• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Application Research on Two-Layer Threat Prediction Model Based on Event Graph

    2024-01-12 03:48:32ShuqinZhangXinyuSuYunfeiHanTianhuiDuandPeiyuShi
    Computers Materials&Continua 2023年12期

    Shuqin Zhang,Xinyu Su,Yunfei Han,Tianhui Du and Peiyu Shi

    School of Computer Science,Zhongyuan University of Technology,Zhengzhou,HEN037,China

    ABSTRACT Advanced Persistent Threat(APT)is now the most common network assault.However,the existing threat analysis models cannot simultaneously predict the macro-development trend and micro-propagation path of APT attacks.They cannot provide rapid and accurate early warning and decision responses to the present system state because they are inadequate at deducing the risk evolution rules of network threats.To address the above problems,firstly,this paper constructs the multi-source threat element analysis ontology (MTEAO) by integrating multi-source network security knowledge bases.Subsequently,based on MTEAO,we propose a two-layer threat prediction model(TL-TPM)that combines the knowledge graph and the event graph.The macro-layer of TL-TPM is based on the knowledge graph to derive the propagation path of threats among devices and to correlate threat elements for threat warning and decision-making;The micro-layer ingeniously maps the attack graph onto the event graph and derives the evolution path of attack techniques based on the event graph to improve the explainability of the evolution of threat events.The experiment’s results demonstrate that TL-TPM can completely depict the threat development trend,and the early warning results are more precise and scientific,offering knowledge and guidance for active defense.

    KEYWORDS Knowledge graph;multi-source data fusion;network security;threat modeling;event graph;absorbing Markov chain;threat propagation path

    1 Introduction

    Network attacks have caused irreparable economic losses to countries,companies,and individuals.One of the most effective ways of dealing with cyber-attacks today is using cyber threat intelligence(CTI).However,many CTIs are not categorized by domain,weakening the sharing effectiveness[1].Moreover,the heterogeneity of the indicator of compromise(IOC)in CTI leads to severe fragmentation of security information,which requires much time and effort to decipher the potential relationships between them manually [2].However,threat modeling enables the heterogeneous information in CTI to be combined into a model to understand the cyber security situation better and to provide supporting information for decision-making.At present,there has been a lot of research into threat modeling.Xu et al.[3] modeled the review dataset as a reviewer projection graph to detect opinion spammer groups,who conducted malicious reviews aimed at misleading consumers.Zhao et al.[4]modeled and analyzed the interdependencies between heterogeneous IOCs as well as the interactions between different types of web objects in multi-source data.Their models could describe threat events more comprehensively and effectively,capture the intrinsic interactions between cyber objects and learn the evolutionary patterns of cyber threats.In addition,there are numerous threat modeling researches based on ontology,which construct ontology models specific to the cybersecurity domain.Ontology models can describe a wide range of information about cyber threats in concepts [5],solving the problem that data from different security platforms can be challenging to understand and utilize due to semantic heterogeneity.Wu et al.[6] created a security knowledge ontology that used a standard language to represent assets,vulnerabilities,and attacks.However,the ontology did not include defensive tactics,which resulted in an inadequate definition of the ontology’s classes.Iannacone et al.[7] created an advanced ontology based on malware and the diamond model.Still,the structure was unclear,and entities in multiple datasets remained isolated,making it impossible to search or query for entities and inter-entity relationships.Syed et al.[8] developed the unified cybersecurity ontology,characterized and articulated using the cybersecurity standard.However,the instance data in this ontology model was inadequate and could not keep up with the knowledge base’s continual upgrading.After summarizing the advantages and shortcomings of the previous work,the multi-source threat element analysis ontology(MTEAO)in this paper is built from numerous aspects utilizing data from various knowledge bases.The information in disparate knowledge bases can be linked to minimizing semantic heterogeneity,allowing inference rules to be formed to accomplish correct queries and prospective knowledge inference.At the same time,MTEAO can be regularly updated and enhanced by acquiring threat information from the outside world.

    Simultaneously,APT has moved into the mainstream of today’s network assaults.Traditional passive defenses are no longer enough to meet today’s security requirements.Active defense can be targeted by learning and analyzing the attacker’s attack preference [9].In addition,attack path prediction is a proactive defense approach against APT assault,and graph structures are increasingly being applied to it by scholars.Knowledge graph maps the real world to the data world,which describes concepts,entities,events,and their relationships in the objective world.Based on threat modeling,the concept“attack”is described in the knowledge graph as a relation link between the attackers and devices,changing the attack path prediction issue into the link prediction issue in the knowledge graph.As a result,how to forecast the attack path correctly and effectively is an essential research topic in cyberspace defense.Currently,previous research on attack paths is divided into two main layers:the macro-layer and the micro-layer.

    At the macro-layer:Hu et al.[10]proposed a multi-step attack path prediction method by mapping the attack graph into an absorbing Markov chain,which not only ranked the threat levels of nodes but also quantified the probability distribution of attack paths with different lengths,but their method was not scientific for state transition probability calculation.Gong et al.[5] created a threat perspective by simply concatenating the detected assaults without considering the pre-post connection between devices and single-step attacks,which could only forecast the attack paths in simple circumstances.Yuan et al.[11]employed the breadth-first traversal algorithm in the attack path creation approach.The algorithmic model created all tracks in the attack scenario,resulting in path redundancy.A loop elimination algorithm was developed by Zhang et al.[12],which effectively avoided path redundancy and increased the effectiveness of threat path generation.However,they did not create inference rules because their ontology was only based on a graph database’s search function,which could not explore the implicit knowledge.At the micro-layer:Wang et al.[13]evaluated the attack success likelihood.However,the attacker capability level was established without objective calculation findings as a foundation,which might influence the prediction outcomes.Wu et al.[6],Zhang et al.[14]and Sun et al.[15]proposed the models can all predict and analyze attack paths from both macro and micro.Wu et al.[6]and Zhang et al.[14]did not consider factors affecting threat propagation direction when predicting paths,while Sun et al.[15]could not timely give defensive measures for the predicted threats.

    In response to the above shortcomings of previous work,this paper proposes the two-layer model TL-TPM to predict the development trend of threat events at both macro and micro-layers.The macro-layer indicates the threat propagation path based on the knowledge graph.It examines both the attack success probability and the threat degree of each device,as well as combining the pre-and postpermissions to assess if the device is likely to be compromised.The micro-layer depicts the evolution process of the attack techniques based on the prediction results of the macro-layer and the temporal characteristics of the attack behavior,making the analysis more consistent with the actual situation of the network attack.The following are this paper’s significant contributions:

    1.Having studied the multi-source network security knowledge bases and integrated the information elements in them,the multi-source threat element analysis ontology and the network security knowledge inference method have been proposed to realize the association among heterogeneous network security knowledge bases.

    2.Using the absorbing Markov chain as a bridge,we have innovatively mapped the attack graph to the event graph.At the same time,the Markov transition matrix is used to optimize the calculation of the event transition probability,making the attack process described by the attack graph can be more visually and accurately presented.

    3.Proposing a two-layer attack prediction model,which combines the knowledge graph and event graph.It provides a comprehensive analysis of the evolution path of an attack from both macro and micro perspectives,visualizing the external trace and internal logic of the threat event development,which provides information and decision support for active defense.

