 人人妻人人澡人人看| 国产精品一区二区在线不卡| 青春草国产在线视频| 在线观看免费视频网站a站| 国产有黄有色有爽视频| 日韩大片免费观看网站| 人人妻人人添人人爽欧美一区卜| 亚洲熟女毛片儿| 午夜福利乱码中文字幕| 又大又爽又粗| 丰满迷人的少妇在线观看| 九色亚洲精品在线播放| 日韩精品免费视频一区二区三区| 一级片免费观看大全| 精品一区二区三区四区五区乱码 | 国产97色在线日韩免费| 久久精品国产综合久久久| 在线亚洲精品国产二区图片欧美| 国产欧美亚洲国产| 国产国语露脸激情在线看| 精品少妇久久久久久888优播| 一二三四在线观看免费中文在| 欧美97在线视频| 狠狠婷婷综合久久久久久88av| 最黄视频免费看| 看免费av毛片| 999久久久国产精品视频| 欧美人与善性xxx| 日韩大码丰满熟妇| 黑人欧美特级aaaaaa片| 黄色 视频免费看| 国产毛片在线视频| 日本午夜av视频| 黑人欧美特级aaaaaa片| 亚洲精品国产区一区二| 亚洲av日韩精品久久久久久密 | 亚洲免费av在线视频| 亚洲成人手机| 国产在线一区二区三区精| 亚洲中文av在线| 婷婷色综合大香蕉| 亚洲国产欧美网| 18禁动态无遮挡网站| a级片在线免费高清观看视频| 日韩一本色道免费dvd| 国产男女内射视频| 水蜜桃什么品种好| 18禁国产床啪视频网站| 国产一区二区三区av在线| 国产一区二区 视频在线| 欧美成人午夜精品| 黄片小视频在线播放| 天天躁夜夜躁狠狠久久av| 国产精品免费大片| 欧美 亚洲 国产 日韩一| 国产日韩欧美亚洲二区| 永久免费av网站大全| 欧美日韩亚洲国产一区二区在线观看 | 午夜av观看不卡| 久久热在线av| 自线自在国产av| 日韩熟女老妇一区二区性免费视频| av福利片在线| 精品少妇内射三级| 久久久久国产精品人妻一区二区| 巨乳人妻的诱惑在线观看| 天天添夜夜摸| 亚洲精品久久久久久婷婷小说| 丝袜人妻中文字幕| 人人妻人人澡人人看| 国产精品女同一区二区软件| 18禁观看日本| 香蕉丝袜av| 久久久精品国产亚洲av高清涩受| 超碰成人久久| 久久天堂一区二区三区四区| 欧美日韩一级在线毛片| av电影中文网址| tube8黄色片| 一级毛片黄色毛片免费观看视频| 在线观看三级黄色| 秋霞在线观看毛片| 伦理电影大哥的女人| 亚洲av成人精品一二三区| 国产免费视频播放在线视频| 精品亚洲乱码少妇综合久久| 交换朋友夫妻互换小说| 欧美日韩视频高清一区二区三区二| 国产亚洲av高清不卡| 宅男免费午夜| 久久久精品国产亚洲av高清涩受| 欧美乱码精品一区二区三区| 男女无遮挡免费网站观看| 交换朋友夫妻互换小说| 精品一区二区三区av网在线观看 | 国产成人精品久久久久久| 成人国产av品久久久| 国产成人精品在线电影| 亚洲av日韩在线播放| 最新在线观看一区二区三区 | 日韩一区二区三区影片| 久久精品国产亚洲av涩爱| 国产成人精品久久久久久| 亚洲欧洲国产日韩| 国产精品一区二区在线不卡| 啦啦啦啦在线视频资源| 久久天堂一区二区三区四区| 看非洲黑人一级黄片| 午夜福利视频精品| 精品一区二区三卡| 久久精品亚洲av国产电影网| 两个人看的免费小视频| 国产日韩欧美视频二区| 女性生殖器流出的白浆| e午夜精品久久久久久久| 99久国产av精品国产电影| 一区福利在线观看| av在线观看视频网站免费| 午夜免费鲁丝| 乱人伦中国视频| 欧美激情高清一区二区三区 | 18禁国产床啪视频网站| 久久久精品国产亚洲av高清涩受| 