• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Hybrid Malware Variant Detection Model with Extreme Gradient Boosting and Artificial Neural Network Classifiers

    2023-10-26 13:14:50AsmaAlhashmiAbdulbasitDaremSultanAlanaziAbdullahAlashjaeeBaderAldughayfiqFuadGhalebShoukiEbadandMajedAlanazi
    Computers Materials&Continua 2023年9期

    Asma A.Alhashmi ,Abdulbasit A.Darem,? ,Sultan M.Alanazi ,Abdullah M.Alashjaee ,Bader Aldughayfiq ,Fuad A.Ghaleb ,Shouki A.Ebad and Majed A.Alanazi

    1Department of Computer Science,Northern Border University,Arar,9280,Saudi Arabia

    2Department of Computer Sciences,Faculty of Computing and Information Technology,Northern Border University,Rafha,91911,Saudi Arabia

    3Department of Information Systems,College of Computer Science and Information,Jouf University,Sakaka,Aljouf,Saudi Arabia

    4School of Computing,University Teknologi Malaysia,81310 UTM Johor Bahru,Johor,81310,Malaysia

    5Department of Computer and Electronic Engineering,Sana’a Community College,Sana’a,5695,Yemen

    ABSTRACT In an era marked by escalating cybersecurity threats,our study addresses the challenge of malware variant detection,a significant concern for a multitude of sectors including petroleum and mining organizations.This paper presents an innovative Application Programmable Interface(API)-based hybrid model designed to enhance the detection performance of malware variants.This model integrates eXtreme Gradient Boosting(XGBoost)and an Artificial Neural Network(ANN)classifier,offering a potent response to the sophisticated evasion and obfuscation techniques frequently deployed by malware authors.The model’s design capitalizes on the benefits of both static and dynamic analysis to extract API-based features,providing a holistic and comprehensive view of malware behavior.From these features,we construct two XGBoost predictors,each of which contributes a valuable perspective on the malicious activities under scrutiny.The outputs of these predictors,interpreted as malicious scores,are then fed into an ANN-based classifier,which processes this data to derive a final decision.The strength of the proposed model lies in its capacity to leverage behavioral and signature-based features,and most importantly,in its ability to extract and analyze the hidden relations between these two types of features.The efficacy of our proposed APIbased hybrid model is evident in its performance metrics.It outperformed other models in our tests,achieving an impressive accuracy of 95% and an F-measure of 93%.This significantly improved the detection performance of malware variants,underscoring the value and potential of our approach in the challenging field of cybersecurity.

    KEYWORDS API-based hybrid malware;detection model;static and dynamic analysis;malware detection

    1 Introduction

    The sectors like mining and petroleum sectors are increasingly vulnerable to Malware attacks due to their reliance on information technology and their use of integrated systems and data.Malicious software also known as malware,has increased rapidly.Malware has a damaging effect on computer systems,digital assets,and the community [1].Malware can be used to spy on users,steal sensitive information,disseminate fake news,destroy cyber-physical systems,perform assassinations,and many other acts of evil [2].The malware creation tools accessible to a wide range of malware developers,including amateurs and script kiddies,lead to a proliferation of malware.Various types of malware have been created,including viruses,worms,trojans,botnets,ransomware,and advanced persistent threats,to name a few [3].Numerous malware samples emerge every day.McAfee and Symantec report that 69 new malware are detected every minute[4].Most of this malware comprises malware variants[5].Existing malware is often re-engineered to produce some evasive and obfuscated malware.Developers of malware often employ obfuscation strategies with the intent to disguise their true characteristics and activities.

    Various methodologies have been proposed in the realm of malware detection,and these can be categorized according to the analysis type and the nature of features extracted during static and dynamic analyses [6,7].The static approach pertains to the extraction of features from portable executable files without necessitating the execution of the malware.On the other hand,dynamic features are gleaned from the interactions occurring between the malicious software and the Operating System(OS).This interaction takes place within a controlled,isolated environment.Malware actions are captured and used to extract features that represent the malware behavior.Both static and dynamic analysis have been extensively researched.Dynamic features are more effective compared to static features due to the complexity of extracting representative features using static analysis and the vast amount of data in the malware files.Recently,many researchers have utilized deep learning techniques to automatically extract representative features and construct accurate classifiers using static analysisbased features.These techniques have substantially escalated the proliferation of new malware variants capable of penetrating existing protective solutions.Nonetheless,identifying obfuscated and evasive malware presents a formidable challenge,given their high resemblance to benign programs and the elusive characteristics of their behavior.

    The majority of existing methodologies for malware detection rely predominantly on either static or dynamic analysis as the fundamental mechanisms for feature extraction [5,6,8,9].These features can become sparse and inadequate to represent malware behavior due to the injection of random and benign API sequences within the malware files or the obfuscation of real behavior during runtime.A few ensemble and hybrid models have been proposed that use dynamic and static-based features,as in[5,10].Most of the hybrid approaches have focused on combining different classifiers.Only a few models have focused on the use of hybrid features,such as [5,10].Integrating static and dynamic features in one model is not a trivial task,as the decision of maliciousness becomes more challenging.Within the context of this investigation,features from both static and dynamic APIbased analyses were harnessed to establish two variants of ensemble classifiers via the application of the XGBoost algorithm.The underlying justification for amalgamating API features drawn from the disparate analytical modes lies in the potential divergence between APIs discerned from static analysesvs.those identified through dynamic analyses-an outcome attributable to the variance in employed identification methods.The integration of static and dynamic analysis methodologies may yield a holistic understanding of the APIs that malware exploits,with each analytical approach contributing distinct insights and uncovering a unique set of problems.Because API-based features have been reported to be among the most effective representative features,the scope of this study focuses on such types of features.Similarly,XGBoost and Artificial Neural Networks (ANN) have been frequently reported to be effective learners.Both aspects are integrated within the architecture of the model proposed within this study.In this research,we are primarily driven by the rapidly increasing incidence of malware,particularly the more sophisticated malware variants,which presents a significant threat to individual and organizational security.Traditional detection methods,whether behavioral or signature-based,often fall short of identifying these advanced threats due to their evasion and obfuscation techniques.This alarming situation motivated us to develop a more effective solution for malware variant detection,aiming to improve the security posture of vulnerable entities.

