• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    YATA:Yet Another Proposal for Traffic Analysis and Anomaly Detection

    2019-11-25 10:22:42YuWangYanCaoLianchengZhangHongtaoZhangRoxanaOhriniucGuodongWangandRuosiCheng
    Computers Materials&Continua 2019年9期

    YuWang,YanCaoLianchengZhangHongtaoZhang,RoxanaOhriniuc,GuodongWangandRuosiCheng

    Abstract:Network traffic anomaly detection has gained considerable attention over the years in many areas of great importance.Traditional methods used for detecting anomalies produce quantitative results derived from multi-source information.This makes it difficult for administrators to comprehend and deal with the underlying situations.This study proposes another method to yet determine traffic anomaly (YATA),based on the cloud model.YATA adopts forward and backward cloud transformation algorithms to fuse the quantitative value of acquisitions into the qualitative concept of anomaly degree.This method achieves rapid and direct perspective of network traffic.Experimental results with standard dataset indicate that using the proposed method to detect attacking traffic could meet preferable and expected requirements.

    Keywords:Anomaly detection,cloud model,forward cloud transformation,backward cloud transformation,quantitative data to qualitative concept.

    1 Introduction

    Network traffic analysis is one of the most interesting topics in the research of basic theory of computer network.With the rapid development of Internet services and improvement of network performance,network threats are becoming more and more significant.Many kinds of anomaly events are mixed with normal traffic,especially viruses/Trojans,Botnet,XSS/CSRF,DoS and other attacks emerge in an endlessly stream.In face of the traditional and newborn threats,traffic analysis and anomaly detection technology is facing severe challenges,notably on how to effectively identify and perceive potential unknown attacks [Cheang,Wang,Cai et al.(2018);Gokcesu and Kozat (2017);Zhao,Luo,Gan et al.(2018);Zu,Luo,Liu et al.(2018)].

    Anomaly detection has two main components:the model,and the algorithm.Existing detection methods mainly include signal processing and machine learning based technologies.The former includes statistical analysis [Hu,Xiao,Fu et al.(2006)],frequency spectrum analysis [Chen,Wang,Zhao et al.(2011);Ningrinla,Amar and Kumar (2018)],wavelet analysis [Sun and Tian (2014)] and principal component analysis[Xie,Li,Wang et al.(2018)].The latter’s representative methods cover data mining[Sukhanov,Kovalev and Styskala (2016)],neural network [Naseer,Saleem,Khalid et al.(2018)] and immunology theory [Jiang,Ling,Chan et al.(2012)].With the increase number of network applications,the overall complexity of network traffic characteristics has sharply raised.The key problem is with the subjective judgment differences between collected data and the analyzer perceptions.

    Traditionally,the major problem in network traffic analysis [Li,Sun,Hu et al.(2018);Zhou,Wang,Ren et al.(2018)] is the subjectivity of the analyzer when collecting and analyzing data,many and multidisciplinary experts are needed to analyze traffic anomalies and characteristics,and the final network analysis result is created by a team of experts not just individuals.The experts would like to utilize the threat ratings or levels[Treurniet (2011);Yao,Shu,Cheng et al.(2017)] to characterize the degree of potential damage that anomalous network traffic can bring.It is rated according to a fix number ordinal qualitative scale,like 5,or 10.The maximum number is considered to represent the most frequent and severe threat.

    Existing models have been considered as suffering from a lot of drawbacks.First,the threat ratings or levels are subjective and linguistic in nature,which could not be determined precisely using a scale from 1 to 5,or 1 to 10.Second,in view of different backgrounds and understanding levels to the identified abnormal traffic,experts usually have different perceptions and interpretations,hence,the same linguistic grade level always has different meanings from different experts.

    The Cloud Model [Li,Liu and Gan (2009);Wang,Xu and Li (2014)] proposed by Li Deyi has been proved to achieve bidirectional cognitive transformation between the qualitative concept and quantitative data.Because of its advantages,the Cloud Model has been widely used in unsupervised communities detection [Gao,Jiang,Zhang et al.(2013)],failure mode and effect analysis (FMEA) [Liu,Li,Song et al.(2017)],monocular visual odometry (MVO) [Yang,Jiang,Wang et al.(2017)] and other fields[Liu,Xue,Li et al.(2017);Peng and Wang (2018);Yang,Yan,Peng et al.(2014)].In this paper,we propose an anomaly traffic analysis method based on the cloud model.The cloud model theory is introduced to depict multiple assessment information given by experts who utilize qualitative concepts to describe the key characteristics of network traffic,so as to establish the gauge cloud.Based on that,we generate abnormal membership cloud and abnormal matrix for the traffic to be determined,in order to analyze and judge the underlying situation of network traffic.

    2 Cloud model

    The Cloud model proposed is based on probability theory and fuzzy mathematics,which can not only reflect the uncertainty of the concept of natural language,but also can depict the event relationship between the randomness and fuzziness.This model is implemented to make transformation between the qualitative concept and quantitative instantiation.

    The definition of the cloud is as follows.

    2.1 Definitions

    Suppose U is a quantitative domain described by numerical values,and C is a qualitative concept with U.Let x be a random instantiation of C,as well as x ∈ U.If μ(x)represents the certainty degree for C,i.e.,μ(x)∈ [0,1],and satisfy:

    Define the distribution of x on U to be a cloud,denoted as C(X),in which each x is called a cloud drop.