    2 Threat Modeling

    2.1 Multi-Source Network Security Knowledge Integration and Ontology Construction

    Different network security knowledge bases contain different kinds of information about threat events.To better integrate fragmented information for utilization,firstly,we collect,categorize,and organize information about threat events from network security knowledge bases.Secondly,we deduplicate and fill in the gaps of the information to ensure the accuracy and completeness of them.Finally,the integrated information is classified and graduated to construct a complete ontology that enables fast and accurate access to relevant information for automated or semi-automated incident handling.The following are the knowledge bases utilized to collect information in this paper and Table 1 shows their specifics:

    Table 1:Details of the knowledge bases

    ? Common Platform Enumeration(CPE)[16]

    ? Common Vulnerabilities and Exposures(CVE)[17]

    ? National Vulnerability Database(NVD)[18]

    ? Common Weakness Enumeration(CWE)[19]

    ? Common Attack Pattern Enumeration and Classification(CAPEC)[20]

    ? Adversarial Tactics,Techniques,and Common Knowledge Matrix(ATT&CK)[21]

    ? Detection,Denial,and Disruption Framework Empowering Network Defense(D3FEND)[22]

    Fig.1 depicts the relationships between the knowledge bases mentioned above.From these knowledge bases,we extract multi-source network security information and store it in a graph database.In particular,the items in each knowledge base function as nodes in the graph database,while the relational linkages across knowledge bases operate as edges.These edges are not bidirectional between the knowledge bases mentioned above.However,they can be bi-directionally navigated when incorporated into the graph structure.As a result,any node can be used to query the data in any knowledge base.

    Figure 1:Linkages between knowledge bases

    2.2 Classes and Attributes of MTEAO

    We successfully linked multiple source knowledge bases and integrated the data from them as a source of security knowledge for developing our ontology model,the multi-source threat element analysis ontology(MTEAO).And we collectively call the entities in it,such as vulnerabilities,weaknesses,attack patterns,attack techniques,defense techniques,etc.,as threat elements.The specifics of the MTEAO’s classes are shown in Table 2.

    Table 2:The details of the classes

    The structure among classes is shown in Fig.2a,while the logical links among the second-level subclasses are shown in Fig.2b.

    Figure 2:(a)The inclusion relationships among classes;(b)The logical links among the second-level subclasses

    2.3 Inference Rules of MTEAO

    2.3.1 Design of Inference Rules

    Using inference rules enables us to deduce possible knowledge based on existing information,allowing us to discover new implicit correlations between threat elements.Protégé’s inference engine can execute sequential multi-step inference and aids in comprehending the inferred findings via inference interpretation.Table 3 shows how the seven inference rules in this paper are intended to serve diverse purposes.

    Table 3:Inference rules and usages

    2.3.2 Application of Inference Rules

    Then,we will demonstrate the practical application of inference rules in combating security threats.Below are two distinct scenarios that will showcase their effectiveness:

    1.Determine the vulnerability level of the asset and whether the asset will be conquered

    The asset“arch_newsworld”is stored in the email server and has a vulnerability known as“CVE-2005-3435”with a severity level of “High”.In Fig.3,the green box shows the vulnerability level of“arch_newsworld”is“HighLevel”by executing inference rule“R3”.Additionally,the officer can use the inference rule“R7”to determine if an attacker can conquer the asset.The red box shows that the attacker can obtain complete control of the email server and compromise the“arch_newsworld”asset.

    Figure 3:The result of determining the vulnerability level of the asset and whether the asset will be conquered

    2.Search for information on attack and defense

    The security officer can execute the“R6”inference rule to retrieve information on devices,assets,vulnerabilities,weaknesses,attack patterns,attack techniques,digital artifacts,and defense techniques.Displayed in the yellow box is the output of utilizing“R6”,as depicted in Fig.4.The“R1”inference rule can be used by the security officer to search defense techniques that relate to specific attack techniques directly.The green box displays the defense techniques for the attack technique“T1211”.

    Figure 4:The result of searching for information on attack and defense

    3 Two-Layer Threat Prediction Model

    In the event of a system threat,the top priority is to address and contain it promptly.As a result,it is crucial to evaluate and forecast the potential progression of the threat.This paper proposes a two-layer threat prediction model called TL-TPM,which aims to enhance the accuracy of predicting attacks.The macro-layer of TL-TPM draws the propagation path of threat between devices and associates these devices with the corresponding threat elements for threat alerting and response;The micro-layer depicts the evolution process of attack techniques while warning of attack techniques with a high probability of use,assisting security personnel to strengthen the prevention of specific attacks.The workflow of this paper is shown in Fig.5.

    3.1 The Macro-Layer of Threat Prediction Based on Knowledge Graph

    To accomplish his attack goal,the attacker will exploit weaknesses in the target network and execute a series of consecutive attacks.The macro-layer of TL-TPM maps this set of attack sequences as a propagation path of threat between devices.We describe the concept“attack”in the ontology as a relation link between the attackers and devices,changing the attack path prediction issue into the link prediction issue in the knowledge graph.To aid in the explanation of the below algorithm,the appropriate definitions are provided:

    ? Core asset(cas):The target asset the attacker aims to seize or obliterate.

    ? Threat degree (thd): The level of risk to the core asset when the device is under attack.The greater the threat level of a device,the more likely it is that an attacker will select that device for the next attack,leading the threat to spread to the core asset.thd ∈[0,1].

    ? Threat degree interval(tdi):Security personnel determine the interval of threat degree to classify the risk stages according to their needs.

    ? Topology layer(tl):The positioning layer of a device in the system topology.The device closer to the core assets is defined as a higher layer.

    ? Attack success probability(asp):The success probability of an attacker performing a single-step attack.

    ? Device set(Devices):A set of all the devices in the system.

    ? Business access relationship (bar): The access and control relationship between two devices.dnexpresses the business access relationships from deviced0to devicedn.And Bar denotes the set of business access relationships.

    ? Device access path(dpath):An acyclic series of devices connected by business access relationships.The device access path from the specific deviced0to the core asset located devicednis represented asdpath={d0,d1,...,dn}.

    ? Threat propagation path(tpath):It is an ordered sequence of devices conquered by the attacker.

    ? Initial device(ind):The device initially attacked by the attacker.

    ? Pre-privilege:It is the pre-condition that a business access relationship exists between devicedtand the previous onedt-1.

    ? Post-privilege: It is the post-condition that there is a vulnerability in the device,leading the attacker to gain complete control of the devicedtby launching an attack.

    Figure 5:Workflow of the system

    3.1.1 Calculation of Threat Influence Elements

    The role of the attacker’s psychology in the threat spread procedure is overlooked by most existing attack prediction systems.We evaluate the threat degree of the device based on the attack success probability to estimate the threat propagation path,considering that an attacker would always use the most favorable methods to attack the most susceptible device.

    1.Calculation of the Attack Success Probability

    Attack success probability refers to the success probability of an attacker performing a single-step attack.Specifically,there are two types of attacks:social engineering attacks and vulnerability exploit attacks.Professional security staff can easily avoid social engineering attacks,so the probability of success is low at 0.2.While the probability of success for vulnerability exploit attacks is determined by the Common Vulnerability Scoring System(CVSS)score[23].

    The CVSS score has a base score(Base)that reflects the inherent characteristic of a vulnerability,which remains unchanged over time and environment.The composition of the CVSS score is shown in Table 4.And its calculation formulae are shown in Eqs.(1)and(2).

    Table 4:Composition of the CVSS score

    when the vulnerability code is more mature,there is a greater chance that the vulnerability will be successfully exploited.So,we add the code maturity(ExploitCodeMaturity)to optimize the score[15],which is multiplied by 0.1 to represent the attack success probability.The attack success probability is calculated as Eq.(3).

