• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    MF2-DMTD:A Formalism and Game-Based Reasoning Framework for Optimized Drone-Type Moving Target Defense

    2023-12-15 03:56:34SangSeoJaeyeonLeeByeongjinKimWoojinLeeandDohoonKim
    Computers Materials&Continua 2023年11期

    Sang Seo,Jaeyeon Lee,Byeongjin Kim,Woojin Lee and Dohoon Kim

    1Solution Laboratory,NSHC Co.,Ltd.,Seoul-si,186,Korea

    2Cyber Battlefield Team,Hanwha Systems Co.,Ltd.,Seongnam-si,Pangyoyeok-ro,188,Korea

    3Department of Computer Science,Kyonggi University,Suwon-si,16227,Korea

    ABSTRACT Moving-target-defense(MTD)fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutations.However,the existing naive MTD studies were conducted focusing only on wired network mutations.And these cases have also been no formal research on wireless aircraft domains with attributes that are extremely unfavorable to embedded system operations,such as hostility,mobility,and dependency.Therefore,to solve these conceptual limitations,this study proposes normalized drone-type MTD that maximizes defender superiority by mutating the unique fingerprints of wireless drones and that optimizes the period-based mutation principle to adaptively secure the sustainability of drone operations.In addition,this study also specifies MF2-DMTD(model-checkingbased formal framework for drone-type MTD),a formal framework that adopts model-checking and zero-sum game,for attack-defense simulation and performance evaluation of drone-type MTD.Subsequently,by applying the proposed models,the optimization of deceptive defense performance of drone-type MTD for each mutation period also additionally achieves through mixed-integer quadratic constrained programming(MIQCP)and multiobjective optimization-based Pareto frontier.As a result,the optimal mutation cycles in drone-type MTD were derived as(65,120,85)for each control-mobility,telecommunication,and payload component configured inside the drone.And the optimal MTD cycles for each swarming cluster,ground control station(GCS),and zone service provider(ZSP)deployed outside the drone were also additionally calculated as(70,60,85),respectively.To the best of these authors’knowledge,this study is the first to calculate the deceptive efficiency and functional continuity of the MTD against drones and to normalize the trade-off according to a sensitivity analysis with the optimum.

    KEYWORDS Moving-target-defense(MTD);drone;formal methods;game theory

    1 Introduction

    In recent years,as the scope of modernization coverage expands in embedded platforms,heterogeneous wireless systems such as unmanned aircraft and sensors are being rapidly applicated across mission-critical system domains like the battlefield,where both the safety and cybersecurity of the organization should be continuously guaranteed.However,as the existing closed communication regulations remain,although the composition of a dedicated countermeasure is not standardized,the issue of cyber uncertainty,which is attacker-dominant owing to the inherently vulnerable surfaces of applied embedded systems,is also on the rise [1-4].Thus,to satisfy these security requirements,the cybersecurity research community affiliated with national defense and critical systems has fully adopted MTD [5,6].MTD is a proactive cybersecurity technology that asymmetrically maximizes defense superiority and attack complexity according to a cyber mobility-based mutation to minimize the effects of illegal compromises.

    However,most existing MTD studies for the replacement of conventional security have concentrated on the unique specifications of wired networks and related sub-protocols with low volatility and relatively easy employment of security resources,such as smart grids,smart factories,and industrial control systems (ICS).That is,only a few official studies have independently reduced the potential vulnerabilities [7,8] of wireless drones with attributes [9] that are extremely unfavorable for rapid operation(i.e.,passivity and heterogeneity,decision-making dependency,and environmental hostility).In addition,related wireless cases also only maximized cyber agility[10]based on the micro-air vehicle link(MAVLink)protocol standard.And resilient definitions and verifications to ensure the availability of unmanned wireless drone platforms as mission-critical systems in reported research have not been also formalized with MTD.

    Accordingly,when the configuration of the MTD specialized to ensure high levels of both cyber agility and resiliency [11,12] of wireless drones is not preemptively accompanied,it will not only be impossible to protect the cybersecurity vulnerabilities of the unmanned drone,but it will also be impossible to continuously guarantee the operational stability of the target drone.To alleviate these limitations,it is necessary to achieve proactive defense based on active avoidance and to specify the dedicated MTD [13],which can secure cyber resilience based on both the internal and external structures of the rugged drone,detailed attack surface [14],and recognized vulnerabilities.And,to calculate the quantitative defense performance of the MTD for each proposition based on the formal specifications of an unmanned drone,formal verification with added mathematical proofs should be also performed in parallel.Thus,this study aims to minimize the compromise success rate of attackers by mutating unique fingerprint information groups with drone-type MTD related to the internal functions of unmanned drones and external communication.This study also proposes MF2-DMTD,a formal framework with model-checking-based formalism and an iterative zero-sum equilibrium logic-based competitive game,to simulate and validate an optimized drone-type MTD that adaptively determines the calculated mutation periods through decision trees with automata and the Markov decision process(MDP)[15].Finally,as a formal verification according to the specifications in MF2-DMTD,the trade-off optimization of the drone-type MTD is achieved by further plotting the normalized Pareto frontier with MIQCP [16],detailed constraints,and multi-objective genetic optimization(MOGO)[17].

    The main contributions of this study are as follows:

    ■First,the deceptive defense efficiency (cyber agility),functional continuity(cyber resilience),and interoperability of drone-type MTD,which have not been considered in previous MTD studies from the research domain perspective,can be specified and evaluated in terms of threat modeling.

    ■Second,through this study,the zero-sum game-based combat model can more realistically assume a competitive relationship in cyberspace related to the structural/functional correlation of drones.To embed cyber deception into this model,the decision-making flow for each actor can be standardized so that it is not highly dependent on prior knowledge such as the attacker’s ability,motivation,and kill chain for drone vulnerability.This model can be also additionally configured to force an inferior judgment that was not optimized based on subjective beliefs,differences of information and view,and misperception established according to information uncertainty.

    ■Third,formal specifications for wireless unmanned drone threat modeling can be achieved by structuring conceptualized two decision trees based on the priced-timed Markov decision process (PTMDP) [18] according to automata states such as vulnerabilities,threats,and countermeasures.

    ■Fourth,through zero-sum game logic based on perfect Bayesian Nash equilibrium (PBNE)[19] and Bayesian Stochastic Stackelberg (BSS) [20],and formalism embedded with Uppaal Stratego [21],the performance of drone-type MTD can be verified while achieving Pareto optimization.

    ■Fifth,based on the analyzed optimal results of drone-type MTD’s performance,along with the formal specification and verification,the adaptive configuration of the operational strategy considering both the cyber agility and resiliency of the unmanned drone placed in the missioncritical system domain can be advanced in the form of an actual tactical prototype.

    The remainder of this paper is organized as follows.Chapter 2 examines and analyzes previous research cases related to the existing MTD.Chapter 3 presents MF2-DMTD,which is a formal framework that additionally specifies internal and external drone threat modeling that reflects both transitivity and causality as a decision tree structure.In addition,the competition logic related to the zero-sum game is determined using regularized equations.Chapter 4 derives the drone-type MTD performance inference results owing to MIQCP and multi-objective genetic optimization in the form of Pareto frontier,and performs sensitivity analysis.Chapter 5 discusses the results.Finally,Chapter 6 concludes the study.

    2 Related Works

    Here,this section classifies studies that served as major inspirations when proposing the MF2-DMTD.

    2.1 Background of MTD and Conceptual Limitations

    Since 2011,“Trustworthy Cyberspace: Strategic Plan for The Federal Cybersecurity Research and Development Program”[22],MTD has emerged as a key deceptive security technology that can effectively replace existing conventional security based on the great interest of various cybersecurity research communities in critical systems and national defense.However,most of the reported previous studies on MTD were limited to performing performance evaluations only for heterogeneous platforms placed in stable wired networks,or limited the design of software-defined network(SDN)-based testbeds virtualized as controllers and testing them with detailed communication protocol standards[23].Related cases of wireless communication have also been reported as limited simulations focusing only on the variation in the radio frequency (RF)-based received signal strength indicator (RSSI)[24].In addition,studies that determined and verified lightweight MTD sequences for embedded domains mainly studied only the Internet of Things(IoT),which is characterized by the uniqueness of an arbitrary domain [25],such as industrial IoT (IIoT) and Internet-of-Vehicles (IoV).That is,the specification and evaluation of maneuvering platforms that maximize mobility and heterogeneity owing to six degrees of freedom(6DOF),such as drones,and the optimization of trade-offs to maintain seamless availability are insufficient[26].

    Accordingly,to solve all limitations of previous studies,formal specifications based on formalism that considers all the internal/external configurations of drones,authorized vulnerabilities,and countermeasure strategies are required.In addition,formal verification of security and availability according to the MTD application should be additionally preempted as optimization owing to iterative game simulation.Thus,to research the trade-off between the drone-type MTD optimized based on formalism and repetitive games,and to receive differentiated inspiration,this study analyzes studies preceded by game theory or formalism.

