• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Functional Pattern-Related Anomaly Detection Approach Collaborating Binary Segmentation with Finite State Machine

    2024-01-12 03:47:26MingWanMingleiHaoJiaweiLiJiangyuanYaoandYanSong
    Computers Materials&Continua 2023年12期

    Ming Wan ,Minglei Hao ,Jiawei Li ,Jiangyuan Yao and Yan Song

    1School of Information,Liaoning University,Shenyang,110036,China

    2School of Computer Science and Technology,Hainan University,Haikou,570228,China

    3School of Physics,Liaoning University,Shenyang,110036,China

    ABSTRACT The process control-oriented threat,which can exploit OT (Operational Technology) vulnerabilities to forcibly insert abnormal control commands or status information,has become one of the most devastating cyber attacks in industrial automation control.To effectively detect this threat,this paper proposes one functional patternrelated anomaly detection approach,which skillfully collaborates the BinSeg (Binary Segmentation) algorithm with FSM(Finite State Machine)to identify anomalies between measuring data and control data.By detecting the change points of measuring data,the BinSeg algorithm is introduced to generate some initial sequence segments,which can be further classified and merged into different functional patterns due to their backward difference means and lengths.After analyzing the pattern association according to the Bayesian network,one functional state transition model based on FSM,which accurately describes the whole control and monitoring process,is constructed as one feasible detection engine.Finally,we use the typical SWaT(Secure Water Treatment)dataset to evaluate the proposed approach,and the experimental results show that:for one thing,compared with other changepoint detection approaches,the BinSeg algorithm can be more suitable for the optimal sequence segmentation of measuring data due to its highest detection accuracy and least consuming time;for another,the proposed approach exhibits relatively excellent detection ability,because the average detection precision,recall rate and F1-score to identify 10 different attacks can reach 0.872,0.982 and 0.896,respectively.

    KEYWORDS Process control-oriented threat;anomaly detection;binary segmentation;FSM

    1 Introduction

    Intelligent control systems have become a popular option for providing industrial automation control in various critical infrastructures,typically including petroleum,power stations,water conservancy,and other supporting fields.Furthermore,it can automatically manage different kinds of control devices and sensors in the industrial production process through various wireless and wired networks,and carry out industrial activities,such as process control,data acquisition,and business management[1,2].In general,industrial automation control,which realizes the integration of computer software,electronic and electrical,mechanical operation,and network communication technologies,has been regarded as one functional core of control systems to ensure more automatic and efficient production and manufacturing.When one control system is running,industrial automation control can set and maintain various system parameters without human operation,and enable these systems to continuously run under the default working state [3].In other words,industrial automation control can realize automatic control,supervision,and optimization of the industrial production process,and improve production efficiency and quality by reducing staffing requirements.However,with the rapid development and deep integration of IT(Information Technology)and OT(Operational Technology),interconnection and intercommunication have been gradually infiltrating into the traditional manufacturing industry,and industrial automation control is also facing huge challenges from information security[4].Moreover,various networks connecting application services with industrial devices have been considered another important piece of control systems,and break down the physical barrier due to the interconnection and intercommunication of networking technologies.As a result,the relatively isolated information island of original control systems abruptly turns into one wide-open and variable-running environment,and industrial specialized software and hardware can be easily invaded and destroyed due to more and more attack entrances and paths.In recent years,many destructive security incidents have occurred frequently all over the world,and industrial cyber threats have become the focus of attention[5,6].

    Essentially,industrial cyber threats put a higher priority on damaging the correctness and availability of industrial automation control,because the incorrect or unavailable control logic in OT systems may result in even worse consequences[7],such as deadly fires and explosions.From a technical perspective,industrial cyber threats are concerned with two aspects:one is the information systemoriented threat,which refers to IT vulnerabilities;the other is the process control-oriented threat,which refers to OT vulnerabilities.Furthermore,the information-oriented threat usually exploits some potential vulnerabilities of IT systems to invade and attack their primary components or function units,and reaches the ultimate destination to steal sensitive information or cause a system crash[8,9].Differently,the process control-oriented threat represents the OT-related attacks whose primary target is to destroy the normal production process when one control system is running smoothly and orderly[10,11].More precisely,this threat may invalidate the production process by forcibly inserting some abnormal control commands,or cause alarm failure or error warning by intentionally changing the alarm threshold [12,13].Typically,when one technological process of production is determined,its automated production line is also supposedly fixed,and the whole production procedure follows one machine-made control and monitoring process according to the specific workflow.Based on this characteristic,once malicious adversaries gain access to the automated production line,they can break the fixed running mode to cause various production operation failures.Therefore,the main characteristics shown by the process control-oriented threat can be summarized as follows:Based on the specific production process,this threat exploits the OT vulnerabilities of control logic relationships between different physical devices,and deploys some IT attack means to launch destructive attacks on process integrity and control availability.According to the information interaction in industrial automation control,the process control-oriented threat can be further classified into two categories:the threat affecting control command delivery and the threat affecting status information acquisition.To be specific,the former usually forges or tampers with some legal control commands which are sent to critical control devices,and results in abnormal or incorrect operations of control devices[9,12].Dissimilarly,the latter always sends some mendacious or wrong field status information to the monitoring center in control systems,and attempts to cause status analysis failures for the whole production procedure[14].

    As one feasible application-level security technology,industrial anomaly detection has received extensive attention and study,and it is mainly classified into two categories: traditional anomaly detection and ML-based (Machine Learning-based) anomaly detection [15,16].Furthermore,one typical example of traditional anomaly detection is to identify abnormal communication behaviors by using the statistical-based or knowledge-based detection approach,which seems to have fine availability and robustness due to its straightforward feature extraction and simplified engine design[17,18].Differently,ML-based anomaly detection belongs to one autonomic and intelligent threat identification technology with relatively complex characteristics,because it usually applies various AI(Artificial Intelligence)algorithms to characterize different data interaction patterns and train one or more high-performance detection engines.Moreover,AI algorithms have excellent self-learning and self-adaptation abilities,which are particularly suitable for analyzing the implicit data correlation and multi-dimensional behavior changes in industrial automation control [19].More specifically,the AI algorithms applied in ML-based anomaly detection largely consist of the traditional machine learning algorithms and the deep learning algorithms:(1)the traditional machine learning algorithms,such as Neural Network [20],Support Vector Method [21],Clustering Algorithm [22],Genetic Algorithm[23] and Decision Tree [24],can offer a fast and convenient detection service due to their lower computational complexity,and are well-suited for the small sample data handling;(2) the deep learning algorithms,such as Long Short-Term Memory [25],Convolutional Neural Network [26]and Recurrent Neural Network [27],can possess excellent learning and adaptive abilities to exploit some potential correlations in a large quantity of data,and jointly execute and optimize the feature representation and classification training by designing some optimization algorithms[28,29].However,these algorithms frequently require more computing resources and greater computing capability due to their high complexity,and may have an adverse effect on detection efficiency.As stated previously,industrial automation control periodically performs customizable operations according to the predefined production procedure,and its characteristics of finite state and stable pattern can tend to generate small-scale sample data[30].Additionally,industrial security requirements also encourage strengthening the time-sensitive defense service due to the severity of the losses [5,31].Therefore,ML-based anomaly detection with simple and efficient algorithms may become one of the preferred solutions in industrial cyber security defense.