    The study presents a twofold main contribution.It extracts both static and dynamic API features to train predictive models using the XGBoost algorithm.These models consist of an ensemble of decision tree predictors,which sequentially score the sample class.The ensemble’s output trains ANN classifiers based on a multilayer perceptron.XGBoost,a tree-based algorithm,excels in handling structured data,outliers,and missing values.On the other hand,ANN,a flexible and adaptable algorithm,deals well with unstructured data and learns complex patterns.

    The results demonstrate that the proposed hybrid ensemble model surpasses non-hybrid and single ensemble-based classifiers.The study provides the following contributions:

    1.Extraction of hybrid API features from dynamic and static analysis.This combination offers a more comprehensive and accurate understanding of malware behavior,leading to more effective detection and mitigation of threats.

    2.Development of a hybrid ensemble learning-based model(API-HMVD)architecture.It stacks an ANN-based model onto the outputs of XGBoost classifiers to learn the correlation between patterns detected for each feature type.The XGBoost model extracts features and makes preliminary predictions,which then enhance accuracy when fed into the ANN model to learn from intermediate results.

    Additionally,the study proposes a novel hybrid malware variant detection model that leverages an Application Programmable Interface(API).This model employs both static and dynamic analyses to extract API-based features.These features are utilized by two predictors built on eXtreme Gradient Boosting (XGBoost),providing a more comprehensive view of malware behavior and improving detection accuracy.The output of these predictors is then utilized by an Artificial Neural Network(ANN) classifier to make the final decision,effectively revealing the hidden relationship between behavioral and signature-based features.

    The structure of this paper is laid out as follows:Section 2 provides a comprehensive review of the related literature.A detailed elaboration of the research’s proposed model is laid out in Section 3.The experimental framework and evaluation metrics are delineated in Section 4.A thorough discussion and analysis of the results are found in Section 5.Lastly,Section 6 presents the concluding thoughts and notable findings derived from this study.

    2 Related Work

    The efficacy of malware detection models hinges on two key elements: feature extraction and model design.Features are typically classified based on their analysis type,either static or dynamic.Various types of features can be extracted through these analyses [11].For instance,static features might be derived from Portable Executable (PE) headers and sections,byte codes,opcodes,flow graphs,strings,imported application programable interfaces (APIs),libraries and functions,and logical architectures [2,9,12].On the other hand,dynamic features might come from the malware program’s interaction with the Operating System’s file system,registry,network,memory,Central Processing Unit(CPU),and API call sequences.The extraction of API call features from both dynamic and static analysis has been a common practice in previous studies[3,13–21].Table 1 summarizes key methods used for malware detection in recent literature.

    Regarding model design,supervised machine learning techniques such as Support Vector Machine(SVM),Random Forest[3,22–24],Extreme Gradient Boost XGBoot[22,25–28],and Artificial Neural Network(ANN)[7,14,19,29–31]are often employed to understand the correlation between the input features and class label.Recently,deep learning has been utilized for training classifiers that can leverage various types of features.However,the majority of existing deep learning-based models primarily focus on static-type features [32].Given the complexity of malware representation,recent studies have focused on integrating various feature types and classifiers to enhance detection performance.Zhang et al.[5]proposed a hybrid malware variant detection approach that uses static features such as opcodes and API calls.Their model consists of two classifiers: a computational neural network designed to train the first classifier based on opcode-based features,and the multilayer perceptron algorithm used to construct the second classifier,which relies on API calls extracted from static analysis.Al-Hashmi et al.[11]have proposed a comprehensive and composite model designed for the detection of malware variants.This model employs an assortment of behavioral features derived from dynamic analysis to establish a multitude of classifiers using deep sequential learning methodologies.

    Table 1:Summarizes key methods used for malware detection in recent literature

    On the other hand,Wang et al.[33] have advanced a technique specifically tailored for the detection of malware variants that capitalizes on static features.These encompass elements such as strings,permissions,specifications of hardware and software,intents,API calls,opcode,and the function call graph.The authors have further classified these features into two primary groupings-one which is string-based and another that is structure-oriented.Despite the potential advantages of these methods,their dependence on static features can be a limitation as malware authors often use basic obfuscation techniques to hide malevolent patterns within binary code,reducing the effectiveness of these detection methods.To address this issue,Kang et al.[34] suggested a holistic approach that integrates both static and dynamic analysis features.These features are subsequently leveraged to construct an ensemble model,which exhibits the capability to effectively identify various malware variants.

    In their research,Rieck et al.[35] delivered a thorough examination of the automatic analysis of malware behavior through the lens of machine learning.The team proposed a unique framework,dubbed“MALheur”,which is adept at identifying and categorizing malware according to its behavioral patterns,utilizing dynamic analysis.The framework harnesses a blend of feature extraction and machine learning algorithms for the analysis of malware behavior.The researchers executed extensive experiments on a sizable malware sample set to evaluate their framework’s effectiveness.

    Tian et al.[36],on the other hand,proposed the use of a class-level dependence graph alongside a method-level call graph as representative depictions of an application.By doing so,they were able to extract static behavioral features,which they used to identify Android malware.

    In summary,numerous strategies have been proposed to improve malware detection model accuracy by integrating different feature sets.However,these approaches often overlook the correlations between the features due to the use of a single classifier for each feature type.Moreover,they predominantly rely on either static or dynamic features,which can be easily masked by malware authors employing obfuscation and evasion techniques.Addressing these identified gaps,this investigation encompasses the extraction of both static and dynamic API-based attributes to represent malware.The employed methodology incorporates a two-tiered classifier system.In the initial phase,latent characteristics from both dynamic and static attributes are independently extracted via the application of the XGBoost algorithm.Subsequently,in the second phase,a multilayer perceptron algorithm is utilized to decipher the correlations existing within these latent features.This process allows for the discovery of new hidden patterns characterizing malware variants,leading to improved detection performance.The following section provides a comprehensive description of our proposed model.

    3 The Proposed Model

    The proposed Application Programable Interface based Hybrid Malware Variant Detection(APIHMVD)model consists of four main phases:feature extraction using both static and dynamic analysis,feature representation,prediction model construction,and decision-making phase.As illustrated in Fig.1,the structural framework of our proposed model is presented.Comprehensive insights into each phase of this model are elaborated upon in the respective subsections that follow.

    Figure 1:The proposed application programable interface based hybrid malware variant detection API-HMVD model

    3.1 Features Extraction

    During the initial phase,we engaged in a meticulous extraction of features.This extraction was guided by a two-pronged approach,incorporating elements of both static and dynamic analysis for a more comprehensive understanding of the dataset.

