• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Malicious Traffic Compression and Classification Technique for Secure Internet of Things

    2023-10-26 13:14:48YuRimLeeNaEunParkSeoYiKimandIlGuLee
    Computers Materials&Continua 2023年9期

    Yu-Rim Lee ,Na-Eun Park ,Seo-Yi Kim and Il-Gu Lee,,?

    1Department of Future Convergence Technology Engineering,Sungshin Women’s University,Seoul,02844,Korea

    2Department of Convergence Security Engineering,Sungshin Women’s University,Seoul,02844,Korea

    ABSTRACT With the introduction of 5G technology,the application of Internet of Things(IoT)devices is expanding to various industrial fields.However,introducing a robust,lightweight,low-cost,and low-power security solution to the IoT environment is challenging.Therefore,this study proposes two methods using a data compression technique to detect malicious traffic efficiently and accurately for a secure IoT environment.The first method,compressed sensing and learning (CSL),compresses an event log in a bitmap format to quickly detect attacks.Then,the attack log is detected using a machine-learning classification model.The second method,precise re-learning after CSL (Ra-CSL),comprises a two-step training.It uses CSL as the 1st step analyzer,and the 2nd step analyzer is applied using the original dataset for a log that is detected as an attack in the 1st step analyzer.In the experiment,the bitmap rule was set based on the boundary value,which was 99.6% true positive on average for the attack and benign data found by analyzing the training data.Experimental results showed that the CSL was effective in reducing the training and detection time,and Ra-CSL was effective in increasing the detection rate.According to the experimental results,the data compression technique reduced the memory size by up to 20% and the training and detection times by 67% when compared with the conventional technique.In addition,the proposed technique improves the detection accuracy;the Naive Bayes model with the highest performance showed a detection rate of approximately 99%.

    KEYWORDS IoT security;intrusion detection;machine learning;traffic classification

    1 Introduction

    The development of wireless communication and 5G has increased the utilization of the Internet of Things(IoT)[1].Furthermore,IoT devices are used in various industrial fields such as agriculture,medical care,and manufacturing,and real-time management and automation have improved the efficiency of the related processes [2].In addition,online services have become common because of COVID-19,and there has been rapid growth in areas such as remote working and remote learning[3].Consequently,the scale of damage caused by the leakage of personal information and industrial secrets is increasing,which has highlighted the importance of endpoint security for personal computers(PCs)and smartphones[4].Regarding endpoint security,endpoint detection and response systems,that is,digital forensic tools that monitor a system,have been attracting attention[5].They analyze event logs to detect external intrusions and respond to them.

    As the amount of data received by IoT devices and the communication speed increase,the number of attacks targeting these devices also increases,as does the need for rapid identification of vast amounts of data.Particularly,attacks that take advantage of limited resources such as memory and batteries frequently occur[6].Among them,distributed denial-of-service(DDoS)and ransomware are the most powerful attacks.DDoS and denial-of-service attacks cause a high load because of excessive network traffic to the IoT,thus interrupting the regular operation of the victim device;additionally,ransomware encrypts the victim’s data to disturb legitimate user access[7–9].Furthermore,IoT devices cannot perform their normal operations,making it difficult for organizations to provide smooth services.Moreover,personal information and state secrets may be leaked,which can have spillover effects that include terrorism and war.Therefore,endpoints,such as IoT devices,need to be more secure[4].

    However,it is challenging for a conventional network security solution to apply machine-learning techniques to network traffic data because this requires considerable money and time[10].In addition,the overhead associated with storing and managing large volumes of data continuously collected in a network is significant[11,12].Because IoT has limited storage,installing network monitoring and intrusion detection tools and managing logs are more challenging than that in the case of a general PC.Because security solutions balance security,performance,and resource requirements,they cannot be deployed on devices with limited resources or storage;even if they are implemented,their performance will not be the same as that in a typical PC environment[13].Therefore,a security solution applicable to the IoT environment is needed,and its capability to detect malicious traffic quickly and accurately should be verified.In addition,lightweight data processing and detection techniques are necessary to prevent overload when applying the latest security solutions and reduce the cost of storing big data and cost of improving the specifications of IoT devices.

    This study proposes two techniques to process event logs more efficiently in terms of accuracy and time and detect malicious traffic under environmental restrictions.An experiment was conducted using the UNSW-NB15 dataset of malicious and benign traffic[14–18];the features(string)were excluded.The bitmap rule was set by comparing the values of the features between benign and attack,and all data were expressed as 0 or 1 according to the rule.The first of the proposed methods,the compressed sensing and learning(CSL)technique,performs binary classification with a compressed dataset and then compares the inference results of the machine-learning model with a dataset that has not been converted to the bitmap format.The second method,re-learning after CSL(Ra-CSL),classifies the original dataset of the log that the CSL model predicted as malicious.In the experiment,five machinelearning models were trained and compared to identify models that can effectively detect malicious traffic.

    The contributions of this study are as follows:

    ? A compression technique that minimizes the information loss of the original log data is proposed,which can be applied to IoT environments with limited resources.

    ? A compression technique that can reduce memory usage and detection time is proposed.

    ? According to the characteristics of an application,either one of the techniques—lightweight or high-precision—can be selected.

    The remainder of this paper is organized as follows.Section 2 analyzes the related works and Section 3 describes the compression-based log data analysis method.Section 4 describes the experimental method and analyzes the results.Finally,Section 5 discusses the conclusions and future research directions.

    2 Related Works

    This section discusses the literature on detecting and classifying malicious attacks in IoT environments.Table 1 summarizes the proposals and analysis results of previous studies.

    Table 1:Analysis of related works

    The characteristics of IoT allow various devices to be assembled.These devices are vulnerable to attacks,such as DDoS,which can destroy multiple devices simultaneously.Therefore,a study performed static and dynamic analysis on the behavior of DDoS attacks on IoT and detected malicious files based on the behavioral signatures [19].However,the method proposed in this previous study does not improve the detection accuracy but only analyzes the characteristics of the malicious codes.Its main limitation is that it is challenging to utilize a static analysis that uses function call graphs and extracts host and network behavior in real-time monitoring and detection.However,in this study,after analyzing the distribution of the malicious and normal data,the detection accuracy was improved by applying two-step training and inference.Another behavior-based detection study proposed a system-level IDS named E-Spion that performs anomaly detection for IoT devices[20].In this study,malicious files were detected by analyzing the behavior information at the system level,such as process parameters and system calls;the detection accuracy and overhead cost were then compared and analyzed.However,the experimental results were expressed at a low/high/moderate level rather than as an accurate value.In addition,this previous study utilized system information,whereas the proposed technique utilizes packet and network information.Because this study focuses on the problem of increased vulnerability of IoT systems to attacks such as DDoS when compared with that of other environments owing to the constrained environment of the IoT,it is appropriate to monitor and analyze the network information rather than the system information.

