• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Multiclass Classification for Cyber Threats Detection on Twitter

    2024-01-12 03:48:08AdnanHusseinandAbdulwahabAliAlmazroi
    Computers Materials&Continua 2023年12期

    Adnan Hussein and Abdulwahab Ali Almazroi

    1College of Computer Science and Engineering,Department of Computer Science,AL-Ahgaff University,Mukalla,Yemen

    2College of Computing and Information Technology at Khulais,Department of Information Technology,University of Jeddah,Jeddah,Saudi Arabia

    ABSTRACT The advances in technology increase the number of internet systems usage.As a result,cybersecurity issues have become more common.Cyber threats are one of the main problems in the area of cybersecurity.However,detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its importance.This study aims to analyze Twitter data to detect cyber threats using a multiclass classification approach.The data is passed through different tasks to prepare it for the analysis.Term Frequency and Inverse Document Frequency(TFIDF)features are extracted to vectorize the cleaned data and several machine learning algorithms are used to classify the Twitter posts into multiple classes of cyber threats.The results are evaluated using different metrics including precision,recall,F-score,and accuracy.This work contributes to the cyber security research area.The experiments revealed the promised results of the analysis using the Random Forest(RF)algorithm with(F-score=81%).This result outperformed the existing studies in the field of cyber threat detection and showed the importance of detecting cyber threats in social media posts.There is a need for more investigation in the field of multiclass classification to achieve more accurate results.In the future,this study suggests applying different data representations for the feature extraction other than TF-IDF such as Word2Vec,and adding a new phase for feature selection to select the optimum features subset to achieve higher accuracy of the detection process.

    KEYWORDS Cybersecurity;cyber threat detection;artificial intelligence;machine learning;Twitter

    1 Introduction

    With the advancement in technology and electronic systems,people’s lives have become almost completely dependent on technology because of the ease and speed of information transmission[1].On the other hand,there are some challenges and issues that have emerged with this advancement in technology.One of these challenges is detecting and mitigating security threats that try to penetrate the cyber systems and manipulate or destroy the system to achieve illegal goals[2,3].Recently,these challenges have increased,and there is a need to stop these attacks and threats.Cybersecurity threat detection is a field of study that detects cyber threats to stop them and mitigate them[4].

    Recently,there is integrity between several kinds of sciences to solve the issues and improve performance [5].Machine learning is one of the promising fields in artificial intelligence science,which is changed many human life aspects by integrating it into other fields.This integrity creates a notable advancement in many technological aspects of human life.The use of artificial intelligence and machine learning in cybersecurity and the detection of cyber threats is important to be studied and investigated [3].Some recently published research has indicated that the use of artificial intelligence techniques in cybersecurity has contributed to solving multiple problems and contributed to improving the current security systems[6].Thus,there is a need to expand the research in this area and investigate more in this field.

    Social networks such as Twitter,Facebook,Instagram,and others have contributed significantly in the last few decades to connecting the world and communities.With social networks,dissemination of news and information has become easy,cheap,and very fast,an event occurs in the West at a specific time,and people in the East see it and interact with it at the same moment of occurrence.This is considered a revolution in the world of data transmission[1].There are many people with bad intentions trying to use these platforms to spread conflict and inconvenience,as well as to destabilize the security of others on multiple levels,including the individual,the community,and the level of companies or countries.Confronting such threats and risks requires reliable studies that detect these threats before they spread,expose the identity of the attackers,and stop them thus limiting the spread of threats.

    This study uses artificial intelligence and machine learning techniques to detect cybersecurity threats using social networking data taken from Twitter.The next section includes an explanation of the research literature.After that,the research methodology pipeline is explained in detail for each different practical stage for the data analysis.The following section includes a discussion of the experiment results and finally the conclusion and future work suggestions.

    2 Literature Review

    Machine learning is a subfield of artificial intelligence which focuses on using data and algorithms to simulate how humans learn.The main purpose of using machine learning in different systems is to increase and refine the outcomes of these systems.There are three main approaches to machine learning algorithms:supervised machine learning,unsupervised machine learning,and reinforcement machine learning[3].

    Recently,machine learning has been integrated with other sciences and it has achieved a notable improvement in several fields such as healthcare sciences,military sciences,economic sciences,and so on.Cybersecurity is one of the fields that is concerned with defending against the threats and attacks of the cyber systems,machine learning is used to help in several cybersecurity tasks such as detection,mitigation,and prevention to build strong and accurate cybersecurity systems.In literature,there are a few works have been published to tackle the integration between cybersecurity and machine learning and there is a need to investigate more in this field.

    Silvestri et al.in[7]analyzed a healthcare dataset collected from hackers’news websites.This study adopted a machine learning model named Bidirectional Encoder Representations from Transformers(BERT) and eXtreme Gradient Boosting (XGBoost) and extracted information from the available documents on the web to determine the threats and vulnerabilities that impact the healthcare system.The results show an accuracy of 0.99.