    3.1.1 Static Analysis-Based API Features

    In this step,the API features have been extracted from the PE files without executing their files.All the APIs that the suspect files intend to invoke are collected regardless of whether they are executed or not.API features are extracted from the import table of the PE files.Each program incorporates the API functions that are exported by other programs and libraries as part of code reuse for efficient and effective software development.Malware authors usually inject random APIs to evade detection by hiding malware patterns using polymorphic and metamorphic techniques.

    3.1.2 Dynamic Analysis-Based API Features

    Programmers,including malware authors,typically employ dynamic API loading to conceal API features from reverse engineers.Many operating systems support dynamic loading,e.g.,Windows Operating System (OS) uses two well-known APIs for loading the APIs during the execution at runtimes,such as LoadLibraryA and GetProcAddress.Once such functions are used by malware,malware can access many API functions without writing directly to the PE file.Therefore,dynamic analysis is an important element of malware detection.In this study,API calls have been monitored in the sandbox environment.Sandbox records the APIs that are invoked by the program in a process called API hooking.When PE files are executed,any API calls are intercepted by the API hooking function.After the PEs are executed,a list of APIs is ordered according to their appearance in the hooking process.Thus,an API sequence can be formed to represent the behavioral activities of PE.

    3.2 Representation Phase of Features

    In this phase,we represent both the attack signature and the behavioral features.The N-gram technique was used to create the attack signature and the behavioral sequence of the extracted features using static and dynamic analysis.Then,a statistical technique called term frequency/inverse document frequency (TF/IDF) is used to represent the API features [19,31].TF/IDF can convert APIs from textual format to their equivalent numerical weights.It can evaluate how important an API function is to a PE sample compared to the other samples.TF/IDF is applied to a single API function that is extracted from static analysis and applied to a sequence of APIs consisting of two or three APIs that occurred in order.In this study,the short sequence consists of one API function,and the longest sequence consists of four API functions.Each sequence is treated as a term.Thetf/idfcan be calculated as follows.

    3.3 Prediction Models Construction Phase

    In this phase,two predictive models were constructed,each of which has been trained based on the API functions extracted from the static and dynamic analysis.The Extreme Gradient Boosting XGBoost algorithm[25]was used to construct predictive models.The XGBoost algorithm constructs a set of weak learners using boosting and decision tree algorithms.In the boosting,the trees are constructed sequentially in such a way that the residual error generated from the previous tree is considered during the building of the subsequent tree.Each tree is trained based on the lessons learned from its predecessors.That is,each tree tries to reduce the error resulting from the previous trees in the sequence.The grown trees are relatively small regression trees.Therefore,the model is highly interpretable due to the limited number of splits.Nodes and splits in the tree are chosen based on a similarity score(formula(4)).The following steps explain how XGBoost constructs the trees.

    1-Create the first tree that consists of the root node with a single-leaf node.

    2-Use the tree that was created in the previous step to make the prediction and then calculate the residual error.

    3-Use the following equation to calculate the similarity score.

    whereGradient2is the square root of the residuals,Hessiandenotes the number of the residuals,andλis a hyperparameter to make regularization and prevent dividing by zero.

    4-Select the node with the highest similarity score to achieve homogeneity.

    5-Calculate the information obtained for each split using the similarity score as follows.

    7-Continue to construct the tree by creating the leaves and the decision nodes based on the information gained with pruning by adjusting the regularized parameterλ.

    8-Use the constructed tree to predict the target class of the samples and calculate the residual error.

    9-Compute the new residual as follows.

    whereρdenotes the learning rate.

    10-Repeat these nine steps to construct the subsequent tree,and all trees are created.

    The output of the decision trees for each trained model is aggregated using the following formula.

    whereykis the aggregated output of the modelk,mnumber of trees andfiis the predicted value of theithtree.

    3.4 Decision-Making Phase

    In this phase,the aggregated output of the predictive models from the previous phase was used to build a classifier for the final decision on the sample class.This work hypothesizes that the features used to represent benign and malicious samples might be sparse and contain outliers.Consequently,XGBoost may not fit well for such samples,leading to misclassifying such samples and causing an increase in false positive and negative rates.Therefore,a new classifier that uses the output of the week classifiers as a new feature is needed to learn the hidden relationships between the XGBoost predictions and the output class.

    In this study,the artificial neural network,namely,the multilayer perceptron algorithm [37],has been trained to recognize fake patterns.Neural networks offer the advantage of self-learning capabilities,which can detect hidden patterns within a given training dataset [38].To train the Multi-layer Perceptron(MLP)classifier for decision-making,the feed-forward with backpropagation algorithm was used.The established model operates on a three-layered structure which includes an input layer,an intermediary or hidden layer,and finally,an output layer.Each predictor stemming from the XGBoost algorithm is linked to respective neurons present within the output layer,thus forming a structured network of information processing.The chosen activation function for each neuron residing in the hidden layer is the Rectified Linear Unit (ReLU) function,renowned for its efficiency and performance in deep learning contexts.To identify the optimal number of neurons to be included in this hidden layer,a process of iterative testing and refinement was undertaken,ultimately allowing for a balance between complexity and predictive power within the model.The sigmoid function was used for the final decision in the output layer.The MLP model is fully connected,which means that the neurons in one layer are connected to all the neurons in the next layer.Weights are allocated to the neurons in both the input and output layers.The optimization algorithm’s role is to find the best or optimal set of weights that improve classification accuracy.Fig.2 shows the structure of the MLP model.If the predicted valuepois greater than 0.5 then the input features belong to a malware sample;otherwise,it is a benign sample.The output decision was determined based on the following formula.

    whereyiis the aggregated output of the XGBoost predictors andmnumber of the predictors.