    In addition to behavior analysis-based studies,some studies have been conducted to extract features automatically by applying artificial intelligence techniques [21,22].A study proposed an intelligent detecting,recognizing,and predicting(i-DRP)framework that converts log files and binary datasets into image files and then classifies malicious files using the generalized multilayer perceptron[21].However,they used MNIST—a typical handwritten dataset—rather than a dataset that imaged the actual log files or binary data.The experimental results indicated a high F1-score,which reached 0.979 after performing parameter optimization,but it was difficult to identify the result of classifying the handwritten dataset as the result of malware classification.However,this study used actual malicious and normal traffic datasets to prove the effectiveness of the proposed method.Another study proposed a dynamic analysis for the IoT malware detection (DAIMB) technique that trains malware using a convolutional neural network (CNN).It dynamically analyzes the IoT malware in a nested cloud environment [22].This previous study extracted processes,system calls,virtual file systems,memory,and network-related behaviors and converted them to images.Then,the images were learned and classified on a CNN.However,in this previous study,although an overhead was expected in imaging the extracted behavior,the training time was not measured.In addition,the study had a limitation in that real-time monitoring and processing were difficult owing to the imaging step.In this study,the cumulative time required for training and testing was measured,and the proposed method aimed to shorten the total time,false detection rate,and miss detection rate.

    Several studies have classified malicious packets by training the UNSW-NB15 dataset with machine-learning algorithms [23–25].A study applied the stacking results of four models—random forest,logistic regression,support vector machine (SVM),and K-nearest neighbor (KNN)—using UNSW-NB15 and the flow-based URG’16 datasets [23].This prior study attempted to enhance the generalization ability through an ensemble of three machine-learning algorithms,and multiple classifications were performed.However,in the classification result of the UNSW-NB15 dataset,the precision ranged from 41.6% to 99.42%,the recall ranged from 10.79% to 98.32%,and the deviation was too high.Therefore,applying this method to various cases was difficult;moreover,the study failed to measure the training time.In contrast,in this study,the measured training and testing times demonstrated the effectiveness of the method in terms of speed.In addition,a study performed a binary classification of the KDD-Cup’99,NSL-KDD,and UNSW NB15 datasets frequently used in malware classification studies using a DNN [24].Nonetheless,it did not propose a technique for processing the dataset efficiently but only showed the prediction result of the DNN;moreover,it did not measure the training and testing times.In contrast,this study proposes a method for efficiently processing logs and detecting malicious logs in a constrained environment.It requires less data processing than deep learning by employing machine-learning algorithms.In another study using UNSW-NB15,multiple classifications were performed using C5,CHAID,CART,and QUEST based on the decision tree(DT)algorithm[25].This previous study analyzed the dataset,set the rules for each attack,and integrated them to train the algorithm.However,this algorithm is difficult to use and has a high processing overhead because the set rule varies depending on the classification model.In addition,the deviation between precision and recall was significant depending on the attack,and the training time was not considered.In contrast,because the rules were set depending on the characteristics of each feature,they could be set regardless of the model in this study.Additionally,the total performance time was measured.The technique proposed in this study shows a higher accuracy,and appropriate algorithms may be utilized depending on the required detection environment.Other studies [26–28]have proposed a low-power,lightweight data processing method for the IoT environment.In a study[26] that proposed a lightweight log anomaly detection algorithm,real-time processing speed was achieved using word2vec and PPA,and the detection time and size of the model were reduced by using fewer parameters.However,sufficient detection performance is not guaranteed if the parameters are excessively reduced to reduce the model size.When the data size is large,the model size may inevitably increase as the parameters increase.In contrast,because the method proposed in this study is intended to process data,not parameters of the model,both log processing speed and malicious behavior detection performance are improved.A study[27]that proposed a data compression technology for IoT using the TinyML perspective showed that real-time data processing was possible while achieving a compression rate of up to 98.33% using a TinyML-based compression technology.However,this previous study considered only the real-time data analysis aspect;the anomaly detection aspect was not considered,and the analysis time was not measured.However,in this study,not only is the compression rate considered but it is also used at an appropriate point in the trade-off between data loss and detection rate because of compression.In addition,it was demonstrated to be a lightweight method by measuring the training and testing time.In another study[28],data collected in chronological order were grouped into different univariate time series and then compressed using a lifting scheme.After linearizing the input array,a squeeze algorithm was applied,which compressed the unpredicted data through adaptive curve fitting.This technology allows data to be compressed while reducing errors.However,malicious traffic classification can be difficult with this technology because malicious and normal traffic can be combined into one.In addition,even if malicious traffic is detected,a problem of blocking normal traffic may occur in the response stage.In contrast,in this study,because compression is performed by reducing the range of values of each feature,there is no problem with combining the data of different records.In addition,it is possible to determine whether each unit of data is malicious,even if the data do not exist in chronological order.

    3 Proposed Malicious Traffic Classification Techniques

    In this section,two malicious traffic detection techniques—CSL and Ra-CSL—are proposed,which ensure less storage and resource requirements in environments with data storage constraints,such as IoT.The CSL technique compresses the log data in a bitmap format and detects malicious traffic using a machine-learning model.The Ra-CSL technique performs re-learning after decompressing the data that are detected as an attack.Among the proposed methods,the bitmap rule setting method was developed by referring to the“range encoding”used in a previous study,which applies the bitmap according to the range of values[29].The“range encoding”used in this study analyzes the distribution of values of each feature by label and then expresses all values within a specific range as an attack or normal.For example,if a feature value is [1,6,0,2,7],and the label of this feature is [normal,attack,normal,normal,attack],then range encoding sets a bitmap rule as an attack if the value is 5 or higher.Therefore,all values of each feature can simply be processed with only short conditional statements.The CSL technique enables lightweight data processing through data compression techniques,which can speed up processing and reduce the training and testing times.In contrast,the Ra-CSL technique consists of two stages,including the CSL stage;hence,data processing is slower than with CSL.However,it detects malicious traffic more accurately by performing two-stage detection through the process of verifying the compressed data and original traffic data.Therefore,the CSL or Ra-CSL techniques can be selected according to the characteristics of the application of an IoT device.For example,CSL is suitable for IoT devices that perform manufacturing and automation services where speed is important,and Ra-CSL is suitable for IoT devices that perform mission-critical services where accuracy is important[30].

