• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Detecting Android Botnet Applications Using Convolution Neural Network

    2023-12-15 03:57:12MamonaArshadAhmadKarimSalmanNaseerShafiqAhmadMejdalAlqahtaniAkberAbidGardeziMuhammadShafiqandJinGhooChoi
    Computers Materials&Continua 2023年11期

    Mamona Arshad,Ahmad Karim,Salman Naseer,Shafiq Ahmad,Mejdal Alqahtani,Akber Abid Gardezi,Muhammad Shafiqand Jin-Ghoo Choi

    1Department of Information Technology,Bahauddin Zakariya University,Multan,60000,Pakistan

    2Department of Information Technology,University of the Punjab Gujranwala Campus,Gujranwala,52250,Pakistan

    3Industrial Engineering Department,College of Engineering,King Saud University,P.O.Box 800,Riyadh,11421,Saudi Arabia

    4Department of Computer Science,COMSATS University Islamabad,Islamabad,45550,Pakistan

    5Department of Information and Communication Engineering,Yeungnam University,Gyeongsan,38541,Korea

    ABSTRACT The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the end users to perform a variety of activities.Because of activities,mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information,phishing,spamming,Distributed Denial of Services (DDoS),and malware dissemination.Botnet applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area.A botnet is a collection of infected devices that are managed by a botmaster and communicate with each other via a command server in order to carry out malicious attacks.With the rise in malicious attacks,detecting botnet applications has become more challenging.Therefore,it is essential to investigate mobile botnet attacks to uncover the security issues in severe financial and ethical damages caused by a massive coordinated command server.Current state of the art,various solutions were provided for the detection of botnet applications,but in general,the researchers suffer various techniques of machine learning-based methods with static features which are usually ineffective when obfuscation techniques are used for the detection of botnet applications.In this paper,we propose an approach by exploring the concept of a deep learning-based method and present a well-defined Convolutional Neural Network(CNN)model.Using the visualization approach,we obtain the colored images through byte code files of applications and perform an experiment.For analysis of the results of an experiment,we differentiate the performance of the model from other existing research studies.Furthermore,our method outperforms with 94.34%accuracy,92.9%of precision,and 92%of recall.

    KEYWORDS CNN;botnet applications;machine learning;image processing

    1 Introduction

    Nowadays,Android smartphones have become a convenient and ubiquitous part of our lives,are widely used by the majority of end users for everyday activities,business management,data sharing,social sites,and online banking.As compared to other Personal Computer (PC) platforms,smartphone devices are stored more sensitive information because of the full-featured operating system incorporated with a user-friendly environment that helps the end users for installing applications for everyday activities from unverified sources such as third-party Appstore.Therefore,cybercriminals can exploit the weakness of smartphone devices by installing the applications and embedding malicious codes into the mobile clean applications.

    The most common technique to embed malicious codes into mobile clean applications is the Android permission system.Every android application needs specifically ask for permission from endusers to install in order to perform operations on the devices,such as sending an Short Messaging Service (SMS)/Multimedia Messaging Service (MMS) [1].Unfortunately,many end users provide access to unknown mobile applications without considering the internal code of applications.As a consequence,cybercriminals employ the reverse engineering technique on apps,disassembling the apps,embedding malicious code into the original code,and then uploading the updated version to the android market.Using this concept,end users can be easy misleads because they are unable to recognize the difference between malicious and clean applications.Once malicious applications have been installed,the malicious code within applications can perform attacks in the background.Botnet applications are a type of such attacks in which the cybercriminals exploit a security hole in the platform i.e.,Command and Control server (C&C) in order to command,inspect the applications and install malware,worms,trojans,threats,and botnets[2]on the android devices that can be used to launch malicious activities to the targets.

    Botnets are a type of malware that uses a C&C channel to compromise a network of interconnected devices.Attackers or cybercriminals are known as botmasters that control the command-and-control channel to send,update,and obtain information from end-users[3].In addition,such types of attacks can infect Android smartphones and turns into harmful bots.These malicious bots turn into a large botnet.The objective of our paper is the detection of executing malicious activities in devices through C&C servers that are arranged by botmasters[4].

    From the security perspective,the exponential growth in malicious activities is a significant threat in educational and industry research.Botnets have their own set of characteristics and capabilities.The botnets are usually divided into subgroups such as botmasters,bot clients,and bot servers.The botmaster is incharge of the botnet’s controller and operator known as malware management and launch an attack through interaction with the network of the command-and-control channel (C&C network)in order to establish a communication channel with the system as sown in Fig.1.

    Moreover,a C&C network is a large server with a lot of resources such as Central Processing Unit(CPU),memory,and bandwidth responsible for delivering commands to the victims for configuration and updating purposes.Furthermore,the victims or service provider has no idea what malware has been installed on it or if it is part of the botnet.The attackers infect the targets’systems in order to carry out malicious operations such as data breaches,remote monitoring,online or mobile banking,click fraud,hacking,malware dissemination,spam,phishing,and unauthorized information[5].

    Figure 1:Workflow of communication channel

    Therefore,above all explanation,there is a critical situation to develop innovative methods for the detection of botnet applications.In recent years,the detection of mobile botnets is challanging for researchers because of feature representations,extraction or by dissembling the program codes through the static [6,7] and dynamic analysis [8].To solve this issue,we present an image-based approach through visualization representation methods for android botnet application detection in our paper.

    The following are the main contributions of this paper:

    ? This paper proposed an effective approach for detecting botnet applications in android devices by learning feature maps extraction through the Convolutional Neural Network(CNN)model.