    On the other hand,the study[8]studied the Network traffic data to detect cybersecurity threats in the Internet of Things (IoT) Environment.The study used the N-BaIoT dataset and applied a supervised machine learning approach using Regularized Extreme Learning Machine (Regularized RELM)and Mafly optimization.The system achieved 98.93,98.95,and 98.94 precision,recall,and F-measure,respectively.

    Shaukat et al.in [9] applied a supervised machine learning approach using Support Vector Machine (SVM),Deep Belief Network (DBN),Decision Tree (DT) models to evaluate the cyber threats detection on several different datasets Knowledge Discovery and Data Mining Tools Competition dataset (KDD CUP 99),Spambase,Twitter dataset,Enron,Neural Structured Learning–Knowledge Discovery in Databases (NSL-KDD),Defense Advanced Research Projects Agency(DARPA),and malware datasets.The results of this study show that using a specific learning technique for a particular cyber threat detection is not recommended.In addition,there is a need to investigate and analyze different learning models for cyber threat detection and build a benchmark dataset for that purpose.

    Ke [10] studied some different machine learning methods to detect the threats in cybersecurity based.The study analyzed the NSL-KDD dataset using supervised machine learning models:Logistic Regression (LR) Multi-Layer Perceptron (MLP) and SVM and deep learning models: DBN and Stacked Non-Symmetric Deep Auto-Encode (SNSDAE).The results show that deep learning performs better than shallow learning to detect cybersecurity threats.

    Moreover,the study[11]applied shallow supervised machine learning and deep learning models to examine its performance on three different cybersecurity issues:spam detection,intrusion detection,and malware analysis.The analyses used RF model and the Feedforward Deep Neural Network model on DGA datasets.The results show that there is a need for more investigation on using machine learning to deal with cybersecurity sensitive problems and the results still show some shortcomings that limit the applicability of machine learning models on cybersecurity issues.Nevertheless,the study expected that deep learning could have improved to deal with cybersecurity in the future.

    Table 1 gives a summary of the most important literary works in the field of cyber threat detection using machine learning algorithms.

    Table 1:Cyber threats detection literature works summary

    In this work,an empirical investigation is conducted to detect cybersecurity threats in Twitter posts by using a multiclass classification machine learning approach to enrich the research in this field and explore the performance of using machine learning in the detection of cybersecurity threats.

    3 Proposed Framework

    The pipeline of the framework for analyzing data to detect cybersecurity threats is illustrated in Fig.1.The details for each stage in the proposed pipeline are explained in the next subsections.

    Figure 1:The phases of the study framework pipeline

    3.1 Data Acquisition

    The data used in this study is secondary data published by[22].The data is collected from Twitter related to security issues.The dataset has 21368 data rows in four columns (id,text,target,type).The target (label) includes four classes,which are threat,business,irrelevant and unknown.Table 2 illustrates the statistics of each class.

    Table 2:Tweets class statistical distribution

    3.2 Data Preprocessing

    Twitter data usually contains many undesired and irrelevant extra data that is considered noise which consumes more processing time and affects the analysis results [23].The data preprocessing stage removes these unwanted data and cleans it to be ready for further stages of analysis.To achieve this mission,some tasks should be accomplished.These tasks include Data cleaning,Tokenization,Removing stop words,and Stemming[24].

    3.2.1 Data Cleaning and Filtering

    In this task,the raw tweets passed through some steps to clean and remove unwanted and unrelated symbols and noisy non-word characters from the tweets such as the punctuations,special characters,and non-English words and symbols.These non-word characters affect the analysis process,consume a lot of processing resources,and affect the result accuracy[24].The output of this task is cleaned tweets that consist of cleaned words without any non-words characters.In addition,the filtering process is taking place to remove the duplicated and empty tweets that consume the processing resources without any benefits[25].

    3.2.2 Tokenization

    This task includes the process of breaking down the tweets into their basic units(tokens or words)by using the white space as a separator.Tokenization is a very important task where future stages of analysis id depend completely on its output [26].There are many tokenizing techniques used in literature,word tokenizer technique produced by Natural Language Tool Kit(NLTK)[27]is one of the famous tokenizers and it is used in this study.The expected output of this task is a list of lists(a list of tweets and each tweet is a list of words).

    3.2.3 Removing Stopwords

    Stopwords are the words that are used to connect sentences and it does not have meaning like determiners,prepositions,and coordinating conjunctions.Removing such words will save more of the analysis resources to focus on the important words instead.Each language has its stopwords.In this study,the stopwords of the English language are used,and the study uses the stopwords list that is published by NLTK[28].

    3.2.4 Stemming

    The stemming is a process to remove the suffixes and prefixes from the word to return it to the basic original form(stem).This process will help to find the true frequency of one word in one tweet or the whole dataset.In this study,snowball stemmer[29]is used to transform the tweet’s words into its basic stem.