    A cloud drop is one of the instantiation of qualitative concept C in the form of numerical value,and there is no orderly relationship between them.However,the overall status of cloud drops will reflect the characteristics of the e qualitative concept.The certainty degree of cloud drop indicates the extent of characterizing this qualitative concept,the greater occurrence probability of cloud drop,the higher certainty degree.

    The cloud model describes the overall qualitative concept by three numerical characteristics including:

    ·Ex (Expectation).It is the expectation of the cloud drops,which is considered to be the most representative and typical sample of concept C.

    ·En (Entropy).It is used to represent the uncertainty measurement of concept C.On the one hand,En indicates the dispersing extent of cloud drops which measures the degree of randomness;on the other hand,En reflects the range of the universe that concept C can accept,which measures the degree of fuzziness.

    ·He (Hyper Entropy).It is the entropy of En,namely the uncertain degree of En,reflecting the degree of condensation of cloud drops,which is expressed as the dispersion and thickness of cloud.

    Figure1:The normal cloud model

    As shown in Fig.1,the normal cloud is a cloud model that has been frequently used by researchers,in which x is one of the cloud drops which randomly realizes the concept C,and μ is the certaint y degree of x on concept C.The thickness of the e normal cloud is uneven demonstrating the randomness and fuzziness.More than this,each cloud model probably owns different degree of distribution and degree of discreteness,reflecting the randomness and fuzziness features of specific cloud model.This indicates the following:the greater the value of En,the wider the distribution range;the greater the value of He,the larger the degree of discrete.

    2.2 Cloud generator algorithms

    Algorithm 1:Forward Cloud Transformation (FCT).Transform the qualitative concepts into quantitative representations,that is,to use Ex,En and He to generate cloud drops which satisfy the current network situation.

    Figure2:Forward cloud generator

    Input:Ex,En,He

    Output:Cloud drops

    Steps:

    1.TakeEnas the expectation,and takeHeas the standard deviation,to produce normal random value |En'|.

    2.TakeExas the expectation,and take |En'| as the standard deviation,to produce normal random value x,which is denoted as a cloud drop within this domain.

    3.Based onExand |En'|,μ could be calculated as follows:

    Here,μis defined as the degree of certainty thatxbelongs to the qualitative concept of C.4.Iterations from Step 1 to Step 3 are preformed to generate n cloud drops,and every drop could be represented asdropi=(xi,μi).

    Algorithm 2:Backward Cloud Transformation (BCT).Conduct uncertainty transformation from the quantitative numeric value into qualitative concepts.

    Figure3:Backward cloud generator

    Input:Set of cloud drops with total amount ofN,namely D={drop1…dropn}.

    Output:Ex,EnandHe,which corresponds to the qualitative concepts represented by the cloud.

    Steps:

    1.Calculate the mean value of the input value based onX:

    Also,the first order absolute central moment is:

    Besides,the sample variance is:

    2.ThereforeEx,EnandHecould be obtained:

    By utilizing BCT and FCT,the cloud model could implement reciprocal conversion between qualitative concept and quantitative value based on the interaction between probability theory and fuzzy mathematics.

    3 Traffic analysis and anomaly detection model based on cloud model

    3.1 Analytical characteristicsoftraffic

    Considering the potential differences among the characteristics of network traffic,the anomalies and normal traffic could be identified accordingly.Under usual circumstances,the anomaly traffic characteristics caused by non-human factors are more significant and easy to detect.Oppositely,the abnormal traffic generated by malicious attackers is obvious in termsoftraffic flow rate,average packet length,and the distribution of different protocol packets.

    The key characteristics,which mainly reflect the security degree of network traffic,could generally be divided into three levels including strong,weak and neutral according to the given network environment.In the light of above analysis,the characteristicsoftraffic volume,the average packet length of different applications,the average packet arrival interval,the number of connection requests,the number of port pairs in a single flow,are regarded as especially important.According to the division of anomaly levels,7 characteristics are selected to depict the security state of target traffic qualitatively.

    Table1:Characteristicsoftraffic

    In this manner,the anomaly state of network traffic could be described and depicted combined with one or multiple characteristics,so as to indicate the traffic qualitatively.For instance,a qualitative description of the characteristics of traffic include:per unit time (assuming 10 minutes,mainly for the TCP) accounted for the rate of change of 5%,the average connection duration is 15 minutes,the failed connection accounted is 2%,the error segment accounted for 0.03%,the same service (assuming WWWis the main access) accounted for 55%,the flow rate is 0.8M Pkt/Min,and the average packet length is 800 Byte.

    3.2 Membership degree of traffic characteristics

    After characteristic of traffic have been qualitatively described,each characteristic will have three anomaly levels:Low,Medium,and High.These levels are evaluated based on expert evaluations of the e ranges of values of each characteristic.That is,there are three gauge clouds corresponding to each characteristic,and the gauge clouds are taken as the criterion of anomaly determination.In face of given target traffic,the characteristic will be compared with the gauge cloud,and the degree of anomaly membership(High/M iddle/Low) of different characteristics could be obtained.

    Anomaly membership cloud for each characteristic is established to describe the distribution of membership values of qualitative concepts,which should also be a normal cloud.Each degree of membership is a random value that follows the normal distribution in order to reflect the uncertainty of the qualitative concept and quantitative values.Suppose the number of experts is n,the expert set is P={ p1,p2,…,pn},expert pievaluates the anomaly membership of one characteristic to be three levels,as hi,mi,lirespectively,and satisfying the condition that 0≤hi,mi,li≤1.Based on this,three membership evaluation results could be processed using the backward cloud generator,to obtain digital features of Ex,En,and He,which reflect the anomaly level(High/Medium/Low) of the qualitative concept.