    Figure 2:Structure of the multi-layer perceptron model

    4 Experimental Setup

    The model employed in this research is constituted of two primary components:feature extraction and classification processes.The feature extraction stage involves the extraction of API-centric attributes from malware exemplars,utilizing both static and dynamic techniques.The motivation behind this is to encompass both the configurationally and operational aspects of the malware.The second segment of the model is dedicated to classification,organized in a bi-level structure.In the initial level,the XGBoost algorithm is leveraged to discern the association between the designated features and their corresponding class tags.The selection of hyperparameters for the XGBoost algorithm was accomplished through a methodical grid search procedure.Parameters selected include a‘max_depth’of 5,‘min_child_weight’of 1,and‘gamma’of 0,while‘subsample’and‘colsample_bytree’were both configured to 0.8.The XGBoost model generates an output referred to as ‘malicious scores’,which subsequently serve as input for the second level of the classification process.In this stage,a classifier based on an Artificial Neural Network(ANN)is utilized to identify the obscured correlations between behavioral and signature-based characteristics.The configuration of the ANN model comprises a feed-forward network design with three distinct layers.The initial layer,the input layer,is designed with a number of nodes equivalent to the total number of features.Following this,the hidden layer incorporates 10 nodes and employs the Rectified Linear Unit(ReLU)as the activation function.The final layer,the output layer,consists of a single node representing the anticipated class label.The model’s learning rate was configured at 0.01 and training was conducted for a total of 100 epochs with a batch size of 32.The model’s architecture and parameter settings were carefully chosen to ensure optimal performance,while maintaining computational efficiency.

    The collections of data leveraged for both the training and evaluation of the proposed model incorporate two distinct classifications of software.These include benign,or non-harmful,software,as well as malicious or malware software instances.Malicious samples were collected from the VirusShare web portal(https://virusshare.com/),while benign samples were collected from freshly installed OS and trussed repositories.The dataset encompasses a variety of malware samples,including viruses,Trojan horses,ransomware,backdoors,and others.Most malware samples are variants that are generated from old malware versions.To avoid detection,malware authors employed obfuscation and evasive techniques.The final data set comprises 11,712 samples,including 6,877 malware and 4,835 benign software samples.The dataset was divided into two subsets,with 60% allocated for training and 40% for testing.Table 2 shows the statistics of the dataset used in this study.

    Table 2:Number of samples in the data set

    The static features were extracted directly from the PE,while the dynamic features were obtained from the cuckoo sandbox.The model is validated using six performance measures:accuracy(ACC),recall,precision,F-M,FPR,and false FNR.In the context of our research,we operationalize the concept of ‘a(chǎn)ccuracy ratio’as the proportion of samples that have been correctly classified,relative to the overall quantity of samples in the testing set.The metric known as ‘Recall’is quantified by the division of the quantity of accurately classified malware by the comprehensive count of malware present within the test set.The measurement of ‘Precision’is arrived at by determining the fraction of accurately predicted malware over the total count of predicted malware instances.The F-measure(F-M)is a metric that evaluates the overall performance of the model.The F-measure,often used as a balanced performance indicator,represents the harmonic mean of precision and recall.A higher F-measure generally indicates decreased error rates in the classification process.The FPR,a key parameter in error assessment,is derived by taking the ratio of benign samples that have been inaccurately classified to the entirety of actual benign samples.Similarly,the FNR is ascertained by calculating the proportion of malware samples that have been erroneously classified over the total count of actual malware samples.

    The presented model’s performance was evaluated relative to two other internally developed models and three state-of-the-art models from the literature.The two internally developed models utilized the XGBoost algorithm for training.The first was informed by API functions derived from static analysis,while the second relied on API functions from dynamic analysis.Subsequently,a comparative analysis was also conducted against the state-of-the-art models documented in[39–41].The model referenced in [39] employed dynamic analysis for API feature extraction,and multiple classifiers-Random Forest (RF),Support Vector Machines (SVM),Logistic Regression (LR),and Naive Bayes(NB)were used for training.LR emerged as the most effective classifier in this case.In[40],an ensemble model was created using SVM as the base classifier,with API features represented using the doc2vec approach.Lastly,the model in [41] extracted API calls through dynamic analysis and harvested Indicator of Compromise features,representing them through the Term Frequency-Inverse Document Frequency(TF/IDF)technique.The LR algorithm was employed to formulate the detection model in this instance.

    5 Results Analysis and Discussion

    Table 3 shows the training performance of the proposed model compared to other models.In terms of overall accuracy performance,the proposed hybrid model achieved better training compared to the others.Figs.3 and 4 present the performance comparison between the models studied.

    The results from testing the model after fitting,which are shown in Table 4,Figs.5,and 6,reveal that the proposed model outperforms the others.This suggests that hybrid features derived from both static and dynamic analysis surpass individual feature types in effectiveness.This is clear from the results obtained by the individual classifiers.The model performs better when using dynamic features for classification,compared to relying solely on static API-based features.This is because malware authors inject some unusable APIs to hide static analysis-based detection.Injecting random APIs into the malicious files increases the sparsity of the feature vector and thus reduces the learning ability,as can be observed in Tables 3 and 4 see the API-static row.Concerning dynamic-based features,the model performs better than static features.This is because the behavioral activities of the malware can be easily captured.The injected features in the PE files may not be executed during execution.Furthermore,many malware attempts to upload API functions during runtime.Such features will be hidden from the static features vector and will appear in the dynamic-based features vector.

    Table 3:The training performance of the proposed model compared to other models

    Figure 3:Training accuracy,recall,precision,and F-measure comparison

    Figure 4:Training errors(FPR and FNR)comparison

    Table 4:Compares the proposed model’s test performance to that of other models

    Figure 5:Classification accuracy,recall,precision,and F-measure comparison

    Figure 6:Classification errors comparison

    Tables 3 and 4 and Fig.3 through 6 also illustrate that combining XGBoost with an ANN-based classifier enhances both the training and classification performance.The proposed model achieves an overall classification performance of 93% in terms of the F-measure compared to 89% achieved by the model that was constructed using dynamic features with individual classifiers using XGBoost.This is because the MLP model uses the output of the XGBoost classifiers to train a model that identifies correlations between the features extracted from both static and dynamic analyses.This integration enables the MLP to identify hidden patterns representing correlations between static and dynamic features.Thus,the proposed hybrid significantly boosts overall performance.As can be seen in Table 4 and Figs.5 and 6,the proposed model outperformed the related work.It achieved the best accuracy and overall performance (see Fig.5) with the lowest classification error (see Fig.6).Although the model proposed in Tran 2017 [40] achieved higher precision,it compromised this precision with a reduced detection rate.Both the false positive and negative rate are high as compared to the proposed model(See Table 4).