    2.2 Analysis of the Existing MTD with Game Theory

    The key to previous studies that evaluated MTD performance using game theory was to optimize reward,utility,and effort to achieve imperfect goals based on prior knowledge possessed by each competing cyber actor,such as attack surfaces,vulnerable points,and kill chain steps.That is,the optimization of MTD is calculated in the direction of minimizing the attacker’s advantage by providing responsiveness and adaptability to the mutation mechanism,regularizing the overall parameters for the mutation period,mutation target,and mutation sampling to maximize the expected gain of the defending actor,or quantitatively introducing thresholds that detect the loss of initiative according to system faults and failures due to an attacker’s compromise.Representative examples include the general game-theoretic literature based on Nash theory,Stackelberg game-theoretic literature based on Bayes’theorem and Stackelberg’s solution,and stochastic game-theoretic literature based on probabilistic transitions.

    2.2.1 General Game Theoretic Literature

    Here,this subsection describes previous MTD studies by adopting general game theory based on the Nash equilibrium.Zhu et al.[27]first demonstrated a trade-off between enhanced security and reduced functional availability of MTD-applied proactive defense actors by determining mathematical game metrics and parameters related to the MTD principle and quantitatively simulating them in the form of a two-player game.Ge et al.[28]simulated an incentive-compatible MTD game framework based on migration-type communication mapping to continuously provide the stability of organization services to legitimate users,even within a wired topology with MTD applied,and formalize proactive agility elements that ensure functional availability with an upper threshold.Neti et al.[29]constructed an MTD guide framework based on an anti-coordination game for quantifying deceptive metrics by mobility attributes and dynamically inferring the mutual feedback relationship between actors by episode.To minimize the side effect caused by actors of sophisticated distributed denial-of-service(DDoS)attacks,Wright et al.[30]designed a heuristic two-player game framework that optimizes all pre-conditions,mutation factors,and stability and security criteria for each design principle required for the construction of an adaptive MTD strategy.Carter et al.[31]further specified the MTD game architecture to optimize migration tactics that ensure a seamless connection of services available to legitimate internal users while maintaining the cognitive bias of illegal attackers induced in the defender-dominant container environment as much as possible.Colbaugh et al.[32] amplified the mathematical counterevidence of MTD sampling in a follow-up counter-example study.

    2.2.2 Stackelberg Game Theoretic Literature

    Here,this subsection describes previous MTD studies that simulated a causal relationship in which the follower’s scope of judgment and decision-making flow was limited according to the actions of the leader by adopting the Stackelberg game theory.Through the proposed co-resident attack mitigation and prevention architecture,Hasan et al.[33]detected co-resident attacks based on anomaly detection thresholds within a virtualized operating network that shares limited resources and formalized an MTD strategy that minimizes the invasion impact of lateral movement.Feng et al.[34] presented an MTD sequence that causes the disturbance,misleading,and confusion of attacker’s decisionmaking according to artificial disinformation by establishing an information disclosure framework that mathematically applies both the signal game and the Stackelberg game,which performs reactive mutual feedback.In a follow-up study,Zhu et al.[35] designed an advanced adaptive MTD model to maximize the induction efficiency of an attacker who bypasses the defense scheme and initially penetrates it by further expanding the scope of the attacker’s cognitive bias in units of routing protocols and packets.Sengupta et al.[36]developed a zero-sum game framework that optimizes the MTD to maximize proactive avoidance according to the mutation target and detailed sampling schemes,and simulated this for each decision tactic while minimizing the negative availability issue of the defender owing to side effects when these MTD are available in a wired-type simple topology that operates web applications,operating systems,and cloud services.In addition,a study on the optimization of MTD considering general sum game-based competition [37] was conducted to achieve robust mutationbased avoidance against advanced persistent threat attacks in the cloud network.In a related followup study,Li et al.[16]further amplified the hydraulic properties of the spatial-temporal attack surface that changed with MTD mutation by formalizing the Markov Stackelberg model optimized based on the average-cost semi-Markov decision process and discrete-time Markov decision process.Finally,Seo et al.[38]added an adaptive cognitive disturbance scheme to the existing MTD and constructed a deceptive game considering the continuous operability of the organization by combining this with a layered social engineering decoy.Also,in this work,a general sum game-based testbed was proposed to improve the proactive defense of the IoT-based sub-farm network cluster further.

    2.2.3 Stochastic Game Theoretic Literature

    Here,this subsection describes previous MTD studies that adopted stochastic game theory,considering probabilistic correlation.Manadhata [39] formalized a game model that adaptively reflects the three principles of MTD,which change in real-time,based on probabilistic transitions according to the decision-making flow,to determine each optimized MTD strategy according to the potential attack surface characterized by each domain.Zhang et al.[40]quantified the trade-off relationship resulting from the calculation of the MTD-based mutation factor in the form of sensitivity analysis and designed a nash-Q game framework based on the attacker’s strategy selection frequency and distribution to analyze the performance of each decision tactic concerning the rule of sharing incomplete information.

    2.3 Analysis of the Existing MTD Literature with Formalism

    Here,based on attack-defense trees and directed acyclic graph (DAG),structural diagrams,and propositional semantics derived from priced timed automata (PTA) interpretation,the key to previous studies that perform MTD performance inference by introducing formalism is to optimize the activation frequency of the three conceptualized MTD principles.

    Hong et al.[41] first designed an MTD mechanism by integrating it into a hierarchical attack representation model(HARM)as an attack graph-based study to quantitatively evaluate and compare the deceptive defense effectiveness of the MTD applied to proactively protect various communication domains,such as virtualized and wireless sensor networks.In a follow-up study [42],they utilized a temporal graph-based graphical security model (T-HARM) to present dynamic security metrics to evaluate the overall performance of the MTD related to cyber mobility attributes,such as granularity,flexibility,and elasticity,and to capture dynamic attack surface changes according to the MTD application.To optimize the MTD trade-offs that significantly mitigate the damaging impact of DDoS cost-effectively,Zhou et al.[43]proposed a multi-objective Markov decision process(MOMDP)that incorporates detailed interactions among attackers,defenders,and users based on trilateral game logic.They also demonstrated practical differentiation by designing and simulating the MOMDP within the SDN.Rahim et al.[44] proposed a formal methodology that can be formally verified based on Uppaal,an open model checker,for a formally specified MTD mechanism.Additionally,they performed a comparative evaluation of the mutation quality,mutation stability,and cost of the random host mutation technique based on repeated experiments.Finally,Ballot et al.[18],in state-ofthe-art research on the formalism of MTD,formalized PTMDP based on the DAG and PTA.They first proposed the PTMDP by structuring it as a decision tree based on threat modeling with attack vectors,subgoals,and MTD-based mitigation.Using Uppaal Stratego for formal verification,they mathematically performed a proof-of-concept by normalizing the optimal activation frequency set of each modeled MTD tactic in the form of a Pareto frontier.

    3 MF2-DMTD,Reasoning Formal Framework of Drone-Type MTD

    Here,this study formalizes the main modules in the proposed MF2-DMTD and defines formal specifications based on probabilistic PTMDP and decision trees,and all methods,metrics,attributes,and equations for formal verification based on model checking and feedback-type iterative zero-sum games.

    3.1 Design Principle

    As shown in Fig.1,the MF2-DMTD,which is proposed to cause deceptive defense and resilient availability of the drone-type MTD by adopting formalism,a zero-sum-based competition game,and meta-heuristic optimization,is designed by focusing on three main modules.

    In MF2-DMTD,first,the knowledge-based preprocessing module(1)adopts all the elements of functional components(communication,payload,control,and mobility units)within a single rugged drone and external communication entities that collaborate with target drones(swarming drone cluster,GCS,and ZSP),related state and goals,transition considering the prior-post probability according to Bayes’theorem,and interoperable sequences to define threat modeling containing the attack-defense tree concept and then specify it mathematically.In addition,formal metrics to apply the dronetype MTD’s feedback behavior for each identified drone internal and external vulnerability element are determined,and main parameters related to three MTD principles (‘what-to-move’,‘when-tomove’,‘how-to-move’) are also configured in detail,and used in the dynamic decision-based game competition simulation module(2)and the normalized model checker-based verification module(3).

    Next,the threat modeling specified according to the Common Vulnerabilities and Exposures(CVE)vulnerability in(1)is detailed as a PTMDP-based decision tree in the dynamic decision-based game competition simulation module,which is calculated to contribute to the decision of the optimum for each mutation period of the drone-type MTD by structuring mutually competitive relationships between actors based on continuous ratchet-type causality and normalizing zero-sum game with PBNE,BSS,and MIQCP.

