• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Defense Against Poisoning Attack via Evaluating Training Samples Using Multiple Spectral Clustering Aggregation Method

    2019-06-12 01:23:14WentaoZhaoPanLiChengzhangZhuDanLiuandXiaoLiu
    Computers Materials&Continua 2019年6期

    Wentao Zhao,Pan Li, ,Chengzhang Zhu, ,Dan Liu and Xiao Liu

    Abstract:The defense techniques for machine learning are critical yet challenging due to the number and type of attacks for widely applied machine learning algorithms are significantly increasing.Among these attacks,the poisoning attack,which disturbs machine learning algorithms by injecting poisoning samples,is an attack with the greatest threat.In this paper,we focus on analyzing the characteristics of positioning samples and propose a novel sample evaluation method to defend against the poisoning attack catering for the characteristics of poisoning samples.To capture the intrinsic data characteristics from heterogeneous aspects,we first evaluate training data by multiple criteria,each of which is reformulated from a spectral clustering.Then,we integrate the multiple evaluation scores generated by the multiple criteria through the proposed multiple spectral clustering aggregation (MSCA)method.Finally,we use the unified score as the indicator of poisoning attack samples.Experimental results on intrusion detection data sets show that MSCA significantly outperforms the K-means outlier detection in terms of data legality evaluation and poisoning attack detection.

    Keywords:Poisoning attack,sample evaluation,spectral clustering,ensemble learning.

    1 Introduction

    In big data era,machine learning is becoming one of the most popular techniques in many applications because of its excellent performance.For example,in image recognition [Lingyun,Xiaobo,Jiaohua et al.(2018)],many machine learning algorithms have achieved higher recognition accuracy compared with human [Makili,Vega,Dormido-Canto et al.(2011)].Besides,those algorithms also show significant successes in other domains,such as speech recognition [Hinton,Deng,Yu et al.(2012)],intrusion detection system (IDS)[Tsai,Hsu,Lin et al.(2009)],financial prediction [Wei,Liang and Longbing (2015)],web content analysis [Lingyun,Yan,Wei et al.(2018)] and data analytics [Chengzhang,Longbing,Qiang et al.(2018);Lingyun,Guohan,Qian et al.(2018)],etc.

    However,recent researches indicate that many attacks can destroy the application of machine learning [Liu,Li,Zhao et al.(2018)].Basically,these attacks can be classified into two categories:exploratory attack and causative attacks [Barreno,Nelson,Sears et al.(2006)].Exploratory attack mainly destroys the learning model performance during the prediction stage.For example,the adversarial sample crafting methods proposed by [Nguyen,Yosinski and Clune (2015);Carlini,Mishra,Vaidya et al.(2016)] can easily manipulate a well-trained deep neural network (DNN).Causative attack mainly occurs in the model training stage.A typical causative attack method is the poisoning attack.Poisoning attack manipulates the learning model by modifying the features or labels of training data or injecting poisoning data that is similar yet has different distribution to training data.As evidenced by [Biggio,Fumera,Roli et al.(2012);Pan,Qiang,Wentao et al.(2018);Pan,Wentao,Qiang et al.(2018)],poisoning attack seriously destroys the performance of learning models that invalidates various applications in multiple scenarios.Recently,many efforts have been paid on the defense technologies for poisoning attack.Existing methods reduce the impact of poisoning attack by adopting data sanitization and introducing robust learning algorithms.Data sanitization improves the quality of training data via filtering suspicious poisoning data [Nelson,Barreno,Chi et al.(2008);Laishram and Phoha (2016);Paudice,Munozgonzalez and Lupu (2018)].In contrast,robust learning algorithms tolerant poisoning data through well-designated models.Although the above methods have achieved remarkable performance,they may fail to tackle the following challenges.First,most defense techniques may have a high false detection rate.These methods are sensitive to their hyper-parameters.Without well-tuned hyperparameters,they are likely to classify the legal samples as poisoning data,and thus,cause the high false detection rate.Second,most defense techniques only suit for a certain kind of attacks.Their scalability and generalization performance should be further improved.

    In this paper,we propose a novel poisoning attack defense technique.The proposed technique detects poisoning samples via a multiple spectral clustering aggregation (MSCA)method,which evaluates training samples from multiple views and provides a more robust solution.The main contributions of this paper are summarized as follows:

    ·We propose an evaluation method to quantify the legitimacy of training samples.This method combines spectral clustering with similarity metric to provide reliable results.

    ·We further integrate multiple spectral clustering results per different types of similarity metric and various number of clustering centers to form a robust sample evaluation method.

    ·The MCSA evaluation results can be used to implement a variety of poisoning attack defense technologies under different assumptions catering for specific data characteristics.

    The rest of this paper is organized as follows.Section 2 introduces the related knowledge about the adversarial model and the adversarial sample evaluation.Section 3 details the spectral clustering-based evaluation method.Section 4 introduces the proposed multiple spectral clustering aggregation method.Section 5 shows the simulation results by using the MSCA method to remove the suspicious poisoning samples.Section 6 concludes the paper.

    2 Preliminaries

    2.1 Adversary model

    Before studying a type of attack,we should make an assumption about the attacker.Wittel et al.[Wittel and Wu (2004)] first considered the attacker’s knowledge when studying the evasive attack of the spam filtering system.Later,some researchers suggested that it is necessary to consider the adversary goal and the adversary capability [Barreno,Nelson,Searset et al.(2006)].These three aspects further formed the concept of the adversary model,and its specific meaning is as follow:

    ·Adversary goal.Adversary goal is the final effect that the adversary wants to achieve.In this paper,the goal of the attacker is crafting poisoning data to destroy learning models.