    3.1 CSL Technique

    The CSL technique is a method for malicious traffic detection based on machine-learning algorithms after converting the log data collected from endpoints to a bitmap format.The basic process of the CSL technique is shown in Fig.1.

    Figure 1:Process of CSL technique

    The CSL technique involves compressing the accumulated data,training from the compressed data,and inferring the labels of the compressed logs.The received log data pertain to network traffic,which includes numerical data such as the number of communication bytes,number of connections,and flag values.The client’s log data can be collected using tools or equipment,such as a network intrusion detection system (NIDS) (e.g.,Snort) or Wireshark,to capture incoming and outgoing TCP/IP packets.

    Before new log data are received,the server(analyzer)has a bitmap rule set using the accumulated dataset.The bitmap rules can vary depending on the computing environment and the user’s normal usage history,and the accumulated dataset can be analyzed and set in consideration of the average value and deflection level of each feature in the normal state.For example,if an IoT sensor that transmits and receives approximately 10 bytes of data on average in the normal state receives 100 bytes of data in the attack state,the boundary between the two labels is specified based on a value between 10 and 100.In data compression,the received log data are compressed by converting the value of each feature of the log data to 1 for the attack range or 0 for the benign range.If the boundary value between two labels is 55,the values below 55 are converted to 0 and those above 55 are converted to 1.Thus,each feature has a label of 0 or 1 in the compressed log data.In addition,a machine-learning classification model is trained by utilizing the result of compressing the accumulated dataset.

    If new log data are received at the endpoint(client)side,data compression is performed according to the bitmap rules stored in the server.The bitmap rule is not complicated and is performed for each feature.Hence,the compression step is a simple task and can be applied to real-time received data.The server performs inference using the machine-learning classification model to determine whether the compressed data of the received log data represent an attack.If specific log data are determined to be an attack by the model,the client that sent the log data can be notified of the attack detection and response.This compression technique can reduce the data size while retaining important information about the attack from the log data.Therefore,it is possible to change the malicious traffic classification problem to a simple binary classification problem and reduce the memory and data processing overhead.

    3.2 Re-Learning After CSL Technique

    Ra-CSL is a method for improving the accuracy of CSL.It performs a precision re-examination based on conventional machine-learning only on the log data determined to be an attack through the compression process.The basic process of the Ra-CSL technique is shown in Fig.2.

    Figure 2:Process of Ra-CSL technique

    The CSL technique described in Section 3.1 is a method for extracting and training a significant part of the entire data.Thus,the data can be trained in a short time while maintaining accuracy.However,this is performed at the risk of some data loss.Therefore,Ra-CSL allows quick identification of suspicious data using CSL and enables their sophisticated analysis while alleviating the data loss problem of CSL.

    In Ra-CSL,the CSL model first selects suspicious data and then trains with the entire data to enable sophisticated inference with a model that has been trained with the entire dataset.Therefore,the proposed methods enable the rapid identification and sophisticated analysis of suspicious data.

    In Ra-CSL,the processes of training with a compressed dataset according to the bitmap rule as a machine-learning model and performing intrusion detection are the same as those in the CSL technique.However,in Ra-CSL,the CSL process is performed in the 1st step analyzer,and the 2nd step analyzer is additionally utilized according to the 1st inference result.In addition,the classification model trained from the original dataset without data compression is stored in the 2nd step analyzer in advance.

    If the 1st step analyzer determines a specific log data as an attack,it sends the original data received from the endpoint and index of that specific log data to the 2nd step analyzer.In addition,because a large amount of log data is collected in a short time in the real world,the client generally sends multiple log data simultaneously.Therefore,index information enables the extraction of only the suspected logs from the log data received from the endpoint.

    Then,the 2nd step analyzer utilizes a machine-learning classification model trained with the original dataset to detect whether this log is an attack.Finally,to determine whether the specific log data represent an attack,the 2nd step analyzer extracts the suspected log using the index information from the data sent by the 1st step analyzer.The client is notified of the log data that is determined to indicate an abnormal behavior by the 2nd step analyzer so that the client,who has transmitted the corresponding log data,can respond.

    4 Performance Evaluation

    4.1 Evaluation Environment

    In the experiment,a VMware workstation-based virtual machine environment was used to compare the performances of the proposed and conventional methods.The server operating system was Ubuntu 18.04 LTS with a dual Intel Core i7-97003.00 GHz CPU,2 GB RAM,and 20 GB hard disk.The endpoint operating system was Ubuntu 18.04 LTS with a dual Intel Core i7-97003.00 GHz CPU,1 GB RAM,1 processor,and 15 GB hard disk to represent a low-resource IoT environment.All machine-learning algorithms used in the experiment were implemented in Python 3 using Jupyter Notebook.

    In this study,it was assumed that IoT devices collect data and transmit the processed data to a data center.In this scenario,data collection using the IoT devices should not be interrupted,necessitating a lightweight security solution.Therefore,a method to efficiently process the data and effectively detect malicious behavior is proposed.In addition,the network traffic dataset was used because the network must remain connected while transmitting and receiving data.

    The UNSW-NB15 dataset was used to take advantage of network traffic data.UNSW-NB15 dataset contains network traffic data,including both benign and attack traffic data,in the raw pcap format,collected using the tcpdump tool.In this study,to confirm the attack detection rate of the proposed technique,the label was classified into the normal state (0) and attack state (1) without distinguishing the attack type,and binary classification was performed.In the experiment,the number of normal and attack labels was equally set to 37,000 samples by undersampling the training data to prevent the effect of data imbalance.

    If the attack data correspond to a small range of attacks,the characteristics not expressed in the given data but expressed in other common attacks can be judged to be normal in the bitmap rules.Therefore,even if binary classification is performed,various attack types must be included in the attack data.Accordingly,in the experiment,binary classification was performed using the UNSWNB15 dataset containing attack data from nine attack families and 205 types of attacks;because it includes various types of attacks,it is a widely used attack traffic dataset.

    The UNSW-NB15 dataset comprises 49 features.Among them,only 21 features were utilized while setting the bitmap rule because the binary classification of the features was difficult or they comprised string types that required additional preprocessing before compression,thus causing overhead.Table 2 shows the data types and the dataset’s feature descriptions.

