• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Utilizing Machine Learning with Unique Pentaplet Data Structure to Enhance Data Integrity

    2024-01-12 03:45:52AbdulwahabAlazeb
    Computers Materials&Continua 2023年12期

    Abdulwahab Alazeb

    Department of Computer Science,College of Computer Science and Information System,Najran University,Najran,55461,Saudi Arabia

    ABSTRACT Data protection in databases is critical for any organization,as unauthorized access or manipulation can have severe negative consequences.Intrusion detection systems are essential for keeping databases secure.Advancements in technology will lead to significant changes in the medical field,improving healthcare services through real-time information sharing.However,reliability and consistency still need to be solved.Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption.Disruptions to data items can propagate throughout the database,making it crucial to reverse fraudulent transactions without delay,especially in the healthcare industry,where real-time data access is vital.This research presents a role-based access control architecture for an anomaly detection technique.Additionally,the Structured Query Language(SQL)queries are stored in a new data structure called Pentaplet.These pentaplets allow us to maintain the correlation between SQL statements within the same transaction by employing the transaction-log entry information,thereby increasing detection accuracy,particularly for individuals within the company exhibiting unusual behavior.To identify anomalous queries,this system employs a supervised machine learning technique called Support Vector Machine(SVM).According to experimental findings,the proposed model performed well in terms of detection accuracy,achieving 99.92%through SVM with One Hot Encoding and Principal Component Analysis(PCA).

    KEYWORDS Database intrusion detection system;data integrity;machine learning;pentaplet data structure

    1 Introduction

    The rapid expansion of wearable technology,smart homes,connected vehicles,and microgrids proves that the Internet of Things(IoT)will play a crucial role in shaping the future of the Internet.IoT is a technology that connects and exchanges data with other devices embedded within physical objects,incorporating various software,sensors,and cutting-edge technologies through the Internet.As of the latest data,more than 5 billion IoT devices are connected to the Internet[1].

    By 2030,it is projected that nearly 125 billion IoT devices will be online,generating massive amounts of data[2].However,due to bandwidth limitations and the significant growth in data,current information systems are ill-equipped to handle and transfer such vast quantities of data to the cloud.In many cases,the proliferation of IoT devices may prove unfeasible.

    Today,several critical and real-time IoT services are already integrated into our daily lives,including connected car systems,video conferencing applications,and monitoring systems.These services depend on low latency and location-based information to provide users with reliable,highquality experiences[3].

    To address the challenges mentioned earlier,a proposed solution is needed.Cisco developed fog computing,a virtualized framework that offers essential services close to the ground,including the capacity to handle large volumes of data,storage,and networking services [4].Fog computing is particularly well-suited to secure applications that require real-time collection and location-based services.It improves security and privacy by maintaining and evaluating data near authorized users at the edge nodes[5].

    Fog computing offers several distinct properties that define it as a cloud extension and provide additional services over the cloud.Firstly,its presence at the edge networks offers high-quality services and minimal latencies,making it ideal for healthcare systems,online gaming,streaming,and group meetings involving location-based services and minimal latency.Another essential feature of fog computing is the large number of disparate locations of fog nodes,facilitating flexibility in several systems,such as moving objects.

    Fog’s presence at the cloud’s edge and its regional dissemination increases bandwidth efficiency and protects critical data.Fog computing may be able to tackle various issues in the medical system [6].Protecting user or patient data is vital for fog computing and health services.However,relatively economical IoT devices typically have limited computing capabilities,making it challenging to integrate cybersecurity primitives on a system level.These devices usually lack a powerful Central Processing Unit(CPU),resulting in low network threat resiliency[1].

    In the past,cyberattacks have frequently targeted IoT systems.For example,in the September 2016 Mirai assault,400,000 IoT devices were attacked and used to launch a significant Distributed Denial of Service(DDoS)attack via a botnet.Similarly,in April 2020,the Dark Nexus botnet,built on the Mirai code,corrupted more than 1300 Internet of Things devices[7].

    The term“cybersecurity”encompasses the methods and tools employed to safeguard digital assets such as computers,network services,applications,and data.The cybersecurity infrastructure is formed by the security systems of the network and the host computer.These systems are equipped with multiple layers of protection,including Intrusion Detection Systems (IDS),antivirus software,and firewalls[8].The primary goal of an IDS is to monitor and defend a network against threats like data theft,tampering,and destruction.Intruders can originate from outside(external intrusions)or within(internal intrusions),both of which are considered privacy violations.

    IDSs can be broadly classified into three categories: misuse-based,anomaly-based,and hybrid.Misuse-based approaches identify malicious activity by analyzing attack pattern signatures.However,they are unable to detect new(zero-day)attacks.Anomaly-based algorithms,on the other hand,model typical system and network performance to detect abnormalities,which are defined as deviations from the norm.Their ability to identify zero-day attacks makes them appealing.Still,they may have high False Alarm Rates (FARs) due to the mislabeling of previously undetected (but legitimate) system activities as anomalies.Hybrid methods combine anomaly and misuse detection,increasing the True Positive (TP) ratio for known intrusions while reducing the False Positive (FP) rate for unknown attacks.

    Privilege elevation attacks occur when an attacker gains unauthorized administrative access to a system.Users can then access and misuse sensitive information by making unauthorized copies.One of the most dangerous attacks is SQL injection,which involves the insertion of malicious code through a vulnerability in the front end,such as inadequate authorization or improper validation[9].

    A Database Intrusion Detection System (DIDS) can identify and report attackers who submit malicious queries to a database.There are two types of intrusion detection systems:signature-based and anomaly-based.Signature-based methods detect only predefined patterns,while anomaly-based detection monitors all regular queries,classifying deviations from typical queries as attacks[10].Our proposed system employs anomaly detection.

    Database attacks generally fall into two categories: insider and external attacks.Insider attacks involve individuals within an organization abusing their privileges,while external attacks are executed by individuals outside the organization who have gained unauthorized privileges.This can occur when database privileges granted to users exceed what is necessary.The DIDS system effectively defends against both types of attacks[11,12].

    Thus,the proposed system is an enriched IoT-enabled intrusion detection monitoring scheme using machine learning and Pentaplet architecture.The IoT enables proper monitoring,and ML enables intrusion detection.Our proposed system addresses these vulnerabilities and can identify any of these threats,alerting the database administrator and even canceling the transaction as needed.If no anomalies are detected,the system takes no action.The Pentaplet structure stores all databaserelated information transaction by transaction.With a transaction-based approach,a single Pentaplet can keep all queries within a transaction.The proposed DIDS employs a supervised machine learning method,the Support Vector Machine(SVM),to train and identify malicious queries.