    ? The most challenging task in CNN is to transform the android applications into images.For this task,we use the feature representations method in the form of colored images using the visualization technique on bytecode files of android applications.

    ? The proposed approach to represent the extracted features through colored images,a CNN model is trained to detect android botnet applications from benign ones.

    ? We compare the effectiveness of our approach to other existing studies that significantly improve detection accuracy mainly due to the simple image processing of android applications.To the best of authors’knowledge,this is the first CNN model that uses image processing for android botnet detection applications.

    The rest of this paper is structured as follows.Section 2 summarizes the related works.Section 3 inclides the proposed work of the CNN model for the detection of botnet applications.Section 4 represents results and discussion.In the last section,we have presented the conclusion.

    2 Related Works

    In recent years,several research studies have proposed several methodologies for the detection and prevention of Android Botnet Applications.Additionally,the existing methodologies can be categorized into two kinds such as static and dynamic analysis.In static analysis,applications are decompiled to detect malicious features of Application Programming Interface(API)calls,Permissions,and lines of codes.On the other hand,in the dynamic analysis,the Applications are installed and executed on devices to investigate the malicious behavior.It should be noted that it uses special security techniques to inspect and stop malicious activities on the devices.i.e.,sandboxKadir et al.[9]proposed a fully automated and comprehensive analysis for a better understanding of malicious activities and their aspects in their study.The researchers combine static and dynamic analysis approaches and demonstrate numerous families of an Android botnet.Moreover,the author’s study on C&C channel and embedded Uniform Resource Locators (URLs) uncover the malicious behavior of applications with the basic infrastructure of botnet families and analyze the relations.Furthermore,the approach uses the ISCX [10] dataset consists 1929 samples of android botnet applications belonging to 14 different families.

    Anwar et al.[6]proposed a static feature-based methodology to detect Android botnet activities.The most important features,such as permissions,MD5 signatures,broadcast,and background services were extracted.In order to extract these features,the researchers used 1400 ISCX[10]botnet applications and 1400 benign applications.The Machine Learning (ML) Classifiers were applied to perform the experiment and examine the accuracy with respect to the feature length.The authors claimed that they obtained an accuracy of 95.1%,recall of 0.827%,and precision of 0.97% by the consideration of respective features.

    Another approach[11]was designed for analysis of the mobile platform to distinguish malicious activity by investigating permissions and protections of the applications.The authors introduced 138 attributes of permissions initially and were extended to 145 when protection applications were used as unique attributes.The designed approach is then classified based on four different Machine Learning(ML) boxes of Multi-Layer Perceptron (MLP),Decision Tree,Random Forest,and Na?ve Bayesian were performed on 1635 benign and 1635 botnet features from the ISCX dataset [10].However,Random Forest achieved the best results of 97.3% accuracy,recall of 0.987%,and 0.985 precision among four ML classifiers.

    Abdullah et al.[12]specified a mechanism to track permissions in android applications that limits functionality and code and employ an ML box of Decision Trees,Naive Bayes and Random Forest for evaluation of the results.Overall,in these approaches,Random Forest was performed best approach and gave results of 94.6%accuracy and 0.099%with a false-positive rate.

    Another mobile botnet De-Droid approach was proposed by Karim et al.in [7].De-Droid is a static and lightweight technique to identify the botnet-specific properties.Additionally,the dataset consists of 5064 malicious and 14865 benign applications,which is the largest dataset to detect suspicious binaries by decoding the API Calls and Permissions.Through the comparison between malicious and benign applications,the researchers claimed that applications could be classified as botnets with 35%of malicious binaries.However,results reveal that the applications are confirmed as botnet with 90%accuracy.

    Jadhav et al.[8] proposed a dynamic and cluster analysis approach to detect Android botnets by using a virtual environment.The approach employs cloud-based analysis systems to detect the behavior of the security systems with redefined attributes such as tcp dump,strace,sysdump,logcat,and netflow.However,there were no experimental results in their study for the usefulness of the proposed cloud-based solution.Additionally,the virtual environment needs the installation of a JAVA program on the user’s smartphone for a security analysis report.

    MBotCS another approach presented by Meng et al.[13],was designed for botnet applications detection in network parameters like source/destination IP address,frame duration,and packet size.The researchers identify malicious network traffic through the cooperation of ML algorithms.By contrast,their method suffers from a significant rate of false positive value.Another study [14],illustrated a comprehensive study for the detection of Android Botnets.The authors utilized API call permissions from different Android Botnet families and performed an experiment using various machine learning approaches.As a result,the high false positive rate was the main drawback of their method.

    Nataraj et al.[15] designed an image processing classification method for visualizing and identifying malware that first converts malware binaries to grayscale images.The visualization approach has been widely used due to fast processing for achieving high accuracies and detections of malware binaries.The authors concluded that the malware binary must first be converted to “image”before executing the classification method.

    Three-branch embedding network(TBE-Net)is another approach with complementary learning maps proposed in[16].They used global appearance and local region features in the form of images for feature learning to differentiate the vehicle from others.Another features map approach presented by Sun et al.[17],was presented for Unmanned Aerial Vehicles(UAVs)in automobile systems encourage the establishment of object detection techniques for collecting real-time traffic data.