    3.3 Feature Extraction

    The data produced in the preprocessing stage is still textual and it needs to be prepared for the machine learning processes.The machine is a digital platform that only understands numeric data[30].Machine learning algorithms accept numeric data and these data are called features.Features can be extracted from the textual data to be analyzed by the algorithm for learning.

    In the feature extraction stage,valuable information will be extracted from the cleaned data as features.Many kinds of features can be extracted.This work utilizes two famous models for data representation used widely in the literature.The first one is called Bag of Words(BOW)[31]and the other model is TF-IDF[32],these models extract numeric features to be used in the machine learning algorithm.

    The main idea behind the model BOW is the representation of all tweets in the dataset as a matrix where each row in that matrix represents one tweet while each column in that matrix represents one word of the whole tweets.After that,the frequency of appearance of each word(column)is calculated for each tweet(row)and held in the corresponding cell.Fig.2 illustrates the BOW representation for two different tweets selected randomly from the dataset.

    From the above sample,d1 and d2 represent two different tweets and are considered as rows in the BOW matrix,while each word in those tweets is extracted and represented as a column in the BOW matrix.The frequency of word appearance in each tweet is held in the corresponding cell.For example,the word“best”appears in tweet d1 two times and the word“way”appears in both tweets d1 and d2 one time for each.The word frequency in each tweet is given by Eq.(1),which is called the Term Frequency(TF)equation as follows:

    where w represents the tweet words,t is the tweet,andfw,t is the frequency of the word w occurring in tweet t[33].

    Figure 2:The representation of two tweets using the BOW model

    However,this way of representation has a drawback,suppose there is an irrelative word that has a high score of word frequency because it appears in one or two tweets with high frequency.Then TF representation will give that word high priority while it is not important for the general topic of the dataset.For that reason,the learning will be low in accuracy.To overcome this issue,the frequency of words is integrated with another concept to give a high score for the most important word in the dataset.This concept is IDF,which calculates the inverse fraction of all words in the dataset to give a correct explanation of the importance of each word related to the whole dataset.Eq.(2)calculates the IDF for the given word:

    where t is a tweet,T represents all tweets in the dataset,|T|is the number of tweets,and|[t ∈T:w ∈t]|is the number of words w in all tweets[32].The idf(w,T)is integrated with TF to get the frequency of importance weight for each word in the whole dataset[34].Eq.(3)combines the two concepts.

    3.4 Multiclass Classification

    The results of the previous stage of feature extraction is a numeric data in form of TF-IDF values.This kind of data is suitable to be used to train and learn the machine.As mentioned earlier,the dataset that is used in this work contains tweets belonging to four different classes(threat,business,irrelevant and unknown).This arise a popular machine learning problem called(Multiclass classification)where the classification is usually applied to data with only two classes (binary classification) [35].For multiclass classification or multinomial classification,there are two main strategies followed to solve this problem:One-vs.-rest strategy which trains one classifier per one class where the samples of that class are considered as positive samples on the other side all the rest or other samples are considered as negative.The second strategy is one-vs.-one which trains one classifier for each pair of classes[36].Eq.(4)gives the number of class pairs to be trained:

    where P is the total number of class pairs and N is equal to the total number of classes[37].

    In this work,one-vs.-rest strategy is followed to classify the data using six different classification algorithms:SVM,Na?ve Bayes(NB),RF,LR,DT,and KNN.One-vs.-rest strategy is used widely in literature and it shows good results with classification algorithms such LR [38],SVM [37],and RF[39].Table 3 illustrates the parameter setting for each algorithm.

    Table 3:Machine learning algorithm parameters settings

    4 Experiment Results and Discussion

    In this study,all the experiments are conducted using Python programming language and run using the Anaconda environment and its integrated editor of Jupiter Notebook.Windows operating system PC was used to run the all experiments with an Intel processor,Core i7-4770,speed of 3.40 GHz,and 8 GB RAM.

    The experiments flow to start with preparing the data and preprocessing with a total number of 21368 tweets.Preprocessing stage outcomes out with 15519 tweets after filtering and removing the empty and duplicated tweets.Feature extraction is followed using the TF-IDF technique to extract the importance frequency of each feature in the dataset.A total number of 17805 features is obtained from the feature extraction process,which became in ready format to be fed into the machine learning algorithms.Before proceeding to the classification process,the whole dataset is divided into two parts:the training dataset and the testing dataset with 66%and 34%division,respectively.Each algorithm is trained using the training data then the prediction of the algorithm is tested using the testing data.

    The result is evaluated by calculating the most popular evaluation metrics:precision,recall,F1-score,and accuracy.The confusion matrix is produced for each algorithm and visualized using clear readable diagrams.Fig.3 shows the confusion matrix and Table 4 shows the classification report for each algorithm.