    2 Literature Review

    The article[13]highlighted the deployment of various one-class classifiers to stop assaults on the Message Queuing Telemetry Transport (MQTT) protocol used by the IoT.They have been able to train the one-class algorithms by exploiting simple datasets,demonstrating outstanding performance in identifying attacks.

    Applying Machine Learning(ML)algorithms to a dataset while comparing and evaluating their performance was the primary goal of the research [14].They employed Correlation-Based and Chi-Squared-Based feature selection algorithms to minimize the datasets by removing unnecessary data.For this research,the NSL KDD dataset was utilized.The Artificial Neural Networks(ANN)model performs far better on this particular dataset than SVM.

    The study[15]provided an approach for constructing a more effective Intrusion Detection System(IDS) by using anomaly detection and data-mining techniques.The data mining techniques will continuously simulate what a typical network should look like and lower the procedure’s false positive and false negative alert rates.They used classification-tree techniques to make precise predictions regarding the sessions of possible attacks.

    Research on ML and data mining approaches for cyber analytics was presented in the study[8].The ML/DM algorithm’s complexity was discussed,problems for applying ML/DM for cybersecurity were also described,and they recommend when to utilize a specific given method.

    The processes for damage assessment utilizing various versions of data from the Database System were the primary purpose of the research[16].It is achievable to reduce the consequences of fraudulent database transactions by delivering suitable variations of data items to exchanges during the damage assessment phase if the suggested multi-version data method is utilized.This will allow for the elimination of the effect of malicious data transfers.

    The method researchers provided in the study[17]can detect attacks at the database transaction and inter-transaction levels based on these two attacks they developed.For this reason,they suggest a detection mechanism at the transaction level that is based on characterizing the everyday activities within the database systems.This will allow us to determine whether or not an anomaly has occurred.Furthermore,at the stage of inter-transactions,they present a detection approach that is founded on the concept of anomaly identification and makes use of data mining to discover dependence and sequencing rules.This method has a distinct advantage over earlier database intrusion detection systems because it can identify suspicious attacks on both transactional and inter-transactional levels.

    The paper [18] presented an entirely autonomous database intrusion detection system that detects internal and external threats and may prevent breaches not seen by networks or hosts based on IDS.The designed methodology is flexible and can be fine-tuned as databases become more sophisticated and dynamic.Anomaly detection and role-based access restriction are implemented in their architecture.An Octraplet-based data structure is used to store SQL queries.The Naive Bayes Classifier approach is used to identify abnormal requests in this system.The method that has been proposed has the potential to increase both the detection rates and the overall efficiency of the system.

    As demonstrated in this work,data-dependence connections can be used to identify suspicious activity in a database management system [10].The proposed approach compares the dataset with items received or created by legitimate user transaction data to find fraudulent transactions.Petri-Nets describe typical data update patterns at the user level,and they have developed techniques for identifying the interconnections among transactions that rely on data.

    In this research [19],they present new data mining methods that will be used to create data dependencies,miners,for the database IDS.This approach will be called the ODADRM (Optimal Data Access Dependency Rule Mining).To make the k-optimal rule discovery algorithm more applicable to the database IDS,ODADRM was developed as an extension of this technique.ODADRM circumvents a significant number of the restrictions that were present in earlier data dependency mining algorithms.

    The authors [20] proposed a novel technique for anomaly identification called Fog-Empowered anomaly detection.This methodology allows the use of the processing capacity offered by the fog platform and an effective hyper-ellipsoidal clustering model.

    In the study [21],the authors proposed an effective technique for sequential pattern mining on network traffic data.The proposed solution provided highly accurate data mining results and preserved sites’privacy.Using the N-repository server model,which made numerous servers act as a single mining server,and the retention replacement methodology,which altered the result based on a certain probability,the system frequently detected recurring network traffic patterns while concealing site information.Additionally,the technique kept meta tables in each site to quickly ascertain whether candidate patterns had ever been there.This increased the efficiency of the overall mining process.Additionally,they conducted thorough testing on actual network traffic data to show the accuracy and effectiveness of the suggested approach.

    The authors of the research[22]proposed a hybrid system for IDS called Convolutional Neural-Learning Classifier System (CN-LCS),which combines a Learning Classifier System (LCS) with a Convolutional Neural Network(CNN)to identify intrusions on databases,particularly against insider intrusion.The study of the CN-LCS classification results using the t-SNE technique showed that the low-dimensional embedding of the query commands caused the low classification performance.Furthermore,the proposed CN-LCS outscored other machine learning classifiers in experiments,with a test accuracy of 94.64%.

    The authors of this work [23] presented a unique method for detecting illegal user activity in databases.Their newly proposed outlier mining approach could detect vulnerabilities such as a compromised user account or unauthorized use by a user.They focused on detecting abnormalities in a user’s behavior that could indicate a wide range of harmful behaviors.The suggested technique was based on two major components that analyzed the consistency of a user’s behavior and compared it with activity patterns learned from previous access.The first component is used to test for selfconsistency,which determines whether a user’s actions are consistent with previous patterns.The second component analyzed global consistency to see whether a user’s activities are compatible with the prior behavior of users with similar characteristics.The combined system achieved an F1-score of up to 0.88,which is a combination of both the first and the second component.

    The researchers of this publication[24]created a new method for determining database intrusions by combining data resources and employing belief updates as part of their research.The model utilized information gathered from both present and previous user behavior to detect an intrusion.This approach comprised a rule-based element,a belief combining element,a security sensitivity history database element,and a Bayesian learning element.The modified Dempster’s method connected various proofs from the rule-based element.This was done to compute a preliminary belief regarding each incoming transaction.The outcomes of the experimental assessment demonstrated that the suggested database intrusion detection system was capable of effectively detecting intrusive assaults despite producing an excessive amount of false alarms.

    The study [25] developed a new concept for a smart government structure using fog computing technologies.Data control and management were the primary goals of this study.They came up with some novel algorithms and tested them out to see how well the model could protect the data authenticity of the system in the situation where it came under assault.Several techniques were implemented to protect systems from fraudulent transactions or fog node data manipulations.To examine and keep track of the goings-on of each transaction,the framework incorporates the functionality of a transaction-dependency graph.