    2.Calculation of the Threat Degree

    If deviced0in the device access pathdpathis compromised,the threat degree to the core asset can be calculated in the following way:

    i.Whendpath={d0},which means that the core asset is present in the initial device of the path,and that device has been compromised,then the threat degree is computed as Eq.(4).

    ii.Whendpath{d0},the attacker can only spread the threat from one device to another by conducting an attack.Therefore,the threat degree of the device can only be determined if the threat propagation pathtpathexists on the device access pathdpath.If not,it signifies that the threat cannot be disseminated to the core asset via thedpathby attack techniques.As a consequence,the threat degree is 0.

    To successfully compromise the high-topology layer device,the low-topology layer device must first be compromised.Consider the ratio of topological layer numbers between the device and the core asset as the weight.A higher weight indicates that devicedtis closer to the core asset.In addition,the attacker must take control of every device in the threat propagation path before devicedtif he wishes to compromise devicedt.So,this weight is then multiplied by the multiplication of the attack success probability of all devices on the threat propagation path passed from the initial deviced0to devicedt.In this case,the threat degree is calculated as Eq.(5).

    If devicedthas more than one adjacent device,and there is thetpathon thedpathbetweendtand each adjacent device.Then,the device with the highest threat degree among the adjacent devices is selected as the next target to attack and spread the threat.

    3.1.2 Threat Propagation Path Prediction Algorithm

    Next,this paper presents the threat propagation path prediction algorithm (TPPPA) based on the knowledge graph.TPPPA not only sequentially strings the attacked device nodes into a path but also associates them with the corresponding multi-source threats elements.It predicts the path while outputting relevant threat information,giving security personnel an intuitive understanding of the attacks being suffered and their countermeasures.

    The core code of TPPPA is as follows:

    The algorithm described above follows a series of steps: Steps 1)~4) involve initializing the required sets and extracting required data.Steps 5)~21)form the heart of the algorithm,predicting the threat propagation path.Because to completely control the devicedt,both requirements must be simultaneously met: 1.The adjacent devicedt-1of devicedthad been completely controlled by the attacker.And a device access path exists between thedt-1anddt.2.The devicedtcontains a vulnerability.As a result,the pre-privileges are extracted to establish the device access path and then the post-privileges are extracted to determine whether the threat propagation paths exist.Then,select the device with the highest threat degree among the adjacent devices as the next target.Afterward,create the directed edge to form the complete threat propagation path.Step 22)clusters devices into corresponding threat degree intervals and produces the macro threat state graph.Steps 23)~26)extract threat elements for all devices in thetpathand presents the result with the knowledge graph.

    3.2 The Micro-Layer of Threat Prediction Based on Event Graph

    The micro-layer of TL-TPM uses an absorbing Markov chain to map the attack graph to the event graph,which depicts the evolution process of attack techniques.It can warn of attack techniques with a high probability of use,assisting security personnel to strengthen the prevention of specific attacks.

    3.2.1 Preliminary Knowledge and Theoretical Arguments

    This section first explains the basic concepts of the attack graph and absorbing Markov chain,then argues the rationality of mapping the attack graph to the event graph through the absorbing Markov chain.Finally,the attack evolution path prediction algorithm is presented.

    1.Attack graph

    The attack graph (AG) is a visualization method to model the association of multi-step attack behavior and represent the attack process [24].It is a directed graph that portrays all possible penetration paths of an attacker in the network.An example of an attack graph is shown in Fig.6.

    Figure 6:The example of an attack graph

    AG is represented by a quadrupleAG=(S,E,A,δ),where:

    ? S denotes the set of state nodes,S={Si|i=1,2,···,j}denotes the set composed of j different state nodes,and the state nodes can be divided into starting state nodes,transition state nodes,and target state nodes.For example,in Fig.6,S1is the start state node,S2,S3,S4are the transition state nodes andS5is the target state node;

    ? E denotes the set of directed edges between state nodes,em,n∈E,em,nrepresents the edge of the state nodeSmpointing toSn,i.e.,a state transfer has occurred fromSmtoSn;

    ? A denotes the set of atomic attack nodes,A={ai|i=1,2,···,j},aiis an atomic attack,with each successful attack corresponding to a state transitionem,n.

    ?δdenotes the set of state transition probabilities,δ(em,n) denotes the probabilityP(Sm|Sn)of the attacker transferring from stateSmto stateSn,andδ(em,n)is equal to the probabilityP(a)of an atomic attack a occurring.

    2.Absorbing Markov chain

    The main advantages of Markov processes are the ability to build prediction models in time based on statistical information or the results of operational observations[25].And the Markov chain(MC)is a Markov process in which both time and state are discrete[26].For a discrete setS={s1,s2,···,sn}containing a finite number of states,each state is only related to the previous adjacent state,called posteriority-free,i.e.,The probabilityis the transition probability of the statesi→si-1,and the transition probabilities between all state nodes form the state transition probability matrix P.

    The absorbing Markov chain(AMC)is an MC that contains at least one absorbing state and from which any one of the states can eventually reach the absorbing state.If an AMC has r absorbing states,t non-absorbing states,and all states are n,thenn=r+t.At this point,the state transition probability matrix is expressed asP=Q is thet×tmatrix representing the probabilities of transition between transition states;0 is ther×tzero matrix;R is thet×rnon-zero matrix representing the transition probabilities from transition states to absorbing states;and I is ther×runit matrix.

    3.Mapping of attack graph to the absorbing Markov chain

    In AG,the transition of the current statesito the next statesi+1is only related to whether the statesisatisfies the vulnerability exploitation,independent of the previous states,at which point the transition between states is precisely in line with the posteriority-free property of MC;The attacker will eventually reach a stable termination state through a multi-step attack based on vulnerability exploitation,which is consistent with the absorption state of AMC;A network attack has at least one termination state,and an AMC has at least one absorbing state;And the successful probability of atomic attack in AG can be regarded as the state transition probability in AMC.Therefore,AG can be mapped to AMC.

    4.Mapping of absorbing Markov chain to event graph

    The event graph (EG) represents events and their relationships as a logically directed graph.It takes abstract and generalized events as nodes,connected to form directed edges that express the evolution process between events.And this process can be considered as a transition between events,then the transition probability on the directed edge represents the probability of the event’s evolution.This probability can be calculated and expressed precisely in terms of the transition matrix of AMC.Thus,AMC can be mapped to the EG.At the same time,we can optimize the Markov transition matrix by considering multiple dimensions affecting the event transition and assigning different weights to them.So far,we have achieved the mapping from AG to EG.

    3.2.2 Attack Evolution Path Prediction Algorithm

    Unlike the way of calculating event transition probability in general EG,this paper optimizes it to reflect the event evolution process better.We propose an available method for measuring the hazard of an attack technique.We calculate the hazard of attack techniques from three metrics:“Life Cycle Stage”,“Likelihood of Attack”,and“Skills Required0”.The higher hazard means the higher the probability that the attacker will use the attack technique,then the higher the likelihood that the attack technique will transfer.

    The ATT&CK matrix contains 14 attack strategies,and each attack strategy includes several attack techniques.It represents a complete sequence of attack lifecycle stages in the form of a table from left to right.The further back the attack technique is in the lifecycle stage,the closer it is to complete an attack and the more harmful it is.Therefore,each attack technique is scored according to the attack lifecycle stage it belongs to.

    The two metrics in CAPEC are: “Likelihood of Attack” and “Skills Required”.Both metrics measure the probability of an attack occurring and are graded as “High”,“Medium”,and “Low”.

