• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Application of Self-Organizing Feature Map Neural Network Based on K- means Clustering in Network Intrusion Detection

    2019-11-07 03:12:44LingTanChongLiJingmingXiaandJunCao
    Computers Materials&Continua 2019年10期

    Ling Tan,Chong Li,Jingming Xia and Jun Cao

    Abstract:Due to the widespread use of the Internet,customer information is vulnerable to computer systems attack,which brings urgent need for the intrusion detection technology.Recently,network intrusion detection has been one of the most important technologies in network security detection.The accuracy of network intrusion detection has reached higher accuracy so far.However,these methods have very low efficiency in network intrusion detection,even the most popular SOM neural network method.In this paper,an efficient and fast network intrusion detection method was proposed.Firstly,the fundamental of the two different methods are introduced respectively.Then,the selforganizing feature map neural network based on K- means clustering(KSOM)algorithms was presented to improve the efficiency of network intrusion detection.Finally,the NSLKDD is used as network intrusion data set to demonstrate that the KSOM method can significantly reduce the number of clustering iteration than SOM method without substantially affecting the clustering results and the accuracy is much higher than K- means method.The Experimental results show that our method can relatively improve the accuracy of network intrusion and significantly reduce the number of clustering iteration.

    Keywords: K- means clustering,self-organizing feature map neural network,network security,intrusion detection,NSL-KDD data set.

    1 Introduction

    With the status improvement of Internet technologies in modern society,network security now has become a widespread concern.In addition,in pace with the constant upgrades of related industries brought by new technologies such as cloud computing,networking,big data and block-chain,a huge number of distributed users and ubiquitous access to the Internet make the enterprise data boundary no longer exist.Meanwhile,the amount of data is increasing,which leads to a higher value and more security challenges.Moreover,considering the openness of the Internet platform with diverse audiences and connection types,the Internet is vulnerable to external attacks and its security is bound to be greatly threatened[Lin(2015)].In view of these severe issues,intrusion detection technology is particularly important.Network intrusion detection is a research hot spot but also a difficulty in the field of network security and its essence is a clustering problem[Wang,Peng and Luo(2012)].

    As we can see,regardless of labeled supervised learning or unlabeled unsupervised learning,there are different network models and algorithms for data classification problems with the constant development of machine learning.However,due to the high dimension of intrusion feature data of these classification problems in the field of network security as well as small difference between different intrusion categories,many intrusion patterns cannot be accurately clustered.Li et al.[Li,Guan,Zan et al.(2003)]Proposed a network intrusion research based on fuzzy clustering generalized regression neural network(GRNN),in which the method was focus on specified types of intrusion action pattern with the combination of fuzzy clustering and GRNN analysis.Despite of its high classification accuracy and reliability,the method cannot reach the requirements in terms of the diversity of network intrusion.Yi et al.[Yi,Li and Wang(2009)]Proposed a network intrusion detection method based on support vector machine,in which the method still has some problems such as high false alarm,excessive demands data for building up detection models,and low detection performance in small sample conditions without enough training data.By comparing network intrusion detection methods with different network models and algorithms,intrusion detection method based on self-organizing feature map(SOM)neural network is better,which has a shorter training time and a higher detection efficiency[Wang(2007);Wu and Yan(1999);Wan,Wang,Feng et al.(2012)],and it is able to make up deficiencies of the above network models and algorithms,however,the accuracy of network intrusion detection still has room for further improvement,and there are also shortcomings in the application of unsupervised learning.Therefore,according to the advantages ofK-means clustering algorithm to local classification[Kohonen(1995);Jari and Kohonen(1996)]based on the above analysis,an intrusion detection algorithm based onK-means clustering selforganizing feature map neural network(KSOM)network is proposed in this paper.This method even has higher classification accuracy for network intrusion detection and supports unsupervised network anomaly detection.

    This paper is organized in four sections.In the second section,an improved net-work intrusion detection method based onK-means clustering self-organizing feature map neural network(KSON)is comprehensively introduced,as well as introduced respectively theoretical background of the related SOM network model andK-Means clustering algorithm.The third section gives the experimental process and result analysis.In this section,we introduce a new network intrusion detection database.In addition,we propose a new feature extraction method.The conclusion of this paper is drawn in the fourth section.

    2 KSOM theoretical backgrounds

    Due to the high dimensions of the network intrusion feature data,data differences among different intrusion classes are relatively small.Local optimal clustering result cannot be achieved if SOM neural network is simply adopted.And the corresponding learning rate will be low,which makes many intrusion modes unable to be accurately clustered.Note thatK-means clustering algorithm has high clustering performance in dealing with big data sets.And its time complexity is almost linear,whose clustering iteration time is significantly reduced with the advantage of local optimal clustering result.According to the above analysis,the feature of local optimum based onK-means clustering is adopted to improve the SOM neural network to cluster the network intrusion data in this paper.