    From the perspective of field control and data acquisition,industrial automation control can be performed by three types of critical control devices: controller,sensor,and actuator,and these three devices work together to complete one normal control and monitoring process.Moreover,one representative control and monitoring process may be summarized as follows: First,sensors monitor and collect large sets of measuring data in real-time,and transmit these data to controllers.Second,controllers perform the scheduled logic control algorithm to generate control data,and send this data to actuators.Finally,according to the received control data,actuators execute the corresponding control commands to complete the production operations.In practice,the underlying goal of the process control-oriented threat is to change the original operation behaviors of physical systems by disturbing industrial control logic,and breaks the fixed running mode to destroy the normal production process[12,32].In other words,the running anomaly caused by malicious attacks on three types of critical control devices can further reflect some irregular changes in measuring data and control data when one control system is running.On the one hand,when controllers are under attack,their generated control data may always consist of many abnormal control commands,and cause actuators to execute irregular production operations;on the other hand,when sensors are under attack,their collected measuring data may be maliciously forged or tampered with,and cause controllers to generate abnormal or incorrect control commands [33].From this point of view,anomaly detection,which utilizes various ML-based algorithms to identify the process controloriented threat,has become increasingly a real possibility,and some major studies and explorations have been carried out [34,35].However,these existing studies can still consider the following two points: For one thing,the association relationship between measuring data and control data may have some potential benefits to ensure the completeness and stability of anomaly detection engines;for another,the complexity of ML-based algorithms may bring some effects on detection efficiency and detection coverage.In this paper,we propose one functional pattern-related anomaly detection approach,that skillfully collaborates the change-point detection approach with FSM (Finite State Machine)to identify abnormal behaviors between measuring data and control data.Furthermore,the BinSeg(Binary Segmentation)algorithm is chosen as one optimal change-point detection approach to perform the initial sequence segmentation of measuring data,and all divided sequence segments can be further classified and merged into different functional patterns by computing their backward difference means.Additionally,by sufficiently mining the association relationship between measuring data and control data,the Bayesian network is applied to obtain the domination set of each sensor,and the final FSM model is constructed as one feasible detection engine to identify industrial automation control anomalies.To evaluate the proposed approach,we use the SWaT dataset to perform a series of compared analyses,and the experimental results show that the BinSeg algorithm can be more suitable to perform the optimal change-point detection of measuring data in the sequence segmentation due to its three advantages(the better robustness,the higher detection accuracy and the less consuming time),and the proposed approach exhibits relatively excellent detection ability to identify the process controloriented threat by comparing and analyzing three applicable indicators(the detection precision,recall rate and F1-score).

    The main advantages and contributions of our approach are listed as follows: First,industrial automation control always provides a relatively stable running mode,and one normal control and monitoring process has the communication characteristics of periodicity and time sequence.In this premise,our approach is ideally suited to detect the process control-oriented threat whose main purpose is to destroy the above communication characteristics.Second,by comparing with other change-point detection approaches under different cost functions,our approach eventually turns out to be the excellent one to obtain all sequence segments of measuring data,which can provide basic support to train functional state transition models based on FSM.Finally,the stable running mode can generate a finite number of functional patterns and pattern transitions,which can perfectly meet the requirements to establish one FSM anomaly detection.Additionally,compared with other machinelearning detection engines,our approach has some nice performance advantages to detect most cyber attacks that destroy the normal control and monitoring processes in industrial production.

    Based on the above contributions,our major objective involves the following three aspects:first of all,by performing the effective sequence segmentation of measuring data,we propose one functional pattern-related anomaly detection approach which applies FSM to build a normal behavior model,and we hope this approach can have the applicable detection ability to identify the process control-oriented threat;secondly,we summarize some communication characteristics and association relationships between measuring data and control data,and hope these can contribute to the development and improvement of other industrial security defense technologies;finally,we provide detailed descriptions of the process control-oriented threat,and hope this threat can be considered as one direction or breakthrough for industrial cyber security researches.

    2 Sequence Segmentation and Pattern Generation

    For industrial automation control,measuring data generally refers to one category of time-series data with continuous change regularities,and indicates the actual operating conditions under different control states.By using the change-point detection approach,measuring data can be divided into some sequence segments with different characteristics,and all sequence segments may have different lengths and time intervals.After that,the backward difference mean of each sequence segment can be further computed,and all sequence segments with similar backward difference means and lengths should be merged into one functional pattern.

    2.1 Change-Point Detection Based on Binary Segmentation

    We use the BinSeg algorithm to perform the optimal change-point detection of measuring data,and realize the initial sequence segmentation[36].As one greedy sequential algorithm,this algorithm can quickly work out all change points due to its relatively low complexity,and output the approximate value of the optimal solution.Actually,this algorithm is well suited to measuring data,because it is widely applied in the sequence segmentation of univariate and multivariate data.The main procedures to perform the initial sequence segmentation of measuring data are listed as follows:

    (1) According to Eq.(1),the first change point in the whole sequence of measuring data is determined.

    Here,V(T={t}) is defined as the sum of segmentation cost under the optimal segmentationτ={t1,...,tK},and the best change point is the minimum value ofV(τ),which is calculated by

    Here,c(·)is the cost function,which performs the goodness-of-fit measurement of sub-sequencein the time series model.

    Based on the above calculations,the first change point can be found by using the greedy search,and this change point is the one most capable of lowering the cost sum.

    (2) When the first change point ?t(1)is obtained,the original sequence of measuring data can be divided into two sequence segments.For each sequence segment,the above change-point search needs to be repeatedly executed until it meets the given stop condition.

    In our approach,the AR(Auto-Regressive)model is selected as one viable cost function,because it has a much greater capacity to generate the future variable value with lower past information by using self-variable regression.Moreover,the AR model belongs to one linear regressive model,which uses the linear combination of some variable values in the previous period to determine the change of variable value.Supposing that{ti}(i∈(0,n),ti

    Here,j>1 is the sequence segment number,zt=is the lag vector,δjis the parameter vector,andp>0 is the process order.

    After computing the minimum sum of squared residuals,we can further obtain the least-squares estimates in the AR model[37],and the AR cost function on the intervalIcan be calculated by

    For each original sequence of measuring data,it is not possible to know the actual number of change points in advance.Therefore,we need to combine the BinSeg algorithm with the AR cost functionCostARto detect all change points,and specify the penaltyPenas the stopping criterion of change-point detection,namely,whenCostAR

    2.2 Pattern Generation Based on Backward Difference Mean

    After performing the change-point detection based on the BinSeg algorithm,we can obtain all change points of measuring data,which are further used to generate different sequence segments.Specifically,we define the time-series data between two consecutive change points as one sequence segment,whose length may be different from one another.Additionally,each sequence segment represents one functional pattern,which is generated by classifying and merging all sequence segments with the same backward difference mean and length.To be precise,the obtained functional patterns can be regarded as all different states of sensors.The backward difference mean should be computed by

    Here,τtrepresents the sequence length oft-th segment,andyirepresents thei-th measuring data value in one sequence segment.