    Table 4:The classification results report

    From the above evaluation results,the classification algorithms have achieved different scores of accuracy.Notably,the RF algorithm achieved the best results with the highest accuracy (0.67)among the other algorithms,while the DT achieved the lowest results and Na?ve Bayes achieved the lowest accuracy(0.44).In general,the results are quite low and there are some reasons behind this low accuracy.The first reason is related to the representation of unstructured textual data.The tweet text is short,unstructured,and has many issues that cause the low accuracy of the machine learning tasks[40].One of the issues in analyzing unstructured text is the high dimensionality of the resulting feature vectors[41].The second reason is related to the data representation technique TF-IDF,which resulted in a very sparse feature vector matrix.Most of the values of these sparse vectors are zeros and this affects negatively the accuracy of the analysis results[41,42].

    Figure 3:The confusion matrix of the classification results:(a)RF result;(b)LR result;(c)DT result;(d)SVM result;(e)KNN result;(f)NB result

    The classification result of the proposed study can be compared with the other methods of threat detection.Table 5 shows a brief comparison between some studies from the literature with the proposed study in the form of precision,recall,and F1-score.The chosen comparsion studies were selected based on the used data and the multiclass classification approach.From the comparison table,it is clear that the proposed study has achieved the best recall and F1 using the RF classification method among the other studies.The high F1-score indicates that the proposed method achieved good balanced predictions of true positive and true negative.As observed from the Table 5,the study[13]achieved high precision but low recall and F1-score,that is meaning the model can predict true positive accurately but it gives low accuracy with true negative prediction.This unbalanced results of precision and recall cause the low results of F1-score.

    Table 5:Results comparison

    5 Conclusion and Future Works

    The detection of cyber threats is an important process and it is not an easy task.There are many works in the literature that used different approaches to overcome this task.The integrity between the several sciences opens a new analysis era to use other approaches in one field to solve issues in other fields.Machine learning is one of the promising approaches that achieve good results in several aspects of other fields.Resolving cybersecurity issues with machine learning still needs more investigations.In this study,a machine learning supervised multiclass classification approach is used to classify data from Twitter into several classes to detect cyber threads.By using several machine learning algorithms,this study achieved a detection accuracy of(67%).For future work,more investigation must be conducted to discover the other sides of cyber threat detection by using machine learning.In addition,the study suggests using different data representations for the feature extraction process such as Word2Vec to refine and obtain a high score of accuracy.Furthermore,the study suggests adding a new process to the framework pipeline which is the feature selection process to select the optimal set of features and ignore the unimportant features that affect the accuracy of the detection.

    Acknowledgement:The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through Project Number MoE-IF-UJ-22-04100409-5.

    Funding Statement:This research was funded by Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia,Project Number MoE-IF-UJ-22-04100409-5.

    Author Contributions:The authors confirm contribution to the paper as follows: study conception and design: A.Hussein,A.A.Almazroi;data collection: A.Hussein;analysis and interpretation of results:A.Hussein;draft manuscript preparation:A.Hussein,A.A.Almazroi.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The data that support the findings of this study are openly available in“github”at http://doi.org/10.1109/BigData.2018.8622506,reference number[22].