国产精品99久久99久久久不卡 | 亚洲国产欧美网| 亚洲伊人色综图| 看免费成人av毛片| 日韩大片免费观看网站| 丝袜美足系列| 久久久久久人人人人人| 美女脱内裤让男人舔精品视频| 成人三级做爰电影| 纯流量卡能插随身wifi吗| 女性生殖器流出的白浆| 色综合欧美亚洲国产小说| 777久久人妻少妇嫩草av网站| 午夜免费男女啪啪视频观看| 人人妻人人澡人人看| 欧美人与性动交α欧美软件| 午夜福利,免费看| 少妇被粗大猛烈的视频| 中文乱码字字幕精品一区二区三区| 赤兔流量卡办理| 哪个播放器可以免费观看大片| av国产久精品久网站免费入址| 巨乳人妻的诱惑在线观看| 最新的欧美精品一区二区| 看免费av毛片| 欧美精品高潮呻吟av久久| 亚洲av国产av综合av卡| av电影中文网址| 精品人妻在线不人妻| 一区在线观看完整版| 99九九在线精品视频| 美女中出高潮动态图| 亚洲人成电影观看| 一本大道久久a久久精品| 在线观看免费视频网站a站| 中文欧美无线码| 亚洲成人手机| 亚洲成人国产一区在线观看 | 91精品国产国语对白视频| 精品亚洲成a人片在线观看| 国产精品久久久久久人妻精品电影 | 在线观看人妻少妇| 成人毛片60女人毛片免费| 男女边吃奶边做爰视频| 老熟女久久久| 在线观看免费日韩欧美大片| av不卡在线播放| 国产成人午夜福利电影在线观看| 视频区图区小说| 一级毛片我不卡| 成年av动漫网址| 大陆偷拍与自拍| 日韩av免费高清视频| 999精品在线视频| 国产熟女欧美一区二区| 国产成人av激情在线播放| av线在线观看网站| 超色免费av| 午夜日韩欧美国产| 高清视频免费观看一区二区| 成人三级做爰电影| 日韩制服丝袜自拍偷拍| 亚洲av国产av综合av卡| 2021少妇久久久久久久久久久| 在线观看免费视频网站a站| 这个男人来自地球电影免费观看 | 午夜福利,免费看| 色婷婷av一区二区三区视频| 亚洲精品中文字幕在线视频| 成人毛片60女人毛片免费| 校园人妻丝袜中文字幕| 日韩一区二区视频免费看| 日本午夜av视频| 在现免费观看毛片| 亚洲成av片中文字幕在线观看| 亚洲一卡2卡3卡4卡5卡精品中文| 午夜免费鲁丝| 国产乱人偷精品视频| 天天躁夜夜躁狠狠久久av| 天美传媒精品一区二区| 久热这里只有精品99| 欧美人与性动交α欧美精品济南到| 精品一区在线观看国产| 国产精品免费视频内射| 日韩中文字幕欧美一区二区 | 亚洲精品久久久久久婷婷小说| 亚洲 欧美一区二区三区| 在线观看一区二区三区激情| 欧美精品一区二区免费开放| 不卡av一区二区三区| 人人妻人人爽人人添夜夜欢视频| 高清av免费在线| 国产精品久久久久久久久免| 精品福利永久在线观看| 久久韩国三级中文字幕| 亚洲国产精品999| 性少妇av在线| 国产成人欧美| 亚洲av国产av综合av卡| 欧美乱码精品一区二区三区| 国产在线免费精品| 亚洲av电影在线观看一区二区三区| 欧美 日韩 精品 国产| 男女免费视频国产| 久久国产亚洲av麻豆专区| avwww免费| 又大又黄又爽视频免费| 久久久久久免费高清国产稀缺| 欧美激情高清一区二区三区 | 亚洲av日韩精品久久久久久密 | 91aial.com中文字幕在线观看| 一级毛片我不卡| 亚洲,欧美,日韩| 精品午夜福利在线看| 黄色 视频免费看| 欧美精品一区二区大全| 美国免费a级毛片| 91精品三级在线观看| 中文精品一卡2卡3卡4更新| 女的被弄到高潮叫床怎么办| 青草久久国产| 黄色视频在线播放观看不卡| 久久国产精品大桥未久av| 制服人妻中文乱码| 精品视频人人做人人爽| 国产精品亚洲av一区麻豆 | 精品久久久久久电影网| 亚洲av综合色区一区| 99国产综合亚洲精品| 久久久精品94久久精品| 中文字幕制服av| 一级片免费观看大全| 好男人视频免费观看在线| 亚洲,欧美精品.