    As shown in Table 5,we converted them into scores “9,” “6”,and “3” to quantify the probability of using the attack technique.The higher the probability that an attack technique is used,the more harmful it is.

    Table 5:Grade and score

    Table 6:Instance details

    Each attack technique is scored on the above three metrics,and the three scores are summed and averaged for the final attack technique hazard score.Based on the method of attack technique hazard metric,we propose the attack evolution path prediction algorithm(AEPPA).AEPPA normalizes the attack technique hazard score to realize the mapping from AG to AMC and finally constructs the EG with the Markov transition matrix.The core code of AEPPA is as follows:

    The algorithm described above follows a series of steps:Step(1)initializes the list for transition probability matric of AMC.Step(2)uses the method of attack technique hazard metric to obtain the hazard scores for all attack techniques based on the set of attack techniques hazards.Step(3)generates an n×n dimensional matrix using the hazard scores of all attack techniques.If the attacker and the attack techniques are considered state nodes,then n represents the number of state nodes,and the values ofrowirepresents the score from thestatenodeito all state nodes.Steps(4)~Step(9)calculate and obtain the transition probability of each attack technique to itself and any other attack technique,and put them into the matrix list in Step(1).At this point,we obtain the transition probability matrix of AMC.Step(10)gets the EG based on the transition probability matrix.

    AEPPA finally outputs the hazard score for each attack technique and the transition probability matrix of the attack techniques,enabling the subsequent analysis of the evolution process to depend on accurate data.At the same time,the visualization of EG enhances the understanding of the evolution process of threat events.

    4 Experiment

    4.1 Scene of the Experiment

    The experiment scene is shown in Fig.7.The system consists of three subnets,with a firewall and the intrusion detection systems(IDS)deployed to achieve access control and intrusion detection.The firewall allows only the workstation and web server in the demilitarized zone(DMZ)to interact with the outside world,and the network line of the workstation1 is connected from the router;Subnet 1 deploys an administration station,a web server,and a file transfer protocol server.And the router also connects with the administration station,which can interact with workstation1 and access the web server2 and file transfer protocol server;Subnet 2 deploys a workstation and a data server.Web server1 and workstation2 have user accounts of the data server and can access the data server.Tables 6 and 7 present the corresponding information and the business access relationships of the devices in the system.

    Figure 7:Scene of the experiment

    4.2 Threat Prediction

    The following initial conditions are given in Table 8 according to the experiment scene.In this section,predictions are respectively made at the macro-layer and micro-layer.

    Table 8:Initial conditions

    4.2.1 Macro Threat Prediction Experiment Based on Knowledge Graph

    Based on the threat degrees of the devices,users can set the appropriate threat degree intervals according to their needs to divide the threat status stages and cluster devices with the same threat degree in the same interval.Assume that the enterprise stipulates that the threat degree does not exceed 0.15 is low-risk status,0.15 to 0.20 is medium-risk status,and over 0.20 is high-risk status.And the three risk states of low,medium,and high are respectively marked with blue,yellow,and red colors.Executing the TPPPA based on the initial conditions,the macro risk state graph is constructed as shown in Fig.8.The circles in Fig.8 represent the devices under attack;the dotted links constitute the device access paths;and the solid links form the threat propagation path,indicating the actual trajectory of the threat as it moves from the low threat degree devices to the high threat degree devices.The threat degree and vulnerability type of each device is shown in the rectangular box.For simplicity of expression,the devices are replaced by abbreviations,e.g.,the firewall is written as FW.

    Figure 8:Macro risk state graph

    At the same time,TPPPA calculates the devices most likely to be compromised by the attacker at each step,links them sequentially into the path,and connects them to the associated multi-source threat elements for a complete threat propagation path graph.The threat propagation path is marked with black arrows in Fig.9,and the different colored circles represent different threat elements.Security personnel can rely on the graph to quickly grasp the threat and take appropriate defensive measures for each attack to contain the spread of the threat.

    Based on the experiment results,the attacker’s intent was analyzed as follows:

    1.The attacker conquered Firewall(FW)by attacking the vulnerability“CVE-2022-3144”in the software “Wordfence_Security”,which caused FW to be injected malicious web scripts into the settings and to be compromised completely.

    2.Then,the attacker attacked the Router by exploiting the vulnerability “CVE-2022-20923”in hardware“rv_110w”,which allowed the unauthenticated attacker to bypass authentication.

    3.Since Work Station 1(WS_1)was connected from the Router and its server management software “vcenter_server”contained a remote code execution vulnerability “CVE-2021-21972”.

    The attacker used CVE-2021-21972 to execute commands with unrestricted privileges and thus gained complete control of WS_1.

    4.There was a business access path between WS_1 and the Admin Station(AS),and the attacker attacked the AS along the network.AS owned the software “WeCube”,which contained the vulnerability “CVE-2022-37785”that caused plaintext passwords to be displayed in the terminal plug-in configuration.The attacker then exploited the vulnerability to steal passwords and gain complete control of AS.

    5.Via AS,the attacker accessed the FTP Server(FTPS),where the core asset is located.The FTPS contained the software“glFTPd”with the vulnerability“CVE-2021-31645”.By breaking the link limit with CVE-2021-31645,the attacker triggered a threat of denial service.

    Figure 9:Threat propagation path and threat elements

    Combined with the macro risk state graph,the experiment results were compiled to present the corresponding prediction information,as shown in Table 9.

    Table 9:Prediction of the threat propagation path

    Through the above analysis,the attack steps can be visualized,and the predicted threat propagation path can be used to contain the threat spread in time,which proves the effectiveness and practicality of TPPPA.While TPPPA is based on the ontology model MTEAO,this ontology model extends and improves the modeling knowledge of the security domain compared to the previous work.In Table 10,the MTEAO is compared to other ontology models,and the results are presented below:

    Table 10:Comparison among the network security ontology models

    Table 11:The hazard scores of attack techniques

    Table 12:The transition probabilities of attack techniques

    4.2.2 Micro Threat Prediction Experiment Based on Event Graph

    Based on the prediction results of the threat propagation path in Experiment 4.2.1 and executing AEPPA,the attack technique hazard scores of the devices,the Markov transition probability matrix,and the attack technique evolution event graph are obtained to deepen the prediction.

    AEPPA first takes the path predicted by TPPPA as input and outputs the state transition matricesPandQ,then calculates the matrixNaccording to the formulaN=(I-Q)-1.The matrixNrepresents the expected number distribution of state node visits.The values in the first row of it are the number of visits from the state nodeS1to each remaining state node.In the context of the experiment in this paper,the values in the first row of the matrixNcan be interpreted as the number of times the attacker uses each attack technique.And the higher the number of times the attack technique is used,the higher the probability of its use.MatricesP,Q,andNare shown below.Tables 11 and 12 give information about the attack techniques based on the results returned by TEPPA.

    TEPPA first links the attack techniques into the AG,constructs the AMC based on the AG,and then maps the AMC to the EG.Fig.10 shows the AG and the mapped attack technique evolution event graph,where the state transition probabilities on the edges have been normalized.

    Figure 10:Mapping of attack graph to attack technique evolution event graph

    In Fig.11,the red circles indicate the attack techniques with the highest probability of being used to compromise each device.They are connected by red lines to form the attack technique evolution path with the highest probability.Finally,we integrate the prediction results from the macro and microlayer,which enables the mapping of the attacked devices to the attack techniques.Security personnel can visualize the most likely attack paths and techniques attackers use to protect critical devices and prevent specific attack techniques better.

