• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Adaptive DDoS Detection and Classification Method in Blockchain Using an Integrated Multi-Models

    2024-01-12 03:46:34XiulaiLiJierenChengChengchunRuanBinZhangXiangyanTangandMengzheSun
    Computers Materials&Continua 2023年12期

    Xiulai Li ,Jieren Cheng ,Chengchun Ruan ,Bin Zhang ,Xiangyan Tang and Mengzhe Sun

    1School of Computer Science and Technology,Hainan University,Haikou,570228,China

    2School of Cyberspace Security,Hainan University,Haikou,570228,China

    3Hainan Blockchain Technology Engineering Research Center,Hainan University,Haikou,570228,China

    4Hainan Hairui Zhong Chuang Technol Co.,Ltd.,Haikou,570228,China

    5School of Information Science and Technology,Qiongtai Normal University,Haikou,570228,China

    ABSTRACT With the rising adoption of blockchain technology due to its decentralized,secure,and transparent features,ensuring its resilience against network threats,especially Distributed Denial of Service(DDoS)attacks,is crucial.This research addresses the vulnerability of blockchain systems to DDoS assaults,which undermine their core decentralized characteristics,posing threats to their security and reliability.We have devised a novel adaptive integration technique for the detection and identification of varied DDoS attacks.To ensure the robustness and validity of our approach,a dataset amalgamating multiple DDoS attacks was derived from the CIC-DDoS2019 dataset.Using this,our methodology was applied to detect DDoS threats and further classify them into seven unique attack subcategories.To cope with the broad spectrum of DDoS attack variations,a holistic framework has been proposed that seamlessly integrates five machine learning models:Gate Recurrent Unit(GRU),Convolutional Neural Networks(CNN),Long-Short Term Memory(LSTM),Deep Neural Networks(DNN),and Support Vector Machine(SVM).The innovative aspect of our framework is the introduction of a dynamic weight adjustment mechanism,enhancing the system’s adaptability.Experimental results substantiate the superiority of our ensemble method in comparison to singular models across various evaluation metrics.The framework displayed remarkable accuracy,with rates reaching 99.71%for detection and 87.62%for classification tasks.By developing a comprehensive and adaptive methodology,this study paves the way for strengthening the defense mechanisms of blockchain systems against DDoS attacks.The ensemble approach,combined with the dynamic weight adjustment,offers promise in ensuring blockchain’s enduring security and trustworthiness.

    KEYWORDS Blockchain;DDoS;multi-models;adaptive detection

    1 Introduction

    Blockchain,an innovative distributed and decentralized digital ledger technology,has revolutionized numerous sectors due to its ability to systematically record transactions and ensure data consistency without relying on a centralized entity[1].This technology stores data in blocks connected in a linear,chronological sequence [2].One of its strengths lies in its decentralized architecture,where each node possesses an identical copy of the ledger,eliminating central points of failure and providing robustness [3].Cryptographic hashing bolstered its inherent transparency and security features,making data manipulation nearly impossible once recorded[4].Although every transaction is visible to all network nodes,blockchain offers transactional privacy by allowing participants to employ anonymous addresses.Moreover,the rise of blockchain has seen the introduction of smart contracts automated contractual mechanisms triggered by specific conditions,broadening its application domain [5].Data consistency across nodes is achieved using a consensus mechanism,a pivotal component that validates adding new blocks to the chain[6].

    Data consistency across nodes is achieved using a consensus mechanism,a pivotal component that validates adding new blocks to the chain [7].While advantageous,the decentralized nature of blockchain technology also attracts cyber attackers aiming to exploit its structure and compromise its security using DDoS assaults.In blockchain’s vast and dynamic data streams,capturing intricate DDoS attack patterns using a single detection model is inherently challenging.Undetected or inadequately addressed attacks can have disastrous consequences,both financially and reputationally.The industry’s key challenges revolve around developing detection techniques that are precise,adaptable,and able to seamlessly combine various models for a comprehensive defense against DDoS attacks[8].Attackers initiate attacks by manipulating a substantial quantity of compromised computers,frequently in a decentralized fashion,to amplify the attack’s magnitude [9].These assaults can potentially result in network congestion,increased latency,and service disruptions and present a significant risk to the availability and performance of the network [10].Hence,the study and safeguarding of DDoS assaults has significant significance.

    Blockchain technology has been widely adopted in many industries due to its decentralized nature,security,and transparency.However,its popularity has also become a target for cyber attackers,especially DDoS attacks.These attacks aim to weaken the decentralized structure of blockchain,reducing its security and stability.Blockchain data is complex and always changing.This makes it hard for a single detection system to identify and respond to sophisticated attack patterns.If these DDoS attacks are not detected and stopped,they can completely shut down a system.This leads to financial losses and damages the reputation of users and organizations involved.

    There are several challenges in this field:

    1.DDoS attack detection must be achieved more quickly and accurately,even as the data changes.

    2.The detection models are not supposed to become too specialized so they can handle new types of attacks.

    3.Different models must combine and respond effectively to DDoS attacks,using each model’s strengths best.

    2 Related Work

    Machine learning has emerged as a formidable defense against DDoS attacks.It is proficient in extracting critical network traffic characteristics,swiftly adapting to novel attack patterns,and delivering high-precision real-time responses.Such capabilities reduce the need for human intervention and ensure continuous learning and optimization,making machine learning a pivotal tool in the cybersecurity landscape[11].

    In blockchain ecosystems,machine learning,being inherently data-centric,showcases considerable promise.With their complex and ever-evolving nature,Blockchain networks often stump traditional detection techniques.However,with machine learning’s adeptness at using historical data to differentiate between regular and anomalous traffic patterns,the timely identification of DDoS assaults becomes feasible [12,13].This adaptability ensures that the system remains consistent in its performance,even when faced with the evolving tactics of attackers.ng techniques employed by attackers,hence ensuring consistent and effective detection performance.

    The academic realm,too,acknowledges the potency of machine learning in detecting DDoS assaults,especially within the blockchain technology framework [14].There is an anticipated rise in machine learning techniques,given their potential to heighten detection accuracy and ensure real-time mitigation of the negative impacts of assaults on blockchain networks[15].The inherent automation in machine learning also underscores its potential to diminish human involvement and curtail related expenses[16].

    Deep learning,a subset of machine learning,amplifies these capabilities.As seen in [17],deep learning can extract and process features autonomously,ensuring robust representation.While DDoS attacks aim to incapacitate applications [18],strategies like the one proposed in [19],which blends blockchain technology with deep learning,can significantly elevate the defense mechanisms of public transport systems against cyber threats.The efficacy of such approaches is evident,with F1 scores consistently surpassing the 95%mark.

    Innovative approaches like integrating virtual reality anti-DDoS chains,distributed detection frameworks,and hybrid learning have been proposed to tackle new-age DDoS threats in blockchain networks [10].Techniques like AdaBoost and Random Forest have showcased their prowess in discerning DDoS attack patterns in P2P networks.The suggested approach in [20] addresses the limitations of single-target detection and privacy concerns by utilizing federated learning multidomain DDoS detection.The implementation of blockchain-based reputation assessment is proposed to enhance the resilience and reliability of existing systems.The experimental results demonstrate a precision level above 95%.Reference[21]presented a proposal for integrated solutions that leverage Software-Defined Networking(SDN),blockchain technology,and machine learning techniques.The aim is to enhance the security of Internet of Things (IoT) systems and bolster the detection and mitigation of DDoS attacks.The LSTM-CGAN method produced LDDoS adversarial samples to improve the detection model’s robustness for blockchain wireless networks [22].In [23],integrating blockchain technology and machine learning algorithms is suggested to establish a layered architecture for safe applications in the Industrial Internet of Things (IIoT) within the context of intelligent manufacturing.This architecture aims to facilitate attack detection and sensor access control.In[24],a blockchain-based permission system that utilizes lightweight technology uses the quorum Physical Unclonable Function (PUF) model to secure key pairs of IoT devices.The collaborative detection system using machine learning integration technology detects DDoS attacks on IoT devices,providing lower false positive rates and better detection rates.At the same time,through the blockchain system,alarm information is securely shared with all nodes of the IoT network.Reference [25] presented a novel approach utilizing deep learning techniques with optimization methods,blockchain technology,and smart contracts to enhance the detection and mitigation of DDoS assaults.This study proposes the integration of user requests,smart contract verification,and using Poaching Raptor to optimize DNN designed explicitly for attack detection purposes.The approach demonstrated a performance of 96.3% in recall,98.22% in precision,3.33% in false alarm rate,and 95.12% in accuracy rate.Reference [26] introduced a novel approach to asynchronous federated learning using blockchain technology.The suggested system incorporates a blockchain-based asynchronous federated learning scheme with a dynamic scaling factor(DBAFL),to enhance the efficiency,reliability,and performance of continuously updating traffic prediction models in the context of smart public transportation.Reference[27]introduced a novel intrusion detection system(IDS)inside the framework of distributed fog computing.The primary objective of this IDS is to identify and mitigate DDoS assaults,specifically targeting mining pools in blockchain-based IoT networks.The verification of model validity involves the training of Random Forest and eXtreme Gradient Boosting(XGBoost)algorithms on distributed fog nodes.Based on the analysis conducted using the BoT-IoT dataset,it is evident that XGBoost outperforms in the context of two-class attack detection.In contrast,Random Forest exhibits superior performance in multi-classification attack detection.In response to the issue of DDoS attacks in the context of the IIoT,reference [28] presented a novel approach for mitigating such attacks.The suggested approach involves the integration of a multi-point collaborative defense mechanism,which comprises an edge detection mechanism and a blockchain-based collaborative defense model.The implementation of blockchain technology facilitates defensive information sharing.Additionally,the proposed rapid-sharing method effectively mitigates the latency in information propagation.The simulation results confirm the efficacy of the edge detection and quick-sharing mechanism.

