• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge

    2023-12-12 15:49:54ShuqinZhangXinyuSuPeiyuShiTianhuiDuandYunfeiHan
    Computers Materials&Continua 2023年10期

    Shuqin Zhang,Xinyu Su,Peiyu Shi,Tianhui Du and Yunfei Han

    School of Computer Science,Zhongyuan University of Technology,Zhengzhou,China

    ABSTRACT Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm (TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment.

    KEYWORDS Multi-source data fusion;threat modeling;threat propagation path;knowledge graph;intelligent defense decisionmaking

    1 Introduction

    The progressive expansion of the Internet into various areas,including e-commerce,education,and online media,has resulted in a sharp rise in threat events.A critical resource for comprehending threats is Cyber Threat Intelligence (CTI).However,due to the multi-source and heterogeneous characteristics of CTI,it is highly fragmented and requires much time for manual interpretation.Moreover,a single CTI cannot capture the whole picture of the threat.Since a single data source can only obtain part of the information segment of the object,the information from multiple data sources can perfectly and accurately reflect the general information of the object after fusion[1].Therefore,to improve efficacy,thoroughly examine the system’s security,and offer more precise decision assistance,this paper fuses data from multi-source CTI.However,since CTI resides in disparate,heterogeneous knowledge bases and the data inside is semantically heterogeneous,it is challenging to fuse the data.In this paper,we thoroughly examine cybersecurity knowledge bases and build the attack and defense analysis of the cybersecurity ontology (ADACO) model to fuse multi-source heterogeneous data.As a result,the pertinent information can be accessed quickly and precisely.ADACO broadens the modeling dimension in cybersecurity compared to earlier ontology models and incorporates attack and defense information to handle security events in an automated or semi-automated way.

    Currently,classic passive defense technologies are no longer sufficient to meet today’s security requirements in the face of emerging advanced persistent threat attacks.Attack path prediction is a powerful proactive security strategy against advanced persistent threats.However,it is challenging to adjust to quick changes in the network attack and defense posture using current approaches for attack path prediction because they have poor accuracy,difficult-to-understand outputs,and cannot integrate multi-source information properly[2].To address the above problems,this paper combines multi-source threat information based on ADACO,creates attack scenarios,and predicts attack paths utilizing the logical linkages between each assault step.The proposed threat evolution prediction algorithm(TEPA)can present the current attack scenarios and correctly anticipate the attack paths because we fully consider the actual network environment from the attacker’s point of view.

    Moreover,targeted defense techniques must be quickly implemented while predicting the attack path.At present,network attacks are getting more automated and intelligent.However,the deployment of defense resources and security policies on most networks remain static,making it challenging to successfully counteract today’s highly intelligent attacks.As a result,to accomplish intelligent network defense,the system should automatically derive security defense tactics.Currently,game theory is the most prevalent method for research on network security defense decisions.Game theory often assumes that attackers are rational and fully informed.However,in real offensive and defensive conflicts,these assumptions are not valid,contributing to some limitations of game theory-based defense decision approaches.Therefore,to circumvent the drawbacks of employing game theory and provide more precise and intelligent recommendations for defense techniques,this study proposed the intelligent defense decision algorithm(IDDA)based on the defense technique knowledge base.

    As mentioned above,to effectively fuse heterogeneous and fragmented multi-source knowledge,this work investigates multiple security knowledge bases to create the ontology model ADACO,which addresses the issue of semantic heterogeneity among knowledge.Additionally,this study suggests the algorithm TEPA based on ADACO,which can quickly predict the direction in which threats will propagate and map out the pertinent attack and defense information.The proposed algorithm IDDA offers intelligent recommendations for defensive measures.The major contributions of this paper are as follows:

    1) We conduct research and analysis across multiple cybersecurity knowledge bases to integrate heterogeneous multi-source knowledge into uniformly structured and interconnected threat information.Then,we propose the attack and defense analysis of the cybersecurity ontology model,based on which we construct a cybersecurity knowledge graph to actualize the association between heterogeneous cybersecurity knowledge bases.

    2) Aiming at the weak ability of the previous model to deduce and visualize the threat situation,and the inability to quickly grasp the complete picture of the threat and defense measures while predicting the attack path,we propose a threat evolution prediction algorithm to realize the association of threat information while predicting the path and enhance the visibility of the threat evolution path based on the knowledge graph.

    3) In response to the inability to make defense decisions quickly and accurately for current attacks,this paper proposes an intelligent defense decision algorithm based on the defense technique knowledge base,which automatically ranks and intelligently recommends multiple defense technologies to help security personnel quickly find the optimal defense measures to contain the spread of threats.

    The workflow of this paper is shown in Fig.1.Firstly,security knowledge is extracted from the cybersecurity knowledge bases to construct the ADACO.We simultaneously gather the topological structure and device configuration of the target network to extract the initial information.The inference rules are then loaded into the ADACO with the extracted data.Secondly,executing the TEPA,the inference results,including threat elements and their linkages,are utilized to build the threat propagation path in the knowledge graph.Finally,IDDA is used to provide a recommended list of the multiple defense techniques that have been reasoned.

    Figure 1:Workflow of the system

    2 Related Work

    Multi-source data fusion technology is widely used in many fields,such as the Maritime Internet of Things,remote sensing monitoring,medical diagnosis,electronic commerce,wireless communication,and fault diagnosis [3].Liu et al.[4] developed an Augmented Reality-enabled maritime navigation system by fully integrating the visual information provided by the cameras and the positioning information provided by the automatic identification system equipment to enhance sea state awareness and vessel traffic safety.Wan et al.[5] proposed a signal-sorting method based on deep transfer learning by fusing the information data collected from multiple regions by a swarm of unmanned aerial vehicles to improve the signal-sorting accuracy of the target region.Wang et al.[6] proposed a fire station spatial layout planning method by fusing high-precision building,population space,and multi-type higher-precision Point of Interest data.Wang et al.[7] fused data from multiple sensors to provide information support for the modernization of agricultural management through environmental monitoring and automated decision-making systems.In this paper,multi-source data fusion technology is applied to network security.The current focus of multi-source data fusion applications in cybersecurity is threat modeling,where heterogeneous information in CTI is integrated into an ontology model,and correlations are extracted to analyze potential threats better and understand the cybersecurity situation to provide decision support.There have been several previous studies on ontology construction in the cybersecurity domain,as shown in Table 1.