    This research [26] discussed the datasets commonly used for training and evaluating intrusion detection systems.Then,the paper presents a comparison of various machine learning techniques and their effectiveness in detecting different types of attacks.Overall,the article provides a comprehensive overview of the current research in the field of network intrusion detection using machine learning techniques.

    Kernel techniques and Support Vector Machine (SVM) were suggested by the researchers of this work [27] to improve the accuracy of anomaly-based intrusion detection.A method to boost the identification rate and reduce false alarms was also developed by combining specification-based intrusion detection with anomalous intrusion detection.This study also created a framework for the automatic generation of software applications to identify both misuse and anomalies in intrusions.A Colored Petri Net(CPN)depicting an intrusion detection framework was quickly transformed from an SFT indicating an incursion.Accuracy was 93.5 percent for the Markov Chain kernel and a oneclass SVM;detection performance was 91.75 percent,and false alarms were 5.5 percent,respectively.

    For novel binary and multi-class classifications,this research[28]suggested a new approach for a system of detecting intrusions using Recurrent Neural Networks(RNNs)with deep learning.The dataset called“NSL KDD”was used to analyze the parameters of the standards to acquire an actual detection performance,and shape-based gathering was used in the future to increase the model’s efficiency.Using deep learning methods,they aimed to create an IDS that could be used to check modern systems using RNNs and other RNN-based architectures.

    Researches [29] have shown how to quickly and efficiently retrieve all damaged database pieces of data following an assault using agent-based vulnerability assessment and recovery strategies.The technique for evaluating degradation made use of timestamps as well as numerous copies of each data element.Every agent handles a predetermined collection of data objects,which are unique to that agent among all others.Both aspects of the contest require the cooperation of all of the participants.The operations of assessing damages and recovering from them were performed concurrently by agents following the appropriate methods.This approach substantially reduced the recovery period compared to prior techniques because it accurately detected the damages instead of underestimating them.The authors of this study [30] suggested a Dynamic Sensitivity-Driven Rule Generation Algorithm to identify the invasive transaction and thereby protect vital data from alteration.

    3 Proposed System

    For the purpose of storing information that is relevant to Structured Query Language (SQL)transactions,our proposed system uses an innovative data structure known as a Pentaplet.By applying the ensembling method,several machine learning algorithms are utilized for training and classification.The benefit of this suggested technique is that it generates a new data structure,Pentaplet,for effective data storage,enhancing performance regardless of dynamic changes in database size and structure.This system also protects against database attacks such as privilege escalation,unauthorized privilege abuse,and SQL Injection attacks.When a user submits a database query,it is processed to generate a Pentaplet,which is a structure consisting of five arrays.The database administrator maintains the roles,which can be dynamically modified based on the requirements.Role profiles are generated using Pentaplet,and the new profiles are then be compared to the current profiles generated by the classifier from the log file.The checking module performs the comparison,and based on the result,the response handling algorithm either generates the appropriate response or notifies the administrator.

    3.1 Proposed System’s Structure

    The proposed system consists of four main components:database log files,a response engine,a comparison mechanism,and a profile generator.The database log files are utilized to create standard profiles.In this process,machine learning algorithms are employed to train typical profiles from the log files.Ensembling is used to achieve our objective.The profiles are kept separate for comparison purposes.Whenever a user issues a transaction,a Pentaplet is generated.Based on the creation of pentaplets,a role profile is constructed.The resulting structure is then compared to the current structure.Fig.1 illustrates the architecture.If there is a successful match,the query is executed.Otherwise,the response engine provides three different types of responses based on the matching percentage.If the match rate exceeds 8.0 on a scale of 10,the administrator receives an alarm warning.If the rate is between 6.0 and 8.0,the query is instantly blocked.Otherwise,the query proceeds.Fig.1 depicts the suggested architecture,which collects analytical data from the database log files.

    Figure 1:Diagram of the proposed intrusion detection system

    The log file contains all data related to previous inquiries and transactions.The queries are then converted into binary values in a transaction processor before being inputted into a machine learning classifier[31]based on the roles that typically create normal profiles.Any deviation from the standard profiles is labelled as abnormal.The log queries are used to generate pentaplets.Similarly,pentaplets are formed from the user’s requests and fed into an ensembling classifier to obtain probabilities.

    3.2 Pentaplet Data Structure

    To determine user behavior patterns,the suggested system queries database log files that contain information about users’actions.After undergoing the processing phase,the log entries are used to construct preliminary profiles that indicate acceptable activities.In order to create the appropriate profiles,each item(i.e.,transaction)in the log file is treated as a single data unit.This section assumes that SQL queries linked to the same data transaction are grouped together in the log file.The system must first pre-process the contents of the log file and convert them into an understandable format for profile generation.As a result,each transaction is represented by a basic data block with five fields,hence the term “Pentaplet”.Sets of these pentaplets are used to characterize user actions.Each transaction is denoted by a Pentaplet,which contains the following data: the first five array components are used to represent the initial SQL command of a transaction,including the user-issued SQL command,the relationship sets queried,and the set of referenced attributes for each relation.If necessary,additional optional components may be added after the fifth element of the array to store additional data for the remaining SQL statements of the transaction.

    The Pentaplet is a five-array relation-based data structure that can be expressed as P (FC,RP,AP,RS,AS,...,ORSQL),where FCrepresents to the first query command;RPto the information of projection relation,which represents the attribute of projection array of each query;APto the information of projection attribute,which denotes the transaction projection attributes as a 2D array.RSto denotes the information of selection relation,identifies the list of attributes used to filter results for each query,ASto the information of selection attribute,which represents the transaction selection attribute as a 2D array,and lastly ORSQLis optional,for any additional information about the remaining SQL queries in the transaction if there any.

    If such a database structure is considered which consists of two relationships between R1=[A1,B1,C1,D1] and R2=[A2,B2,C2,D2],then the Pentaplet will be constructed as:{SQLCommand,PROJECTIONRelation[],PROJECTIONAttribute[][],SELECTIONRelation[],SELECTIONAttribute[][],OptionalRestSQL[]}[18,32].