    Table2:Scope of characteristics value

    It is a great number of cloud drops that could effectively reflect the relationship between the qualitative concept and quantitative numerical value,therefore the digital characteristics obtained from many experts are merged and taken to produce the cloud diagram based on forward cloud generator.The cloud diagram corresponds to the three anomaly levels of qualitative concept,namely High,M iddle and Low.Considering the fair randomness of different opinions from experts,the fused characteristics are good at depicting the fuzziness degree of qualitative concept and the randomness degree of cloud drops.

    3.3 Anomaly detection and determ ination

    The fundamental process of anomaly detection and determination algorithm based on the cloud model is shown in Fig.4.

    Stage 1.Compare a specific characteristic of the traffic with corresponding gauge cloud in order to obtain expectations of the is specific characteristic including three levels as High,M iddle and Low,taken as the membership degrees (md) to depict the anomaly situation.

    Stage 2.Calculate all the membership degrees of characteristics within target traffic based on Stage 1 respectively.Suppose the number of traffic characteristics is n,and every characteristic corresponds to three values of membership degrees,thus the Matrix(n×3) could be composed and represented as formula (9).

    Stage 3.According to the differences among anomaly levels of High,Medium,Low,different weights are given to mdH,mdM,mdL,and the proportion is α:β:γ.Besides,in view of the difference in mapping and depicting the anomalies,each characteristic is given a different weight,Wmd1:Wmd2:…:Wmdn=κ1:κ2:…:κn,and the WM(Weighted-Matrix,n×3) could be denoted as formula (10).

    Figure4:Flowchart of anomaly detection and determination algorithm

    Stage 4.BCT is utilized to pursue digital features of Ex,En,and He corresponding to the anomaly degree memberships of High/Medium/Low respectively based on WM.Later,the Evaluation Cloud will be created from above Ex,En,and He with FCT algorithm,which covers three sub-clouds referring to the anomaly degrees of High/Medium/Low levels,ensuring that full information originated from traffic characteristics will be fused under these circumstances.

    Stage 5.Considering expectation value (Ex) is the most representative indicator of “anomaly”,the determination process abides by the following criterion:(1) when detecting a specific traffic,the expectation values of High,Medium and Low will be compared to select the maximum referring to the maximal membership degree of the qualitative concept.When multiple samplesoftraffic need to be compared,the expectation of High cloud from samples could be directly selected and compared,the larger value means the higher degree of anomaly.When two expectations are the same incidentally,the smaller entropy value (En) of qualitative concept will be decided.In addition,if both the value of expectation pairs and the entropy pairs are the same,the smaller hyper entropy (He) has to be chosen to find the better qualitative concept.

    4 Simulation

    Experiments to verify the YATA method are carried out by using a standard dataset through two phases:the preparation part is to generate the gauge clouds for follow-up work,and the Implementation part is to demonstrate the proposed method in two logically progressive sections.

    4.1 Preparation

    In order to verify the effectiveness of proposed method,the simulation process takes advantage of the kddcup_data_10_percent.zip in the benchmark data sets of KDD Cup 1999.Because there are totally 494021 itemsoftraffic records in the kddcup.data_10_percent.txt after decompression,to simplify the simulation,we had selected 6648 items to run experiments,involving normal traffic and three sorts of attacks,including denial of service attack (DoS),scan and sniffing (Probe),unauthorized access from a remote machine (R2L),as the anomaly detection dataset for simulation.Among the 6648 records,almost 2/3 of them are chosen for the generation of gauge cloud,denoted as DB-Gauge,and the remainder 1/3 are kept for the YATA verification,named as DB-VEF.Besides,both of DB-Gauge data set and DB-VEF data set include normal,DoS,Probe and R2L traffic.

    It is significant to generate the gauge clouds for all the characteristicsoftraffic,which is prepared for the next stage,namely,anomaly detection and determination.On the basis of classifications towards attack and normal traffic within DB-Gauge,all the numeric selections of 7 traffic characteristics would be estimated by analogue experts,770 for each.In this way,the membership degrees of High/Medium/Low levels of every characteristic could have been obtained.

    Figure5:Process of gauge cloud generation for one characteristic

    Taking the characteristic flow rate of traffic for instance,three sets including{H1,H2,…,H770},{M 1,M 2,…,M 770} and {L1,L2,…,L770} will be acquired by the assessments of analogue experts,which produces numerical values including {ExH,EnH,HeH},{ExM,EnM,HeM},{ExL,EnL,HeL} based on BCT algorithm.Subsequently,FCT is utilized to generate the gauge clouds corresponding to different anomaly levels as High,Medium,and Low for the characteristic of flow rate of traffic.Therefore,the gauge clouds of other six characteristics would be built the same way.

    4.2 Implementation

    Section 1:Single Traffic Analysis of DoS.

    In this section,certain traffic within the DoS category from DB-VEF is selected to demonstrate the YATA method to check it could determine the degree of anomaly for this traffic.