    Table 1:Ontology models in the field of cybersecurity

    To address the shortcomings of previous works,ADACO is built from multiple angles by drawing data from various knowledge bases.As a result of the data from different knowledge bases being linked,semantic heterogeneity can be removed,allowing for the construction of inference rules that helps security personnel accurately query the available knowledge and infer potential knowledge.

    Our work is based on identifying attack techniques from CTI and mapping them to ADACO.However,the inevitable redundant information in CTI makes it challenging to identify attack techniques.Numerous studies and applications have been made for feature selection,which can be used to cope with redundant information.In the context of situational element gathering and fusion,Chang et al.[13]employed rough sets for attribute reduction of the original data to eliminate redundant attributes.Wu et al.[14–16]addressed the phenomenon called PCMasking and improved the accuracy and speed of Markov boundary discovery;they investigated the multi-label feature selection problem from the causal perspective and proposed the first multi-label causal feature selection algorithm;they developed a Common and Target-specific Markov boundary variable discovery(CTMB)algorithm,used it for feature selection,and proposed a novel CTMB-driven multi-label feature selection algorithm,which achieved the maximum relevance and minimum redundancy.Liu et al.[17] proposed a lightweight Internet of Things (IoT) intrusion detection model based on feature selection,using optimized machine learning methods to detect network attacks in IoT networks effectively.Usually,a CTI describing an attack event contains multiple attack techniques,and the challenge of identifying attack techniques can be handled by recasting it as a feature selection problem with multi-label classification.Therefore,to accurately identify attack techniques in CTI,this paper applies the idea of feature selection to handle redundant information.

    The threat propagation path refers to a series of sequential attacks launched by an attacker to achieve his attack goal by exploiting the vulnerabilities in the target network.An important area of study in cyberspace security defense is the precise and efficient prediction of threat propagation paths [18].Attack graphs were utilized by Chen et al.[19] to predict the attack paths.However,the coefficient values for certain crucial factors were unduly reliant on expert knowledge,making the study conclusions somewhat subjective.By simply concatenating the detected assaults,Gong et al.[20]created a threat view without considering the pre-post relationship between devices and single-step attacks,which could only predict the attack paths in straightforward scenarios.Wang et al.[2]considered the attack success probability,but the setting of attackers’capability level lacked objective calculation,so the prediction outcomes were affected.Yang et al.[21] proposed the principle of privilege promotion.However,the algorithm did not consider the impact of social engineering attacks on the threat propagation path.Although Sun et al.’s[22]threat prediction analysis method was able to anticipate the threat propagation paths with accuracy,it was unable to provide timely countermeasures.GhasemiGol et al.[23] dealt with the uncertainty of attack probability in their algorithm.Yuan et al.[24] used the breadth-first traversal algorithm in the threat path generation method.Jajodia et al.[25]constructed the topological vulnerability analysis model,which identified different attack paths starting from the initial state of the attacker.All threat paths were generated using the three algorithmic models mentioned above,which led to path redundancy.Zhang et al.[18]added a loop elimination algorithm,which could effectively avoid path redundancy and improve the efficiency of threat path generation.Still,the proposed ontology was only based on the search function of the graph database,and no inference rules were designed to explore the implicit knowledge.

    The threat evolution prediction algorithm proposed in this paper takes the attacker’s perspective,which considers both the probability of success in using social engineering attacks and vulnerability exploit attacks,as well as the degree of threat each device poses to core assets in the event of an attack.Additionally,it combines pre-and post-permissions to determine whether the device will likely be compromised.

    3 Multi-Source Knowledge Fusion

    Today,detailed information on threat events is released on different security knowledge platforms,substantially fragmenting the available information.Therefore,fragmented security knowledge needs to be fused and reconstructed to facilitate utilization.

    3.1 Security Knowledge Data Sources

    Among the significant cybersecurity knowledge bases,the public security knowledge bases maintained by the cybersecurity firm MITRE are widely accepted by security personnel.These knowledge bases use standardized and normalized descriptive language to represent and distribute the cybersecurity information discovered by CTI.The following are the knowledge bases consulted for this paper:

    ■Common Platform Enumeration(CPE)[26]

    ■Common Vulnerabilities and Exposures(CVE)[27]

    ■National Vulnerability Database(NVD)[28]

    ■Common Weakness Enumeration(CWE)[29]

    ■Common Attack Pattern Enumeration and Classification(CAPEC)[30]

    ■Adversarial Tactics,Techniques,and Common Knowledge Matrix(ATT&CK)[31]

    ■Detection,Denial,and Disruption Framework Empowering Network Defense(D3FEND)[32]

    ■Engage[33]

    3.2 Multi-Source Knowledge Relationship Linking and Mapping

    This paper implements links among the knowledge bases: CPE,CVE,NVD,CWE,CAPEC,ATT&CK,D3FEND,and Engage.Among them,the attack techniques in ATT&CK are mapped to the defense techniques in D3FEND by digital artifacts,and there is also a mapping relationship between ATT&CK and Engage.The attack patterns highlighted by CAPEC link the attack tactics and techniques in ATT&CK with the weaknesses in CWE.Weaknesses in CWE can be related to vulnerabilities in CVE,which also can be linked to NVD to view the specific description of the vulnerability entries and the Common Vulnerability Scoring System (CVSS) scores [34].Moreover,NVD links the platforms and assets in the CPE that are affected by vulnerabilities.In conclusion,CPE,CVE,NVD,and CWE portray the affected platforms,vulnerabilities,and weaknesses the attacker exploits.CAPEC summarizes the attack patterns formed by the weaknesses that an attacker may exploit.ATT&CK provides the attack tactics and techniques.D3FEND gives defense techniques to counter these attacks.Engage offers counteracting activities to defend against these attacks actively.

