• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Programmable Logic Controller Block Monitoring System for Memory Attack Defense in Industrial Control Systems

    2023-12-15 03:57:16MingyuLeeJihoShinandJungTaekSeo
    Computers Materials&Continua 2023年11期

    Mingyu Lee,Jiho Shin and Jung Taek Seo

    1Department of Information Security,Gachon University,Seongnam,13120,Korea

    2Police Science Institute,Korean National Police University,Asan,31539,Korea

    3Department of Computer Engineering,Gachon University,Seongnam,13120,Korea

    ABSTRACT Cyberattacks targeting industrial control systems(ICS)are becoming more sophisticated and advanced than in the past.A programmable logic controller(PLC),a core component of ICS,controls and monitors sensors and actuators in the field.However,PLC has memory attack threats such as program injection and manipulation,which has long been a major target for attackers,and it is important to detect these attacks for ICS security.To detect PLC memory attacks,a security system is required to acquire and monitor PLC memory directly.In addition,the performance impact of the security system on the PLC makes it difficult to apply to the ICS.To address these challenges,this paper proposes a system to detect PLC memory attacks by continuously acquiring and monitoring PLC memory.The proposed system detects PLC memory attacks by acquiring the program blocks and block information directly from the same layer as the PLC and then comparing them in bytes with previous data.Experiments with Siemens S7-300 and S7-400 PLC were conducted to evaluate the PLC memory detection performance and performance impact on PLC.The experimental results demonstrate that the proposed system detects all malicious organization block(OB)injection and data block(DB)manipulation,and the increment of PLC cycle time,the impact on PLC performance,was less than 1 ms.The proposed system detects PLC memory attacks with a simpler detection method than earlier studies.Furthermore,the proposed system can be applied to ICS with a small performance impact on PLC.

    KEYWORDS Programmable logic controller;industrial control system;attack detection

    1 Introduction

    ICS controls and monitors infrastructures such as transportation,power plant,water treatment,factory.These environments are closed operational technology (OT) unlike information technology.Also,OT has high availability and real-time requirements,so it is hard to apply security solutions[1,2].With the development of the Internet,ICS is under constant threat of cyberattacks.Starting with Stuxnet in 2010[3],cyberattacks targeting ICS such as TRITON,BlackEnergy,and Havex are increasing day by day,becoming more sophisticated [4].A programmable logic controller,a core component of ICS,controls and monitors a number of field devices on ICS.Hence,attackers remotely inject and manipulate the PLC program.These attacks not only cause economic losses but also lead to casualties.Therefore,research is needed on how to detect cyberattacks that inject and manipulate malicious PLC program while meeting the real-time requirements of PLC.

    Recently,security systems using PLC program have been proposed to detect attacks on PLC.Reference [5] proposed security blocks of PLC program to detect memory read/write logic attack and malware worm attack.Reference[6]proposed a control program logic change detector to detect control program attack and memory read/write logic attack.

    Most studies to detect PLC program injection or manipulation are conducted on the engineering workstation (EWS) or its higher level.These studies are vulnerable to attacks that manipulate the operator view,such as Stuxnet [7].In addition,manual process like setting detection rules and implementing security blocks is inefficient than automated process.Finally,in order to meet the high availability and real-time requirements of PLC,a performance impact on PLC measurement is required after security system application.

    To solve these challenges,the security system should directly acquire and monitor PLC memory.It is also necessary to measure the performance impact of the security system on the PLC to ensure high availability and real-time requirements of the PLC.In this paper,we propose a PLC program block monitoring system to detect PLC memory attacks by continuously acquiring and monitoring program.This system consists of memory acquisition module,monitoring module,and logging module.This system eventually detects PLC program injection or manipulation by monitoring memory.Also,the proposed system has a very low performance impact on PLC.

    The contributions of this study,which proposes a PLC program block monitoring system for security in ICS,are as follows:

    ? We propose a PLC block monitoring system against memory attacks on programmable logic controllers in industrial control systems.

    ? The proposed security system detects PLC memory attacks simpler and more efficiently than existing studies with monitoring algorithm.

    ? The proposed security system is located at level 1 but meets the high availability and real-time requirements of the PLC.

    The remainder of this paper is structured as follows.Section 2 deals with background knowledge and research related to PLC security.Section 3 describes the overview,system architecture,and monitoring algorithm of the proposed PLC block monitoring system.Section 4 presents the results of the attack detection test using the PLC block monitoring system and the test results of measuring the performance impact.Section 5 offers the limitations of this study,and finally,Section 6 contains a conclusion and future work.

    2 Background and Related Work

    2.1 Industrial Control Systems

    ICS is a system that monitors and controls devices installed in the field across different industries,such as energy,transportation,water treatment facilities,and factories.Because an ICS operates in an OT environment,it is essential not to compromise productivity and availability.Therefore,the violation of availability attributed to security applications is another challenge of ICS security.

    A typical network architecture for ICS security is the Purdue reference model [8].The Purdue model is a reference architecture for ICS that helps organizations to design and implement secure and reliable control networks.The model divides the ICS environment into seven levels with specific functions and security requirements.The Purdue reference model consists of 7 levels,an OT environment from level 0 to level 3 and an IT environment from level 4 to level 6.Level 0 (the field devices zone) contains field devices such as sensors,actuators,and motors operating in the field.It is the lowest layer in the model and is responsible for performing the actual work of the industrial process.Level 1 (the controller zone) includes PLCs,remote terminal units (RTUs),and intelligent electronic devices(IEDs)that control field equipment and collect measurement values such as temperatures and speed.Level 2 (the control system zone) includes HMIs,which the operators use to interact with the controller,and supervisory control and data acquisition (SCADA).Finally,level 3 (the manufacturing operations system zone) includes an EWS,which communicates with level 1 controllers to collect data or download the control logic,and a historian,which stores the collected information.ICS also integrates various hardware and software components,such as sensors,controllers,and communication networks,which work together to facilitate real-time monitoring and control of industrial processes.The PLC block monitoring system proposed in this study is located at level 1 and monitors the PLC program blocks with guaranteed integrity by directly communicating with the PLC.