    Different backward difference means can reflect the smooth or dramatic change degree in trend,and similar states of sensors have the same or approximately the same backward difference mean.Furthermore,random noises may bring out some redundant change points when performing the change-point detection based on the BinSeg algorithm,and the sequence segments divided by these change points belong to the same state of sensors.By comparing the backward difference means around each change point,we can classify the sequence segments with the same or approximately the same backward difference mean as one category;namely,if two backward difference means are similar or identical,their corresponding sequence segments are merged into the same functional pattern.Additionally,to accurately sort out all possible functional patterns,we also suppose that any two sequence segments with different lengths are classified as different functional patterns,even if they have the same or approximately the same backward difference mean.

    According to the specific characteristics of each sequence segment,we can further give a formalized description of each functional pattern,which can provide a clear physical significance for each sequence segment.For example,we suppose the original measuring data can generate one functional pattern setM={M1,M2,M3}that contains three different functional patterns,and these three patterns can be formally described as:M1represents the slow declining state,M2represents the rapid rising state andM3represents the slow rising state.In effect,the formalized description can contribute to the construction of one understandable FSM,which clearly shows different patterns or state transitions according to the specific control logic.

    3 Pattern Association Analysis

    In practical industrial fields,controllers usually collaborate with sensors and actuators to perform the scheduled industrial automation control according to some technological process of production.As a result,the corresponding control and monitoring process brings about a positive association relationship between sensors and actuators.Moreover,different states of actuators can cause changes in measuring data,which sensors monitor and collect in real-time.When the collected measuring data reaches a certain threshold,controllers can send new control data to actuators,and a state transition of actuators occurs consequently.However,it is extremely difficult to directly achieve the association relationship between sensors and actuators in control systems,and the main causes include two aspects:for one thing,the measuring data may be collected from many sensors in control systems,and the amount of measuring data is too large to intuitively distinguish each impact of different actuators;for another,measuring data and control data come from different devices,and no definite corresponding relationship is found to exist between these two types of data.When one state transition of actuators occurs,the characteristic of measuring data associated with these actuators inevitably changes,namely,one change point in the sequence of measuring data is successfully detected.From this point,we realize the backward inference to obtain the domination set of each sensor by judging the state transition of some actuators,when one change point in the sequence of measuring data is found.In practice,if one actuator undergoes the state transition between two adjacent sequence segments,we can confirm that this actuator has a pattern association with the observed sensor.Through the above analysis process,we can obtain the initial domination set of each sensor,and this set consists of some actuators that cause different pattern changes in this sensor.

    Bayesian network is a probabilistic graph model that represents a set of random variables and their conditional dependencies by using DAG(Directed Acyclic Graph),and describes the joint probability distribution through CPT (Conditional Probability Table) [38].In our pattern association analysis,we construct one directed acyclic graph to explain the association relationship between sensors and actuators.Moreover,all sensors and actuators are designed as attribute nodes,and each directed edge represents the probabilistic dependency relationship between sensors and actuators.As a simplified example,Fig.1 shows a possible Bayesian network constructed by some sensors and actuators.In this figure,A1andA2individually represent two different actuators that work together to affect the sensorS1,and the controllerC1receives the measuring data ofS1to change the state of another actuatorA3by generating the corresponding control data.According to the conditional probability table of each device,the pattern association analysis aims to exploit the dependency relationship ofA1,A2andS1,and obtains its domination set{A1,A2}.The conditional probability can be calculated as follows:

    Suppose thatA={A1,A2,...,Am} is the set of all actuators,S={S1,S2,...,Sn} is the set of all sensors,andM={M1,M2,...,Md}is the set of all functional patterns.If the current functional pattern of the sensorSi(i∈[1,n]) isMj(j∈[1,d]),the conditional probability that the actuatorsAu,...,Av(u,v∈[1,m])are the parent nodes ofSiis

    Figure 1:An example of Bayesian network constructed by sensors and actuators

    Based on the above analysis,the construction of the domination set aims to learn the structure of the Bayesian network,and determines all parent nodes of each sensor.In this construction process,we need to calculate all the conditional probabilities of each sensor to build its conditional probability table,which can guide us in determining the dependency relationship between one actuator and this sensor.Moreover,under a certain state of one actuator,if the corresponding conditional probability of this sensor exceeds the predefined confidence thresholdPct,this actuator can belong to the final domination set of this sensor.The main workflow of pattern association analysis to obtain the domination set is described in Algorithm 1.

    4 FSM Anomaly Detection

    FSM belongs to one abstract computational model,which is applied to describe the dynamic system with inherent randomness[39].According to the obtained functional pattern set and domination set,we can use FSM to establish one functional state transition model,that accurately describes the normal control and monitoring process.In this model,each functional pattern can be regarded as one state of FSM,and each domination set related to this functional pattern is considered the input signal to trigger the state transition.Moreover,this model properly belongs to one Mealy machine,because it is built by two important components:the functional pattern and the domination set.In practice,this model can perfectly meet the FSM’s requirements,and the chief reasons are summarized as follows:firstly,the regular measuring data and control data imply a degree of repeatability due to the cyclical and customizable production procedure,and the BinSeg algorithm can generate a finite number of sequence segments;secondly,all sequence segments with similar characteristics can be merged to one functional pattern,which can qualitatively denote one physical significance or change trend by the formalized description;finally,the pattern association analysis not only gives the final domination set of sensors,but also clearly explains the pattern transition process under different states of actuators.

    Fig.2 depicts an example of a functional state transition model based on FSM.In this model,M={M1,M2,...,M6}is the functional pattern set,which includes six different functional patterns in the whole production procedure.Additionally,CS=is the final domination set related to the functional pattern setM,andCjSirepresents thej-th state combination of all actuators in the domination setCSi.From this figure,we can see that any transition process between two patterns can be indicated by one directed edge,and different pattern transitions need to be triggered through the specified state of actuators in the related domination set.For example,when the state of actuators in the domination setchanges to,the original functional patternM2turns into the next functional patternM3,which can further perform three different pattern transitions triggered by the three states of actuators in the domination set

    Figure 2:An example of functional state transition model based on FSM

    Based on industrial characteristics of periodicity and continuity,we can use a lot of regular measuring data and control data to train one normal functional state transition model,which can accurately describe the whole control and monitoring process in practical industrial fields.By comparing the observed measuring data with this model,the devastating process control-oriented threat can be effectively identified.Moreover,the basic judgment criterion of anomaly detection consists of two parts:for one thing,if one unfamiliar functional pattern generated from the observed measuring data differs from any functional pattern in the trained model,some abnormal measuring data caused by one threat may exist in this unknown functional pattern;for another thing,if one unfamiliar pattern transition that in reality does not exist in the trained model is suddenly triggered,some abnormal measuring data caused by one threat may result in this unknown pattern transition.Additionally,to enhance its scalability and efficiency,if one complicated control and monitoring process may include different stages,the corresponding measuring data and control data in each stage can be used to train one small-scale functional state transition model,which can further be applied to identify anomalies existing in its stage.