    From the mentioned knowledge bases,we extract multi-source cybersecurity knowledge and store the knowledge in a graph database.Specifically,the entries in each knowledge base act as nodes in the graph database,while the relational links between knowledge bases act as edges in the graph database.These edges are not bidirectional between the above knowledge bases.However,they can be traversed bidirectionally when the data is integrated into the graph structure so that data in any knowledge base can be queried by any node.Fig.2 illustrates the relationship links among the above knowledge bases.

    Figure 2:Schematic of relationship links

    Only a few attack techniques in ATT&CK are provided with mitigations.And the rest of the attack techniques are based on the abuse of system features,making it difficult to neutralize them with preventative controls quickly.So,there are no equivalent mitigation measures in ATT&CK.Attack technique T1547.001 is shown as an example.To ultimately get higher-level privileges,the attacker causes harm by adding the malicious software to the starting folder or referencing it via the registry run key.No mitigations are offered in ATT&CK since T1547.001 is based on the abuse of system features.As seen in this example,the attack techniques of this type make security personnel cannot quickly find the mitigations they need in ATT&CK.

    To address this problem,MITRE adds a brand-new“Digital Artifact”notion in the D3FEND.A digital object becomes a digital artifact when the network actor(either defensive or offensive)interacts with it in any way.The attack techniques in the ATT&CK can be linked and mapped to the defense techniques in the D3FEND thanks to the digital artifacts that operate as a bridge,which enables attack techniques based on abuse of system features to find defense techniques.For example,the corresponding digital artifacts and defense techniques in the D3FEND can be mapped by querying the attack technique entry T1547.001.When attacked by someone using T1547.001,the attack can be countered using the relevant defense techniques in Fig.3.

    Figure 3:T1547.001 maps defense techniques in D3FEND

    Using digital artifacts as a bridge,we design inference rules to make defense techniques automatically associated with attack techniques,which helps security personnel find the countermeasures quickly.Taking the attack technique T1556 as an example,the inference rules use digital artifacts as a bridge to reason out the implied relational links between the attack and defense techniques.Then,put all of them into the graph database Neo4j,as shown in Fig.4.The red circle represents the attack technique T1556;the orange circles represent the digital artifacts associated with T1556;and the blue circles represent the defense techniques that can be used.In Fig.4,a relationship called“hasDefend” exists between the attack technique T1556 and the defense techniques.It shows that the defense techniques can be obtained directly based on the attack techniques using inference rules without the digital artifacts.

    4 Ontology Modeling and Knowledge Reasoning

    Ontology can express multiple information on cyber threats as concepts with formal descriptions[20],which solves the problem that knowledge fragmentation in CTI is not conducive to expression.This paper uses a more expressive modeling language,Web Ontology Language(OWL),to construct the ontology,which provides fast and flexible data modeling capabilities and efficient automatic reasoning capabilities[35].Then,we combine OWL ontology with the Semantic Web Rule Language(SWRL) to form inference rules [36].We use the semantic query-enhanced web rule language(SQWRL) language to implement queries and support SWRL rules for querying and extracting knowledge after inference integration.

    Figure 4:Mapping of attack techniques to defense techniques

    In the previous sections,we effectively link multiple source knowledge bases and integrate the data from them as a source of security knowledge for building our ontology model.At the same time,we refer to several cybersecurity models and propose the attack and defense analysis of cybersecurity ontology (ADACO).We collectively refer to the data in the multi-source knowledge base,such as vulnerabilities,weaknesses,attack techniques,and defense techniques,as threat elements.ADACO uses a standard language to define classes,attributes,entities,and inter-entity relationships for threat elements to enable sharing and reuse of data.Based on ADACO,multiple inference rules are designed in this paper.The inference engine in Protégé supports the implementation of sequential multi-step inference for reasoning about the facts of threat events and underlying knowledge.

    4.1 Classes and Attributes of the Ontology

    ADACO contains four top-level classes,ten second-level subclasses,and several third-level subclasses.The top-level classes include: Defend,Attack,Attacker,and Device.Table 2 shows the details of the classes.

    Table 2:The details of the classes

    Table 3:Inference rule 1

    Table 4:Inference rule 2

    Table 5:Inference rule 3

    Table 6:Inference rule 4

    Table 7:Inference rule 5

    Table 8:Inference rule 6

    Table 11:Inference rule 9

    The inclusion relationships among classes are shown in Fig.5a,while the logical links among the second-level subclasses are shown in Fig.5b.

    Figure 5:(a)The inclusion relationships among classes;(b)The logical links among the second-level subclasses

    4.2 Design of the Inference Rules

    Using inference rules allows us to reason about potential knowledge based on known knowledge,which helps us to explore new implicit relationships among threat elements.In this paper,we have designed nine inference rules to perform different functions,as shown in Tables 3 to 11.