    Figure 1:A main overview of MF2-DMTD for formalism and game-based reasoning with MTD

    Finally,the normalized model checker-based verification module in MF2-DMTD is evaluated using Uppaal Stratego,a state-of-art model checker,and a feedback-type repetitive engagement model to evaluate drone-type MTD performance based on PTMDP-based drone internal and external decision trees specified in(1)and(2).Additionally,along with(4),the comparison results of analyzing the performance of the drone-type MTD are finally derived in the form of Pareto frontier with multiobjective optimization such as non-dominated sorting genetic Algorithm II (NSGAII) and pareto archived evolution strategy(PAES).

    3.2 Formalization of Decision Tree

    Next,drone threat modeling [45] configured to specify all major assets,attack surfaces,threat vectors,and MTD-based countermeasures within this MF2-DMTD is computed as a PTMDP-based decision tree structure that includes all concepts of action,goal,relationship,and continuous causality based on the attack-defense tree,as shown in Figs.2 and 3.These specified decision trees are used as conceptual templates within the model checking and zero-sum game accompanying the formal verification process,supporting the calculation of the payoff between actors related to the cyber-killchain(CKC).

    The decision tree in Fig.2 is formalized for each of the four internal components to conceptualize continuous operational behaviors such as communication with MAVLink [46] of a single rugged drone armed with multiple antennas,payload-based sensing,control via bus traffic,and threedimensional maneuvering to ensure line-of-sight (LoS) and non-LoS (NLoS) propagations.The control-maneuvering unit was structured with a focus on the correlation between Pixhawk4,a flight controller,and Zubax equipment,an electronic speed controller,whereas the communication unit was also configured according to the dependency of the MAVLink telemetry independently configured in the Pixhawk4 controller and the sub-wireless communication sensors(RF,WiFi,LTE,mmWave)mounted on the wireless mobile antenna modules.As the payload unit is also conceptualized based on a lightweight mission companion computer to operate additional sub-party functions of a single drone,such as Raspberry Pi,both the spatial-temporal recognition function through RF and the real-time video transmission function through mobile communication were additionally determined.

    Figure 2:Threat modeling-based detailed decision tree by drone internal functional components

    Figure 3:Threat modeling-based detailed decision tree by drone external communication entities

    To simulate the interoperable behaviors of any external communication entities cooperating with rugged drones deployed on a battlefield for intelligence,surveillance,and reconnaissance(ISR)after belonging to the space-air-ground integrated network[47],the decision tree in Fig.3 is also composed of three types of drone external communication entities: swarming tactical drone cluster,GCS,and ZSP[48].Based on NLoS-based wireless communication relay and adaptive situational awareness,the swarming tactical drone network was clustered according to the dependency between the master drone that controls the clustered fleet in the form of star topology and the slave drone subordinated based on C2 (command &control).Inspired by the uplink-based remote control of a random swarming drone network deployed on the battlefield,the GCS entity operated under the presence of a senior commander was detailed as an RF uplink communication sensor performing flight control and a wireless mobile communication sensor performing packet transportation.As the ZSP entity is also conceptualized to contain a beacon-type wireless communication sensor hub that transmits useful regional status information to rugged drones on the mission,it was decided to improve the operational efficiency of drones by providing real-time states such as weather,geographic information system(GIS),and air traffic management(ATM)data regularly.

    In the detailed decision trees based on PTMDP in Figs.2 and 3,the subgoal state and attack surface element are formalized in the form of graph nodes in complex systems,and drone-type MTD-based countermeasure tactics are formalized in detail according to Tables 1-3.Accordingly,to conceptualize the subgoals related to rugged drones in competitive engagements by actors,Table 1 shows the functional internal components and external communication entities that are subdivided and correlated.

    Next,the attack surface elements defined to simulate the main vulnerabilities and penetration vectors inside and outside the drone are quantified based on both the recognized CVEs that were potentially related to the communication vulnerability of the rugged drone and the related Common Vulnerability Scoring System (CVSS),as shown in Table 2.To perform incursion using specific vulnerabilities,the proposition that should be achieved preemptively formally determines the penetration difficulty and damage impact for each type of cyber threat specialized for the target drone by quantifying atomic attack metrics such as attack time (time),attack success probability (aprob),pre-cost for launching an attack(accost),and post-cost for continuing an attack(pcost).

    Table 2: Table of attributes by attack surface-based element in MF2-DMTD

    Finally,the propositions of MTD tactics dedicated to each drone’s internal and external configuration were also further quantified as atomic defense metrics such as defense success probability(dprob) and defense cost (cost) owing to the multi-layered multitenancy structure dedicated to each associated attack surface element,as shown in Table 3.To realize proactive defense in terms of communication and operation within the drone targeting all physical,host,data link,and network layers,normalization is performed for the optimal trade-off required at the minimum.

    Table 3: Table of attributes by drone-type MTD-based counter-measure in MF2-DMTD

    3.3 Configuration of Dynamic Zero-Sum Game Model

    Modeling a game competition simulation module based on dynamic decision-making that performs a zero-sum-based competitive engagement simulation along with a model checker within the proposed MF2-DMTD contributes to the probabilistic formal verification of the drone-type MTD.Thus,the zero-sum attack-defense competition between actors configured within the module is schematized based on a multistage evolutionary repetitive game tree,as shown in Fig.4.

    To determine the randomized spatial-temporal entropy within this game tree,the PBNE,which has a privatized asymmetric judgment relation and a rule of sharing incomplete information according to the Dirac delta function and the Boltzmann probability distribution is adopted to maximize the defender’s payoff per episode.In addition,the additional application of BSS within the game tree optimizes the quantitative sequential relationship for micro-macro rewards for each actor by structurally forming a dependent ratchet-type causality between an active leader and a passive follower.It is also conceptualized to maintain the mutation initiative by forcing the attacker’s priori belief and confusion to a high level with the defender’s dominance.

    It is also shown that the game tree is adaptively configured according to the development ofn,an engagement step in an arbitrary episodek.First,attackerAselectsASn,which is the most optimized set of invasion strategies within a certainn,to attempt an initial incursion or maintain the previous occupation,performing preliminary actions related to the reconnaissance,weaponization,and lateral movement phases within the CKC.Thereafter,,dynamically determined stochastic components,as shown in Eq.(1),are used mathematically according to the quantitative state information(reward,revenue,and cut-off solution of equilibrium)conserved by attacker A through the previous engagement,attack surface-based approximate intelligence to predict and selectand the elements that define attack tactics and techniques inASn.In this case,ω,the exploration factor of actors,determines the scope of the subjective judgment regarding the intelligence that competitors radiate to the outside.

    Figure 4:Conceptual overview of the zero-sum-based multistage game in MF2-DMTD

    And,through these (1),(2),binary valuesγfor the representation of competition results,the game tree-based workflow of multistage competition in Fig.4 is embodied as Algorithm 1.Algorithm 1 determines the payoff ofAandDby changing the reward ofnaccording toβ,γ,and the inherentxandy,and also defines the initial reward ofn+1.IfDsucceeds in deceptive defense againstA‘sASthroughDS,positive revenue is added toDSand negative revenue is applied toAS.IfDfails to enter the defensive state by the expiration of CKC,negative revenue is applied to theDSand positive revenue is added to theAS.

    At this point,within the game tree and Algorithm 1 containing this repeated feedback sequence,the endpoint of an engagement episode between actors is determined by whether a cutoff solution of the equilibrium can be calculated through the zero-sum game calculated according to the normalized PBNE and BSS.Therefore,the payoff optimization of defenderDusing the drone-type MTD is defined in detail as a Bellman value iteration[49]based Q-value scheme that performs adaptation according to behavioral changes,as in Eq.(3)related to(1)and(2).Skin(3)is a finite state calculated based onGSkandSSk,TSkconfigured within episode k and contains multiple levels to stochastically define the structural state-transition in PTMDP.In addition,axandaydenote the finite actions based on the half-duplex transition of attackerAforSkand the full-duplex transition of defenderD,respectively.In this case,GSk=is a set of strategies dynamically determined according toDSkof defenderDandASkof attackerA,whereasSSk=is a set of BSS-based decision tactics that are asymmetrically activated according to the coercive feedback signaling initiative.In addition,TSk=is a set of intelligence elements unique to each actor.For attackerA,it is a private information element group based on the attack surface effective thresholdρ,and for defenderD,it is configured as a threat modeling-based element group identified to apply the MTD inside and outside the drone.