    An image-based mobile botnet detection was proposed CNN in [18].Detection is achieved by analyzing applications and extracting permissions that belong to malicious applications.In the suggested methodology,the authors transformed the features into images and trained a CNN model.Furthermore,the proposed model can be classified as an initial classifier to discriminate between benign and botnet image samples with a precision of 0.955%,recall of 0.96%,f-measure of 0.957,and obtained 97.2% accuracy.Recently,another approach [19] was presented based on the feature extraction phase for an android botnet detection.These features are API calls,Commands,Intents,and extra files and trained a CNN model.In contrast,we have used learning features maps of image processing using visualization technique on bytecode files of android applications,whereas research studies are based upon some specific features such as API Calls,Permissions,strings,and intents for detection of the Botnet Applications.Moreover,we used the reverse engineering technique only for dataset preparation in the form of images.Furthermore,our approach is of particular use for the detection and classification of android applications with the help of image processing and the CNN model.

    3 Methodology

    We propose an image-based CNN model detection approach to avoid employing sophisticated dataset analysis techniques to extract the feature representation of android applications.

    3.1 Dataset

    For detection of botnet android applications from benign ones,we have collected datasets for both benign and botnet android applications.For the implementation of the CNN model,initially,it is important to observe the dataset which contains a significant number of samples for the analysis.The dataset largely consists of two parts:the first one is an android botnet application and the other one is a benign applications dataset.Furthermore,we have collected 1288 Benign Android Packages(APKs) from CICAND Malware Dataset [20] which comprised 6,500 benign APKs obtained from the Google Play store.In addition,to ensure that the APKs do not consist any malicious code,we have used the website Virus Total and obtained results with the secure APK files that we require.For Botnet APK files,we used ISCX[10]android botnet dataset which includes 1,929 botnet apps from 14 families.Additionally,we have selected 612 botnet APKs for our experiment.

    3.2 APK Files Reverse Engineering

    After the collection of benign and botnet APK files,we used the reverse engineering technique to unzip the files as shown in Fig.2.An android package normally contains the following files:

    ? Classes.dex:android opcode file,which can be compiled by the Dalvik Virtual machine.

    ? AndroidManifest.xml: includes important the applications such as android compatibility,platform,permissions and API Calls,etc.that must be executed before any of the opcode files.

    ? The Resource and lib folder contains the binary compiled code and needs by the APK files.

    Figure 2:Reverse engineering

    For our work,we have utilized the classes.dex files from android package files because all android application code contains the byte code of the application,in addition,to initializing and executing the apps.

    3.3 Representation of Classes.dex Files

    After the extraction of required classes.dex files for each android application,we need to represent the Classes.dex in byte series of sequence.For this purpose,we have adopted a hexadecimal approach to the representation of bytes series.The key idea for the representation of the hexadecimal view is taken from research study in [21].The reason to choose the hexadecimal approach is that the byte series is displayed in the consequence of sequential 16-byte blocks,as shown in Table 1,in which each byte file is processed as a binary byte.Precisely,each byte highlights the important information of classes.dex files,such as instruction codes or data.

    Table 1: Hexadecimal view of bytes

    3.4 Files Visualization as Images

    In the proposed study,the CNN-based model plays a vital role in image classification.As the model only deals with two-dimensional data such as images,therefore,we need to transform the bytecode files of android applications into images.For this purpose,we studied the bytecode files and these files contain 2-digit hexadecimal values that go from 00 to FF and are equivalent to 0-255 in decimal format.Additionally,we have evaluated the bytecode code files and converted them into RGB images by using the python script of a pillow as shown in Fig.3.

    Figure 3:File visualization

    3.5 Convolutional Neural Network

    Initially,we selected classes.dex files from botnet and benign applications to detect the malicious patterns of applications with the help of image processing discussed in file visualization as images.In order to correctly differentiate botnet applications from benign,we need to train an image dataset.For this purpose,we have adopted a CNN-based model to classify the images dataset and achieve high accuracy.

    CNN is a normally used neural network to detect botnet images from benign through the trained model.Initially,we use bytecode images to meet the requirements of the CNN model and detect botnets during the training period.Additionally,CNN layers such as ConvNet,MaxPooling,and Fully Connected layer patterns,are linked together to produce accurate predictions from the training period.For accurate predictions,the CNN model adjusts the Convolutional layer which consists several kernels and analyzes the features of images in the form of pixels.Each kernel is made up of a layer of connection weights with the width and height of the input patch during the forward phase and builds a two-dimensional feature map of the kernel as shown in Fig.4.Pooling layer uses to decrease the dimensions images of the previous convolutional layer and summaries the computational weightage to reduce the overfitting problem in the model.

    For our work,we use the LeNet-5 architecture and which is comprised of 3 conventional layers,two Max Pooling layers,and 2 Fully connected layers.For the input layer of CNN model,the height and width of the input images are 28*28*3 with 32 feature maps.In addition,the kernel size of each feature map is 5*5 strides and uses ReLU function to measure the dimensions of images and reduce the overfitting problem.After the Convolutional layer,an additional layer known as max pooling is used to overcome the downsampling of the model and its size is 2*2.In addition,the computational weights are calculated through the max pooling layer on the input layer of CNN model.Next,a fully connected layer with 1024 units is passed with a flattening layer which is used to convert the data into a 1-dimensional array for inputting it to the output layer value.For the last output layer,another fully connected layer is used with binary classes and passes the SoftMax function used for the accurate classification of images.In our last step,we feed the images to train the CNN Model and the dataset is split into 65%training samples and 35%test sample images.During the training phase of the model,we keep track of the validation and training sets accuracy.The model will be terminated and weights will be restored for classifying the test images with an accuracy of 94.34%.The Construction parameters are shown in Table 2.