    2.2 PLC Programming

    The PLC targets the field devices of level 0 to control their operations or collect data from them.Because of these characteristics,it is considered an important component of the ICS.The PLC operates based on the created PLC program[9],which consists of the following four main blocks(Fig.1):

    ? Organization Block(OB)

    ? Function(FC)

    ? Function Block(FB)

    ? Data Block(DB)

    OB is a block that determines the structure of the PLC program and serves as an interface between the PLC operating system and the user program.In the PLC program,OB1 is a structure that includes other blocks because it communicates with the PLC operating system (OS) and acts as the main function of the PLC program.The remaining OBs have different functions depending on the numbers assigned to them.FC provides certain functions of the program.FB is similar to an FC but has a specific memory area as an instance data block.DB is a block that stores user data,and it is divided into a global DB shared by all blocks and a local DB that can only be used in a specific block.In this study,OB1,which serves as the main function of the PLC program,and the DB,which contains user data,were collected from the PLC.Subsequently,the block information of OB1 and DB and OB1 byte array are separately monitored in bytes,and tampering is detected by comparing past and present values.

    2.3 Related Work

    To demonstrate the vulnerability of PLCs,studies have been conducted to attack them by injecting malicious blocks or sending malicious packets.Reference [10] presented a four-step remote attack Control Logic Injection Attack (CLIK) targeting PLCs.This attack remotely infects the PLC and hides the infection with the EWS.Therefore,PLC security techniques operating at the level of the EWS have difficulty detecting such an attack.Reference [11]used fragmentation and noise padding to bypass signature-based detection and deep packet inspection (DPI) for the stealthy transmission of malicious packets.Compared to previous studies that used signature-based detection and DPI,our study detects attacks by comparing the previous and present values of the PLC block,so it cannot be bypassed by fragmentation and noise-padding techniques.Reference[12]discussed attacks that bypass traditional detection methods to target Siemens’S7 PLCs with little traffic and short times.Such an attack can be detected because the byte array of the OB1 or the block information of the DB change in the course of writing to the PLC.Reference [13] proposed a PLC attack using a malicious OB10(time-of-day interrupt)and implemented an attack on a Siemens’S7-300 PLC.The monitoring system of our study can detect OB10 injection through a byte array change in OB1.

    As many papers have been published demonstrating PLC vulnerabilities,several security-related studies have been conducted to detect cyberattacks on PLCs.Reference[5]proposed an approach to adding monitoring and logging mechanisms for security to a PLC.A security block implemented as an OB performs critical information monitoring,system integrity monitoring,event logging,and rule-based detection through an intrusion detection system (IDS)/rule checker.However,the proposed solution costs to implement security blocks and the larger the control logic,the higher the cost and performance impact.Reference[14]reviewed relevant studies on code security,network security,and other PLC security issues.Code security research,formal analysis,is a model detection technique that analyzes the PLC program syntax,converts it into an intermediate language,and uses a detection model to check for code defects.When this technique is applied to an extensive PLC program,it leads to the issue of excessive consumption of time and memory due to the use of symbol execution.Network security includes a security monitoring system and PLC memory change detection technique.The first method uses network mirroring and agents to collect traffic and logs and monitor remote connection services,unauthorized processes/ports,and open platform communications (OPC) read/write commands.The technique is based on the reliability of SCADA systems,such as EWS and HMI,and if the system is compromised,the data can be damaged in the middle.Reference[15]introduced a shade to prevent remote control logic injection attacks on PLCs.This technology detects the write request in ICS network traffic and mirrors it to shadow memory to check the maximum length of the decompiled byte sequence,number of rungs,number of opcodes,number of n-grams,and byte entropy of the scan area.This technology has the limitation of relying on write requests from network traffic to detect PLC attacks.Reference[16]studied the applicability of countermeasures against memory attacks in ICS environments.Based on the secure water treatment plant testbed,they measure the memory safety overhead due to the memory-safe compilation of the PLC and quantify the tolerability of the overhead in terms of the real-time constraints of the ICS.Reference[17]proposed PLCprint,which uses PLC memory artifacts to detect and classify memory attacks.The proposed methodology conducted detection experiments on Siemens S7-300 PLC and Allen-Bradley ControlLogix PLC at Glasgow University liquid purification testbed,and evaluated attack detection performance through one class support vector machine and k-nearest neighborhood detector.However,this study relies on existing PLC artifacts in detecting memory attacks,and securing storage capacity is important because numerous PLC artifacts are stored in the database.Reference[18]provided a programmable logic controller variable block scanner,a tool for identifying vulnerabilities in PLCs.The PLC-VBS scanner is tested to be able to identify vulnerable bits and bytes within PLC memory and to allow attackers to interact with the device.However,PLC-VBS requires a predefined set of signatures for vulnerable bits and bytes.Therefore,it is difficult to detect memory attacks caused by weak bits and bytes that are not in the signature set.Reference[6]proposed a control program logic change detector to detect abnormal operations of PLC.This system detected the two types of attacks against PLC based on detection rules(DRs).This study took an approach similar to the present one.Still,there is a problem: the DRs must be defined for rungs existing in multiple PLC programs and individually updated when an operator intentionally changes the PLC program.

    ? Control program attack: An attack that replaces the PLC program in an EWS and then downloads it to the PLC.

    ? Memory read and write logic attack:An attack that changes the value of a memory address by sending a read/write command directly to a PLC.