| 国产男人的电影天堂91| www.自偷自拍.com| 亚洲人成电影观看| 国产精品一区二区精品视频观看| 国产成人精品久久久久久| 日日摸夜夜添夜夜爱| av视频免费观看在线观看| 桃花免费在线播放| 国产一级毛片在线| 亚洲精品,欧美精品| av不卡在线播放| av有码第一页| www.精华液| 精品人妻一区二区三区麻豆| 久久精品久久久久久噜噜老黄| 久久久久国产精品人妻一区二区| 免费观看人在逋| 多毛熟女@视频| 欧美亚洲日本最大视频资源| 老司机影院毛片| 亚洲国产精品一区三区| 亚洲精品久久成人aⅴ小说| 国产麻豆69| 精品国产超薄肉色丝袜足j| 男女下面插进去视频免费观看| 黄色毛片三级朝国网站| 中文字幕人妻丝袜一区二区 | 在线精品无人区一区二区三| 国产精品一区二区在线不卡| 国产成人午夜福利电影在线观看| √禁漫天堂资源中文www| 丝袜喷水一区| 操美女的视频在线观看| 高清在线视频一区二区三区| 久久久精品国产亚洲av高清涩受| 熟妇人妻不卡中文字幕| 久久久久精品久久久久真实原创| 中文字幕亚洲精品专区| av免费观看日本| 一边摸一边做爽爽视频免费| 国产黄色免费在线视频| 午夜激情av网站| 香蕉丝袜av| 嫩草影院入口| 久久女婷五月综合色啪小说| 国产成人a∨麻豆精品| 久久精品国产亚洲av涩爱| 国产人伦9x9x在线观看| 另类亚洲欧美激情| 国产亚洲最大av| 精品一区二区三卡| 2018国产大陆天天弄谢| 日本欧美视频一区| 久久久久国产一级毛片高清牌| 亚洲精品一区蜜桃| 在线观看免费午夜福利视频| 韩国高清视频一区二区三区| 一区二区三区精品91| 一本大道久久a久久精品| 中文字幕人妻丝袜一区二区 | 高清视频免费观看一区二区| 久久久久久久久免费视频了| 亚洲成av片中文字幕在线观看| 丰满乱子伦码专区| 免费看不卡的av| 国产精品三级大全| 久久久精品免费免费高清| 啦啦啦在线观看免费高清www| 伊人久久国产一区二区| 国产极品粉嫩免费观看在线| 国产爽快片一区二区三区| 如日韩欧美国产精品一区二区三区| av国产精品久久久久影院| 国产野战对白在线观看| 亚洲激情五月婷婷啪啪| 在现免费观看毛片| 纵有疾风起免费观看全集完整版| 亚洲国产精品成人久久小说| 国产成人精品久久二区二区91 | 90打野战视频偷拍视频| 色播在线永久视频| 叶爱在线成人免费视频播放| 一区二区三区乱码不卡18| 久久久国产精品麻豆| 精品少妇久久久久久888优播| 久久av网站| 久久久久精品国产欧美久久久 | 亚洲三区欧美一区| 国产黄频视频在线观看| 免费看av在线观看网站| 婷婷色综合大香蕉| 999精品在线视频| 午夜福利网站1000一区二区三区| 最近中文字幕高清免费大全6| 在线观看一区二区三区激情| 青草久久国产| 超碰成人久久| 国产在线免费精品| 亚洲国产中文字幕在线视频| 久久久精品区二区三区| 亚洲成人av在线免费| 丰满乱子伦码专区| av在线老鸭窝| 久久精品久久久久久噜噜老黄| 亚洲欧美精品综合一区二区三区| 久久久国产精品麻豆| 丰满乱子伦码专区| 亚洲精品一区蜜桃| 亚洲国产欧美一区二区综合| 99久久综合免费| 