    2.1 SOM neural network

    SOM neural network was first proposed by the Finnish mathematician Teuvo Kohonen in 1982[Teuvo(1982)].It is an unsupervised competitive learning network that simulates the working characteristics of human brain.By automatically searching the intrinsic and essential attributes of the sample,the parameters and structure of the network are changed with self-organization and self-adaption.It mainly implements the function of mapping similar sample points in the high dimensional space to the adjacent neurons in the network output.For a certain problem,a certain number of neurons are set,and each neuron corresponds to a weight vector.The different classes of data are clustered into different neurons for classification purpose through training[Bukka,Sivarama and Raju(2018)]as shown in Fig.1.

    Figure 1:The network topology of SOM neural network

    It is a feed forward neural network consisting of two layers of neurons,and Fig.1 is divided into the input layer and the competition layer,i.e.,the output layer.The explanation between the two layers is as follows:

    Input layer:The outside information is collected to each neuron of the output layer through the weight vector.

    Output layer:The winning neuron and the neighborhood are obtained through weight competition using competition algorithm.

    The neurons between the two layers are connected by bidirectional connections,and there is no hidden layer in this network.The basic thought of this network model is the corresponding competition opportunities of the competitive layer and the neuron competition to the input mode,and there exists a neuron that eventually becomes the winner of the competition,this winning neuron represents the classification of the input pattern,thus achieving the result of the clustering.The keywords of the SOM mainly include winning neuron,neighborhood and weight adjustment function.

    (1)Winning Neurons(WN)

    For input vectorX(x1,x2,…,xn)and competitive layer(output layer)neuronj,the network weight isWij(i=1,2,…,n;j=1,2,…,m).The distance between the input vector and the weight vector is calculated by Euclidean distance formula Eq.(1),and the minimum value of the distance corresponding to the neuron in the SOM is then obtained.

    The main approach is to promote competition among the output neurons of the network in an attempt to be activated.As a result,there is only one output neuron being activated at each moment,while the statuses of the other neurons are inhibited.This activated neuron is called winning neuron(WN).

    (2)Neighborhood

    For each WN,the input vectorXrepresented by its nearest neuron generally refers to the neuron near WN in SOM,i.e.,the neuron neighborhood(N).

    (3)Weight Adjustment Function

    This function describes the adjustment of WN and N that are changing with the number of iterationstrelative to input vectorX,which can be represented by(2),

    ,wheretis the number of iterations,andηis the learning rate.

    The training process of SOM neural network can be divided into four steps:

    Step 1:Initialize network weightWij,and set the maximum number of iterationsT;

    Step 2:Normalize each input vectorXin NSL-KDD network intrusion detection database,and calculate WN and N;

    Step 3:Update WN,N andWijaccording to the weight adjustment function;

    Step 4:Execute the above steps repeatedly until the number of iterations reaches the given maximum number of iterations.

    2.2 K-means clustering

    TheK-means clustering was proposed Johnson and Wichern in 2002,and then it is probably the most popular methods in the world[Capó,Pérez,Jose et al.(2017)].K-means clustering algorithm is also a most commonly used indirect clustering algorithm based on sample similarity.It belongs to an unsupervised learning method,and the cluster is divided by minimizing the clustering error[Yu,Chu,Wang et al.(2017)].In addition,it is a classic dynamic clustering algorithm on the basis of point wise modification iteration,the key point of which adopt the sum of square errors as criterion function.Its basic thought is to randomly select data objects as the initial center from the data set containing data objects first,then calculate the distance between each data object and each center.According to the nearest neighbor rule,all data objects will be partitioned into the clusters represented by the nearest center.Then the mean of the data objects in each cluster is calculated as the center of each cluster.By comparing the new center and the last center,it can be asserted that if the new center does not change,then the algorithm converges successfully and will output the result,otherwise all the data objects will be re-divided according to the new center until the convergence conditions of the algorithm are satisfied.However,the accuracy of theK-means procedure is very dependent upon the choice of the initial seeds.Thus,this paper presents the efficient strategy to improve theK-means performance which hybrid SOM neural network,the next section will explain in detail carefully.

    The concrete implementation steps are as follows:Given data setX={x1,x2,…xN},xn∈R d,(n=1,2,…N),K-means clustering algorithm will divide the data set intoMdisjoint clusters according to the optimal clustering criteria.The clustering algorithm needs to assign again cluster numberk and initial cluster centermi,and calculate the distance between the input vector of each point to the cluster center through different equations,then a new cluster centercan be obtained,later the training process will repeat until the change of the cluster center is smaller than a given valueε,which is the ending-criterion of the algorithm.

    2.3 KSOM algorithm

    KSOM algorithm proposed in this paper usesK-means clustering algorithm to cluster local data classified by SOM,so that the accuracy of the classification of the whole network intrusion data will reach its best level.The core idea of the KSOM network intrusion detection method proposed in this paper is that the winning neural has reached by SOM to merge byK-means clustering algorithm.Thus,the weight vector of SOM neural network is adopted as the input ofK-means clustering algorithm.Then the input data set is normalized to facilitate model training,and finally sent to the network for training and learning.Besides,in the local clustering process,the network weight of the SOM will be constantly adjusted along with the change of the iterations,and will gradually approximate to the input data.Therefore,we will not solve the SOM cluster center in KSOM algorithm,but only calculate its network weight vector.Then the network weight vector is adopted as the input of theK-means clustering algorithm for local clustering,and finally the result of clustering is achieved.