    First,gain the Matrix.The sample of DoS traffic extracted from DB-VEF is denoted as F1 and has the following characteristics:average rate is 9.6M Pkt/Min,average duration of single connection lasts for 70.4 ms,failure connections ratio per unit time is up to 25.1%,and average length of packet is 51 Bytes,etc.Next,each of the 7 characteristics is compared with the corresponding gauge cloud respectively,to obtain the decision matrix following the process which is illustrated in Fig.4.Because there are 7 characteristics and 3 levels (H,M,L),the 7×3 Matrix-F1 is calculated as follows.

    Secondly,gain the WD-F1 based on Matrix-F1.According to the importance and influence of every characteristic as well as the different levels of anomaly,we have the weight specifications as shown in Tab.3 and Tab.4.

    Table3:Weight Specifications for Levels

    Table4:Weight Specifications for Characteristics

    Therefore,the WD-F1 shown below would be obtained through formula (10):

    Thirdly,BCT algorithm would be used to calculate Expectation,Entropy and Hyper Entropy according to the different levels of High/Medium/Low based on WD-F1.

    ·ExH= 0.708,EnH= 0.113,HeH= 0.035

    ·ExM= 0.336,EnM= 0.056,HeM= 0.026

    ·ExL= 0.118,EnL= 0.026,HeL= 0.009

    Finally,FCT algorithm would be adopted to generate evaluation clouds combined with the above parameters.

    Figure6:Evaluation clouds of F1 including three anomaly levels

    As depicted in Fig.6,three peaks correspond to the evaluation clouds of High/Medium/Low levels.In each area every dot represents a cloud drop,namely dropi=(xi,μi) where μiindicates the degree of certainty that xibelongs to the qualitative concept of anomaly traffic.

    It can be seen from the diagram that the majority of the cloud evaluations have a level of High which represents the highest degree of membership.Therefore,the evaluation cloud of level High should be focused on to reflect the current situation of traffic,compared with Medium and Low levels.

    The sample traffic F1 whose average rate is up to 9.6M Pkt/Min,significantly indicating a DoS attack.Moreover,considering that the failure connections ratio is 25.1% and the single connection average duration lasts for 70.4 ms both fall into the high gauge level estimated by experts.Therefore,the evaluation cloud of High level preferably reflects the anomaly degree of the F1.

    Section 2:Single Normal Traffic Analysis.

    At this time,certain normal traffic from DB-VEF would be selected to demonstrate the ability of YATA method to distinguish whether the traffic is suspected anomalous or not.The normal traffic marked as F2 covers the following characteristics:average rate is 3.4K Pkt/Min,average duration of single connection lasts for 175.2 s,failure connections ratio per unit time is less than 0.3%,and average length of packet is 684 Bytes,etc.The decision matrix of F2,together with WD-F2 could be obtained as follows.

    WD-F2 and evaluation clouds would be calculated based on BCT and FCT algorithms consequently.Therefore,the Ex,En and He values are:

    ·ExH= 0.082,EnH= 0.022,HeH= 0.008

    ·ExM= 0.196,EnM= 0.061,HeM= 0.152

    ·ExL= 0.244,EnL= 0.031,HeL= 0.136

    Figure7:Evaluation clouds of F2 including three anomaly levels

    In Fig.7,there exist three areas respectively indicating the evaluation clouds of High/Medium/Low levels for traffic F2.It is quite different from Fig.6,because here the Low evaluation cloud and Medium evaluation cloud are partly overlapping.At the same time,they are both cluster to the right of the High evaluation cloud,which means that the F2 sample traffic is very probably normal.

    Section 3:Multiple Traffic Analysis.

    In order to implement comparisons between different typesoftraffic,a sample of Probe traffic is extracted from DB-VEF denoted as F3,which has the following characteristics:average rate is 0.8K Pkt/Min,average duration of single connection lasts for 89.7 ms,failure connections ratio per unit time is up to 4.1%,and average length of packet is 135 Bytes,etc.The decision matrix of F3,together with WD-F3 could be obtained as follows:

    Then,WD-F3 and evaluation clouds would be calculated based on BCT and FCT algorithms consequently.

    ·ExH= 0.708,EnH= 0.113,HeH= 0.035

    ·ExM= 0.336,EnM= 0.056,HeM= 0.026

    ·ExL= 0.118,EnL= 0.026,HeL= 0.009

    Similarly in Fig.8,there are three areas describing the evaluation clouds of High/Medium/Low levels for sample F3.Still the evaluation cloud of High level is moved prominently to the right which means it is the most persuasive indicator of underlying situation.Because evaluation cloud of High level locates on the right side of the middle,showing that it is in a slightly invaded situation,and generally in conformity with the situation of Probe attack.

    Figure8:Evaluation clouds of F3 including three anomaly levels

    Figure9:Comparison of F1 and F3

    In aspect of the High level cloud from Fig.9,it is obvious that F1 is grouped to the right of F3,which means F1 behaves more anomalous than F3.Since F1 comes from DoS traffic part of DB-VEF,while F3 comes from the Probe,the result illustrated in Fig.9 shows good consistency with the varied sortsoftraffic,and verifies the effectiveness of YATA,which could reveal the extent of anomaly from a qualitative point of viewin a convenient and intuitive way.

    5 Conclusion

    To protect the network from being exploited by malicious traffic,we propose an anomaly traffic detection and determination method named YATA.In virtue of the Cloud Model,this method is capable of transforming quantitative data to the qualitative concept rapidly and directly,which improves the expressivenessoftraffic situation for the security administrators to take further measures.We deploy and demonstrate the feasibility of this method based on KDD Cup 1999.

