• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information

    2024-05-25 14:42:06YuancongChaiYuefeiZhuWeiLinandDingLi
    Computers Materials&Continua 2024年4期

    Yuancong Chai,Yuefei Zhu,Wei Lin and Ding Li

    State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University,Zhengzhou,450001,China

    ABSTRACT With the increasing proportion of encrypted traffic in cyberspace,the classification of encrypted traffic has become a core key technology in network supervision.In recent years,many different solutions have emerged in this field.Most methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-level features of packets.However,due to changes in data transmission mediums,such as fiber optics and satellites,temporal features can exhibit significant variations due to changes in communication links and transmission quality.Additionally,partial spatial features can change due to reasons like data reordering and retransmission.Faced with these challenges,identifying encrypted traffic solely based on packet byte-level features is significantly difficult.To address this,we propose a universal packet-level encrypted traffic identification method,Combo Packet.This method utilizes convolutional neural networks to extract deep features of the current packet and its contextual information and employs spatial and channel attention mechanisms to select and locate effective features.Experimental data shows that Combo Packet can effectively distinguish between encrypted traffic service categories(e.g.,File Transfer Protocol,FTP,and Peer-to-Peer,P2P)and encrypted traffic application categories(e.g.,BitTorrent and Skype).Validated on the ISCX VPN-non VPN dataset,it achieves classification accuracies of 97.0%and 97.1%for service and application categories,respectively.It also provides shorter training times and higher recognition speeds.The performance and recognition capabilities of Combo Packet are significantly superior to the existing classification methods mentioned.

    KEYWORDS Encrypted traffic classification;packet-level;convolutional neural network;attention mechanisms

    1 Introduction

    The current network environment is complex and ever-changing,with an accelerated digitalization process,leading to a growing demand for personal privacy and data security among users.This demand has spurred the widespread application of encryption technologies,resulting in a surge of end-to-end hardware devices and applications that employ encryption mechanisms.Most of these use advanced,universally recognized encryption protocols,as well as private,non-standard encryption protocols,and have become the standard practice for protecting data transmission security.These encryption technologies play a vital role in ensuring data resources are protected from leaks and unauthorized access.However,the proliferation of encryption technology also presents new challenges for network traffic monitoring and risk management.For instance,encrypted traffic affects the effective operation of Intrusion Detection Systems (IDS),traffic trend analysis systems,as well as Quality of Service(QoS) and Quality of Experience (QoE) assurance [1].In recent years,the issue of encrypted traffic identification and classification has attracted a research boom in both academia and industry[2].

    With the rapid development and widespread application of encryption technology,traditional identification methods based on visible data content [3],such as those relying on port numbers and packet content,are no longer suitable for identifying and classifying encrypted traffic.Some researchers have attempted to use pattern-matching methods to identify encrypted traffic,for example,by constructing a certificate library to match traffic fingerprints[3–5].However,with the continuous evolution of new encryption protocols like Transport Layer Security (TLS) and Quick UDP (User Datagram Protocol) Internet Connections (QUIC),the visible text in communications becomes increasingly sparse and obscure,rendering these methods ineffective and obsolete.Faced with this challenge,many scholars have turned to using machine learning and deep learning techniques for encrypted traffic identification and classification [6].Machine learning relies on expert-designed features for data recognition,requiring significant time and effort for feature extraction,and the model’s generalization ability is limited by the quality and range of the features used.This leads to a bottleneck in model training and can even result in misjudgments due to feature issues.Deep learning has achieved significant success in fields such as text classification,image classification,and sentiment recognition.By leveraging its advantage in automatically extracting complex features [7],its application in the field of encrypted traffic identification and classification has shown promising research results and application prospects.However,deep learning models heavily depend on data quality.Especially,insufficient sample preprocessing,imbalanced data samples,and abnormal sample distribution can lead to biased features in the model,resulting in overfitting and anomalously high recognition and classification abilities for specific samples.

    In real-world environments,encrypted traffic presents a challenge due to the complexity and diversity of communication quality and communication lines.Achieving rapid and accurate attribute recognition and classification of encrypted traffic remains a difficult problem.In this field,since network behavior often relies on a large amount of data interaction and cannot be accomplished by a single packet,the goal of recognition and classification is to differentiate a set of traffic attributes.To enhance the performance and capability in recognizing and classifying different encrypted traffic attributes,this paper proposes a novel model,Combo Packet.This model uses contextual information as input,aiming to use peer-level input to improve the model’s confidence.Its advantages include:

    1.By using non-stringent contextual information as input,the model leverages both byte-level features of the current packet and the structural features of contextual information.This enhances the robustness and fault tolerance of the traffic classification model,resulting in improved recognition accuracy.

    2.Utilizing a convolutional neural network structure and two types of attention mechanisms,the model focuses on more effective features within the peer-level input,discarding irrelevant features.This further enhances the traffic recognition and classification capabilities.

    3.From a practical standpoint,the model is designed to be lightweight.Compared to existing models,it uses fewer parameters,and both training duration and prediction recognition classification time are shorter,yielding higher recognition efficiency.

    The remainder of this paper is organized as follows.Section 2 reviews some of the most important and recent methods of encrypted traffic identification and classification based on deep learning,as well as attention mechanism techniques.Section 3 provides a comprehensive overview of the proposed new model,Combo Packet.Section 4 presents comparative and ablation experimental results and discusses these results.Section 5 proposes possible future directions for work based on this model.Section 6 concludes the paper.

    2 Related Work

    Network traffic classification tasks can be primarily categorized into the following types: First is the encrypted traffic identification task[8],which aims to distinguish traffic as either encrypted or non-encrypted.Second is the traffic representation classification task,which focuses on identifying the various application service types to which the business belongs,such as chat applications,file transfer applications,etc.Third is the traffic application classification task,aimed at identifying the specific application associated with the traffic,such as YouTube,Gmail,etc.[7,9].

    In this section,we will review the most important network traffic classification methods.Based on the different technologies used,we categorize these methods into four types:Traffic classification methods based on ports,traffic classification methods based on deep packet inspection,traffic classification methods based on statistical features,and traffic classification methods based on deep learning.We will also introduce the spatial and channel attention mechanisms used in this paper.