    Table 3 summarizes the value ranges of the original data and bitmap rules of the proposed compression method.The boundary between attack and benign is decided by analyzing the training set.In a bitmap rule,the boundary value is valid in the dataset used in the experiment and may have to be changed to different values depending on the environment.In this study,the bitmap rule was set by directly analyzing the training data.When setting the bitmap rule,it was impossible to separate the attack from benign by analyzing a single feature independently.Therefore,the bitmap rule was set based on a boundary value,which was 99.6% true positive on average for the classification as attack or benign.Even in a different environment than the dataset used in the experiment,the bitmap rule can be set easily by selecting the boundary value that increases the true positive for one label of the log dataset collected in each environment,as suggested in this study.In addition,once a bitmap rule is set,a large amount of data can be compressed;thus,malicious traffic can be efficiently processed and detected.

    Table 3:Dataset bitmap rules

    The swin and dwin columns were 0 or 255 in the attack,and other values,including 0 and 255,in the benign.For binary classification,0 and 255 were set as an attack.spkts and dpkts are the number of packets sent from the source to the destination and from the destination to the source,respectively.When analyzing the data in both features,the number of packets sent and received during an attack increased significantly.Therefore,according to the range of each feature,spkts greater than or equal to 691 and dpkts greater than or equal to 1,433 were set as attacks.For ct_flw_http_mthd,the values of 0,1,2,4,and 16 for attack and 0,1,2,4,6,12,and 16 for benign were displayed;the values of 0,1,2,4,and 16 appeared as overlapped.In the experiment,overlapped values were set as an attack to prevent the influx of malicious traffic,and the rest were set as normal.In the case of is_sm_ips_ports,when the source and destination IP addresses and port numbers matched,the value was 1;otherwise,when the IP address and port number did not match,it was 0.In the attack case,the value was 0,but in the case of the normal state,both 0 and 1 appeared.Therefore,this feature was also set as an attack when it was 0 and as a normal state when it was 1 to prevent the influx of malicious traffic.

    4.2 Evaluation Results and Analysis

    In the experiment,the efficiency of the proposed data processing method was demonstrated and its performance was compared with those of the conventional,CSL,and Ra-CSL methods.As this study proposes a bitmap-based compression technique that expresses the log data simply,simple machinelearning models are used to classify the log data.The conventional method refers to a study that classifies malicious IoT traffic data using various machine-learning algorithms[31].The random forest(RF),DT,Naive Bayes(NB),and gradient boosting algorithms were used in the comparative study.In addition to the four algorithms used in the previous study,a data processing method that can reliably classify malicious traffic even with a simple algorithm was proposed in this study;hence,the boosting algorithm was excluded.Furthermore,two additional models,which were representative supervised learning classification models,were used.In the experiment,five classification models were compared:logistic regression(LR),SVM,RF,DT,and NB.The evaluation metrics were dataset size,accrual,and training and testing time.The dataset size refers to the capacity of the.csv file;accuracy was calculated by dividing the sum of the true positives and true negatives by the total number of logs.The training and testing time was measured using Python’s time()function.The two techniques proposed in this study include the processing and compressing of data between the training and inference steps.Therefore,to demonstrate the performance of the proposed methods,the time required for the entire process to be performed was measured,that is,the time from training to completion of inference was measured.

    4.2.1 Dataset Size

    For the performance evaluation of CSL and Ra-CSL,30%,50% and 100% of the data were randomly selected from the original dataset and converted into a bitmap format to compare the accuracy according to the compression rate(CR).A CR of 30% indicates that 7 features were compressed,50%indicates that 10 features were compressed,and 100% indicates that all 21 features were compressed;the remaining uncompressed features were the same as in the original data.Therefore,the compressed features may vary depending on the CR,but all compressed features have a value of 0 or 1 because the same bitmap rule is applied.

    Fig.3 shows the dataset size of the conventional and proposed methods according to the CR.Except for the deleted features,which were of the string type or were difficult to binary classification(as explained in Section 4.2),the number of features used in each technique was the same.In CSL,because each value is expressed in the binary form (0 or 1),the size of the dataset decreases as the CR increases.Compared with the conventional technique,the size of the training set decreased by approximately 10.77%,12.92%,and 20.48%,respectively.Further,the size of the test set decreased by approximately 10.92%,12.94%,and 20.29%,respectively,after compression.

    Figure 3:Dataset size comparison

    4.2.2 Accuracy

    In the following experiments,the dataset shown in Fig.3 was used,and the accuracy and detection time were compared for each technique.The performance of the Ra-CSL technique was compared in terms of the CR,and the CR showing the best performance for each algorithm was adopted and compared with those of the conventional and Ra-CSL techniques.

    Fig.4 shows the detection accuracies of the conventional technique for each classification model and those of the CSL technique according to the CR.

    The results of the experiment showed that the CSL technique had excellent performance with all models except NB.In addition,RF,NB,and SVM showed the highest performance when the CR was 30%,and LR and DT showed the best performance when the CR was 50%.It was estimated that the performance would decrease by 100% under a high CR when compared with the performance obtained with the original data owing to data loss.However,at 30% CR,the algorithm acquired the highest accuracy because the data loss was the smallest.At 50%CR,the data loss exceeded 30%,but this was the only CR with more than 90% overall accuracy.Specifically,the best CR differed depending on the characteristic of each algorithm;however,the best detection rate was achieved when the conventional technique and compression method were used in combination.

    Figure 4:Accuracy of training algorithms for different compression rates

    The detection performance of the CSL technique also differed according to the CR of each classification model.LR and DT showed the best performance when compressed by 50%,and the other models performed the best when compressed by 30%.Additionally,the proposed CSL method(except for NB) showed a higher performance than the conventional technique.Particularly,LR and DT showed the highest accuracy of 91%.In the case of RF,which had the lowest detection rate in the conventional technique,CSL showed 85% accuracy,which was an improvement of 53%when compared with that of the conventional technique.Some of the original data were lost while compressing the data,but the detection rate was improved in some cases.This seems to have minimized the loss of important information,as the characteristics for classifying the malicious traffic were retained.The average accuracy of the proposed method was improved by approximately 26% when compared with that of the conventional technique.

    Fig.5 compares the conventional technique with CSL and Ra-CSL at the CR with the best performance.

    Figure 5:Accuracy of conventional,CSL,and Ra-CSL techniques

    In the case of the CSL technique,the expressed CR in Fig.5 was 30% for RF,NB and SVM,and 50% for LR and DT.In the case of Ra-CSL,SVM was compressed by 30%,RF was compressed by 50%,and LR,DT and NB were compressed by 100%.The experimental results showed that the proposed model performed with a higher detection accuracy than the conventional technique for all classification models.In addition,in the case of LR,DT and NB,the detection accuracy was the highest for Ra-CSL.Particularly,in the case of NB,the detection accuracy was less than 65% for the conventional and CSL techniques.However,the detection accuracy of Ra-CSL was approximately 99%,which was an improvement of more than 30% and the best performance among all experimental results.Nevertheless,Ra-CSL showed a lower classification accuracy for RF and SVM.