    Diving into ensemble learning,it serves as a beacon in machine learning that aims to bolster performance by amalgamating predictions from various foundational models.The essence of ensemble learning is to counteract overfitting and magnify a model’s robustness and accuracy.Studies such as[29–31]have delved into this domain,presenting innovative ensemble learning methods that have showcased remarkable efficiency and accuracy over traditional models.

    Machine learning has significantly enhanced DDoS attack detection in blockchain systems.However,its full potential still needs to be explored,primarily due to the complexity of blockchain network traffic and insufficient integration of ensemble learning methods in research.Given the evolving nature of these attacks,traditional detection methods often need to catch up.Despite isolated studies highlighting machine learning’s capability in this realm,a comprehensive ensemble-based strategy remains elusive.Our work addresses this gap by introducing a robust ensemble learning method,combining GRU,CNN,LSTM,DNN,and SVM models.This integrated approach promises superior accuracy in detecting DDoS patterns over individual models,particularly in the intricate environment of blockchain networks.With the added advantage of dynamic weight adjustments,our system can swiftly adapt to changing network scenarios,ensuring consistent defense against everevolving DDoS tactics.In essence,by marrying ensemble learning with dynamic adjustments,we aim to elevate the resilience and security of blockchain systems against DDoS threats.

    3 Background

    3.1 Blockchain

    Blockchain technology works as a distributed and decentralized digital ledger,which has been later utilized in the context of cryptocurrencies like Bitcoin[32].The fundamental premise involves establishing a connection between transactional data,represented as blocks,to construct a continuously expanding chain-like structure.Encryption in blockchain technology guarantees the integrity and confidentiality of data.At the same time,the absence of a central authority mitigates the vulnerability associated with a singular point of failure commonly found in conventional centralized systems[33].

    In recent years,the technology known as blockchain has garnered significant attention and practical implementation due to its disruptive nature.This has resulted in substantial academic interest in the topic.The fundamental concept underlying this initiative is the establishment of a decentralized,safe,and reliable platform for storing and selling data,incorporating several distinctive attributes,which can be summarized as follows:

    (1) The decentralized nature of blockchain technology eliminates the need for intermediaries in traditional centralized systems,allowing for direct peer-to-peer connection.This enhances transaction efficiency and mitigates the risks and costs associated with intermediary connections,enhancing the efficiency and transparency of data sharing.

    (2)The blockchain’s transparency and immutability ensure data security and dependability.Every transaction and piece of information is systematically organized into a block in the blockchain system.Each block is designed to include the data from the preceding block,resulting in an interconnected chain structure that cannot be separated.Encryption and consensus procedures enable individuals to authenticate and trace the chronological sequence of a specific transaction,hence ensuring the reliability and credibility of transactional information.

    (3) The smart contract features of the blockchain enable automated execution.Smart contracts refer to pre-programmed code enabling operations automation by specific criteria,hence obviating third-party intervention.This presents novel opportunities for various business and transaction circumstances,potentially decreasing transaction expenses and expediting the transactional procedure.

    3.2 Dataset and DDoS Attack Categories Selected

    The CIC-DDoS 2019 dataset holds substantial importance within the realm of network security.As a research tool,it significantly advances the detection of DDoS attacks.The distinctiveness of this system resides in the intricate interplay between legitimate and malicious network traffic,which offers valuable data for the training and validation of deep learning models.The dataset holds significant importance as it enables researchers and practitioners to investigate novel detection techniques for effectively discerning tiny deviations between regular network traffic and potential DDoS attack traffic.By conducting a comprehensive analysis of this data from several dimensions,it is anticipated that we would acquire a profound understanding of cyber defense and threat response tactics,thus enhancing the network’s capacity to counter attacks and elevating its overall level of security.

    This work employed the CIC-DDoS2019 dataset to conduct research utilizing machine learning techniques to analyze a range of standard and pathological behaviors,including BENIGN,Lightweight Directory Access Protocol (LDAP),MSSQL,NetWork Basic Input/Output System(NetBIOS),Portmap,Syn,UserDatagramProtocol (UDP),and UDPLag [34].We describe various types of DDoS attacks.

    (1)LDAP:The LDAP protocol may be utilized by hostile actors to engage in nefarious operations,such as the perpetration of LDAP injection attacks.The present attack exploits the utilization of LDAP query structures to carry out malevolent activities that can result in many concerns,including but not limited to the revealing of sensitive information,bypassing authentication mechanisms,or causing a denial of service.

    (2) MSSQL: This attack capitalizes on a weakness inside an application,wherein it inserts malicious SQL queries into database activities.This has the potential to result in unauthorized access and release.

    (3) NetBIOS: NetBIOS has the potential to be implicated in perpetuating NetBIOS Name Service(NBNS)spoofing attacks.Adversaries falsify genuine hosts by transmitting counterfeit NBNS answers,potentially facilitating man-in-the-middle attacks or pilfering sensitive information.

    (4)Portmap:Portmap has been identified as potentially associated with Remote Procedure Call(RPC)attacks.An assailant can use the RPC vulnerability to transmit malevolent requests,perhaps resulting in unauthorized entry or the execution of remote code.

    (5)Syn:The attack leverages the vulnerability present in the Transmission Control Protocol(TCP)protocol to deplete server resources and induce service unavailability.This is achieved by inundating the server with a substantial volume of incomplete connection requests during the handshake process.

    (6) UDP: Transmitting a significant quantity of UDP packets enables the assailant to forgo establishing a connection.This results in an excessive burden on the server,thereby impacting the provision of services.

    (7)UDPLag:In contrast to conventional UDP attacks,the UDPLag attackers employ the source IP address spoofing technique to induce response traffic directed towards the target of the attack,hence intensifying the impact of the attack.Various strategies can be employed to counteract UDPLag attacks.

    4 An Adaptive DDoS Attack Detection Based on Multiple Models

    In this section,Section 4.1,a comprehensive preprocessing of the CIC-DDoS2019 dataset is conducted.The dataset is carefully examined,specific data instances are chosen and organized,and appropriate transformations and filters are applied.Following data preparation,Section 4.2 comprehensively describes five distinct single models specifically tailored to extract features and recognize patterns associated with DDoS attacks.These models include GRU,CNN,LSTM,DNN,and SVM.Nevertheless,owing to the constraints associated with employing a solitary model to depict diverse DDoS attacks,the third section of this paper introduces a novel approach for detecting such attacks.This approach integrates five distinct models on each blockchain node,enhancing the detection process’s precision and dependability.Furthermore,to enhance the precision of classification,Section 4.4 presents an adaptive multi-model classification approach that employs a soft voting mechanism to average the prediction probabilities of each model.This technique aims to enhance the overall prediction outcome.Fig.1 is the schematic diagram.