    ·Adversary knowledge.Before launching attack,adversary needs some information related to the targeted learning models.In this paper,we suppose the adversary know the whole training data,or the algorithms,even the concrete parameters of targeted models.In this assumption,the attacker can craft various poisoning samples,which can further verify the performance of proposed defense method.

    ·Adversary capability.Besides the adversary knowledge,the adversary should have ability to launch attack.For the poisoning attack,previous works mainly contain two types.One assumes the adversary can change the labels or the features of training data [Zhao,An,Gao et al.(2017);Biggio,Nelson and Laskov (2012)].The other assumption is that the adversary can inject adversarial samples into training data when the learning models are retraining [Rubinstein,Nelson,Huang et al.(2009);Kloft and Laskov.(2010)].In this paper,we study the defense technology against the poisoning samples crafted by the latter assumption.

    2.2 Sample legitimacy evaluation

    2.2.1 Poisoning samples

    According to various adversary capabilities,the poisoning samples are mainly crafted by two ways.The first kind of poisoning sample is generated by modifying the features or the labels of existing training data.The second kind of poisoning sample is from the new injecting samples during the model retraining process.Both of the two kinds of poisoning samples have the same attack goal of drifting the initial distribution of training data.Referring to [Pan,Qiang,Wentao et al.(2018)],the poisoning samples have two features.

    ·The sample should be recognized as legal sample by the classifier.This means that the poisoning samples are not easily identified as abnormal points.

    ·The sample can change the original training data distribution,which can further affect the performance of the model trained from the training data.

    In general,the poisoning samples can cause data drifting of the training data without arousing the suspicion of the classifier.Besides,it can also affect the performance of the targeted learning model.

    2.2.2 Sample legitimacy evaluation

    Using the poisoned training data without any distinction can seriously decrease the performance of learning model.So,it is critical to properly evaluate the training data.From above introduction,the poisoning data can be defined as the data which can destroy the distribution of training data.In the contrary,legal data represents the initial training data without any contamination by the poisoning data.

    Therefore,the sample legitimacy evaluation can quantify the significance or confidence of the training data.So,we define a metric,namedLegitimacy Coefficient(LC),to measure the legality of training samples.HigherLCrepresents that the sample is more closed to the true sample distribution,while lowerLCshows that the sample is farer away from the true sample distribution.

    3 Single spectral clustering for sample evaluation

    Combining with the above description of the poisoning samples’ characteristics,we first design a single spectral clustering evaluation method to evaluate theLCvalue of training samples.Furthermore,we use the ensemble strategy to integrate multiple spectral clustering learners and then propose a multiple spectral clustering aggregation method,which can be used to evaluate the legitimacy of training data.In this section,we detail the single spectral clustering evaluation method.

    3.1 Spectral clustering

    Spectral clustering is a clustering algorithm developed from graph theory.The main idea is treating all samples as points in high-dimensional space and connecting them with edges to form an undirected weight map.The weightwijof each edge in the graph can be used to represent the distance relationship between sample pointixand sample pointxj.The edge weight of the two sample points will be high if the distance of the two samples is far,and vice versa.The clustering can be realized by cutting the undirected graph,which can ensure the sum of edge weights between two independent sub graphs is as low as possible,and the sum of edge weights inside the sub graph is as high as possible.

    The initial spectral clustering can achieve good clustering performance,and the clustering result can provide a benchmark reference for evaluating the training sample.According to [Yu and Shi (2003)],the spectral clustering result is decided by three aspects:

    ·The computation way of adjacency metricW.In spectral clustering,the edge weightwijcan be used to measure the relationship between two samples.Considering the edge weights of all training samples,we can get the adjacency metricW.As for a data set withnsamples,Wcan be represented by Eq.(1).

    wherewijrefers to the edge weight betweenith sample andjth sample.

    ·The standard graph laplace metric=-L W D,whereWis adjacency metric andDrefers to degree metric,which can be formulated as Eq.(2).

    ·The clustering way.The last step in spectral clustering is using clustering method such as K-means to deal with the standard feature metricF.

    3.2 Single spectral clustering sample rating method

    Based on spectral clustering method,we further utilize the clustering result and similarity metricWto realize the evaluation of training data.The specific process of evaluating on each sample is shown in Algorithm 1,vxirepresents theLCvalue of samplexi.

    Algorithm 1:Single spectral clustering for sample evaluation Input:Sample set 1 2={,,...,}nXx xx with label p,The generating way of similarity metric G,Class number k Output: Rating scores 1 2{,,...,}=xxxnV v vv 1.Initialize:=?synX 2.According to G,generate similarity metric W 3.Divide X into k groups of samples 1 2{,,...}kD D D using spectral clustering 4.ChooseiD as the legal sample set {,...,}=normalimDxx,other class Dj(j≠i) as the candidate sample sets,iD is the closest class to the centre of all samples 5.for 1=i to n do 6.Compute=∑miij j1=Sw,where wij is the similarity between ix and xj 7.end for 8.Sort 1{,...,}=xxnS SS in descending order,the index of ix is the score for ix

    Higher value represents higher confidence of sample’s legitimacy.In the contrary,lower score refers to lower confidence of sample’s legitimacy.The score for each sample is determined by two factors.First,the selection of similarity measure for spectral clustering can be a gaussian kernel function,polynomial kernel function or sigmoid kernel function.Different kernel functions can fit different data distributions.Second,the selection of legal samples class decides the benchmark of basic legitimacy evaluating,which further affect theLCvalue of samples.Besides,the way generating adjacency matrix and the basic clustering way determine the clustering results,which further affect the legal class selection.