    2.1 Port-Based Traffic Classification Methods

    In the early network environment,distinguishing network traffic was a relatively simple task.By utilizing a correspondence table between port numbers and application types,one could extract the corresponding information from the traffic data header and associate the traffic data with its application type[10].The Internet Assigned Numbers Authority(IANA)standardized the relationship between applications and port numbers,such as using port number 21 for FTP and port number 80 for Hypertext Transfer Protocol(HTTP).As this method only involves a 2-byte plaintext comparison and is unaffected by encryption,it is simple and efficient,commonly used in firewall configurations for Access Control List(ACL)restrictions[11].However,with the widespread application of technologies such as Network Address Translation(NAT),port forwarding,random port allocation strategies,and port obfuscation,Madhukar et al.[12]in their research on port-based P2P traffic classification found that 30%–70%of traffic data was misclassified.Moore et al.[13]conducted a series of classification experiments based on port-matching technology,achieving only a 50%–70% classification accuracy.This has led to the realization that port-based traffic recognition methods are gradually becoming unsuitable,and more complex methods are needed to classify current network traffic.

    2.2 Deep Packet Inspection-Based Traffic Classification Methods

    Research on encrypted traffic classification began in the early 21st century.The pioneering work of Roughan et al.[14] sparked the first wave of interest in classification methods.Addressing the limitations of port-based traffic classification,researchers proposed network traffic classification methods based on Deep Packet Inspection (DPI) [7].‘Deep’in this context means that the method examines not only the packet header of a single packet but also the entire content of the packet,including the header and payload.Once specific key fields are matched in the traffic data,the traffic type can be judged based on the category to which these fields belong.These feature fields are also known as ‘fingerprints’,and usually,a fingerprint feature library is maintained to map fingerprints to traffic categories.This approach avoids the problem of relying solely on port numbers.However,with the widespread development of encryption protocols leading to payload randomization,DPI is no longer applicable to encrypted traffic tasks.Later,van Ede et al.[4] proposed the FlowPrint model,which uses unencrypted protocol field information(such as size,certificates,devices,and time characteristics)to represent each flow.This allows for earlier identification of traffic based on the first few packets of a network flow.Nonetheless,these methods highly depend on the plaintext information visible in encrypted traffic,which can be easily tampered with during transmission,thus losing its correct meaning[15].

    2.3 Traffic Classification Methods Based on Statistical Features

    In the field of encrypted traffic identification,some scholars have transferred machine learning methods to this area.They extract feature information of traffic data on different dimensions,such as packet size and inter-arrival time,and then selectively train classification models with optimal features,overcoming the drawbacks of port matching and deep packet inspection.Taylor et al.[16]proposed the AppScanner model,which uses statistical features like the mean,variance,maximum,and minimum values of packet sizes to train Support Vector Machines (SVM) and Random Forest classifiers (RF) for application classification.BI-directioNal Dependence (BIND) [17] uses timerelated statistical features,avoiding byte-by-byte inspection of packet contents,thus significantly reducing computational complexity.Draper-Gil et al.[18,19] published the ISCX VPN-nonVPN and ISCX Tor-nonTor datasets,employing machine learning models such as C4.5 and K-Nearest Neighbors (KNN) to classify encrypted traffic data based on time-related features in sessions.However,as machine learning methods heavily depend on expert-extracted features and are sensitive to the choice of such features,many scholars have shifted their focus to deep learning methods.

    2.4 Deep Learning-Based Traffic Classification Methods

    Deep learning models do not rely on manually designed features and can automatically capture characteristics from raw traffic,achieving high accuracy.Consequently,in recent years,the use of deep learning methods for identifying encrypted traffic has gained favor in both academia and industry.Lotfollahi et al.[7]proposed the traffic classification framework Deep Packet based on deep learning methods.This framework integrates the feature extraction and classification stages,eliminating the need for experts to extract network traffic-related features.Deep Packet includes two deep neural network structures: Stacked autoencoders and convolutional neural networks,achieving excellent classification performance in traffic service type classification and traffic application classification tasks.The deep Fingerprinting(DF)model[20]uses convolutional neural networks to automatically extract traffic representations from the sequence of original packet sizes in encrypted traffic,while Flow Sequence Network(FS-NET)[21]employs Recurrent Neural Networks(RNN),both achieving notable results.

    2.5 Attention Mechanism

    Attention plays a crucial role in human vision,enabling selective focus on important areas through scanning,thus capturing useful information more effectively.Similarly,in computational models,the attention mechanism can assign higher weights to important information among a vast amount of data,thereby reducing the interference of useless information and noise and improving the accuracy of model classification.

    Traditional attention mechanisms average the feature information of different positions and subspaces,which can lead to the loss of some important features.However,in the field of encrypted traffic identification,different features of data packets play varying roles in recognition effectiveness [22].Therefore,traditional attention mechanisms may not meet the needs of encrypted traffic recognition.The literature[23]proposed the simultaneous use of spatial and channel attention mechanisms.This mechanism can selectively enhance features that carry more information across different dimensions while effectively suppressing ineffective features.This allows subsequent utilization of effective features for more efficient traffic identification.

    3 Methodology

    3.1 Model Architecture

    Deep Packet [7] employs Convolutional Neural Networks (CNNs) and Sparse Autoencoders(SAEs)to simply and effectively accomplish the identification and classification of encrypted traffic.Inspired by this approach,we continued with the concept of identifying encrypted traffic through bytelevel features of data packets.Building upon this,we increased model inputs,altered convolution rules,and integrated attention mechanisms.This method ensures not only the capture of byte-level features but also the deep-level features of contextual information,without significantly increasing model complexity and achieving better recognition and classification results.Since the identification and classification of encrypted traffic are not merely at the packet level,but essentially about recognizing a set of traffic attributes,the method of using peer-level input to gain confidence is the core idea of this model.This concept also establishes a foundation for the model’s application in various scenarios.

    In this work,we introduce the Combo Packet system for application identification and traffic characterization classification tasks.This system is an end-to-end architecture based on deep learning,comprising a preprocessing module and a deep learning network module.Fig.1 illustrates the framework structure of Combo Packet,which receives labeled Pcap files.These files first undergo preprocessing,which involves segmenting,cleaning,anonymizing,padding,and normalizing to transform them into an intermediate input form,i.e.,multiple preprocessed contextual data,marked as Packet 1 to Packet N in the diagram.Subsequently,these packets enter the deep learning network,where each Packet undergoes a one-dimensional convolution operation to aggregate individual packet features and employs a spatial attention mechanism to highlight effective features.The system then performs convolution operations on the context to aggregate contextual information features,once again utilizing spatial and channel attention mechanisms to emphasize effective contextual features.Finally,the classification is completed through a series of fully connected networks.The specific details of the work will be explained in detail in the following sections.