    Therefore,this study proposes and implements a monitoring system that monitors block information as byte array data to detect attacks by reading OB1 and DB.The system is simple because it only detects changes in the previous and present values,not whitelist-based changes.When any change in values occurs,the system logs in and simultaneously sends an alarm to an operator so that they may determine whether the manipulation is intentional or malicious.

    3 Proposed Method for Detecting and Monitoring Program Blocks on PLC

    3.1 Overview

    This study proposes a monitoring system that monitors PLC program blocks and detects manipulation.The monitoring system is connected to the level 1 switch (L1 switch),and the data to be monitored is as follows.Block information includes block type,block number,block size,load memory size,local data,checksum,version,and code date(Table 1).

    Table 1: PLC block information

    The PLC program block has many blocks,including OB1.The proposed method monitors byte array and block information for OB1 such as main function.OB1 includes all information except dynamic data that changes in real-time.Next,block information from DBs is utilized to monitor dynamic information.Because an attacker modulates the structure of the program or specific data when attacking the PLC program,efficient monitoring is possible by monitoring both OB1 representing the entire structure and DBs storing data.

    The architecture of the overall system for PLC program block monitoring is illustrated in Fig.2.The system is divided into three modules: a PLC memory acquisition module for collecting PLC memory,a monitoring module for monitoring blocks through memory comparison,and a logging module for storing time,block information,and data when tampering is detected.Fig.3 shows the process flow of the system.The system is connected to a level 1 switch of the Purdue model of PLC memory acquisition;the PLC performance problems that can arise from this situation are discussed in Section 4.The system is directly connected to the PLC,not the EWS.The shorter the network distance between the monitoring system and the PLC becomes,the more data integrity is guaranteed.For example,in the case of Stuxnet,an attack was carried out in which a normal screen was output to the EWS by infecting s7otbxdx.dll in an EWS located at level 3.If PLC data is collected through the EWS,normal PLC data before the attack is included.Therefore,this system is connected to the level 1 switch to collect the actual OB and DB from the PLC to monitor and detect the attack.

    Figure 2:PLC block monitoring system architecture

    3.2 Memory Acquisition

    The memory acquisition module of the proposed system collects data to be monitored from the PLC.The proposed method collects byte array and block information in OB1 and DBs.The byte array is all data,including the block header,body,and footer.The byte array collected by the memory acquisition module is the byte array of OB1,which represents the overall structure of the PLC program.The block information includes a block type,number,size,and checksum.There are three PLC memory collection methods:built-in support,the debug port,and the ICS communication protocol[19].The proposed system adopts the ICS communication protocol method because it collects data from many PLCs rather than forensics which collects data from a single PLC.

    Figure 3:Process flow of PLC block monitoring system

    3.3 Monitoring

    The monitoring module of the proposed system monitors the byte array and block information of OB1 and block information of DBs obtained from the memory acquisition module.There are many monitoring methods,and they are determined by the characteristics of the data.The byte array of OB1 and block information of OB1 and DBs collected in the memory acquisition module are static data,not data that changes dynamically under the influence of field devices.Therefore,this monitoring system uses a simple and robust method of detecting changes by comparing previous and current values for periodically collected data.

    Algorithm 1 describes the monitoring algorithm to detect memory manipulation of the PLC block.Iis the identifier of the monitored PLC block,and in the case of OB1,Iis 1.Lis the byte array and block information of the PLC block.WhenLis acquired through the memory acquisition module,the length ofLis stored asl.L′is the current byte array and block information that is continuously collected by the memory acquisition module.The monitoring module comparesL[i]withL′[i],which repeatsltimes.IfL[i]andL′[i]are different due to PLC memory attack,the comparison is over and an index is recorded or a security alarm occurs.Algorithm 1 is repeated until a PLC memory attack is detected or monitoring is stopped.Aslincreases,Algorithm 1 takes the same amount of time to compare.Therefore,expressing the time complexity of Algorithm 1 in Big O notation is O(n).

    3.4 Logging

    The logging module of the proposed system operates if modulation to the PLC byte array or block information is detected during monitoring.The logging module helps the operator take action by recording timestamps,changed bytes,and indexes for changed bytes,or by alerting security alarms.The operator is provided with logs or security alarms that can be used to distinguish between normal behavior and PLC memory attacks.

    4 Experiments

    The experimental environment shown in Table 2 was established to test the PLC block monitoring system proposed and implemented in this study.EWS is Siemens’engineering workstation,the TIA Portal V16,for PLC programming,virtual PLC,PLC operating mode setting,and cycle time measurements.PLCs are Siemens’S7-300 and S7-400 PLC,which account for the largest percentage of the ICS market implemented through the PLCSIM functionality of the TIA Portal V16 [20].Since two PLCs use the S7Comm protocol [21],it implements communication using the pythonsnap7 library.A program in Fig.4 for performing a timer function is downloaded to the S7-300 and S7-400 PLC.Network extension is a NetToPLCsim program that supports TCP/IP interfaces for communication between virtual PLC and monitoring systems implemented through PLCSIM.The monitoring system implements the PLC program block monitoring method proposed in this study and is a script implemented in Python.A representative library of the implemented system is python-snap7.The library is a platform that provides an Ethernet communication suite for interfacing with Siemens’S7 PLCs.To implement the acquisition module of the monitoring system,the list_blocks(),get_block_info(),and full_upload()functions of the python-snap7 library were used,and the description of each function is in Table 3.Finally,the PC executes all of the above components.In the above experimental environment(Table 2),we conducted two experiments.The first experiment was a PLC program manipulation detection experiment,which verified whether the proposed system could detect attacks when modulating the PLC program using the python-snap7 library.The second experiment measured the performance impact of PLC due to the monitoring system.