    The training data set logic chart as shown in Fig.2:

    Figure 2:Entire clustering process using the KSOM method

    The training process of KSOM algorithm can be divided into the following seven steps:

    Step 1:Use the network weights extracted from the training results of the SOM neural network as the input of theK-means clustering,and the input is processed with normalization;

    Step 2:Select k data elements m1,m2,…,mkrandomly as initial cluster center;

    Step 3:Calculate the Euclidean distance between each data point and the cluster center;

    Step 4:Cluster the data in accordance with the criterion that minimum clustering can be obtained when it reaches cluster center;

    Step 5:Adjust the cluster center to regulate Eq.(3),whereNjrepresents the number of data contained in classj,andCjrepresents the data sets of classj;

    Step 7:According to the clustering results of Step 6,cluster locally the original data represented by each network weight value and the algorithm ends.

    Through the above steps,the modification of training algorithm of SOM in this research affects neurons which are not close to the winner neuron on feature space,and the winner neuron pulls more neurons into the same cluster.Further,WN in competitive layer is clustered again by the improved KSOM based onK-means algorithm to ensure that the neurons are not being suppressed in the winning neighborhood(N)of the competitive layer of SOM during the competition.For each iteration,the local WN will lead the adjustment degree of the weight vector change greatly,which makes weight vector become smaller and smaller,and the number of iterations decreases.The final learning rate is significantly improved as well as the clustering accuracy.

    After training,the weight vectors of each neuron in the SOM neural network will separately cluster the input vectors to certain neurons,thus the classification result of different data is obtained.As mentioned above,network intrusion detection is essentially a clustering problem.Therefore,SOM neural network has a certain network intrusion detection effect.Although the intrusion detection method based on SOM neural network has the features of high detection rate,short training time and high versatility,there is still further room for improvement of its detection accuracy,and there are also shortcomings in unsupervised learning applications.Especially the choice of the learning rate makes it have to compromise between the learning rate and stability of the final weight vector,and sometimes the local neurons cannot converge precisely,which makes the initial weight vector of the neuron more distant from the input vector,so that it is unable to win in the competition.Therefore,according to the advantages ofK-means clustering algorithm in local clustering implementation as well as its significant learning rate performance,a KSOM intrusion detection algorithm based on SOM is proposed in this paper.

    3 Experiments procedure and result analysis

    3.1 Data description

    In this paper,NSL-KDD network intrusion detection database is adopted as the training and testing data set[Revathi and Malathi(2013)].Compared with KDD-CUP99 network intrusion detection data set,this data set is provided in CSV format,which has eliminated redundant data in KDD-CUP99 data set,and has overcome the shortcoming that the classifier is biased towards repeated records,and the performance of learning methods is vulnerable to be affected.Moreover,NSL-KDD data set has properly selected the proportion of normal and abnormal data and the volume of test set and training set data is more reasonable,therefore,it is very suitable for model algorithm validation and result evaluation analysis.NSL-KDD network intrusion detection database not only can reflect the structure of network traffic and intrusion conditions,but also can be modified,extended and duplicated.The record of NSL-KDD network intrusion detection database is as shown in Tab.1.

    Table 1:NSL-KDD network intrusion detection database record truncation table

    As shown in Tab.1,NSL-KDD network intrusion detection data set contains five types of data,that is,Normal,Probe,R2L,U2R and Dos,and consists of 125973 training data and 22544 test data sets,each record contains 41 features,such as duration,protocol,service,symbol,source byte and target byte.“attack”vs.“normal” labels as shown in Figs.3,and 4 different types of attacks as shown in Fig.4.

    Figure 3:The distribution of attack and normal

    Figure 4:The distribution of 4 different types of attack

    3.2 Data process

    In this paper,the NSL-KDD data sets are used as training sets and testing sets of our paper,the KSOM utilizes numerical values for the process of data training and testing.Further,the data preprocessing approaches are divided into feature extraction and feature transformation models based on working methodology over the big data processing[Kamei and Kawakami(2018)].Thus,in order to facilitate the next model training,first step in experiments is that turn the character values into numerical values and use the attribute ratio data feature extraction method which ascending feature according to its repeated time for data processing.For example,TCP protocol type have a greater number of repeated time,so we convert TCP protocol type into number 1,etc.as shown in Tab.2.

    Meanwhile,use the forward error correction(FEC)coding technology to encode the classification features into discrete features for the symbolic features of the 41 features,so that the one-dimensional vectors can be transformed into 3 dimensional vectors,such as TCP,UDP and ICMP.Similarly,several other features are mapped into different dimensions of vectors,as shown in Tab.3.

    Table 3:Different symbol feature vector dimensions before and after processing

    Then execute the normalization process of the numerical characteristics,the normalization Eq.(4)is given as follows:

    wherevalis the original value,valnewis the normalized data value,VminandVminare the maximum value and the minimum value of this specific data,respectively.When normalization process is done,each feature will be restricted to an interval of[0,1].After the data set is preprocessed and normalized,network training will start.