    If one sequence segment is identified as one abnormal functional pattern according to the basic judgment criterion,this sequence segment must contain some abnormal measuring data caused by certain cyber threats.However,this sequence segment may also involve lots of normal measuring data,which can have a negative effect on detection precision.To accurately isolate normal measuring data from one abnormal sequence segment,we further perform deep detection by defining the slopechange trend.More specifically,the main process of deep detection is described as follows:firstly,if some measuring data in the abnormal sequence segment obviously exceed the highest value in the normal production process,these measuring data can be directly considered as abnormal measuring data;secondly,the rest of measuring data can be divided into a group of short sequences with the same length,and the slope-change trend of each short sequence is calculated according to Eq.(7);thirdly,the slope-change trend of one normal functional pattern in the established functional state transition model is also calculated,and this normal functional pattern can be confirmed by the previous functional pattern and actuator state of this abnormal sequence segment;finally,we further compare the slope-change trend of each short sequence with the one of normal functional pattern,and the corresponding short sequence can be regarded as normal measuring data if the compared result is consistent.The slope-change trend is defined by

    Here,Trends-crepresents the slope-change trend of one sequence;VlastandVfirstare the last and first data value of this sequence;Lenseqis the length of this sequence.

    5 Experimental Result and Analysis

    To evaluate the proposed anomaly detection approach,we perform some comparison experiments to verify its detection performance by using the typical SWaT (Secure Water Treatment) dataset.Furthermore,the SWaT system is a secure water treatment testbed that consists of a modern six-stage process,and some pre-set cyber attacks are launched to destroy its control and monitoring process in different stages.In our experimental analysis,we consider the measuring data and control data in the P1 stage as feasible experimental data,because the cyber attacks in this stage can exercise a negative influence on these data through some sophisticated technologies,such as sensor measurement spoofing and malicious control command forging.Moreover,the measuring data and control data in the P1 stage totally contain over about 165,000 records,and their collection time(running time)is about 26 hours.Additionally,these data cover 10 different attack types,whose attack points are different critical control devices in the P1 stage,and Table 1 shows some critical control devices and their labels in the P1 stage.Additionally,we use Python to analyze the experimental data,and all experiments run on a PC with a 2.4 GHz Intel Core i5-10200H CPU,16 GB RAM,and 256 GB solid-state storage.

    Table 1:Critical control devices and their labels in the P1 stage

    5.1 Compared Evaluation on Binary Segmentation

    We perform the change-point detection of measuring data which is collected in the P1 stage,and our main purpose is to explain the correctness and advantage of the BinSeg algorithm.Furthermore,we select the measuring data with a fixed length as the original experimental data,and these data have several verified change points.Additionally,we compare the different detection performances of four change-point detection approaches,which are BinSeg,Pelt,BottomUp (Bottom-Up segmentation)and WinSlid(Window Sliding segmentation).In each approach,three different cost functions are further considered to achieve one optimal effect,and various penalties are carefully chosen according to the apriori knowledge.Table 2 shows the compared results of four change-point detection approaches.In this table,we focus on two aspects:on the one hand,the large Hausdorff distance means that one considerable error between the detected change points and the verified change points exists or an excess of wrong change points is detected,and its immediate aftermath can bring greater uncertainty of anomaly detection;on the other hand,if the F1-score trends closer to 1,the number of detected change points is the same as the number of verified change points,and the number of wrong change points is the lowest.

    Table 2:Compared results of four change-point detection approaches under different cost functions

    Compared with other approaches,the Pelt and BinSeg algorithms with the AR cost function exhibit some similar detection properties: for Hausdorff distance,the corresponding values are 12 and 13,respectively,which are two minimum distances in all change-point detection approaches with different cost functions;for F1-score,both of them can reach 1,which represents the optimum accuracy in all change-point detection approaches with different cost functions.Additionally,it is worth mentioning that some F1-score values of the WinSlid algorithm are nonexistent,because both their detection precisions and detection recall rates are zero.From the above analysis we can conclude that,the Pelt and BinSeg algorithms can be regarded as two alternative change-point detection approaches in our sequence segmentation.

    However,industrial automation control has the characteristics of high real-time ability and high reliability,that is,the consuming time to perform the sequence segmentation should be as little as possible.Fig.3 depicts the consuming time comparison between the Pelt and BinSeg algorithms with the AR cost function.Statistically speaking,the average consuming time of the BinSeg algorithm is 0.43 s,and the average consuming time of the Pelt algorithm is 6.71 s.Obviously,the BinSeg algorithm with the AR cost function takes less consuming time to detect all change points,which may have better advantages to meeting industrial characteristics.As a whole,the BinSeg algorithm with AR cost function can be more suitable for our sequence segmentation to perform the optimal changepoint detection of measuring data because of the following three advantages: the better robustness,the higher detection accuracy,and the less consuming time.

    Figure 3:Consuming time comparison between the Pelt and BinSeg algorithms

    5.2 Pattern Association and Domination Set Analysis

    After detecting all actual change points of measuring data,we can classify all sequence segments into different functional patterns by comparing their backward difference means and lengths,and give a clear physical significance for each functional pattern.To evaluate the pattern association between sensors and actuators,we select two segments of representative measuring data to calculate their conditional probability tables,because the obtained functional patterns in these measuring data have characteristics of frequency and repeatability in the P1 stage.Fig.4 shows eight functional patternsM1,M2,...,M8of LIT101,which are obtained by performing the change-point detection of measuring data.Furthermore,each functional pattern represents one changing state of water level,and four functional patterns change continuously in each sub-figure.For example,in Fig.4a,M1andM2can be respectively explained as the slow rising state and the rapid rising state,andM1changes automatically toM2when one state transition of a certain actuator occurs.

    As stated previously,if some actuators undergo the state transition between two adjacent functional patterns,these actuators are strongly linked to the observed sensor,and can be assigned to its initial domination set.In our experiments,by analyzing the selected measuring data and control data,we find that when the measuring data of LIT101 changes from one functional pattern to another functional pattern,some new control data are sent to the actuators MV101 and P101,and one state transition of these two actuators occurs consequently.In other words,the initial domination set of LIT101 can be considered {MV101,P101}.After that,we learn the Bayesian network structure of all sensors and actuators in the P1 stage by calculating their conditional probabilities,and explore the probabilistic dependency relationship between LIT101 and each actuator in the initial domination set.Corresponding to Fig.4,Fig.5 shows the association relationship and conditional probability table of each control device in the P1 stage.