    4.2.3 Time

    Table 4 shows the training and testing times.

    Table 4:Time required for training and testing for the conventional,CSL and Ra-CSL methods

    The experimental results showed that the time required for the CSL technique was the shortest among the three models,excluding the DT and SVM models.However,in the case of DT and SVM,it took longer than the conventional technique to generate a classification model with limited data owing to the model characteristics.

    Ra-CSL required approximately 646 s longer than the conventional method on average because it performed an additional process of importing original data using index and classification twice.The first step of classification was the pre-testing step with the CSL,and the second was the re-testing step with the conventional technique on the log detected as positive in the pre-testing step.However,as shown in Fig.5,because the detection rate of Ra-CSL was higher,it is advisable to utilize Ra-CSL in an environment where detection time is not a concern.

    In addition,the results show that the two proposed techniques,CSL and Ra-CSL,have advantages in terms of detection accuracy and speed when compared with the conventional method,but are disadvantageous in terms of model complexity.However,the complexity of the model is not a significant concern when considering the performance improvement,that is,up to 30% and 8 s improvements in accuracy and speed,respectively.

    Therefore,different techniques can be used depending on the application.If detection time is important,CSL with LR,RF and NB would be the best combinations because they are faster than the conventional and Ra-CSL techniques.Furthermore,if detection accuracy is important,Ra-CSL with LR,DT and NB can be used to detect malicious traffic efficiently.

    5 Conclusion

    The widespread use of IoT devices in various industrial fields has resulted in increased cyberattacks targeting them.Particularly,IoT devices are often part of a network with various other devices;hence,the damage caused by a cyber-attack is significant.At the same time,they are vulnerable to attacks owing to the limitations of resources such as memory and batteries.However,it is challenging to introduce traditional network monitoring methods and threat detection systems into IoT with constrained environments because of the significant overhead of storing and managing a large amount of constantly collected data.

    This study proposed a bitmap-based data compression method for efficient attack detection in the IoT environment.By comparing the experimental results under data compression rates of 30%,50% and 100%,the detection rate changed according to the degree of data loss,and the optimal degree of compression for each model was confirmed.As the compression rate increased,the data size decreased by up to 20%,proving that it is a suitable method in a constrained IoT environment.In addition,data compression techniques reduced the training time by up to 67% in LR.Moreover,the training and testing time in the CSL technique was reduced by 8 s when compared with that of the conventional methods.The average detection rate of the conventional method was 57.4%,whereas those of the CSL and Ra-CSL were 76.6% and 66.8%,respectively,which demonstrated the improved detection rate of the proposed methods.Particularly,the highest accuracy of 99% was obtained with the NB model of Ra-CSL under a CR of 100%.However,in the case of Ra-CSL,the detection time was increased because of training with the first detected traffic through the compression process and the process of importing the original dataset using the index information.Therefore,based on the characteristics of the application,one of the two proposed methods can be selected.For example,in the case of IoT devices that require real-time data collection and processing,such as in climate change and traffic conditions,the CSL technique can be used to detect malicious traffic quickly.In the case of IoT devices that need to be used for major infrastructure or for collecting research data,it is possible to accurately detect malicious traffic by utilizing the Ra-CSL technique.

    However,this study had a limitation:the training and detection time increases because of the twomodel training in Ra-CSL.In future studies,a pre-trained model and a more efficient algorithm to import the original dataset will be used to shorten the training time;further,the performance will be compared with that of the existing state-of-the-art.Another limitation of the current study is that the effect of the dataset or feature used in the experiment was not measured.For example,the feature and data values may vary depending on the dataset type,and the attack label may vary depending on the attack scenario.Hence,the bitmap rule and performance may change.Therefore,a future study will be conducted to analyze the effect of the proposed technique when using various datasets and features.

    Acknowledgement:This paper is a supplementary and extended version of the paper presented at the 6thInternational Symposium on Mobile Internet Security(MobiSec’22).

    Funding Statement:This work was partly supported by a Korea Institute for Advancement of Technology(KIAT)Grant funded by the Korean Government(MOTIE)(P0008703,The Competency Development Program for Industry Specialists)and the MSIT under the ICAN(ICT Challenge and Advanced Network of HRD)program(No.IITP-2022-RS-2022-00156310)supervised by the Institute of Information Communication Technology Planning and Evaluation(IITP).

    Author Contributions:Conceptualization: Yu-Rim Lee,Il-Gu Lee;Methodology: Yu-Rim Lee,Na-Eun Park;Software: Yu-Rim Lee,Na-Eun Park,Seo-Yi Kim;Validation: Yu-Rim Lee,Na-Eun Park,Il-Gu Lee;Resources: Na-Eun Park,Seo-Yi Kim;Investigation: Yu-Rim Lee,Na-Eun Park;Visualization: Yu-Rim Lee,Seo-Yi Kim;Supervision: Il-Gu Lee;Project administration: Il-Gu Lee;Funding acquisition: Il-Gu Lee;Writing-original draft: Yu-Rim Lee,Na-Eun Park,Seo-Yi Kim;Writing-review and editing:Il-Gu Lee.