    4.1 Data Pre-Process

    This study’s data selection process adheres to the criteria above,wherein 10,500 instances labeled as BENIGN are chosen.Additionally,1,500 pieces from each of the following categories,LDAP,MSSQL,NetBIOS,Portmap,Syn,UDP,and UDPLag,are utilized as inputs for the model model.As depicted in Fig.2,the left pie chart equitably represents data of instances that were attackedvs.those that were not,each accounting for 50%.The right chart provides a balanced delineation of seven distinct attack types—LDAP,MSSQL,NetBIOS,Portmap,Syn,UDP,and UDPLag—each constituting 14.3% of the total dataset.This comprehensive distribution ensures the model’s unbiased generalization across diverse cyber threats.In the process of file loading,we have devised two approaches:large file loading and small file loading.Specifically,when the model input interface identifies a file of considerable size,it will be loaded in segments based on the timestamp.This approach offers the benefits of enhancing model efficiency and redundancy.Several labels,such as“Infinity”,“np.inf”,and“nan”,have been substituted by zeros.Moreover,it is necessary to convert the formats of“Flow Packets/s”and“Flow Bytes/s”.The correlation was computed,followed by the removal of invalid columns.The decision tree filtering method was then employed to eliminate 14 features from the initial 87 feature quantities in the CIC-DDoS2019 dataset[35].The features are categorized based on their level of significance.The overall count encompasses the subsequent attributes:The features of interest in this context include the Source Port,Destination Port,Protocol,Total Forward Packets,Total Backward Packets,Forward Packet Length,Backward Packet Length Max,Flow Bytes/s,Flow IAT Mean,Flow IAT Std,Max Packet Length,ACK Flag Count,URG Flag Count,Inbound,14 features in total.Ultimately,we successfully conserved and modernized the timestamps to facilitate subsequent modeling utilizing time-series processing techniques.

    Figure 1:Schematic diagram

    Figure 2:Data division scale chart for detection and classification

    Correlation computations were employed to assess the association between data features.In light of the provided information,specific columns deemed invalid or unnecessary were removed to enhance the model’s efficacy and precision while reducing its complexity.

    4.2 Single-Model Detection and Classification Methods

    In the rapidly evolving domain of cyber-attacks,the detection and mitigation of DDoS attacks necessitate models that can handle vast amounts of data,recognize subtle patterns,and adapt over time.Traditional methods,while foundational,are not fully equipped to handle the dynamic nature of DDoS attacks and their rapidly changing patterns.The models chosen for this study—GRU,CNN,LSTM,DNN,and SVM—represent a blend of classical machine learning and modern deep learning techniques.Each of these models offers distinct advantages tailored for DDoS detection.

    GRU and LSTM,as variants of recurrent neural networks(RNNs),excel in processing sequence data,capturing long-range dependencies,and retaining memory of past events,which is crucial for analyzing continuous network traffic.CNN excels at automatically extracting hierarchical features from raw data,especially useful when the nature of the attack can be discerned from local patterns.DNN provides a deep,layered approach to model complex non-linear relationships in the data,ensuring that subtle attack patterns hidden in vast traffic data are captured.SVM,a classical machine learning algorithm,shines in its ability to distinctly separate attack traffic from normal traffic,ensuring a clear demarcation for detection.

    Combining the strengths of these models allows us to create a comprehensive DDoS detection system that not only addresses the limitations of traditional methods but also leverages the benefits of state-of-the-art techniques.This holistic approach promises improved detection rates and reduced false positives,vital for maintaining the integrity and efficiency of network systems.

    4.2.1 GRU

    The GRU is a modified version of the RNN used for sequence modeling.It addresses the gradient vanishing issue in regular RNNs when dealing with extended sequences and offers improved modeling capabilities.The GRU incorporates a gating system that facilitates the management of memory cell states by dynamically controlling the gating unit.This mechanism enables the GRU to efficiently capture long-range dependencies within a sequence by facilitating the renewal and forgetting of memory cell states[36].

    The primary idea behind the GRU is the use of two locking units,called the Reset Gate and the Update Gate.These two gating methods control how much the previous hidden state and the current input are fused and check if the previous hidden state needs to be changed to match the current hidden state.

    The calculation for the reset door(r_t)is as follows:

    Among the variables under consideration,xtrepresents the input at present,ht-1denotes the hidden state at the preceding time step,WirandWhrcorrespond to the weights associated with the input and hidden states whilebirandbhrrepresent the biases.

    The formula for calculating the update gate(z_t)is as follows:

    The calculation of the candidate concealed state ?htcan be achieved by the process of resetting and updating the gate.

    The calculation of the hidden statehtat the current time step is performed by updating the gate.

    This study presents the development of a GRU network model specifically designed to detect and mitigate DDoS attacks.

    The GRU model in this paper consists of an input layer,which maps the input sequence as a lowdimensional vector,and a GRU layer,which has a unit of 64 hidden neurons to efficiently capture the critical features of the sequence.This is followed by a dense layer that maps the result to[0,1]via the Sigmoid function to perform detection.In the training stage,based on the binary_crossentropy loss function and Adam optimizer,the model is iteratively trained for ten epochs on the embedded X_train sequence and the corresponding y_train labels,and each batch contains 64 samples so that the model can sequence data analysis and detection tasks.

    4.2.2 CNN

    CNNs work by automatically pulling out features from raw data using convolutional procedures.For CNNs,convolution processes are the most essential building blocks.The input data is put through the convolution process to get local features [37].This is achieved by sliding a convolution kernel across the input data.The process of obtaining the output feature map involves the element-wise multiplication of the convolution kernel with each local area of the input data,followed by the summation of the results.This procedure can capture the local properties of DDoS data.

    The formula used to calculate convolution operations is as follows:

    S(i,j) represents the pixel value of the output feature map,I(i+m,j+n) represents the pixel value of the input data,andK(m,n)represents the weight of the convolution kernel.

    We design a CNN net model with the development of the structure of multi-layer convolutional and pooling layers.The CNN model designed in this paper mainly comprises a convolutional layer,pooling layer,flattening layer and dense layer,which is used for detection tasks.First,the model’s input is an image with the number of features,and the sequence length,in which the convolutional layer uses 32 convolution kernels of size three and the ReLU activation function to extract the image features.Next,a pooled kernel of size two is used for maximum pooling to reduce the size of the feature map.This is followed by 64 convolution kernels of size three and the ReLU activation function for convolution operations,and maximum pooling is performed again.After feature extraction,the multidimensional feature map is converted into a one-dimensional vector by flattening the layer to prepare for subsequent classification.The final dense layer contains a neuron and applies the Sigmoid activation function,mapping the output to the range of[0,1]for detection with these steps.The training phase of the model uses the binary_crossentropy loss function and the Adam optimizer.Ten epochs were trained on the training set X_train_cnn and corresponding label y_train,with a size 64 per batch.The model can learn to extract features from the input image and perform efficient DDoS detection.The pooling layer decreases the data’s dimensionality by downsampling the input feature map.This downsampling technique allows for the retention of crucial information while also minimizing the computational workload.

    4.2.3 LSTM

    The LSTM model is good at spotting patterns in network traffic data,helping to find potential attacks.It uses a unique gate in its structure,allowing it to remember critical long-term patterns and ignore unnecessary input.This approach boosts the accuracy of detecting attacks.The calculation formula for Forget Gate is as follows:

    In the given formula,the hidden state of the previous moment is denoted asht-1,the input at the present moment is denoted asxt,the weight is denoted asWf,the bias is denoted asbf,and the sigmoid function is denoted asσ.

    The calculation formula for Input Gate is as follows:

    whereitis the Input Gate,is a new candidate cell state.

    By utilizing the forgetting gate and the input gate,it becomes possible to compute a fresh cell state

    The calculation formula for Output Gate is as follows:

    Ultimately,calculating the hidden state at the moment is achieved by generating of the gate and cell state outputsht.

    In DDoS detection,the LSTM model analyzes network traffic data as an input sequence.This model effectively learns and identifies patterns within the traffic data by iteratively processing the inputs at each sequential time step[38].The LSTM network changes the state of its cells dynamically in reaction to changes in the flow data that comes in.This is done to look for possible signs of attacks.By teaching the LSTM model,the neural network can learn about standard traffic patterns and quickly spot traffic cases that do not follow these patterns.Such changes could mean strange traffic patterns,a sign of DDoS attacks.Its ability to handle temporal data sequences well and successfully record long-term interdependencies makes LSTM useful for finding DDoS attacks.With LSTM models,you can use gating methods to control the data flow.These models benefit cybersecurity because they can find possible security holes independently.

    The development of the LSTM model,as outlined in this study,is structured as follows: the input layer resembles to the GRU model since it receives input data and subsequently transforms it into low-dimensional vectors.Subsequently,the LSTM layer is employed,comprising a unit of 64 hidden neurons that effectively capture long-term dependencies within sequential data.Following the preceding layer,a densely connected layer consists of a single neuron.This neuron employs the Sigmoid activation function to transform the output values into the interval [0,1].This specific activation function is commonly utilized in DDoS detection tasks.Regarding the training process,ten epochs were executed on the training dataset,denoted as X_train,along with its associated labels,y_train.The binary_crossentropy loss function and the Adam optimizer were employed during this training procedure.Each batch consisted of 64 samples.Through this architectural design,the model undergoes training to comprehend and recognize extended patterns within sequential data,enabling it to execute DDoS detection tasks effectively.