    As discernible from the data presented in Tables 3 and 4,our proposed model exhibits superior performance when juxtaposed against individual static and dynamic API-based models as well as contemporary state-of-the-art models.The hybrid model under consideration delivered elevated performance measures such as accuracy,recall,precision,and F-measure,during both the training and testing phases.This enhanced performance can be attributed to the amalgamation of static and dynamic analyses that captures a broader spectrum of the software’s behavioural dynamics.The achieved accuracy of 95% by the proposed model,as illustrated in Table 4,underscores its proficiency in correctly classifying a substantial majority of the malware specimens.Moreover,the model’s precision of 93% signifies that in cases where software is identified as malware,there exists a high probability that the designation is accurate.The recall measure of 94% further emphasizes the model’s robustness in identifying positive instances,in this scenario,being malware specimens.This implies that the model was successful in accurately identifying 94% of all malware instances within the dataset.The model’s F-measure,a harmonic mean of precision and recall,stands at 93%,signifying that the model maintains an equilibrium between precision and recall.

    Within the realm of cybersecurity,both FPR and FNR are deemed paramount.A diminished FPR indicates the model’s low propensity to erroneously classify benign software as malicious,thus mitigating unnecessary alerts.Our proposed model exhibits an FPR of a mere 4%.Similarly,a lower FNR implies the model’s efficacy in correctly identifying malware,thereby reducing the potentiality of cyber threats.The model under consideration exhibits an FNR of only 5%.When juxtaposed against individual static and dynamic models,our proposed hybrid model evidently surpasses them,as signified by a 1%–3% enhancement across all performance measures.These advancements suggest that the integration of static and dynamic analyses provides a more effective mechanism for malware identification.In relation to state-of-the-art models,our proposed model demonstrated superior performance,thereby substantiating the efficacy of our proposed hybrid approach and the amalgamation of XGBoost and ANN classifiers.In Figs.3 and 4,the superior training performance of the proposed model is graphically demonstrated.Similarly,Figs.5 and 6 visually represent the superior classification performance of the proposed model.These graphical representations serve to further underscore the robustness and reliability of our proposed model.

    6 Conclusion

    This study presents the design and development of an API-based Hybrid Malware Variant Detection Model using Extreme Gradient Boosting and Artificial Neural Network Classifiers.The proposed model seeks to enhance malware variant detection by extracting hybrid API features from both dynamic and static analysis and integrating these features with an ensemble of XGBoost learners and an MLP classifier.The hybrid features were leveraged to counteract the obfuscation and evasion techniques employed by malware authors for generating malware variants.The XGBoost predictors were created to discover and extract hidden relationships between static and dynamic API-based features.The MLP classifier was developed to learn the hidden patterns that correlate these sets of features.The proposed model’s effectiveness is demonstrated through its comparison with nonhybrid models.The principal limitation of the proposed model is its requirement for an in-depth analysis of API features that enhance performance and result in misclassifications,a topic beyond the scope of this study.There exists potential for enhancing detection performance by exploring the ideal number of hidden neurons in the Artificial Neural Network (ANN) model.The utility of the single hidden layer feedforward neural network,as proposed in reference [38] for three-way decisions,can be explored for achieving this aim.Moreover,additional machine learning algorithms like SVM and RF,among others,could also be investigated to enhance detection performance.Future investigations could encompass an in-depth examination of the model’s performance in detecting malware employing sophisticated evasion and obfuscation techniques.Malware developer might utilize complex obfuscation and evasion tactics to disguise their genuine behaviors,thereby eluding both static and dynamic analyses.This highlights the significance of integrating a diverse array of features extracted from both static and dynamic analyses into the hybrid model.Further research could delve into creating more resilient models that can effectively identify these advanced obfuscation techniques,thereby contributing to a more secure cyber landscape.

    Acknowledgement:The authors extend their appreciation to the Deanship of Scientific Research at Northern Border University for funding work.

    Funding Statement:This work was supported by the Deanship of Scientific Research at Northern Border University for funding work through Research Group No.(RG-NBU-2022-1724).