    3.2 Datasets

    For the classification task in this paper,we used the ISCX VPN-nonVPN dataset [18],which provides original encrypted traffic of various categories.To balance the samples,we supplemented some missing flows with the ISCX Tor-nonTor dataset [19] (for the service classification task,supplementing nonTor’s P2P traffic to nonVPN’s P2P traffic,and for the application classification task,supplementing Browsing-Tor traffic to nonVPN’s Tor type traffic).

    Based on the services performed or operations executed during traffic capture(such as chatting,file transfer,or video calling)and the applications from which the traffic originates(such as YouTube,Facebook,Netflix,etc.),this paper categorizes traffic into 12 different service types,including 6 types of regular encrypted traffic and 6 types of VPN encrypted traffic.It also categorizes traffic into 17 different application types based on encrypted application categories.This dual classification method allows for a comprehensive analysis of encrypted traffic,thereby verifying the model’s performance and recognition capabilities.In addition,based on the number of contextual data packets selected(1,3,5),the dataset is further organized,as shown in Table 1.

    Table 1: The statistical information of the datasets

    Figure 1: Model architecture

    3.3 Pre-Processing

    In the experiment,we used the ISCX dataset,captured at the data link layer,which includes Ethernet headers containing Media Access Control(MAC)addresses.These addresses are irrelevant for the classification of encrypted traffic,so our first step was to remove these headers.We then divided the Pcap files based on the five-tuple criteria (source address,destination address,protocol,source port,destination port).This division aimed to gather packets from the context,which in this case is not strictly defined.Next,we removed packets unrelated to encrypted traffic,such as those belonging to Link-Local Multicast Name Resolution(LLMNR),Network Time Protocol(NTP),Network Basic Input/Output System(NetBIOS),Domain Name System(DNS),Internet Control Message Protocol(ICMP),and packets like Synchronize (SYN),Acknowledge (ACK),and Finish (FIN) from the Transmission Control Protocol(TCP)handshake phase,which only confirm connections and contain no payload.Regarding the transport layer,since UDP headers are only 8 bytes,we padded them to 20 bytes to match the TCP protocol headers.We anonymized TCP’s Sequence Number because it precisely locates the next packet,which is not a desirable feature for our model to focus on.We also skipped over the global header(the 24-byte header created when capturing into Pcap files using tools like Wireshark or Tcpdump) and the 16-byte packet header containing timestamps,as this data could lead to the model misclassifying packets captured in close temporal proximity,causing overfitting in the validation and test sets.Next,we converted the packets into byte sequences and truncated them.Considering the wide variation in packet sizes in the dataset,and to keep a consistent length while preserving all packet information,we retained the first 1500 bytes of data after processing,based on common Maximum Transmission Unit (MTU) limits and statistical findings.Each category’s sample count was set to 5000,and we implemented a downsampling strategy,splitting the dataset into training,testing,and validation sets in an 8:1:1 ratio.Packets were grouped in sets of N for experimental purposes.For efficient model input,we transformed each byteαof the input data with the 2×α/255-1 operation,resulting in input values ranging from[-1,1],facilitating faster model convergence.

    Taking the input of 3 contextual packets as an example,Table 2 shows the names of each classification category and their respective sample counts.

    Table 2: Distribution of ISCX datasets

    3.4 Deep Learning Network

    3.4.1 Convolutional Neural Networks

    CNNs are known for their strong feature extraction and local perception capabilities.Due to the structural properties of their convolutional kernels,they can effectively extract features within their receptive fields.The characteristic of parameter sharing in CNNs significantly reduces the model’s complexity and computational demands.Additionally,the simple structure of convolutions makes them easy to integrate with other network structures.Thus,our network employs two consecutive convolutional layers as its backbone,initially extracting byte-level features from individual packets and then capturing structural-level features of context packets,which are pre-aligned at the IP,transport,and application layers.

    To illustrate our convolutional behavior with three contexts as an example,the first convolutional operation uses one-dimensional CNNs with 200 filters,each of length 5 and a stride of 3.This setup is designed to capture byte-level features from each input,as depicted in Fig.2.The second convolutional operation employs two-dimensional CNNs with 200 filters of size(5,3)and a stride of 3.Building upon the byte-level features captured by the first convolutional layer,this layer further captures the structural features of the context packets,as shown in Fig.3.

    Figure 2: Convolution operation I

    Figure 3: Convolution operation II

    3.4.2 Attention Mechanism Network

    The spatial attention mechanism is primarily used to enhance a neural network’s focus on specific parts of the input data.This mechanism,by assigning different weights to different regions,enables the network to automatically identify and concentrate on features that are more critical for the classification task.

    In the recognition and classification of encrypted traffic,the spatial attention mechanism can be applied to identify patterns and features within the encrypted data,even when these aspects are not so apparent in an encrypted context.For instance,by analyzing the size distribution of the encrypted data,the spatial attention mechanism can discern the distribution of traffic and the traffic characteristics of specific applications.This approach enhances classification results by learning the statistical properties of the traffic,as specifically illustrated in Fig.4.

    Figure 4: Spatial attention in encrypted traffic classification

    The spatial attention mechanism algorithm used in the article is shown as Algorithm 1.It aggregates the channel information of the feature map by performing maximum pooling and average pooling operations along the channel dimension of the input feature map.The aggregated maximum and average features are represented by Fmax and Favg,respectively,creating two overlapping 2D maps.Then,a shared convolutional layer and a Sigmoid function are used to generate the enhanced and suppressed spatial region locations.These locations are then dot-multiplied with the feature input to obtain the weighted feature map.

    In deep learning networks,the channel attention mechanism has become an innovative and effective method.Its core idea is to assign different levels of importance to different feature channels,allowing the network to emphasize those features most crucial to the task.

    In the specific field of encrypted traffic classification,the application of the channel attention mechanism is particularly important.Since encrypted traffic inherently conceals the direct content of the data,the channel attention mechanism,by weighting different feature channels of network traffic data,can effectively identify and emphasize those features that are most helpful in distinguishing different types of traffic and suppressing ineffective features [22].For example,certain channels may better reflect the traffic patterns of specific types of applications,like video streaming or specific behaviors of social media apps.The channel attention mechanism can automatically learn and highlight these channels,thereby improving classification accuracy and efficiency,as specifically illustrated in Fig.5.