    4.2.4 DNN

    The fundamental concept underlying DNN is the automated extraction of high-level features using multi-layer neural networks.This enables the nonlinear modeling of network traffic data,facilitating the identification of potential attack patterns[39].DNNs are composed of several hidden layers,with each layer including numerous neurons.In a DNN,every individual neuron takes input from the preceding layer of neurons and executes a nonlinear mapping using the activation function.The resulting output is then transmitted to the subsequent layer of neurons.DNNs can acquire higherlevel feature representations from the initial input data using a complex,multi-layered cascading structure.

    The mapping of input layers to one hidden layer can be expressed as:

    wherexrepresents the input data,W1andb1represent the weight and bias,respectively,andσrepresents the activation function.

    The mapping from hidden layer to output layer is:

    In DNNs,the weights and biases are changed repeatedly with the backpropagation method.The loss function is made as small as possible to make this change,which makes the model work better overall.To see if there is a DDoS attack,you need to put in data that shows how network traffic works.The process’s goal is to produce a result that states whether the observed network data is an indication of an attack or not.Because a deep neural network can map data in a way that is not linear,it is possible to find complicated patterns and features that can be used to spot DDoS attacks.DNNs can make it easier for the model to explain itself and get better feature extraction by adding more hidden layers.With a lot of training data,DNNs can learn on their own about different kinds of threats.In short,DNN uses neural networks’multi-layer structure to automatically pull out complex traits from network traffic data.This makes it possible to find and sort DDoS strikes into different groups.As a spy tool,this one is useful because it can handle nonlinear modeling well.

    The DNN model presented in this study incorporates an input layer that consists of a neuron count equivalent to the number of features,hence facilitating the reception of input data.The subsequent architecture consists of two concealed layers,each comprising 64 and 32 neurons,respectively.These layers are responsible for incorporating non-linear characteristics into the model by utilizing the rectified linear unit (ReLU) activation function,hence augmenting the model’s ability to represent complex relationships.The output layer is comprised of a single neuron that employs the Sigmoid activation function in order to transfer the output values to a range between 0 and 1.Regarding the training process,the model employs the “Adam” loss function,undergoes a maximum of 100 iterations,and utilizes the training dataset denoted as X_train and y_train.By utilizing these specified configurations,the model demonstrates the capability to acquire knowledge about patterns within the dataset,hence enabling it to achieve precise DDoS detection.

    4.2.5 SVM

    The principle of SVM is to separate different categories of data by building a hyperplane to achieve the classification of attack traffic and normal traffic.The fundamental concept behind SVM is the identification of a hyperplane that maximizes the distance between the hyperplane and the nearest data point,also known as the support vector.In the context of a DDoS detection task,the objective of SVM is to identify an ideal hyperplane that may be mathematically represented as[40]:

    wherewis the normal vector andbis the bias,wandbare optimized by classifying the data points.The mathematical principle of the SVM can be represented by the following formula,where yi denotes the label assigned to the data point(with 1 indicating an attacked instance and 0 indicating an instance that is not attacked).

    To find DDoS attacks,SVMs learn about a hyperplane and can tell the difference between attack data and normal traffic.The SVM algorithm is used to turn data about network traffic into a feature space with many variables.Finding a hyperplane in the feature space that successfully separates and distinguishes between different types of data is part of this process.By building a hyperplane,the SVM algorithm can tell the difference between DDoS attack traffic and normal traffic.The widening of the interval makes it possible to classify things well even when the data is spread out in a complicated way.This makes it a powerful tool for finding DDoS attacks.

    The optimization goal of SVM is to maximize the interval,that is,to maximize,equivalent to minimize‖w‖2,wandbcan be solved by solving the Lagrange multiplier method to obtain the duality problem.

    The SVM model employed in this study utilizes linear kernels and is trained using training datasets(X_train and y_train)using linear kernels and the parameter“probability=True”.Regarding performance evaluation,the test set’s true label and the predicted label generated by the SVM model were thoroughly assessed.

    4.3 Integrated Multi-Model Detection Method

    Ensemble learning forms the bedrock of our research’s theoretical framework,underscoring the idea that the amalgamation of multiple models can yield predictions superior in accuracy and reliability than a singular model.This concept,which synergistically integrates diverse learning algorithms or multiple iterations of a similar algorithm,offers a fortified prediction model,making it particularly vital given the multifaceted and evolving nature of DDoS attacks.A singular model approach can inadvertently overlook certain nuances,creating vulnerabilities;however,ensemble learning,rooted in diversifying model perspectives,ensures comprehensive coverage against a vast array of cyber threats.Additionally,the ensemble framework inherently operates on consensus-building,a principle where individual model outputs culminate in a weighted,collective decision.This resonates seamlessly with the decentralized consensus mechanisms inherent in blockchain,further solidifying ensemble learning as an optimal choice for our proposed DDoS detection within blockchain networks.In harnessing the collective prowess of multiple models through this theoretical lens,we bolster detection accuracy and craft a system primed for resilience against the dynamic challenges posed by DDoS threats.

    This research paper presents a new approach for detecting DDoS attacks.The proposed method involves integrating the detection mechanism into blockchain networks,aiming to enhance the precision and dependability of the detection process.The limitations of traditional single models in effectively representing the various forms of DDoS attacks have prompted us to develop a set of five distinct specialized models on each blockchain node.In the event of a network assault,individual nodes operate autonomously,executing their own models and afterward employing a hard voting process to ascertain the presence of a DDoS attack.The use of a multi-model ensemble technique has exhibited considerable advancement in augmenting the accuracy of detection.The reliability and resilience of detection can be enhanced by capturing attack fingerprints from several dimensions through the joint efforts of various models [38].The assumption is made that the integration of models can enhance performance in a linear manner without considering potential redundancies or complementarities that may exist between the models.

    In contrast to conventional centralized detection methods,our proposed methodology incorporates an ensemble model within a blockchain network.One notable benefit of this approach is its ability to fully leverage the decentralized nature of blockchain technology.Every node operates autonomously,mitigating the potential vulnerability of a singular point of failure.In the event of an attack,nodes achieve consensus through a process of hard voting,hence bolstering the confidence of the detection outcomes.

    Furthermore,the novelty of this approach is also evident in the development of customized models for DDoS attacks.Every model has been adjusted to cater to its specific requirements,hence enhancing its adaptability of DDoS attack detection.The use of this particular design enables our approach to showcase its superiority in terms of both detection accuracy and efficiency.

    As shown in Fig.3,this paper uses the five learning models designed above to detect DDoS attacks,which can be summarized as follows:

    In this paper,N=5,represents the final prediction result of the ensemble model for a sample DDoS attack.jhas a selection of 1 of 0,which means the model detects the attack or not.argmaxjmeans the result referred to the max count of the responding prediction of each model.represents the prediction result of theith machine learning model.jis the label of the possible resultis an indication function,when=j,it is 1,otherwise is 0.

    4.4 Adaptive Multi-Model Classification Method

    The ensemble classification model for DDoS assaults incorporates multi-model techniques in order to enhance the resilience and precision of the model.In the initial phase,a hard voting method was employed,which disregards the model’s projected probability and instead makes judgments solely based on the label category of the final prediction.The categorization label for each sample was established by applying the principle of “majority vote” to the labels provided by each underlying model.Nevertheless,this particular methodology fails to consider the amount of confidence associated with the predictions made by the model.In order to address this issue,we propose the implementation of a soft voting mechanism.This mechanism enhances the accuracy of the final prediction outcome by averaging the probability distribution of predictions from each individual model.

    Figure 3:DDoS attack detection architecture diagram

    In the event of a network attack,each node autonomously executes its respective models to evaluate the condition of the network.The rigorous voting procedure entails a straightforward application of the majority rule,wherein every node casts a vote to determine the occurrence of an attack.In the event that a significant number of nodes collectively ascertain the presence of an attack,the entire network will achieve a consensus and consequently conclude that an attack is truly taking place.This methodology leverages the decentralized characteristics of blockchain technology to enhance the reliability of detection.Additionally,it augments the confidence level of detection outcomes by employing a collective decision-making technique.The implementation of an autonomous assessment of each node,followed by a rigorous voting mechanism,enhances the precision and resilience in the detection and mitigation of DDoS assaults.

    It is important to acknowledge that we also take into account the temporal aspects of DDoS traffic data.Specifically,we organize the data using sliding window time slices and compute a set of weights for each time slice.In each batch,there are 150 test samples,and the model initially computes the prediction accuracy of the individual submodels.If the accuracy of the forecast surpasses a predefined threshold,such as 0.8,the weight assigned to the submodel remains unaltered.Conversely,if the accuracy falls below the threshold,the weight assigned to the submodel is adjusted to zero.The weights are subsequently normalized and employed for weighted soft voting in the present batch.Subsequently,these weights are employed in a weighted averaging process,enabling the model to adjust to the varying attributes that may be present in the data across different time intervals.