    Availability of Data and Materials:Data openly available in a public repository.The data that support the findings of this study are openly available in UNSW-NB15 at https://research.unsw.edu.au/projects/unsw-nb15-dataset.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜日本视频在线| 成年女人在线观看亚洲视频 | 亚洲精华国产精华液的使用体验| 小蜜桃在线观看免费完整版高清| 国产在线一区二区三区精| 真实男女啪啪啪动态图| 国产精品麻豆人妻色哟哟久久| 成人欧美大片| av在线亚洲专区| 在线精品无人区一区二区三 | 亚洲精品成人久久久久久| 人妻 亚洲 视频| 国产成人免费观看mmmm| 日韩av在线免费看完整版不卡| 男女边摸边吃奶| 国产白丝娇喘喷水9色精品| 成人午夜精彩视频在线观看| a级一级毛片免费在线观看| 赤兔流量卡办理| 18+在线观看网站| 国产亚洲av片在线观看秒播厂| 亚洲无线观看免费| 国产 一区精品| 18禁在线播放成人免费| 麻豆成人午夜福利视频| 日本欧美国产在线视频| 欧美+日韩+精品| 国产精品99久久99久久久不卡 | av在线观看视频网站免费| 日韩不卡一区二区三区视频在线| 我的女老师完整版在线观看| 久久久国产一区二区| 中国三级夫妇交换| 免费人成在线观看视频色| av专区在线播放| 国产精品一区二区三区四区免费观看| 日韩av不卡免费在线播放| 中文天堂在线官网| 国产精品偷伦视频观看了| 久久国产乱子免费精品| 亚洲av男天堂| 我要看日韩黄色一级片| 一区二区三区乱码不卡18| 国产亚洲一区二区精品| 国产综合懂色| 亚洲人成网站高清观看| 97在线人人人人妻| 国产伦精品一区二区三区四那| 麻豆成人av视频| 久久久久久久久久人人人人人人| 1000部很黄的大片| av在线观看视频网站免费| 99热网站在线观看| 成人国产av品久久久| 欧美变态另类bdsm刘玥| 国产精品福利在线免费观看| 嫩草影院新地址| 国产一级毛片在线| 国产精品一区二区在线观看99| 在线观看一区二区三区| 久久久久九九精品影院| 秋霞伦理黄片| 亚洲自拍偷在线| 校园人妻丝袜中文字幕| 亚洲国产成人一精品久久久| 亚洲成人av在线免费| 免费av毛片视频| 一本久久精品| 日韩欧美一区视频在线观看 | 国产老妇女一区| 亚洲综合色惰| 国产人妻一区二区三区在| 久久久久久久亚洲中文字幕| 2022亚洲国产成人精品| 观看美女的网站| 美女视频免费永久观看网站| 亚洲av二区三区四区| 搡女人真爽免费视频火全软件| 91久久精品国产一区二区成人| 欧美高清性xxxxhd video| 久久久久久久久久久免费av| 国产成年人精品一区二区| 亚洲四区av| 精品一区二区三卡| 亚洲自拍偷在线| 亚洲,一卡二卡三卡| 亚洲人成网站在线播| 黄色日韩在线| av免费在线看不卡| 熟女人妻精品中文字幕| 少妇的逼水好多| 国产精品国产三级专区第一集| 亚洲av电影在线观看一区二区三区 | 晚上一个人看的免费电影| 女人久久www免费人成看片| 亚洲美女视频黄频| 精品一区二区三区视频在线| 麻豆成人av视频| 3wmmmm亚洲av在线观看| 高清欧美精品videossex| 精品一区二区三卡| 深夜a级毛片| 国产成人免费无遮挡视频| 又爽又黄a免费视频| 日本-黄色视频高清免费观看| 777米奇影视久久| 简卡轻食公司| 欧美日本视频| 亚洲国产av新网站| 人妻少妇偷人精品九色| 国产探花极品一区二区| 在线观看一区二区三区| 在线 av 中文字幕| 又黄又爽又刺激的免费视频.| 岛国毛片在线播放| 一区二区av电影网| 久久精品久久精品一区二区三区| 精品亚洲乱码少妇综合久久| 中文天堂在线官网| 免费观看无遮挡的男女| 国产成人a区在线观看| 久久久亚洲精品成人影院| 一级毛片久久久久久久久女| 新久久久久国产一级毛片| 亚洲第一区二区三区不卡| 色哟哟·www| 麻豆乱淫一区二区| 三级经典国产精品| 国产成人福利小说| 精品99又大又爽又粗少妇毛片| 亚洲成人av在线免费| 久久人人爽人人爽人人片va| 欧美日韩亚洲高清精品| 久久久久久久久久人人人人人人| 亚洲精品成人久久久久久| 老师上课跳d突然被开到最大视频| 中文字幕制服av| 久久精品国产亚洲网站| 国产亚洲一区二区精品| 中文字幕久久专区| 波野结衣二区三区在线| 亚洲欧美精品专区久久| 久久久久久伊人网av| 国产精品av视频在线免费观看| 国产爱豆传媒在线观看| 国产淫语在线视频| 又黄又爽又刺激的免费视频.| 成人综合一区亚洲| 看免费成人av毛片| 午夜福利在线在线| 五月玫瑰六月丁香| 久久精品久久精品一区二区三区| 成人鲁丝片一二三区免费| 香蕉精品网在线| .国产精品久久| 亚洲欧美成人综合另类久久久| 亚洲欧美清纯卡通| 熟女av电影| 亚洲欧洲国产日韩| 最近2019中文字幕mv第一页| .国产精品久久| 国产成人福利小说| 亚洲精品一区蜜桃| 国产精品成人在线| 在线 av 中文字幕| 久久久久国产网址| 国产男女内射视频| 美女视频免费永久观看网站| 纵有疾风起免费观看全集完整版| 日日摸夜夜添夜夜爱| 乱码一卡2卡4卡精品| av网站免费在线观看视频| 午夜亚洲福利在线播放| 成年女人在线观看亚洲视频 | 成年免费大片在线观看| 肉色欧美久久久久久久蜜桃 | 成人免费观看视频高清| 国产精品爽爽va在线观看网站| 国产91av在线免费观看| 国产乱人视频| 插阴视频在线观看视频| 人人妻人人看人人澡| 亚洲精品成人久久久久久| 热99国产精品久久久久久7| 91精品一卡2卡3卡4卡| 国产精品秋霞免费鲁丝片| 丝袜脚勾引网站| 国产成人精品福利久久| 久久久久久国产a免费观看| 18禁动态无遮挡网站| 国产免费福利视频在线观看| 欧美zozozo另类| 精品久久久噜噜| 