    3.3 Experimental process

    In this paper,Python 3.6 environment is adopted to training and testing the NSL-KDD data sets.The implementation of the corresponding pseudo-code is shown in Fig.5.

    Figure 5:KSOM model algorithm pseudo code

    Firstly,data import and initialization processes of the NSL-KDD network intrusion detection data set are implemented as well as normalization.Secondly,the clustering algorithm is executed including the judgment of the end condition.Then the output is transferred to the next layer ofK-means clustering model.Similarly,the data normalization is first implemented,then clustering process starts,and finally the judgment of the end condition is implemented.When both of the two end conditions are satisfied,the clustering result is obtained.

    In this paper,we tested respectively SOM neural network,K-means and KSOM method with NSL-KDD set data.First approach is SOM,the learning rateηwas set to 0.01.Second approach isK-means.For over fitting not happen we set the kind numberskequal 8 and the initial point is chosen as far as possible.The proposed KSOM method the learning rateηwas also set to 0.01.But there is a difference that the initial point was chosen as the weight vectors of each neuron in the SOM neural network.

    3.4 Result analysis

    After repeated training and we have tested three different methods,as shown in Fig.6,the average error of SOM neural network clustering along with the increase of iterations.It can be seen from Fig.6,with the increase of iterations,the average error is gradually decreased,yet the update of the weight vector of SOM neural network in the process of training is not global optimal,thus the sum of the average error tends to be increased slightly,followed by the adjustment it begins to decline,hence it will show a saw tooth downward decline.And although the sum of the average error is small,the number of iterations takes 1600 times before it starts to stabilize.Compare the Fig.7 the average error ofK-means clustering along with the increase of iterations,the number of iterations have a substantial reduction which reached 10 times.Unfortunately this method is at the expensive of increased average error.And the proposed of KSOM method as shown in Fig.8,It can be seen that clustering ends after 80 iterations,the error of which stopped at a certain value,and there is also no saw tooth downward attenuation found.It means that the KSOM method is able to solve the problem that SOM neural network cannot achieve a local optimum,and the number of iterations is reduced to a large extent,which improves the clustering efficiency.Meanwhile,the KSOM method also deals with the problem of lower clustering result which happened in theK-Means method.

    Figure 6:The average error decay process of SOM clustering

    Figure 7:The average error decay process of K- Means clustering

    Figure 8:The average error decay process of KSOM clustering

    The next in this paper,accuracy(A C)is adopted as the criterion to evaluate the network intrusion accuracy.The calculation Eq.(5)is given as below:

    whereTPis the number of correct classified attack behavior samples,TNis the number of correct classified normal behavior samples,FPis the number of wrongly classified normal behavior samples,andFNis the number of wrongly classified attack behavior samples.

    In order to test the effect of the proposed KSOM network intrusion detection method based onK-means,NSL-KDD network intrusion detection data set was also trained and tested on other methods,and a comparison was made on the performances before and after the improvement of SOM neural network clustering method,as shown in Tab.3.

    Table 3:Comparison of clustering methods

    From Tab.3 we can see that the accuracy of the improved KSOM based onK-means algorithm is higher than that of the original counterpart under the same data set.In addition,the KSOM model proposed in this paper not only is the number of iterations better than other algorithms,it also has good results in accuracy.Thus,this paper also compares other existing network intrusion detection algorithms on the accuracy of intrusion detection under the same data set.The comparison results are shown in Tab.4.The result shows that the proposed KSOM based onK-means algorithm has a better performance in network intrusion detection.

    Table 4:Comparison of accuracy of intrusion detection in different method

    4 Conclusion

    To deal with the drawback of self-organizing neural network that it has a large number of iterations in network intrusion detection,a KSOM model was proposed in this paper by utilizing the characteristic thatK-means clustering algorithm has faster clustering speed.The experimental results showed that the iterations of the KSOM method was significantly reduced in comparing with self-organizing neural network model and the accuracy was significantly improved with respect to other methods of network intrusion.

    Meanwhile,our method achieved a higher efficiency relatively when implementing network intrusion detection.Thus,the KSOM method has high performance to provide more reliable data and support for the establishment of network security mechanism.