    Ultimately,the weights of each individual batch are combined by averaging to yield a global weight vector.In order to enhance the performance of the model,an objective function is formulated that utilizes negative accuracy as a loss metric.This choice is motivated by the aim to maximize the accuracy of the model.The constraint guarantees that the total sum of weights equals 1.After undergoing several iterations,an optimized set of weights is obtained for the ultimate weighted soft vote.This facilitates the achievement of more precise categorization in various situations.This collection of approaches integrates the benefits of hard voting and soft voting while also incorporating considerations for time dependency and model confidence.As a result,it achieves an effective and precise system for detecting DDoS attacks,demonstrating both efficiency and accuracy.

    As shown in Fig.4,we divide the data into segments after arranging them according to the time series,as shown in the figure,we divide them intoNsegments,representingNconsecutive moments,and at each moment,we can get a classification result according toN=5 models,expressed by the formula:

    Figure 4:DDoS attack classification architecture diagram

    k>2,we first get the prediction accuracy of each individual model at that momentk,which we define asRi_k,we select the model thatRi_kgreater than the correct detection threshold,and set the others to 0,that is,do not participate in the fusion of weights.It can be expressed as:

    We apply the sliding window for adaptive allocation of weights,we choose the sliding window width asd,then

    The advantage of this is that the iteration weights can be continuously updated in the time series,which not only contains the forecast information of each model at this moment.It also contains model information for the previous time period.

    5 Simulation and Analysis

    5.1 Detection Results and Analysis

    The initial step involves loading the preprocessed dataset and subsequently saving the extracted features and corresponding labels.The characteristics are subsequently normalized using the Min-MaxScaler technique in order to guarantee that they fall within a consistent range of values.Next,the dataset is partitioned into a training set and a test set using the train_test_split function,with the test set comprising 20%of the total dataset.The model architecture for each model,namely GRU,CNN,LSTM,DNN,and SVM,is specified,and the relevant parameters are configured.Subsequently,the models are trained,and the performance metrics are monitored and recorded during the training process.Subsequently,the model that has undergone training is employed to generate predictions on the test dataset and subsequently evaluate its performance by computing metrics such as accuracy,precision,recall,and F1 score.The Results DataFrame contains the performance results and names of each model.Furthermore,a class called KerasClassifierWrapper was implemented to encapsulate the Keras model into a model that is compatible with the sklearn interface,specifically designed for constructing hard-voting ensemble models.A soft voting ensemble approach is generated by doing calculations to determine the anticipated probability of the model.Ultimately,the performance metrics of the ensemble model are computed.The performance data of all models and method names are consolidated into a DataFrame.The performance data of each individual model and ensemble method is then presented through the printed output.

    We analyze using common evaluation metrics:Accuracy,Precision,Recall,and F1 score.

    (1)Accuracy:The ratio of the number of correct predictions to the number of all predictions.

    (2) Precision: The ratio of positive cases predicted correctly to all positive examples predicted positively.

    (3) Recall: The ratio of correctly predicted positive examples to all examples that are actually positive.

    (4)F1 score:Harmonic averages of Precision and Recall.

    As shown in Table 1,during the DDoS attack detection evaluation (refer to Table 1),we thoroughly assessed the performance of various models.DNNs stood out,achieving the highest accuracy,precision,and F1 scores—around 0.9988,0.9981,and 0.9988,respectively.The DNN showcased remarkable abilities in accurately identifying DDoS attack traffic.Additionally,CNN and SVM performed exceptionally well,reaching accuracies of approximately 0.9942 and 0.9945,recall values of around 0.9928 and 0.9933,and F1 scores of about 0.9942 and 0.9945,respectively.This suggests that both CNNs and SVMs are promising in detecting and distinguishing DDoS attack patterns,comparable to DNNs,and provide satisfactory results.

    Table 1:Detection performance comparison table

    Nevertheless,the performance of models belonging to the RNN category,such as the GRU and LSTM,was comparatively subpar in the aforementioned evaluation.The GRU model achieved an accuracy of 0.8657,a precision of 0.8159,a recall of 0.9448,and an F1 score of 0.8756.On the other hand,the LSTM model achieved an accuracy of 0.9507,a precision of 0.9588,a recall of 0.9419,and an F1 score of 0.9503.One possible explanation for this phenomenon is that RNN models exhibit inferior performance compared to alternative models when confronted with network traffic characterized by high dimensionality and intricate relationship patterns,hence constraining their overall effectiveness.

    In general,the multi-model adaptive technique that we have suggested has highly satisfactory performance.This strategy effectively allocates weights to each model in order to accommodate various data scenarios,hence enhancing their complementarity in diverse settings.The efficacy of this approach demonstrates that the integration of many models can greatly enhance the precision and dependability of DDoS attack detection,hence offering a robust safeguard for network security.

    5.2 Classification Results and Analysis

    In this part,in order to address the intricate issue of detecting DDoS attacks,we made the decision to incorporate a combination of several models.The underlying principle of this technique is rooted in the notion that distinct machine learning models possess distinct strengths when it comes to handling data with varying features.The integration of numerous models allows for the utilization of the individual strengths possessed by each model,thereby mitigating their respective limitations and ultimately enhancing the total accuracy of detection.Each model,namely GRU,CNN,LSTM,DNN,and SVM,was initially delineated,subsequently trained to utilize the training data,denoted as X_train and y_train.During this procedure,GRU,CNN,and LSTM required the data to be transformed into three-dimensional structures,while DNNs and SVMs employed the raw data without any alterations.Following the training of each model,a subsequent evaluation was conducted using test data(X_test and y_test).Performance metrics,including accuracy,precision,recall,and F1 score,were computed and subsequently stored in the respective DataFrame (e.g.,results_gru,results_cnn,etc.).Furthermore,for the purpose of model integration,the final prediction outcome is determined through a process of hard voting,where the majority category is selected based on the prediction results of each individual model.Optimization algorithms are employed to allocate weights to individual models in order to get optimal ensemble outcomes.The optimized soft voting ensemble model utilizes cross-validation and minimization of the objective function to determine the optimal weights.These weights are then employed to compute the prediction outcomes.

    This paper thoroughly analyzes various models for classifying DDoS attacks into seven categories(shown in Table 2).The GRU model exhibits somewhat subpar performance,with an accuracy and recall of approximately 0.7609,and an F1 score of about 0.7212.In contrast,the CNN model performs notably well,achieving an accuracy and recall of around 0.8590 and an F1 score close to 0.8583,indicating effective categorization of DDoS attack traffic.The LSTM model demonstrates average performance,with an accuracy and recall of roughly 0.8109 and an F1 score near 0.8090.The DNN model stands out with an accuracy and recall of approximately 0.8614 and an F1 score around 0.8602.The SVM model shows satisfactory but slightly less remarkable performance,achieving accuracy and recall values of about 0.8500 and an F1 score of roughly 0.8492.As for ensemble methods,they enhance performance,with soft voting achieving accuracy and recall of around 0.8680 and an F1 score of about 0.8670.The Adaptive Weight Method further optimizes results,posting values close to 0.8762 for accuracy and recall and an F1 score of approximately 0.8756.

    Table 2:Classification performance comparison table

    Fig.5 provides a comprehensive comparison of performance metrics for DDoS classification models,highlighting the robust performance of the DNN model.This representation further emphasizes the superior efficacy of ensemble techniques and the outcomes achieved through optimization methodologies.The model’s notable accuracy,precision,and F1 score serve as evidence of its supremacy.Both CNN and SVM models demonstrate high performance,often comparable to or even surpassing the effects achieved by DNN models.Nevertheless,the performance of the GRU and LSTM models in this particular test was found to be subpar,potentially attributable to their inherent constraints in effectively capturing intricate interactions.Ultimately,the multi-model adaptive method successfully attains desirable outcomes in terms of performance,hence substantiating the efficacy of multi-model fusion in the context of DDoS attack detection.

    Ensemble models exhibit superior capability in managing data diversity and dynamics compared to conventional single-model methodologies,including GRU,CNN,LSTM,DNN,or SVM in isolation.The utilization of this integrated strategy demonstrates enhanced stability and precision when confronted with diverse types of DDoS attacks.Based on the aforementioned findings,it is evident that models such as DNN,CNN,and SVM exhibit commendable performance in terms of detection accuracy.However,it is important to acknowledge that these models may encounter constraints while processing certain data features.By incorporating these models into our framework,we can optimize performance across many scenarios and environments.