    Figure 5: Channel attention in encrypted traffic classification

    The channel attention mechanism algorithm used in the article is shown as Algorithm 2.It generates two spatial descriptors,Favg and Fmax,through average pooling and maximum pooling operations over feature map spatial regions.These descriptors are then processed through a shared network composed of Multi-Layer Perceptrons(MLP),which compress and then excite them according to the ratio of a,to obtain the enhanced and suppressed channel locations.Finally,these locations are dotmultiplied with the feature input to obtain a weighted feature map channel.In practical applications,channel attention can be combined with spatial attention to further enhance the performance of processing encrypted traffic.

    4 Experimental Results

    4.1 Experiment Setting

    The experiments were conducted in an Ubuntu 22.04 operating system environment with Python.The system was equipped with an Intel Xeon E5-2640 CPU,64 GB of memory,and 2 × NVIDIA TITIAN RTX 16 G GPUs.

    All experiments were based on TensorFlow 2.15 and Scikit-learn[24].The model parameters were set as follows: The batch size was set to 32,a dynamic learning rate was employed,the number of training epochs was set to 40,and Adam was used as the optimizer[25].

    4.2 Evaluation Metrics

    In this study,to comprehensively evaluate the performance of the hybrid model in encrypted traffic classification tasks,the following four metrics were used: Accuracy (Ac),Precision (Pr),Recall(Rc),andF1-score(i.e.,F1).When assessing the model,TP(True Positive)refers to cases where the model correctly classifies positive samples as positive,TN(True Negative)refers to cases where the model correctly classifies negative samples as negative,FP (False Positive) refers to cases where the model incorrectly classifies negative samples as positive,known as ‘false alarms’,and FN (False Negative) refers to cases where the model incorrectly classifies positive samples as negative,known as‘misses’.The specific calculation formulas are as follows:

    Accuracy assesses the overall capability of the classification model,while Precision and Recall reflect the model’s recognition rate in a specific category.TheF1-score is the harmonic mean based on Recall and Precision,providing a comprehensive evaluation of the model’s performance.

    4.3 Comparison Experiment of Different Number of Contexts

    To study the impact of the number of contextual packets on the model’s classification accuracy,that is,to determine the appropriate number of context data inputs for the model,we conducted multiple comparative experiments.We selected 1,3,and 5 contextual packets as subjects for these experiments.By comparing the classification accuracy,precision,andF1-score for both service and application categories,it should be noted that the scenario of using a single packet as input is consistent with the Deep Packet model described in the literature.

    Fig.6 shows the change in accuracy over training epochs for 12 different service classification tasks with the selection of 1,3,and 5 contextual packets as peer-level inputs.Similarly,Fig.7 illustrates the change in accuracy over training epochs for 17 different application classification tasks with 1,3,and 5 contextual packets chosen as peer-level inputs.

    Figure 6: Accuracy change curve over time in service classification

    Figure 7: Accuracy change curve over time on application classification

    As illustrated in the figures,as the number of contextual inputs increases,the accuracy of the model in both classification tasks improves.The standard deviation continues to decrease,and the final accuracy tends to stabilize.

    As shown in Table 3,inputting three contextual packets results in higher accuracy,precision,recall,andF1-score compared to a single data input.In service classification tasks,there is an increase of 1.9% in accuracy,1.9% in precision,2.0% in recall,and 2.0% in theF1-score.In application classification tasks,the increases are 2.5%in accuracy,1.4%in precision,1.6%in recall,and 1.5%in theF1-score.When inputting five contextual packets,in service classification tasks,the increases are 2.8%in accuracy,2.5%in precision,2.6%in recall,and 2.6%in theF1-score.In application classification tasks,the increases are 3.3%in accuracy,2.3%in precision,2.2%in recall,and 2.3%in theF1-score.The experiment indicates that using contextual packets as model inputs enhances the model’s ability to recognize and classify,and as the number of contextual data inputs increases,the model’s recognition ability also grows.

    Table 3: Encrypted traffic services and application classification capabilities

    4.4 Experiment on the Impact of Attention Mechanisms on Classification Results

    As the number of peer-level inputs increases,the accuracy continuously improves.However,the relationship between the number of inputs and accuracy is contradictory because not every set of traffic has the same number of packets.Determining the optimal number of peer-level inputs for model training,and how to further enhance model performance on this basis,are pressing issues that need to be addressed by this method.

    The experiment focuses on a manageable number of contextual packets,which is the amount of data that normal communication can afford.Such input determines the versatility of the model.Building on our previous experiments,we introduced Spatial Attention(SA),Channel Attention also called Squeeze and Excitation(SE),and SA+SE modules to explore their impact on model accuracy.

    As shown in Table 4,incorporating both spatial and channel attention mechanisms effectively improved the model’s accuracy.For the encrypted traffic service classification task,using both types of attention mechanisms increased the accuracy by 1.0%for three contextual inputs and 0.9%for five contextual inputs.For the encrypted traffic application classification task,the accuracy was improved by 0.5%and 1.0%,respectively.

    Table 4: The impact of the attention mechanism on the model

    It is worth mentioning that the introduction of spatial and channel attention mechanisms does not impact the main structure of the model or result in a significant increase in parameters.After determining the number of contextual inputs,introducing attention mechanisms is an effective way to further improve accuracy.

    At the same time,we recorded the number of incorrectly classified samples by the model on the test set,namely Top-1 Error and Top-5 Error.These respectively represent the number of instances where the model’s highest probability prediction is incorrect,and the number of instances where the correct category is not included among the model’s top five most probable predictions.

    Table 5 summarizes the experimental results of Top-1 Error and Top-5 Error after adding the two types of attention mechanisms in encrypted traffic service and application classification tasks.It is evident that the introduction of attention mechanisms did not significantly increase the number of model parameters,and the network outperforms the baseline network.This indicates that the inclusion of attention mechanisms generates more features,endowing the model with better classification capabilities.

    Table 5: Model parameters and TOP-1 Error and TOP-5 Error distribution

    Table 6: Comparison of encrypted traffic service classification capabilities

    Table 7: Comparison of encrypted traffic application classification capabilities

    Figs.8 and 9 respectively show the error curves during the training intervals for encrypted traffic service classification tasks and encrypted traffic application classification tasks.It is visible that the two curves representing the models with attention mechanisms demonstrate lower training errors.Compared to the baseline model,the incorporation of attention mechanisms exhibits better generalization capabilities.