    三级男女做爰猛烈吃奶摸视频| 日日啪夜夜爽| 亚洲国产成人一精品久久久| 久久亚洲国产成人精品v| 夫妻性生交免费视频一级片| 精品国产乱码久久久久久小说| 菩萨蛮人人尽说江南好唐韦庄| 中国国产av一级| 国产精品爽爽va在线观看网站| 久久6这里有精品| 国产 精品1| 又爽又黄无遮挡网站| 免费人成在线观看视频色| 人妻一区二区av| 亚洲国产高清在线一区二区三| 久久热精品热| 亚洲一级一片aⅴ在线观看| 啦啦啦中文免费视频观看日本| 乱系列少妇在线播放| av线在线观看网站| 久久久久国产网址| av网站免费在线观看视频| 少妇被粗大猛烈的视频| 亚洲精品久久午夜乱码| 成年免费大片在线观看| 熟女av电影| 成人亚洲精品一区在线观看 | 亚洲欧美精品专区久久| 国国产精品蜜臀av免费| 老司机影院成人| 国产爽快片一区二区三区| 97超碰精品成人国产| 我的老师免费观看完整版| 亚洲欧洲国产日韩| 91久久精品国产一区二区成人| 韩国av在线不卡| 亚洲三级黄色毛片| 国产免费福利视频在线观看| 亚洲欧洲日产国产| 人妻少妇偷人精品九色| 可以在线观看毛片的网站| 肉色欧美久久久久久久蜜桃 | 内地一区二区视频在线| 成人高潮视频无遮挡免费网站| 日日啪夜夜撸| 亚洲av一区综合| 麻豆成人午夜福利视频| 午夜精品一区二区三区免费看| 亚洲av二区三区四区| 看非洲黑人一级黄片| 超碰av人人做人人爽久久| 日韩一区二区三区影片| 熟女av电影| 久久99蜜桃精品久久| 久久久精品欧美日韩精品| 最近的中文字幕免费完整| 国产淫语在线视频| 亚洲精品自拍成人| 免费大片18禁| 99热这里只有精品一区| 国产男女超爽视频在线观看| 五月玫瑰六月丁香| 国产在视频线精品| 精品视频人人做人人爽| av在线蜜桃| 久久精品久久久久久噜噜老黄| 亚洲成人中文字幕在线播放| 好男人视频免费观看在线| 免费观看无遮挡的男女| 人妻少妇偷人精品九色| 久久精品国产鲁丝片午夜精品| 亚洲,欧美,日韩| 亚洲成人中文字幕在线播放| 国产一区亚洲一区在线观看| 精品久久国产蜜桃| 99九九线精品视频在线观看视频| av免费在线看不卡| 嫩草影院新地址| 99久久精品国产国产毛片| 香蕉精品网在线| 老师上课跳d突然被开到最大视频| 99热全是精品| 晚上一个人看的免费电影| 亚洲精品456在线播放app| 一级黄片播放器| 日韩一区二区三区影片| 美女cb高潮喷水在线观看| 卡戴珊不雅视频在线播放| 午夜日本视频在线| 日本免费在线观看一区| 在线观看av片永久免费下载| 搞女人的毛片| 中文字幕免费在线视频6| 午夜激情福利司机影院| 午夜福利视频精品| 大片免费播放器 马上看| 亚洲精品国产av成人精品| 一级毛片久久久久久久久女| 久久久精品欧美日韩精品| 亚洲av电影在线观看一区二区三区 | 男女边吃奶边做爰视频| 爱豆传媒免费全集在线观看| 亚洲自偷自拍三级| 免费观看无遮挡的男女| 最近手机中文字幕大全| 久久久久国产精品人妻一区二区| 免费黄色在线免费观看| 成年人午夜在线观看视频| 亚洲综合精品二区| 少妇人妻精品综合一区二区| 久久精品国产亚洲av天美| av在线亚洲专区| 欧美三级亚洲精品| 看非洲黑人一级黄片| av国产久精品久网站免费入址| 久久精品夜色国产| 在线观看一区二区三区激情| 99久久精品一区二区三区| 尤物成人国产欧美一区二区三区| 日本一本二区三区精品| 久久鲁丝午夜福利片| 蜜臀久久99精品久久宅男| 777米奇影视久久| 国产精品女同一区二区软件| 国产精品一区www在线观看| 免费看av在线观看网站| 高清在线视频一区二区三区| 欧美精品人与动牲交sv欧美| 国产av不卡久久| 国产黄色视频一区二区在线观看| 欧美xxxx性猛交bbbb| 欧美成人精品欧美一级黄| 网址你懂的国产日韩在线| 成年女人看的毛片在线观看| 亚洲精品乱久久久久久| 国产人妻一区二区三区在| 午夜精品国产一区二区电影 | 国产免费福利视频在线观看| 一级毛片 在线播放| 久久综合国产亚洲精品| 99热全是精品| 亚洲最大成人中文| 久久国产乱子免费精品| 亚洲av电影在线观看一区二区三区 | 日韩在线高清观看一区二区三区| 国产精品国产三级专区第一集| 久久99热这里只有精品18| 嫩草影院新地址| 色婷婷久久久亚洲欧美| 免费黄网站久久成人精品| 午夜视频国产福利| 精品国产一区二区三区久久久樱花 | 日韩中字成人| 