    Figure 5:Performance metrics of models of DDoS classification

    5.3 Comparison with Previous Studies

    In the endeavor to identify the most effective methods for DDoS attack detection,it is pivotal to juxtapose contemporary techniques against preceding methodologies.As delineated in Table 3,the proposed method of this study outpaces several other widely-used techniques in terms of classification accuracy.With an impressive accuracy of 99.71%,our method not only exhibits superior performance but also supports segmentation with an efficiency of 87.62%.This is particularly noteworthy considering that certain recognized models,such as Light Gradient Boosting Machine(LightGBM)[41]and SVM[42]do not extend support for segmentation.

    Table 3:Comparative analysis of DDoS attack detection methods

    The inherent strength of our method lies in its unique architectural framework—an ensemble of five models incorporated seamlessly within blockchain nodes,harnessing the potential of decentralized processing.This soft voting technique ensures amplified accuracy,making it a formidable tool in the DDoS detection arsenal.On the contrary,while LightGBM [41] and SVM [42] boast commendable classification accuracies of 99.56% and 99.41%,respectively,they lack the capability to handle segmentation tasks.LightGBM[41]stands out for its economical computational requirements despite ensuring high precision,and SVM[42]is laudable for its real-time anomaly-based intrusion detection proficiency.In contrast,the Na?ve Bayes(NB)[43]algorithm,with its expedient prediction capabilities for test datasets,offers a classification accuracy of 95.14%.

    In this research,we introduced a novel multi-model ensemble technique,drawing its strength from decentralization and autonomy,which substantially surpasses traditional methods in DDoS attack detection.Traditional centralized detection strategies,which inherently rely on a singular point of reference,are often riddled with vulnerabilities.In stark contrast,our approach harnesses the robust nature of decentralized networks.By employing this innovative structure,every node in the system operates with unparalleled autonomy,significantly reducing vulnerabilities typically associated with a singular point of reference.

    The ensemble approach adopted is particularly noteworthy.Different models under this ensemble have unique strengths and capabilities.For instance,while deep neural networks excel in the precise identification of DDoS attack traffic,convolutional neural networks,and support vector machines have their distinct advantages.By seamlessly integrating the strengths of these diverse models,our system ensures a holistic coverage of potential attack patterns.Moreover,ensemble techniques in the realm of machine learning have empirically proven their mettle in enhancing generalization,curtailing biases,and providing a robust defense against overfitting.

    When compared to some previous methodologies that have leaned heavily on singular detection models,our approach emerges as far more adaptive.Singular models,though effective to a degree,often struggle when faced with rapidly evolving attack patterns.This adaptability challenge is what our multi-model ensemble squarely addresses.Additionally,a key drawback of conventional methods lies in their centralized structure.Such systems,due to their inherent design,grapple with scalability constraints and can become easy targets.Our approach,by juxtaposing the detection mechanism within the decentralized fabric of networks,not only sidesteps these challenges but also ensures the system’s swift adaptability to novel threats,safeguarding networks from a diverse array of evolving threats with minimal recalibration.

    6 Conclusion

    In this study,we introduced a groundbreaking ensemble learning strategy that amalgamates the strengths of five diverse machine learning models: GRU,CNN,LSTM,DNN,and SVM.This fusion aims to counteract the intricate patterns of DDoS assaults more effectively than any individual model can.The superiority of this integrated approach,especially in terms of accuracy and speed,becomes evident when confronted with the complex and continuously evolving nature of data traffic,especially within blockchain networks.While the dynamic weight adjustment technique significantly bolsters our approach by curbing overfitting,it simultaneously augments the generalization prowess of the model.However,a comprehensive perspective demands the recognition of inherent limitations.The dataset utilized,although extensive,may not fully encapsulate the complexities of real-world network traffic,thus potentially influencing the model’s real-world generalization and precision.Moreover,as our methodology leans on multiple models,it brings forth challenges in elucidating the combined model’s behavior,especially in practical applications.Future avenues for this research are multifold.We aim to delve deeper into refining detection methodologies tailored specifically for distinct attack patterns in blockchain contexts.Considering the integration of more models and sophisticated algorithms is also on the horizon,aiming to further reinforce the robustness and accuracy of our system.Additionally,the pivotal concern of model interpretability,which remains a frontier in machine learning,will form a cornerstone of our subsequent endeavors.In summation,this research underscores the profound importance of enhancing the defense mechanisms of blockchain technologies.By persistently pushing the boundaries through innovative strategies,we endeavor to make invaluable contributions to fortifying the security landscape of blockchain technology.

    Acknowledgement:We thank Hainan University’s Computer Science and Cyberspace Security Schools and the Hainan Blockchain Technology Center for their resources and support.Our gratitude goes to Hainan Hairui Zhong Chuang Technol Co.,Ltd.,for their collaboration.Special thanks to Qiongtai Normal University and Mengzhe Sun for their contributions.

    Funding Statement:This work was supported by National Natural Science Foundation of China(Grant Nos.62162022 and 62162024),Hainan Provincial Natural Science Foundation of China(Grant Nos.723QN238 and 621RC612).