    Additionally,Ris a function that calculates the payoff that can be obtained within episodekwhen attackerAand defenderDperform actionsaxanday,respectively,inSk,and it is used to maximize as the key constraint until defenderD,taking this into account,calculates a solution of equilibrium.If the actions ofaxandayare performed inθorSk,the probability of reaching the next state,Sk+1,is defined as a probability distribution function calculated based on the Dirac delta function and the Boltzmann probability distribution in the PBNE.U,zero-sum-based discount factor function,is used to calculate an approximated solution of the equilibrium considering meta-heuristic optimization,as it cuts off the scope of factor judgment for each actor within [0,1].CUis also defined as a utility function that imposes effort and cost on each actor within the zero-sum model.OPT,which is finetuned from defenderD’s point of view,also calculates an optimized reward by reflecting all availableSSk+1inSk+1,as in Eq.(4)related to(3).

    Finally,payoff optimization normalized according to the drone’s internal functional components and external communication entities was determined according to Eqs.(5)-(6) based on (3) and(4),respectively.Thereafter,(5) adjusts the optimized payoff by addingSMF,which is a [0,1]threshold considering the security state inside the drone.To reflect the unique wireless communication characteristics outside the drone,(6) also amplifies all ofPrx=-10×nlog10D+Ptx,an indicator of the received signal strength related to trilateration (Ptxis the transmission strength,n is the Friis propagation loss model-based constant of path loss),D=|Drx-Dtx|,which is the relative distance value,andPL(D)=(10×log(Ptx/1mW))-(10×log(Prx/1mW)),which is a power density function.

    4 Experiments and Results

    Next,the node-based state and edge-based transition concepts specified in Figs.2 and 3 and Tables 1-3 were used to compare and simulate the performance inference of the drone-type MTD.

    4.1 Construction of Experimental Testbed

    The main simulation parameters required to optimize the Pareto solutions related to the security and functionality of the drone-type MTD were determined as listed in Table 4.

    Table 4: Major simulation parameters in MF2-DMTD

    First,in the case of the drone-type MTD,the three main concepts (‘what-to-move’,‘whento-move’,and ‘how-to-move’) based on mutation sets,mutation periods,and mutation tactics are determined for each argument.In addition,unique internal and external drone specifications and correlations are considered to ensure that the mutation target range,genetic sampling scheme,and periodic selection methodology are amplified in the detailed optimal parameter standard.Next,for a zero-sum-based two-player game logic that determines competitive engagement modeling for each attack-defense actor,the MIQCP model adopting a Lagrange multiplier associated with entering the equilibrium state through PBNE and BSS is mainly used to contribute to the Pareto frontier computation via NSGA2 and PAES.In addition,the dynamic entropy rule for the continuity simulation of the acts of engagement in an episode is randomized by applying the Boltzmann probability distribution and Dirac delta function.In addition,the metrics (state,transition,episode,step,effort,and time)for each PTMDP and the repetitive game logic introduced to achieve formal specification and formal verification were also calculated to formulate them for statistical comparative analysis based on the Monte Carlo method in the MF2-DMTD.

    At this time,MIQCP and MOGO schemes adopted to perform mutation cycle-based Pareto optimization for drone-type MTD are defined as a value iteration mechanism considering bilevel optimization problems like Algorithm 2.In Algorithm 2,MCis the mutation configuration set,|MC|is the number of mutation configuration set,and?is initialized to 0.1 as the convergence threshold.αis the mutation time slot length of the drone-type MTD,where ?αdenotes the supremum and ?αdenotes the infimum.Andθdenotes the time loss required until the drone-type MTD responds,andπdenotes the probability distribution based on the Boltzmann and Dirac delta functions.Additionally,PVis defined as the near-optimal policy value associated with Algorithm 2,andVis defined as the decision vector of MTD.

    4.2 Results 1-Sensitivity Analysis for MTD Performance for Drone Interior

    Next,the calculated decision-tree-based threat-modeling structure,feedback-type competition relationship,constraints per actor,state-transition proposition,and fine-tuned related parameters were all formally specified to simulate performance inference for the drone-type MTD.In addition,a formal verification to optimize the security-functional Pareto frontier was performed in parallel using normalized model checking.Considering the volume in this study,these results limit the scope of the analysis by performing a final comparative analysis by cutting off the space of the solution within a fixed mutation period of 140 s or less after classifying the Pareto optimization results of dedicated MTD-based mitigations independently applied for each internal and external element,which is a mutation set.

    Thus,the performance inference results of the MTD normalized to the functional components inside the drone were formalized as shown in Figs.5-10.In this case,‘Expected compromise time’on the X-axis is determined to mean the expected attack time(s)required as a minimum for an attacker to successfully achieve penetration into the drone,whereas ‘Expected compromise effort’on the Y-axis is determined to mean the expected attack cost required as a minimum.The legend axis is also configured to represent the fixed mutation period(s)of the drone-type MTD corresponding to each internal component.

    Fig.5 shows the final convergence of the best Pareto optimum solution of theddkrtactic,which mutates public key cryptography information within the communication channel to (200,5000),targeting the internal communication components that perform MAVLink-based RF telemetry and wireless mobile communication(WiFi,LTE,mmWave).It can be further confirmed that the deceptive defense efficiency ofddkralso continuously decreases in the form of behaviors of the log graph with a positive gradient and base whenever the fixed mutation period increases every 5 s within the range of[95,120],and an attacker-dominant Pareto frontier is formed so that it gradually approaches even based on the ideal point of the drone attacker.This can be proven to be a quantitative reflection of the spatial-temporal asymmetry characteristics in which the weaponization success rate of an attacker within a certain time inevitably increases linearly as the frequency of the MTD mutation cycle gradually decreases.

    Figure 5: Pareto frontier-based comparison results of defense performance by mutation periods(telecommunication component inside the drone,ddkr,95-120 s)

    Figure 6: Pareto frontier-based comparison results of defense performance by mutation periods(telecommunication component inside the drone,ddkr,125-140 s)

    Figure 7: Pareto frontier-based comparison results of defense performance by mutation periods(payload component inside the drone,ddsr,35-60 s)

    Figure 8: Pareto frontier-based comparison results of defense performance by mutation periods(payload component inside the drone,ddsr,65-90 s)

    However,Fig.6 shows that when the deceptive defense effectiveness of theddnmtactics that mutate network/datalink layer information related to wireless mobile communication and theddmmtactics that mutate MAVLink information inherent in the physical layer is secured naively above a certain level,increasing the frequency ofddkr’s mutation cycle conversely contributes to attenuating the attack success rate contrary to the defender’s prediction.This aspect,unlike other MTD tactics,shows a relatively high amount of resources for the defender required for theddkrtactic that periodically mutates the public key encryption information itself.Therefore,these overhead-based factors of side effects can be analyzed as deeply spread into the total defense efficiency measurement.Thus,it can be finally derived that the optimal mutation period of theddkrtactic for the drone’s internal communication component is 120 s or less.

    Figure 9: Pareto frontier-based comparison results of defense performance by mutation periods(control-mobility component inside the drone,dcdc,35-60 s)

    Figure 10: Pareto frontier-based comparison results of defense performance by mutation periods(control-mobility component inside the drone,dcdc,65-90 s)

    Figs.7 and 8,like LiDAR-based collision avoidance and FPV-based image processing,calculate the Pareto frontier of theddsrtactic that mutates real-time video payloads,targeting an internal payload component that additionally provides various sub-party functions within a single drone.Fig.7 shows a pattern that whenever the mutation period increases by 5 s within the range of[35,60],ddsr’s deceptive defense efficiency decreases in the form of a linear function containing a positive gradient for 45 s compared to the previous period,and then becomes stagnant after 45 s.Similarly,Fig.8 shows thatddsr’s deceptive defense efficiency decreases significantly based on the behaviors of the exponential graph until the fixed mutation period of 85 s within the range of[65,90],but solutions are fixed within specific Pareto frontier after 85 s.Thus,it can be finally confirmed that the Pareto optimum solution ofddsrfor Fig.7 converges to (315,15000),whereas the Pareto optimum solution ofddsrfor Fig.8 converges to(135,17250).

    The aspects of Figs.7 and 8 can be analyzed as a theoretical reflection of an asymmetric dominance relationship that the effectiveness of the defender intelligence available to the attacker within a certain time inevitably increases exponentially as the frequency of the MTD mutation period gradually decreases.In addition,unlike the MTD tactics available in Figs.5 and 6,the operating ranges of theddsrandddrrtactics of the internal payload target are completely divided hierarchically and conceptualized,proving that the overhead impact owing to the overlapping application of other tactics to the target component is configured relatively low.Thus,it can be finally derived that the optimal mutation period of theddsrtactic for the drone’s internal payload component results in 45 and 85 s,respectively.

    Finally,Figs.9 and 10 calculate the Pareto frontier of thedcdctactic that mutates the UAVCAN payload for each target device fingerprint targeting Pixhawk4-based internal control-maneuvering components responsible for both six DOF flight function and central control function.Fig.9 shows a pattern that whenever the fixed mutation period changes within the range of[35,60],the deceptive defense efficiency slightly decreases in the form of a log graph with a positive base for 55 s compared to the previous one,and then changes to a linear function form after 55 s and decreases.