街头女战士在线观看网站| 日韩欧美精品免费久久| 日韩成人伦理影院| 久久人人爽人人爽人人片va| 高清毛片免费看| 国产高潮美女av| 久久6这里有精品| 国产色爽女视频免费观看| 只有这里有精品99| 精品久久久精品久久久| 一个人看视频在线观看www免费| 18禁裸乳无遮挡动漫免费视频 | 菩萨蛮人人尽说江南好唐韦庄| 水蜜桃什么品种好| 午夜福利在线观看免费完整高清在| 久久综合国产亚洲精品| 久久久精品免费免费高清| 久久久久精品久久久久真实原创| 美女高潮的动态| 国产精品久久久久久久电影| 69av精品久久久久久| 男女无遮挡免费网站观看| 亚洲天堂av无毛| 日韩亚洲欧美综合| 在线a可以看的网站| 久久久精品欧美日韩精品| 日日啪夜夜爽| 国内少妇人妻偷人精品xxx网站| 日日摸夜夜添夜夜爱| 日韩欧美一区视频在线观看 | 精品人妻视频免费看| 亚洲av免费高清在线观看| 不卡视频在线观看欧美| 国产成人91sexporn| 91精品伊人久久大香线蕉| 99热6这里只有精品| 看十八女毛片水多多多| 男女无遮挡免费网站观看| 91狼人影院| 纵有疾风起免费观看全集完整版| 国产精品秋霞免费鲁丝片| 插阴视频在线观看视频| 国产69精品久久久久777片| 色婷婷久久久亚洲欧美| 国产探花在线观看一区二区| 国内精品美女久久久久久| 大码成人一级视频| 国产精品久久久久久精品古装| 成人亚洲欧美一区二区av| 欧美精品国产亚洲| 国产中年淑女户外野战色| 黄色一级大片看看| 我的女老师完整版在线观看| 97热精品久久久久久| 免费看日本二区| 日韩一区二区视频免费看| 在线观看av片永久免费下载| 国产成人精品婷婷| 久久久久国产精品人妻一区二区| 男人添女人高潮全过程视频| 午夜日本视频在线| 精品久久国产蜜桃| 水蜜桃什么品种好| 国产伦理片在线播放av一区| 精品久久久久久久久亚洲| 丝袜美腿在线中文| 久久久久久久久久久丰满| 黄色配什么色好看| 亚洲国产av新网站| 老司机影院成人| 国产精品国产av在线观看| 2021天堂中文幕一二区在线观| 免费av毛片视频| 亚洲,欧美,日韩| 国产老妇女一区| 精品一区二区三区视频在线| a级毛色黄片| 欧美高清成人免费视频www| 亚洲美女搞黄在线观看| 欧美3d第一页| 免费看日本二区| 搞女人的毛片| 草草在线视频免费看| 久久97久久精品| 国产精品伦人一区二区| kizo精华| 国产成人精品久久久久久| 一级a做视频免费观看| 丝袜脚勾引网站| 18+在线观看网站| 亚洲欧美精品专区久久| 亚洲高清免费不卡视频| 国产白丝娇喘喷水9色精品| 久久综合国产亚洲精品| av专区在线播放| 99热网站在线观看| 高清在线视频一区二区三区| 99热国产这里只有精品6| 国产亚洲一区二区精品| freevideosex欧美| 最近2019中文字幕mv第一页| 精品人妻偷拍中文字幕| 下体分泌物呈黄色| 午夜福利网站1000一区二区三区| 日韩亚洲欧美综合| 大话2 男鬼变身卡| 热99国产精品久久久久久7| 国产高清不卡午夜福利| 91久久精品国产一区二区成人| 国产成人一区二区在线| 青春草亚洲视频在线观看| 成年女人在线观看亚洲视频 | 直男gayav资源| 欧美日韩视频精品一区| 男人狂女人下面高潮的视频| 亚洲av国产av综合av卡| 51国产日韩欧美| 亚洲第一区二区三区不卡| 欧美成人一区二区免费高清观看| 老司机影院毛片| 日日摸夜夜添夜夜爱| 亚洲,欧美,日韩| 激情 狠狠 欧美| 免费人成在线观看视频色| 国产欧美另类精品又又久久亚洲欧美| 男女那种视频在线观看| 国产精品久久久久久精品电影| 成人亚洲精品av一区二区| 日韩欧美精品v在线| 免费在线观看成人毛片| 久久久午夜欧美精品| 麻豆成人午夜福利视频| 男的添女的下面高潮视频| 亚洲精品影视一区二区三区av| 在线播放无遮挡| 一级毛片电影观看| kizo精华| 国产精品女同一区二区软件| 99re6热这里在线精品视频| a级毛片免费高清观看在线播放| 联通29元200g的流量卡| 国产精品三级大全| 国产午夜精品一二区理论片| 精品一区在线观看国产| 欧美变态另类bdsm刘玥| 搡老乐熟女国产| 久久这里有精品视频免费| 国产成人精品婷婷| 亚洲在线观看片| 色吧在线观看| 丝袜喷水一区| 在线观看三级黄色| 青春草视频在线免费观看| 精品午夜福利在线看| 男女那种视频在线观看| 久久人人爽人人爽人人片va| 久久这里有精品视频免费| 有码 亚洲区| 午夜精品一区二区三区免费看| 国产精品国产三级国产av玫瑰| 精品人妻一区二区三区麻豆| 国产精品一及| 老女人水多毛片| 七月丁香在线播放| 成人美女网站在线观看视频| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲不卡免费看| 久久精品久久久久久噜噜老黄| 欧美极品一区二区三区四区| 国产一区二区在线观看日韩| 直男gayav资源| www.色视频.com| 精品亚洲乱码少妇综合久久| 各种免费的搞黄视频| 国产高清三级在线| 国产成人精品婷婷| 国产午夜精品一二区理论片| 18禁在线播放成人免费| 国产一区二区三区综合在线观看 | 亚洲美女搞黄在线观看| 亚洲av.av天堂| 直男gayav资源| 精品久久久久久电影网| 久久久a久久爽久久v久久| 亚洲一级一片aⅴ在线观看| 成年av动漫网址| 亚洲真实伦在线观看| 在线 av 中文字幕| 日韩不卡一区二区三区视频在线| 成人国产av品久久久| 亚洲精品日韩av片在线观看| 最后的刺客免费高清国语| 亚洲性久久影院| 国产国拍精品亚洲av在线观看| 亚洲精品国产av蜜桃| 日韩av在线免费看完整版不卡| 18禁裸乳无遮挡免费网站照片| 亚洲无线观看免费| xxx大片免费视频| 成年av动漫网址| 国产亚洲5aaaaa淫片| 大香蕉97超碰在线| 大香蕉久久网| 久久久精品94久久精品| 老师上课跳d突然被开到最大视频| 亚洲天堂av无毛| 亚洲精品国产av成人精品| 精品熟女少妇av免费看| 人妻少妇偷人精品九色| 国产精品偷伦视频观看了| 亚洲精品456在线播放app| 