    4.3 Application of the Inference Rules

    This section gives several examples of applying inference rules to demonstrate how security personnel can use them to counter threats.Two application scenarios are given below:

    1) Determine the vulnerability level of the asset and whether the asset will be conquered

    The email server holds the asset“arch_newsworld”,which contains the vulnerability“CVE-2005-3435”with a severity level of“High”.As shown in Fig.6,the green box illustrates the security officer executing inference rule 3 to deduce that the vulnerability level of arch_newsworld is “HighLevel”.At the same time,he can use the inference rule 7 to infer whether the asset will be conquered by an attacker.The red box illustrates the reasoning result that the attacker can gain complete control of the email server and compromise its asset“arch_newsworld”.

    Figure 6:The result of determining the vulnerability level of the asset and whether the asset will be conquered

    2) Search for information on attack and defense

    When the system is under threat,the security officer can use the inference rule 6 to look up all entries of devices,assets,vulnerabilities,weaknesses,attack patterns,attack techniques,digital artifacts,defense techniques,vulnerabilities of the attack techniques,and counteracting activities.As shown in Fig.7,the results of executing inference rule 6 are shown in the yellow box.When the system is attacked by T1114.002,the security officer can use inference rules 8 and 9 to quickly reason out the vulnerabilities of T1114.002 and the counteracting activities that can curb it.The result is shown in the red box,where the EAV entries represent the vulnerabilities of the attack technique and the EAC entries represent the counteracting activities.The security officer can also use the inference rule 1 to search for defense techniques.The green box shows the defense techniques corresponding to the two digital artifacts“ProcessCodeSegment”and“StackFrame”of T1211.

    Figure 7:The result of searching for information on attack and defense

    5 Main Algorithms

    5.1 Meta-Path Based Threat Evolution Prediction and Correlation Response

    When a threat is detected in the system,the first task is to respond to it on time and contain its spread.Therefore,it is imperative to assess and predict the development trend of the threat.The attacker will exploit vulnerabilities in the target network to launch a series of sequential attacks to achieve his attack purpose,and this set of attack sequences is defined as a meta-path by TEPA.We model the concept of “attack”as a relationship between attacker entities and device entities in a knowledge graph,thus transforming the attack prediction problem into the link prediction problem of the knowledge graph.Similarly,we link multiple threat elements into meta-paths and make all attacked device nodes connect with the corresponding threat element meta-paths.Eventually,we use the knowledge graph to show the threat evolution graph.The relevant definitions for TEPA are given below:

    ? Meta-path: Meta-paths are paths defined on the knowledge graph architecture layer.presents one path in knowledge graph.τ(Ok)is the entity type ofOk,andRkdenotes a type of relation.It describes a path between two entity typesτ(O0)andτ(Ok),which consists of a series of entity typesτ(O0)···τ(Ok)and a series of relation typesR1···Rk.

    ? Threat degree(TD):The threat degree to the core asset when the device is compromised.The higher the threat degree,the more likely the attacker selects the device for the next attack,causing the threat to propagate from this device to the core asset as a new starting point.td∈[0,1].

    ? Layer of topology(LOT):The layer of the device in the system topology.The higher the layer of the device,the closer it is to the core assets.

    ? Probability of success(POS):The probability of success of an attacker’s single-step attack.

    ? Device set(Devices):The set includes all devices in the system.

    ? Business access relationship(BAR):The business access relationship between two devicesdi-1anddiis represented bybari,i∈[1,n].The business access relationships from deviced0to devicednare expressed asMoreover,the set of business access relationships is denoted as Bar.

    ? Device access path (Dpath): It is an acyclic sequence of devices linked by business access relationships,i.e.,the specific deviced0is given,and the core asset is on devicedn,dpath={d0,d1,...,dn}represents the device access path from the deviced0todn.

    ? Threat propagation path (Tpath): It is the path made up of devices the attacker can conquer with threatening means.It is an acyclic ordered sequence of interdependent single-step attacks.

    ? Origin device(origin):The device that the attacker first attacked.

    “Oh, the crow is dead,” she replied; “his tame sweetheart is now a widow, and wears a bit of black worsted round her leg. She mourns very pitifully, but it is all stuff. But now tell me how you managed to get him back.”

    ? Pre-privilege:It is the pre-condition for an attacker to propagate a threat,i.e.,a business access relationship between devicedtand the previous onedt-1.The pre-privilege is extracted from the inference rule body.

    ? Post-privilege: It is the post-condition for an attacker to propagate a threat,i.e.,an attacker launches an attack that allows him to gain complete control of devicedt.The post-privilege is extracted from the inference rule header.

    Most current attack prediction algorithms ignore the importance of the attacker’s psychology in the threat evolution process.Since an attacker will always choose the most advantageous means to attack the most vulnerable device,we combine the attack success probability and the threat degree of the device for prediction.The formulas for both are given separately below.

    (1) Calculation of the Attack Success Probability

    The attack success probability refers to the probability that an attacker will successfully conquer a device using attack means.Specifically,attack means include social engineering attacks and vulnerability exploit attacks.Social engineering attacks can be easily avoided by professional security personnel,so the attack success probability is set to 0.2.While the attack success probability of vulnerability exploit attacks is quantified based on the CVSS score.

    The base score(Base)of the CVSS score reflects the inherent characteristic of vulnerability,which does not change with time and environment.The base score includes the Exploitability Subscore(ESC)and the Impact Subscore(ISC).The ESC measures the ease of vulnerability exploitation in four aspects:Attack Vector(AV),Attack Complexity(AC),Privilege Required(PR),and User Interaction(UI).The ISC measures the harm of a vulnerability in terms of confidentiality impact (ImpactConf),integrity impact (ImpactInteg),and availability impact (ImpactAvail) [37].The calculation formulae are shown in Eqs.(1)and(2).

    The higher the maturity of the vulnerability code,the higher the probability that the vulnerability will be successfully exploited.So,we multiply Base by the code maturity (ExploitCodeMaturity) as the optimized score[22],multiplied by 0.1 to represent the attack success probability.The calculation formula is shown in Eq.(3).