    Acknowledgement:We would like to present our thanks to any anonymous reviewers for their helpful suggestions.This work is supported in part by National Natural Science Foundation of China (No.61802115),Henan province science and technology projects(Nos.182102310925,192102310445),Key Scientific Research projects of Henan Province Education Department (Nos.18A520004,19A520008).

    午夜福利在线在线| av在线天堂中文字幕| 国产成人精品无人区| 欧美日韩福利视频一区二区| 亚洲 欧美一区二区三区| av免费在线观看网站| 国产成人系列免费观看| 一个人免费在线观看的高清视频| 女警被强在线播放| 日日摸夜夜添夜夜添小说| 亚洲精品一卡2卡三卡4卡5卡| 天天躁狠狠躁夜夜躁狠狠躁| 欧美一区二区国产精品久久精品 | 成熟少妇高潮喷水视频| 岛国在线观看网站| 在线观看一区二区三区| 一级片免费观看大全| 国产成人欧美在线观看| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲国产看品久久| 免费人成视频x8x8入口观看| 色综合欧美亚洲国产小说| 久久精品国产综合久久久| 亚洲精品在线美女| 亚洲精品美女久久av网站| 桃红色精品国产亚洲av| 日本三级黄在线观看| 不卡av一区二区三区| 国产男靠女视频免费网站| 琪琪午夜伦伦电影理论片6080| 给我免费播放毛片高清在线观看| 欧美一级a爱片免费观看看 | 欧美3d第一页| 中文资源天堂在线| 少妇人妻一区二区三区视频| 两个人视频免费观看高清| 97超级碰碰碰精品色视频在线观看| 亚洲精品av麻豆狂野| 日本黄大片高清| 久久中文看片网| 精品国产乱子伦一区二区三区| 欧美精品亚洲一区二区| 黄色女人牲交| 亚洲五月婷婷丁香| 看免费av毛片| 亚洲精品在线观看二区| 一个人免费在线观看电影 | 国产精品野战在线观看| 亚洲av成人不卡在线观看播放网| 19禁男女啪啪无遮挡网站| 国产熟女午夜一区二区三区| 脱女人内裤的视频| 午夜视频精品福利| or卡值多少钱| 亚洲免费av在线视频| 欧美最黄视频在线播放免费| 又粗又爽又猛毛片免费看| 一二三四社区在线视频社区8| 嫁个100分男人电影在线观看| 在线播放国产精品三级| 三级国产精品欧美在线观看 | 国产欧美日韩一区二区精品| 一区二区三区国产精品乱码| 无遮挡黄片免费观看| 久久人妻福利社区极品人妻图片| 最新在线观看一区二区三区| 无限看片的www在线观看| 在线视频色国产色| 国产高清有码在线观看视频 | 午夜福利18| 亚洲精品粉嫩美女一区| xxxwww97欧美| 婷婷亚洲欧美| 亚洲成人国产一区在线观看| 后天国语完整版免费观看| 淫妇啪啪啪对白视频| 精品国产超薄肉色丝袜足j| 美女黄网站色视频| 欧美日韩一级在线毛片| 国产成人精品久久二区二区免费| 国产野战对白在线观看| 69av精品久久久久久| 欧美日韩亚洲国产一区二区在线观看| 夜夜看夜夜爽夜夜摸| 免费在线观看完整版高清| 青草久久国产| 精品高清国产在线一区| 国产精品久久久av美女十八| 久久精品91无色码中文字幕| 亚洲欧美日韩高清在线视频| 此物有八面人人有两片| 亚洲七黄色美女视频| 亚洲欧美精品综合久久99| 欧美精品啪啪一区二区三区| 1024香蕉在线观看| 国产av又大| 欧美最黄视频在线播放免费| 精品久久久久久,| 欧美成人性av电影在线观看| 欧美另类亚洲清纯唯美| 搡老熟女国产l中国老女人| 精品国产亚洲在线| 亚洲av电影在线进入| 国产视频内射| 婷婷精品国产亚洲av| 他把我摸到了高潮在线观看| 一进一出抽搐动态| 国产熟女xx| 亚洲国产精品sss在线观看| 国产亚洲精品久久久久5区| 欧美黄色淫秽网站| 亚洲熟女毛片儿| 亚洲男人天堂网一区| 麻豆国产av国片精品| 可以在线观看毛片的网站| www.