    Table 2: Experimental environment

    Table 3: Functions of python-snap7 used in the PLC block monitoring system

    4.1 Detecting Memory Manipulation in the PLC

    Cyberattacks on PLC include code injection in which an attacker injects malicious code,memory manipulation that partially modifies or changes the original program,DoS attack that depletes the system resources,firmware manipulation that modulates the PLC firmware,and Zero-Exploit.Code injection and memory manipulation appear in advanced persistent threat(APT)attacks in ICS such as Stuxnet and studies[10-13,22-26].In this paper,to evaluate the detection capability of the proposed system,we experimented with whether malicious OB inflection and DB manipulation can be detected.

    In this experiment,we evaluated whether the PLC block monitoring system that monitors the OB1 byte array,OB1 information,and DB information of the PLC can detect PLC memory manipulation.The attacker PC performed a PLC memory attack(Table 4)that inserted and manipulated the PLC program using the download() and db_fill() functions of the python-snap7 library (Table 5).The monitoring system executed Algorithm 1 every 0.15 s.

    Table 4: PLC memory attack

    Table 5: Functions of python-snap7 used in PLC memory attacks

    Figure 4:PLC program on the S7-300/400 PLC

    4.1.1 Malicious OB Injection

    Malicious OB injection attacks are attacks that insert malicious OB produced by attackers into normal PLCs,which were used in Stuxnet and are also used in various studies attacking PLCs.A byte array of normal OB1 was collected,and some bytes were manipulated to valid values and then inserted into the PLC using download()of python-snap7.The PLC block monitoring system detected malicious OB1 immediately after insertion and returned the timestamp of the detected time and the index of the manipulated byte.

    4.1.2 DB Manipulation

    DB manipulation attacks are attacks that manipulate the values of variables present in the DB of PLCs and are used in various studies attacking PLCs,as is malicious OB injection.The value of the variable was modified based on the byte array of normal DB1 and manipulated using db_fill().The PLC block monitoring system immediately detected DB1 manipulation and returned the timestamp.

    4.2 Measuring the Performance Impact of PLC

    PLC cycle time refers to the time it takes for the PLC to fully execute the program and update all I/O and is an important measure of the performance of the PLC.The PLC also has realtime constraints that ensure each cycle time does not exceed a predefined period.Consequently,earlier studies have measured the impact of security systems on PLC performance like cycle time[2,5,16,27,28].The PLC block monitoring system may also affect PLC performance because it communicates directly with PLC at level 1 and continuously sends requests using the functions of python-snap7.The shortest,current,and longest cycle times were measured through the‘online and diagnostic’feature of TIA Portal V16,an EWS software.The shortest cycle time represents the shortest amount of time the PLC has taken to execute the program.It is often an indicator of the maximum processing capability of the PLC.The current cycle time represents the amount of time the PLC took to execute the program in the last cycle.It is an indicator of the current performance state of the PLC.The longest cycle time represents the longest amount of time the PLC has taken to execute the program.It is useful for identifying bottlenecks in the system or detecting abnormal situations.

    In this experiment,we evaluate the impact by the application of the PLC block monitoring system and the impact by the request interval.

    4.2.1 Measuring PLC Performance Impact by Application of Proposed System

    The PLC block monitoring system may cause overhead because it is connected to level 1 where PLCs are located and communicates directly with PLCs.Table 6 shows how much the introduction of the PLC block monitoring system affects the performance of the PLC.Table 6 suggests that the PLC performance impact from the proposed system application is less than 1 ms because the‘online and diagnostic’feature of TIA Portal V16 measures cycle time in ms.

    Table 6: PLC cycle time introduced by the PLC block monitoring system

    ? Test case 1: This test case shows PLC cycle times before applying the PLC block monitoring system.

    ? Test case 2: This test case shows PLC cycle times after applying the PLC block monitoring system.

    4.2.2 Measuring PLC Performance Impact by Request Interval

    The PLC block monitoring system continuously requests the PLC to collect data such as block information and byte arrays.Requests to the PLC,such as functions in Table 3,can cause additional data processing by the PLC,which can affect the cycle time of the PLC.Table 7 shows how much the request interval affects the performance of the PLC.

    Table 7: PLC cycle time by request interval

    ? Test case 1:This test case shows PLC cycle times when the request interval is set to 0.5 s.

    ? Test case 2:This test case shows PLC cycle times when the request interval is set to 0.3 s.

    ? Test case 3:This test case shows PLC cycle times when the request interval is set to 0.15 s.

    4.3 Performance Comparison with Conventional Research

    Many studies have been conducted to detect and protect against PLC memory attacks.We consider three aspects of the performance of the proposed PLC block monitoring system and its operating position,whether the PLC memory attack can be protected,and its performance impact for comparison with the system presented in previous studies(Table 8).The operating position is the level of the Purdue model in which the system is installed for PLC protection.It mainly protects the PLC directly at level 1,where the PLC is located,or at level 3,where the EWS that manages the PLC is located.Whether PLC memory attacks can be protected indicates whether the proposed system can protect memory attacks against PLCs.The performance impact is derived from cycle time measurement experiments as a performance impact on PLC by applying a system for protecting PLC.Our proposed method directly protects the PLC and is located at level 1,which is immune to manipulation of view attacks.In addition,PLC memory attacks can be protected based on the first experiment,and significant results in performance impact are based on the second experiment.In conclusion,it detects PLC memory attacks in a simple and powerful manner compared to existing studies and has less impact on performance.

    Table 8: Comparative analysis of the proposed method with conventional research

    5 Limitations

    This study proposed and implemented a PLC block monitoring system for the security of ICS.The system uses the simple but powerful detection method using OB and DB of PLC.However,there are some challenges to overcome:

    ? Limited PLC types.This system uses the python-snap7 library for memory acquisition.This library implements Siemens S7Comm protocol and cannot apply the system to other vendors’PLCs.

    ? Lack of PLC programs.It is necessary to experiment with numerous different PLC programs to measure the precise performance impact.