    3.3 Classifier

    For the task of intrusion detection in RBAC databases,this work applies a collection of classifiers,including Decision Tree (DT),K-Nearest Neighbor (KNN),Logistic Regression (LR),Naive Bayes(NB),Support Vector Machine (SVM),and Random Forest (RF).The model is trained using the aforementioned conventional classifiers as well as an ensemble classifier.These classifiers are then combined with an ensemble voting approach to select the proposed solution with the highest accuracy.Once the classifier is successfully created,the classification results and corresponding experimental data are evaluated using a cross-validation technique.In classification problems,the classifier is given a group of examples to learn from and a new instance with predetermined attribute values.The task is to determine which category the new instance belongs to(corresponding to the observational set).Finally,the appropriate model provides a decision to anticipate the specific targeted value or class of this new instance,as shown in Fig.2.

    A total of six different classifiers,namely Logistic Regression (LR),Support Vector Machine(SVM),K-Nearest Neighbor (KNN),Random Forest (RF),Naive Bayes (NB),and Decision Tree(DT),were used to construct our machine learning algorithm.The following sections discuss the classifier algorithms utilized in our proposed model.

    3.3.1 Logistic Regression(LR)

    Another supervised classification model is Logistic Regression (LR) which represents the input into the probability calculation for the dependent variable of interest.The dependent variable is binary;therefore,the values can either be“1”(success)or“0”(failure).It can be broken down into binomial,multinomial,and ordinal categories.The resulting LR equation is a straight-line equation,as follows:

    Figure 2:A block diagram of the classification pipeline

    3.3.2 K-Nearest Neighbor(KNN)

    Our proposed architecture used K-Nearest Neighbor (KNN),a supervised learning technique.The technique relies on the existing data being comparable to the new data.When classifying newly acquired information,it should be filed under a heading like those already in use.KNN’s method of categorization is depicted in Fig.3.To determine how far apart nodes are in this system,the Manhattan equation is employed for KNN.The distance formula of the Manhattan equation is shown in Eq.(2).

    Manhattan:

    Figure 3:KNN classifier with the classification mechanism

    3.3.3 Support Vector Machine(SVM)

    Support Vector Machine (SVM) is a classifier and regression technique that can classify any object based on the provided data.To make adding new information in the future simple,it generates the optimal decision boundary that partitions spaces with n dimensions into classes.Eq.(3)displays the corresponding kernel trick of the SVM equation,which was applied in our study to construct the classification.When dealing with data that cannot be separated linearly into two dimensions,the user of the dataset instead transforms it to a higher dimension,such as three,four,or even ten is called the kernel trick method.

    3.3.4 Random Forest(RF)

    The random forest is a classification and regression algorithm in machine learning.This technique is also known as an ensemble classifier because it employs numerous decision tree models.It is a classifier that uses the averaged results of applying numerous decision trees to diverse subsets of a dataset to improve the overall accuracy of the dataset’s predictions.

    3.3.5 Naive Bayes(NB)

    Bayes’theory,often known as Bayes’rule or Bayes’law,is a formula that,given prior knowledge,may determine the probability of a hypothesis.The term“Naive Bayes”refers to the Bayes’theorem in its most common version.Bayes’theorem can be expressed mathematically,as seen in Eq.(4).Using the Bayes Theorem as its foundation,Naive Bayes is a probabilistic machine learning technique often applied to classification problems.

    where,P(A|B)is the chance of occurrence.And P(B|A)is likely probability.

    3.3.6 Decision Tree(DT)

    As a form of supervised ML methods,a decision tree helps to make decisions more quickly where the data structure of a tree-based defines the algorithm.The internal nodes of a decision tree stand in for characteristics of the dataset,while the branches stand in for the rules for making a call,and the leaves indicate the result.The decision tree is capable of representing any Boolean value,whether it be true or false.

    where,

    ? S=Total sample count

    ? P(1/true)=possibility of being YES

    ? P(0/false)=possibility of being NO Based on its attributes(a1,...,an),the procedure given here is to assign the most likely class value to this new instance,vclassεV,which is:

    In this scenario,predicting P(vj)is easy because it only takes counting the frequency of vjin the training data.P(ai| vj) just requires a frequency count of the tuples in the training data that have a class value of vj.Here,the suggested anomaly detection framework is directly applied ML algorithms through the following equation,which treats the set of roles in the system as classes and the log file Pentaplet as observations(7).

    For the equation above,N is the number of relations within the DBMS,whereas Nc is the number of SQL statements performed.The intrusion detection process is relatively simple with the above equation in place.The trained classifier is used to make predictions about the rclassof all future transactions.An anomaly is flagged if this rclassdoes not match the role originally linked to the transaction.

    4 Experiments and Results

    Our proposed work relied on the KDD Cup’99 dataset[33,34],developed by MIT Lincoln Lab and derived from the tcpdump subset of the 1998 DARPA IDS evaluation dataset.The dataset is also available in secondary data sources like Kaggle.The synthetic data was generated with a closed network and manually injected attacks to develop a wide variety of attacks without disrupting the normal flow of traffic.The competition aimed to create a network intrusion detector,a prediction model that can tell the difference between regular connections and malicious intrusions or attacks.Auditing is performed on a standard data collection from this database,which comprises numerous simulated intrusions onto a military network.A total of 24 different attack types were used for training in the datasets,including another 14 used only for testing.Furthermore,the KDD Cup’99 dataset’s total number of the records is 494,021 and also has 41 features.

    Our proposed system will use data preprocessing techniques to remove redundant information from the dataset.Next,the Feature Important (FI) methodology will be used to choose the most relevant features from the dataset.Algorithm 1 shows the feature selection method in the proposed method.The model will then be trained using both a traditional and an ensemble classifier.Fig.4 shows our experimental data analysis’s performance evaluation matrices and learning curve.

    Figure 4:Data analysis with(a)performance evaluation matrices(b)learning curve

    Our work’s confusion matrix evaluation is depicted in Figs.5–7.In addition,we have integrated 5-fold cross-validation into our proposed approach.Moreover,we implementedOneHotEncoderbecause it allows us to select categorical features as a single numeric array in the proposed architecture.

    Figure 6:Confusion matrix of SVM algorithm with normalization

    To reduce the dimensions of the features,our models also used Principal Component Analysis(PCA).All the targeted values or the good(normal)connection value ratio are shown in the Fig.8.