    4 Multiple spectral clustering aggregation for sample evaluation

    For a data set,kernel function type (gaussian kernel,polynomial kernel,sigmoid kernel)and the number of cluster results can influence the evaluation of sample legitimacy.In order to reduce the parameters sensitivity of the algorithm,we combine spectral clustering with ensemble learning to achieve more robust sample legitimacy evaluation.

    4.1 Ensemble strategy

    The main idea of ensemble learning is integrating multiple base learners into a strong learner through some combination strategies.The performance of the integrated strong learner is more robust than that of each base learner.In ensemble learning,the combination strategy of the base learners directly affects the performance of the integrated strong learner.We simply describe three common combination strategies [Dietterich (2000)] as follows:

    ·Averaging strategy:This is the most common combination strategy for basic learners,including the simple average method and the weighted average method.

    ·Voting strategy:Assuming that the output of each sample is predicted fromnlearners,the voting method judges the output of the sample by counting the labels predicted by these learners.There are three main ways:the majority of voting methods,the relative majority voting method and the weighted voting method.

    ·Learning strategy:The averaging strategy and voting strategy may not be suitable in some cases.Therefore,it is necessary to construct a nonlinear relationship through learning method to integrate the base learners.

    4.2 Average ensemble strategy for multiple spectral clustering aggregation

    In this section,we used the averaging strategy as an example to design an aggregation method.The specific process is shown in algorithm 2,MSCA uses the sum of all scores rated by various spectral clustering learners as theLCvalue of the sample evaluated by MSCA.After that,the defender can properly combine theLCvalue with specific defense method to defense against poisoning attack.For example,the defender can adopt the idea of data sanitization.A simple method is removing the samples with the lowerLCvalues,which are classified as suspicious poisoning data by MSCA.Besides,based on the value of sample legitimacy provided by MSCA,the defender can further adopt bagging or boosting strategy to ensemble various learners.TheLCvalue can be used to adjust the weights of the samples in the training process,which can reduce the impact of poisoning data and achieve more robust machine learning algorithm.

    Algorithm 2:Multiple spectral clustering aggregation (MSCA)Input:Sample set 1 2={,,...,}NXx xx with label p,the set of generating way of similarity metric 1 2{,,...,}mG GG,the set of clustering number 1 2{,,...,}nk kk Output: Rating scores 1 2{,,...,}=xxxNV v vv 1.Initialize:=?synX 2.for 1=i to n do 3.Choose the number of clustering kj 4.Input,,ijG k X to algorithm 1,get the score ijV 5.end for 6.Compute the sum of scores 1 1==∑∑mnij xpxpijVv for sample ( 1,...,)=px pN 7.1{,...,}=xxNV vv

    5 Experiment

    In this section,we evaluate the performance of the proposed defense method by extensive experiments described as follows:Firstly,we introduce the experimental setting in this paper,including the targeted poisoning samples crating methods and the specific parameters setting of proposed MSCA method.Then we visually show the performances of various methods defense against BEBP poisoning method on synthetic data set.Finally,we compare the proposed method with other defense methods on two real data sets to further demonstrate its stability and effectiveness in the assessment of training data.

    5.1 Experimental setting

    5.1.1 Poisoning methods

    For the poisoning sample crafting methods,we chose two typical poisoning methods,i.e.,Batch-EPD Boundary Pattern (BEBP)[Pan,Qiang,Wentao et al.(2018)] and Centredrifting Boundary Pattern (CBP)[Pan,Wentao,Qiang et al.(2018)].They can effectively craft boundary pattern data,which can serve as poisoning data to seriously destroy the performance of six different machine learning models.

    BEBPThis method first randomly divides the training data set into several groups,and then calculates the edge pattern data and corresponding normal vectors of each group data using edge pattern detection algorithm.After that,by pushing the edge pattern data towards their normal vectors,we can get pushed data,which can be further selected by boundary pattern detection algorithm to get the boundary pattern data.

    CBPSimilar to BEBP,CBP also use the boundary pattern detection method to select the pushed data.The difference is that CBP pushes the whole training data toward the same center vector to get pushing data.And the center vector can be easily obtained by calculating the vector between the two class centres.

    Besides,the method in Pan et al.[Pan,Wentao,Qiang et al.(2018)] can launch poisoning attack with weak adversary model,while the attacker should have a strong adversary model in Pan et al.[Pan,Qiang,Wentao et al.(2018)].For this paper mainly study the defense technology,we suppose that targeted models are in worse case,which means that the attacker has enough knowledge about targeted learning models.

    5.1.2 Parameters setting

    For the parameters setting of BEBP and CBP,we kept the setting in [Pan,Qiang,Wentao et al.(2018);Pan,Wentao,Qiang et al.(2018)],wherein the poisoning ratio and the poisoning round are set as 0.07 and 5,respectively.

    As for the proposed MSCA,we selected six base spectral clustering learners with different kernel types and clustering centers.Specifically,we set the numbers of clustering centre as three and six,and each clustering centre number is combined with three kernel types as follows:

    ·Gaussian kernel:

    ·Sigmoid kernel:

    ·Polynomial kernel:

    To focus on evaluation method itself,we simply used the default kernel parameters in the sklearn tool.

    5.2 Experiment on synthetic data set

    In order to visualize the defense performance of proposed method,we compared the proposed MSCA method with K-means.Meanwhile,the assess result of each base spectral clustering learner is also performed on the synthetic data set.

    As shown in the Fig.1,we can see that the detection results of suspicious poisoning data using various defense methods regarding the poisoning points caused by BEBP method.Obviously,the MSCA method performs better than K-means method and its performance is more stable and effective than single spectral clustering method on the assessment of samples’ legitimate.