    Figure 8: Top-1 Error change curve in service classification

    Figure 9: Top-1 Error change curve in application classification

    4.5 Experiment Comparing Recognition Abilities and Performance of Different Models

    We selected the model that uses five contextual data inputs and incorporates attention mechanisms for comparison with other models.Tables 6 and 7 display the results of service and application classification on the ISCX dataset.

    Our proposed method achieved the best results across all four evaluation metrics,outperforming other models.In the service recognition task,the Combo Packet model attained 97.04% accuracy,95.66%precision,95.97%recall,and 95.81%F1-score.In the application recognition task,it reached 97.13% accuracy,95.25% precision,95.79% recall,and 95.44%F1-score.These results fully demonstrate that using contextual information can effectively distinguish between encrypted traffic’s service and application types,and also mitigate the issue faced by most models that overly depend on data transmission quality,specifically spatiotemporal features,for recognition.

    Figs.10 and 11 show the confusion matrices of the Combo Packet model using five contextual data inputs with the addition of attention mechanisms.In the service recognition task,the accuracy for each category reached over 90%,but it is noticeable that confusion occurs between Chat and Email.In the application classification task,confusion occurs between FTPS and SFTP.This may be due to the reason described in Deep Packet,where the Euclidean distance is used as a metric to aggregate the similarity between service categories and application types.Chat and Email fall into the same cluster with high similarity,as do FTPS and SFTP,leading to potential confusion.

    Figure 10: Confusion matrix for encrypted traffic service classification

    Figure 11: Confusion matrix for encrypted traffic application classification

    Finally,to evaluate the training efficiency and recognition speed of the model,we conducted a comprehensive comparison with several classic models including 1D-CNN,BLSTM,CNN+LSTM,Transformer,and Capsule.The results are shown in Table 8.Due to the design of convolutional parameter sharing and local receptive fields,it hierarchically learns the features of input samples,presenting significant advantages in terms of training and recognition time.1D-CNN has the lowest training and detection time among all the models.Combo Packet’s backbone network is based on convolutions,hence it inherits the characteristics of convolutional networks,effectively enhancing the model’s training and operational efficiency.Its training and detection times are only second to 1DCNN,indicating high efficiency in both model training and recognition.

    Table 8: Comparison results on application identification tasks

    5 Future Work

    Facing more complex encryption methods and different levels of encrypted traffic,such as link layer encryption and IP layer encryption,the traffic exhibits different patterns.Managing these types of traffic effectively requires continuous in-depth research and innovation in the field.Our proposed model has only been validated on application layer encryption.For different encryption scenarios,the system needs to evolve with the changing environment.Potential future work includes,but is not limited to,the following points:

    1.Explore more scientific algorithms for selecting contextual information.For example,using data packets that carry more information or have unique characteristics as input samples to further enhance recognition and classification abilities.

    2.Investigate the light-weighting of input data.Our preprocessing captures 1500 bytes of packet data,but whether this length is too long or if capturing less data can still achieve excellent classification results remains to be experimentally verified.

    3.Implementing online recognition,as this system does not require spatiotemporal features of traffic and has high training and recognition efficiency,it is feasible to consider further development into an online recognition system.Such a system could be applied to the latest intelligent intrusion detection and traffic trend analysis.

    6 Conclusion

    This paper proposes an encrypted traffic classification method based on contextual information.The fundamental idea is to use peer-level input to enhance the model’s confidence,suitable for encrypted traffic classification scenarios under various network conditions,especially when transmission media changes and transmission quality is low.Based on a simple convolutional neural network,contextual data are used as inputs,and attention mechanisms are integrated to strengthen the model’s ability to learn key features.While ensuring model efficiency,this maintains high accuracy,precision,recall,andF1-score.Experiments show that our proposed method,compared to other models,improves in computational complexity,recognition efficiency,and classification level.Furthermore,it does not rely on the temporal features of traffic.Combo Packet provides solutions for the next generation of intelligent systems in intrusion detection and traffic trend analysis.

    Acknowledgement:The authors would like to express their gratitude for the valuable feedback and suggestions provided by all the anonymous reviewers and the editorial team.

    Funding Statement:This study was funded by the National Natural Science Foundation of China Youth Project(62302520).