    Figure 4:Eight functional patterns of LIT101 under selected segments of measuring data

    Figure 5:Association relationship and conditional probability table of each control device

    In the P1 stage,all actuators relate to two different states: 1 represents the closed state,and 2 represents the open state;that is,each functional pattern can be dominated by a state combination of these actuators.In Fig.5,we focus on the conditional probability tables of FIT101 and LIT101,and draw some intuitive conclusions: for one thing,FIT101 is directly affected by MV101,because its conditional probability is large enough when the state of MV101 is open,namelyMV101=2;for another thing,LIT101 is under the integrated control of MV101 and P101,because one large enough conditional probability always exists under each functional pattern.For example,in Fig.5a,when the current functional pattern isM2,the conditional probability that the states of MV101 and P101 are respectively open and closed is 0.977,namelyP(MV101=2,P101=1|M2)=0.977.More specifically,we suppose that the predefined confidence thresholdPctis 0.9 in our experiments,and can further obtain the domination set of LIT101.From the conditional probability table of LIT101 in each sub-figure,we can see that one existing conditional probability under each functional pattern exceeds the predefined confidence threshold,and each large conditional probability uniquely corresponds to one state combination of MV101 and P101.Additionally,the large conditional probability also indicates that LIT101 has a strong dependency relationship with MV101 and P101.As a consequence,we can confirm that the actuators MV101 and P101 are two parent nodes of the sensor LIT101 in the Bayesian network,and the final domination set of LIT101 can be identified as{MV101,P101}.

    5.3 Detection Performance Evaluation

    After obtaining the final domination set of LIT101,we can further use FSM to establish the functional state transition model of LIT101 in the P1 stage,and Fig.6 shows this model which can accurately describe the normal control and monitoring process in the P1 stage.Moreover,this model covers 16 different functional patterns {M1,M2,...,M16} which are generated by using the BinSeg algorithm and pattern generation,and the pattern transition is triggered through the specified states of MV101 and P101.

    Figure 6:The established functional state transition model based on FSM in the P1 stage

    Based on the above model,we select three applicable indicators to evaluate the detection ability of the proposed approach,and these indicators include detection precision,recall rate,and F1-score.Moreover,we analyze these indicators for 10 different attack types in the P1 stage,whose main objective is to destroy the normal control and monitoring process by attacking the critical control devices.Table 3 gives the attack point and attack description for all 10 attack types,and shows the experimental results for each attack in the P1 stage.On the whole,the proposed approach exhibits relatively excellent detection ability to identify 10 different attacks,because the average detection precision and recall rate can reach 0.872 and 0.982,respectively.Also,the average F1-score is 0.896 which is close to 1,and this value strongly suggests that the proposed approach has fine detection stability,which can coordinate the balance between detection precision and recall rate.In practice,for the majority of attack types,their detection precisions can exceed 90%,which may refer to a relatively ideal level for one professional detection approach.However,for attack types 2 and 8,their detection precisions are only 0.825 and 0.196,which are largely responsible for the significant deterioration of average detection precision.Furthermore,the main reason for attack type 2 is that this attack simultaneously opens P101 and P102,which can cause a rapid drop in water level.In other words,this attack only increases the drop speed of the water level,and its corresponding functional pattern still contains a small number of normal measuring data which can be regarded as abnormal data.Differently,the main reason for the attack type 8 is that this attack opens P102 when closing P101,which only causes some weak or indiscernible changes in water level.Additionally,this attack is of short duration,and the corresponding number of abnormal measuring data is very small.Therefore,the detection precision of attack type 2 is very low.

    Table 3:Detection results for 10 different attack types in the P1 stage

    We also compare the detection performance with other machine-learning detection engines,and Table 4 shows the compared results on detection precision,recall rate,and F1-score.From this table,we can see that although the detection precision is slightly lower than other detection engines,the proposed approach exhibits the best recall rate and F1-score.Also,the higher recall rate can provide direct support that the proposed approach can enlarge the detection coverage and improve the detection integrity.In practice,if we ignore attack type 8,the average detection precision of other 9 attacks can also reach 0.947,which can make the proposed approach alongside the others.To sum up,the proposed approach has some nice performance advantages for detecting most cyber attacks that destroy the normal control and monitoring process in industrial production.

    Table 4:Detection performance comparison with other machine-learning detection engines

    6 Conclusion

    By analyzing the characteristics of industrial automation control,this paper proposes one functional pattern-related anomaly detection approach,whose main objective is to effectively identify industrial cyber threats,especially the process control-oriented threat in control systems.Moreover,the proposed approach mainly consists of three parts:First,the BinSeg algorithm is used to perform the optimal change-point detection of measuring data,and all divided sequence segments are classified and merged into different functional patterns according to the backward difference mean and length.Second,the pattern association analysis applies a Bayesian network to obtain the domination set of each sensor,which describes the dependency relationship between actuators and sensors.Third,according to the obtained functional patterns and the domination set,one functional state transition model based on FSM is established as the feasible detection engine,which can accurately describe the whole control and monitoring process.To evaluate the proposed approach,we perform some compared experiments by using the typical SWaT dataset,and the experimental results fully verify that:(1)our approach can achieve a relatively ideal detection precision and recall rate,both of which exceed 90%for the majority of attack types;and(2)the high F1-score also explains that our approach has fine detection stability.Although our approach exhibits the relatively excellent detection ability to identify the process control-oriented threat,some problems still deserves further investigation,mainly including: firstly,for some complicated control and monitoring process that involves lots of critical control devices,the pattern association analysis may become one bottleneck problem due to its degraded performance;secondly,there is still room to improve the detection precision for some special attacks;thirdly,because one complicated control and monitoring process may generate one large-scale functional state transition model,the overfitting and model tuning is further required to guarantee the fine enough detection performance[26,44,45].

    Acknowledgement:The authors are grateful to the anonymous referees for their insightful comments and suggestions.

    Funding Statement:This work is supported by the Hainan Provincial Natural Science Foundation of China (Grant No.620RC562),the Liaoning Provincial Natural Science Foundation: Industrial Internet Identification Data Association Analysis Based on Machine Online Learning (Grant No.2022-KF-12-11)and the Scientific Research Project of Educational Department of Liaoning Province(Grant No.LJKZ0082).