自偷自拍.com| 亚洲av熟女| 色尼玛亚洲综合影院| 黑人巨大精品欧美一区二区mp4| 丰满人妻一区二区三区视频av | 变态另类丝袜制服| 又爽又黄无遮挡网站| 手机成人av网站| 在线永久观看黄色视频| 18禁黄网站禁片午夜丰满| 国产亚洲精品av在线| 2021天堂中文幕一二区在线观| 午夜亚洲福利在线播放| 久久久精品大字幕| 亚洲自拍偷在线| 99国产精品一区二区蜜桃av| 亚洲人成网站高清观看| 最好的美女福利视频网| 久久精品91无色码中文字幕| 窝窝影院91人妻| 午夜免费成人在线视频| 国产精品久久视频播放| 一级毛片精品| 亚洲成人中文字幕在线播放| 十八禁人妻一区二区| 精品国产乱子伦一区二区三区| 亚洲av成人不卡在线观看播放网| 欧美黑人巨大hd| 两个人看的免费小视频| 国产男靠女视频免费网站| 夜夜爽天天搞| 国产成人精品久久二区二区免费| 香蕉av资源在线| 国产欧美日韩一区二区精品| 香蕉久久夜色| 久久精品国产清高在天天线| 欧美乱妇无乱码| 国产亚洲精品综合一区在线观看 | 亚洲av成人精品一区久久| www.自偷自拍.com| 亚洲精华国产精华精| 日本一本二区三区精品| 午夜福利18| 亚洲精品久久国产高清桃花| 日韩欧美在线乱码| 国产一区二区在线观看日韩 | 久久精品夜夜夜夜夜久久蜜豆 | 手机成人av网站| 国产成年人精品一区二区| 欧美日韩福利视频一区二区| 白带黄色成豆腐渣| 九色成人免费人妻av| 午夜激情福利司机影院| 国产乱人伦免费视频| 亚洲,欧美精品.| av福利片在线| 欧美日韩精品网址| 女生性感内裤真人,穿戴方法视频| 国内精品久久久久久久电影| 精品不卡国产一区二区三区| 99国产综合亚洲精品| 国产成人欧美在线观看| 国产精品永久免费网站| 91字幕亚洲| 日本a在线网址| 日韩欧美在线二视频| 99久久久亚洲精品蜜臀av| 日本免费a在线| 欧洲精品卡2卡3卡4卡5卡区| 午夜视频精品福利| 久久精品成人免费网站| 色综合婷婷激情| 国产精品香港三级国产av潘金莲| 一进一出抽搐动态| 亚洲国产高清在线一区二区三| 嫩草影院精品99| 日韩欧美在线二视频| 欧美一区二区精品小视频在线| 精品免费久久久久久久清纯| 男男h啪啪无遮挡| 国产不卡一卡二| 两性夫妻黄色片| 亚洲成av人片在线播放无| avwww免费| 国产熟女午夜一区二区三区| 亚洲国产精品合色在线| 日本精品一区二区三区蜜桃| 精品日产1卡2卡| 三级国产精品欧美在线观看 | 首页视频小说图片口味搜索| 老汉色∧v一级毛片| 制服丝袜大香蕉在线| 国产精品一区二区免费欧美| 国产成人系列免费观看| 久久这里只有精品19| 欧美精品亚洲一区二区| 99国产综合亚洲精品| 观看免费一级毛片| 久久精品夜夜夜夜夜久久蜜豆 | 一二三四在线观看免费中文在| 亚洲av成人av| 亚洲第一电影网av| 18禁黄网站禁片免费观看直播| 18禁裸乳无遮挡免费网站照片| 国产av麻豆久久久久久久| 18禁黄网站禁片免费观看直播| 久9热在线精品视频| 婷婷亚洲欧美| 欧美日韩中文字幕国产精品一区二区三区| 欧美大码av| 亚洲精品在线观看二区| 亚洲色图 男人天堂 中文字幕| 国产精品亚洲美女久久久| 宅男免费午夜| 狂野欧美激情性xxxx| 国产一级毛片七仙女欲春2| 香蕉丝袜av| 一本精品99久久精品77| av在线播放免费不卡| 亚洲人成电影免费在线| 国产视频一区二区在线看| 午夜福利免费观看在线| 夜夜躁狠狠躁天天躁| 国产在线观看jvid| 国产熟女午夜一区二区三区| 国产精品久久久久久久电影 | 亚洲精品粉嫩美女一区| 国产精品一区二区免费欧美| 国产精品久久久人人做人人爽| av片东京热男人的天堂| 日韩欧美 国产精品| 亚洲aⅴ乱码一区二区在线播放 | 麻豆av在线久日| 国产亚洲精品综合一区在线观看 | 久久久久免费精品人妻一区二区| 99在线人妻在线中文字幕| 一卡2卡三卡四卡精品乱码亚洲| 久久久久久人人人人人| 高清毛片免费观看视频网站| 日韩精品中文字幕看吧| videosex国产| 欧美一级a爱片免费观看看 | 国产激情偷乱视频一区二区| 日韩欧美三级三区| √禁漫天堂资源中文www| 日韩欧美国产一区二区入口| 嫁个100分男人电影在线观看| 不卡av一区二区三区| 国产一区二区激情短视频| 欧美中文日本在线观看视频| 嫩草影视91久久| 成人手机av| 日本熟妇午夜| 免费看美女性在线毛片视频| netflix在线观看网站| 精品乱码久久久久久99久播| 伦理电影免费视频| 国产成人系列免费观看| 久久久久久亚洲精品国产蜜桃av| 波多野结衣高清无吗| 午夜福利视频1000在线观看| 国语自产精品视频在线第100页| 亚洲狠狠婷婷综合久久图片| 亚洲av中文字字幕乱码综合| www.999成人在线观看| 亚洲国产中文字幕在线视频| 美女免费视频网站| www国产在线视频色| 大型黄色视频在线免费观看| 国产成人影院久久av| 日本熟妇午夜| 一夜夜www| 看片在线看免费视频| 国产91精品成人一区二区三区| 