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:Yuancong Chai,Yuefei Zhu;data collection: Wei Lin;analysis and interpretation of results:Yuancong Chai;draft manuscript preparation: Yuancong Chai,Yuefei Zhu,Ding Li.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:The training data used in this paper was obtained from the UNB ISCX Dataset.Available online via the following link:https://www.unb.ca/cic/datasets/.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    在线观看国产h片| 国产成人精品无人区| 少妇被粗大的猛进出69影院| 亚洲精品中文字幕在线视频| av电影中文网址| 91精品伊人久久大香线蕉| 少妇的丰满在线观看| 国产 一区精品| 国产精品久久久久久人妻精品电影 | 久久久久久久久久久久大奶| 亚洲av日韩精品久久久久久密 | 99久久99久久久精品蜜桃| 亚洲欧洲精品一区二区精品久久久 | 在线天堂最新版资源| 日韩 欧美 亚洲 中文字幕| 黑人巨大精品欧美一区二区蜜桃| 国产精品国产三级国产专区5o| 亚洲一区中文字幕在线| 日本av手机在线免费观看| 久久影院123| 亚洲精品国产一区二区精华液| 最近最新中文字幕免费大全7| 国产欧美日韩综合在线一区二区| 超色免费av| 精品福利永久在线观看| 狠狠婷婷综合久久久久久88av| 大陆偷拍与自拍| 大陆偷拍与自拍| 亚洲人成77777在线视频| 国产熟女午夜一区二区三区| 老鸭窝网址在线观看| 欧美精品人与动牲交sv欧美| 亚洲七黄色美女视频| 99国产综合亚洲精品| 性高湖久久久久久久久免费观看| 欧美激情 高清一区二区三区| 日韩一区二区视频免费看| 久久精品aⅴ一区二区三区四区| av在线老鸭窝| 亚洲欧美色中文字幕在线| 如何舔出高潮| 麻豆精品久久久久久蜜桃| 久久人人爽av亚洲精品天堂| 亚洲免费av在线视频| 国产男女超爽视频在线观看| 亚洲中文av在线| 国产成人精品福利久久| 精品少妇黑人巨大在线播放| kizo精华| 日韩一区二区视频免费看| 青春草视频在线免费观看| 波多野结衣av一区二区av| 免费黄频网站在线观看国产| 久久久久久久大尺度免费视频| 日韩中文字幕欧美一区二区 | netflix在线观看网站| 久久精品久久精品一区二区三区| 久久精品久久精品一区二区三区| 国精品久久久久久国模美| 久久久久久久久免费视频了| 久久久久国产一级毛片高清牌| 亚洲欧洲国产日韩| 国产麻豆69| 操美女的视频在线观看| 七月丁香在线播放| 亚洲国产av新网站| 国产 一区精品| 久久性视频一级片| 精品国产乱码久久久久久小说| 亚洲精品乱久久久久久| 国产视频首页在线观看| 色综合欧美亚洲国产小说| 一边亲一边摸免费视频| 一边亲一边摸免费视频| 亚洲精品国产色婷婷电影| 国产片内射在线| 搡老乐熟女国产| av国产精品久久久久影院| 高清不卡的av网站| 亚洲欧美一区二区三区久久| 丁香六月欧美| 久久人人爽av亚洲精品天堂| 亚洲国产中文字幕在线视频| 亚洲成国产人片在线观看| 大码成人一级视频| 一本—道久久a久久精品蜜桃钙片| 亚洲欧洲国产日韩| 国产一区二区在线观看av| 日本午夜av视频| 两性夫妻黄色片| 街头女战士在线观看网站| 免费女性裸体啪啪无遮挡网站| 黑丝袜美女国产一区| 国产免费现黄频在线看| 18禁国产床啪视频网站| 亚洲精品久久成人aⅴ小说| 成人午夜精彩视频在线观看| 美女中出高潮动态图| 成人午夜精彩视频在线观看| 久久久精品免费免费高清| 另类亚洲欧美激情| 精品视频人人做人人爽| 国产精品久久久av美女十八| 亚洲少妇的诱惑av| 黑人巨大精品欧美一区二区蜜桃| 亚洲五月色婷婷综合| 国产黄色视频一区二区在线观看| 国产精品香港三级国产av潘金莲 | 97人妻天天添夜夜摸| 亚洲五月色婷婷综合| 久久精品久久久久久久性| av线在线观看网站| 无遮挡黄片免费观看| av在线老鸭窝| 日韩视频在线欧美| 国产精品香港三级国产av潘金莲 | 亚洲图色成人| 如何舔出高潮| 激情视频va一区二区三区| 亚洲熟女毛片儿| 人妻人人澡人人爽人人| 国产1区2区3区精品| 一级a爱视频在线免费观看| 在线观看国产h片| 久久综合国产亚洲精品| 亚洲成人手机| 国产免费视频播放在线视频| 亚洲精品久久午夜乱码| 亚洲情色 制服丝袜| 少妇的丰满在线观看| 日本wwww免费看| 久久久精品国产亚洲av高清涩受| 又大又黄又爽视频免费| 国产熟女午夜一区二区三区| 麻豆av在线久日| 免费高清在线观看视频在线观看| 一级片免费观看大全| 波多野结衣一区麻豆| av片东京热男人的天堂| 各种免费的搞黄视频| 亚洲av福利一区| 免费av中文字幕在线| 欧美精品av麻豆av| 最近中文字幕高清免费大全6| 久久 成人 亚洲| 99久久99久久久精品蜜桃| 欧美 亚洲 国产 日韩一| 精品国产超薄肉色丝袜足j| 女人高潮潮喷娇喘18禁视频| 搡老岳熟女国产| h视频一区二区三区| 宅男免费午夜| 精品国产一区二区三区久久久樱花| 欧美激情高清一区二区三区 | 午夜免费鲁丝| 亚洲婷婷狠狠爱综合网| 国产片特级美女逼逼视频| 国产乱来视频区| 男女午夜视频在线观看| 日韩欧美一区视频在线观看| 欧美激情 高清一区二区三区| 日韩熟女老妇一区二区性免费视频| 成人毛片60女人毛片免费| 哪个播放器可以免费观看大片| e午夜精品久久久久久久| 国产视频首页在线观看| 中文字幕高清在线视频| 五月天丁香电影| 国产成人系列免费观看| 亚洲一码二码三码区别大吗| 久久99一区二区三区| 欧美日韩一级在线毛片| 少妇的丰满在线观看| 中文字幕最新亚洲高清| 热re99久久国产66热| 丝袜脚勾引网站| 在线亚洲精品国产二区图片欧美| 一区福利在线观看| 国产精品.