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    ponron亚洲| 国产成人av教育| 亚洲av日韩精品久久久久久密| 亚洲激情在线av| av天堂在线播放| 女同久久另类99精品国产91| 99久久九九国产精品国产免费| 又黄又粗又硬又大视频| 亚洲色图av天堂| 精品福利观看| 亚洲无线观看免费| 欧美乱色亚洲激情| 亚洲欧美日韩高清在线视频| 美女被艹到高潮喷水动态| 午夜日韩欧美国产| 1000部很黄的大片| 最好的美女福利视频网| 久久人妻av系列| 18禁国产床啪视频网站| 日本免费一区二区三区高清不卡| 熟女电影av网| 日本成人三级电影网站| 激情在线观看视频在线高清| 亚洲无线观看免费| 亚洲一区二区三区不卡视频| 欧美大码av| 精品久久久久久久久久免费视频| 亚洲av电影不卡..在线观看| 欧美成人免费av一区二区三区| 久久久久性生活片| 热99re8久久精品国产| 国产视频内射| 国产97色在线日韩免费| 久久精品国产99精品国产亚洲性色| 欧美乱妇无乱码| 久久人妻av系列| 亚洲中文字幕日韩| 波多野结衣高清作品| 男人的好看免费观看在线视频| svipshipincom国产片| 99久久九九国产精品国产免费| 啦啦啦免费观看视频1| 日本a在线网址| 国产97色在线日韩免费| 老熟妇乱子伦视频在线观看| 国产真人三级小视频在线观看| 我要搜黄色片| 99久久综合精品五月天人人| 婷婷精品国产亚洲av| 男女下面进入的视频免费午夜| 性色av乱码一区二区三区2| 两人在一起打扑克的视频| 久久久久久久久中文| 国产乱人视频| 黄色视频,在线免费观看| 亚洲人成伊人成综合网2020| 欧美乱色亚洲激情| 嫁个100分男人电影在线观看| 亚洲精品456在线播放app | 国产成人福利小说| 成人性生交大片免费视频hd| 一区二区三区国产精品乱码| 2021天堂中文幕一二区在线观| 亚洲性夜色夜夜综合| 老司机午夜十八禁免费视频| 在线十欧美十亚洲十日本专区| 91av网一区二区| 亚洲av第一区精品v没综合| 久久精品国产99精品国产亚洲性色| 久久精品亚洲精品国产色婷小说| 国产真实伦视频高清在线观看 | 九色成人免费人妻av| 久久久色成人| 亚洲国产欧美网| 999久久久精品免费观看国产| 美女高潮喷水抽搐中文字幕| 在线观看免费午夜福利视频| 久久精品国产亚洲av涩爱 | 99国产精品一区二区蜜桃av| www.熟女人妻精品国产| 999久久久精品免费观看国产| 亚洲熟妇中文字幕五十中出| aaaaa片日本免费| 欧美乱码精品一区二区三区| 亚洲国产精品sss在线观看| 婷婷六月久久综合丁香| 日本一二三区视频观看| 特大巨黑吊av在线直播| 国产午夜精品论理片| 一级a爱片免费观看的视频| 亚洲七黄色美女视频| 婷婷丁香在线五月| 国产精品久久久久久久电影 | 好看av亚洲va欧美ⅴa在| 国产成人系列免费观看| 最近最新免费中文字幕在线| 真实男女啪啪啪动态图| 国产三级中文精品| 叶爱在线成人免费视频播放| 精品99又大又爽又粗少妇毛片 | 欧美精品啪啪一区二区三区| 热99在线观看视频| 亚洲成av人片免费观看| 日日夜夜操网爽| 嫩草影视91久久| 乱人视频在线观看| 亚洲久久久久久中文字幕| 亚洲av二区三区四区| 久久久久久久久大av| 黄片大片在线免费观看| 日韩大尺度精品在线看网址| 国产乱人视频| 我要搜黄色片| 国产又黄又爽又无遮挡在线| 大型黄色视频在线免费观看| 亚洲av熟女| 欧美国产日韩亚洲一区| 免费在线观看影片大全网站| 我要搜黄色片| 国内久久婷婷六月综合欲色啪| 欧美区成人在线视频| 五月玫瑰六月丁香| 久久久久性生活片| 三级男女做爰猛烈吃奶摸视频| 亚洲av免费在线观看| 久久久国产成人免费| 波多野结衣巨乳人妻| 午夜福利18| 丝袜美腿在线中文| 亚洲在线观看片| 中文字幕av成人在线电影| 黄色视频,在线免费观看| 婷婷丁香在线五月| 国产一级毛片七仙女欲春2| 国产一区二区激情短视频| aaaaa片日本免费| 国产毛片a区久久久久| 久久久成人免费电影| 给我免费播放毛片高清在线观看| 一级毛片高清免费大全| 热99在线观看视频| 51国产日韩欧美| 国产免费男女视频| 97超视频在线观看视频| 亚洲精华国产精华精| 国产亚洲欧美98| 国产 一区 欧美 日韩| 国产毛片a区久久久久| 亚洲中文字幕日韩| 欧美一区二区精品小视频在线| 