    A device can be attacked by more than one attack technique,so when the probabilities of all possible attack techniques are summed,the higher the value,the higher the probability of the device being attacked.We regard this probability as the hazard degree of the device and determine the protection sequence of the device according to the hazard degree.In summary,the protection sequence of the device in the threat propagation path can be predicted based on the matrix N.As seen in Fig.12,FW,Router,WS_1,and AS are the devices in the threat propagation path predicted by TPPPA.S2–S15,respectively,correspond to an attack technique,clustered according to the attacked device FW,Router,WS_1,and AS.The bar chart shows the number of visits to each attack technique,which represents the use probability of it.The line in the graph shows the sum of the use probabilities of all attack techniques for each device,i.e.,the risk degree of the device.

    Figure 11:TL-TPM combines macro and micro-layer

    Figure 12:Expected number distribution of using each attack technique

    The higher the risk degree of the device,the higher the priority to protect it.Therefore,from the line in Fig.12,we can see that the sequence of device protection in the threat propagation path predicted by AEPPA is:AS>WS_1>Router>FW.Meanwhile,the attack technique T1005,represented by the state nodeS14,has the highest number of node visits.It indicates that the attacker will most likely use T1005,so AS should be strengthened to defend T1005.

    4.3 Contrast Analysis

    In this section,to illustrate the effectiveness of TL-TPM,this paper compares it with Hu et al.’s[10]model.Specifically,TL-TPM compares the prediction results of the device repair sequence and threat propagation path,and the time complexity.Finally,it compares with several previous models in a comprehensive way.

    1.Prediction of Device Repair Sequence

    We use Hu Hao’s method to obtain his device repair sequence for this experiment scene.The topology of the experiment scenario is shown in Fig.13.Similarly,his method needs to derive the state transition probability matricesP’andN’,and the values in the first row of the matrixN′are used to determine the sequence of repair.The matricesP’andN’are shown below.

    To illustrate the effectiveness and superiority of TL-TPM,we compare the predicted outcomes of device repair sequences of TL-TPM with Hu Hao’s method.Table 13 illustrates the device repair sequences,and it can be observed that Hu Hao’s method indicates that DS should be prioritized for repair when adopting network security measures,but TL-TPM indicates that AS should be prioritized for repair.

    Figure 13:The topology of the experiment scenario

    Table 13:The sequence of device repair in the threat propagation path

    For this discrepancy,we analyze the effect of device node repair.Repairing a device node,i.e.,deleting it and all edges associated with it in the topology graph,and then counting the number of remaining attack paths,the results are shown in Fig.14.And from Fig.13,it can be found that there are six attack paths that can attack FTPS.It is clear that when priority is given to protecting AS,i.e.,the device node is removed from the graph,and the remaining attack paths are two.While the DS is removed,the remaining attack paths are four.Therefore,the result of TL-TPM is more scientific and accurate.If the device nodes are repaired sequentially according to the repair sequence in Table 13,it can be seen from Fig.15 that both Hu Hao’s method and TL-TPM leave only two attack paths after repairing the device for the third time,and leave no attack paths after repairing the device for the fourth time.But TL-TPM overall outperforms Hu Hao’s approach by intercepting more attack paths earlier.

    Figure 14:The number of remaining paths after node repair

    Figure 15:The remaining attack paths after repairing devices in sequence

    2.Prediction of Threat Propagation Path

    Next,we compare the threat propagation path predicted by TL-TPM and Hu Hao’s method.Hu Hao’s model first obtains the state transition probability of each device node according toP′,then the state transition probabilities of the device nodes in each attack path are cumulatively multiplied to calculate the probability of success in compromising the core asset along that path.The path with the highest probability of success is used as the final predicted threat propagation path.The lengths of all threat propagation paths and their success probabilities are shown in Table 14.

    Table 14:Threat propagation path lengths and their probability distributions

    The results in the Table 14 show thatRoute4has the highest probability of success.Therefore,the path predicted by Hu Hao’s algorithm isRoute4.And as seen from the previous section,the path predicted by TL-TPM isRoute1,which differs significantly from the pathRoute4indicated by Hu Hao.This is because Hu Hao’s method multiplied cumulatively the transition probabilities between all devices in the path and simply chose the path with the highest cumulative success probability value,not considering that the attacker penetrated gradually.When the attacker is faced with two attackable devices,he always selects the device that is more favorable to him,i.e.,the one with the higher risk degree,to attack.As shown in Table 14,althoughRoute4has a higher cumulative success probability thanRoute1,the risk degree of Router inRoute1is higher than that of Web_1 inRoute4.As a result,the attacker is more likely to choose Router to attack and follow theRoute1.Overall,TL-TPM takes a comprehensive view from the attacker’s point to reflect the actual situation more accurately.

    3.Comparison of Time Complexity

    Then,we compare the time complexity of TL-TPM with that of Hu Hao’s model.TL-TPM includes two layers,each containing one main algorithm.

    Firstly,the time complexity of TPPPA in the macro-layer is analyzed.According to the algorithm logic,assuming that there are n devices between the initial deviceindand the devicetargetwhere the core asset is located.And the average number of adjacent devices at the next layer for each device is m.Then a total of(n-1)mdevices need to be calculated for the threat degree from theindto thetarget.So,the time complexity of execution fromindtotargetis O((n-1)m).Because m is constant,the time complexity of the algorithm is O(n).

    Secondly,the time complexity of AEPPA in the micro-layer is analyzed.Executing AEPPA is based on the result of TPPPA.Assuming a total of n attack techniques are extracted from the result,calculating their state transition probabilities requires the generation of two matrices with a time complexity of O(n2).Therefore,the time complexity of TL-TPM to obtain the final prediction result is O(n2)+O(n),i.e.,O(n2),while the time complexity of Hao Hu’s model is O(n3).As a result,TL-TPM is superior in terms of time complexity.

    4.Comparison of Other Prediction Models

    Comparing TL-TPM with other attack prediction models,the results in Table 15 show that TLTPM is more advanced with considering both macro and micro-layers to predict threat development.It considers the threat impact elements (attack success probability,threat degree) and avoids path redundancy.Furthermore,only this paper’s research has the capability of predicting the threat propagation path while correlating the attacked devices with their respective threat elements,broadening the range of predictions.Moreover,TL-TPM can accurately predict the attack techniques,not only letting security personnel know which devices should be protected in priority but also which attack techniques should be strengthened against.

    Table 15:Comparison of attack prediction models

    5 Conclusion

    Unlike most previous works that predict the attack based on only one layer,this paper proposes a two-layer model TL-TPM that predicts the development trend of threat events from both macro and micro-layers.The macro-layer proposes the threat propagation path prediction algorithm TPPPA based on the knowledge graph.TPPPA measures the device threat degree by combining system topology and attack success probability.Based on the device threat degree,it predicts the devices under attack,then links them sequentially into threat propagation path and correlates each device with relevant threat elements,which provides decision support for defense response.The micro-layer proposes the attack evolution path prediction algorithm AEPPA based on the event graph.AEPPA combines the prediction results of the macro-layer with the temporal characteristics of the attack behaviors and innovatively maps the attack graph to the event graph using the absorbing Markov chain as a bridge,which accurately portrays the evolution of the attack techniques used in threat events.Finally,the macro-layer and micro-layer prediction results are integrated to visualize the external path and internal logic of threat event development,enabling security personnel to quickly grasp the threat status of system devices and focus on defense.