    (2) Calculation of the Threat Degree

    When deviced0in the device access pathdpathis compromised,the threat degree to the core asset is calculated as follows.

    i.Whendpath={d0},which indicates that the core asset exists in the first device of the path,and the first device has been compromised.The threat degree is calculated as Eq.(4).

    ii.Whendpath/={d0},since the attacker propagates the threat from one device to the next by performing an attack,the threat degree of the device can be calculated only if the threat propagation pathtpathexists on the device access pathdpath.If thetpathdoes not exist on thedpath,it means that the threat cannot be propagated to the core asset along thedpathby attack means.As a result,the threat degree is 0.

    The successful conquest of the high-topology layer device is based on the conquest of the lowtopology layer device.Take the ratio of the devicedtand the core asset’s topological layer numbers as the weight.The larger the value of this weight means that the devicedtis closer to the core asset.Furthermore,if the attacker wants to compromise devicedt,he must conquer all the devices on the threat propagation path before devicedt.So,this weight is then multiplied by the multiplication of the attack success probability of all devices on the threat propagation path passed from the starting deviced0to devicedt.In this case,the threat degree is calculated as Eq.(5).

    If there are multiple adjacent devices from devicedtto core asset,and there is the threat propagation pathtpathon thedpathbetween devicedtand each adjoining device.Then,the device with the highest threat degree among the adjacent devices is taken as the next target to attack and propagate the threat.

    The core code of the algorithm proposed in this paper is as follows:

    The semantics of the above algorithm is: Step 1) inputs the business access relationships and the initial attacked device.Step 2) scans all devices in the system to lock the location of the initial attacked device and the device carrying the core asset,determining the starting and ending points for constructing the device access path.Step 3) uses the inference engine to perform multi-step attack inference to obtain the sets of pre-privilege and post-privilege from the inference results.Steps 4)~21)are the core of the algorithm.Gaining complete control of the device requires both conditions simultaneously: 1.There is a device access path between the device to be attacked and the adjacent device that is currently under complete control of the attacker.2.The device to be attacked has a vulnerability.So,we first extract the pre-privileges to create the device access path,and then extract the post-privileges to determine whether the threat propagation path exists between devices.If the threat propagation path exists between the device and each adjacent device,the device with the highest threat degree among the adjacent devices is taken as the next target to attack.Afterward,create the directed edge to construct the complete threat propagation path.Steps 22)~24)extract threat elements such as vulnerabilities,weaknesses,attack techniques,defense techniques,and counteracting activities associated with each device in the propagation path and link them into a meta-path.Finally,import the output into the knowledge graph Neo4j.

    5.2 Intelligent Defense Decision-Making

    When the network is under attack,the system will respond to the threat and automatically return one or more defense techniques.However,security personnel may not know how to choose when faced with multiple defense techniques.In this paper,we propose the IDDA,an intelligent defense decision algorithm,to intelligently help security personnel make defense decisions.

    IDDA quantitatively calculates multiple metrics from several dimensions to draw the list of recommended optimal defense techniques for the attack techniques.The quantitative metrics involved are shown below:

    1) The probability of using each defense technique against the attack tactics

    According to the hierarchical structure of the D3FEND,the defense tactics are divided into different defense techniques.This paper presents statistics on the number of defense techniques relevant to each attack tactic,which reflects the probability of using each defense technique against the attack tactics.

    2) The number of digital artifacts covered by the defense technique

    An attack technique affects one or more digital artifacts,and a defense technique acts on one or more digital artifacts,as shown in Fig.3 in Section 3.So,the more digital artifacts involved in the defense technique,the more comprehensive the defense.

    3) The similarity of the textual description of defense techniques and attack techniques

    Inspired by the work of Akbar et al.[38],we use Roberta to calculate the textual similarity between the defense technique description and the attack technique description.The higher the similarity,the more the defense technique fits the attack technique.

    The weights,ranking,and scores of three quantitative metrics are shown in Table 12.

    Table 12:Weights,ranking,and scores of three quantitative metrics

    6 Experiment

    To verify the validity of our work,we construct an enterprise information system as the scenario for the experiment.The instances in the scenario are mapped in the ADACO.Also,to verify the feasibility of modeling with multi-source security knowledge as an ontology,this section first gives a linking example,presented as a knowledge graph.Then,we use the TEPA for the experimental scenario to predict the threat propagation path.Finally,we use the IDDA to rank the multiple defense techniques associated with the devices in the path.

    6.1 Scenario of the Experiment

    The experiment scenario is shown in Fig.8,where the system consists of four subnetworks.Subnet 1 deploys a firewall,a web server,and a file server.The file server stores critical office information of the enterprise;Subnet 2 deploys a web server,an email server,and two administration stations.The network lines of two administration stations are connected from the same router.Specifically,administration station 1 only has access to web server 2,while administration station 2 only has access to the email server;Subnet 3 deploys a workstation and a data server,and the data server stores essential business data.Workstation 1 has the user account for the file server,and access to control the data server;Subnet 4 is connected from Subnet 2.It deploys a workstation and a file transfer protocol server(FTP server).Table 13 presents the CVE entries,threat degrees,and attack types corresponding to the vulnerabilities of the devices in the system.Table 14 shows the business access relationships between the devices.

    Table 13:Instances and their properties

    Table 14:Business access relationships

    Figure 8:Topology of the scenario

    6.2 Links of the Meta-Paths

    This section provides an example to specify the linking relationships in the meta-paths between different classes of ADACO.The illustration shows the linkages of the device“Administration Station 2(AS_2)”with vulnerabilities,weaknesses,attack patterns,attack techniques,digital artifacts,defense techniques,and counteracting activities.The entities in the example are listed in Table 15.