久久久| 国产成人精品无人区| 免费观看a级毛片全部| 免费不卡黄色视频| www.熟女人妻精品国产| 又黄又粗又硬又大视频| 免费看av在线观看网站| 国产免费又黄又爽又色| 精品少妇黑人巨大在线播放| 高清黄色对白视频在线免费看| 亚洲欧洲国产日韩| 成人漫画全彩无遮挡| 久久精品国产综合久久久| 亚洲精品成人av观看孕妇| 亚洲伊人色综图| kizo精华| 永久免费av网站大全| 最黄视频免费看| 午夜激情久久久久久久| 91精品伊人久久大香线蕉| 麻豆精品久久久久久蜜桃| 十八禁高潮呻吟视频| 精品视频人人做人人爽| 老汉色av国产亚洲站长工具| 久久国产精品男人的天堂亚洲| 国产黄色视频一区二区在线观看| a级毛片在线看网站| 国产精品熟女久久久久浪| 中文字幕人妻丝袜一区二区 | 亚洲成人免费av在线播放| av在线老鸭窝| 99国产综合亚洲精品| 免费在线观看黄色视频的| 色视频在线一区二区三区| 韩国高清视频一区二区三区| 国产又色又爽无遮挡免| 中文天堂在线官网| 大码成人一级视频| 9191精品国产免费久久| 欧美 日韩 精品 国产| 久久久精品免费免费高清| 51午夜福利影视在线观看| 看非洲黑人一级黄片| 久久热在线av| 午夜激情av网站| 国产日韩欧美在线精品| 久久精品久久久久久噜噜老黄| 搡老乐熟女国产| 国产精品一区二区精品视频观看| 久久久久久久国产电影| 久久毛片免费看一区二区三区| 午夜福利网站1000一区二区三区| 最新在线观看一区二区三区 | 精品国产一区二区久久| 欧美日韩视频高清一区二区三区二| 国产乱来视频区| 80岁老熟妇乱子伦牲交| 高清黄色对白视频在线免费看| 精品久久久久久电影网| 人人澡人人妻人| 午夜日韩欧美国产| 亚洲国产精品成人久久小说| 女人被躁到高潮嗷嗷叫费观| 91成人精品电影| 国产精品av久久久久免费| 视频区图区小说| 啦啦啦中文免费视频观看日本| 老汉色∧v一级毛片| 老汉色av国产亚洲站长工具| 久久精品亚洲av国产电影网| 久久久精品94久久精品| 久热爱精品视频在线9| 久久精品熟女亚洲av麻豆精品| 久久人妻熟女aⅴ| 亚洲美女视频黄频| 中文字幕高清在线视频| 熟妇人妻不卡中文字幕| 亚洲av日韩精品久久久久久密 | 欧美日韩综合久久久久久| 久久久精品国产亚洲av高清涩受| 日本爱情动作片www.在线观看| 亚洲欧美日韩另类电影网站| 亚洲精品久久成人aⅴ小说| 亚洲精品aⅴ在线观看| 亚洲av男天堂| 2021少妇久久久久久久久久久| 一个人免费看片子| 大话2 男鬼变身卡| 少妇的丰满在线观看| av国产久精品久网站免费入址| 三上悠亚av全集在线观看| 亚洲国产日韩一区二区| 欧美人与性动交α欧美精品济南到| 天美传媒精品一区二区| 亚洲欧美激情在线| 亚洲成人国产一区在线观看 | 成人午夜精彩视频在线观看| 一级片免费观看大全| 2018国产大陆天天弄谢| av不卡在线播放| 久久久久久久国产电影| 色94色欧美一区二区| 日韩制服骚丝袜av| 丁香六月欧美| 熟妇人妻不卡中文字幕| 亚洲av电影在线进入| 亚洲伊人久久精品综合| 人人澡人人妻人| 国产精品蜜桃在线观看| 在线精品无人区一区二区三| 如日韩欧美国产精品一区二区三区| 黑人欧美特级aaaaaa片| 美女视频免费永久观看网站| 精品人妻熟女毛片av久久网站| 国产精品偷伦视频观看了| 天美传媒精品一区二区| 国产一级毛片在线| 日韩,欧美,国产一区二区三区| 亚洲欧美成人综合另类久久久| 日韩免费高清中文字幕av| 精品国产一区二区三区四区第35| 国产av码专区亚洲av| av片东京热男人的天堂| 日韩欧美精品免费久久| 国产亚洲av片在线观看秒播厂| 欧美日韩亚洲综合一区二区三区_| 99热网站在线观看| 欧美乱码精品一区二区三区| 新久久久久国产一级毛片| 亚洲av日韩在线播放| 亚洲精品国产一区二区精华液| 在线免费观看不下载黄p国产| 在线精品无人区一区二区三| 国产精品偷伦视频观看了| av国产精品久久久久影院| 99久久人妻综合| 中文字幕另类日韩欧美亚洲嫩草| 十分钟在线观看高清视频www| 2021少妇久久久久久久久久久| 亚洲国产看品久久| 亚洲精品视频女| 精品一区二区三区av网在线观看 | a 毛片基地| 亚洲视频免费观看视频| 免费高清在线观看视频在线观看| 日本av手机在线免费观看| 日韩制服丝袜自拍偷拍| 亚洲欧美精品自产自拍| 最近最新中文字幕免费大全7| 男人爽女人下面视频在线观看| 国产又色又爽无遮挡免| 男人操女人黄网站| 丝袜美足系列| 丝袜喷水一区| 男女边摸边吃奶| 亚洲欧洲精品一区二区精品久久久 | 国产精品久久久久成人av| 日本欧美视频一区| 一区二区三区精品91| 国产99久久九九免费精品| 亚洲伊人色综图| 制服丝袜香蕉在线| 国产人伦9x9x在线观看| 免费看av在线观看网站| 亚洲成色77777| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲国产精品成人久久小说| 亚洲欧美成人精品一区二区| 91aial.com中文字幕在线观看| 国产极品天堂在线| 久久精品久久精品一区二区三区| 嫩草影视91久久| 大话2 男鬼变身卡| 人人妻人人添人人爽欧美一区卜| 日韩制服丝袜自拍偷拍| 黄频高清免费视频| 在线观看国产h片| 久久精品国产a三级三级三级| 男女下面插进去视频免费观看| 男女边吃奶边做爰视频| 麻豆乱淫一区二区| 日本黄色日本黄色录像| 久久久精品国产亚洲av高清涩受| 亚洲四区av| 18禁国产床啪视频网站| 成人手机av| 精品国产国语对白av| 精品一区二区三卡| 99香蕉大伊视频| 高清欧美精品videossex| 欧美黄色片欧美黄色片| 亚洲国产av新网站| 久久精品亚洲熟妇少妇任你| 国产一卡二卡三卡精品 | 久久影院123| 亚洲图色成人| 国产精品久久久久久人妻精品电影 | 亚洲人成电影观看| 看免费av毛片| 国产成人系列免费观看| 久久99精品国语久久久| 啦啦啦在线免费观看视频4| 欧美97在线视频| 亚洲精品,欧美精品| 天天躁日日躁夜夜躁夜夜| 午夜福利乱码中文字幕| 99香蕉大伊视频| 丝袜脚勾引网站| 欧美激情极品国产一区二区三区| 成年女人毛片免费观看观看9 | 午夜福利在线免费观看网站| 国产精品欧美亚洲77777| 欧美亚洲日本最大视频资源| 亚洲av日韩精品久久久久久密 | 欧美精品人与动牲交sv欧美| 