    However,TL-TPM does not consider zero-day vulnerabilities when predicting threats,and the current algorithms and inference rules only work with known vulnerabilities.For future work,we will use the relationship paths linking attacker entities to target entities in the knowledge graph as features and construct attack samples using historical attack data for the given system.Then,we use machine learning to learn the path features in the attack samples to distinguish the zero-day vulnerabilities from the known vulnerabilities.Meanwhile,TL-TPL does not consider the vulnerability lifecycle,which may affect the calculation of the attack success probability.As a result,we will take the vulnerability lifecycle into account,quantitatively analyze the change in vulnerability exploitability over time,optimizing the calculation of the state transition matrix.

    Acknowledgement:The authors would like to thank the reviewers for the correct and concise recommendations that help present the materials better.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:The authors confirm contribution to the paper as follows:methodology:Shuqin Zhang;conceptualization:Shuqin Zhang,Xinyu Su;investigation:Yunfei Han;data curation:Peiyu Shi;analysis and interpretation of results: Yunfei Han,Tianhui Du;validation: Tianhui Du;draft manuscript preparation:Xinyu Su.The authors declare that they have no conflicts of interest to report regarding the present study.

    Availability of Data and Materials:The ontology and data can be obtained by contacting the corresponding author.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    一级av片app| 精品久久久噜噜| 日韩 亚洲 欧美在线| 亚洲av免费高清在线观看| 91在线精品国自产拍蜜月| 国产精品人妻久久久影院| 久久精品国产亚洲av香蕉五月| 亚洲一区二区三区色噜噜| 日本-黄色视频高清免费观看| 变态另类成人亚洲欧美熟女| 午夜视频国产福利| 真实男女啪啪啪动态图| 久久国产精品人妻蜜桃| 蜜桃久久精品国产亚洲av| 亚洲人与动物交配视频| 日韩亚洲欧美综合| 久久久久国内视频| 美女cb高潮喷水在线观看| 午夜福利在线观看吧| 亚洲欧美日韩卡通动漫| 舔av片在线| 久久精品综合一区二区三区| 国产精品久久久久久精品电影| 久久99热这里只有精品18| 欧美bdsm另类| 此物有八面人人有两片| 免费看a级黄色片| 精品一区二区三区人妻视频| 身体一侧抽搐| 熟女电影av网| 女同久久另类99精品国产91| 亚洲欧美日韩东京热| 日韩精品中文字幕看吧| 不卡视频在线观看欧美| 国产毛片a区久久久久| 日韩精品中文字幕看吧| 网址你懂的国产日韩在线| 免费av不卡在线播放| 国产乱人伦免费视频| 免费av不卡在线播放| 欧美人与善性xxx| 老司机深夜福利视频在线观看| 在线观看舔阴道视频| 亚洲无线观看免费| 尾随美女入室| 国产精品99久久久久久久久| 欧美高清成人免费视频www| 亚洲午夜理论影院| 国产伦在线观看视频一区| 两性午夜刺激爽爽歪歪视频在线观看| 中国美白少妇内射xxxbb| 国产伦在线观看视频一区| 色5月婷婷丁香| 亚洲国产精品合色在线| 伦理电影大哥的女人| 亚洲va日本ⅴa欧美va伊人久久| 午夜日韩欧美国产| av在线亚洲专区| 搞女人的毛片| 99热精品在线国产| 日韩大尺度精品在线看网址| 国产伦精品一区二区三区四那| 色5月婷婷丁香| 免费av不卡在线播放| 波野结衣二区三区在线| 国产免费男女视频| 黄色配什么色好看| 变态另类成人亚洲欧美熟女| 亚洲中文字幕一区二区三区有码在线看| 国产老妇女一区| 在线观看免费视频日本深夜| 国产毛片a区久久久久| 看免费成人av毛片| 国产精品一区二区三区四区免费观看 | 国产精品亚洲美女久久久| 成人综合一区亚洲| 真实男女啪啪啪动态图| 婷婷丁香在线五月| 如何舔出高潮| 成年免费大片在线观看| bbb黄色大片| 一本一本综合久久| 日韩亚洲欧美综合| 久久久色成人| 午夜精品在线福利| 久久午夜亚洲精品久久| 免费观看的影片在线观看| 精品久久久久久久末码| 最近最新免费中文字幕在线| 亚洲最大成人手机在线| 精品欧美国产一区二区三| 狂野欧美白嫩少妇大欣赏| 三级毛片av免费| 亚洲久久久久久中文字幕| 欧美另类亚洲清纯唯美| 久久久久久久久久久丰满 | 真人做人爱边吃奶动态| 真人做人爱边吃奶动态| 中文资源天堂在线| 久久久久久久久中文| 日本熟妇午夜| 国产午夜精品论理片| 国内精品一区二区在线观看| 国产高清不卡午夜福利| 不卡一级毛片| 亚洲专区中文字幕在线| 成人国产一区最新在线观看| 免费看a级黄色片| 婷婷色综合大香蕉| 午夜a级毛片| 日本 av在线| 国产精品国产三级国产av玫瑰| 国产亚洲91精品色在线| 噜噜噜噜噜久久久久久91| 亚洲七黄色美女视频| 日韩高清综合在线| 久99久视频精品免费| 国产麻豆成人av免费视频| 亚洲欧美日韩高清专用| 国产精品一区www在线观看 | 免费在线观看影片大全网站| 亚洲自拍偷在线| 精华霜和精华液先用哪个| 一进一出好大好爽视频| 波多野结衣高清作品| 久久久久久久午夜电影| 日韩欧美免费精品| 男女视频在线观看网站免费| 一边摸一边抽搐一进一小说| 亚洲欧美日韩高清专用| 国产日本99.