    Table 1 shows the experimental data analysis with six conventional classifiers.We have utilized Support Vector Machine (SVM),Random Forest (RF),Decision Tree (DT),Naive Bayes (NB),K-Nearest Neighbor (KNN) and Logistics Regression (LR).We can determine why our system is superior by comparing the proposed system to the existing one.The proposed paper by the authors[14,22,27,30]used different types of machine learning algorithms or techniques,but they did not use any custom data structure for efficiently detecting intrusion.Again,though the authors of the paper[18]used a custom data structure with the Naive Bayes classifier,they did not mention the accuracy of detecting intrusion in databases.On the other hand,this proposed paper utilizes a custom data structure and SVM classifier with the highest accuracy of 99.92%,indicating that the proposed system is more reliable and effective than others,as seen in Table 2.

    Table 1:Experimental data analysis with seven classifiers

    Table 2:A comparative analysis of proposed and existing systems

    5 Discussion

    The suggested Intrusion Detection System (IDS) is a versatile and adaptable transaction-based system employed in Role Based Access Control (RBAC) databases.Even for databases with a large number of users,the system’s usability is improved through the implementation of roles,which are used to train the classifier.Additionally,this method utilizes a novel data structure called Pentaplet.The technique offers the advantage of developing a new data structure,Pentaplet,which efficiently manages data storage,thereby enhancing performance despite dynamic changes in the structure and size of the database.The proposed architecture employs machine learning techniques for intrusion detection in the database.Specifically,the system utilizes the SVM algorithm with PCA andOneHotEncoderto detect abnormal transactions.The proposed framework achieves an accuracy of 99.85% in the SVM model and 99.92%in the SVM algorithm with PCA andOneHotEncodermodel.Our method demonstrates significantly better accuracy compared to previous works [14,18,22,27,30].The data structure used in this system is unique due to its dynamic length feature,which allows it to adapt to different needs.In contrast,the octraplet data structure used in previous work[18]has a fixed length,making it less storage efficient.

    6 Conclusions

    Protecting sensitive information is crucial in every operational information management.However,safeguards occasionally fail,allowing unauthorized individuals to gain access to private databases.Therefore,intrusion detection systems are utilized in the database to identify hostile actions within the Database Management Systems.In cases where other forms of protection are not feasible or easily exploitable,intrusion detection systems can play a vital role in database restoration [16].This study proposes a transaction-based anomaly detection solution for RBAC databases,utilizing a Support Vector Machine(SVM)and a novel data structure called Pentaplet.The use of roles to train the classifier makes this method applicable to databases with a large number of users.The developed learning algorithm effectively detects role violations,and our suggested approach aims to reduce the number of false positives by considering support and confidence levels.Furthermore,this work includes a comparative analysis of existing DIDS methods and our proposed DIDS methods.

    Future work involves incorporating additional machine learning techniques,such as natureinspired algorithms like Particle Swarm Optimization (PSO),and expanding the dataset to identify the most accurate intrusion detection algorithms and evaluate attribute value dependencies to improve the detection rate.Additionally,a method will be provided to assess the scalability of the proposed Pentaplet model through complexity analysis.Moreover,there are plans to integrate Graph Neural Networks(GNNs)into our proposed model in the future[35,36,37].GNNs are a specialized category of artificial neural networks designed to effectively handle and analyze data with a graph-like structure.Graphs,consisting of interconnected nodes and edges,are used to represent relationships between entities.Nodes represent entities,while edges depict the connections between them.Graphs find applications in various domains,including social networks,chemical structures,and natural language texts.Therefore,it is anticipated that the integration of GNNs will enhance the complexity of our proposed models,particularly in the field of cybersecurity,such as intrusion detection.It is assumed that the inclusion of GNNs will enrich the capabilities of the proposed models,enabling effective detection of intrusions.

    Acknowledgement:The author is thankful to the Dean of Scientific Research at Najran University.

    Funding Statement:The author is thankful to the Dean of Scientific Research at Najran University for funding this work under the Research Groups Funding Program,Grant Code(NU/RG/SERC/12/6).

    Author Contributions:Conceptualization,A.Alazeb;methodology,A.Alazeb;software,A.Alazeb;analysis and interpretation of results,A.Alazeb;writing original draft preparation,A.Alazeb.

    Availability of Data and Materials:The data and materials used in this paper is available upon request from the corresponding author.

    Conflicts of Interest:The author declare that they have no conflicts of interest to report regarding the present study.