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:Asma A.,Fuad A.,Abdulbasit A.;data collection:Sultan M.,Abdullah M.,Majed A.;analysis and interpretation of results:Shouki A.,Asma A.,Fuad A.,Abdulbasit A.;draft manuscript preparation: Bader A.,Asma A.,Abdulbasit A.,Sultan M.,Abdullah M.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:We are committed to promoting transparency and open access to our research.All data and materials used in this study will be made readily available upon request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精华国产精华精| 老汉色av国产亚洲站长工具| 女性被躁到高潮视频| 超碰成人久久| 人妻丰满熟妇av一区二区三区| 免费在线观看成人毛片| 高清毛片免费观看视频网站| 久久午夜亚洲精品久久| 国产在线精品亚洲第一网站| 曰老女人黄片| 国产精品久久久久久亚洲av鲁大| 90打野战视频偷拍视频| 免费在线观看成人毛片| 欧美乱码精品一区二区三区| 国产乱人伦免费视频| 男女午夜视频在线观看| 国产欧美日韩一区二区三| 欧美激情高清一区二区三区| 国产视频内射| 亚洲国产欧美网| 老司机深夜福利视频在线观看| 久久久久久免费高清国产稀缺| 午夜福利欧美成人| 一夜夜www| 国产精品美女特级片免费视频播放器 | 99热只有精品国产| 午夜福利在线观看吧| 亚洲av电影不卡..在线观看| 亚洲午夜精品一区,二区,三区| 亚洲国产精品sss在线观看| 欧美性猛交黑人性爽| 午夜精品久久久久久毛片777| 最新美女视频免费是黄的| 女性被躁到高潮视频| 国产又爽黄色视频| 亚洲av熟女| 一本一本综合久久| 淫妇啪啪啪对白视频| 亚洲国产高清在线一区二区三 | 免费在线观看成人毛片| 搞女人的毛片| 97人妻精品一区二区三区麻豆 | 久久国产亚洲av麻豆专区| 国产一级毛片七仙女欲春2 | 少妇熟女aⅴ在线视频| 精品人妻1区二区| videosex国产| 成人国语在线视频| 色老头精品视频在线观看| 久久国产精品男人的天堂亚洲| 欧美日韩亚洲综合一区二区三区_| 亚洲成人久久爱视频| 啦啦啦观看免费观看视频高清| 亚洲 欧美 日韩 在线 免费| 变态另类丝袜制服| 国产视频内射| 亚洲午夜精品一区,二区,三区| 巨乳人妻的诱惑在线观看| 性色av乱码一区二区三区2| 成年免费大片在线观看| 在线十欧美十亚洲十日本专区| 欧美日本亚洲视频在线播放| 亚洲av电影在线进入| bbb黄色大片| 黄色毛片三级朝国网站| 亚洲精品在线观看二区| 51午夜福利影视在线观看| 免费看日本二区| 熟妇人妻久久中文字幕3abv| 国产精品久久久av美女十八| 老鸭窝网址在线观看| 美女扒开内裤让男人捅视频| 亚洲国产精品合色在线| 精华霜和精华液先用哪个| 国产伦人伦偷精品视频| 欧美国产日韩亚洲一区| 精品国产亚洲在线| 久久久久久久午夜电影| 国产97色在线日韩免费| 黑人操中国人逼视频| 女人高潮潮喷娇喘18禁视频| 大型av网站在线播放| 成人三级做爰电影| 又紧又爽又黄一区二区| 国产精品二区激情视频| 久9热在线精品视频| 久久青草综合色| 一区二区三区高清视频在线| 嫩草影院精品99| 亚洲成a人片在线一区二区| 女人爽到高潮嗷嗷叫在线视频| 免费看a级黄色片| 亚洲性夜色夜夜综合| 老司机午夜十八禁免费视频| 亚洲最大成人中文| 亚洲第一青青草原| 18禁黄网站禁片午夜丰满| 一区二区三区国产精品乱码| 欧美av亚洲av综合av国产av| 国产精品久久视频播放| 亚洲一区二区三区色噜噜| 国产私拍福利视频在线观看| 欧美色视频一区免费| 脱女人内裤的视频| 日韩欧美国产一区二区入口| 嫩草影院精品99| 国产视频内射| 国产精品免费视频内射| 亚洲成av片中文字幕在线观看| 成人手机av| 亚洲天堂国产精品一区在线| 国产高清视频在线播放一区| 淫秽高清视频在线观看| 久久久久国产一级毛片高清牌| 欧美 亚洲 国产 日韩一| 无遮挡黄片免费观看| 日本a在线网址| 美女扒开内裤让男人捅视频| 精品国产超薄肉色丝袜足j| 欧美黄色片欧美黄色片| 欧美日韩一级在线毛片| 看片在线看免费视频| 亚洲全国av大片| 美女高潮到喷水免费观看| 三级毛片av免费| 中文资源天堂在线| av在线播放免费不卡| 日韩av在线大香蕉| 久久热在线av| 久久久久亚洲av毛片大全| 国产一区二区三区在线臀色熟女| 美女扒开内裤让男人捅视频| 12—13女人毛片做爰片一| 久久久久久大精品| 99久久精品国产亚洲精品| 天天一区二区日本电影三级| 午夜福利一区二区在线看| 丝袜人妻中文字幕| 50天的宝宝边吃奶边哭怎么回事| 精品人妻1区二区| 午夜亚洲福利在线播放| 精品久久久久久久久久久久久 | cao死你这个sao货| 国产在线精品亚洲第一网站| 欧美又色又爽又黄视频| 精品国产乱码久久久久久男人| 中出人妻视频一区二区| 亚洲中文字幕日韩| 国产精品日韩av在线免费观看| 人人妻人人澡人人看| 人人妻人人看人人澡| 大型黄色视频在线免费观看| 国产高清有码在线观看视频 | 淫妇啪啪啪对白视频| 国产精品综合久久久久久久免费| 日韩欧美免费精品| 在线播放国产精品三级| 波多野结衣高清无吗| 俄罗斯特黄特色一大片| 国产高清videossex| 精品不卡国产一区二区三区| 女性生殖器流出的白浆| 亚洲一区高清亚洲精品| 精品不卡国产一区二区三区| 午夜福利免费观看在线| svipshipincom国产片| 女同久久另类99精品国产91| 琪琪午夜伦伦电影理论片6080| 少妇的丰满在线观看| 亚洲专区国产一区二区| 免费高清在线观看日韩| 99热这里只有精品一区 | 午夜成年电影在线免费观看| 悠悠久久av| 色综合站精品国产| 