免费观看| 人妻久久中文字幕网| 色av中文字幕| 日韩欧美国产在线观看| 欧美日本视频| 亚洲精品一卡2卡三卡4卡5卡| 亚洲中文字幕一区二区三区有码在线看| av在线观看视频网站免费| 黄色女人牲交| 天堂动漫精品| 久久久久久久精品吃奶| 日本欧美国产在线视频| 日本黄色片子视频| 中文字幕人妻熟人妻熟丝袜美| 久久久久免费精品人妻一区二区| 亚洲电影在线观看av| 成人三级黄色视频| 亚洲熟妇中文字幕五十中出| 免费大片18禁| 亚洲四区av| 精品久久久久久成人av| 人人妻人人看人人澡| 99视频精品全部免费 在线| av天堂在线播放| 高清日韩中文字幕在线| 乱人视频在线观看| 日本一二三区视频观看| 国产v大片淫在线免费观看| 精品久久久噜噜| 一个人看的www免费观看视频| 日韩一本色道免费dvd| 久久这里只有精品中国| 女生性感内裤真人,穿戴方法视频| 99久久无色码亚洲精品果冻| 能在线免费观看的黄片| 欧洲精品卡2卡3卡4卡5卡区| 看片在线看免费视频| 精品福利观看| 成人三级黄色视频| 国产欧美日韩精品亚洲av| 中亚洲国语对白在线视频| 亚洲成a人片在线一区二区| 日韩大尺度精品在线看网址| 欧美区成人在线视频| 国产真实伦视频高清在线观看 | 精品久久久久久久久久久久久| 免费一级毛片在线播放高清视频| .国产精品久久| www日本黄色视频网| 国产精品自产拍在线观看55亚洲| 亚洲av免费高清在线观看| 精品久久久久久成人av| 欧美激情国产日韩精品一区| 在线观看av片永久免费下载| 五月玫瑰六月丁香| 日本 欧美在线| 亚洲精品色激情综合| 中文字幕熟女人妻在线| 我要看日韩黄色一级片| 97热精品久久久久久| 亚洲久久久久久中文字幕| 人妻制服诱惑在线中文字幕| av在线观看视频网站免费| 国产国拍精品亚洲av在线观看| 最近最新免费中文字幕在线| 99久国产av精品| 午夜免费男女啪啪视频观看 | 一区二区三区激情视频| 最新中文字幕久久久久| 亚洲av第一区精品v没综合| 夜夜夜夜夜久久久久| 欧美潮喷喷水| 国产精品亚洲一级av第二区| av中文乱码字幕在线| 88av欧美| 午夜老司机福利剧场| 国产精品伦人一区二区| 午夜免费男女啪啪视频观看 | 男女啪啪激烈高潮av片| 国产一区二区在线av高清观看| 最近最新免费中文字幕在线| 亚洲成人久久性| 男人舔女人下体高潮全视频| 99riav亚洲国产免费| 国产精品野战在线观看| 欧美又色又爽又黄视频| 俄罗斯特黄特色一大片| 亚洲不卡免费看| 欧美日韩黄片免| 九色成人免费人妻av| 久久午夜亚洲精品久久| 国产av麻豆久久久久久久| 久久久久久九九精品二区国产| 国产精品自产拍在线观看55亚洲| 欧美极品一区二区三区四区| 全区人妻精品视频| 亚洲最大成人av| 日本三级黄在线观看| 免费av不卡在线播放| 国产一区二区激情短视频| 啦啦啦啦在线视频资源| 网址你懂的国产日韩在线| 九九久久精品国产亚洲av麻豆| 在线观看午夜福利视频| 别揉我奶头 嗯啊视频| 亚洲中文日韩欧美视频| 最近在线观看免费完整版| 欧美色视频一区免费| 91麻豆av在线| 欧美成人免费av一区二区三区| 黄色欧美视频在线观看| 国产极品精品免费视频能看的| 丰满的人妻完整版| 国模一区二区三区四区视频| 蜜桃久久精品国产亚洲av| 少妇熟女aⅴ在线视频| 日韩欧美国产一区二区入口| 国产国拍精品亚洲av在线观看| 国产欧美日韩一区二区精品| 精品人妻一区二区三区麻豆 | 欧美成人a在线观看| 男人狂女人下面高潮的视频| 日日摸夜夜添夜夜添av毛片 | 在线免费十八禁| 日本三级黄在线观看| 亚洲国产精品合色在线| 国产男靠女视频免费网站| 女生性感内裤真人,穿戴方法视频| 成年人黄色毛片网站| 成人美女网站在线观看视频| 精品不卡国产一区二区三区| 久久久久久久久大av| 午夜老司机福利剧场| 精品久久久久久成人av| 伦理电影大哥的女人| 国内揄拍国产精品人妻在线| 免费人成视频x8x8入口观看| 亚洲精品乱码久久久v下载方式| 亚洲国产精品合色在线| 3wmmmm亚洲av在线观看| 丝袜美腿在线中文| 九九爱精品视频在线观看| av福利片在线观看| 免费av毛片视频| 18禁裸乳无遮挡免费网站照片| 99久久成人亚洲精品观看| h日本视频在线播放| 国产高清激情床上av| 69av精品久久久久久| 亚洲av不卡在线观看| 国产免费男女视频| 精品久久久久久久久亚洲 | 色综合婷婷激情| 日韩一本色道免费dvd| 国产高清视频在线观看网站| 国产人妻一区二区三区在| 国产精品电影一区二区三区| 国产精品综合久久久久久久免费| 国国产精品蜜臀av免费| 日韩 亚洲 欧美在线| av专区在线播放| 国产伦一二天堂av在线观看| 亚洲欧美日韩无卡精品| 亚洲黑人精品在线| 别揉我奶头 嗯啊视频| 亚洲av五月六月丁香网| 日韩中字成人| 亚洲欧美日韩卡通动漫| 欧美国产日韩亚洲一区| 麻豆成人av在线观看| 国产精品一及| 嫩草影院入口| 在线播放国产精品三级| 欧美日韩综合久久久久久 | 91在线精品国自产拍蜜月| 内地一区二区视频在线| 国产精品久久久久久久电影| 国产男人的电影天堂91| bbb黄色大片| 久久精品国产99精品国产亚洲性色| 中文字幕高清在线视频| 大型黄色视频在线免费观看| 国产精品自产拍在线观看55亚洲| 久久精品国产99精品国产亚洲性色| 婷婷亚洲欧美| 久久久久久伊人网av| 国产精品嫩草影院av在线观看 | 夜夜看夜夜爽夜夜摸| 免费不卡的大黄色大毛片视频在线观看 | 欧美高清性xxxxhd video| 欧美日本视频| 在线观看一区二区三区| 高清毛片免费观看视频网站| 亚洲欧美日韩高清在线视频| 22中文网久久字幕| 国产精品精品国产色婷婷| 久久草成人影院| 又黄又爽又免费观看的视频| 亚洲美女视频黄频| 久久午夜亚洲精品久久| 成人精品一区二区免费| 波多野结衣高清无吗| 国内毛片毛片毛片毛片毛片| 色av中文字幕| 国产精品亚洲一级av第二区| 搡女人真爽免费视频火全软件 | 国产成年人精品一区二区| 国产真实乱freesex| netflix在线观看网站| 精华霜和精华液先用哪个| 久久久久国内视频| 窝窝影院91人妻| 亚洲欧美日韩无卡精品| www.www免费av| 波多野结衣巨乳人妻| 亚洲真实伦在线观看| 亚洲国产精品成人综合色| 亚洲在线观看片| 久久热精品热| 天美传媒精品一区二区| 观看免费一级毛片| 此物有八面人人有两片| 亚洲欧美日韩卡通动漫| 国产大屁股一区二区在线视频| 国产女主播在线喷水免费视频网站 | 俺也久久电影网| 国内精品久久久久精免费| 久久久午夜欧美精品| 丝袜美腿在线中文| 久久久精品大字幕| 亚洲av中文av极速乱 | 成人精品一区二区免费| 午夜影院日韩av| 97热精品久久久久久| 精品国内亚洲2022精品成人| 国产男靠女视频免费网站| 女人十人毛片免费观看3o分钟| 久久精品国产鲁丝片午夜精品 | 美女cb高潮喷水在线观看| 国产欧美日韩精品一区二区| 日韩欧美精品v在线| 