亚洲欧美日韩无卡精品| 内地一区二区视频在线| 高清日韩中文字幕在线| 欧美潮喷喷水| 久久久精品欧美日韩精品| 亚洲,欧美,日韩| 女人十人毛片免费观看3o分钟| 久久女婷五月综合色啪小说 | 男女无遮挡免费网站观看| 欧美最新免费一区二区三区| 黄色一级大片看看| 亚洲国产精品专区欧美| 五月天丁香电影| 少妇的逼水好多| 免费高清在线观看视频在线观看| 禁无遮挡网站| 黄色配什么色好看| 欧美性感艳星| 国产伦精品一区二区三区四那| 99久久中文字幕三级久久日本| 亚洲国产成人一精品久久久| 国产精品福利在线免费观看| 在线a可以看的网站| 麻豆国产97在线/欧美| 亚洲人成网站在线播| 日韩欧美精品v在线| 国产美女午夜福利| 美女脱内裤让男人舔精品视频| 国产高清有码在线观看视频| 国产在线男女| 国产男人的电影天堂91| 精品人妻一区二区三区麻豆| 成人黄色视频免费在线看| 最近2019中文字幕mv第一页| 国产午夜福利久久久久久| 久久久精品欧美日韩精品| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲最大成人手机在线| 五月开心婷婷网| 嫩草影院精品99| 在线观看人妻少妇| 亚洲真实伦在线观看| 久久久色成人| 欧美区成人在线视频| 国产精品久久久久久av不卡| 国产成人freesex在线| 听说在线观看完整版免费高清| 精品久久久噜噜| 丰满人妻一区二区三区视频av| 亚洲图色成人| 一区二区av电影网| 男女无遮挡免费网站观看| 嫩草影院精品99| 国产毛片a区久久久久| 最近手机中文字幕大全| 国产乱人视频| 欧美极品一区二区三区四区| 大码成人一级视频| 91狼人影院| 亚洲精品影视一区二区三区av| 亚洲欧美一区二区三区黑人 | 亚洲精品日本国产第一区| 日日啪夜夜撸| 日本三级黄在线观看| 啦啦啦在线观看免费高清www| 欧美高清成人免费视频www| 欧美激情在线99| 插逼视频在线观看| 少妇 在线观看| 五月伊人婷婷丁香| av在线老鸭窝| 我要看日韩黄色一级片| 免费av不卡在线播放| 亚洲最大成人av| 最近最新中文字幕大全电影3| 国产一区二区亚洲精品在线观看| 十八禁网站网址无遮挡 | 91在线精品国自产拍蜜月| 欧美最新免费一区二区三区| 乱系列少妇在线播放| 日本色播在线视频| 国产成人a区在线观看| 在线观看国产h片| 国产精品.久久久| 男人和女人高潮做爰伦理| 一区二区三区精品91| 熟妇人妻不卡中文字幕| 国产成人福利小说| 黄色一级大片看看| av女优亚洲男人天堂| 亚洲欧美日韩无卡精品| 国产大屁股一区二区在线视频| 久久久精品94久久精品| 成人亚洲精品一区在线观看 | 女的被弄到高潮叫床怎么办| 在线观看三级黄色| 久久精品国产亚洲av涩爱| 国语对白做爰xxxⅹ性视频网站| 亚洲一区二区三区欧美精品 | 日本猛色少妇xxxxx猛交久久| 日韩国内少妇激情av| 国产亚洲av嫩草精品影院| 自拍偷自拍亚洲精品老妇| 国产久久久一区二区三区| 精品久久久久久久久av| 少妇高潮的动态图| 亚洲欧美中文字幕日韩二区| 日韩伦理黄色片| 精品视频人人做人人爽| 免费观看无遮挡的男女| 欧美精品人与动牲交sv欧美| 中文字幕免费在线视频6| 2018国产大陆天天弄谢| 黄色一级大片看看| 国产精品一区www在线观看| eeuss影院久久| 日韩视频在线欧美| 久久6这里有精品| 亚洲精品aⅴ在线观看| 女的被弄到高潮叫床怎么办| 菩萨蛮人人尽说江南好唐韦庄| 国产日韩欧美亚洲二区| 我的女老师完整版在线观看| 国产高清三级在线| av免费在线看不卡| 高清毛片免费看| 亚洲伊人久久精品综合| 在线观看人妻少妇| 国产成年人精品一区二区| 精品视频人人做人人爽| 精品一区在线观看国产| 一级毛片aaaaaa免费看小| 国产黄a三级三级三级人| 国产色婷婷99| 一级片'在线观看视频| 日韩欧美一区视频在线观看 | 国产精品一区二区在线观看99| 欧美日韩国产mv在线观看视频 | 亚洲精品久久久久久婷婷小说| 男人狂女人下面高潮的视频| 搡女人真爽免费视频火全软件| 亚洲av在线观看美女高潮| 七月丁香在线播放| 亚洲av成人精品一区久久| 亚州av有码| 国产探花在线观看一区二区| 色哟哟·www| 18+在线观看网站| 亚洲av一区综合| 黄色配什么色好看| 欧美xxxx黑人xx丫x性爽| 国产有黄有色有爽视频| 在现免费观看毛片| 欧美xxⅹ黑人| 卡戴珊不雅视频在线播放| 国产成人一区二区在线| 国产av国产精品国产| 免费观看av网站的网址| 国产黄色视频一区二区在线观看| 国产精品福利在线免费观看| 老女人水多毛片| 精品少妇久久久久久888优播| 成人毛片60女人毛片免费| 99热这里只有精品一区| 国产精品爽爽va在线观看网站| 熟女电影av网| 国产精品久久久久久久久免| 色哟哟·www| 老司机影院毛片| 美女高潮的动态| 久久人人爽人人爽人人片va| 看十八女毛片水多多多| 三级国产精品片| av又黄又爽大尺度在线免费看| 十八禁网站网址无遮挡 | 男插女下体视频免费在线播放| 国产真实伦视频高清在线观看| 青春草视频在线免费观看| 国产精品久久久久久av不卡| 久久99精品国语久久久| 国产免费又黄又爽又色| 丝袜美腿在线中文| 久久久久久九九精品二区国产| 国产69精品久久久久777片| 亚洲美女视频黄频| 免费看日本二区| 免费黄网站久久成人精品| 深夜a级毛片| 欧美成人午夜免费资源| 亚洲国产av新网站| 国产高清三级在线| 九色成人免费人妻av| 国产成人一区二区在线| 国产成人a∨麻豆精品| 免费观看av网站的网址| 最近的中文字幕免费完整| 国产一区二区在线观看日韩| 老师上课跳d突然被开到最大视频| 日本猛色少妇xxxxx猛交久久| 欧美+日韩+精品| 欧美成人一区二区免费高清观看| 永久免费av网站大全| 欧美丝袜亚洲另类| 在线免费十八禁| 亚洲真实伦在线观看| 亚洲人成网站在线播| 大码成人一级视频| 91精品一卡2卡3卡4卡| 毛片一级片免费看久久久久| 午夜福利在线观看免费完整高清在| 国产成人aa在线观看|