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design:M.Wan,J.Yao;data collection,analysis and interpretation of results:H.Lei,J.Li;draft manuscript preparation:M.Wan,J.Yao,Y.Song.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The analyzed SWaT dataset for this study can be found in the link https://itrust.sutd.edu.sg/testbeds/secure-water-treatment-swat/.The original contributions presented in the study are included in the manuscript,further inquiries can be directed to the corresponding author.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    一级,二级,三级黄色视频| 午夜福利影视在线免费观看| 妹子高潮喷水视频| 久久久国产成人精品二区| 中亚洲国语对白在线视频| 一级a爱片免费观看的视频| 大型av网站在线播放| 久久久久精品国产欧美久久久| 久久久久久人人人人人| 男人舔女人的私密视频| 国产视频一区二区在线看| 亚洲专区字幕在线| 国产1区2区3区精品| 国产精品电影一区二区三区| 69av精品久久久久久| 欧美国产精品va在线观看不卡| 日韩视频一区二区在线观看| 欧美日韩精品网址| www国产在线视频色| 亚洲av日韩精品久久久久久密| 欧美国产精品va在线观看不卡| 大型av网站在线播放| 亚洲精品中文字幕在线视频| 亚洲成国产人片在线观看| 99热只有精品国产| 老司机在亚洲福利影院| 亚洲色图综合在线观看| 一区二区三区精品91| 91成人精品电影| 午夜免费鲁丝| 久久精品人人爽人人爽视色| 免费观看精品视频网站| 中出人妻视频一区二区| 国产国语露脸激情在线看| 18禁黄网站禁片午夜丰满| 亚洲熟妇熟女久久| 纯流量卡能插随身wifi吗| 国产激情久久老熟女| 99久久综合精品五月天人人| 国产精品一区二区三区四区久久 | 一级黄色大片毛片| 熟妇人妻久久中文字幕3abv| 99久久精品国产亚洲精品| 精品国产美女av久久久久小说| 午夜免费鲁丝| 亚洲精华国产精华精| 精品国产一区二区三区四区第35| 一边摸一边做爽爽视频免费| 97超级碰碰碰精品色视频在线观看| 一a级毛片在线观看| 中出人妻视频一区二区| 一级a爱片免费观看的视频| 女人精品久久久久毛片| 久久狼人影院| 亚洲欧洲精品一区二区精品久久久| 国产一区二区三区在线臀色熟女| 在线观看舔阴道视频| 欧美日韩亚洲综合一区二区三区_| 亚洲一区中文字幕在线| 中出人妻视频一区二区| 国产在线观看jvid| 一卡2卡三卡四卡精品乱码亚洲| 啪啪无遮挡十八禁网站| www.999成人在线观看| 国产av在哪里看| 好看av亚洲va欧美ⅴa在| 精品无人区乱码1区二区| 十八禁网站免费在线| 黄色成人免费大全| 精品午夜福利视频在线观看一区| 国产一区二区三区在线臀色熟女| 日本免费一区二区三区高清不卡 | 国产成人欧美| 精品第一国产精品| 高清毛片免费观看视频网站| 亚洲国产欧美网| 一级毛片精品| 亚洲一区二区三区不卡视频| 国产精品免费视频内射| 法律面前人人平等表现在哪些方面| 免费在线观看完整版高清| 国产伦一二天堂av在线观看| 一级片免费观看大全| 一本久久中文字幕| 悠悠久久av| 亚洲成av人片免费观看| 久久久国产欧美日韩av| 久久久久久久久免费视频了| 一区二区日韩欧美中文字幕| 亚洲国产精品久久男人天堂| 欧美老熟妇乱子伦牲交| 国产精品电影一区二区三区| 精品免费久久久久久久清纯| 久热爱精品视频在线9| 午夜免费激情av| ponron亚洲| 亚洲男人的天堂狠狠| 国产精品一区二区免费欧美| 色综合站精品国产| 亚洲精品在线美女| 91麻豆av在线| 国产极品粉嫩免费观看在线| 自线自在国产av| 欧美丝袜亚洲另类 | 国产又爽黄色视频| 亚洲三区欧美一区| 国产亚洲精品综合一区在线观看 | 大型黄色视频在线免费观看| 岛国在线观看网站| 麻豆一二三区av精品| 成熟少妇高潮喷水视频| 禁无遮挡网站| 大型av网站在线播放| 亚洲av熟女| 亚洲成av人片免费观看| 一进一出抽搐动态| 好男人在线观看高清免费视频 | 88av欧美| 午夜免费成人在线视频| 亚洲一区二区三区色噜噜| 搞女人的毛片| 看片在线看免费视频| 久久精品国产99精品国产亚洲性色 | 91精品国产国语对白视频| 日本vs欧美在线观看视频| 国产成人精品无人区| 黄色视频不卡| 欧美黑人欧美精品刺激| 在线观看一区二区三区| 成人国产一区最新在线观看| 又紧又爽又黄一区二区| 久久中文字幕一级| 精品国产亚洲在线| 男人舔女人下体高潮全视频| 久9热在线精品视频| 欧美绝顶高潮抽搐喷水| 午夜免费观看网址| 一级毛片精品| 国产精品爽爽va在线观看网站 | 成人欧美大片| 国产成年人精品一区二区| xxx96com| 国产午夜精品久久久久久| 久久青草综合色| 午夜福利一区二区在线看| 国产成人av激情在线播放| 日韩三级视频一区二区三区| 一边摸一边抽搐一进一出视频| 国产精品永久免费网站| 国产一区二区在线av高清观看| 99国产精品99久久久久| 久久久久九九精品影院| 神马国产精品三级电影在线观看 | av网站免费在线观看视频| 亚洲少妇的诱惑av| 精品午夜福利视频在线观看一区| 国产精品日韩av在线免费观看 | 91成年电影在线观看| 又紧又爽又黄一区二区| 欧美国产日韩亚洲一区| 一级片免费观看大全| 久久国产精品男人的天堂亚洲| 欧美大码av| 黄色视频不卡| 国产精品98久久久久久宅男小说| av片东京热男人的天堂| 日本免费a在线| 男女做爰动态图高潮gif福利片 | 少妇粗大呻吟视频| 成人永久免费在线观看视频| 波多野结衣一区麻豆| 琪琪午夜伦伦电影理论片6080| 亚洲国产精品sss在线观看| 免费无遮挡裸体视频| 欧美中文日本在线观看视频| 