    Figure 1:The comparison of various defense methods on synthetic data set (The Fig.(a)represents the poisoning effect caused by BEBP,the red round points refer to the boundary poisoning data.The Figs.(b)-(i)represent the defense performance of various defense methods,where the red round points refer to the illegal points detected by various defense methods.)

    5.3 Experiments on intrusion detection data sets

    Referring to previous work [Pan,Wentao,Qiang et al.(2018)],poisoning attack via injecting poisoning data always occurs in the retraining process of learning model.Network intrusion detection system is a typical domain whose model needs be retrained.So in this section,we evaluate the performance of proposed method by simulating defense experiment on two network intrusion detection data sets.

    5.3.1 Performance metric

    Regarding an IDS system,accuracy is the primary performance metric.Hence,we adopt accuracy in this paper to evaluate the performance reduction of machine learning-based IDSs under the previous poisoning attack methods.The accuracy (ACC)is defined by Eq.(3):

    where true positive (TP)is the number of truly abnormal samples that are classified as abnormal ones by IDSs,true negative (TN)means the number of truly normal samples that are treated as normal ones,false positive (FP)refers to the number of truly normal samples classified as abnormal ones,and false negative (FN)represents the number of truly abnormal samples classified as normal ones.

    Table 1:Sample distribution of the randomly selected data regarding the NSL-KDD

    5.3.2 Data sets

    To demonstrate the performance of the proposed defense method,we chose two public intrusion detection data sets.

    NSL-KDDThis data set is a revised version of KDDCUP99,which is a well-known benchmark data set for evaluating the performance of IDSs.NSL-KDD contains five categories of samples (one normal and four abnormal).Moreover,each sample has 41 features.

    Kyoto 2006+This data set proposed in Song et al.[Song,Takakura,Okabe et al.(2011)] is another famous intrusion detection data set.This data set has been collected from honeypots and regular servers that are deployed at the Kyoto University since 2006.Moreover,Kyoto 2006+contains three types of samples,i.e.,normal,known attack and unknown one,and each sample has 24 features.

    Referring to Pan et al.[Pan,Qiang,Wentao et al.(2018);Pan,Wentao,Qiang et al.(2018)],we randomly selected training samples and evaluation samples from NSL-KDD and Kyoto 2006+.The sample distribution of training data and evaluating data selected from NSL-KDD shows in Tab.1.Similarly,we randomly selected 13292 samples from the traffic data collected during 27-31,August 2009 regarding the Kyoto 2006+data set,including 6472 samples as training data and 6820 samples as evaluating data.

    Targeted ModelsFrom the previous work we can know that the SVM algorithms were fragile facing the boundary pattern poisoning samples [Pan,Qiang,Wentao et al.(2018)].Therefore,we focus on the defense methods towards SVM algorithms.Specifically,we select three typical SVM algorithms,including SVM with a radial basis function kernel (SVM-RBF),SVM with a linear kernel (SVM-linear)and SVM with a sigmoid kernel (SVM-Sigmoid).

    5.3.3 Experimental results

    According to above experimental setting,we evaluated theACCof various defense methods,includingK-means clustering with outlier removal,the proposed MSCA method and its base spectral clustering with outlier removal,respectively.Meanwhile,the targeted poisoning samples are generated by BEBP and CBP,and both of the two kinds of poisoning methods are performed on NSL-KDD and Kyoto 2006+.

    Fig.2 and Fig.3 describe theACCchanging with no defense,K-means and MSCA method under 5 round poisoning attack using BEBP and CBP on NSL-KDD data set.The No defense method represents the model performance without any defense measure,whileK-means refers to theACCof model using theK-means method to remove the outlier data.

    Figure 2:The comparison of ACC with various methods defensing against poisoning data crafted by BEBP on NSL-KDD data set

    Tab.2 and Tab.3 show the results of different methods defensing against 5 round poisoning attack using BEBP and CBP on Kyoto 2006+data set.Specially,we used Means,Best and Worst in Tab.2 and Tab.3 to represent the averageACC,the bestACCand the worstACCamong the six base spectral clustering with outlier removal,respectively.

    Figure 3:The comparison of ACC with various methods defensing against poisoning data crafted by CBP on NSL-KDD data set

    From the above experimental results,we can see that proposed MSCA method can effectively defense the poisoning attack.Specifically,we can compare the defense performance from three aspects.

    ·As for the performance of defense against different poisoning samples,MSCA can improve the performance of targeted models under poisoning attack of BEBP and CBP both on NSL-KDD and Kyoto 2006+.It is noteworthy that MSCA performs better with the increasing of poisoning rounds.This means that the proposed method can keep the stable and effective performance of targeted models in their long-term retraining process under the disturbance of poisoning attack.

    ·Compared with K-means defense method in Fig.2 and Fig.3,MSCA performs better in defensing against the poisoning samples crafted by BEBP and CBP on NSL-KDD data set.Relatively speaking,MSCA can better defense against the poisoning samples crafted by BEBP,but the experimental results using MSCA and K-means both perform less effective in defensing against the CBP poisoning method.