    亚洲色图 男人天堂 中文字幕| 高清黄色对白视频在线免费看| 满18在线观看网站| 如日韩欧美国产精品一区二区三区| 日本vs欧美在线观看视频| 一级毛片电影观看| 黑人欧美特级aaaaaa片| 男女边摸边吃奶| 99精品欧美一区二区三区四区| 国产免费现黄频在线看| 日本av免费视频播放| 国产熟女午夜一区二区三区| 最黄视频免费看| 亚洲熟女精品中文字幕| 这个男人来自地球电影免费观看| 伦理电影免费视频| 咕卡用的链子| 性色av一级| 欧美日韩亚洲高清精品| 美女午夜性视频免费| kizo精华| 老鸭窝网址在线观看| 免费高清在线观看视频在线观看| 丰满迷人的少妇在线观看| 亚洲国产欧美网| 美女国产高潮福利片在线看| 国产亚洲av片在线观看秒播厂| 日韩欧美一区视频在线观看| 90打野战视频偷拍视频| 亚洲天堂av无毛| 人妻久久中文字幕网| 一级毛片女人18水好多| 建设人人有责人人尽责人人享有的| 黑人巨大精品欧美一区二区蜜桃| 在线亚洲精品国产二区图片欧美| 女性被躁到高潮视频| 99国产精品一区二区三区| 午夜日韩欧美国产| 国产精品欧美亚洲77777| 少妇人妻久久综合中文| 99久久精品国产亚洲精品| 18禁裸乳无遮挡动漫免费视频| av网站在线播放免费| 男女高潮啪啪啪动态图| 黄色怎么调成土黄色| 国产成人av激情在线播放| 视频区图区小说| 亚洲黑人精品在线| 肉色欧美久久久久久久蜜桃| 亚洲av国产av综合av卡| 亚洲天堂av无毛| 久久99一区二区三区| 久久中文字幕一级| 99国产精品一区二区蜜桃av | 精品福利永久在线观看| 男女免费视频国产| 人人妻人人澡人人爽人人夜夜| 精品久久久久久久毛片微露脸 | 亚洲三区欧美一区| 免费日韩欧美在线观看| 国产免费视频播放在线视频| 国产片内射在线| 亚洲avbb在线观看| svipshipincom国产片| 91老司机精品| 欧美国产精品一级二级三级| 青青草视频在线视频观看| 欧美久久黑人一区二区| 国产日韩一区二区三区精品不卡| 久久国产精品人妻蜜桃| 精品亚洲成国产av| 欧美国产精品va在线观看不卡| 一本综合久久免费| 国产福利在线免费观看视频| 精品少妇一区二区三区视频日本电影| 久久天躁狠狠躁夜夜2o2o| 亚洲专区国产一区二区| 精品免费久久久久久久清纯 | 在线观看免费视频网站a站| 亚洲av电影在线观看一区二区三区| 女人久久www免费人成看片| 建设人人有责人人尽责人人享有的| bbb黄色大片| 男人添女人高潮全过程视频| 国产片内射在线| 岛国毛片在线播放| 老司机深夜福利视频在线观看 | 1024视频免费在线观看| 老熟妇乱子伦视频在线观看 | 色婷婷av一区二区三区视频| 久热这里只有精品99| 一区二区三区乱码不卡18| 免费在线观看黄色视频的| 深夜精品福利| 国产精品国产三级国产专区5o| 在线av久久热| 一个人免费在线观看的高清视频 | 一级a爱视频在线免费观看| 制服诱惑二区| 国产一区二区三区综合在线观看| 岛国在线观看网站| 日本wwww免费看| 国产免费av片在线观看野外av| 男男h啪啪无遮挡| 亚洲九九香蕉| 高潮久久久久久久久久久不卡| 大香蕉久久成人网| 国产亚洲精品第一综合不卡| 一本综合久久免费| 最新的欧美精品一区二区| 国产亚洲精品第一综合不卡| 黑人操中国人逼视频| 亚洲色图 男人天堂 中文字幕| av欧美777| 一二三四在线观看免费中文在| 夫妻午夜视频| 人人妻人人澡人人爽人人夜夜| 欧美日韩黄片免| 高潮久久久久久久久久久不卡| 亚洲国产av影院在线观看| 亚洲精华国产精华精| 大香蕉久久网| 亚洲精品国产区一区二| 精品卡一卡二卡四卡免费| 高清黄色对白视频在线免费看| 日韩电影二区| 999久久久精品免费观看国产| 窝窝影院91人妻| 日韩一卡2卡3卡4卡2021年| 国产免费av片在线观看野外av| 热99国产精品久久久久久7| 欧美一级毛片孕妇| 亚洲av日韩精品久久久久久密| 国产精品一二三区在线看| 亚洲国产欧美网| 国产成人一区二区三区免费视频网站| 久久久国产精品麻豆| 妹子高潮喷水视频| 欧美乱码精品一区二区三区| 极品人妻少妇av视频| 中文字幕人妻丝袜一区二区| 老汉色∧v一级毛片| 久久综合国产亚洲精品| 亚洲人成电影观看| 国产在线免费精品| 亚洲欧美色中文字幕在线| 老司机影院成人| 久久久久久久精品精品| 久久精品久久久久久噜噜老黄| 成年美女黄网站色视频大全免费| 午夜福利,免费看| 久久久久网色| 亚洲色图综合在线观看| 99热网站在线观看| 亚洲精华国产精华精| 久久亚洲国产成人精品v| videos熟女内射| 国产高清国产精品国产三级| 十八禁人妻一区二区| 日韩欧美一区二区三区在线观看 | 欧美在线黄色| 国产视频一区二区在线看| 精品国产超薄肉色丝袜足j| 欧美日韩福利视频一区二区| 另类精品久久| 久久人妻福利社区极品人妻图片| 国产在线观看jvid| 久久国产精品男人的天堂亚洲| 亚洲五月色婷婷综合| 亚洲三区欧美一区| 亚洲av男天堂| 国产成人一区二区三区免费视频网站| 美女视频免费永久观看网站| 秋霞在线观看毛片| 纯流量卡能插随身wifi吗| 免费在线观看影片大全网站| 女人被躁到高潮嗷嗷叫费观| 黄色视频在线播放观看不卡| 999精品在线视频| 黄网站色视频无遮挡免费观看| 97精品久久久久久久久久精品| 午夜两性在线视频| 亚洲午夜精品一区,二区,三区| 国产无遮挡羞羞视频在线观看| 国产日韩欧美亚洲二区| 亚洲伊人色综图| 国产91精品成人一区二区三区 | 性色av一级| 另类精品久久| 国产在线一区二区三区精| 青春草视频在线免费观看| 岛国毛片在线播放| 日韩欧美免费精品| 亚洲激情五月婷婷啪啪| 三级毛片av免费| 亚洲精品国产一区二区精华液| 国产亚洲午夜精品一区二区久久| av天堂久久9| 国产精品久久久人人做人人爽| 国产99久久九九免费精品| 国产男女超爽视频在线观看| 正在播放国产对白刺激| 成年女人毛片免费观看观看9 | a级毛片在线看网站| 欧美日韩视频精品一区| 亚洲免费av在线视频| svipshipincom国产片| 久久影院123| 真人做人爱边吃奶动态| 午夜91福利影院| 成年人午夜在线观看视频| 亚洲五月色婷婷综合| 在线亚洲精品国产二区图片欧美| 亚洲精品一区蜜桃| 国产精品国产三级国产专区5o| 99久久人妻综合| 在线永久观看黄色视频| 国产男女超爽视频在线观看| 91国产中文字幕| av片东京热男人的天堂| 丰满人妻熟妇乱又伦精品不卡| 午夜成年电影在线免费观看| 一级毛片女人18水好多| 亚洲va日本ⅴa欧美va伊人久久 | 国产不卡av网站在线观看| 成年人免费黄色播放视频| 国产成人精品在线电影| 欧美精品人与动牲交sv欧美| 精品国产一区二区久久| 熟女少妇亚洲综合色aaa.