    Fig.10 shows a pattern that a momentum issue occurs in a form that does not stably converge to a practical random Pareto optimal value;however,it spreads to a random local minimum extremal value based on a specific saddle point from a fixed transition period of 65 s or more.Unlike other internal components,the fact itself that it adaptively engages an attacker who has penetrated even into the most hidden control maneuvering component inside the drone is because the part of thedcdctactic’s avoidance concept is already incapacitated.Therefore,it can be analyzed that the global gradient problem of multi-objective genetic function related to MIQCP-based Pareto optimization cannot be mitigated,unless the frequency of the mutation period ofdcdcis increased to overcome these negative issues.

    Thus,it can be finally derived that the optimal mutation period of thedcdctactic gradually applied to the drone internal control-maneuvering component is 65 s or less,and the Pareto optimum solutions all converge to(390,17500).

    4.3 Results 2-Sensitivity Analysis for MTD Performance for Drone Outerior

    Figs.11-16 show the performance inference results of the drone-type MTD normalized for the full-duplex communication environment established outside the drone so that sub-drones belonging to a random swarming cluster network are remotely controlled based on a command and control(C2) entity,such as a commander and GCS,and are additionally provided with real-time tactical information related to weather,geographic information,and air traffic control from auxiliary objects deployed in battlefield such as ZSP.

    Figure 11: Pareto frontier-based comparison results of defense performance by mutation periods(swarming cluster entity outside the drone,dder,5-60 s)

    Figure 12: Pareto frontier-based comparison results of defense performance by mutation periods(swarming cluster entity outside the drone,dder,65-120 s)

    ‘Expected compromise time’on the X-axis in Figs.11-16 denotes the expected attack time(seconds) required as a minimum for an attacker to successfully achieve invasion for each communication entity independently deployed outside the drone,whereas ‘Expected compromise effort’on the Y-axis denotes the expected attack cost required as a minimum.In addition,the legend axis calculates the fixed mutation period(seconds)of the drone-type MTD corresponding to each external communication entity.

    Figure 13:Pareto frontier-based comparison results of defense performance by mutation periods(GCS entity outside the drone,ddmm,5-60 s)

    Figure 14:Pareto frontier-based comparison results of defense performance by mutation periods(GCS entity outside the drone,ddmm,65-120 s)

    To transmit and receive both battlefield information based on the MAVLink format and spatialtemporal location information based on the GPS format,Figs.11 and 12 first calculate the Pareto frontier of theddertactic that mutates the host fingerprint information uniquely exposed by the attached drone entities by targeting the swarming tactical drone network,which has an inherent interdependency between the upper master drone entity and the lower slave drone entity performing a non-line-of-sight communication relay.Fig.11 shows a pattern in which whenever the mutation period increases by 5 s within the range of[5,60],dder’s deceptive defense efficiency continues to decrease in the form of behaviors of a log graph with a positive base up to 25 s,compared to the previous one.After 25 s,the deceptive defense efficiency was significantly reduced as an exponential function with a positive gradient,and this change was derived.When the MTD mutation period frequency is high(25 s or less),unlikedder,the ripple effect of the proactive defense of theddmmtactic,which performs MAVLink information mutation by being applied together to the data link-network-based upper communication layer,and theddnmtactic,which performs wireless mobile communication payload mutation,is higher than that ofdder.Therefore,the side effect of the decrease in the frequency ofdder’s mutation period is also a quantitative reflection of the hierarchical characteristics,which are inevitably lower than those of other tactics.When the mutation period frequencies of the commonly applied MTD tactics were all lowered (after 25 s),the defense efficiencies ofddmmandddmmtactics,which were preemptively avoided in the network and data link-based upper layers,exponentially decreased.Therefore,it is further confirmed that the importance of theddertactic,which is operated to suboptimally avoid invasion by an attacker who succeeds in bypassing the wireless communication domain,has become relatively high.

    Figure 15:Pareto frontier-based comparison results of defense performance by mutation periods(ZSP entity outside the drone,ddsr,5-60 s)

    Fig.12 configured to determine the mutation period ofdderwithin the range of [65,120] additionally calculated that similar to Fig.11.The deceptive defense efficiency decreases in the form of an exponential function for 70 s;however,a momentum issue that causes it to not stably converge to the practical Pareto frontier after 70 s occurs.Similar to Fig.10,this is also an unfavorable situation in which the attacker engaging with the defender at that point has already bypassed and neutralizedddmmandddnmconsiderably and maliciously occupied the drone communication area.Therefore,the attacker’s dominance cannot be lowered unless the frequency of theddermutation period increases significantly within the current game state.Therefore,it can be finally derived that the Pareto optimum solution of theddertactic in Fig.11 converges to (2350,59500),and the Pareto optimum solution in Fig.12 converges to(55,1300).In addition,it can be calculated that the optimal mutation periods of theddertactic used for the drone external swarming tactical drone network also result in 25 and 70 s,respectively.

    Figure 16:Pareto frontier-based comparison results of defense performance by mutation periods(ZSP entity outside the drone,ddsr,65-120 s)

    Figs.13 and 14 calculate the Pareto frontier of theddmmtactic that mutates the MAVLink payload within an uplink session by targeting the upper GCS in charge of real-time remote control processing of multiple drones used with multiplexed uplink communication channels.Fig.13 shows that whenever the fixed mutation period changes every 5 s within the range of[5,60],the deceptive defense efficiency ofddmmcompared to the previous one continuously decreases in the form of a log function.Conversely,as shown in Fig.14,it can be further confirmed thatddmm’s deceptive defense efficiency within the range of[65,120]is extremely reduced in the form of behaviors of a linear graph with a low amount of gradient.

    The aspect of Figs.13 and 14 is analyzed to be closely related to the bypass possibility of an attacker who tries to preemptively infiltrate early using static data link layer information in GCS.That is,as the effectiveness of the defender intelligence adaptively available to the attacker increases exponentially before 60 s,the degree of success of weaponization-based exploit also increases.From 65 s or above,however,effective weaponization is already completed before mutation,proving that the deceptive defense efficiency determined by each mutation cycle cannot change significantly.Therefore,it can be derived that the optimal mutation period of theddmmtactic applied to the GCS target outside the drone is 60 s or less,and it can be finally confirmed that the Pareto optimal solution is also determined as(175,3650).

    Finally,Figs.15 and 16 calculate the Pareto front of theddsrtactic that mutates the payload in the mobile communication packet transmitted by the wireless sensor targeting ZSP that resiliently supports the sustainability of tactical missions of drones by transmitting changing environmental information such as weather and geographic sensing data and air traffic control information in realtime to tactical drones in the battlefield under the presence of an arbitrary centralized command center.Fig.15,similar to Fig.13,shows the continuous decrease in deceptive defense efficiency in the form of behaviors of a logarithmic graph with a positive base whenever the fixed mutation period changes within the range of [5,60].This can be analyzed as reflecting the fact that independent avoidance performance for the target object is guaranteed for each tactic applied because theddsrtactic is conceptualized to be operated hierarchically completely divided from the accompanyingddertactic for the mutation of specification information of the equipment.That is,the scope of spatialtemporal application betweendderandddsrtactics does not overlap;therefore,an asymmetric zerosum relationship in which the attacker’s weaponization efficiency increases exponentially when the mutation cycle frequency linearly decreases is always reflected in a naive way.

    Fig.16,which is the result for[65,120],derives the pattern in which the deceptive defense efficiency decreases slightly in the form of a linear graph with a positive gradient until the fixed mutation period of 85 s,and solutions are fixed within a specific Pareto front after 85 s.Thus,it can be derived that the optimal mutation periods of theddsrtactic progressively available to ZSP outside the drone are 85 s or less,respectively,and it can be finally derived that the Pareto optimal solution also converges to(115,2800).

    4.4 Summary of Experimental Results and Comparison

    Finally,the optimal periodic mutation cycle of drone-type MTD and the related solution value of MIQCP-MOGO-based Pareto frontier,which was proof-of-concept (PoC) with MF2-DMTD in Sections 4.1 and 4.2,are all summarized in Table 5.Both of these optimal mutation cycles and Pareto solution set support wireless drones performing drone-type MTD in formalism-based experimental testbed to achieve maximum proactive defense performance with minimum defense cost.

    Table 5:Comparative summary of optimal results related to performance verification of drone-type MTD(mutation cycle with rough MTD between 60-120 s,Pareto frontier with attack time and effort)

    In addition,based on the optimized quantitative measures specified in Table 5,the differences in this study are also presented separately for each major conceptual attribute in Table 6.This study,which is different from previous studies,specified real-time system architecture that combines game theory and formalism for the internal and external communication structure of tactical rugged drones,and also verified the optimal variation period of drone-type MTD by introducing the model checker.In addition,the formal feedback flow of the mutation scheme was also normalized to suit the drone-type MTD designed to meet the continuity and compatibility of tactical drones operated on the battlefield.