    Table 2: Construction of CNN model

    Figure 4:Proposed framework of the CNN model

    4 Experimental Results and Discussion

    All experiments were performed on the windows server 2019 operating system and using 128 GB RAM and GPU with Keras[22]library and TensorFlow backend.Tensorflow is a machine learning backend library that can be used for a wide range of applications,whereas Keras is generally a part of the deep learning and self-contained structure.For our work,the convolutional neural network is built using Keras and TensorFlow,including the OpenCV classes architecture.To examine the suggested method,we acquired malicious and benign Android applications and investigated the method’s performance in other existing studies.

    4.1 Experimental Results

    Through the trained CNN,quantitative measurements have been performed to examine the performance of the model using image classification of benign and botnet image samples.For this purpose,we define measurement parameters as described in Table 3.in which the learning rate is defined as a floating point value.For accuracy of android images applications,we adapt the Adam optimizer and loss calculated as binary cross-entropy.Furthermore,the proposed method’s quality has been measured using accuracy,recall,precision,and F1_Measure.The metrics can be defined as follows[18]:

    Table 3: Measurement parameters of the proposed methodology

    In Eqs.(1)-(3) FP,TN,TP,and FN are respectively denoted as False Positive,True Negative,True Positive,and False Negative.From the measurement evaluation,our model shows an accuracy of 94.34%,F1 score of 92%,Precision of 92.9%,and Recall of 92%with cross-entropy loss of 0.139.

    4.2 Variations of Accuracy and Loss on Network Training

    As shown in Fig.5,we have examined the performance of the model at 85,90,95,and 100 epochs and analyzed that no major change in both train_ac and val_acc after 90 epochs.Moreover,the model returns the best prediction results with 94.34% accuracy,92% of recall,and a precision of 92.9%.Precisely,the training accuracy is improving as the model processes and is varying passage time.Similarly,training loss has a specific amount in the completion,while validation loss varies.After completing the training phase,the statistical analysis is saved and used in the testing process after several training and testing iterations.

    Figure 5:Loss/Accuracy over 100 iterations of the training phase

    4.3 Comparative Analysis with Existing Work

    To emphasize the importance of our study,we evaluate the proposed method to existing neural model approaches in this section.Existing methods use dynamic,static,or hybrid analysis to detect malware in general.As a result,the exact comparison is not possible.Nevertheless,we can compare the performance results in terms of neural network models,Feature source application characteristics and accuracy.

    The static analysis approach presented in [23] used a Recurrent Neural Network (RNN) model for training and testing the applications and obtained 0.897% accuracy.The researchers used a feature analysis approach to extract permissions from androidmanifest.XML files for the classification of malicious applications.Another study in [24] was based on dynamic analysis and the authors employed reverse engineering technique and used permissions from Androidmanifest.XML files with two different models such as RNN and Long Short-Term Memory(LSTM)models that have acquired 0.93% accuracy.In addition,another research [25] proposed a general android malware detection using the CNN model.The authors concluded that the CNN model is feasible for detecting malicious applications with the usage of APK file dissembler and extracting android manifest.xml files.Then,the extract android manifest.xml file is converted into feature vectors and these feature vectors are fed into the CNN model for training.The authors experimented on 200 malicious samples with 500 clean samples and obtained 0.93%accuracy.

    In [26] and [27],authors investigated malicious android applications using CNN model which assists the user to predict maliciousness in applications by generating the images for each android malware detection.The authors used the reverser engineering technique and extract the classes.dex files then transformed into images.The study in[26]is somewhat related to our approach.However,our objective of this study has presented an approach to detecting android botnet applications from benign ones.However,this approach generaly applies for mobile malware detection.Moreover,the researcher used Convolutional Neural Network Model for training and testing the android malware applications and obtained 0.93%accuracy.

    On the other hand,our proposed model uses 1288 benign and 612 botnet applications for classification.Initially,we used the reverse engineering technique to dissemble the APK application and extract the classes.dex files.After extraction of the classes.dex files,these files are transformed into images and trained in a CNN-based model.As a result,we achieve the highest accuracy of 0.9434%as compared to other existing studies.As shown in Table 4 compares the proposed method to other Neural Models.According to the table,the proposed method is entirely effective in detecting botnet applications.

    Table 4: Comparative analysis of existing studies

    5 Conclusions

    In recent years,there has been a rising security concern in all android and handheld devices because of internet facilities.Nowadays,smartphones and handheld devices have become analogous to personal computers due to the same facilities of battery power and memory capacities of such devices.Mobile devices are usually linked to the Internet at all times which are more susceptible to cyberattacks.Botnet attacks have proven to be a significant concern for internet security.Therefore,developing a model of botnet application detection is necessary for security admins.In this paper,we proposed a CNN approach as a learning model and used images sample of android applications for the detection of botnet applications.In the first step,the reverse engineering is used on 1288 benign applications from CICAND Malware Dataset and 612 Botnet applications from the ISCX dataset to extract the classes.dex files.In the second step,we used the classes.dex files as a features representation method in the form of hexadecimal view and transformed into images using the visualization technique.At last,we trained and tested a proposed CNN model using the images to detect botnet applications from benign ones.As a result,the model gives the best prediction results and obtained an accuracy of 94.34%,92%of recall,and a precision of 92.9%.Furthermore,experimental results showed the best accuracy result when we compare the performance of the model to other existing research studies.In the future,we plan to provide an internet service that allows users to check if an application is benign or botnet before downloading it.This measure would go a long way toward ensuring the security of android smartphones.