    ? Lack of decompile functions.Providing decompiled results for manipulated byte array values would improve visibility.Currently,only tampered values and indices can be identified.

    ? Limitations of data block monitoring.In the case of the DB,since various values continuously change while the PLC is operating,tampering cannot be detected through previous-present value comparison.Therefore,the system monitors only block information,not the block data of DBs.

    6 Conclusion

    In this study,we proposed a system to detect memory manipulation by monitoring OB1 and DB in PLC program blocks to protect ICS that have become more vulnerable with the introduction of industrial IoT.The monitoring system was applied to level 1(the controller zone)to monitor a reliable PLC program by directly communicating with the PLC.This makes it possible to detect attacks on the PLC efficiently.In addition,OB1,including the program’s main function and DB that stores user data,were monitored for efficient detection.It was found that PLC memory manipulation could be detected,and the very minute performance impact caused by the application of the monitoring system was confirmed.

    In follow-up research,we intend to perform experiments inquiring whether tampering detection can be achieved by applying a monitoring system to various vendor products and multiple PLC programs.In addition,by adding the decompile functions[29],we hope to provide decompiled values instead of returning only an index or byte array for the tampered part.Finally,we desire to study how the ever-changing data block can be monitored.

    Acknowledgement:Thanks to our researchers and the reviewers which have improved this paper.

    Funding Statement:This research was supported by the Korea WESTERN POWER (KOWEPO)(2022-Commissioned Research-11,Development of Cyberattack Detection Technology for New and Renewable Energy Control System Using AI (Artificial Intelligence),50%) and the Institute of Information &Communications Technology Planning &Evaluation (IITP) grant funded by the Korea government (MSIT) (No.2021-0-01806,Development of Security by Design and Security Management Technology in Smart Factory,40%)and the Gachon University Research Fund of 2023(GCU-202110280001,10%).