| 人人妻人人添人人爽欧美一区卜| 女性被躁到高潮视频| 丝瓜视频免费看黄片| 18禁国产床啪视频网站| 欧美在线一区亚洲| 亚洲伊人久久精品综合| 精品少妇久久久久久888优播| 久久久久久人人人人人| 91九色精品人成在线观看| 男人爽女人下面视频在线观看| 精品国产乱子伦一区二区三区 | videosex国产| 又大又爽又粗| 可以免费在线观看a视频的电影网站| 丰满迷人的少妇在线观看| 又黄又粗又硬又大视频| 飞空精品影院首页| 考比视频在线观看| 啦啦啦免费观看视频1| 一二三四社区在线视频社区8| 免费观看人在逋| 一区二区av电影网| 国产一区二区 视频在线| 亚洲精品一卡2卡三卡4卡5卡 | 大型av网站在线播放| 亚洲伊人久久精品综合| 日韩大片免费观看网站| 精品卡一卡二卡四卡免费| 蜜桃国产av成人99| 国产av一区二区精品久久| 国产男女超爽视频在线观看| 69av精品久久久久久 | 久久久精品国产亚洲av高清涩受| 制服人妻中文乱码| 国产精品99久久99久久久不卡| 午夜两性在线视频| 美女中出高潮动态图| 黑丝袜美女国产一区| 国产成人一区二区三区免费视频网站| 久久国产精品人妻蜜桃| 两性午夜刺激爽爽歪歪视频在线观看 | 女人爽到高潮嗷嗷叫在线视频| 亚洲精品中文字幕在线视频| 日韩欧美一区视频在线观看| 狠狠狠狠99中文字幕| 亚洲免费av在线视频| 黑人欧美特级aaaaaa片| 男人爽女人下面视频在线观看| 国产成人系列免费观看| 久久国产精品大桥未久av| 色婷婷av一区二区三区视频| 精品高清国产在线一区| 美女视频免费永久观看网站| av视频免费观看在线观看| 午夜福利在线免费观看网站| 香蕉国产在线看| 91大片在线观看| 丝袜在线中文字幕| 黄片小视频在线播放| 视频在线观看一区二区三区| 免费在线观看黄色视频的| 久久综合国产亚洲精品| 日韩 亚洲 欧美在线| 啦啦啦免费观看视频1| 久久人妻熟女aⅴ| 亚洲国产av新网站| 青春草亚洲视频在线观看| 黑人巨大精品欧美一区二区mp4| 蜜桃在线观看..| 日韩人妻精品一区2区三区| 在线av久久热| 啦啦啦中文免费视频观看日本| 纯流量卡能插随身wifi吗| 久久天堂一区二区三区四区| 久久天躁狠狠躁夜夜2o2o| 国产片内射在线| 黄色怎么调成土黄色| 日韩 亚洲 欧美在线| 另类亚洲欧美激情| 伊人亚洲综合成人网| 免费久久久久久久精品成人欧美视频| 97人妻天天添夜夜摸| 国产xxxxx性猛交| 电影成人av| 中文字幕最新亚洲高清| 午夜激情av网站| 另类亚洲欧美激情| 亚洲欧美精品自产自拍| 欧美另类一区| 国产成人欧美| 啦啦啦 在线观看视频| 99久久精品国产亚洲精品| 亚洲欧美一区二区三区久久| 一个人免费看片子| 一级,二级,三级黄色视频| 久久99热这里只频精品6学生| 黑人巨大精品欧美一区二区蜜桃| 日韩欧美免费精品| 大片电影免费在线观看免费| 水蜜桃什么品种好| 久久中文看片网| 亚洲天堂av无毛| 久久精品国产综合久久久| av欧美777| 免费看十八禁软件| 国产成人av激情在线播放| 丝瓜视频免费看黄片| 久久99一区二区三区| 国产高清国产精品国产三级| 精品国产超薄肉色丝袜足j| 90打野战视频偷拍视频| 爱豆传媒免费全集在线观看| 久久久久国产精品人妻一区二区| 日韩,欧美,国产一区二区三区| 桃花免费在线播放| 一边摸一边抽搐一进一出视频| 99精品欧美一区二区三区四区| 一区二区av电影网| 曰老女人黄片| 亚洲久久久国产精品| 男人操女人黄网站| 人妻人人澡人人爽人人| 亚洲成人免费av在线播放| 久久精品成人免费网站| 丁香六月欧美| 一区福利在线观看| 欧美日韩一级在线毛片| 国产精品1区2区在线观看. | 青春草亚洲视频在线观看| 午夜免费成人在线视频| 久久久久国内视频| 精品一区二区三区av网在线观看 | 激情视频va一区二区三区| 成在线人永久免费视频| 亚洲avbb在线观看| 久久久久久久国产电影| 永久免费av网站大全| 精品国内亚洲2022精品成人 | 99久久99久久久精品蜜桃| 免费少妇av软件| 国产熟女午夜一区二区三区| 一本大道久久a久久精品| 精品视频人人做人人爽| 大香蕉久久成人网| 亚洲综合色网址| 午夜精品国产一区二区电影| 久久久久久久久久久久大奶| 久久热在线av| 天堂俺去俺来也www色官网| 中文字幕人妻丝袜制服| 久久99热这里只频精品6学生| 亚洲国产看品久久| 久久香蕉激情| 又黄又粗又硬又大视频| 人人妻人人爽人人添夜夜欢视频| 99热国产这里只有精品6| 亚洲午夜精品一区,二区,三区| av有码第一页| 伦理电影免费视频| 狠狠精品人妻久久久久久综合| 色精品久久人妻99蜜桃| 国产1区2区3区精品| 日韩精品免费视频一区二区三区| 欧美日韩视频精品一区| 精品久久久精品久久久| 宅男免费午夜| 国产成人欧美在线观看 | 亚洲av男天堂| 一二三四在线观看免费中文在| 性高湖久久久久久久久免费观看| 日本猛色少妇xxxxx猛交久久| 91字幕亚洲| 欧美精品一区二区大全| 精品少妇久久久久久888优播| 日韩欧美一区视频在线观看| 日本wwww免费看| 一区二区三区激情视频| 