    Table 6: Conceptual taxonomy table between previous major studies and this study

    5 Discussion and Threat-to-Validity

    This study extended the scope of adaptation of mutation principles as‘what-to-move,’‘when-tomove,’‘how-to-move’and the scope of a configuration of the MTD mechanisms selected to provide high attenuation of the spatial-temporal asymmetry of attacker dominance over the potential attack surface of mission-critical systems that must be highly secure and safe to unmanned wireless embedded maneuvering platforms such as tactical drones.Based on a Pareto solver that considers both cyberagility and resilience,to reason and prove the adaptive deception performance of the proposed dronetype MTD based on a formal method,this study integrated and performed a structural specification based on diversified decision trees according to PTMDP-based formalism,and verification based on zero-sum games and model checking.

    This allowed us to calculate the optimized tradeoff between the drone-type MTD mutation period and mutation cost in the form of a Pareto frontier,according to each correlation between the internal functional components and external communication entities of the rugged drone determined based on the de facto standard.This study can also compare and analyze changes in the Pareto critical point with a multivariate real-valued function based on metaheuristic optimization according to the finetuning of key indicators,such as the mutation period,by classifying them into each component and entity.

    However,all the calculated drone-type MTD-based sensitivity analysis results simulated only the mutation period and mutation target among the MTD principles,and the mutation tactic that determines the priority of the mutation target at the next time point,considered only a limited uniform random scheme.Therefore,a conceptualization of more reinforced random-sampling-based mutation tactics is required.Moreover,despite the regulation of the decision boundary of actors to subjectively recognize the asymmetric information currently available to avoid relying on prior knowledge,the issue remains that the decision-making flow is limited to the range of dedicated drone invasion scenarios according to the decision trees inside and outside the drone configured statically.Thus,the definition of a new probability index in the PTMDP is required to materialize the precalculated engagement process,similar to the concept of an attack graph.In addition,as the internal and external vulnerabilities of drones abstracted within the decision-tree-type threat modeling are attributed only to single CVE vulnerability-based CVSS quantitative scores,they are different from the standards,unique policies,and interoperable rules considered by organizations that operate drones based on critical systems.Therefore,the actualization of the proposed formal framework will be conducted by applying all technical requirements and security controls in the Cybersecurity Framework (CSF) and Risk Management Framework (RMF) standards of the National Institute of Standards and Technology(NIST).

    6 Conclusion and Future Work

    To protect the unmanned wireless tactical drone,which was not reflected in previous studies that calculated MTD principles by focusing only on operational strategies for wired communication fingerprints and manned-type non-embedded systems,this study proposes a drone-type MTD that performs adaptive mutation on the unique fingerprint of critical system-based rugged drones.This article also presents MF2-DMTD,a formal framework that can simultaneously reason,evaluate,and optimize cyber agility and resilience,which fluctuate according to the application of this MTD.

    To this end,this study realized formalism by normalizing the drone’s internal and external threat modeling based on a PTMDP-based decision tree that contains unique vulnerability vectors,attack types,countermeasures,and sub-goals.Additionally,this paper specified conflict modeling for decisions to simulate intentionally non-optimized mutual competition based on information uncertainty according to PBNE and BSS-based zero-sum game logic.In addition,Pareto optimization for the drone-type MTD was achieved by performing both game simulation and model checking based on the MIQCP for formal verification according to preemptive formal specifications.

    Consequently,this study can mathematically prove the proactive avoidance efficiency,postresponse function continuity,and independent operation of wireless drones,which are unmanned critical systems.Additionally,this research can calculate the causal relationship associated with privatized asymmetric cognitive judgments for each actor based on incompleteness,subjectivity,perturbation,and a priori belief.

    To simultaneously realize the optimization performance improvement and domain expansion of the proposed drone-type MTD in the future,these authors plan to advance the drone-type MTD and MF2-DMTD by applying a decoy that performs induction and isolation and hyper game theory,an unbalanced meta-game.To apply and operate these ideas practically in the mission-critical system domain,these authors also plan to upgrade the testbed in the form of a prototype [50] that can be placed on a trial basis within the space-air-ground integrated network based on combat net radio with aerial telemetry sensor[51].

    Acknowledgement:The authors thankfully acknowledge support by the Challengeable Future Defense Technology Research and Development Program through the Agency For Defense Development(ADD)funded by the Defense Acquisition Program Administration(DAPA)in 2023.And,the authors also gratefully acknowledge the helpful comments and valuable suggestions of the reviewers,which have improved the academic contributions.

    Funding Statement:This research was received external funding by the Challengeable Future Defense Technology Research and Development Program through the Agency For Defense Development(ADD)funded by the Defense Acquisition Program Administration(DAPA)in 2023(No.915024201).

    Author Contributions:Conceptualization,S.S.;methodology,S.S.;software,S.S.;validation,S.S.and D.K.;formal analysis,S.S.and D.K.;investigation,S.S.B.K.and W.L;resources,S.S.J.L.B.K.W.L.and D.K.;data curation,S.S.and D.K.;writing—original draft preparation,S.S.and D.K.;writing—review and editing,S.S.and D.K.;visualization,S.S.;supervision,J.L.and D.K.;project administration,S.S.J.L.and D.K;funding acquisition,J.L.and D.K.All authors have read and agreed to the published version of the manuscript.