大型av网站在线播放| 国产精品久久久久久精品电影 | 成人亚洲精品av一区二区| 久久中文字幕人妻熟女| 亚洲片人在线观看| 女同久久另类99精品国产91| 亚洲成a人片在线一区二区| 久久久久久久午夜电影| 亚洲电影在线观看av| 精品午夜福利视频在线观看一区| 狠狠狠狠99中文字幕| 日韩精品青青久久久久久| 窝窝影院91人妻| 久久久久久亚洲精品国产蜜桃av| 午夜亚洲福利在线播放| 婷婷精品国产亚洲av在线| 欧美精品啪啪一区二区三区| 午夜福利视频1000在线观看 | 亚洲av第一区精品v没综合| 色综合亚洲欧美另类图片| 91九色精品人成在线观看| aaaaa片日本免费| 90打野战视频偷拍视频| 99国产精品免费福利视频| 久久精品aⅴ一区二区三区四区| 国产在线观看jvid| 黑人巨大精品欧美一区二区蜜桃| 天天躁夜夜躁狠狠躁躁| 亚洲自拍偷在线| 亚洲在线自拍视频| 无人区码免费观看不卡| cao死你这个sao货| 国产精品精品国产色婷婷| 久久精品人人爽人人爽视色| 国产午夜精品久久久久久| 亚洲av美国av| 亚洲久久久国产精品| 国产蜜桃级精品一区二区三区| 日韩 欧美 亚洲 中文字幕| 亚洲欧美日韩无卡精品| 悠悠久久av| 日日摸夜夜添夜夜添小说| 国产激情欧美一区二区| 美国免费a级毛片| 国产成人欧美在线观看| 夜夜爽天天搞| 黄片小视频在线播放| 他把我摸到了高潮在线观看| 一a级毛片在线观看| 欧美av亚洲av综合av国产av| 男女午夜视频在线观看| 大型黄色视频在线免费观看| 又紧又爽又黄一区二区| 美女国产高潮福利片在线看| 亚洲国产欧美网| 人妻丰满熟妇av一区二区三区| 中文字幕av电影在线播放| 午夜成年电影在线免费观看| 91麻豆av在线| 国产成人精品久久二区二区免费| 国产99白浆流出| 婷婷六月久久综合丁香| 国产一区二区三区在线臀色熟女| 1024视频免费在线观看| 欧美色欧美亚洲另类二区 | 亚洲专区国产一区二区| 亚洲成人精品中文字幕电影| 亚洲熟妇中文字幕五十中出| 又大又爽又粗| 美女扒开内裤让男人捅视频| 又黄又粗又硬又大视频| 不卡一级毛片| 岛国视频午夜一区免费看| 亚洲国产精品成人综合色| 亚洲欧美精品综合久久99| 亚洲午夜理论影院| 欧美+亚洲+日韩+国产| 精品久久久久久久毛片微露脸| 免费在线观看黄色视频的| 中文字幕久久专区| 女性被躁到高潮视频| 亚洲欧美日韩无卡精品| 久久久久久久午夜电影| 欧美日韩福利视频一区二区| 99精品在免费线老司机午夜| 一区二区三区高清视频在线| 亚洲精品粉嫩美女一区| 女警被强在线播放| 免费在线观看日本一区| 成人特级黄色片久久久久久久| 99精品欧美一区二区三区四区| 久久国产精品男人的天堂亚洲| www.自偷自拍.com| 国产黄a三级三级三级人| 国产精华一区二区三区| 国产aⅴ精品一区二区三区波| 欧美国产精品va在线观看不卡| 亚洲伊人色综图| 黄色视频,在线免费观看| 在线观看日韩欧美| 亚洲天堂国产精品一区在线| 欧美精品亚洲一区二区| 一a级毛片在线观看| 日日干狠狠操夜夜爽| 校园春色视频在线观看| 熟妇人妻久久中文字幕3abv| 日本五十路高清| 久久久精品欧美日韩精品| 热99re8久久精品国产| 中文字幕高清在线视频| 亚洲全国av大片| 色综合站精品国产| 中文字幕人妻熟女乱码| 可以在线观看毛片的网站| 日本黄色视频三级网站网址| 在线观看免费视频网站a站| 高清毛片免费观看视频网站| 九色国产91popny在线| 成人特级黄色片久久久久久久| 91精品三级在线观看| 99香蕉大伊视频| 看免费av毛片| 久久欧美精品欧美久久欧美| 国产亚洲欧美在线一区二区| 好男人在线观看高清免费视频 | 日日爽夜夜爽网站| 天天躁夜夜躁狠狠躁躁| 亚洲av日韩精品久久久久久密| 亚洲免费av在线视频| 国产亚洲精品一区二区www| 国产xxxxx性猛交| or卡值多少钱| av片东京热男人的天堂| 女人爽到高潮嗷嗷叫在线视频| 无遮挡黄片免费观看| 少妇裸体淫交视频免费看高清 | 一区二区三区激情视频| 亚洲精品美女久久久久99蜜臀| 在线观看免费午夜福利视频| 亚洲在线自拍视频| 成人国产一区最新在线观看| 免费高清在线观看日韩| 非洲黑人性xxxx精品又粗又长| 窝窝影院91人妻| 亚洲精品在线观看二区| 两个人视频免费观看高清| 级片在线观看| 妹子高潮喷水视频| 日韩三级视频一区二区三区| 老司机午夜十八禁免费视频| 欧美绝顶高潮抽搐喷水| 精品人妻在线不人妻| 黄片大片在线免费观看| 黄片播放在线免费| 黄色 视频免费看| 久久久精品欧美日韩精品| 首页视频小说图片口味搜索| 精品福利观看| 18禁国产床啪视频网站| 波多野结衣一区麻豆| 精品久久久精品久久久| 亚洲国产毛片av蜜桃av| 亚洲aⅴ乱码一区二区在线播放 | 国产精品爽爽va在线观看网站 | 国产精品久久视频播放| 久久人妻av系列| 亚洲全国av大片| 国产成人精品无人区| 在线播放国产精品三级| 在线观看免费视频日本深夜| 变态另类丝袜制服| 中出人妻视频一区二区| 亚洲专区国产一区二区| 国产一区二区在线av高清观看| 欧美中文日本在线观看视频| 黑人巨大精品欧美一区二区mp4| 宅男免费午夜| 久久久久久亚洲精品国产蜜桃av| 国产精品亚洲一级av第二区| 十八禁网站免费在线| 夜夜夜夜夜久久久久| 国产精品免费视频内射| 欧美老熟妇乱子伦牲交| 亚洲无线在线观看| 国产精品久久久人人做人人爽| 国产精品一区二区精品视频观看| 国产日韩一区二区三区精品不卡| 国产成人影院久久av| 成人亚洲精品一区在线观看| 曰老女人黄片| 国产精品一区二区精品视频观看| 国产真人三级小视频在线观看| 免费看十八禁软件| xxx96com| 女人高潮潮喷娇喘18禁视频| 中亚洲国语对白在线视频| 欧美最黄视频在线播放免费| 久久久久亚洲av毛片大全| 亚洲国产欧美一区二区综合| 9色porny在线观看| 男女午夜视频在线观看| 久久精品91无色码中文字幕| 国产激情欧美一区二区| 中文字幕人成人乱码亚洲影| 这个男人来自地球电影免费观看| 在线国产一区二区在线| 亚洲片人在线观看| 日本一区二区免费在线视频| 日韩国内少妇激情av| 1024香蕉在线观看| 国产成人一区二区三区免费视频网站| 欧美激情久久久久久爽电影 | 欧美中文综合在线视频| 激情视频va一区二区三区| 黑丝袜美女国产一区| 伦理电影免费视频| av中文乱码字幕在线| 