美女脱内裤让男人舔精品视频| 国产视频首页在线观看| 97超视频在线观看视频| 国产免费福利视频在线观看| 成人无遮挡网站| 一级a做视频免费观看| 菩萨蛮人人尽说江南好唐韦庄| 日韩大片免费观看网站| 一级毛片 在线播放| 精品午夜福利在线看| 狂野欧美激情性xxxx在线观看| 嫩草影院精品99| 亚洲欧美日韩卡通动漫| 插阴视频在线观看视频| 国产人妻一区二区三区在| 91精品国产九色| 99热这里只有精品一区| 丝袜喷水一区| 亚洲欧美日韩另类电影网站 | 男女下面进入的视频免费午夜| 国产 精品1| 久久久久精品久久久久真实原创| 91午夜精品亚洲一区二区三区| 交换朋友夫妻互换小说| 亚洲成人精品中文字幕电影| 国产探花极品一区二区| 国产男女超爽视频在线观看| 男女啪啪激烈高潮av片| 日韩中字成人| av免费在线看不卡| 啦啦啦中文免费视频观看日本| 毛片女人毛片| 蜜桃亚洲精品一区二区三区| 亚洲久久久久久中文字幕| 亚洲欧美成人精品一区二区| 亚洲国产av新网站| 国产老妇伦熟女老妇高清| 中文在线观看免费www的网站| 日韩av不卡免费在线播放| 日本爱情动作片www.在线观看| 中文字幕免费在线视频6| 亚洲色图av天堂| 国产亚洲91精品色在线| 水蜜桃什么品种好| 久久精品国产亚洲av涩爱| 九九久久精品国产亚洲av麻豆| 国产免费视频播放在线视频| av在线app专区| 男女啪啪激烈高潮av片| 欧美少妇被猛烈插入视频| 女的被弄到高潮叫床怎么办| av.在线天堂| 国产 一区精品| videossex国产| 在线观看人妻少妇| 街头女战士在线观看网站| 91在线精品国自产拍蜜月| 亚洲图色成人| 亚洲精品乱码久久久久久按摩| 99热网站在线观看| 日韩一区二区三区影片| 人人妻人人澡人人爽人人夜夜| 一边亲一边摸免费视频| 精品人妻熟女av久视频| 少妇高潮的动态图| 亚洲国产精品专区欧美| 麻豆乱淫一区二区| 美女脱内裤让男人舔精品视频| 亚洲国产欧美人成| 蜜桃久久精品国产亚洲av| 日本熟妇午夜| a级毛片免费高清观看在线播放| 三级国产精品片| 99精国产麻豆久久婷婷| 大片电影免费在线观看免费| 国产v大片淫在线免费观看| 网址你懂的国产日韩在线| 少妇人妻一区二区三区视频| videossex国产| 午夜精品一区二区三区免费看| 欧美日韩精品成人综合77777| 毛片一级片免费看久久久久| 欧美潮喷喷水| 成人黄色视频免费在线看| 国产亚洲av嫩草精品影院| 亚洲人成网站高清观看| 日韩欧美 国产精品| 欧美zozozo另类| 国产日韩欧美亚洲二区| 街头女战士在线观看网站| 一二三四中文在线观看免费高清| 联通29元200g的流量卡| 2021天堂中文幕一二区在线观| 婷婷色综合www| 午夜免费观看性视频| 国产乱人视频| 大片免费播放器 马上看| 日本一本二区三区精品| eeuss影院久久| 午夜福利视频精品| 在线播放无遮挡| 少妇被粗大猛烈的视频| 三级国产精品片| 久久精品国产亚洲网站| 网址你懂的国产日韩在线| 少妇被粗大猛烈的视频| 亚洲精品成人av观看孕妇| 五月开心婷婷网| 久久久成人免费电影| 天堂俺去俺来也www色官网| 伦精品一区二区三区| 亚洲av男天堂| 亚洲人成网站在线播| 全区人妻精品视频| 狂野欧美激情性xxxx在线观看| 人妻少妇偷人精品九色| 国产精品.久久久| av免费在线看不卡| 亚洲va在线va天堂va国产| 精品少妇黑人巨大在线播放| 免费av毛片视频| 97热精品久久久久久| 国产成人一区二区在线| 日日撸夜夜添| 日韩一区二区三区影片| 99视频精品全部免费 在线| 国产成人福利小说| 中文字幕制服av| 亚洲真实伦在线观看| 少妇猛男粗大的猛烈进出视频 | 亚洲欧美日韩无卡精品| 大片免费播放器 马上看| 观看免费一级毛片| 纵有疾风起免费观看全集完整版| av卡一久久| 精品久久久噜噜| 日韩不卡一区二区三区视频在线| 麻豆精品久久久久久蜜桃| 青春草视频在线免费观看| 一区二区av电影网| 国产精品一区www在线观看| 亚洲在久久综合| 蜜臀久久99精品久久宅男| 国产成人免费观看mmmm| 精品午夜福利在线看| 亚洲精品乱码久久久久久按摩| 国产av码专区亚洲av| 亚洲精品乱久久久久久| 欧美精品人与动牲交sv欧美| 男人舔奶头视频| 亚洲熟女精品中文字幕| 麻豆国产97在线/欧美| 22中文网久久字幕| 亚洲天堂av无毛| 成人黄色视频免费在线看| 亚州av有码| 