    Availability of Data and Materials:Please contact the corresponding author at karmy01@kyonggi.ac.kr.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    天天躁夜夜躁狠狠久久av| 黄色视频在线播放观看不卡| a 毛片基地| 亚洲不卡免费看| 在线播放无遮挡| 精品国产露脸久久av麻豆| 少妇人妻一区二区三区视频| 中国国产av一级| 大香蕉97超碰在线| 联通29元200g的流量卡| 日韩欧美 国产精品| 18禁裸乳无遮挡动漫免费视频| 在线观看免费高清a一片| 一级黄片播放器| 大又大粗又爽又黄少妇毛片口| .国产精品久久| 91aial.com中文字幕在线观看| 欧美另类一区| 国产中年淑女户外野战色| 大又大粗又爽又黄少妇毛片口| 国产av码专区亚洲av| 一区二区av电影网| 丰满少妇做爰视频| 国产大屁股一区二区在线视频| 性高湖久久久久久久久免费观看| 亚洲国产av新网站| 91久久精品国产一区二区成人| 免费看日本二区| 18+在线观看网站| 国产爱豆传媒在线观看| 男女国产视频网站| 狂野欧美白嫩少妇大欣赏| 青春草视频在线免费观看| 全区人妻精品视频| 久久人人爽人人爽人人片va| 亚洲人与动物交配视频| 国产伦理片在线播放av一区| 成人黄色视频免费在线看| 久久人人爽av亚洲精品天堂 | 日韩av在线免费看完整版不卡| 久久久久久伊人网av| 久久韩国三级中文字幕| 97在线人人人人妻| 国产精品一区二区三区四区免费观看| 日韩制服骚丝袜av| 免费观看的影片在线观看| av线在线观看网站| 美女脱内裤让男人舔精品视频| 精品久久久久久久久亚洲| 色视频在线一区二区三区| 色视频www国产| 日韩成人伦理影院| 亚洲美女黄色视频免费看| 成人18禁高潮啪啪吃奶动态图 | 狂野欧美激情性xxxx在线观看| 下体分泌物呈黄色| 秋霞伦理黄片| 在线观看免费日韩欧美大片 | 日韩av免费高清视频| 女性被躁到高潮视频| 日本欧美视频一区| 永久免费av网站大全| 99热网站在线观看| 亚洲国产色片| 中国美白少妇内射xxxbb| 国产精品福利在线免费观看| 91精品国产国语对白视频| 精品99又大又爽又粗少妇毛片| 五月开心婷婷网| 亚洲成人中文字幕在线播放| 国产精品久久久久久av不卡| 国产乱人偷精品视频| 欧美最新免费一区二区三区| 最近最新中文字幕免费大全7| 午夜福利影视在线免费观看| 一级毛片aaaaaa免费看小| 人妻夜夜爽99麻豆av| 一级片'在线观看视频| 国产精品熟女久久久久浪| 成人综合一区亚洲| 亚洲激情五月婷婷啪啪| 精品少妇久久久久久888优播| 91精品国产九色| 人妻制服诱惑在线中文字幕| 亚洲精品乱久久久久久| 久久久久国产精品人妻一区二区| 内射极品少妇av片p| 亚洲天堂av无毛| 久久97久久精品| 亚洲精品国产av成人精品| 插阴视频在线观看视频| 欧美精品一区二区免费开放| 免费观看a级毛片全部| 亚洲伊人久久精品综合| 午夜福利网站1000一区二区三区| 欧美亚洲 丝袜 人妻 在线| 只有这里有精品99| 欧美精品人与动牲交sv欧美| 在线观看免费日韩欧美大片 | 联通29元200g的流量卡| 三级经典国产精品| 亚洲精品自拍成人| 亚洲av.av天堂| 欧美日韩视频高清一区二区三区二| 99久国产av精品国产电影| 亚洲精品456在线播放app| 秋霞伦理黄片| 国产熟女欧美一区二区| av免费在线看不卡| 久久精品国产亚洲网站| 黄色一级大片看看| 日韩大片免费观看网站| 久久人人爽人人片av| 十八禁网站网址无遮挡 | 少妇猛男粗大的猛烈进出视频| 国产在线一区二区三区精| 国产白丝娇喘喷水9色精品| 五月伊人婷婷丁香| 大片免费播放器 马上看| 精品亚洲成国产av| 22中文网久久字幕| 黄色怎么调成土黄色| 国产精品久久久久久久久免| 欧美xxⅹ黑人| 美女xxoo啪啪120秒动态图| 干丝袜人妻中文字幕| 性高湖久久久久久久久免费观看| 国产亚洲欧美精品永久| 日韩一区二区三区影片| 精品国产一区二区三区久久久樱花 | 精华霜和精华液先用哪个| 一二三四中文在线观看免费高清| 夜夜爽夜夜爽视频| freevideosex欧美| 一区二区三区免费毛片| 亚洲av中文字字幕乱码综合| 日韩制服骚丝袜av| 国产中年淑女户外野战色| 免费看光身美女| 精品一区二区免费观看| a级毛色黄片| 女人久久www免费人成看片| 97超视频在线观看视频| 国产视频内射| 国产av码专区亚洲av| 精品久久国产蜜桃| 国产精品伦人一区二区| 亚洲国产高清在线一区二区三| 少妇的逼好多水| 国产视频内射| 精品熟女少妇av免费看| 免费av中文字幕在线| 国产一级毛片在线| av在线蜜桃| 亚洲av电影在线观看一区二区三区| 亚洲av不卡在线观看| 欧美区成人在线视频| 高清av免费在线| 天堂俺去俺来也www色官网| 日韩,欧美,国产一区二区三区| 国产成人91sexporn| 国产人妻一区二区三区在| 亚洲,欧美,日韩| 久久久成人免费电影| 男人爽女人下面视频在线观看| 另类亚洲欧美激情| 日日撸夜夜添| 国产亚洲一区二区精品| 国产高清不卡午夜福利| 美女xxoo啪啪120秒动态图| 久久精品国产a三级三级三级| 成人毛片60女人毛片免费| 国产精品女同一区二区软件| 一级爰片在线观看| 日本午夜av视频| 午夜福利影视在线免费观看| 十八禁网站网址无遮挡 | 日本欧美国产在线视频| 不卡视频在线观看欧美| 久久人人爽人人爽人人片va| 亚洲精品乱码久久久v下载方式| 在线看a的网站| 一级二级三级毛片免费看| 久久久久久人妻| av在线蜜桃| 日韩成人av中文字幕在线观看| 涩涩av久久男人的天堂| 免费观看a级毛片全部| 国产精品久久久久成人av| 欧美高清成人免费视频www| 搡女人真爽免费视频火全软件| 久久久久网色| 女性生殖器流出的白浆| 成人18禁高潮啪啪吃奶动态图 | 亚洲欧美清纯卡通| 国产欧美亚洲国产| 成人影院久久| 国产日韩欧美在线精品| 亚洲av成人精品一二三区| 国产人妻一区二区三区在| 日韩,欧美,国产一区二区三区| av又黄又爽大尺度在线免费看| 日本黄色片子视频| 国产高潮美女av| 久久97久久精品| 男女无遮挡免费网站观看| 深夜a级毛片| 2021少妇久久久久久久久久久| 国产伦在线观看视频一区| 成人国产av品久久久| 91精品国产国语对白视频| 成人一区二区视频在线观看| 3wmmmm亚洲av在线观看| a 毛片基地| 色综合色国产| 丰满迷人的少妇在线观看| 精品亚洲成国产av| 街头女战士在线观看网站| 亚洲va在线va天堂va国产| 久久久欧美国产精品| 搡女人真爽免费视频火全软件| 狂野欧美激情性bbbbbb| 亚洲欧美精品自产自拍| 少妇猛男粗大的猛烈进出视频| 久久这里有精品视频免费| 日韩精品有码人妻一区| a 毛片基地| 黄色日韩在线| 色视频在线一区二区三区| 免费少妇av软件| 黄片wwwwww| av女优亚洲男人天堂| 欧美激情极品国产一区二区三区 | 国产探花极品一区二区| a级毛片免费高清观看在线播放| 九九爱精品视频在线观看| 国产爱豆传媒在线观看| 久久国内精品自在自线图片| 岛国毛片在线播放| 99九九线精品视频在线观看视频| 国产伦精品一区二区三区四那| 视频区图区小说| 亚洲欧美日韩另类电影网站 | 久久 成人 亚洲| 国产伦精品一区二区三区四那| 菩萨蛮人人尽说江南好唐韦庄| 秋霞在线观看毛片| 制服丝袜香蕉在线| 一区二区三区乱码不卡18| 色5月婷婷丁香| 亚州av有码| 嘟嘟电影网在线观看| 国产女主播在线喷水免费视频网站| 啦啦啦视频在线资源免费观看| 大又大粗又爽又黄少妇毛片口| 精品国产三级普通话版| 国产69精品久久久久777片| 亚洲欧美精品自产自拍| 亚洲综合精品二区| 看十八女毛片水多多多| 欧美日韩视频高清一区二区三区二| 精品久久久噜噜| 国产91av在线免费观看| 一区在线观看完整版| 欧美xxxx性猛交bbbb| 99视频精品全部免费 在线| 午夜免费鲁丝| 色5月婷婷丁香| 18禁裸乳无遮挡动漫免费视频| 亚洲av不卡在线观看| 这个男人来自地球电影免费观看 | 王馨瑶露胸无遮挡在线观看| 一级爰片在线观看| 人妻夜夜爽99麻豆av| 日韩三级伦理在线观看| 国产av码专区亚洲av| 又粗又硬又长又爽又黄的视频| 老司机影院成人| 少妇精品久久久久久久| 亚洲av欧美aⅴ国产| 国精品久久久久久国模美| 少妇精品久久久久久久| 在线观看av片永久免费下载| 一级二级三级毛片免费看| 国产精品蜜桃在线观看| 久久鲁丝午夜福利片| 国产伦精品一区二区三区视频9| 亚洲综合精品二区| 精品视频人人做人人爽| 成人毛片a级毛片在线播放| 丰满迷人的少妇在线观看| 久久久久久久大尺度免费视频| 老司机影院毛片| 国产亚洲91精品色在线| 久久久久性生活片| 亚洲久久久国产精品| 亚洲欧洲国产日韩| 日本一二三区视频观看| 午夜免费观看性视频| 