99久久综合精品五月天人人| 国产午夜福利久久久久久| av有码第一页| 99热这里只有精品一区 | 91麻豆av在线| 午夜两性在线视频| 欧美激情高清一区二区三区| 高潮久久久久久久久久久不卡| 999久久久国产精品视频| 欧美激情高清一区二区三区| 久久人妻av系列| 亚洲成人久久性| 免费高清在线观看日韩| 中文在线观看免费www的网站 | 十八禁网站免费在线| 免费在线观看亚洲国产| 黄色成人免费大全| 黄色视频,在线免费观看| 中出人妻视频一区二区| 精品国产亚洲在线| 满18在线观看网站| 精品高清国产在线一区| 午夜免费观看网址| 日本撒尿小便嘘嘘汇集6| 白带黄色成豆腐渣| 午夜福利免费观看在线| 国产片内射在线| 欧美+亚洲+日韩+国产| 18禁美女被吸乳视频| 国产av一区在线观看免费| 精品电影一区二区在线| 99久久无色码亚洲精品果冻| 两个人看的免费小视频| 日本五十路高清| 夜夜爽天天搞| 亚洲中文日韩欧美视频| 国产精品免费一区二区三区在线| xxxwww97欧美| 999久久久精品免费观看国产| 听说在线观看完整版免费高清| 成人亚洲精品av一区二区| 国产一级毛片七仙女欲春2 | 日本黄色视频三级网站网址| 国产高清有码在线观看视频 | 亚洲国产日韩欧美精品在线观看 | 高潮久久久久久久久久久不卡| 欧美亚洲日本最大视频资源| 免费女性裸体啪啪无遮挡网站| 午夜久久久久精精品| 日韩免费av在线播放| 久久精品国产亚洲av高清一级| 国产又黄又爽又无遮挡在线| 亚洲成人精品中文字幕电影| 国产欧美日韩一区二区精品| 成人国产综合亚洲| 亚洲熟妇熟女久久| 成人18禁在线播放| 一级a爱片免费观看的视频| 欧美色视频一区免费| 岛国在线观看网站| 日韩三级视频一区二区三区| 欧美成人免费av一区二区三区| 99久久久亚洲精品蜜臀av| 色综合站精品国产| 午夜久久久在线观看| 丁香六月欧美| 99国产极品粉嫩在线观看| 免费看美女性在线毛片视频| aaaaa片日本免费| 成人永久免费在线观看视频| 精华霜和精华液先用哪个| 日本 欧美在线| 久久人妻av系列| 老司机靠b影院| 欧美性猛交╳xxx乱大交人| 可以免费在线观看a视频的电影网站| 婷婷精品国产亚洲av| 国内揄拍国产精品人妻在线 | 国产成人啪精品午夜网站| 国产精品一区二区精品视频观看| АⅤ资源中文在线天堂| 亚洲天堂国产精品一区在线| 精品久久久久久,| 欧美成狂野欧美在线观看| 老司机深夜福利视频在线观看| 亚洲av成人av| 久久国产精品人妻蜜桃| 亚洲精品久久成人aⅴ小说| 很黄的视频免费| 亚洲人成网站在线播放欧美日韩| 欧美在线一区亚洲| 国产熟女xx| 亚洲精品美女久久av网站| 午夜福利成人在线免费观看| 97碰自拍视频| 久久久国产成人免费| av免费在线观看网站| 俄罗斯特黄特色一大片| 久久久久久久久中文| 国产私拍福利视频在线观看| 国产片内射在线| 亚洲成人精品中文字幕电影| 很黄的视频免费| 免费在线观看影片大全网站| 在线观看免费日韩欧美大片| 国产精品1区2区在线观看.| 午夜福利免费观看在线| 波多野结衣巨乳人妻| 欧美激情 高清一区二区三区| 久久久久国产一级毛片高清牌| ponron亚洲| 母亲3免费完整高清在线观看| 亚洲中文日韩欧美视频| 哪里可以看免费的av片| 91老司机精品| 一进一出好大好爽视频| 伦理电影免费视频| 久久亚洲精品不卡| 欧美成人免费av一区二区三区| 国内少妇人妻偷人精品xxx网站 | 日韩av在线大香蕉| 在线十欧美十亚洲十日本专区| 久久久精品欧美日韩精品| 日本一本二区三区精品| 巨乳人妻的诱惑在线观看| 一区二区三区高清视频在线| 国产av又大| 婷婷亚洲欧美| 欧美日韩亚洲综合一区二区三区_| 国产成人av激情在线播放| 日本 av在线| 老司机午夜十八禁免费视频| 成人国产一区最新在线观看| 别揉我奶头~嗯~啊~动态视频| 亚洲专区国产一区二区| 欧美成人一区二区免费高清观看 | 黄色a级毛片大全视频| 久久国产精品男人的天堂亚洲| 亚洲成人久久爱视频| 精品福利观看| 亚洲av第一区精品v没综合| 丁香六月欧美| 国产一区二区激情短视频| 国产又黄又爽又无遮挡在线| 亚洲成人精品中文字幕电影| 国产成人av教育| 妹子高潮喷水视频| 亚洲国产欧美一区二区综合| 99国产精品一区二区三区| 国产精品九九99| 久久午夜综合久久蜜桃| 人人妻,人人澡人人爽秒播| 制服丝袜大香蕉在线| 一级毛片精品| 免费高清视频大片| 欧美国产日韩亚洲一区| 国产av一区二区精品久久| 热99re8久久精品国产| 91九色精品人成在线观看| 亚洲片人在线观看| 夜夜夜夜夜久久久久| 日韩免费av在线播放| 国产黄色小视频在线观看| 脱女人内裤的视频| 亚洲激情在线av| 婷婷丁香在线五月| 成人国产一区最新在线观看| а√天堂www在线а√下载| 国产单亲对白刺激| 美女免费视频网站| 一级作爱视频免费观看| 女同久久另类99精品国产91| 日韩av在线大香蕉| 亚洲国产精品久久男人天堂| 久久精品国产亚洲av香蕉五月| 国产区一区二久久| 日韩精品青青久久久久久| 精品欧美国产一区二区三| 一级毛片女人18水好多| 日韩欧美三级三区| 制服人妻中文乱码| 久久精品国产亚洲av香蕉五月| 十分钟在线观看高清视频www| www.自偷自拍.com| 美女 人体艺术 gogo| 欧美日韩黄片免| 久久性视频一级片| 搡老熟女国产l中国老女人| 欧美黑人欧美精品刺激| 国产成人av激情在线播放| 亚洲,欧美精品.| 亚洲第一电影网av| 日韩欧美一区二区三区在线观看| 成人18禁在线播放| 国产又色又爽无遮挡免费看| 国产亚洲欧美精品永久| 亚洲精品久久成人aⅴ小说| 欧美日韩亚洲国产一区二区在线观看| 国产真人三级小视频在线观看| 午夜免费激情av| 777久久人妻少妇嫩草av网站| 一夜夜www| 国产成+人综合+亚洲专区| 亚洲精品美女久久av网站| 黄片播放在线免费| 国产精品一区二区三区四区久久 | 久久人人精品亚洲av| 精品无人区乱码1区二区| 国内少妇人妻偷人精品xxx网站 | 又大又爽又粗| 中文亚洲av片在线观看爽| 99riav亚洲国产免费| 亚洲色图av天堂| 日韩欧美免费精品| 超碰成人久久| 国产成人精品久久二区二区91| 成人永久免费在线观看视频| 日日干狠狠操夜夜爽| 国产精品乱码一区二三区的特点| 满18在线观看网站| 免费无遮挡裸体视频| 最近最新中文字幕大全免费视频| 欧美日韩精品网址| a在线观看视频网站| 国产视频一区二区在线看| 一区二区三区高清视频在线| 久久久国产成人免费| 91字幕亚洲| 黄色片一级片一级黄色片| 老熟妇乱子伦视频在线观看| av视频在线观看入口| 岛国在线观看网站| 欧美zozozo另类| 曰老女人黄片| 久久精品国产亚洲av高清一级| 日韩国内少妇激情av| 国产伦人伦偷精品视频| 日韩精品中文字幕看吧| 一个人观看的视频www高清免费观看 | 亚洲成av片中文字幕在线观看| 观看免费一级毛片| 亚洲av美国av| 高潮久久久久久久久久久不卡| 亚洲久久久国产精品| 中文字幕久久专区| 琪琪午夜伦伦电影理论片6080| 国产1区2区3区精品| 啦啦啦 在线观看视频| 日韩大尺度精品在线看网址| 亚洲,欧美精品.