色视频在线一区二区三区| 2018国产大陆天天弄谢| 一级二级三级毛片免费看| 色播亚洲综合网| 性色avwww在线观看| 国产片特级美女逼逼视频| 午夜激情福利司机影院| 啦啦啦啦在线视频资源| 卡戴珊不雅视频在线播放| 麻豆成人午夜福利视频| 日韩欧美一区视频在线观看 | 一级毛片黄色毛片免费观看视频| 有码 亚洲区| 别揉我奶头 嗯啊视频| 九九在线视频观看精品| 国产一区二区亚洲精品在线观看| 美女高潮的动态| 成人免费观看视频高清| 1000部很黄的大片| 国产精品一区二区三区四区免费观看| 国产精品一区二区三区四区免费观看| 亚洲精品视频女| 成人国产av品久久久| av免费在线看不卡| 色视频www国产| 成人高潮视频无遮挡免费网站| 国产亚洲91精品色在线| 国产精品伦人一区二区| 久久99精品国语久久久| 18禁裸乳无遮挡免费网站照片| 男女无遮挡免费网站观看| 哪个播放器可以免费观看大片| 99久久精品国产国产毛片| 亚洲性久久影院| 日韩大片免费观看网站| 国产视频内射| 亚洲精品,欧美精品| 禁无遮挡网站| www.av在线官网国产| 久久精品久久精品一区二区三区| 少妇的逼水好多| 亚洲熟女精品中文字幕| 嘟嘟电影网在线观看| 在线天堂最新版资源| 亚洲av一区综合| 亚洲av成人精品一区久久| 自拍偷自拍亚洲精品老妇| 好男人视频免费观看在线| 男人添女人高潮全过程视频| 一区二区av电影网| 男人狂女人下面高潮的视频| 久久精品国产自在天天线| 一本一本综合久久| 亚洲色图av天堂| 成人特级av手机在线观看| 国产爽快片一区二区三区| 成年女人看的毛片在线观看| 亚洲国产色片| www.av在线官网国产| 日本猛色少妇xxxxx猛交久久| 午夜精品国产一区二区电影 | 国产高清国产精品国产三级 | 欧美97在线视频| 国产 一区精品| 久久久久网色| 成人亚洲欧美一区二区av| 久久影院123| 色视频www国产| 一个人看的www免费观看视频| 啦啦啦在线观看免费高清www| 亚洲av在线观看美女高潮| 熟女电影av网| 嫩草影院入口| 久久精品国产亚洲av涩爱| 中国三级夫妇交换| 欧美 日韩 精品 国产| 99视频精品全部免费 在线| xxx大片免费视频| 在线亚洲精品国产二区图片欧美 | 免费av不卡在线播放| 久久ye,这里只有精品| 九九爱精品视频在线观看| av在线观看视频网站免费| 色婷婷久久久亚洲欧美| 欧美最新免费一区二区三区| 少妇裸体淫交视频免费看高清| 97在线人人人人妻| 欧美日韩精品成人综合77777| 亚洲精品影视一区二区三区av| 熟妇人妻不卡中文字幕| 免费av毛片视频| 美女高潮的动态| 熟女电影av网| 久久久成人免费电影| 欧美国产精品一级二级三级 | 精品人妻熟女av久视频| 午夜精品一区二区三区免费看| 成人高潮视频无遮挡免费网站| 97人妻精品一区二区三区麻豆| a级毛片免费高清观看在线播放| 亚洲人与动物交配视频| 国产精品麻豆人妻色哟哟久久| 国产精品一区二区在线观看99| av免费在线看不卡| 国产中年淑女户外野战色| 亚洲欧美一区二区三区国产| 亚洲成人一二三区av| 可以在线观看毛片的网站| 欧美区成人在线视频| 爱豆传媒免费全集在线观看| 亚洲欧美日韩无卡精品| 国产片特级美女逼逼视频| 久久精品国产亚洲av涩爱| 亚洲欧洲国产日韩| 欧美性猛交╳xxx乱大交人| 日韩欧美精品免费久久| 韩国高清视频一区二区三区| 国产色婷婷99| 国产黄色视频一区二区在线观看| 九九爱精品视频在线观看| 久久久精品94久久精品| 97在线视频观看| 大片免费播放器 马上看| 久久久久精品性色| 亚洲欧美日韩东京热| 大陆偷拍与自拍| 色吧在线观看| 禁无遮挡网站| 欧美97在线视频| 亚洲欧洲国产日韩| 香蕉精品网在线| 白带黄色成豆腐渣| 国产国拍精品亚洲av在线观看| 国产精品伦人一区二区| 高清午夜精品一区二区三区| 亚洲精品国产色婷婷电影| 禁无遮挡网站| av在线app专区| 黄色一级大片看看| 国产精品国产三级国产av玫瑰| 丝袜脚勾引网站| 真实男女啪啪啪动态图| av播播在线观看一区| 啦啦啦中文免费视频观看日本| 韩国高清视频一区二区三区| 国产毛片在线视频| 午夜福利在线观看免费完整高清在| 99热全是精品| 亚洲天堂国产精品一区在线| 免费看a级黄色片| 少妇裸体淫交视频免费看高清| 久久精品国产鲁丝片午夜精品| 91久久精品国产一区二区三区| 