    Inject AS_2 into the inference engine and import the inference results into the knowledge graph.The linkages are shown in Fig.9.And Table 16 illustrates the linkages between the above entities in the form of meta-paths.

    Table 16:Linkages in the meta-paths

    Figure 9:The linkages in the example

    6.3 Prediction of the Threat Evolution

    This section verifies the validity of TEPA based on the scenario in Section 6.1.The initial conditions for the experiment are given below:

    (1) The attacker attacked the firewall,which suffered from a malicious script injection vulnerability“CVE-2022-3144”.

    (2) The firewall holds the business access relationships between both Web Server 1 and File Server.

    (3) The core asset is hosted on the FTP Server.

    Execute the TEPA to predict the devices most likely to be compromised by each attack step and then link them as the meta-path.At the same time,the threat elements associated with these devices are also linked to the path.The final results are imported into Knowledge Graph,as shown in Fig.10.We mark the threat propagation path with black arrows.Based on the predicted path,security personnel can quickly get a picture of threats from the knowledge graph and take appropriate defensive measures for each attack step to contain the spread of the threat.We have compiled the results of our experiment and presented them in Table 17.For simplicity of expression,the devices in Table 17 are replaced by abbreviations,e.g.,the firewall is written as FW.

    Table 17:The compiled information on the threat propagation path

    Based on the table,we analyze the attacker’s actions in this experiment as follows:

    (1) The attacker attacked Firewall,which owned the software “Wordfence_Security”.And the vulnerability in Wordfence_Security,CVE-2022-3144,caused it to under-translate stored values,which allowed the attacker to inject malicious web scripts into the settings.When the user visited the page affected by the setting,it was subject to cross-site scripting by the attacker,resulting in the firewall being completely compromised.

    (2) The attacker then attacked Web Server 1 (Web_1),which owned the software“cloud_foundation”.The cloud_foundation contained a remote code execution vulnerability,CVE-2021-21972,which allowed the attacker to execute commands with unrestricted privileges and thus gain complete control of Web_1.

    (3) There was a business access path between Web_1 and Router.The Router was configured with hardware “rv_110w”.The rv_110w had the vulnerability “CVE-2022-20923”,which allowed the unauthenticated attacker to bypass authentication and access the network.

    (4) The attacker attacked Administration Station 2(AS_2)along the network.AS_2 held the software“extCalendar”,which had the vulnerability“CVE-2007-0681”.CVE-2007-0681 allowed the attacker to steal the user’s password and gain complete control of AS_2.

    (5) The attacker accessed the mail server (ES) via AS_2.ES contained the software“arch_newsworld”,which suffered from the vulnerability “CVE-2005-3435”.The attacker exploited CVE-2005-3435 to obtain the hash of the user’s password to bypass authentication and gain complete control of the ES.

    (6) The attacker accessed Workstation 2 (Work_2) via ES.Work_2 held the screensaver“matrix_screen_saver”,which had the elevation of privilege vulnerability “CVE-1999-1454”.It allowed the attacker to bypass the password prompt by pressing the ESC key and gain complete control of Work_2.

    (7) Via Work_2,the attacker could access FTP Server.The software“glFTPd”in FTP Server had the vulnerability“CVE-2021-31645”,which could enable the attacker to cause a threat event of denial service by exceeding the connection limit.

    Figure 10:The result of the threat propagation path

    Through the above analysis,we can observe the attack steps and verify the validity of the proposed methodological model in this paper.ADACO integrates the“defense”to extend the modeling knowledge of the cybersecurity domain.Table 18 compares ADACO with other ontology models.

    Table 18:Comparison among the cybersecurity ontology models

    We compare TEPA with previous algorithms in Table 19.The comparison result shows that TEPA is relatively improved,which takes the threat impact elements (probability of the successful attack,threat degree)into account and avoids the problem of path redundancy.Moreover,only the work in this paper can predict the threat propagation path while correlating the attacked devices in the path with their threat elements,such as vulnerabilities,weaknesses,attack techniques,and defense techniques,which enriches the prediction results.

    Table 19:Comparison among the threat propagation path prediction algorithms

    6.4 Implementation of Intelligent Defense Decision-Making

    6.4.1 Contrast Analysis

    TEPA has associated with several defense techniques in Section 6.3.And in this section,we use the IDDA to rank and recommend them.The recommendation result is compared with the algorithm of Akbar et al.[38]to demonstrate IDDA’s superiority.Akbar et al.[38]analyzed textual descriptions of attack techniques and defense techniques using the standard model “Roberta”.Roberta offers deep semantic knowledge to derive meaningful associations between attack techniques and defense techniques.They matched attack techniques to defense techniques and provided a ranked list of defense techniques for each attack technique.

    Taking the attack technique“T1547”as an example,IDDA and the algorithm of Akbar et al.are executed,and the ranking results are given separately,as shown in Table 20.

    Table 20:The ranking of defense techniques

    The analysis of the ranking results of both shows that IDDA gives approximately the same result as Akbar et al.’s algorithm [38],which proves the effectiveness of IDDA.To further validate the reasonableness and accuracy of our ranking result,we analyze the above eleven defense techniques using expert knowledge and select the four most effective ones.In the list ranked by the IDDA,the four most effective defense techniques selected overlap three of the top four in the list,while using the algorithm of Akbar et al.[38],the four most effective defense techniques selected only overlap two of the top four,which shows that the IDDA is more accurate and reliable.