免费女性裸体啪啪无遮挡网站| av在线播放精品| 久久精品国产亚洲av香蕉五月 | 国产精品国产av在线观看| 亚洲国产av新网站| 亚洲成人免费电影在线观看| 精品免费久久久久久久清纯 | 国产成人精品无人区| 黄色怎么调成土黄色| 久热这里只有精品99| 性少妇av在线| 国产精品一二三区在线看| 久久99一区二区三区| 9191精品国产免费久久| 亚洲国产精品999| 午夜激情久久久久久久| 999久久久国产精品视频| 日韩大码丰满熟妇| 亚洲va日本ⅴa欧美va伊人久久 | 夜夜夜夜夜久久久久| 亚洲中文字幕日韩| 伊人亚洲综合成人网| 一区二区三区乱码不卡18| 日韩,欧美,国产一区二区三区| 国产片内射在线| 伊人久久大香线蕉亚洲五| 亚洲五月婷婷丁香| 爱豆传媒免费全集在线观看| 亚洲欧美精品综合一区二区三区| 最近中文字幕2019免费版| 黄色怎么调成土黄色| 在线观看一区二区三区激情| 国产色视频综合| 老司机在亚洲福利影院| 女人久久www免费人成看片| 2018国产大陆天天弄谢| 日本五十路高清| 国产黄频视频在线观看| 黄色视频在线播放观看不卡| 久久精品国产亚洲av高清一级| 大片免费播放器 马上看| 亚洲成av片中文字幕在线观看| 伦理电影免费视频| 欧美97在线视频| 首页视频小说图片口味搜索| 国产在线一区二区三区精| 黑丝袜美女国产一区| 久久久国产精品麻豆| 久久午夜综合久久蜜桃| 少妇精品久久久久久久| 亚洲国产欧美在线一区| av在线老鸭窝| 亚洲伊人久久精品综合| 国产高清视频在线播放一区 | 在线观看人妻少妇| 午夜福利视频在线观看免费| 国产极品粉嫩免费观看在线| 久久久久国产精品人妻一区二区| 成年美女黄网站色视频大全免费| 国产免费一区二区三区四区乱码| 久久精品人人爽人人爽视色| 真人做人爱边吃奶动态| 性高湖久久久久久久久免费观看| 午夜福利视频精品| 蜜桃在线观看..| 制服人妻中文乱码| 久久毛片免费看一区二区三区| 搡老乐熟女国产| 深夜精品福利| 亚洲av电影在线观看一区二区三区| 黄片小视频在线播放| √禁漫天堂资源中文www| 搡老岳熟女国产| 中文精品一卡2卡3卡4更新| av天堂在线播放| 极品人妻少妇av视频| 婷婷色av中文字幕| 成人手机av| 性色av一级| 成人手机av| 啦啦啦啦在线视频资源| av网站免费在线观看视频| 九色亚洲精品在线播放| 亚洲欧美精品自产自拍| 99国产精品一区二区三区| 视频区欧美日本亚洲| 精品第一国产精品| 99re6热这里在线精品视频| 亚洲情色 制服丝袜| 美女高潮喷水抽搐中文字幕| 欧美久久黑人一区二区| 成年av动漫网址| 如日韩欧美国产精品一区二区三区| 亚洲av片天天在线观看| 久久国产精品影院| 伊人亚洲综合成人网| 久久久久网色| 黄片小视频在线播放| 国产精品免费大片| 国产淫语在线视频| 人妻久久中文字幕网| 乱人伦中国视频| 人人妻人人澡人人看| 自线自在国产av| 久久久精品国产亚洲av高清涩受| 久久久久久久大尺度免费视频| 日本av免费视频播放| 亚洲精品一卡2卡三卡4卡5卡 | 国产精品一区二区在线观看99| 黄片播放在线免费| 十八禁网站免费在线| 久久久久久久久免费视频了| 久久中文看片网| 91老司机精品| 捣出白浆h1v1| 中文字幕av电影在线播放| 在线精品无人区一区二区三| 青青草视频在线视频观看| 亚洲久久久国产精品| 久久青草综合色| 久久久水蜜桃国产精品网| 中国国产av一级| 日韩 欧美 亚洲 中文字幕| 老司机福利观看| avwww免费| 欧美少妇被猛烈插入视频| 国产精品香港三级国产av潘金莲| 欧美日韩福利视频一区二区| 老汉色∧v一级毛片| 在线观看免费午夜福利视频| 不卡一级毛片| 麻豆国产av国片精品| 91字幕亚洲| 成人国语在线视频| 日本91视频免费播放| 亚洲综合色网址| 精品一品国产午夜福利视频| 男女高潮啪啪啪动态图| kizo精华| 精品国产乱子伦一区二区三区 | 久久综合国产亚洲精品| 深夜精品福利| 亚洲色图综合在线观看| 成人亚洲精品一区在线观看| 午夜91福利影院| 51午夜福利影视在线观看| 国产精品久久久久久精品电影小说| 母亲3免费完整高清在线观看| 狂野欧美激情性bbbbbb| 久久精品成人免费网站| 国产精品国产三级国产专区5o| 大香蕉久久成人网| 老司机靠b影院| 黄色片一级片一级黄色片| 自线自在国产av| 两人在一起打扑克的视频| 国产日韩欧美在线精品| 亚洲成国产人片在线观看| 国产在线观看jvid| 狂野欧美激情性xxxx| 日韩精品免费视频一区二区三区| 精品一区在线观看国产| 国产又色又爽无遮挡免| 中文字幕最新亚洲高清| 91精品三级在线观看| 精品国产乱子伦一区二区三区 | 亚洲色图综合在线观看| 丝袜美腿诱惑在线| 亚洲午夜精品一区,二区,三区| 亚洲精品日韩在线中文字幕| 一二三四在线观看免费中文在| 中亚洲国语对白在线视频| 国产精品一二三区在线看| 电影成人av| 国产在视频线精品| 久久中文字幕一级| 女性被躁到高潮视频| 日韩视频一区二区在线观看| 成人18禁高潮啪啪吃奶动态图| 亚洲国产日韩一区二区| 99久久99久久久精品蜜桃| 高清黄色对白视频在线免费看| 久热爱精品视频在线9| 波多野结衣一区麻豆| 国产在线一区二区三区精| 亚洲国产欧美在线一区| 他把我摸到了高潮在线观看 | 精品卡一卡二卡四卡免费| 成年美女黄网站色视频大全免费| 一二三四在线观看免费中文在| 国产精品成人在线| 亚洲 国产 在线| av又黄又爽大尺度在线免费看| 久久天堂一区二区三区四区| 精品国内亚洲2022精品成人 | xxxhd国产人妻xxx| 成人免费观看视频高清| av不卡在线播放| 汤姆久久久久久久影院中文字幕| 在线亚洲精品国产二区图片欧美| 一本—道久久a久久精品蜜桃钙片| 人妻 亚洲 视频| 精品国产乱子伦一区二区三区 | 天天躁日日躁夜夜躁夜夜| a级毛片在线看网站| 超碰97精品在线观看| 人人妻人人澡人人看| 青春草视频在线免费观看|