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:X.Li,J.Cheng;data collection:C.Ruan,B.Zhang,M.Sun;analysis and interpretation of results: X.Li,J.Cheng,X.Tang;draft manuscript preparation: X.Tang,M.Sun.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data is available on https://www.unb.ca/cic/datasets/ddos-2019.html.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    男女之事视频高清在线观看| 国产午夜福利久久久久久| 国产又色又爽无遮挡免费看| 少妇裸体淫交视频免费看高清| 久久性视频一级片| 国产精品 欧美亚洲| 一级毛片精品| 999久久久精品免费观看国产| 婷婷六月久久综合丁香| 舔av片在线| 久99久视频精品免费| 亚洲第一电影网av| 全区人妻精品视频| 久久这里只有精品中国| 免费看十八禁软件| 两个人看的免费小视频| 亚洲精品一卡2卡三卡4卡5卡| 日韩成人在线观看一区二区三区| 噜噜噜噜噜久久久久久91| 精品熟女少妇八av免费久了| 亚洲中文日韩欧美视频| 人人妻,人人澡人人爽秒播| 国产一区二区激情短视频| 久久午夜亚洲精品久久| 免费在线观看日本一区| 999精品在线视频| 五月伊人婷婷丁香| 嫩草影院入口| 一本精品99久久精品77| 亚洲一区二区三区色噜噜| 国产欧美日韩一区二区三| 日韩av在线大香蕉| 欧美极品一区二区三区四区| 色老头精品视频在线观看| 91av网一区二区| 极品教师在线免费播放| 亚洲第一欧美日韩一区二区三区| 亚洲精品粉嫩美女一区| 日韩成人在线观看一区二区三区| 视频区欧美日本亚洲| 性色avwww在线观看| 亚洲第一电影网av| 亚洲一区二区三区色噜噜| 欧美黑人欧美精品刺激| 国产亚洲精品久久久com| 欧洲精品卡2卡3卡4卡5卡区| 精品不卡国产一区二区三区| 免费看a级黄色片| 欧美性猛交╳xxx乱大交人| 热99re8久久精品国产| 国产1区2区3区精品| 日韩欧美 国产精品| 九色成人免费人妻av| 一本久久中文字幕| 亚洲在线观看片| 成年女人看的毛片在线观看| 久久香蕉国产精品| 日本黄色片子视频| 成年版毛片免费区| 在线免费观看的www视频| 高清毛片免费观看视频网站| 亚洲欧洲精品一区二区精品久久久| 国语自产精品视频在线第100页| 久久国产乱子伦精品免费另类| 极品教师在线免费播放| 法律面前人人平等表现在哪些方面| 激情在线观看视频在线高清| 一进一出好大好爽视频| 高清毛片免费观看视频网站| 国产1区2区3区精品| www.自偷自拍.com| 亚洲精品中文字幕一二三四区| 久久精品国产99精品国产亚洲性色| 好看av亚洲va欧美ⅴa在| 日本与韩国留学比较| 国产精品女同一区二区软件 | 天天躁狠狠躁夜夜躁狠狠躁| 亚洲国产精品成人综合色| 成熟少妇高潮喷水视频| 又紧又爽又黄一区二区| 亚洲av美国av| bbb黄色大片| 日日摸夜夜添夜夜添小说| 两个人的视频大全免费| av在线天堂中文字幕| 亚洲成a人片在线一区二区| 在线观看舔阴道视频| 亚洲美女黄片视频| 中国美女看黄片| 黄色丝袜av网址大全| 又黄又爽又免费观看的视频| 国产精品免费一区二区三区在线| 国产美女午夜福利| 超碰成人久久| 亚洲片人在线观看| 免费搜索国产男女视频| av女优亚洲男人天堂 | 亚洲精品美女久久久久99蜜臀| 精品久久久久久久毛片微露脸| 99热6这里只有精品| 91在线观看av| 亚洲美女视频黄频| 欧美色视频一区免费| 国产激情欧美一区二区| 久久久国产欧美日韩av| 精品久久久久久久末码| 国产av麻豆久久久久久久| 男人舔奶头视频| 国产精品女同一区二区软件 | 亚洲精品色激情综合| 久久久色成人| 91九色精品人成在线观看| 亚洲美女黄片视频| 69av精品久久久久久| 黄色丝袜av网址大全| 亚洲中文字幕一区二区三区有码在线看 | 亚洲性夜色夜夜综合| 成年免费大片在线观看| 欧美激情久久久久久爽电影| 国产精品一区二区三区四区久久| 成年免费大片在线观看| 亚洲人成网站在线播放欧美日韩| 亚洲18禁久久av| 国产成人av教育| 欧美日韩国产亚洲二区| 国产精品香港三级国产av潘金莲| 午夜精品在线福利| 国产午夜精品论理片| 国内揄拍国产精品人妻在线| 久久午夜亚洲精品久久| 一个人看视频在线观看www免费 | 国产欧美日韩一区二区精品| 日本熟妇午夜| 在线永久观看黄色视频| 一进一出抽搐动态| 国产毛片a区久久久久| 久久天堂一区二区三区四区| 国产美女午夜福利| 一个人看的www免费观看视频| 丰满人妻一区二区三区视频av | 免费看日本二区| 免费看光身美女| 一区福利在线观看| 成人av在线播放网站| 9191精品国产免费久久| 精品国产美女av久久久久小说| 毛片女人毛片| netflix在线观看网站| 美女午夜性视频免费| 国产精品久久视频播放| 国产av麻豆久久久久久久| 久久久国产欧美日韩av| 真人一进一出gif抽搐免费| 天堂av国产一区二区熟女人妻| 久久国产乱子伦精品免费另类| 欧美xxxx黑人xx丫x性爽| 精品国产乱子伦一区二区三区| 此物有八面人人有两片| 国模一区二区三区四区视频 | 亚洲欧美一区二区三区黑人| 脱女人内裤的视频| 国产不卡一卡二| 久久性视频一级片| 久久久久免费精品人妻一区二区| 久久中文看片网| 亚洲人与动物交配视频| 国产精品1区2区在线观看.| 男女床上黄色一级片免费看| 免费看日本二区| 国产精品久久久久久久电影 | 亚洲中文字幕一区二区三区有码在线看 | 国产激情久久老熟女| 国产精品久久久久久久电影 | 色视频www国产| 欧美日韩瑟瑟在线播放| 国产黄a三级三级三级人| 日本黄色片子视频| 亚洲成人久久性| 少妇裸体淫交视频免费看高清| 精品久久久久久久久久久久久| 每晚都被弄得嗷嗷叫到高潮| 久久亚洲真实| 国产探花在线观看一区二区| 久久婷婷人人爽人人干人人爱| 欧美日韩一级在线毛片| 欧美日韩瑟瑟在线播放| a级毛片a级免费在线| 99久久综合精品五月天人人| 伊人久久大香线蕉亚洲五| 欧美激情在线99| 怎么达到女性高潮| 国产伦精品一区二区三区视频9 | 日本在线视频免费播放| 欧美+亚洲+日韩+国产| 夜夜爽天天搞| 亚洲国产日韩欧美精品在线观看 | 性色avwww在线观看| 看黄色毛片网站| 一a级毛片在线观看| 男人和女人高潮做爰伦理| 国产熟女xx| 一进一出好大好爽视频| 99久久精品国产亚洲精品| 国产精品一区二区精品视频观看| 舔av片在线| 一本精品99久久精品77| 国产一区二区在线观看日韩 | 亚洲精品456在线播放app | www国产在线视频色| 熟女电影av网| 久久久精品欧美日韩精品| 国内久久婷婷六月综合欲色啪| 好男人电影高清在线观看| 色播亚洲综合网| 国产精品电影一区二区三区| 亚洲片人在线观看| 欧美中文日本在线观看视频| 国产三级中文精品| 色精品久久人妻99蜜桃| 亚洲午夜理论影院| 久久精品影院6| 亚洲欧美精品综合久久99| 欧美日韩黄片免| 两个人视频免费观看高清| 国产精品电影一区二区三区| 国产精品免费一区二区三区在线| 国产v大片淫在线免费观看| 每晚都被弄得嗷嗷叫到高潮| 精品久久久久久久末码| 欧美日韩瑟瑟在线播放| 国产精品精品国产色婷婷| 国产精品 欧美亚洲| 人人妻,人人澡人人爽秒播| 高清毛片免费观看视频网站| 国产精品99久久久久久久久| 99在线人妻在线中文字幕| 色综合欧美亚洲国产小说| 两个人的视频大全免费| 男人的好看免费观看在线视频| 国产免费男女视频| 天天添夜夜摸| 99热精品在线国产| 1024香蕉在线观看| 精品无人区乱码1区二区| 在线观看免费视频日本深夜| 两个人视频免费观看高清| 丁香六月欧美| 男女床上黄色一级片免费看| 中文在线观看免费www的网站| 精品久久久久久,| 亚洲国产色片| 精品国产亚洲在线| 欧美成人性av电影在线观看| 欧美日本视频| 亚洲国产欧美人成| 免费观看精品视频网站| 丰满人妻一区二区三区视频av | 淫妇啪啪啪对白视频| 中文字幕人成人乱码亚洲影| 99热6这里只有精品| 动漫黄色视频在线观看| 欧美成人一区二区免费高清观看 | 一本久久中文字幕| 黄色成人免费大全| 一夜夜www| 啦啦啦观看免费观看视频高清| 中文字幕人成人乱码亚洲影| 少妇的丰满在线观看| 1000部很黄的大片| 99riav亚洲国产免费| 在线十欧美十亚洲十日本专区| 欧美日韩中文字幕国产精品一区二区三区| 国内精品久久久久精免费| 一区福利在线观看| 色av中文字幕| 在线视频色国产色| 欧美3d第一页| 国产精品影院久久| 18禁黄网站禁片午夜丰满| 久久精品91蜜桃| 欧美激情在线99| 中文资源天堂在线| 天天添夜夜摸| 亚洲午夜理论影院| 变态另类丝袜制服| 久久久精品大字幕| 在线免费观看的www视频| 国产精品久久电影中文字幕| 色噜噜av男人的天堂激情| 97超级碰碰碰精品色视频在线观看| 亚洲成人久久性| 