    Table 2:Comparative results of ACC on Kyoto 2006+under 5 round poisoning attack using BEBP

    Table 3:Comparative results of ACC on Kyoto 2006+under 5 round poisoning attack using CBP

    SVM- linear No defense 98.39% 97.08% 94.67% 92.78% 91.30% MSCA 97.54% 96.48% 95.45% 94.20% 93.23% Mean 97.46% 96.37% 95.23% 93.98% 92.97% Best 97.87% 96.52% 95.41% 94.26% 93.29% Worse 96.67% 96.17% 95.00% 93.44% 92.45% SVM- Sigmoid No defense 97.30% 96.34% 94.17% 91.71% 89.93% MSCA 97.00% 95.54% 95.06% 94.21% 93.06% Mean 96.82% 95.33% 94.66% 93.97% 92.65% Best 97.00% 95.49% 94.85% 94.29% 93.21% Worse 96.57% 95.23% 94.21% 93.61% 91.96%

    ·From Tab.2 and Tab.3 we can see that MSCA with the average ensemble strategy is more stable than the single spectral clustering method.Although it is difficult to use average ensemble strategy achieving better performance than the best spectral clustering learner,MSCA can achieve the comparable performance with the best one among all base spectral clustering learners.Moreover,MSCA performs significantly better than the worst one as well slightly better than the averageACCof all base learners.

    6 Conclusions

    In this paper,we have proposed a novel sample evaluation method using spectral clustering and ensemble strategy.Firstly,we propose using spectral clustering algorithm to evaluate training samples and rate theirLCvalues.To address the drawback of single spectral clustering,we further present the MSCA method to realize more robust evaluation for training sample.Experiments on real intrusion detection data sets demonstrate the proposed sample evaluation method can effectively defense against poisoning sample crafted by different methods.

    In future,it is worthwhile to do more in-depth studies on the scalability of the proposed sample evaluation method.Moreover,designing more robust algorithms using the result of sample evaluation will be a worthwhile work as well.