    Acknowledgement:The authors extend their appreciation to King Saud University of Saudi Arabia for funding this work.

    Funding Statement:This works was supported by King Saud University for funding this work through Researchers Supporting Project Number (RSP2022R426),King Saud University,Riyadh,Saudi Arabia.

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:M.Arshad,A.Karim,S.Naseer,S.Ahmad,M.Shafiq;data collection:M.Alqahtani,A.A.Gardezi,M.Shafiq,J.G.Choi;Data curation,analysis and interpretation of results: M.Arshad,A.Karim,S.Naseer,S.Ahmad,M.Shafiq;draft manuscript preparation:M.Alqahtani,A.A.Gardezi,M.Shafiq,J.G.Choi.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data underlying this article will be shared(after the patent of the underlying research is filled)upon reasonable request to the corresponding author.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久综合国产亚洲精品| 国产视频首页在线观看| 91aial.com中文字幕在线观看| freevideosex欧美| 一级,二级,三级黄色视频| 插逼视频在线观看| 午夜福利网站1000一区二区三区| 国产av精品麻豆| 永久免费av网站大全| 精品福利永久在线观看| 香蕉丝袜av| 亚洲国产精品一区二区三区在线| av.在线天堂| 自拍欧美九色日韩亚洲蝌蚪91| 9色porny在线观看| 国产精品久久久久久精品古装| 亚洲丝袜综合中文字幕| 国产精品 国内视频| 五月伊人婷婷丁香| 啦啦啦视频在线资源免费观看| 国产成人aa在线观看| 久久久国产欧美日韩av| 国产女主播在线喷水免费视频网站| 黑人高潮一二区| 最后的刺客免费高清国语| 国产欧美日韩一区二区三区在线| 亚洲av电影在线进入| 欧美bdsm另类| 王馨瑶露胸无遮挡在线观看| 老女人水多毛片| 欧美日韩综合久久久久久| 精品国产一区二区久久| 一本大道久久a久久精品| 日日啪夜夜爽| 大话2 男鬼变身卡| 丰满乱子伦码专区| 久久99热6这里只有精品| kizo精华| 69精品国产乱码久久久| 久久精品国产综合久久久 | 日本av免费视频播放| 国产精品三级大全| 三级国产精品片| 另类亚洲欧美激情| 一区在线观看完整版| 青青草视频在线视频观看| 麻豆乱淫一区二区| 久久久久国产网址| av免费观看日本| 一边亲一边摸免费视频| 亚洲一级一片aⅴ在线观看| 天天影视国产精品| 欧美 日韩 精品 国产| 在线亚洲精品国产二区图片欧美| 乱码一卡2卡4卡精品| 中国美白少妇内射xxxbb| 母亲3免费完整高清在线观看 | 中文精品一卡2卡3卡4更新| 欧美另类一区| 亚洲av免费高清在线观看| 韩国精品一区二区三区 | 亚洲成人手机| 亚洲精品成人av观看孕妇| 秋霞伦理黄片| 看十八女毛片水多多多| 久久久亚洲精品成人影院| 久久精品国产自在天天线| 国产高清国产精品国产三级| 夜夜骑夜夜射夜夜干| 美女视频免费永久观看网站| 80岁老熟妇乱子伦牲交| 精品熟女少妇av免费看| 日韩精品有码人妻一区| 9色porny在线观看| 一二三四在线观看免费中文在 | 欧美日韩成人在线一区二区| 少妇人妻 视频| 国产精品三级大全| 男人爽女人下面视频在线观看| 国产欧美日韩一区二区三区在线| 国产精品不卡视频一区二区| 99国产综合亚洲精品| 国产精品 国内视频| 精品午夜福利在线看| 又黄又粗又硬又大视频| 国产精品国产三级国产专区5o| 新久久久久国产一级毛片| 国产不卡av网站在线观看| 制服丝袜香蕉在线| 欧美bdsm另类| 搡女人真爽免费视频火全软件| 69精品国产乱码久久久| 日本wwww免费看| 少妇人妻久久综合中文| 亚洲 欧美一区二区三区| 丰满饥渴人妻一区二区三| 中文字幕免费在线视频6| 少妇的逼水好多| 黄色一级大片看看| 视频区图区小说| 国产av国产精品国产| 一边摸一边做爽爽视频免费| 