    Author Contributions:Study conception and design: M.Lee,J.Seo,J.Shin;method: M.Lee;implementation and experiments:M.Lee;draft manuscript preparation:M.Lee,J.Shin;draft review:J.Seo.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data and materials in the experiments can be produced from the corresponding author on request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲av二区三区四区| 91精品三级在线观看| 看十八女毛片水多多多| 亚洲精品日韩在线中文字幕| 午夜久久久在线观看| 亚洲婷婷狠狠爱综合网| 久久精品国产鲁丝片午夜精品| 日韩,欧美,国产一区二区三区| 22中文网久久字幕| 精品一区在线观看国产| 亚洲欧美日韩另类电影网站| 午夜免费观看性视频| 免费观看av网站的网址| 亚洲综合色惰| 一本久久精品| tube8黄色片| 欧美最新免费一区二区三区| 最黄视频免费看| √禁漫天堂资源中文www| 免费观看的影片在线观看| 高清毛片免费看| 精品人妻熟女毛片av久久网站| 最新的欧美精品一区二区| √禁漫天堂资源中文www| 国产老妇伦熟女老妇高清| 免费黄频网站在线观看国产| 国产精品一区二区三区四区免费观看| 少妇人妻 视频| 日本爱情动作片www.在线观看| 免费黄色在线免费观看| 日日摸夜夜添夜夜添av毛片| 国产一区二区三区av在线| 久久ye,这里只有精品| 人妻少妇偷人精品九色| 两个人免费观看高清视频| 国产免费福利视频在线观看| 国产精品三级大全| 秋霞在线观看毛片| 伦精品一区二区三区| 2022亚洲国产成人精品| xxxhd国产人妻xxx| 女的被弄到高潮叫床怎么办| 亚洲成色77777| 国产极品粉嫩免费观看在线 | 女性被躁到高潮视频| 日本91视频免费播放| 伦理电影大哥的女人| 中文天堂在线官网| 只有这里有精品99| 婷婷色麻豆天堂久久| 欧美xxⅹ黑人| 亚洲精品久久久久久婷婷小说| 国产欧美日韩综合在线一区二区| 午夜激情久久久久久久| 青青草视频在线视频观看| av女优亚洲男人天堂| 三上悠亚av全集在线观看| 国产色婷婷99| 人妻 亚洲 视频| 午夜免费鲁丝| 久久综合国产亚洲精品| 我要看黄色一级片免费的| 黄色视频在线播放观看不卡| 久久久久久人妻| 赤兔流量卡办理| 18+在线观看网站| 国产成人精品福利久久| 国产男女超爽视频在线观看| 纵有疾风起免费观看全集完整版| 亚洲精品日韩av片在线观看| 爱豆传媒免费全集在线观看| 成人漫画全彩无遮挡| 好男人视频免费观看在线| 久久精品夜色国产| 亚洲精品一区蜜桃| 欧美激情 高清一区二区三区| 中文字幕人妻丝袜制服| 哪个播放器可以免费观看大片| 国产精品国产三级国产av玫瑰| 免费大片18禁| 99久久精品国产国产毛片| 久久久久久久国产电影| 蜜臀久久99精品久久宅男| 国内精品宾馆在线| 人人澡人人妻人| 91久久精品国产一区二区成人| 毛片一级片免费看久久久久| 嫩草影院入口| 日本黄色片子视频| 国产亚洲av片在线观看秒播厂| 国产精品不卡视频一区二区| 久久国产精品大桥未久av| 日韩av在线免费看完整版不卡| 成人国产麻豆网| 国产片内射在线| 99久久精品国产国产毛片| 三上悠亚av全集在线观看| 久久久欧美国产精品| 国产熟女欧美一区二区| 欧美精品一区二区免费开放| 国产精品人妻久久久影院| 亚洲色图综合在线观看| 狂野欧美激情性bbbbbb| 亚洲国产日韩一区二区| 99久久中文字幕三级久久日本| 王馨瑶露胸无遮挡在线观看| 美女中出高潮动态图| 久久久亚洲精品成人影院| av天堂久久9| 欧美丝袜亚洲另类| 国产在线免费精品| 久久久久久久久大av| 中文字幕精品免费在线观看视频 | 色5月婷婷丁香| av免费观看日本| 久久97久久精品| 亚洲精品一区蜜桃| 日韩av在线免费看完整版不卡| 成人漫画全彩无遮挡| 久久久久久久大尺度免费视频| 国产白丝娇喘喷水9色精品| 国产成人免费观看mmmm| 久久精品夜色国产| 人妻制服诱惑在线中文字幕| 精品午夜福利在线看| 少妇 在线观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 秋霞伦理黄片| av福利片在线| 国产片特级美女逼逼视频| 少妇被粗大的猛进出69影院 | 亚洲av男天堂| 少妇 在线观看| 精品少妇黑人巨大在线播放| 国产精品国产三级国产av玫瑰| 水蜜桃什么品种好| 伦精品一区二区三区| 一区二区av电影网| 51国产日韩欧美| 高清视频免费观看一区二区| 一级毛片 在线播放| 亚洲国产色片| 国产欧美亚洲国产| 国产男人的电影天堂91| 美女视频免费永久观看网站| 欧美xxⅹ黑人| 亚洲国产精品一区三区| 老女人水多毛片| 欧美精品人与动牲交sv欧美| 黑人欧美特级aaaaaa片| 国产亚洲av片在线观看秒播厂| 伊人亚洲综合成人网| 黑人欧美特级aaaaaa片| 乱人伦中国视频| 两个人的视频大全免费| 91在线精品国自产拍蜜月| 97在线人人人人妻| 欧美日韩成人在线一区二区| 一级毛片我不卡| av专区在线播放| 国产熟女午夜一区二区三区 | 日韩人妻高清精品专区| 最近中文字幕高清免费大全6| 精品亚洲乱码少妇综合久久| a级毛片在线看网站| 日韩一区二区视频免费看| 久久亚洲国产成人精品v| 你懂的网址亚洲精品在线观看| 久久热精品热| 在线观看三级黄色| 人妻人人澡人人爽人人| 亚洲av在线观看美女高潮| 亚洲国产日韩一区二区| 国产精品一国产av| 久久久久人妻精品一区果冻| 国产老妇伦熟女老妇高清| 一级爰片在线观看| 国产av码专区亚洲av| 99热国产这里只有精品6| 欧美 亚洲 国产 日韩一| 久久久欧美国产精品| 少妇人妻 视频| 丝袜脚勾引网站| 在线精品无人区一区二区三| 又粗又硬又长又爽又黄的视频| a级毛色黄片| 国产男女超爽视频在线观看| 亚洲精品国产色婷婷电影| 自线自在国产av| 在线看a的网站| 国产成人av激情在线播放 | 欧美精品一区二区免费开放| 久久久久精品性色| 国产一区二区三区综合在线观看 | 99久国产av精品国产电影| 国产成人午夜福利电影在线观看| 亚州av有码| 日本黄色片子视频| 精品熟女少妇av免费看| 毛片一级片免费看久久久久| 日韩欧美一区视频在线观看| 日日撸夜夜添| 亚洲国产欧美日韩在线播放| 视频在线观看一区二区三区| 一本一本综合久久| 久久久久久久久久久免费av| 9色porny在线观看| 青春草视频在线免费观看| 免费观看a级毛片全部| www.