    99九九在线精品视频| 黑人猛操日本美女一级片| 男男h啪啪无遮挡| 少妇人妻精品综合一区二区| 一个人免费看片子| 女人久久www免费人成看片| 一区二区三区精品91| 亚洲av福利一区| 久久精品国产综合久久久| 18禁动态无遮挡网站| 日韩一卡2卡3卡4卡2021年| 久久午夜综合久久蜜桃| 少妇 在线观看| 国产又爽黄色视频| 国产免费福利视频在线观看| 久久精品久久久久久噜噜老黄| 汤姆久久久久久久影院中文字幕| 国产精品无大码| 香蕉国产在线看| 亚洲美女黄色视频免费看| 91国产中文字幕| 91国产中文字幕| 国产精品 国内视频| 欧美精品人与动牲交sv欧美| 这个男人来自地球电影免费观看 | 国产精品麻豆人妻色哟哟久久| 高清在线视频一区二区三区| 涩涩av久久男人的天堂| 美女午夜性视频免费| 日本欧美视频一区| 午夜免费男女啪啪视频观看| 人妻一区二区av| 老汉色av国产亚洲站长工具| 精品国产一区二区三区久久久樱花| 黑丝袜美女国产一区| 国产精品av久久久久免费| 久久久久久久久久人人人人人人| 在线观看免费日韩欧美大片| 色视频在线一区二区三区| 国产精品国产三级国产专区5o| 人妻 亚洲 视频| 成人毛片60女人毛片免费| 成人国产av品久久久| 超碰成人久久| www.自偷自拍.com| 国产在线视频一区二区| av在线观看视频网站免费| 男女国产视频网站| 建设人人有责人人尽责人人享有的| 亚洲精品久久成人aⅴ小说| 亚洲第一区二区三区不卡| 七月丁香在线播放| 99久久综合免费| 熟妇人妻不卡中文字幕| 成人亚洲欧美一区二区av| 视频区图区小说| av在线播放精品| 美女视频免费永久观看网站| av有码第一页| 一级毛片 在线播放| 久久精品国产综合久久久| 国产欧美日韩一区二区三区在线| 精品亚洲成国产av| 1024香蕉在线观看| 国产一区二区三区综合在线观看| 欧美最新免费一区二区三区| 日韩一本色道免费dvd| 青草久久国产| 99热国产这里只有精品6| 在线观看三级黄色| 人人妻人人添人人爽欧美一区卜| 人妻人人澡人人爽人人| 久久久久精品性色| 中文字幕制服av| 国产xxxxx性猛交| 亚洲精品美女久久av网站| 大话2 男鬼变身卡| 国产精品一国产av| 久久久久视频综合| 人人澡人人妻人| 亚洲四区av| 久久久久久久亚洲中文字幕| 亚洲精品日韩在线中文字幕| xxxhd国产人妻xxx| 三上悠亚av全集在线观看| 精品人妻熟女毛片av久久网站| 国产精品偷伦视频观看了| 久久热在线av| 午夜精品国产一区二区电影| 精品国产露脸久久av麻豆| 久久精品久久久久久噜噜老黄| 卡戴珊不雅视频在线播放| 999久久久国产精品视频| 99国产精品免费福利视频| 日本av免费视频播放| 久久久久久久精品精品| 精品亚洲乱码少妇综合久久| 高清黄色对白视频在线免费看| 大片电影免费在线观看免费| 国产精品国产三级国产专区5o| 久久精品熟女亚洲av麻豆精品| 男女下面插进去视频免费观看| 亚洲综合色网址| av不卡在线播放| 亚洲精品一区蜜桃| 边亲边吃奶的免费视频| www.熟女人妻精品国产| 欧美成人精品欧美一级黄| 成年人免费黄色播放视频| 五月伊人婷婷丁香| 国产1区2区3区精品| 国产爽快片一区二区三区| 久久久久久久久久久免费av| 久久久久视频综合| 欧美成人午夜精品| 欧美激情极品国产一区二区三区| 精品一区二区免费观看| 午夜激情av网站| 国产精品国产av在线观看| 午夜日本视频在线| 高清不卡的av网站| 久久久久久久亚洲中文字幕| 精品人妻偷拍中文字幕| 久久97久久精品| 天堂俺去俺来也www色官网| 亚洲图色成人| 看免费成人av毛片| 免费观看在线日韩| 日本vs欧美在线观看视频| 亚洲一码二码三码区别大吗| 99热国产这里只有精品6| www.精华液| 午夜福利视频精品| 欧美亚洲日本最大视频资源| 午夜福利乱码中文字幕| 亚洲av日韩在线播放| 精品久久久久久电影网| 国产精品久久久久成人av| tube8黄色片| 人成视频在线观看免费观看| 黄色怎么调成土黄色| 熟妇人妻不卡中文字幕| 满18在线观看网站| 最近中文字幕高清免费大全6| 婷婷成人精品国产| 在线看a的网站| 精品一区在线观看国产| 香蕉精品网在线| 99精国产麻豆久久婷婷| 国产精品免费大片| 18禁动态无遮挡网站| 国产高清不卡午夜福利| 黄片播放在线免费| 一个人免费看片子| 2022亚洲国产成人精品| 亚洲综合精品二区| 午夜免费观看性视频| 国产成人精品久久久久久| 女人精品久久久久毛片| 美女福利国产在线| 香蕉精品网在线| 咕卡用的链子| 亚洲av在线观看美女高潮| 丝袜美腿诱惑在线| 欧美日韩一级在线毛片| 最近中文字幕高清免费大全6| 精品国产超薄肉色丝袜足j| 人人妻人人爽人人添夜夜欢视频| 久久精品亚洲av国产电影网| 美女xxoo啪啪120秒动态图| 建设人人有责人人尽责人人享有的| 久久久久久人妻| 欧美激情极品国产一区二区三区| 人人妻人人澡人人看| 9色porny在线观看| 青春草国产在线视频| 韩国av在线不卡| 免费少妇av软件| 国产av码专区亚洲av| 婷婷色麻豆天堂久久| xxxhd国产人妻xxx| 女性被躁到高潮视频| 韩国精品一区二区三区| www.av在线官网国产| 制服丝袜香蕉在线| 少妇人妻 视频| 国产1区2区3区精品| 纯流量卡能插随身wifi吗| 精品一品国产午夜福利视频| 亚洲国产精品一区二区三区在线| 桃花免费在线播放| 91精品国产国语对白视频| 欧美 日韩 精品 国产| 18+在线观看网站| 国产成人精品在线电影| 中文欧美无线码| 男女国产视频网站| 欧美精品av麻豆av| 中文欧美无线码| 我的亚洲天堂| 老熟女久久久| 熟女电影av网| 久久精品国产自在天天线| 午夜91福利影院| 乱人伦中国视频| 久久女婷五月综合色啪小说| 亚洲国产av新网站| 中文字幕精品免费在线观看视频| 久久久精品免费免费高清| 