国模一区二区三区四区视频| 国产av麻豆久久久久久久| 男人舔女人下体高潮全视频| 真人一进一出gif抽搐免费| 搞女人的毛片| 国产精品一区二区三区四区久久| 中文字幕精品亚洲无线码一区| 在线观看66精品国产| 国产国拍精品亚洲av在线观看| 国产单亲对白刺激| 亚洲电影在线观看av| 亚洲无线在线观看| 九九爱精品视频在线观看| ponron亚洲| 欧美成人性av电影在线观看| 亚洲在线观看片| 91av网一区二区| 午夜福利在线观看吧| 18+在线观看网站| 精品一区二区免费观看| 欧美色视频一区免费| 国产免费男女视频| 丰满人妻一区二区三区视频av| 中文字幕精品亚洲无线码一区| 国产老妇女一区| 我要看日韩黄色一级片| 99热这里只有精品一区| 成人av一区二区三区在线看| 狠狠狠狠99中文字幕| 老师上课跳d突然被开到最大视频| 婷婷精品国产亚洲av在线| 亚洲黑人精品在线| 免费一级毛片在线播放高清视频| 少妇人妻一区二区三区视频| 99久久精品国产国产毛片| 日日摸夜夜添夜夜添av毛片 | 夜夜夜夜夜久久久久| 中文亚洲av片在线观看爽| 成年女人永久免费观看视频| 亚洲男人的天堂狠狠| 亚洲精品亚洲一区二区| 亚洲aⅴ乱码一区二区在线播放| 国产精品野战在线观看| 精品一区二区免费观看| 国产中年淑女户外野战色| 国语自产精品视频在线第100页| 亚洲av成人av| 又爽又黄无遮挡网站| 国产免费一级a男人的天堂| 国产黄色小视频在线观看| 老师上课跳d突然被开到最大视频| 日韩精品青青久久久久久| 中亚洲国语对白在线视频| 久久久久免费精品人妻一区二区| 免费av毛片视频| 如何舔出高潮| 国产高清视频在线播放一区| 久久天躁狠狠躁夜夜2o2o| 久久久久久久久久成人| 国产精品人妻久久久影院| 欧美极品一区二区三区四区| 日韩一本色道免费dvd| 久久天躁狠狠躁夜夜2o2o| 91在线观看av| 亚洲av成人av| 蜜桃久久精品国产亚洲av| av在线观看视频网站免费| 国产亚洲av嫩草精品影院| 成人永久免费在线观看视频| 精品一区二区免费观看| 日本撒尿小便嘘嘘汇集6| 国产探花极品一区二区| 国产av不卡久久| 免费在线观看日本一区| 午夜影院日韩av| 成人无遮挡网站| 两性午夜刺激爽爽歪歪视频在线观看| 国产精品一及| 麻豆精品久久久久久蜜桃| 国产精品亚洲一级av第二区| 麻豆国产97在线/欧美| 亚洲人成网站在线播| 亚洲精品一区av在线观看| 男插女下体视频免费在线播放| 成人高潮视频无遮挡免费网站| 国产黄a三级三级三级人| 国产精品久久电影中文字幕| 国产精品嫩草影院av在线观看 | 老女人水多毛片| 亚洲精品在线观看二区| 好男人在线观看高清免费视频| 熟妇人妻久久中文字幕3abv| 国产一区二区亚洲精品在线观看| 精品人妻一区二区三区麻豆 | 欧美+日韩+精品| 99热只有精品国产| 99热这里只有精品一区| 国产精品福利在线免费观看| av女优亚洲男人天堂| h日本视频在线播放| 超碰av人人做人人爽久久| 免费一级毛片在线播放高清视频| 我的女老师完整版在线观看| 欧美极品一区二区三区四区| 神马国产精品三级电影在线观看| 一本久久中文字幕| 婷婷亚洲欧美| 免费观看人在逋| 日韩一区二区视频免费看| 日日撸夜夜添| 国产在视频线在精品| 91麻豆精品激情在线观看国产| 级片在线观看| 国产91精品成人一区二区三区| 亚洲久久久久久中文字幕| 婷婷色综合大香蕉| 老司机福利观看| 亚洲精品日韩av片在线观看| 免费看av在线观看网站| 欧美又色又爽又黄视频| 狂野欧美白嫩少妇大欣赏| 三级国产精品欧美在线观看| 97热精品久久久久久| 两性午夜刺激爽爽歪歪视频在线观看| 国产一区二区三区在线臀色熟女| 淫妇啪啪啪对白视频| 国产蜜桃级精品一区二区三区| 成人二区视频| 国产三级中文精品| 可以在线观看的亚洲视频| 国产精品久久久久久亚洲av鲁大| av女优亚洲男人天堂| 欧美日韩黄片免| 嫁个100分男人电影在线观看| 亚洲专区国产一区二区| 91久久精品国产一区二区成人| 婷婷亚洲欧美| 亚洲aⅴ乱码一区二区在线播放| 小蜜桃在线观看免费完整版高清| 久久这里只有精品中国| 久99久视频精品免费| 国产亚洲精品av在线| 91av网一区二区| 欧美日韩乱码在线| 狂野欧美白嫩少妇大欣赏| 别揉我奶头 嗯啊视频| 国产黄片美女视频| 久久婷婷人人爽人人干人人爱| 欧美成人一区二区免费高清观看| 白带黄色成豆腐渣| 丝袜美腿在线中文| 国产伦一二天堂av在线观看| 丰满乱子伦码专区| 亚洲三级黄色毛片| 99在线人妻在线中文字幕| 国产探花在线观看一区二区| 99在线人妻在线中文字幕| 国产精品野战在线观看| 女生性感内裤真人,穿戴方法视频| 精品国内亚洲2022精品成人| 亚洲av成人av| 美女被艹到高潮喷水动态| 久久久久久国产a免费观看| 看片在线看免费视频| 欧美日韩中文字幕国产精品一区二区三区| 国产在线男女| 成人特级av手机在线观看| 真人做人爱边吃奶动态| 欧美日韩中文字幕国产精品一区二区三区| av专区在线播放| 国产一区二区亚洲精品在线观看| 亚洲av中文字字幕乱码综合| 久久精品综合一区二区三区| 窝窝影院91人妻| 综合色av麻豆| 亚洲中文日韩欧美视频| 舔av片在线| 两性午夜刺激爽爽歪歪视频在线观看| 精品免费久久久久久久清纯| 国产精品乱码一区二三区的特点| 一区二区三区四区激情视频 | 国产成人影院久久av| 久久香蕉精品热| 男插女下体视频免费在线播放| 欧美日韩黄片免| 国产精品一区www在线观看 | 久久午夜亚洲精品久久| 免费在线观看影片大全网站| 可以在线观看的亚洲视频| 婷婷精品国产亚洲av在线| 麻豆av噜噜一区二区三区| 深夜a级毛片| 一卡2卡三卡四卡精品乱码亚洲| 精品久久久久久久久亚洲 | 男女下面进入的视频免费午夜| 亚洲男人的天堂狠狠| 免费av毛片视频| 男女那种视频在线观看| 哪里可以看免费的av片| 日日夜夜操网爽| 我要看日韩黄色一级片| 亚洲va日本ⅴa欧美va伊人久久| 99国产精品一区二区蜜桃av| 国产乱人伦免费视频| 国产精华一区二区三区| 久久久久久九九精品二区国产| 能在线免费观看的黄片| 午夜福利在线在线| 91精品国产九色| 国产免费av片在线观看野外av| 久久久久久久亚洲中文字幕| 成年女人永久免费观看视频| 中国美白少妇内射xxxbb| 日本a在线网址| 波野结衣二区三区在线| 高清毛片免费观看视频网站| 三级国产精品欧美在线观看| 亚洲人与动物交配视频| 少妇人妻一区二区三区视频| 欧美极品一区二区三区四区| 色综合亚洲欧美另类图片| 精品久久久久久久久久免费视频| 精品久久久久久久久av| 搡老熟女国产l中国老女人| 乱人视频在线观看| 日韩国内少妇激情av| 欧美xxxx黑人xx丫x性爽| 午夜福利在线观看免费完整高清在 | 精品日产1卡2卡| 久久婷婷人人爽人人干人人爱| 国产综合懂色| 男女边吃奶边做爰视频| 色5月婷婷丁香| av视频在线观看入口| 国产老妇女一区| av女优亚洲男人天堂| 日日啪夜夜撸| 成人二区视频| 丰满的人妻完整版| 啦啦啦观看免费观看视频高清| 日韩强制内射视频| 人妻制服诱惑在线中文字幕| 嫁个100分男人电影在线观看| 久久精品人妻少妇|