    6.4.2 Statistical Analysis

    The three indicators in Table 21 are used simultaneously by IDDA for calculation,while indicator 1 is the sole indication used by Akbar’s algorithm.The outcomes are contrasted for the four cases in Table 21 to demonstrate the effectiveness of the remaining indicators used in IDDA:

    Table 21:Indicators of recommendation and the four cases

    We randomly select one hundred attack techniques from the ATT&CK matrix and recommend the relevant defense techniques in the above four cases,obtaining four hundred sets of ranking results of defense techniques in total.In keeping with the principle of the prior experiment,we use expert knowledge to examine all defense techniques in each group and select the four most effective techniques.The top four in the ranked list are compared with the four most effective defense techniques to calculate the number of overlaps between the top four and the most effective defense technique.We counted the number of overlaps in these four cases and calculated their probabilities.The comparison results are shown in Fig.11.

    Figure 11:Number of overlaps and overlap probability

    According to Fig.11,Case 4 has the best overall performance since it has the highest probability of overlapping four,and the total probability of overlapping four and overlapping three is the highest,although the probability of overlapping three is just slightly lower than Case 3.Case 1 performed poorly,with the lowest probability of overlapping four and overlapping three as well as the highest probability of overlapping two and overlapping one.Case 3’s curve trend resembles Case 4,whereas Case 2’s curve trend falls between Case 1 and Case 4.The probability of overlapping three decreases when indicator 2 is added to Case 3,indicating that indicator 3 has a more favorable impact on the calculation.Even though adding indication 2 somewhat reduces the probability of overlapping three,it increases the overall overlapping probability.So far,the effectiveness and superiority of IDDA have been confirmed by the above evaluations.

    7 Conclusion

    In this work,we employ several cybersecurity knowledge bases as sources of information,integrate multi-source information on items like the asset,vulnerability,weakness,attack pattern,attack technique,defense technique,and counteracting activity,and organize relationships between them.Based on this,we build the ADACO model and map it to the knowledge graph,resolving the semantic heterogeneity issue and laying the foundation for knowledge retrieval.Nine inference rules that may be used in an actual Internet situation have been developed for ADACO.Additionally,when the system is under attack,ADACO combines the TEPA for predicting the threat propagation path and links threat information to each compromised device.Finally,the IDDA gives security professionals a practical means of making the most effective decisions in the case of an assault.

    For future work,firstly,the threat propagation path algorithm does not consider the case where multiple post-permissions must be satisfied simultaneously to compromise a particular device.So,we will further refine the classification of the types of vulnerabilities and the required permissions to fill the gap.Secondly,we will provide ADACO with more threat elements on malicious families to automate attack attribution.Finally,the experiment shows that the indicator“the number of digital artifacts covered by the defense technique”plays a more positive role in the IDDA.As a result,we will try to increase the weight of this indicator to improve the overall probability of overlapping,thereby improving the accuracy of the defense technique recommendation.

    Acknowledgement:The authors would like to thank all those who have contributed in this area and the anonymous reviewers for their valuable comments and suggestions,which have improved the presentation of this paper.

    Funding Statement:The authors received no specific funding for this study.

    Author Contributions:The authors confirm contribution to the paper as follows:study conception and design:Shuqin Zhang,Xinyu Su;data collection:Yunfei Han;analysis and interpretation of results:Peiyu Shi,Tianhui Du;draft manuscript preparation:Xinyu Su.The authors declare that they have no conflicts of interest to report regarding the present study.