不卡一级毛片| 亚洲精品美女久久av网站| 女人被狂操c到高潮| 老熟妇乱子伦视频在线观看| 国产主播在线观看一区二区| 亚洲人成电影观看| 韩国av一区二区三区四区| 日韩精品免费视频一区二区三区| 91成年电影在线观看| 欧美黑人欧美精品刺激| 久久香蕉精品热| 国产精品一区二区三区四区久久 | 亚洲精品美女久久久久99蜜臀| 午夜福利18| 一夜夜www| 老司机福利观看| 欧美亚洲日本最大视频资源| 亚洲精品美女久久av网站| 精品欧美一区二区三区在线| 女同久久另类99精品国产91| 亚洲精品国产精品久久久不卡| 欧美丝袜亚洲另类 | 日韩av在线大香蕉| 国产高清videossex| 亚洲精品在线观看二区| 一级,二级,三级黄色视频| 99精品在免费线老司机午夜| 美女免费视频网站| 99香蕉大伊视频| 亚洲最大成人中文| 黄色视频不卡| 国产精品久久电影中文字幕| 黑人巨大精品欧美一区二区蜜桃| 国产精品 国内视频| 夜夜躁狠狠躁天天躁| 亚洲少妇的诱惑av| 亚洲成av人片免费观看| 免费在线观看视频国产中文字幕亚洲| 少妇被粗大的猛进出69影院| 国内精品久久久久久久电影| 亚洲电影在线观看av| 国产成人精品无人区| 国产成人免费无遮挡视频| 亚洲全国av大片| 国产亚洲av高清不卡| 日韩欧美一区视频在线观看| 一级片免费观看大全| 久久久久久久久中文| 亚洲欧美日韩无卡精品| 人人妻人人澡人人看| 欧美乱色亚洲激情| 琪琪午夜伦伦电影理论片6080| 老司机午夜福利在线观看视频| 每晚都被弄得嗷嗷叫到高潮| 欧美在线一区亚洲| 韩国av一区二区三区四区| 女性生殖器流出的白浆| 色尼玛亚洲综合影院| 国产精品影院久久| 男人操女人黄网站| 久久香蕉精品热| 人成视频在线观看免费观看| 国产1区2区3区精品| 男女床上黄色一级片免费看| 成人18禁在线播放| 身体一侧抽搐| 免费看十八禁软件| 欧美绝顶高潮抽搐喷水| av在线天堂中文字幕| 欧美一级a爱片免费观看看 | 别揉我奶头~嗯~啊~动态视频| 久久青草综合色| 亚洲国产毛片av蜜桃av| 大陆偷拍与自拍| 精品国产乱子伦一区二区三区| 老司机在亚洲福利影院| 午夜福利一区二区在线看| 欧美成狂野欧美在线观看| 又黄又粗又硬又大视频| 亚洲第一青青草原| 69精品国产乱码久久久| 两性午夜刺激爽爽歪歪视频在线观看 | 久久久久久久久免费视频了| 精品电影一区二区在线| 满18在线观看网站| 国产片内射在线| 黑人巨大精品欧美一区二区蜜桃| 成人免费观看视频高清| www.熟女人妻精品国产| 欧美+亚洲+日韩+国产| 亚洲国产欧美一区二区综合| 精品久久久久久久人妻蜜臀av | 黄色视频不卡| 成人三级做爰电影| 999精品在线视频| 欧美激情高清一区二区三区| 国产99久久九九免费精品| 日韩欧美三级三区| 老司机福利观看| 亚洲成av人片免费观看| 午夜免费鲁丝| 免费在线观看完整版高清| 天堂影院成人在线观看| 日本 av在线| 国产成人欧美在线观看| 日本五十路高清| 久久香蕉激情| 999久久久精品免费观看国产| a级毛片在线看网站| 欧美国产精品va在线观看不卡| 一个人免费在线观看的高清视频| 国产99久久九九免费精品| 黄片小视频在线播放| 欧美中文综合在线视频| 在线观看一区二区三区| 成年女人毛片免费观看观看9| 老司机靠b影院| 亚洲色图 男人天堂 中文字幕| 曰老女人黄片| 欧美激情高清一区二区三区| 两个人看的免费小视频| 最好的美女福利视频网| 18禁黄网站禁片午夜丰满| 一级黄色大片毛片| 啪啪无遮挡十八禁网站| 精品国产国语对白av| 99精品欧美一区二区三区四区| 国产人伦9x9x在线观看| 亚洲av成人不卡在线观看播放网| 免费看十八禁软件| 亚洲一区二区三区不卡视频| 十八禁网站免费在线| 午夜久久久久精精品| 国产精品免费视频内射| 久久久久久久久久久久大奶| 亚洲色图综合在线观看| 欧美黑人欧美精品刺激| 午夜福利成人在线免费观看| 午夜激情av网站| 色播亚洲综合网| 国产亚洲精品一区二区www| 国产精品爽爽va在线观看网站 | 男女下面插进去视频免费观看| 在线观看舔阴道视频| 天堂√8在线中文| 黄色a级毛片大全视频| 天天躁夜夜躁狠狠躁躁| 久99久视频精品免费| 国产视频一区二区在线看| 一二三四社区在线视频社区8| 美女扒开内裤让男人捅视频| 黄色成人免费大全| 电影成人av| 99久久99久久久精品蜜桃| 亚洲第一青青草原| 国产在线精品亚洲第一网站| 男女午夜视频在线观看| 国产欧美日韩一区二区精品| 手机成人av网站| 亚洲性夜色夜夜综合| 久久影院123| 久久精品国产亚洲av香蕉五月| 老司机午夜福利在线观看视频| 纯流量卡能插随身wifi吗| 免费看十八禁软件| 中文亚洲av片在线观看爽| 黄频高清免费视频| 欧美成人免费av一区二区三区| av在线播放免费不卡| 99香蕉大伊视频| 搞女人的毛片| 免费看美女性在线毛片视频| 国产99久久九九免费精品| 亚洲激情在线av| 一卡2卡三卡四卡精品乱码亚洲| av天堂在线播放| 久久久精品国产亚洲av高清涩受| 亚洲专区中文字幕在线| 久久久久国内视频| 美国免费a级毛片| 91av网站免费观看| 窝窝影院91人妻| 久久天堂一区二区三区四区| 欧美中文综合在线视频| 美女大奶头视频| 久久久久国产一级毛片高清牌| 国产高清视频在线播放一区| 一级片免费观看大全| 色婷婷久久久亚洲欧美| av在线天堂中文字幕| 亚洲中文日韩欧美视频| av在线天堂中文字幕| 国产成人精品久久二区二区免费| 19禁男女啪啪无遮挡网站| 亚洲天堂国产精品一区在线| 久久亚洲精品不卡| 丰满人妻熟妇乱又伦精品不卡| 亚洲精品中文字幕在线视频| 久99久视频精品免费| 男人舔女人的私密视频| 免费不卡黄色视频| 亚洲欧美激情在线| 中文字幕另类日韩欧美亚洲嫩草| 免费在线观看日本一区| 91精品三级在线观看| 黄色a级毛片大全视频| 少妇被粗大的猛进出69影院| 久久人人爽av亚洲精品天堂| 国产精品免费一区二区三区在线| 99精品在免费线老司机午夜| 99在线人妻在线中文字幕| 国产精品一区二区免费欧美| 国产xxxxx性猛交| 欧美国产日韩亚洲一区| 99re在线观看精品视频| 午夜成年电影在线免费观看| 男人舔女人下体高潮全视频| 国产人伦9x9x在线观看| 91成人精品电影| 国产成人啪精品午夜网站| 亚洲国产看品久久| 日韩欧美国产在线观看| 精品人妻1区二区|