久久精品国产清高在天天线| 女生性感内裤真人,穿戴方法视频| 51午夜福利影视在线观看| 一本久久中文字幕| 很黄的视频免费| 日本在线视频免费播放| 精品国内亚洲2022精品成人| 亚洲一区二区三区不卡视频| 又紧又爽又黄一区二区| 国产精品影院久久| 国产精品久久久人人做人人爽| 国产一区二区在线av高清观看| 亚洲av第一区精品v没综合| 好男人在线观看高清免费视频| 亚洲成人久久爱视频| 老司机午夜福利在线观看视频| 日韩大尺度精品在线看网址| 麻豆成人av在线观看| 久久精品影院6| 国产97色在线日韩免费| 999久久久精品免费观看国产| 精品久久久久久久毛片微露脸| 亚洲人成网站在线播| 成人特级黄色片久久久久久久| 麻豆国产97在线/欧美| 日本黄色片子视频| 精品一区二区三区视频在线观看免费| 天美传媒精品一区二区| 精品人妻一区二区三区麻豆 | 啪啪无遮挡十八禁网站| 18+在线观看网站| 色噜噜av男人的天堂激情| 美女cb高潮喷水在线观看| 少妇丰满av| 国产精华一区二区三区| 欧美+日韩+精品| 久久精品国产亚洲av香蕉五月| 国产真实乱freesex| 免费看光身美女| 97超视频在线观看视频| 精品日产1卡2卡| 精品国产超薄肉色丝袜足j| 午夜福利免费观看在线| 丰满人妻熟妇乱又伦精品不卡| 91久久精品电影网| 欧美黑人巨大hd| 啦啦啦韩国在线观看视频| 日韩欧美精品v在线| a在线观看视频网站| 亚洲成av人片在线播放无| 一区福利在线观看| 老司机午夜十八禁免费视频| 不卡一级毛片| 亚洲七黄色美女视频| 淫妇啪啪啪对白视频| 美女大奶头视频| 免费观看的影片在线观看| 好看av亚洲va欧美ⅴa在| 18禁国产床啪视频网站| 老司机福利观看| 免费在线观看影片大全网站| 欧美xxxx黑人xx丫x性爽| 看片在线看免费视频| 一区福利在线观看| 国产视频内射| 全区人妻精品视频| 51午夜福利影视在线观看| 国内精品久久久久精免费| 亚洲欧美日韩无卡精品| 操出白浆在线播放| 国产亚洲精品久久久久久毛片| 亚洲狠狠婷婷综合久久图片| 国内久久婷婷六月综合欲色啪| 此物有八面人人有两片| 午夜福利视频1000在线观看| 婷婷亚洲欧美| 最近视频中文字幕2019在线8| 级片在线观看| 美女大奶头视频| 国产淫片久久久久久久久 | 999久久久精品免费观看国产| 性色av乱码一区二区三区2| 欧美一级a爱片免费观看看| 欧美av亚洲av综合av国产av| 女警被强在线播放| 熟女电影av网| 老鸭窝网址在线观看| 午夜视频国产福利| 亚洲精品美女久久久久99蜜臀| 亚洲av不卡在线观看| 国产精品综合久久久久久久免费| 国产成人影院久久av| 9191精品国产免费久久| 波多野结衣高清作品| 欧美另类亚洲清纯唯美| av中文乱码字幕在线| 桃红色精品国产亚洲av| 欧美最新免费一区二区三区 | 一边摸一边抽搐一进一小说| 亚洲欧美日韩东京热| 哪里可以看免费的av片| 国产 一区 欧美 日韩| 亚洲国产精品999在线| 99在线视频只有这里精品首页| 亚洲色图av天堂| 嫩草影院精品99| 99热这里只有是精品50| 久久99热这里只有精品18| 国产69精品久久久久777片| 精品国产亚洲在线| 在线观看午夜福利视频| 亚洲国产精品合色在线| 制服丝袜大香蕉在线| 亚洲欧美日韩高清在线视频| 高清日韩中文字幕在线| 欧美另类亚洲清纯唯美| 一级a爱片免费观看的视频| 女警被强在线播放| 每晚都被弄得嗷嗷叫到高潮| 久久性视频一级片| 久久国产精品影院| 91久久精品国产一区二区成人 | 亚洲av成人av| 国产色爽女视频免费观看| 91av网一区二区| 三级毛片av免费| 国产极品精品免费视频能看的| 99国产精品一区二区蜜桃av| 亚洲va日本ⅴa欧美va伊人久久| 久久久久久久午夜电影| 国产激情欧美一区二区| 亚洲18禁久久av| 日韩欧美在线二视频| 村上凉子中文字幕在线| aaaaa片日本免费| 两个人的视频大全免费| 欧美乱妇无乱码| 波野结衣二区三区在线 | 真人做人爱边吃奶动态| 精品乱码久久久久久99久播| 级片在线观看| 在线观看一区二区三区| 校园春色视频在线观看| 午夜福利欧美成人| 国产单亲对白刺激| 国产三级在线视频| 夜夜夜夜夜久久久久| 我的老师免费观看完整版| 精品久久久久久久末码| 白带黄色成豆腐渣| 69av精品久久久久久| 久久精品国产综合久久久| 亚洲熟妇中文字幕五十中出| 久久久精品大字幕| 