免费看日本二区| 日韩欧美国产一区二区入口| 欧美色视频一区免费| 久久香蕉精品热| 午夜亚洲福利在线播放| 无限看片的www在线观看| 亚洲国产欧美人成| 日韩大尺度精品在线看网址| 美女黄网站色视频| 九色国产91popny在线| 一区福利在线观看| 国产激情久久老熟女| 日韩成人在线观看一区二区三区| 桃色一区二区三区在线观看| 人人妻人人澡欧美一区二区| 非洲黑人性xxxx精品又粗又长| 亚洲精品在线美女| 毛片女人毛片| 一区二区三区激情视频| 这个男人来自地球电影免费观看| 精品福利观看| 免费人成视频x8x8入口观看| 精品福利观看| 亚洲五月天丁香| 老司机深夜福利视频在线观看| 亚洲av电影在线进入| 成人欧美大片| 亚洲国产欧美人成| 国产激情偷乱视频一区二区| 琪琪午夜伦伦电影理论片6080| 50天的宝宝边吃奶边哭怎么回事| 亚洲精品美女久久久久99蜜臀| 欧美大码av| 国产精品av视频在线免费观看| 婷婷丁香在线五月| 美女午夜性视频免费| x7x7x7水蜜桃| 国产av在哪里看| 午夜老司机福利片| 午夜福利在线在线| 热99re8久久精品国产| 12—13女人毛片做爰片一| 两性夫妻黄色片| 日韩中文字幕欧美一区二区| 黄片大片在线免费观看| 夜夜看夜夜爽夜夜摸| 这个男人来自地球电影免费观看| 熟女电影av网| 亚洲五月婷婷丁香| 老汉色∧v一级毛片| 久久性视频一级片| 亚洲熟女毛片儿| 又大又爽又粗| 在线观看免费视频日本深夜| 国产精华一区二区三区| 不卡一级毛片| 99在线视频只有这里精品首页| 欧美日韩黄片免| 俺也久久电影网| 欧美最黄视频在线播放免费| 国产午夜精品久久久久久| 淫妇啪啪啪对白视频| 99热只有精品国产| 免费在线观看日本一区| 欧美一区二区国产精品久久精品 | 亚洲av美国av| 国产成人av激情在线播放| 久久久久久久久久黄片| 日本三级黄在线观看| 国产不卡一卡二| 成熟少妇高潮喷水视频| 99久久精品热视频| 91大片在线观看| 国产av一区二区精品久久| 亚洲国产中文字幕在线视频| 精品国产美女av久久久久小说| 成人亚洲精品av一区二区| 搡老岳熟女国产| 国产v大片淫在线免费观看| 日韩欧美精品v在线| 日本一区二区免费在线视频| 99国产极品粉嫩在线观看| 99久久国产精品久久久| 人人妻,人人澡人人爽秒播| 在线看三级毛片| 99国产极品粉嫩在线观看| 97超级碰碰碰精品色视频在线观看| 婷婷精品国产亚洲av在线| 亚洲成a人片在线一区二区| 国产三级在线视频| 成人三级做爰电影| 国产高清激情床上av| 国内久久婷婷六月综合欲色啪| 国产免费av片在线观看野外av| 久久久久精品国产欧美久久久| 99久久精品热视频| 99热这里只有是精品50| 久久精品影院6| 国产成人av激情在线播放| 国产欧美日韩精品亚洲av| 国产探花在线观看一区二区| 国产精品爽爽va在线观看网站| 亚洲午夜理论影院| 国产亚洲精品久久久久5区| 国产精品乱码一区二三区的特点| 夜夜爽天天搞| 久久精品91蜜桃| 在线观看免费日韩欧美大片| 午夜福利高清视频| 久久久久性生活片| 啦啦啦免费观看视频1| 亚洲国产中文字幕在线视频| 美女黄网站色视频| 国产av麻豆久久久久久久| 午夜福利免费观看在线| 两性午夜刺激爽爽歪歪视频在线观看 | 国产99久久九九免费精品| 国产三级黄色录像| 在线观看舔阴道视频| 91av网站免费观看| 国产精品国产高清国产av| 欧美在线一区亚洲| 久久香蕉精品热| tocl精华| 欧美+亚洲+日韩+国产| 精品一区二区三区四区五区乱码| 亚洲成人中文字幕在线播放| 亚洲欧洲精品一区二区精品久久久| 亚洲男人天堂网一区| 成人欧美大片| 欧美日韩乱码在线| 亚洲专区国产一区二区| 青草久久国产| 神马国产精品三级电影在线观看 | 18禁国产床啪视频网站| 日日爽夜夜爽网站| 听说在线观看完整版免费高清| 不卡av一区二区三区| 老鸭窝网址在线观看| 在线a可以看的网站| 欧美成狂野欧美在线观看| 欧美一区二区精品小视频在线| 很黄的视频免费| 一级a爱片免费观看的视频| 国产精品 欧美亚洲| 欧美黄色片欧美黄色片| 久久久久久久久中文| 亚洲九九香蕉| 手机成人av网站| 久久久久九九精品影院| 大型黄色视频在线免费观看| 久久久久国产一级毛片高清牌| 国产精品香港三级国产av潘金莲| 久久久久久久久免费视频了| 亚洲人成77777在线视频| 久久精品亚洲精品国产色婷小说| 精品久久久久久久末码| 国产单亲对白刺激| 2021天堂中文幕一二区在线观| 99久久综合精品五月天人人| 日韩欧美一区二区三区在线观看| 精品国内亚洲2022精品成人| 国产精品自产拍在线观看55亚洲| 