久热这里只有精品99| 91午夜精品亚洲一区二区三区| 日本猛色少妇xxxxx猛交久久| 亚洲国产精品成人久久小说| 秋霞伦理黄片| 蜜臀久久99精品久久宅男| av一本久久久久| 99热6这里只有精品| 免费在线观看完整版高清| 欧美精品一区二区大全| 国产男女内射视频| 最近2019中文字幕mv第一页| 欧美变态另类bdsm刘玥| 国产精品偷伦视频观看了| 亚洲情色 制服丝袜| 亚洲五月色婷婷综合| 18禁国产床啪视频网站| 免费人妻精品一区二区三区视频| 中国国产av一级| 97精品久久久久久久久久精品| 少妇的逼水好多| 91国产中文字幕| 亚洲色图综合在线观看| 三上悠亚av全集在线观看| 在线天堂中文资源库| 欧美bdsm另类| 国产免费一区二区三区四区乱码| 涩涩av久久男人的天堂| 亚洲第一区二区三区不卡| 啦啦啦在线观看免费高清www| 高清欧美精品videossex| 国产日韩欧美在线精品| 日韩,欧美,国产一区二区三区| 国产精品久久久av美女十八| 日韩,欧美,国产一区二区三区| 搡女人真爽免费视频火全软件| 王馨瑶露胸无遮挡在线观看| 自线自在国产av| av有码第一页| 哪个播放器可以免费观看大片| 国产高清国产精品国产三级| 日韩 亚洲 欧美在线| 国产xxxxx性猛交| 精品熟女少妇av免费看| 中国三级夫妇交换| 国产免费一区二区三区四区乱码| 高清毛片免费看| 成人免费观看视频高清| 亚洲综合色惰| 久久午夜福利片| 久久精品国产鲁丝片午夜精品| www.av在线官网国产| 中文字幕人妻熟女乱码| 一区二区三区四区激情视频| 黄色 视频免费看| 不卡视频在线观看欧美| 国产 一区精品| 天堂8中文在线网| 麻豆精品久久久久久蜜桃| 又黄又爽又刺激的免费视频.| 夫妻性生交免费视频一级片| 国产黄频视频在线观看| 国产精品国产三级国产av玫瑰| 国语对白做爰xxxⅹ性视频网站| 新久久久久国产一级毛片| 少妇的逼水好多| 欧美精品人与动牲交sv欧美| 国产激情久久老熟女| 国产精品一区www在线观看| 久久精品国产鲁丝片午夜精品| 国产在线免费精品| 天天躁夜夜躁狠狠久久av| 有码 亚洲区| 色婷婷久久久亚洲欧美| 久久精品aⅴ一区二区三区四区 | 久久精品熟女亚洲av麻豆精品| 九九在线视频观看精品| 草草在线视频免费看| 中国国产av一级| 日韩免费高清中文字幕av| 欧美人与性动交α欧美软件 | 成人毛片a级毛片在线播放| 色婷婷av一区二区三区视频| 精品少妇久久久久久888优播| 最近手机中文字幕大全| 激情视频va一区二区三区| 亚洲av在线观看美女高潮| 在线天堂中文资源库| 一级片免费观看大全| 两性夫妻黄色片 | 九色亚洲精品在线播放| 夜夜爽夜夜爽视频| 国产精品久久久久久久电影| 婷婷色综合大香蕉| 美女xxoo啪啪120秒动态图| 秋霞在线观看毛片| 成年动漫av网址| 日本-黄色视频高清免费观看| 亚洲国产av影院在线观看| 久久韩国三级中文字幕| 亚洲精品国产av蜜桃| 成年人免费黄色播放视频| 啦啦啦在线观看免费高清www| 蜜桃国产av成人99| 人成视频在线观看免费观看| 成人无遮挡网站| 蜜桃在线观看..| 精品一区二区免费观看| 飞空精品影院首页| av在线观看视频网站免费| 精品国产国语对白av| 国产午夜精品一二区理论片| 人人妻人人澡人人看| 狂野欧美激情性bbbbbb| 欧美最新免费一区二区三区| 最近中文字幕高清免费大全6| 国产精品久久久av美女十八| 少妇被粗大猛烈的视频| 韩国av在线不卡| 美女脱内裤让男人舔精品视频| 丰满迷人的少妇在线观看| 老女人水多毛片| 黄片无遮挡物在线观看| 九色亚洲精品在线播放| 寂寞人妻少妇视频99o| 日本av手机在线免费观看| 国产日韩欧美在线精品| 美女国产视频在线观看| 中文字幕免费在线视频6| 久久免费观看电影| 国产老妇伦熟女老妇高清| 亚洲国产日韩一区二区| 欧美性感艳星| 考比视频在线观看| 中文精品一卡2卡3卡4更新| 久久久久久人人人人人| 欧美精品一区二区免费开放| 97精品久久久久久久久久精品| 99精国产麻豆久久婷婷| 国产成人a∨麻豆精品| 少妇的逼水好多| 99久久中文字幕三级久久日本| 亚洲成人一二三区av| 制服丝袜香蕉在线| 一本久久精品| 成人免费观看视频高清| 久久ye,这里只有精品| 国产一区有黄有色的免费视频| 中文字幕人妻熟女乱码| 亚洲精品中文字幕在线视频| 午夜日本视频在线| 欧美日韩av久久| 99精国产麻豆久久婷婷| 黄色怎么调成土黄色| 成年动漫av网址| 色婷婷av一区二区三区视频| 日韩制服丝袜自拍偷拍| av免费观看日本| 一二三四在线观看免费中文在 | 少妇猛男粗大的猛烈进出视频| 国产精品人妻久久久久久| 成人国产av品久久久| 国产1区2区3区精品| 国产不卡av网站在线观看| 国产精品人妻久久久影院| 久久久久久久大尺度免费视频| 91午夜精品亚洲一区二区三区| 又黄又粗又硬又大视频| 老司机亚洲免费影院| 