| 黄片播放在线免费| 亚洲av日韩精品久久久久久密| 一区二区三区国产精品乱码| 亚洲人成77777在线视频| 色综合婷婷激情| 久久久久久大精品| 成人永久免费在线观看视频| 日本a在线网址| 老司机在亚洲福利影院| 国产精品久久视频播放| 久久久久久免费高清国产稀缺| 91国产中文字幕| 欧美三级亚洲精品| 国产亚洲av嫩草精品影院| 变态另类成人亚洲欧美熟女| 国产av又大| 久久精品人妻少妇| 亚洲第一欧美日韩一区二区三区| 日韩精品免费视频一区二区三区| av片东京热男人的天堂| 欧美日本亚洲视频在线播放| 久久久久久亚洲精品国产蜜桃av| 久久久久久久精品吃奶| 亚洲欧洲精品一区二区精品久久久| 久久99热这里只有精品18| 欧美成人免费av一区二区三区| 国产精品久久久av美女十八| 校园春色视频在线观看| 亚洲精品久久成人aⅴ小说| 国产精品永久免费网站| 欧美午夜高清在线| 黄片播放在线免费| 国产欧美日韩精品亚洲av| 看黄色毛片网站| 久久久久久久午夜电影| 搞女人的毛片| 一级片免费观看大全| 在线观看66精品国产| 久久午夜亚洲精品久久| 伊人久久大香线蕉亚洲五| 两人在一起打扑克的视频| 午夜影院日韩av| 婷婷丁香在线五月| 国产欧美日韩一区二区三| 久久久久久久久免费视频了| 久久久久久国产a免费观看| 香蕉久久夜色| 51午夜福利影视在线观看| 欧美激情久久久久久爽电影| 日韩大码丰满熟妇| 久久久久久人人人人人| av片东京热男人的天堂| 日韩精品免费视频一区二区三区| 正在播放国产对白刺激| 欧美黄色片欧美黄色片| 麻豆一二三区av精品| 免费看美女性在线毛片视频| 亚洲色图av天堂| 成年人黄色毛片网站| 色哟哟哟哟哟哟| 99精品久久久久人妻精品| 久久久久亚洲av毛片大全| 色av中文字幕| 99精品欧美一区二区三区四区| 精品久久久久久久人妻蜜臀av| 丝袜美腿诱惑在线| 美女国产高潮福利片在线看| 日本 欧美在线| 悠悠久久av| 久久这里只有精品19| 午夜福利18| 一卡2卡三卡四卡精品乱码亚洲| 丰满的人妻完整版| 一级毛片精品| av视频在线观看入口| 婷婷精品国产亚洲av| 桃红色精品国产亚洲av| 校园春色视频在线观看| 久久中文看片网| 看免费av毛片| 国内毛片毛片毛片毛片毛片| 黑人巨大精品欧美一区二区mp4| 在线观看日韩欧美| 欧美av亚洲av综合av国产av| 精品国产乱子伦一区二区三区| 色综合站精品国产| 精品国产国语对白av| 一个人观看的视频www高清免费观看 | 禁无遮挡网站| 午夜视频精品福利| 99久久精品国产亚洲精品| 午夜福利欧美成人| 欧美久久黑人一区二区| av在线天堂中文字幕| 亚洲av五月六月丁香网| 日本一区二区免费在线视频| 成人三级黄色视频| 亚洲人成伊人成综合网2020| 男女下面进入的视频免费午夜 | 色综合亚洲欧美另类图片| 麻豆一二三区av精品| 欧美黑人巨大hd| 好男人电影高清在线观看| 亚洲男人的天堂狠狠| 亚洲熟妇熟女久久| 亚洲av五月六月丁香网| 国产麻豆成人av免费视频| 日韩欧美一区视频在线观看| 男男h啪啪无遮挡| 色精品久久人妻99蜜桃| 婷婷精品国产亚洲av在线| 日韩欧美国产在线观看| 亚洲性夜色夜夜综合| 国产亚洲精品久久久久久毛片| 97超级碰碰碰精品色视频在线观看| 久久精品国产清高在天天线| av电影中文网址| 在线观看免费日韩欧美大片| 亚洲国产精品sss在线观看| 午夜免费鲁丝| 99国产精品一区二区蜜桃av| 亚洲全国av大片| 亚洲第一电影网av| 极品教师在线免费播放| 亚洲中文字幕一区二区三区有码在线看 | 香蕉丝袜av| 妹子高潮喷水视频| 成熟少妇高潮喷水视频| 啦啦啦 在线观看视频| 国产乱人伦免费视频| 久久这里只有精品19| 国产一卡二卡三卡精品| 亚洲专区字幕在线| 亚洲色图 男人天堂 中文字幕| 国产精品久久久av美女十八| 日日夜夜操网爽| 日本 欧美在线| 精品人妻1区二区| 久久久久久久久免费视频了| 满18在线观看网站| 自线自在国产av| 91大片在线观看| 51午夜福利影视在线观看| 国产高清视频在线播放一区| 日本三级黄在线观看| 国产一区二区三区在线臀色熟女| 亚洲国产高清在线一区二区三 | av天堂在线播放| 久久久久久久久免费视频了| 成人午夜高清在线视频 | 特大巨黑吊av在线直播 | 99国产精品一区二区三区| 中文字幕人妻熟女乱码| 国产精品久久久人人做人人爽| 久久久久免费精品人妻一区二区 | 欧美激情久久久久久爽电影| 国产麻豆成人av免费视频| 日韩成人在线观看一区二区三区| 黄片播放在线免费| 久久久水蜜桃国产精品网| 午夜日韩欧美国产| 亚洲av日韩精品久久久久久密| 51午夜福利影视在线观看| 午夜激情福利司机影院| 午夜福利一区二区在线看| 国产伦一二天堂av在线观看| 99国产精品一区二区蜜桃av| 神马国产精品三级电影在线观看 | 国产精品 国内视频| 最好的美女福利视频网| 一级毛片女人18水好多| 啦啦啦 在线观看视频| 精品少妇一区二区三区视频日本电影| 国产黄色小视频在线观看| 成人av一区二区三区在线看| 国内精品久久久久久久电影| 国产不卡一卡二| 99久久99久久久精品蜜桃| 露出奶头的视频| 亚洲 欧美 日韩 在线 免费| 后天国语完整版免费观看| 美女午夜性视频免费| 99久久无色码亚洲精品果冻| 国产三级在线视频| 在线av久久热| 在线天堂中文资源库| 一级黄色大片毛片| 久久午夜亚洲精品久久| 国产蜜桃级精品一区二区三区| 高潮久久久久久久久久久不卡|