18禁国产床啪视频网站| 亚洲国产中文字幕在线视频| 亚洲成人中文字幕在线播放| 亚洲第一欧美日韩一区二区三区| 午夜福利18| 少妇人妻精品综合一区二区 | 91av网一区二区| 久久久久性生活片| 国产av在哪里看| 在线观看日韩欧美| 国产爱豆传媒在线观看| 熟女人妻精品中文字幕| 两个人的视频大全免费| 午夜精品久久久久久毛片777| 日本黄色视频三级网站网址| 毛片女人毛片| 中文亚洲av片在线观看爽| 丝袜美腿在线中文| 激情在线观看视频在线高清| 免费搜索国产男女视频| 搞女人的毛片| 黄色视频,在线免费观看| 丁香六月欧美| 欧美性猛交黑人性爽| 亚洲欧美日韩高清在线视频| 日韩欧美精品v在线| 国产精品久久视频播放| 国产97色在线日韩免费| 欧美日韩国产亚洲二区| 亚洲欧美日韩无卡精品| 免费人成视频x8x8入口观看| 成人一区二区视频在线观看| 亚洲乱码一区二区免费版| 亚洲av熟女| 丰满人妻熟妇乱又伦精品不卡| 国内精品美女久久久久久| 国产一区二区亚洲精品在线观看| 亚洲欧美激情综合另类| 国内精品一区二区在线观看| 搡女人真爽免费视频火全软件 | 99热这里只有是精品50| 午夜免费成人在线视频| 香蕉丝袜av| 国产综合懂色| 男人舔奶头视频| 日本免费a在线| av黄色大香蕉| 老汉色∧v一级毛片| 黄色视频,在线免费观看| 小蜜桃在线观看免费完整版高清| 国产精品日韩av在线免费观看| 国产色婷婷99| 久久香蕉国产精品| 天堂av国产一区二区熟女人妻| 亚洲熟妇熟女久久| 小蜜桃在线观看免费完整版高清| 亚洲狠狠婷婷综合久久图片| 国产成+人综合+亚洲专区| 欧美一区二区亚洲| 99国产精品一区二区三区| 在线观看美女被高潮喷水网站 | av福利片在线观看| 十八禁人妻一区二区| 亚洲人成网站在线播放欧美日韩| 一本久久中文字幕| 麻豆久久精品国产亚洲av| 久久午夜亚洲精品久久| 91久久精品电影网| 亚洲人成伊人成综合网2020| 久久国产乱子伦精品免费另类| 美女高潮的动态| 亚洲精品一区av在线观看| av片东京热男人的天堂| 无遮挡黄片免费观看| av片东京热男人的天堂| 久久国产乱子伦精品免费另类| 国产69精品久久久久777片| 日韩欧美精品v在线| 欧美中文日本在线观看视频| 国产不卡一卡二| 色综合欧美亚洲国产小说| 国产不卡一卡二| 日韩欧美在线二视频| 色综合亚洲欧美另类图片| 精品人妻一区二区三区麻豆 | 国产精品久久电影中文字幕| 精品国产美女av久久久久小说| 日韩欧美国产在线观看| 一二三四社区在线视频社区8| 啦啦啦韩国在线观看视频| 国产一区二区在线av高清观看| 免费一级毛片在线播放高清视频| 嫩草影院精品99| 国产精品亚洲美女久久久| 免费观看人在逋| 欧美日韩瑟瑟在线播放| 国产精品 国内视频| 久久国产精品影院| tocl精华| 男人舔奶头视频| 国产亚洲欧美98| 搡老岳熟女国产| 亚洲avbb在线观看| 香蕉av资源在线| 国产高清三级在线| 国产亚洲欧美在线一区二区| 在线播放无遮挡| 天美传媒精品一区二区| 国产精品98久久久久久宅男小说| 国产亚洲精品久久久com| 国内精品美女久久久久久| 在线观看日韩欧美| 男女午夜视频在线观看| 欧美另类亚洲清纯唯美| 精品乱码久久久久久99久播| 国产激情偷乱视频一区二区| 香蕉丝袜av| 国产毛片a区久久久久| 国产精品久久视频播放| 我的老师免费观看完整版| 黄色片一级片一级黄色片| 人人妻,人人澡人人爽秒播| 久久精品国产99精品国产亚洲性色| 久久精品国产自在天天线| 丰满人妻熟妇乱又伦精品不卡| 97超视频在线观看视频| 一级毛片高清免费大全| 精品免费久久久久久久清纯| 亚洲精品一卡2卡三卡4卡5卡| 午夜福利视频1000在线观看| 伊人久久大香线蕉亚洲五| 欧美色欧美亚洲另类二区| 无遮挡黄片免费观看| 精品99又大又爽又粗少妇毛片 | 国产精品香港三级国产av潘金莲| 国产在视频线在精品| 88av欧美| 一级毛片高清免费大全| 18禁美女被吸乳视频| 国产黄片美女视频| 欧美色视频一区免费| 久久精品人妻少妇| 亚洲欧美精品综合久久99| 免费av毛片视频| 免费观看精品视频网站| 国产精品女同一区二区软件 | 国产午夜精品论理片| 欧美在线一区亚洲| 午夜福利在线观看免费完整高清在 | 久久精品夜夜夜夜夜久久蜜豆| 一本精品99久久精品77| 免费在线观看影片大全网站| 性色avwww在线观看| 国产精品1区2区在线观看.