免费大片黄手机在线观看| 国产亚洲午夜精品一区二区久久| 国产xxxxx性猛交| 亚洲伊人久久精品综合| 成年av动漫网址| 91国产中文字幕| 国产精品一区www在线观看| 精品国产露脸久久av麻豆| 久久97久久精品| 国产精品不卡视频一区二区| 激情五月婷婷亚洲| 少妇精品久久久久久久| 桃花免费在线播放| 国产在线一区二区三区精| 成人手机av| 97人妻天天添夜夜摸| 99视频精品全部免费 在线| 啦啦啦视频在线资源免费观看| 18+在线观看网站| 国产精品人妻久久久影院| 久久精品国产亚洲av天美| 国产精品国产三级专区第一集| 精品一区二区三区视频在线| 一级毛片黄色毛片免费观看视频| 大片免费播放器 马上看| 亚洲精品美女久久av网站| 搡老乐熟女国产| 国产一区有黄有色的免费视频| 久久这里只有精品19| 亚洲国产欧美日韩在线播放| 中文欧美无线码| 最近2019中文字幕mv第一页| 男女下面插进去视频免费观看 | 母亲3免费完整高清在线观看 | 亚洲av综合色区一区| 一级片免费观看大全| 亚洲四区av| 九九在线视频观看精品| 美女内射精品一级片tv| 久久久久久久久久久免费av| 黄片播放在线免费| 99re6热这里在线精品视频| 搡老乐熟女国产| 精品人妻在线不人妻| 中文精品一卡2卡3卡4更新| 新久久久久国产一级毛片| av在线观看视频网站免费| 亚洲综合精品二区| av.在线天堂| 久久午夜福利片| 亚洲中文av在线| 午夜免费鲁丝| 在线精品无人区一区二区三| 91久久精品国产一区二区三区| 在线观看免费视频网站a站| av又黄又爽大尺度在线免费看| 精品人妻一区二区三区麻豆| 国产成人91sexporn| 中文字幕制服av| 午夜av观看不卡| 激情视频va一区二区三区| 女人久久www免费人成看片| 成人18禁高潮啪啪吃奶动态图| 久热这里只有精品99| 2018国产大陆天天弄谢| 日韩欧美一区视频在线观看| √禁漫天堂资源中文www| 精品国产一区二区三区四区第35| 国产男人的电影天堂91| 日韩电影二区| 亚洲av福利一区| 日本91视频免费播放| 久久久久久伊人网av| 内地一区二区视频在线| 极品人妻少妇av视频| 韩国精品一区二区三区 | 丝瓜视频免费看黄片| 少妇被粗大猛烈的视频| 韩国精品一区二区三区 | 日韩一区二区视频免费看| 国产精品人妻久久久影院| 少妇精品久久久久久久| 一本色道久久久久久精品综合| 亚洲美女搞黄在线观看| 少妇人妻久久综合中文| 日日啪夜夜爽| 我的女老师完整版在线观看| 国产又爽黄色视频| 午夜久久久在线观看| 国产精品久久久av美女十八| 国产激情久久老熟女| 巨乳人妻的诱惑在线观看| 爱豆传媒免费全集在线观看| 国产又爽黄色视频| 一边亲一边摸免费视频| 日韩一区二区视频免费看| 国产精品欧美亚洲77777| 午夜免费观看性视频| 一级片'在线观看视频| 日韩电影二区| av一本久久久久| 蜜桃在线观看..| 国产日韩一区二区三区精品不卡| 99re6热这里在线精品视频| 日韩成人av中文字幕在线观看| 亚洲精品美女久久久久99蜜臀 | 亚洲在久久综合| 天美传媒精品一区二区| 国产白丝娇喘喷水9色精品| 国产1区2区3区精品| 成人免费观看视频高清| 国产在视频线精品| 人成视频在线观看免费观看| 韩国av在线不卡| 国产黄频视频在线观看| 纯流量卡能插随身wifi吗| 日韩精品有码人妻一区| 国产亚洲av片在线观看秒播厂| 亚洲精品色激情综合| 午夜影院在线不卡| 亚洲综合色网址| 亚洲丝袜综合中文字幕| 精品午夜福利在线看| 午夜精品国产一区二区电影| 99香蕉大伊视频| 精品99又大又爽又粗少妇毛片| 一级片免费观看大全| 精品国产国语对白av| 精品国产一区二区三区久久久樱花| 婷婷色综合www| 满18在线观看网站| 麻豆乱淫一区二区| 中文字幕人妻熟女乱码| av在线app专区| 五月玫瑰六月丁香| 日韩欧美一区视频在线观看| 久久人人爽av亚洲精品天堂| 看十八女毛片水多多多| 国产亚洲精品久久久com| 国产女主播在线喷水免费视频网站| 亚洲人与动物交配视频| 街头女战士在线观看网站| 丝袜在线中文字幕| 日本wwww免费看| 国产高清三级在线| 欧美国产精品一级二级三级| 99re6热这里在线精品视频| 日日摸夜夜添夜夜爱| 老司机影院毛片| av电影中文网址| 成年美女黄网站色视频大全免费| 97人妻天天添夜夜摸| 欧美亚洲 丝袜 人妻 在线| 久久精品久久久久久久性| 精品国产乱码久久久久久小说| 日韩制服丝袜自拍偷拍| 国产精品人妻久久久影院| 人妻 亚洲 视频| 丰满迷人的少妇在线观看| 欧美日本中文国产一区发布| 丰满少妇做爰视频| 一级片免费观看大全| 久久久精品区二区三区| 少妇人妻 视频| 少妇精品久久久久久久| 国产片内射在线| 国产探花极品一区二区| 最后的刺客免费高清国语| 成人毛片60女人毛片免费| 51国产日韩欧美| 国产精品成人在线| 99久久人妻综合| 亚洲精品乱久久久久久| 