亚洲欧美日韩无卡精品| 99久久综合免费| 成人一区二区视频在线观看| 亚洲怡红院男人天堂| 99热这里只有是精品在线观看| 免费观看在线日韩| 最近手机中文字幕大全| 欧美区成人在线视频| 国产成人a∨麻豆精品| 国产伦在线观看视频一区| 免费av中文字幕在线| 国产色婷婷99| 亚洲av福利一区| av黄色大香蕉| 亚洲av男天堂| 国产91av在线免费观看| 国内揄拍国产精品人妻在线| 99热这里只有精品一区| 久久精品久久久久久噜噜老黄| 三级国产精品片| 99视频精品全部免费 在线| 久久99热这里只频精品6学生| 国产午夜精品一二区理论片| 成人特级av手机在线观看| 青春草视频在线免费观看| 国产精品国产三级国产av玫瑰| 成年av动漫网址| 国产精品成人在线| 少妇熟女欧美另类| 亚洲精品自拍成人| 日韩亚洲欧美综合| 人妻制服诱惑在线中文字幕| 久久久久人妻精品一区果冻| 青春草视频在线免费观看| 亚洲美女黄色视频免费看| 夜夜骑夜夜射夜夜干| 国产高清不卡午夜福利| 亚洲综合精品二区| 免费观看av网站的网址| 亚洲av免费高清在线观看| 久久久久久久久久人人人人人人| 丰满少妇做爰视频| 你懂的网址亚洲精品在线观看| 好男人视频免费观看在线| 黄色配什么色好看| 高清不卡的av网站| 国产精品一区二区在线观看99| 女人十人毛片免费观看3o分钟| 亚洲在久久综合| 超碰av人人做人人爽久久| 男人添女人高潮全过程视频| 男女边吃奶边做爰视频| 国产午夜精品一二区理论片| 国产亚洲91精品色在线| a级一级毛片免费在线观看| 日本猛色少妇xxxxx猛交久久| 日韩视频在线欧美| 色哟哟·www| 在线观看免费视频网站a站| 久久人人爽人人爽人人片va| 久热这里只有精品99| 亚洲内射少妇av| 美女中出高潮动态图| 97超视频在线观看视频| 美女中出高潮动态图| 大片电影免费在线观看免费| 久久精品熟女亚洲av麻豆精品| 亚洲自偷自拍三级| 精品一品国产午夜福利视频| 狂野欧美激情性xxxx在线观看| 亚洲人成网站在线观看播放| 美女xxoo啪啪120秒动态图| 国产伦理片在线播放av一区| 最近中文字幕高清免费大全6| 不卡视频在线观看欧美| 久久韩国三级中文字幕| 插逼视频在线观看| 久久国内精品自在自线图片| 中文天堂在线官网| 久久精品国产亚洲网站| av免费观看日本| 久久久久久久大尺度免费视频| 3wmmmm亚洲av在线观看| 高清在线视频一区二区三区| 精品午夜福利在线看| 免费少妇av软件| 久久人人爽人人爽人人片va| 久久毛片免费看一区二区三区| 成人特级av手机在线观看| 午夜免费男女啪啪视频观看| 色视频在线一区二区三区| 免费看光身美女| 高清不卡的av网站| 欧美日韩综合久久久久久| 最近手机中文字幕大全| 亚洲av欧美aⅴ国产| 狂野欧美激情性bbbbbb| 中文欧美无线码| 国产精品久久久久久久久免| 日韩制服骚丝袜av| 免费少妇av软件| 国产男女内射视频| 18+在线观看网站| 青青草视频在线视频观看| 伊人久久精品亚洲午夜| 王馨瑶露胸无遮挡在线观看| 亚洲欧美一区二区三区黑人 | 纯流量卡能插随身wifi吗| 日韩伦理黄色片| 国产爽快片一区二区三区| 日韩制服骚丝袜av| 免费少妇av软件| 一级a做视频免费观看| 亚洲av中文字字幕乱码综合| 欧美日韩视频高清一区二区三区二| 国产成人freesex在线| 少妇猛男粗大的猛烈进出视频| 夫妻性生交免费视频一级片| 久久久色成人| 久久热精品热| 亚洲精品中文字幕在线视频 | 日韩三级伦理在线观看| 亚洲av中文字字幕乱码综合| 在线观看美女被高潮喷水网站| 国产探花极品一区二区| 国产精品久久久久久av不卡| av.在线天堂| 人妻少妇偷人精品九色| 只有这里有精品99| 内地一区二区视频在线| 大码成人一级视频| 久久毛片免费看一区二区三区| 欧美一区二区亚洲| 亚洲经典国产精华液单| 国产精品久久久久成人av| 国产免费一级a男人的天堂| 国产精品99久久99久久久不卡 | av在线蜜桃| 久久精品夜色国产| 日本色播在线视频| 高清毛片免费看| 国产伦精品一区二区三区视频9| 观看免费一级毛片| av一本久久久久| 亚洲无线观看免费| 最近中文字幕高清免费大全6| 成人亚洲精品一区在线观看 | 在线观看三级黄色| 直男gayav资源| 亚洲av成人精品一二三区| 久久久a久久爽久久v久久| 有码 亚洲区| 亚洲精品一二三| 国产黄片视频在线免费观看| 插逼视频在线观看| 少妇 在线观看| av国产免费在线观看| 国产乱人偷精品视频| 久久久国产一区二区| 国产成人午夜福利电影在线观看| 免费观看无遮挡的男女| 亚洲欧美精品自产自拍| 青春草国产在线视频| 久久久久精品久久久久真实原创| 亚洲第一av免费看| 欧美性感艳星| 岛国毛片在线播放| 亚洲av免费高清在线观看| 天天躁夜夜躁狠狠久久av| 三级国产精品片| 欧美日韩视频精品一区| 日日啪夜夜爽| 有码 亚洲区| 内射极品少妇av片p| 成人无遮挡网站| 大话2 男鬼变身卡| 国产视频内射| 成人国产麻豆网| 亚洲av成人精品一区久久| 一边亲一边摸免费视频| 日韩国内少妇激情av| 午夜福利影视在线免费观看| 这个男人来自地球电影免费观看 | 三级国产精品片| 又大又黄又爽视频免费| 男人添女人高潮全过程视频| 日本av手机在线免费观看| 久久久久久久久久久免费av| 免费观看的影片在线观看| 在线看a的网站| 亚洲人与动物交配视频| 亚洲熟女精品中文字幕| 国产精品麻豆人妻色哟哟久久| 成人影院久久| av天堂中文字幕网| 最近2019中文字幕mv第一页| 欧美bdsm另类| 国产免费又黄又爽又色| 少妇裸体淫交视频免费看高清| 欧美最新免费一区二区三区| 51国产日韩欧美| 亚洲精品久久久久久婷婷小说| 在线亚洲精品国产二区图片欧美 | 亚洲欧洲国产日韩| 国产欧美日韩精品一区二区| 女人十人毛片免费观看3o分钟| 亚洲av日韩在线播放| 麻豆精品久久久久久蜜桃| 日本wwww免费看| 国产伦精品一区二区三区四那| av国产精品久久久久影院| 亚洲欧美精品自产自拍| 一级av片app| 黑人高潮一二区| 国产成人一区二区在线| 婷婷色综合www| 亚洲av国产av综合av卡| 老熟女久久久| 国产精品爽爽va在线观看网站| 人人妻人人澡人人爽人人夜夜| 国产人妻一区二区三区在| 精品久久久久久久久亚洲| 日本欧美视频一区| 精品少妇久久久久久888优播| 天堂中文最新版在线下载| 国产视频内射| 精品一区二区免费观看| 国产一区有黄有色的免费视频| 国产男人的电影天堂91| 高清视频免费观看一区二区| 亚洲综合精品二区| 亚洲av日韩在线播放| 久久久久网色| 免费人妻精品一区二区三区视频| 最近最新中文字幕大全电影3| 亚洲av电影在线观看一区二区三区| 亚洲成人av在线免费| 在线免费观看不下载黄p国产| 一区二区av电影网| 久久久欧美国产精品| 成人无遮挡网站| 久久99精品国语久久久| 少妇精品久久久久久久| 久久久久久久精品精品| 永久免费av网站大全| 欧美极品一区二区三区四区| 亚洲国产欧美人成| 夫妻性生交免费视频一级片| 国产精品国产三级国产专区5o| 久久久久久久久大av| 尾随美女入室| 婷婷色综合www| 91aial.com中文字幕在线观看| 一级爰片在线观看| 一区二区三区四区激情视频| 国产精品一区二区性色av| 亚洲av不卡在线观看| 亚洲国产欧美人成| 国产男女超爽视频在线观看| 麻豆乱淫一区二区| 亚州av有码| 亚洲最大成人中文| 熟女人妻精品中文字幕| 少妇人妻 视频| 蜜桃在线观看..| 亚洲精品国产av成人精品| 日本av免费视频播放| 久久久久久久亚洲中文字幕| 青青草视频在线视频观看| 三级国产精品欧美在线观看| 亚洲精品国产av蜜桃| 男女国产视频网站| 高清午夜精品一区二区三区| 成人二区视频| 又粗又硬又长又爽又黄的视频| 国产精品.久久久| 99热6这里只有精品| 国产精品国产三级国产av玫瑰| 国产成人freesex在线| 熟女人妻精品中文字幕| 99热网站在线观看| 十八禁网站网址无遮挡 | 亚洲人成网站在线观看播放| 精品久久久精品久久久| 国产午夜精品久久久久久一区二区三区| 国产免费又黄又爽又色| 91精品伊人久久大香线蕉| 22中文网久久字幕| 国产日韩欧美亚洲二区| 嫩草影院新地址| 中文字幕av成人在线电影| 中文在线观看免费www的网站| 超碰av人人做人人爽久久| 日韩欧美 国产精品| 日日啪夜夜爽| 国产亚洲午夜精品一区二区久久| 麻豆成人av视频| 亚洲高清免费不卡视频| 欧美一级a爱片免费观看看| 国产成人精品久久久久久| 女性被躁到高潮视频| 精品人妻偷拍中文字幕| 青春草国产在线视频| 26uuu在线亚洲综合色| 内地一区二区视频在线| 日韩三级伦理在线观看| 少妇的逼水好多| 久久99热这里只频精品6学生| 免费av不卡在线播放| 日本欧美国产在线视频| 免费高清在线观看视频在线观看| 午夜精品国产一区二区电影| 亚洲精品乱久久久久久| kizo精华| 好男人视频免费观看在线| 欧美精品一区二区大全|