欧美丝袜亚洲另类| 色5月婷婷丁香| 国产一区二区三区av在线| 97热精品久久久久久| 久久这里有精品视频免费| 国产黄色免费在线视频| 国产av国产精品国产| 成人欧美大片| freevideosex欧美| 久久久精品欧美日韩精品| 又爽又黄无遮挡网站| 国产成人freesex在线| 免费av毛片视频| 色婷婷久久久亚洲欧美| 麻豆精品久久久久久蜜桃| 大香蕉久久网| 男女下面进入的视频免费午夜| 91在线精品国自产拍蜜月| 欧美成人一区二区免费高清观看| 免费观看的影片在线观看| 91狼人影院| 26uuu在线亚洲综合色| 久久影院123| 久久精品久久久久久久性| 国产又色又爽无遮挡免| 国产精品一及| 国模一区二区三区四区视频| 日日摸夜夜添夜夜添av毛片| 免费不卡的大黄色大毛片视频在线观看| 日本一二三区视频观看| 国产爽快片一区二区三区| 高清欧美精品videossex| 在现免费观看毛片| av在线老鸭窝| 日韩欧美 国产精品| 色视频在线一区二区三区| 美女被艹到高潮喷水动态| 国产成人精品婷婷| 九九爱精品视频在线观看| av国产免费在线观看| 男人狂女人下面高潮的视频| 91aial.com中文字幕在线观看| 在线亚洲精品国产二区图片欧美 | 真实男女啪啪啪动态图| 亚洲精品乱久久久久久| 99热这里只有是精品50| 日韩三级伦理在线观看| 亚洲在线观看片| 纵有疾风起免费观看全集完整版| 国产亚洲精品久久久com| 人人妻人人看人人澡| 久久久精品94久久精品| a级一级毛片免费在线观看| 精品久久久久久久久av| 欧美一级a爱片免费观看看| 中国三级夫妇交换| 91精品国产九色| av又黄又爽大尺度在线免费看| 内地一区二区视频在线| 草草在线视频免费看| 国产爽快片一区二区三区| 亚洲av成人精品一二三区| 美女高潮的动态| 永久免费av网站大全| 色婷婷久久久亚洲欧美| 午夜福利高清视频| 免费黄色在线免费观看| 欧美亚洲 丝袜 人妻 在线| 午夜激情福利司机影院| 国产极品天堂在线| 插阴视频在线观看视频| 自拍偷自拍亚洲精品老妇| 91精品国产九色| 深夜a级毛片| 国产精品久久久久久久久免| 精品人妻视频免费看| 99热全是精品| 丰满人妻一区二区三区视频av| 又黄又爽又刺激的免费视频.| 色吧在线观看| av在线老鸭窝| 国产男人的电影天堂91| av在线老鸭窝| 国产黄片视频在线免费观看| 伊人久久精品亚洲午夜| 免费观看性生交大片5| 欧美变态另类bdsm刘玥| 亚洲国产欧美人成| 新久久久久国产一级毛片| av在线天堂中文字幕| 特级一级黄色大片| 久久97久久精品| 九草在线视频观看| 美女内射精品一级片tv| 亚洲精品视频女| 97在线人人人人妻| 一级毛片久久久久久久久女| 大话2 男鬼变身卡| 三级国产精品片| 美女国产视频在线观看| 亚洲性久久影院| 日韩亚洲欧美综合| 久久精品久久久久久噜噜老黄| a级一级毛片免费在线观看| 好男人视频免费观看在线| 日产精品乱码卡一卡2卡三| 免费黄频网站在线观看国产| 亚洲精品久久午夜乱码| 国内少妇人妻偷人精品xxx网站| 日本三级黄在线观看| 我要看日韩黄色一级片| 高清午夜精品一区二区三区| 蜜桃亚洲精品一区二区三区| 日本猛色少妇xxxxx猛交久久| 一个人看的www免费观看视频| 下体分泌物呈黄色| 少妇人妻久久综合中文| 欧美人与善性xxx| 麻豆成人午夜福利视频| 久久99热这里只有精品18| 日日摸夜夜添夜夜添av毛片| 国产精品熟女久久久久浪| 久久精品久久久久久噜噜老黄| 国产精品国产av在线观看| 亚洲国产最新在线播放| 欧美日韩视频精品一区| 久热这里只有精品99| 一级毛片我不卡| 91aial.com中文字幕在线观看| 18禁动态无遮挡网站| 91久久精品国产一区二区三区| 欧美激情国产日韩精品一区| 亚洲国产精品成人综合色| 身体一侧抽搐| 干丝袜人妻中文字幕| 久久99热这里只有精品18| 亚洲,欧美,日韩| 毛片一级片免费看久久久久| av.在线天堂| 女人十人毛片免费观看3o分钟| 亚洲精品日韩在线中文字幕| 亚洲精品中文字幕在线视频 | 一本一本综合久久| 26uuu在线亚洲综合色| 欧美一级a爱片免费观看看| 中国国产av一级| 男人添女人高潮全过程视频| 美女xxoo啪啪120秒动态图| 亚洲av成人精品一区久久| 久久ye,这里只有精品| 99久久九九国产精品国产免费| 久久97久久精品| 成年女人看的毛片在线观看|