久久精品aⅴ一区二区三区四区 | 老司机亚洲免费影院| 午夜日本视频在线| 狠狠精品人妻久久久久久综合| 精品福利永久在线观看| 亚洲国产最新在线播放| 满18在线观看网站| 国产69精品久久久久777片| 免费在线观看黄色视频的| 国产亚洲av片在线观看秒播厂| 国产激情久久老熟女| 亚洲国产精品999| 91精品伊人久久大香线蕉| 久久久国产精品麻豆| 久久99热这里只频精品6学生| 欧美变态另类bdsm刘玥| 日韩一区二区三区影片| 亚洲av综合色区一区| 丝袜脚勾引网站| 免费少妇av软件| 久久人妻熟女aⅴ| 久久久精品94久久精品| 中文字幕制服av| 老司机影院毛片| 777米奇影视久久| 99久久精品国产国产毛片| 久久久精品免费免费高清| 亚洲精品日韩在线中文字幕| 欧美国产精品一级二级三级| 曰老女人黄片| 亚洲精品美女久久久久99蜜臀 | 中文字幕最新亚洲高清| 成人18禁高潮啪啪吃奶动态图| 一级黄片播放器| 在线天堂中文资源库| 看非洲黑人一级黄片| av电影中文网址| 夜夜爽夜夜爽视频| 亚洲色图 男人天堂 中文字幕 | 99久国产av精品国产电影| av在线老鸭窝| 99国产精品免费福利视频| 99视频精品全部免费 在线| 超色免费av| 黑人猛操日本美女一级片| 亚洲精品日本国产第一区| 天天躁夜夜躁狠狠躁躁| 熟女电影av网| 国产精品女同一区二区软件| videos熟女内射| freevideosex欧美| 性色avwww在线观看| 国产xxxxx性猛交| 日韩av不卡免费在线播放| av在线播放精品| 精品国产一区二区三区四区第35| 超色免费av| 亚洲综合精品二区| 人人妻人人爽人人添夜夜欢视频| 亚洲色图 男人天堂 中文字幕 | 国产一区二区在线观看日韩| 丰满少妇做爰视频| 精品国产一区二区三区四区第35| 欧美精品一区二区大全| 一级a做视频免费观看| 侵犯人妻中文字幕一二三四区| 亚洲成av片中文字幕在线观看 | 一级黄片播放器| 国产高清三级在线| 国产成人欧美| 免费观看无遮挡的男女| 国产成人aa在线观看| 国产精品不卡视频一区二区| 日韩中字成人| 久久久久久久久久久久大奶| 国国产精品蜜臀av免费| 国产无遮挡羞羞视频在线观看| 美女脱内裤让男人舔精品视频| 精品午夜福利在线看| 欧美国产精品va在线观看不卡| a级片在线免费高清观看视频| 国产永久视频网站| 91在线精品国自产拍蜜月| 在线观看免费视频网站a站| 国产国语露脸激情在线看| 人妻人人澡人人爽人人| 伦精品一区二区三区| 国国产精品蜜臀av免费| 又黄又爽又刺激的免费视频.| 国产欧美日韩综合在线一区二区| 亚洲国产色片| 免费大片黄手机在线观看| av一本久久久久| 熟妇人妻不卡中文字幕| 欧美bdsm另类| 久久精品久久久久久久性| 男女啪啪激烈高潮av片| 大香蕉97超碰在线| 国产精品久久久久久久电影| 制服人妻中文乱码| 精品亚洲成a人片在线观看| 免费久久久久久久精品成人欧美视频 | 国产精品嫩草影院av在线观看| 汤姆久久久久久久影院中文字幕| 狠狠精品人妻久久久久久综合| 亚洲精品乱久久久久久| 国产伦理片在线播放av一区| 国产免费视频播放在线视频| 亚洲精品视频女| 成年av动漫网址| 国产男女内射视频| 99re6热这里在线精品视频| 一本久久精品| 91国产中文字幕| 国产亚洲精品第一综合不卡 | 免费高清在线观看日韩| 麻豆精品久久久久久蜜桃| 亚洲少妇的诱惑av| 日韩中文字幕视频在线看片| 久久精品国产亚洲av涩爱| 久久国内精品自在自线图片| 哪个播放器可以免费观看大片| 国产精品蜜桃在线观看| 一级a做视频免费观看| 波野结衣二区三区在线| 一级黄片播放器| 亚洲成国产人片在线观看| 不卡视频在线观看欧美| 男人爽女人下面视频在线观看| 久久99精品国语久久久| 巨乳人妻的诱惑在线观看| 啦啦啦中文免费视频观看日本| 国产永久视频网站| 国产精品蜜桃在线观看| www.熟女人妻精品国产 | 一二三四在线观看免费中文在 | 飞空精品影院首页| 少妇的逼好多水| 大香蕉久久网| 女性被躁到高潮视频| 国产一区二区在线观看日韩| 久久毛片免费看一区二区三区| 亚洲国产最新在线播放| 国产精品成人在线| 欧美97在线视频| 国产免费视频播放在线视频| 蜜臀久久99精品久久宅男| 亚洲第一av免费看| 一二三四中文在线观看免费高清| 国产黄色免费在线视频| 在线观看一区二区三区激情| 啦啦啦中文免费视频观看日本| 国产永久视频网站| 久久久国产欧美日韩av| 久久精品久久精品一区二区三区| 亚洲精品aⅴ在线观看| 久久人人97超碰香蕉20202| 国产高清国产精品国产三级| 日本免费在线观看一区| 女的被弄到高潮叫床怎么办| 欧美精品av麻豆av| 免费女性裸体啪啪无遮挡网站| 久久久久久人人人人人| 国产亚洲最大av| 男女免费视频国产| 熟妇人妻不卡中文字幕| 人人澡人人妻人| 天天操日日干夜夜撸| 97在线人人人人妻| av国产精品久久久久影院| 这个男人来自地球电影免费观看 |