国产爽快片一区二区三区| 国产成人a∨麻豆精品| av有码第一页| 久久av网站| 少妇人妻 视频| 亚洲国产精品成人久久小说| 十八禁网站网址无遮挡| 亚洲精品乱久久久久久| 欧美日韩亚洲高清精品| 麻豆av在线久日| 一级毛片我不卡| 国产精品久久久人人做人人爽| 可以免费在线观看a视频的电影网站 | 色播在线永久视频| 国产成人午夜福利电影在线观看| 精品久久久久久电影网| 丝袜脚勾引网站| 看十八女毛片水多多多| 国产人伦9x9x在线观看| 亚洲精品一区蜜桃| 男女下面插进去视频免费观看| 日日爽夜夜爽网站| 涩涩av久久男人的天堂| 亚洲第一青青草原| 国产极品粉嫩免费观看在线| 2021少妇久久久久久久久久久| 秋霞伦理黄片| 青草久久国产| 99九九在线精品视频| 成年动漫av网址| 亚洲国产av新网站| 麻豆精品久久久久久蜜桃| videosex国产| 成人手机av| 热re99久久国产66热| 欧美精品高潮呻吟av久久| 亚洲精品日韩在线中文字幕| 国产99久久九九免费精品| 国产野战对白在线观看| 精品福利永久在线观看| 丰满迷人的少妇在线观看| 黑人巨大精品欧美一区二区蜜桃| 国产有黄有色有爽视频| 自拍欧美九色日韩亚洲蝌蚪91| 麻豆精品久久久久久蜜桃| 黄色一级大片看看| 99久久精品国产亚洲精品| 亚洲欧美精品综合一区二区三区| 高清视频免费观看一区二区| 视频区图区小说| 色婷婷久久久亚洲欧美| 男女床上黄色一级片免费看| 最黄视频免费看| 2021少妇久久久久久久久久久| 尾随美女入室| 看非洲黑人一级黄片| 人妻人人澡人人爽人人| 一区福利在线观看| 中文欧美无线码| 国语对白做爰xxxⅹ性视频网站| 两个人免费观看高清视频| 美女主播在线视频| 在线 av 中文字幕| 欧美日本中文国产一区发布| 国产成人欧美在线观看 | 亚洲国产精品一区二区三区在线| 亚洲精品国产色婷婷电影| 纯流量卡能插随身wifi吗| 伊人亚洲综合成人网| 久久韩国三级中文字幕| 精品人妻在线不人妻| 日韩不卡一区二区三区视频在线| 中文乱码字字幕精品一区二区三区| 亚洲成av片中文字幕在线观看| 18禁裸乳无遮挡动漫免费视频| 麻豆精品久久久久久蜜桃| 你懂的网址亚洲精品在线观看| 国产成人av激情在线播放| 国产一区有黄有色的免费视频| 欧美亚洲 丝袜 人妻 在线| 欧美日韩国产mv在线观看视频| 免费看不卡的av| 国产成人免费观看mmmm| 韩国av在线不卡| 国产熟女欧美一区二区| 观看美女的网站| 色视频在线一区二区三区| 国产免费视频播放在线视频| 亚洲人成网站在线观看播放| av又黄又爽大尺度在线免费看| 亚洲国产精品国产精品| 18在线观看网站| 热99国产精品久久久久久7| 国产一区二区三区综合在线观看| 亚洲免费av在线视频| 男人舔女人的私密视频| 哪个播放器可以免费观看大片| 亚洲欧美激情在线| 满18在线观看网站| 日韩欧美精品免费久久| 大香蕉久久网| 久久人人爽av亚洲精品天堂| 午夜免费观看性视频| 日韩大片免费观看网站| 天天躁夜夜躁狠狠躁躁| av免费观看日本| 韩国高清视频一区二区三区| 亚洲精品视频女| 国产精品99久久99久久久不卡 | 日韩成人av中文字幕在线观看| h视频一区二区三区| 一边亲一边摸免费视频| 国产色婷婷99| 欧美日韩亚洲国产一区二区在线观看 | 赤兔流量卡办理| 精品午夜福利在线看| 十八禁高潮呻吟视频| 亚洲七黄色美女视频| 日韩欧美精品免费久久| 午夜福利乱码中文字幕| 18禁裸乳无遮挡动漫免费视频| 