1024视频免费在线观看| 黄色毛片三级朝国网站| 日韩制服丝袜自拍偷拍| 亚洲成人av在线免费| 久久这里只有精品19| 久久久久网色| 两个人免费观看高清视频| 天天躁夜夜躁狠狠久久av| 最近最新中文字幕免费大全7| 免费av中文字幕在线| 不卡av一区二区三区| 精品人妻一区二区三区麻豆| 久久久久国产网址| 精品福利永久在线观看| 两性夫妻黄色片| 丰满迷人的少妇在线观看| 久久综合国产亚洲精品| 又粗又硬又长又爽又黄的视频| www日本在线高清视频| 亚洲欧美色中文字幕在线| 欧美激情高清一区二区三区 | 蜜桃国产av成人99| 18+在线观看网站| 男女下面插进去视频免费观看| 可以免费在线观看a视频的电影网站 | 寂寞人妻少妇视频99o| 国产亚洲欧美精品永久| 女性被躁到高潮视频| 秋霞伦理黄片| 午夜日本视频在线| 两个人看的免费小视频| 国产精品久久久久久久久免| 国产一区二区激情短视频 | 色播在线永久视频| 欧美精品高潮呻吟av久久| 欧美精品一区二区免费开放| 欧美日韩av久久| 亚洲av电影在线进入| 91久久精品国产一区二区三区| 日日啪夜夜爽| 看非洲黑人一级黄片| 狂野欧美激情性bbbbbb| 午夜福利网站1000一区二区三区| 一级毛片我不卡| 中文字幕人妻丝袜一区二区 | 久久久久精品性色| 熟女电影av网| 精品一区二区三卡| 一级毛片黄色毛片免费观看视频| av免费在线看不卡| 高清欧美精品videossex| 日韩一区二区视频免费看| 亚洲av中文av极速乱| 2022亚洲国产成人精品| 成人国语在线视频| 2021少妇久久久久久久久久久| 中文乱码字字幕精品一区二区三区| 赤兔流量卡办理| 久久久亚洲精品成人影院| 国产熟女午夜一区二区三区| 国产成人av激情在线播放| 国产 精品1| 男女无遮挡免费网站观看| 男的添女的下面高潮视频| 午夜激情久久久久久久| 国产精品香港三级国产av潘金莲 | 99国产精品免费福利视频| 亚洲av欧美aⅴ国产| 国产精品 欧美亚洲| 国产片特级美女逼逼视频| 精品人妻在线不人妻| 黄片无遮挡物在线观看| 亚洲成人手机| 巨乳人妻的诱惑在线观看| 女人久久www免费人成看片| 91成人精品电影| 99精国产麻豆久久婷婷| 久久久久视频综合| 欧美人与性动交α欧美软件| 黄色 视频免费看| 亚洲人成77777在线视频| 2018国产大陆天天弄谢| 亚洲欧美日韩另类电影网站| 亚洲精品美女久久久久99蜜臀 | 国产亚洲av片在线观看秒播厂| 天天操日日干夜夜撸| 久久ye,这里只有精品| 精品99又大又爽又粗少妇毛片| 欧美激情高清一区二区三区 | 亚洲精品av麻豆狂野| 丝袜喷水一区| 日韩av在线免费看完整版不卡| 国产精品女同一区二区软件| 伊人久久国产一区二区| 日本色播在线视频| 国产精品久久久久久久久免| 69精品国产乱码久久久| 女的被弄到高潮叫床怎么办| 久久精品国产自在天天线| 在线观看www视频免费| 大话2 男鬼变身卡| 亚洲精品日本国产第一区| 精品国产一区二区三区久久久樱花| 中文字幕av电影在线播放| 99国产精品免费福利视频| 国产精品三级大全| 国产成人欧美| 男女无遮挡免费网站观看| 男女无遮挡免费网站观看| 纵有疾风起免费观看全集完整版| 男女高潮啪啪啪动态图| 国产精品国产三级国产专区5o| www.av在线官网国产| 各种免费的搞黄视频| 97精品久久久久久久久久精品| 亚洲视频免费观看视频| 两性夫妻黄色片| av电影中文网址| 尾随美女入室| 极品人妻少妇av视频| a 毛片基地| 亚洲国产日韩一区二区| 免费高清在线观看视频在线观看| 欧美另类一区| 婷婷成人精品国产| 国产精品不卡视频一区二区| av网站在线播放免费| 日本欧美视频一区| 中文精品一卡2卡3卡4更新| 精品亚洲成a人片在线观看| 少妇人妻 视频| 18禁观看日本| 菩萨蛮人人尽说江南好唐韦庄| www.自偷自拍.com| av片东京热男人的天堂| 久久精品国产亚洲av天美| 99热国产这里只有精品6| 香蕉精品网在线| 亚洲美女黄色视频免费看| 久久久精品区二区三区| 国产熟女午夜一区二区三区| 成年av动漫网址| 日韩精品有码人妻一区| 丝瓜视频免费看黄片| 视频区图区小说| www.自偷自拍.com| av免费在线看不卡| 美女午夜性视频免费| xxx大片免费视频| 免费黄频网站在线观看国产| 自拍欧美九色日韩亚洲蝌蚪91| 国产乱人偷精品视频| 亚洲av国产av综合av卡| 国产免费视频播放在线视频| 黄片小视频在线播放| 欧美日韩亚洲国产一区二区在线观看 | 日韩人妻精品一区2区三区| 国产 精品1| 母亲3免费完整高清在线观看 | 免费观看av网站的网址| 国产片特级美女逼逼视频| 午夜福利网站1000一区二区三区| 日韩 亚洲 欧美在线| 男的添女的下面高潮视频| 国产成人aa在线观看| 亚洲精品日韩在线中文字幕| 国产无遮挡羞羞视频在线观看| 91aial.com中文字幕在线观看| 成人二区视频| 26uuu在线亚洲综合色| 中文字幕制服av| 日韩不卡一区二区三区视频在线| 高清在线视频一区二区三区| 大码成人一级视频| 午夜福利乱码中文字幕| 欧美精品av麻豆av| 老汉色av国产亚洲站长工具| 色播在线永久视频| 国产成人精品久久久久久| 在线 av 中文字幕| 1024视频免费在线观看| 欧美亚洲日本最大视频资源| 久久久精品国产亚洲av高清涩受| 亚洲国产毛片av蜜桃av| 高清av免费在线| 秋霞伦理黄片| 久久人人爽av亚洲精品天堂| 日韩熟女老妇一区二区性免费视频| 亚洲婷婷狠狠爱综合网| 亚洲欧美精品自产自拍| 亚洲欧美一区二区三区国产| 一区二区三区精品91| 建设人人有责人人尽责人人享有的| 香蕉国产在线看| 美女视频免费永久观看网站| 日韩一卡2卡3卡4卡2021年| 久久久a久久爽久久v久久| 日本黄色日本黄色录像| 国产成人a∨麻豆精品| 国产av精品麻豆| 国产精品熟女久久久久浪| 久久久久久久久久久久大奶| 