色视频在线一区二区三区| 久久久国产欧美日韩av| 制服丝袜香蕉在线| 丁香六月欧美| 亚洲精品久久成人aⅴ小说| 99香蕉大伊视频| 天天躁日日躁夜夜躁夜夜| 亚洲第一青青草原| 亚洲国产av影院在线观看| 咕卡用的链子| 国产xxxxx性猛交| 日本一区二区免费在线视频| 黄色毛片三级朝国网站| 午夜免费观看性视频| av免费观看日本| 黄色视频在线播放观看不卡| 美女高潮到喷水免费观看| 欧美少妇被猛烈插入视频| 国产欧美日韩一区二区三区在线| 亚洲人成77777在线视频| 中文字幕最新亚洲高清| 国产亚洲精品第一综合不卡| 大香蕉久久成人网| 国语对白做爰xxxⅹ性视频网站| a级片在线免费高清观看视频| 午夜老司机福利片| 老司机在亚洲福利影院| 国产熟女欧美一区二区| 两个人看的免费小视频| 十八禁高潮呻吟视频| 国产黄色免费在线视频| 中文字幕精品免费在线观看视频| 国产精品二区激情视频| 狂野欧美激情性xxxx| 飞空精品影院首页| 日韩人妻精品一区2区三区| 99久久99久久久精品蜜桃| 蜜桃在线观看..| 久久久久视频综合| 亚洲av综合色区一区| 免费观看人在逋| 综合色丁香网| 考比视频在线观看| 亚洲av男天堂| 亚洲伊人色综图| 尾随美女入室| 可以免费在线观看a视频的电影网站 | 国产精品麻豆人妻色哟哟久久| 亚洲美女黄色视频免费看| 2021少妇久久久久久久久久久| 99re6热这里在线精品视频| 大码成人一级视频| 亚洲国产成人一精品久久久| 成人毛片60女人毛片免费| 亚洲综合精品二区| 看免费成人av毛片| 伦理电影免费视频| 美女中出高潮动态图| 国产97色在线日韩免费| 国产无遮挡羞羞视频在线观看| 男女下面插进去视频免费观看| av国产久精品久网站免费入址| 精品人妻熟女毛片av久久网站| 国产精品三级大全| 丁香六月天网| 日本午夜av视频| 久久久久精品性色| 在线天堂最新版资源| 久久韩国三级中文字幕| 两个人免费观看高清视频| 各种免费的搞黄视频| 久久精品国产a三级三级三级| av免费观看日本| 精品国产超薄肉色丝袜足j| 一级片免费观看大全| 国产免费一区二区三区四区乱码| 亚洲男人天堂网一区| 精品国产乱码久久久久久男人| 国精品久久久久久国模美| 亚洲成av片中文字幕在线观看| 久久久精品94久久精品| 国产色婷婷99| 可以免费在线观看a视频的电影网站 | 亚洲精品一二三| 日日撸夜夜添| 婷婷色av中文字幕| 这个男人来自地球电影免费观看 | 精品免费久久久久久久清纯 | 国产麻豆69| 国产精品久久久久久精品古装| 天天操日日干夜夜撸| 亚洲欧美一区二区三区久久| 国产成人精品福利久久| 伦理电影免费视频| 精品亚洲成国产av| 亚洲av成人精品一二三区| 激情视频va一区二区三区| 日韩人妻精品一区2区三区| 老司机深夜福利视频在线观看 | 亚洲精品在线美女| 日韩av不卡免费在线播放| 亚洲一区中文字幕在线| 狠狠婷婷综合久久久久久88av| 久久99热这里只频精品6学生| a级片在线免费高清观看视频| 激情五月婷婷亚洲| 久久久欧美国产精品| 久久久久精品国产欧美久久久 | 国产精品一国产av| 国产亚洲一区二区精品| 丝袜人妻中文字幕| 国产精品一区二区精品视频观看| 久久99一区二区三区| www日本在线高清视频| 精品免费久久久久久久清纯 | 永久免费av网站大全| 亚洲国产最新在线播放| 91精品三级在线观看| 中文字幕最新亚洲高清| 免费看不卡的av| 日本猛色少妇xxxxx猛交久久| 一级爰片在线观看| 成人国产av品久久久| 国产免费视频播放在线视频| 精品一品国产午夜福利视频| 啦啦啦在线观看免费高清www| 一个人免费看片子| 亚洲一级一片aⅴ在线观看| 丝瓜视频免费看黄片| 亚洲国产av影院在线观看| 国产爽快片一区二区三区| 最黄视频免费看| 国产亚洲av高清不卡| 十八禁人妻一区二区| 久久久久久免费高清国产稀缺| 国产精品成人在线| 一级黄片播放器| 国产福利在线免费观看视频| 国产精品熟女久久久久浪| 免费观看av网站的网址| 老司机亚洲免费影院| 在线看a的网站| 曰老女人黄片| 国产成人精品久久二区二区91 | 日韩中文字幕欧美一区二区 | 黄片无遮挡物在线观看| 亚洲精品国产区一区二| 男人操女人黄网站| 亚洲国产成人一精品久久久| 婷婷色综合大香蕉| 久久久久久人人人人人| bbb黄色大片| 久久久久久人妻| 精品国产一区二区久久| 男女午夜视频在线观看| 国产成人91sexporn| av线在线观看网站| 免费不卡黄色视频| 高清在线视频一区二区三区| 可以免费在线观看a视频的电影网站 | 九草在线视频观看| av国产久精品久网站免费入址| 国产精品av久久久久免费| av电影中文网址| 亚洲国产精品一区二区三区在线| 一本大道久久a久久精品| 在线看a的网站| 亚洲一区中文字幕在线| 精品福利永久在线观看| 亚洲欧美一区二区三区国产| 18在线观看网站| 免费看av在线观看网站| 婷婷色综合大香蕉| 亚洲伊人色综图| 成人国语在线视频| 久久精品熟女亚洲av麻豆精品| 男女边吃奶边做爰视频| 免费在线观看完整版高清| 久久午夜综合久久蜜桃| 久久av网站| 一区二区三区四区激情视频| 国产av精品麻豆| a级毛片黄视频| 国产黄色免费在线视频| 久久精品久久久久久久性| 看非洲黑人一级黄片| 女人高潮潮喷娇喘18禁视频| 狂野欧美激情性xxxx| 亚洲国产看品久久| 久久ye,这里只有精品| 日韩,欧美,国产一区二区三区| 好男人视频免费观看在线| 天天操日日干夜夜撸| 麻豆乱淫一区二区| 汤姆久久久久久久影院中文字幕| 欧美亚洲日本最大视频资源| 菩萨蛮人人尽说江南好唐韦庄| 午夜福利视频在线观看免费| 国产精品人妻久久久影院| 国产色婷婷99| 中文字幕最新亚洲高清| 黄色视频不卡| 午夜福利视频精品| 黄频高清免费视频| 亚洲欧美激情在线| 日韩不卡一区二区三区视频在线| 精品亚洲乱码少妇综合久久| 国产97色在线日韩免费| 在线观看免费视频网站a站| 精品第一国产精品| 久久女婷五月综合色啪小说| 久久久久精品性色| 欧美精品一区二区免费开放| 熟妇人妻不卡中文字幕| 精品久久蜜臀av无| 亚洲欧美成人精品一区二区| 丁香六月欧美| 制服丝袜香蕉在线| 日韩一区二区三区影片| 人人妻人人澡人人看| 免费少妇av软件| 久久人人爽av亚洲精品天堂|