日韩高清综合在线| 欧美日韩综合久久久久久 | 国产亚洲精品综合一区在线观看| 岛国视频午夜一区免费看| 国产精品 欧美亚洲| 国产精品久久久av美女十八| 最近最新中文字幕大全电影3| 午夜视频精品福利| 成人av在线播放网站| 亚洲电影在线观看av| 亚洲国产欧美一区二区综合| 婷婷亚洲欧美| 黄色视频,在线免费观看| 久久伊人香网站| 日本黄色视频三级网站网址| 亚洲 欧美一区二区三区| 最近最新中文字幕大全电影3| av福利片在线观看| 99热只有精品国产| 非洲黑人性xxxx精品又粗又长| 亚洲va日本ⅴa欧美va伊人久久| 最新中文字幕久久久久 | 好男人在线观看高清免费视频| 可以在线观看毛片的网站| 男人舔奶头视频| 一夜夜www| 亚洲欧美精品综合久久99| 老熟妇乱子伦视频在线观看| 国产又色又爽无遮挡免费看| 中国美女看黄片| 亚洲av中文字字幕乱码综合| 搡老岳熟女国产| 在线观看午夜福利视频| 日日夜夜操网爽| 成人三级黄色视频| 美女cb高潮喷水在线观看 | 亚洲国产欧美人成| 精品午夜福利视频在线观看一区| 午夜福利在线观看免费完整高清在 | 成人无遮挡网站| 亚洲中文日韩欧美视频| 久久精品国产亚洲av香蕉五月| 国产真实乱freesex| 欧美乱色亚洲激情| 91av网一区二区| 两性夫妻黄色片| 国产精品亚洲美女久久久| 国产精品免费一区二区三区在线| 男插女下体视频免费在线播放| 色综合站精品国产| 一卡2卡三卡四卡精品乱码亚洲| 精品国内亚洲2022精品成人| 亚洲成人精品中文字幕电影| 日本 欧美在线| 午夜精品一区二区三区免费看| 91字幕亚洲| 成年人黄色毛片网站| 国内精品一区二区在线观看| 国产黄a三级三级三级人| 精品久久久久久久久久久久久| 神马国产精品三级电影在线观看| 中国美女看黄片| 国产成+人综合+亚洲专区| 亚洲18禁久久av| 熟女少妇亚洲综合色aaa.| 午夜福利高清视频| а√天堂www在线а√下载| av黄色大香蕉| 午夜福利18| 久久久久国内视频| 搞女人的毛片| 一进一出好大好爽视频| 97超级碰碰碰精品色视频在线观看| 午夜两性在线视频| 久久久久久大精品| 久久精品国产99精品国产亚洲性色| 中文亚洲av片在线观看爽| 亚洲熟妇中文字幕五十中出| 免费在线观看亚洲国产| 欧美精品啪啪一区二区三区| 男女做爰动态图高潮gif福利片| 日本一二三区视频观看| 欧美绝顶高潮抽搐喷水| 在线观看一区二区三区| 亚洲九九香蕉| av黄色大香蕉| 成人国产综合亚洲| 18禁国产床啪视频网站| 两人在一起打扑克的视频| 一级黄色大片毛片| 免费大片18禁| 亚洲av成人精品一区久久| 色噜噜av男人的天堂激情| 在线观看免费午夜福利视频| av福利片在线观看| 久久中文字幕一级| 淫妇啪啪啪对白视频| 国产不卡一卡二| 免费在线观看成人毛片| 全区人妻精品视频| 欧美zozozo另类| 亚洲国产日韩欧美精品在线观看 | 色吧在线观看| 欧美最黄视频在线播放免费| 国产精品日韩av在线免费观看| 波多野结衣巨乳人妻| 久久久国产精品麻豆| 韩国av一区二区三区四区| 偷拍熟女少妇极品色| 国产伦一二天堂av在线观看| 日韩av在线大香蕉| 日韩中文字幕欧美一区二区| 欧美色视频一区免费| 日本免费一区二区三区高清不卡| 桃色一区二区三区在线观看| 日韩 欧美 亚洲 中文字幕| 日韩欧美在线二视频| 亚洲激情在线av| 精品久久久久久久久久免费视频| 亚洲精品美女久久av网站| 国产激情欧美一区二区| 99国产综合亚洲精品| 亚洲专区字幕在线| 日本 欧美在线| 亚洲中文字幕日韩| 18禁黄网站禁片午夜丰满| 精品人妻1区二区| 免费看日本二区| 国内揄拍国产精品人妻在线| 天天躁日日操中文字幕| 成人一区二区视频在线观看| 美女黄网站色视频| 91麻豆av在线| 亚洲美女黄片视频| 国产成人av教育| 黑人巨大精品欧美一区二区mp4| 欧美xxxx黑人xx丫x性爽| 久久精品91蜜桃| 一级作爱视频免费观看| 日本与韩国留学比较| 精品日产1卡2卡| 他把我摸到了高潮在线观看| 天堂网av新在线| 成人特级av手机在线观看| 一本综合久久免费| 日本 欧美在线| 精品国产超薄肉色丝袜足j| av女优亚洲男人天堂 | 蜜桃久久精品国产亚洲av| 免费电影在线观看免费观看| 国产精品野战在线观看| 性色av乱码一区二区三区2| 婷婷精品国产亚洲av| 性色avwww在线观看| 亚洲成人久久性| 在线看三级毛片| 午夜福利欧美成人| 两个人看的免费小视频| x7x7x7水蜜桃| 真人做人爱边吃奶动态| 舔av片在线| 熟妇人妻久久中文字幕3abv| 亚洲精华国产精华精| 国产一级毛片七仙女欲春2| 女警被强在线播放| 午夜福利18| 国产久久久一区二区三区| 五月玫瑰六月丁香| 久久久久久久久中文| 亚洲av电影在线进入| 色综合婷婷激情| 久久久久久大精品| 亚洲avbb在线观看| 国产 一区 欧美 日韩| 日韩欧美精品v在线| 非洲黑人性xxxx精品又粗又长| 日韩欧美 国产精品| 国产精品久久视频播放| 国产免费男女视频| 成在线人永久免费视频| 成人欧美大片| 在线免费观看的www视频| 精品99又大又爽又粗少妇毛片 | 国产蜜桃级精品一区二区三区| 亚洲第一欧美日韩一区二区三区| 国产男靠女视频免费网站| 美女 人体艺术 gogo| 日本免费一区二区三区高清不卡| 最近在线观看免费完整版| 日本黄色视频三级网站网址| 丝袜人妻中文字幕| 日本成人三级电影网站| 中亚洲国语对白在线视频| 国产精品99久久99久久久不卡| 18禁美女被吸乳视频| 亚洲自偷自拍图片 自拍| 偷拍熟女少妇极品色| 欧美日本视频| 俄罗斯特黄特色一大片| 又黄又粗又硬又大视频| 99riav亚洲国产免费| 成人国产一区最新在线观看| www.精华液| 久久精品影院6| 搞女人的毛片| 国产亚洲av嫩草精品影院| 女人高潮潮喷娇喘18禁视频| av黄色大香蕉| 久久久精品欧美日韩精品| 一个人看的www免费观看视频| 久久久国产成人免费| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品一区二区免费欧美| 欧美性猛交╳xxx乱大交人| 亚洲专区国产一区二区| 亚洲人与动物交配视频| 国产主播在线观看一区二区| 真人做人爱边吃奶动态| 我要搜黄色片| www日本在线高清视频| 欧美激情在线99| 国产视频一区二区在线看| 高清毛片免费观看视频网站| 成人特级黄色片久久久久久久| 久久久色成人| 精品一区二区三区视频在线观看免费| 又大又爽又粗| 熟女电影av网| 欧美乱妇无乱码| 免费在线观看影片大全网站| 一本一本综合久久| 1000部很黄的大片| 成年人黄色毛片网站| 麻豆久久精品国产亚洲av| 久久久色成人| 一进一出抽搐gif免费好疼| 国产淫片久久久久久久久 | 免费观看的影片在线观看| 亚洲中文字幕一区二区三区有码在线看 | 九色国产91popny在线| 国产精品爽爽va在线观看网站| 黄色成人免费大全| 老司机午夜十八禁免费视频| 国产主播在线观看一区二区| 99久久精品一区二区三区| 啪啪无遮挡十八禁网站| 国产精品综合久久久久久久免费| 婷婷丁香在线五月| 19禁男女啪啪无遮挡网站| 婷婷亚洲欧美| 无人区码免费观看不卡| 久久精品国产亚洲av香蕉五月| 中文字幕av在线有码专区| 夜夜爽天天搞| 国产精品久久久久久亚洲av鲁大| 中文字幕最新亚洲高清| 91av网站免费观看| 人妻夜夜爽99麻豆av| 成人三级做爰电影| 麻豆国产97在线/欧美| 网址你懂的国产日韩在线| 一进一出抽搐动态| 在线永久观看黄色视频| 久久久久免费精品人妻一区二区| 毛片女人毛片| 亚洲国产看品久久| 小蜜桃在线观看免费完整版高清| 久久久久国内视频| 久久久国产欧美日韩av| 免费观看精品视频网站| 99久久无色码亚洲精品果冻| 国产精品影院久久| 日本一本二区三区精品| 最近最新中文字幕大全免费视频| 日韩人妻高清精品专区| 天堂影院成人在线观看| av在线天堂中文字幕| 国产一级毛片七仙女欲春2| 成人三级做爰电影| 久久久久久大精品| 亚洲 欧美 日韩 在线 免费| 99久久综合精品五月天人人| 亚洲中文av在线| 欧美日韩综合久久久久久 | 日韩欧美国产一区二区入口| 国产综合懂色| 少妇裸体淫交视频免费看高清| 三级国产精品欧美在线观看 | 麻豆国产97在线/欧美| 免费av不卡在线播放| 在线看三级毛片| 国产精品一区二区三区四区久久| 成年版毛片免费区| av片东京热男人的天堂| 十八禁网站免费在线| 婷婷亚洲欧美| 免费在线观看成人毛片| 国产高清视频在线观看网站| 曰老女人黄片| xxxwww97欧美| 十八禁网站免费在线| 网址你懂的国产日韩在线| 国产亚洲欧美98| 床上黄色一级片| 女同久久另类99精品国产91| 精品久久蜜臀av无| 久久久国产精品麻豆| 欧美三级亚洲精品| 99热这里只有精品一区 | 看免费av毛片| 欧美成人一区二区免费高清观看 | xxx96com| 亚洲黑人精品在线| 午夜影院日韩av| 日日摸夜夜添夜夜添小说| 俺也久久电影网| 国产又色又爽无遮挡免费看| 欧美高清成人免费视频www| 久久午夜亚洲精品久久| 草草在线视频免费看| 好看av亚洲va欧美ⅴa在| 成人性生交大片免费视频hd| 国产私拍福利视频在线观看| 久久久久国产精品人妻aⅴ院|