| 19禁男女啪啪无遮挡网站| 中文字幕久久专区| 哪里可以看免费的av片| 国内精品久久久久精免费| 国产欧美日韩精品亚洲av| 美女被艹到高潮喷水动态| 国产一区二区激情短视频| xxx96com| 日本精品一区二区三区蜜桃| 丰满人妻熟妇乱又伦精品不卡| 一a级毛片在线观看| 欧美色欧美亚洲另类二区| 一区二区三区高清视频在线| 亚洲av免费高清在线观看| 精品不卡国产一区二区三区| 久久亚洲真实| 国产毛片a区久久久久| 性色av乱码一区二区三区2| 一本综合久久免费| 最近视频中文字幕2019在线8| 一级毛片高清免费大全| 国产一区二区在线av高清观看| 精品日产1卡2卡| 麻豆一二三区av精品| 欧美区成人在线视频| www.www免费av| 又紧又爽又黄一区二区| 亚洲精品久久国产高清桃花| 中文亚洲av片在线观看爽| 久久久久九九精品影院| 在线观看免费视频日本深夜| 日本 欧美在线| 免费av不卡在线播放| 国产精品久久视频播放| 国产精品1区2区在线观看.| 日韩欧美精品免费久久 | 午夜两性在线视频| 午夜免费激情av| 动漫黄色视频在线观看| 午夜精品在线福利| 99久久久亚洲精品蜜臀av| 亚洲人与动物交配视频| 神马国产精品三级电影在线观看| 色视频www国产| 亚洲乱码一区二区免费版| 老司机午夜十八禁免费视频| 日韩精品青青久久久久久| 一本一本综合久久| 欧美三级亚洲精品| 黄片大片在线免费观看| 久久香蕉精品热| 国产三级中文精品| 国产伦人伦偷精品视频| 一级毛片女人18水好多| 久久久成人免费电影| 欧美丝袜亚洲另类 | 99在线人妻在线中文字幕| 国产精品一区二区免费欧美| 欧美黄色片欧美黄色片| 制服人妻中文乱码| 欧美黄色片欧美黄色片| 亚洲在线自拍视频| 日韩欧美三级三区| 真实男女啪啪啪动态图| 美女高潮喷水抽搐中文字幕| 国产成人av激情在线播放| 亚洲av免费在线观看| 午夜精品一区二区三区免费看| 欧美黑人欧美精品刺激| 人妻丰满熟妇av一区二区三区| 长腿黑丝高跟| 丁香六月欧美| 综合色av麻豆| 香蕉久久夜色| 少妇裸体淫交视频免费看高清| 好看av亚洲va欧美ⅴa在| 亚洲av一区综合| 久久精品国产亚洲av涩爱 | 精品99又大又爽又粗少妇毛片 | 99热只有精品国产| 一个人看视频在线观看www免费 | 在线视频色国产色| 欧美一级a爱片免费观看看| 18禁美女被吸乳视频| 三级国产精品欧美在线观看| 少妇的丰满在线观看| 久久久久久久久大av| 在线观看舔阴道视频| 亚洲五月婷婷丁香| 亚洲国产精品999在线| 午夜精品一区二区三区免费看| 精品免费久久久久久久清纯| 1000部很黄的大片| 精品99又大又爽又粗少妇毛片 | 深夜精品福利| 国产探花极品一区二区| 亚洲国产色片| 精品国产三级普通话版| 亚洲国产欧美网| 一本久久中文字幕| 美女大奶头视频| 99热精品在线国产| 天天躁日日操中文字幕| av天堂在线播放| 国产高清三级在线| 69人妻影院| 人妻夜夜爽99麻豆av| 亚洲avbb在线观看| 淫秽高清视频在线观看| 亚洲中文字幕日韩| 婷婷丁香在线五月| 成人特级av手机在线观看| 黄色日韩在线| 老司机午夜十八禁免费视频| 欧美黄色片欧美黄色片| 岛国在线观看网站| 少妇人妻精品综合一区二区 | 黄色视频,在线免费观看| 日韩中文字幕欧美一区二区| 中出人妻视频一区二区| 成年女人永久免费观看视频| 在线观看免费视频日本深夜| 久久精品国产99精品国产亚洲性色| 老汉色av国产亚洲站长工具| 欧美日韩精品网址| av片东京热男人的天堂| 亚洲av成人av| 国产精品1区2区在线观看.| 夜夜夜夜夜久久久久| 免费高清视频大片| 网址你懂的国产日韩在线| 午夜激情福利司机影院| 18禁国产床啪视频网站| 天天一区二区日本电影三级| 一进一出抽搐动态| 美女黄网站色视频| 在线十欧美十亚洲十日本专区| 女警被强在线播放| 美女黄网站色视频| 欧美日韩瑟瑟在线播放| 中文字幕精品亚洲无线码一区| 欧美黄色片欧美黄色片| 婷婷亚洲欧美| 97超级碰碰碰精品色视频在线观看| 亚洲国产欧洲综合997久久,| h日本视频在线播放| 欧美丝袜亚洲另类 | 久久中文看片网| 国产精品乱码一区二三区的特点| 亚洲成人久久爱视频| 宅男免费午夜| 国产精品国产高清国产av| 日本撒尿小便嘘嘘汇集6| www.999成人在线观看| 黄色日韩在线| 亚洲精品456在线播放app | 国产高清视频在线观看网站|