亚洲国产精品合色在线| 青草久久国产| 国产av在哪里看| 午夜福利成人在线免费观看| 黄片小视频在线播放| 啦啦啦韩国在线观看视频| 亚洲性夜色夜夜综合| 亚洲最大成人中文| 十八禁人妻一区二区| 久久久久久人人人人人| 成年女人毛片免费观看观看9| 国产高清激情床上av| 欧美一级a爱片免费观看看 | 久久香蕉精品热| 日韩有码中文字幕| 国产成人系列免费观看| 中文在线观看免费www的网站 | 亚洲国产精品合色在线| 久久九九热精品免费| 午夜福利在线在线| 久久伊人香网站| 99热只有精品国产| 91九色精品人成在线观看| 老鸭窝网址在线观看| 999精品在线视频| e午夜精品久久久久久久| 男人舔女人下体高潮全视频| 国内精品久久久久精免费| 国产精品爽爽va在线观看网站| 亚洲一区中文字幕在线| 国产av又大| 午夜影院日韩av| 国产片内射在线| 亚洲国产欧美人成| 亚洲午夜精品一区,二区,三区| 十八禁人妻一区二区| 日韩精品青青久久久久久| 可以免费在线观看a视频的电影网站| 精品国产美女av久久久久小说| 亚洲精品av麻豆狂野| 18禁美女被吸乳视频| 小说图片视频综合网站| 美女 人体艺术 gogo| 啦啦啦免费观看视频1| 99热这里只有是精品50| 丝袜美腿诱惑在线| 麻豆成人av在线观看| 狂野欧美白嫩少妇大欣赏| 午夜福利欧美成人| 成人一区二区视频在线观看| 国产黄色小视频在线观看| 精品不卡国产一区二区三区| 99热6这里只有精品| 亚洲国产看品久久| 窝窝影院91人妻| 成人午夜高清在线视频| 日本黄大片高清| 首页视频小说图片口味搜索| 岛国视频午夜一区免费看| 久久久久免费精品人妻一区二区| 日韩高清综合在线| 精品人妻1区二区| 黄色丝袜av网址大全| 视频区欧美日本亚洲| 亚洲色图av天堂| 1024手机看黄色片| 99re在线观看精品视频| 国产精品电影一区二区三区| 69av精品久久久久久| 成人av一区二区三区在线看| 成人亚洲精品av一区二区| 哪里可以看免费的av片| 国产精品一区二区三区四区免费观看 | 午夜免费观看网址| 久久 成人 亚洲| cao死你这个sao货| 亚洲专区中文字幕在线| 99热这里只有精品一区 | 亚洲av第一区精品v没综合| 在线观看www视频免费| 欧美3d第一页| 国产高清视频在线观看网站| 一本大道久久a久久精品| 俺也久久电影网| 午夜影院日韩av| 日本一本二区三区精品| 黄频高清免费视频| 999久久久精品免费观看国产| 国产成人欧美在线观看| 亚洲av成人av| 老熟妇乱子伦视频在线观看| 别揉我奶头~嗯~啊~动态视频| 一级a爱片免费观看的视频| 中文字幕久久专区| 人成视频在线观看免费观看| 久久精品人妻少妇| 国产精品 欧美亚洲| 一个人免费在线观看的高清视频| 一边摸一边做爽爽视频免费| 欧美色欧美亚洲另类二区| 精品乱码久久久久久99久播| 老司机深夜福利视频在线观看| 真人一进一出gif抽搐免费| 成人三级黄色视频| 亚洲 欧美一区二区三区| 啪啪无遮挡十八禁网站| 伊人久久大香线蕉亚洲五| 日韩欧美在线二视频| or卡值多少钱| 男人舔奶头视频| www.精华液| 长腿黑丝高跟| 午夜激情av网站| 无人区码免费观看不卡| 一a级毛片在线观看| 成人欧美大片| 国模一区二区三区四区视频 | av视频在线观看入口| 亚洲成人久久性| 成熟少妇高潮喷水视频| videosex国产| 全区人妻精品视频| 成人国语在线视频| 国产黄a三级三级三级人| 国产精品1区2区在线观看.| 久久久精品国产亚洲av高清涩受| 色综合亚洲欧美另类图片| 国产亚洲精品av在线| 欧美乱妇无乱码| 日韩精品免费视频一区二区三区| 国产成人精品久久二区二区免费| 桃红色精品国产亚洲av| 日韩 欧美 亚洲 中文字幕| 麻豆一二三区av精品| 久久久久国内视频| 国产在线观看jvid| 天堂av国产一区二区熟女人妻 | 国产精品乱码一区二三区的特点| 可以在线观看的亚洲视频| 亚洲激情在线av| 欧美乱色亚洲激情| 欧美日韩福利视频一区二区| 亚洲激情在线av| 在线十欧美十亚洲十日本专区| 亚洲人与动物交配视频| 精品乱码久久久久久99久播| 成人国产综合亚洲| 国产视频内射| 日韩三级视频一区二区三区| 欧美精品亚洲一区二区| 女人被狂操c到高潮| 久久香蕉国产精品| 国产亚洲精品久久久久久毛片| 女人被狂操c到高潮| 琪琪午夜伦伦电影理论片6080| 亚洲熟女毛片儿| 成人亚洲精品av一区二区| 亚洲性夜色夜夜综合| 12—13女人毛片做爰片一| 精品久久久久久久久久久久久| 久久人妻福利社区极品人妻图片| 国产精品综合久久久久久久免费| 精品久久久久久久久久久久久|