另类精品久久| 久久这里只有精品19| 涩涩av久久男人的天堂| 又粗又硬又长又爽又黄的视频| 两个人免费观看高清视频| 亚洲成国产人片在线观看| 久久久久久久大尺度免费视频| a级毛片在线看网站| 欧美人与性动交α欧美软件| 欧美日韩综合久久久久久| 亚洲精品久久午夜乱码| 欧美黄色片欧美黄色片| 免费av中文字幕在线| 欧美精品高潮呻吟av久久| 一区二区av电影网| 美女视频免费永久观看网站| 亚洲精品,欧美精品| 国产免费一区二区三区四区乱码| 成年人免费黄色播放视频| 国产亚洲最大av| 国产一区有黄有色的免费视频| 国产欧美日韩综合在线一区二区| 超碰97精品在线观看| 久久免费观看电影| 久久久久网色| 午夜福利在线观看免费完整高清在| 久久韩国三级中文字幕| 国产在线视频一区二区| 天堂8中文在线网| 久久精品aⅴ一区二区三区四区 | 久久精品夜色国产| 亚洲国产精品一区二区三区在线| 国产在视频线精品| 美女脱内裤让男人舔精品视频| 啦啦啦在线免费观看视频4| 国产伦理片在线播放av一区| 伦理电影免费视频| 久久精品熟女亚洲av麻豆精品| 最近最新中文字幕免费大全7| 久久久久久人妻| 欧美日韩视频精品一区| 激情视频va一区二区三区| 一级片免费观看大全| 夜夜骑夜夜射夜夜干| 精品酒店卫生间| 人人澡人人妻人| 少妇的逼水好多| 2018国产大陆天天弄谢| 精品一区二区三卡| 亚洲国产欧美在线一区| 午夜影院在线不卡| 丰满迷人的少妇在线观看| 女人久久www免费人成看片| 亚洲欧美清纯卡通| 日韩一本色道免费dvd| 国产一级毛片在线| 日韩一卡2卡3卡4卡2021年| 青春草视频在线免费观看| 久久精品国产鲁丝片午夜精品| 少妇的丰满在线观看| 一区二区日韩欧美中文字幕| 精品一区在线观看国产| 女人久久www免费人成看片| 不卡av一区二区三区| 国产黄色免费在线视频| 国产欧美日韩一区二区三区在线| 久久久久国产一级毛片高清牌| 亚洲精华国产精华液的使用体验| 国精品久久久久久国模美| 肉色欧美久久久久久久蜜桃| 日韩一区二区三区影片| 国产精品成人在线| 热re99久久精品国产66热6| 午夜日本视频在线| 水蜜桃什么品种好| 肉色欧美久久久久久久蜜桃| 在线观看免费高清a一片| 久久久国产欧美日韩av| 日韩精品有码人妻一区| 18禁动态无遮挡网站| 成人黄色视频免费在线看| 精品国产超薄肉色丝袜足j| 男女边摸边吃奶| 欧美日韩精品网址| 交换朋友夫妻互换小说| 亚洲欧美中文字幕日韩二区| 男女边摸边吃奶| 欧美人与性动交α欧美软件| 叶爱在线成人免费视频播放| 一本—道久久a久久精品蜜桃钙片| 欧美人与性动交α欧美软件| 国产有黄有色有爽视频| 精品卡一卡二卡四卡免费| 欧美精品高潮呻吟av久久| 精品一区二区三区四区五区乱码 | 久久久欧美国产精品| 国产精品免费大片| 久久婷婷青草| 大片电影免费在线观看免费| 国产淫语在线视频| 免费久久久久久久精品成人欧美视频| 国产淫语在线视频| 爱豆传媒免费全集在线观看| 少妇精品久久久久久久| 成年女人毛片免费观看观看9 | 在线天堂中文资源库| 啦啦啦在线免费观看视频4| 九草在线视频观看| 亚洲国产精品一区三区| 熟女av电影| 亚洲国产精品一区三区| 夫妻性生交免费视频一级片| 水蜜桃什么品种好| 少妇人妻 视频| 日韩欧美一区视频在线观看| 日日爽夜夜爽网站| 成人毛片a级毛片在线播放| 欧美亚洲日本最大视频资源| 各种免费的搞黄视频| 国产成人一区二区在线| 久久韩国三级中文字幕| 欧美精品一区二区大全| 狠狠精品人妻久久久久久综合| 亚洲精品乱久久久久久| 深夜精品福利| 高清欧美精品videossex| 永久网站在线| 欧美成人精品欧美一级黄| 国产成人精品婷婷| 国产成人精品福利久久| 国产精品99久久99久久久不卡 | 最近中文字幕高清免费大全6| 大话2 男鬼变身卡| 欧美亚洲日本最大视频资源| 一级片'在线观看视频| 精品人妻熟女毛片av久久网站| 国产精品嫩草影院av在线观看| 成人手机av| 免费黄频网站在线观看国产| 色视频在线一区二区三区| 黄频高清免费视频| 婷婷成人精品国产| 日韩av免费高清视频| 伦理电影大哥的女人| 国产黄色视频一区二区在线观看| 精品一区二区三区四区五区乱码 | 一级黄片播放器| 国产成人免费观看mmmm| a级片在线免费高清观看视频| 一级毛片我不卡| 中文欧美无线码| 国产精品久久久av美女十八| 啦啦啦中文免费视频观看日本| 边亲边吃奶的免费视频| 熟妇人妻不卡中文字幕| 成人影院久久| 精品国产一区二区三区久久久樱花| 亚洲三区欧美一区| 免费不卡的大黄色大毛片视频在线观看| 中文字幕人妻丝袜一区二区 | 久久狼人影院| 少妇猛男粗大的猛烈进出视频| 亚洲精品视频女| 精品人妻一区二区三区麻豆| 国产综合精华液| 国产福利在线免费观看视频| 国产爽快片一区二区三区| av一本久久久久| 国产精品av久久久久免费| 黄网站色视频无遮挡免费观看| 久久久久视频综合| www.av在线官网国产| 一二三四在线观看免费中文在| 波多野结衣一区麻豆| 极品少妇高潮喷水抽搐| 国产精品欧美亚洲77777| 精品亚洲成国产av| av国产精品久久久久影院| 日韩av不卡免费在线播放| 91成人精品电影| 91在线精品国自产拍蜜月| 精品人妻偷拍中文字幕| 丁香六月天网| 日韩成人av中文字幕在线观看| 永久免费av网站大全| 国产在线一区二区三区精| 精品第一国产精品| 男女免费视频国产| 丝瓜视频免费看黄片| 国产一区二区 视频在线| 成人毛片60女人毛片免费| 国产在线一区二区三区精| 青青草视频在线视频观看| 永久免费av网站大全| 国产乱人偷精品视频| xxxhd国产人妻xxx| 亚洲精品自拍成人| 少妇精品久久久久久久| 卡戴珊不雅视频在线播放| 在线观看免费日韩欧美大片| 国产又爽黄色视频| 亚洲婷婷狠狠爱综合网| 亚洲色图 男人天堂 中文字幕| 80岁老熟妇乱子伦牲交|