色视频.com| 久久国内精品自在自线图片| 国产伦理片在线播放av一区| 国产精品免费大片| 日本91视频免费播放| 久久99蜜桃精品久久| 美女cb高潮喷水在线观看| 麻豆成人av视频| 十分钟在线观看高清视频www| 秋霞在线观看毛片| 亚洲精品aⅴ在线观看| 国产黄片视频在线免费观看| 久热这里只有精品99| 一区在线观看完整版| 2021少妇久久久久久久久久久| 国产成人一区二区在线| 大码成人一级视频| 如何舔出高潮| freevideosex欧美| 简卡轻食公司| 久久精品人人爽人人爽视色| 色视频在线一区二区三区| 大又大粗又爽又黄少妇毛片口| 3wmmmm亚洲av在线观看| 久久人人爽人人片av| 久久久久久久久久人人人人人人| 日本av手机在线免费观看| 日本欧美视频一区| 精品一区二区免费观看| 如何舔出高潮| 黄片无遮挡物在线观看| 秋霞在线观看毛片| 精品人妻偷拍中文字幕| 国产亚洲精品久久久com| 久久久久久久久久成人| 搡老乐熟女国产| 狠狠精品人妻久久久久久综合| 成人亚洲欧美一区二区av| 国产伦精品一区二区三区视频9| 国产成人精品无人区| 国产男女内射视频| 亚洲欧美一区二区三区国产| 久热这里只有精品99| 久久久午夜欧美精品| 97在线视频观看| 久久99热6这里只有精品| 国产在线视频一区二区| 少妇丰满av| 久久午夜福利片| 国产亚洲av片在线观看秒播厂| 91久久精品电影网| 国产片内射在线| 18禁动态无遮挡网站| 美女脱内裤让男人舔精品视频| 亚洲欧洲日产国产| a 毛片基地| kizo精华| 日本色播在线视频| 午夜91福利影院| 精品久久久噜噜| 一级,二级,三级黄色视频| 中文字幕最新亚洲高清| 丝袜在线中文字幕| 国产成人精品在线电影| 亚洲精品乱久久久久久| a级毛片黄视频| 色5月婷婷丁香| 成人国产麻豆网| 美女cb高潮喷水在线观看| 国产淫语在线视频| 大香蕉久久成人网| 卡戴珊不雅视频在线播放| 久久久国产欧美日韩av| 中文天堂在线官网| 18禁在线播放成人免费| 亚洲不卡免费看| 大话2 男鬼变身卡| 日韩中字成人| 亚洲无线观看免费| 一区二区av电影网| 欧美 亚洲 国产 日韩一| 国产又色又爽无遮挡免| 日韩精品有码人妻一区| 亚洲精品日本国产第一区| 国产精品人妻久久久久久| 最新中文字幕久久久久| 国产在视频线精品| 久久亚洲国产成人精品v| 亚洲国产av影院在线观看| 精品国产乱码久久久久久小说| 亚洲色图综合在线观看| 乱码一卡2卡4卡精品| 免费高清在线观看视频在线观看| 国产日韩一区二区三区精品不卡 | 成年女人在线观看亚洲视频| 日本av免费视频播放| 2021少妇久久久久久久久久久| 国产在线免费精品| 精品久久久久久电影网| 国产成人a∨麻豆精品| 一级毛片aaaaaa免费看小| 精品一区二区免费观看| 国产69精品久久久久777片| 波野结衣二区三区在线| 久久久久精品久久久久真实原创| 午夜激情av网站| 性高湖久久久久久久久免费观看| 欧美另类一区| 欧美精品高潮呻吟av久久| 制服诱惑二区| 亚洲欧美清纯卡通| 国产精品不卡视频一区二区| 最近最新中文字幕免费大全7| a级毛色黄片| 夜夜看夜夜爽夜夜摸| 黄色毛片三级朝国网站| 少妇被粗大的猛进出69影院 | tube8黄色片| 欧美日韩在线观看h| 婷婷色综合www| 国产在线视频一区二区| 亚洲内射少妇av| 纯流量卡能插随身wifi吗| 午夜日本视频在线| 国产av国产精品国产| 久久狼人影院| 亚洲熟女精品中文字幕| 中文乱码字字幕精品一区二区三区| 两个人免费观看高清视频| 99热网站在线观看| 女的被弄到高潮叫床怎么办| 亚洲精品乱码久久久久久按摩| 国产成人av激情在线播放 | 制服丝袜香蕉在线| 久久综合国产亚洲精品| 在线观看一区二区三区激情| 亚洲精品久久成人aⅴ小说 | 日日爽夜夜爽网站| 日韩成人伦理影院| xxx大片免费视频| 中文字幕亚洲精品专区| 午夜福利网站1000一区二区三区| 国产免费视频播放在线视频| 日韩欧美一区视频在线观看| 国产国语露脸激情在线看| 九色亚洲精品在线播放| 亚洲av二区三区四区| 国产精品国产三级国产av玫瑰| 欧美 亚洲 国产 日韩一| 日韩在线高清观看一区二区三区| 草草在线视频免费看| 97精品久久久久久久久久精品| 国产av精品麻豆| 欧美日韩视频高清一区二区三区二| 午夜福利视频在线观看免费| av在线观看视频网站免费| 王馨瑶露胸无遮挡在线观看| 在线播放无遮挡| 国产精品秋霞免费鲁丝片| 精品人妻熟女av久视频| 九草在线视频观看| 精品一区二区免费观看| 热re99久久精品国产66热6| 永久免费av网站大全| 午夜91福利影院| 国产成人freesex在线| 国国产精品蜜臀av免费| 乱码一卡2卡4卡精品| 国产极品粉嫩免费观看在线 | 国产精品一区二区在线观看99| 日韩强制内射视频| 夜夜爽夜夜爽视频| 精品久久久久久电影网| 美女视频免费永久观看网站| 国产黄色免费在线视频| 久久久久网色| 最近中文字幕2019免费版| 亚洲欧美日韩卡通动漫| 国产毛片在线视频| 欧美精品国产亚洲| 少妇精品久久久久久久| 日韩制服骚丝袜av| 三上悠亚av全集在线观看| 国产黄频视频在线观看| 狂野欧美激情性bbbbbb| 亚洲av日韩在线播放| 亚洲综合精品二区| 免费高清在线观看日韩| 久久97久久精品| 久久久久久久久久成人| 久久ye,这里只有精品| 亚洲精品久久成人aⅴ小说 | 三级国产精品片| 久久免费观看电影| 国产片特级美女逼逼视频| 夜夜看夜夜爽夜夜摸| 精品久久久精品久久久| 男人添女人高潮全过程视频| 男的添女的下面高潮视频| 亚洲精品国产色婷婷电影| 另类精品久久| 免费大片黄手机在线观看| 亚洲av.av天堂| 丝袜脚勾引网站| 在线播放无遮挡| av免费观看日本| 久久韩国三级中文字幕| 亚洲精品一区蜜桃| 日本色播在线视频| 久久精品久久久久久久性| 日韩av在线免费看完整版不卡| 女性被躁到高潮视频| 99国产综合亚洲精品| 国产综合精华液| 高清视频免费观看一区二区| 99九九线精品视频在线观看视频| 18+在线观看网站| 日韩强制内射视频| 亚洲精品一二三| 国产高清国产精品国产三级| 日韩视频在线欧美| 又粗又硬又长又爽又黄的视频| 久久国产精品男人的天堂亚洲 | 久久久久久久精品精品| 国产精品99久久久久久久久| 色视频在线一区二区三区| 国产毛片在线视频| 在线观看美女被高潮喷水网站| 欧美人与善性xxx| 美女xxoo啪啪120秒动态图| 亚洲精品久久成人aⅴ小说 | 嘟嘟电影网在线观看| 国产一区二区三区av在线| 另类精品久久| 国产精品国产三级专区第一集| 韩国av在线不卡| 91国产中文字幕| 亚洲精品456在线播放app| 成人黄色视频免费在线看| 18禁动态无遮挡网站| 日韩精品有码人妻一区| 狠狠精品人妻久久久久久综合| 久久久久精品久久久久真实原创| 自线自在国产av| 色婷婷av一区二区三区视频| 十八禁高潮呻吟视频| av免费在线看不卡| 国产乱人偷精品视频| 色吧在线观看| 午夜福利视频在线观看免费| 亚洲av成人精品一二三区| 久久精品久久久久久久性| 国产熟女午夜一区二区三区 | 亚洲综合色惰| 亚洲国产毛片av蜜桃av| 日本wwww免费看| 久久国内精品自在自线图片| 国产精品不卡视频一区二区| 制服人妻中文乱码| 日日啪夜夜爽| 国产欧美日韩综合在线一区二区| 亚洲精品456在线播放app| 蜜臀久久99精品久久宅男| 国产精品一二三区在线看| 91久久精品电影网| 在线 av 中文字幕| 国产成人精品在线电影| 卡戴珊不雅视频在线播放| 国产一区二区三区综合在线观看 | 国产极品天堂在线| 久久久久精品性色| 国产精品久久久久久久电影| 插阴视频在线观看视频| 一级毛片黄色毛片免费观看视频| 久久人人爽av亚洲精品天堂| 精品亚洲乱码少妇综合久久| 欧美精品人与动牲交sv欧美| 一区二区三区四区激情视频| 国产免费又黄又爽又色| 91国产中文字幕| 插阴视频在线观看视频| 久久鲁丝午夜福利片| 99热网站在线观看| 丰满饥渴人妻一区二区三| 欧美激情极品国产一区二区三区 | 日韩制服骚丝袜av| 久久久精品区二区三区| 欧美变态另类bdsm刘玥| 亚洲欧美成人综合另类久久久| 一区二区三区乱码不卡18| 国产午夜精品一二区理论片| 18禁裸乳无遮挡动漫免费视频| 日韩 亚洲 欧美在线| 黄色一级大片看看| 黑人猛操日本美女一级片| 亚洲av不卡在线观看| 最新的欧美精品一区二区| 欧美日韩国产mv在线观看视频| 在线观看免费视频网站a站| 亚洲欧美成人综合另类久久久| 欧美精品亚洲一区二区| 成人亚洲精品一区在线观看| 伦理电影免费视频| 涩涩av久久男人的天堂| 欧美日韩在线观看h| 三上悠亚av全集在线观看| 26uuu在线亚洲综合色| 中文字幕制服av| 免费观看a级毛片全部| 国产精品久久久久久久久免| 在线观看免费日韩欧美大片 | 久久久久久久久久久久大奶| 国产老妇伦熟女老妇高清| 亚洲欧美一区二区三区黑人 | 成年美女黄网站色视频大全免费 | 人人妻人人爽人人添夜夜欢视频| 色哟哟·www| 一个人免费看片子| 亚洲伊人久久精品综合| 美女视频免费永久观看网站| 婷婷色麻豆天堂久久| 亚洲国产精品成人久久小说| 一级毛片黄色毛片免费观看视频| 精品卡一卡二卡四卡免费| 女性生殖器流出的白浆| 亚洲,一卡二卡三卡| 在线精品无人区一区二区三| 丰满迷人的少妇在线观看| 在线播放无遮挡| 伦理电影免费视频| 国产午夜精品一二区理论片| 欧美另类一区| 一区二区日韩欧美中文字幕 | av有码第一页| 久久久久久久精品精品| 亚洲,欧美,日韩| 制服人妻中文乱码| 亚洲精品一二三| 男女国产视频网站| 日韩一区二区视频免费看| 国产亚洲欧美精品永久| 免费少妇av软件| 爱豆传媒免费全集在线观看| 国产在线一区二区三区精| 久久久久精品久久久久真实原创| 啦啦啦啦在线视频资源| 只有这里有精品99| 国产69精品久久久久777片| 2022亚洲国产成人精品| 麻豆乱淫一区二区| 超色免费av| 性色av一级| 国产精品一国产av| 丝袜在线中文字幕| 3wmmmm亚洲av在线观看| 18禁动态无遮挡网站| 看非洲黑人一级黄片| 久久久久久久国产电影| 少妇人妻 视频| 国产在线一区二区三区精| 一区二区av电影网| 纯流量卡能插随身wifi吗| 免费观看a级毛片全部| 啦啦啦啦在线视频资源| 国产极品粉嫩免费观看在线 | 国产午夜精品一二区理论片| 啦啦啦在线观看免费高清www| 亚洲欧美成人精品一区二区| 久久精品久久精品一区二区三区| 成人亚洲欧美一区二区av| 国产老妇伦熟女老妇高清| 一级,二级,三级黄色视频| 超碰97精品在线观看| 亚洲美女黄色视频免费看| 久热久热在线精品观看| 国产一区二区三区av在线| 免费黄网站久久成人精品| 亚洲综合色惰| 国产免费又黄又爽又色| 黑人猛操日本美女一级片| 97超碰精品成人国产| 成人18禁高潮啪啪吃奶动态图 | 男的添女的下面高潮视频| 精品人妻熟女av久视频| 亚洲精品乱码久久久久久按摩| 免费黄色在线免费观看| 汤姆久久久久久久影院中文字幕| a级毛色黄片| 国产 一区精品| 婷婷成人精品国产| 26uuu在线亚洲综合色| 亚洲精品乱码久久久v下载方式| 精品久久久久久电影网| 丝袜喷水一区| 日韩av免费高清视频| 两个人免费观看高清视频| av天堂久久9| 国产成人freesex在线| 在线观看免费高清a一片| 久久久国产精品麻豆| 能在线免费看毛片的网站| 天堂中文最新版在线下载| 欧美日韩av久久| 国产黄频视频在线观看| 纯流量卡能插随身wifi吗| 极品人妻少妇av视频|