韩国高清视频一区二区三区| 精品福利永久在线观看| 女人爽到高潮嗷嗷叫在线视频| www.av在线官网国产| 夫妻午夜视频| 丝瓜视频免费看黄片| 男人操女人黄网站| 免费黄色在线免费观看| 国产精品偷伦视频观看了| 人妻人人澡人人爽人人| 久久久久精品人妻al黑| 丰满乱子伦码专区| 久热这里只有精品99| 亚洲综合色网址| 国产精品久久久av美女十八| 菩萨蛮人人尽说江南好唐韦庄| 婷婷色av中文字幕| 午夜日本视频在线| 亚洲欧美中文字幕日韩二区| 欧美精品人与动牲交sv欧美| 午夜激情av网站| 高清黄色对白视频在线免费看| netflix在线观看网站| 岛国毛片在线播放| 两个人看的免费小视频| 精品人妻在线不人妻| 大码成人一级视频| 高清在线视频一区二区三区| 别揉我奶头~嗯~啊~动态视频 | 久久天堂一区二区三区四区| 18禁裸乳无遮挡动漫免费视频| 亚洲国产成人一精品久久久| 在线观看免费日韩欧美大片| 9热在线视频观看99| 黄频高清免费视频| 女性被躁到高潮视频| 日韩av不卡免费在线播放| 黄色视频在线播放观看不卡| 免费观看av网站的网址| 精品久久久精品久久久| 午夜福利在线免费观看网站| 综合色丁香网| 国产又色又爽无遮挡免| 2018国产大陆天天弄谢| 精品亚洲成国产av| 一区二区av电影网| 18禁动态无遮挡网站| 两性夫妻黄色片| 亚洲欧美日韩另类电影网站| 日韩av不卡免费在线播放| 欧美国产精品va在线观看不卡| 最近中文字幕2019免费版| 日日摸夜夜添夜夜爱| 中文字幕人妻丝袜一区二区 | 极品少妇高潮喷水抽搐| 成人国产麻豆网| 亚洲国产欧美日韩在线播放| 18在线观看网站| 亚洲五月色婷婷综合| 母亲3免费完整高清在线观看| 高清欧美精品videossex| 国产成人精品久久久久久| 99久国产av精品国产电影| 亚洲七黄色美女视频| 热99国产精品久久久久久7| 最近最新中文字幕大全免费视频 | av在线播放精品| 久久热在线av| 国产免费又黄又爽又色| 成人国产av品久久久| 在线 av 中文字幕| 国产精品av久久久久免费| 午夜福利视频精品| videosex国产| 日日摸夜夜添夜夜爱| 午夜福利免费观看在线| 午夜福利影视在线免费观看| 欧美xxⅹ黑人| 一本久久精品| 99国产综合亚洲精品| av国产久精品久网站免费入址| videosex国产| 卡戴珊不雅视频在线播放| 亚洲精品美女久久av网站| 免费观看性生交大片5| 成年人免费黄色播放视频| 啦啦啦中文免费视频观看日本| 人妻一区二区av| 精品一区二区三区av网在线观看 | 亚洲国产精品成人久久小说| 午夜福利网站1000一区二区三区| 国产老妇伦熟女老妇高清| 亚洲欧美一区二区三区黑人| 色婷婷久久久亚洲欧美| 18禁动态无遮挡网站| 日本av免费视频播放| 婷婷成人精品国产| 别揉我奶头~嗯~啊~动态视频 | 日韩制服骚丝袜av| 亚洲少妇的诱惑av| 少妇的丰满在线观看| 欧美黑人精品巨大| 在线观看国产h片| 五月开心婷婷网| 中文字幕精品免费在线观看视频| 美女大奶头黄色视频| 一边摸一边做爽爽视频免费| 一区二区三区精品91| 中文字幕制服av| 日韩制服骚丝袜av| av在线老鸭窝| √禁漫天堂资源中文www| 考比视频在线观看| 国产精品一区二区在线不卡| 亚洲精品美女久久久久99蜜臀 | 丰满乱子伦码专区| 亚洲第一青青草原| 啦啦啦在线免费观看视频4| 久久久国产精品麻豆| 久久精品国产综合久久久| 国产有黄有色有爽视频|