    Availability of Data and Materials:The ontology involved in this paper can be obtained by sending an E-mail to the corresponding author.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美丝袜亚洲另类 | 欧美成狂野欧美在线观看| 老汉色av国产亚洲站长工具| 五月伊人婷婷丁香| 精品不卡国产一区二区三区| 精品久久久久久久人妻蜜臀av| √禁漫天堂资源中文www| 亚洲人成伊人成综合网2020| 久久九九热精品免费| 午夜福利视频1000在线观看| 国产精品久久视频播放| 日日干狠狠操夜夜爽| 国产亚洲欧美在线一区二区| 香蕉av资源在线| 亚洲真实伦在线观看| 欧美一区二区精品小视频在线| 欧美成人午夜精品| 精品高清国产在线一区| 欧美一级a爱片免费观看看 | 在线观看www视频免费| 女同久久另类99精品国产91| 久久精品国产综合久久久| www.熟女人妻精品国产| 亚洲人成电影免费在线| or卡值多少钱| 国产一区二区在线观看日韩 | 一二三四社区在线视频社区8| 久久精品夜夜夜夜夜久久蜜豆 | 亚洲av美国av| 午夜a级毛片| 男人舔女人下体高潮全视频| 男女午夜视频在线观看| 不卡一级毛片| 老熟妇乱子伦视频在线观看| 日韩欧美在线乱码| 丰满人妻熟妇乱又伦精品不卡| 桃色一区二区三区在线观看| 国产真实乱freesex| 国产精品久久久久久人妻精品电影| 国产亚洲欧美在线一区二区| 日韩欧美三级三区| 成人三级黄色视频| 91字幕亚洲| 久久婷婷成人综合色麻豆| 亚洲欧美精品综合一区二区三区| 欧美日本视频| 一级毛片高清免费大全| 黑人欧美特级aaaaaa片| 天堂影院成人在线观看| 老司机午夜福利在线观看视频| 中文字幕精品亚洲无线码一区| 成人手机av| 两性夫妻黄色片| a在线观看视频网站| 久久久久国内视频| 1024视频免费在线观看| 69av精品久久久久久| 露出奶头的视频| 亚洲av成人av| 亚洲中文av在线| 亚洲av日韩精品久久久久久密| 黄片小视频在线播放| 国产一区在线观看成人免费| 丁香欧美五月| 日韩精品免费视频一区二区三区| 色在线成人网| 老汉色∧v一级毛片| 国产一级毛片七仙女欲春2| av福利片在线观看| 手机成人av网站| 又黄又爽又免费观看的视频| 在线十欧美十亚洲十日本专区| 香蕉久久夜色| 欧美性长视频在线观看| 国产乱人伦免费视频| 久久久久久免费高清国产稀缺| 国产精品综合久久久久久久免费| 老司机靠b影院| 少妇粗大呻吟视频| 嫩草影视91久久| 日韩精品青青久久久久久| 大型黄色视频在线免费观看| 国产爱豆传媒在线观看 | 99国产精品一区二区蜜桃av| 欧美成人一区二区免费高清观看 | 在线观看免费日韩欧美大片| 最近在线观看免费完整版| 很黄的视频免费| 又爽又黄无遮挡网站| 法律面前人人平等表现在哪些方面| 亚洲国产中文字幕在线视频| www国产在线视频色| 久久草成人影院| 美女扒开内裤让男人捅视频| 在线播放国产精品三级| 一本精品99久久精品77| 看免费av毛片| 久久久久久久久中文| 久久久久免费精品人妻一区二区| 在线国产一区二区在线| 91九色精品人成在线观看| 国产亚洲精品综合一区在线观看 | 变态另类丝袜制服| 久久久久久大精品| 日本免费a在线| 我要搜黄色片| 18美女黄网站色大片免费观看| 亚洲aⅴ乱码一区二区在线播放 | 亚洲自偷自拍图片 自拍| 国产伦一二天堂av在线观看| 又黄又粗又硬又大视频| 成年版毛片免费区| 国产免费男女视频| 老司机深夜福利视频在线观看| 欧美日韩精品网址| 欧美日韩精品网址| 黑人操中国人逼视频| 亚洲中文日韩欧美视频| 免费在线观看视频国产中文字幕亚洲| av福利片在线观看| 身体一侧抽搐| 日本五十路高清| 国产一区在线观看成人免费| 男女做爰动态图高潮gif福利片| 欧美午夜高清在线| 日韩欧美三级三区| 亚洲精品美女久久av网站| 亚洲狠狠婷婷综合久久图片| 久久天躁狠狠躁夜夜2o2o| 精品欧美国产一区二区三| tocl精华| 免费在线观看成人毛片| 99久久综合精品五月天人人| 高清在线国产一区| 亚洲在线自拍视频| 黄色a级毛片大全视频| 99久久99久久久精品蜜桃| 熟妇人妻久久中文字幕3abv| 小说图片视频综合网站| 精品国产超薄肉色丝袜足j| 成人av一区二区三区在线看| 91字幕亚洲| 日韩 欧美 亚洲 中文字幕| 国产精品久久久av美女十八| 国产精品久久久av美女十八| 美女免费视频网站| 久久精品国产亚洲av香蕉五月| 精品乱码久久久久久99久播| 国产精品九九99| 欧美日韩亚洲综合一区二区三区_| 啪啪无遮挡十八禁网站| 亚洲色图 男人天堂 中文字幕| 成人av在线播放网站| 国产视频内射| 最近最新中文字幕大全电影3| xxx96com| 久久 成人 亚洲| 少妇熟女aⅴ在线视频| 久久久久国产精品人妻aⅴ院| 亚洲 欧美 日韩 在线 免费| 亚洲精品在线观看二区| 色在线成人网| 精品乱码久久久久久99久播| 午夜福利免费观看在线| 听说在线观看完整版免费高清| 岛国在线免费视频观看| 午夜免费激情av| 亚洲人与动物交配视频| 又爽又黄无遮挡网站| 亚洲国产中文字幕在线视频| 久久人妻av系列| 国产午夜精品论理片| 黄色成人免费大全| 欧美+亚洲+日韩+国产| 欧美黑人精品巨大| 国产成年人精品一区二区| 久久香蕉国产精品| av在线天堂中文字幕| 久久天躁狠狠躁夜夜2o2o| 在线观看免费午夜福利视频| 在线看三级毛片| 国产精品久久电影中文字幕| 九色国产91popny在线| 搞女人的毛片| 男人舔女人的私密视频| 欧美黑人精品巨大| 国产精品自产拍在线观看55亚洲| 嫁个100分男人电影在线观看| 精品无人区乱码1区二区| 久久伊人香网站| 99久久99久久久精品蜜桃| 日本成人三级电影网站| 男女午夜视频在线观看| 亚洲精品色激情综合| 老鸭窝网址在线观看| 午夜老司机福利片| 一卡2卡三卡四卡精品乱码亚洲| 久久国产精品人妻蜜桃| 看黄色毛片网站| 亚洲熟女毛片儿| 村上凉子中文字幕在线| 男女床上黄色一级片免费看| 两个人视频免费观看高清| 欧美日韩一级在线毛片| 欧美一级毛片孕妇| 亚洲av成人精品一区久久| 91九色精品人成在线观看| 夜夜看夜夜爽夜夜摸| 亚洲自拍偷在线| 亚洲熟妇熟女久久| 久久久精品欧美日韩精品| 日韩高清综合在线| 99热6这里只有精品| 淫妇啪啪啪对白视频| 婷婷精品国产亚洲av| 欧美又色又爽又黄视频| 久久中文看片网| 亚洲aⅴ乱码一区二区在线播放 | 欧美 亚洲 国产 日韩一| 999久久久国产精品视频| 亚洲av美国av| av视频在线观看入口| 99在线视频只有这里精品首页| 久久草成人影院| 国产精品电影一区二区三区| 99久久国产精品久久久| 国产区一区二久久| 桃色一区二区三区在线观看| 一级毛片女人18水好多| av免费在线观看网站| 此物有八面人人有两片| 亚洲激情在线av| a级毛片在线看网站| 久久久国产成人精品二区| 麻豆一二三区av精品| 熟女电影av网| 国产又色又爽无遮挡免费看| 国产精品日韩av在线免费观看| 嫁个100分男人电影在线观看| 国产精品亚洲av一区麻豆| 免费观看精品视频网站| 不卡av一区二区三区| 日韩精品青青久久久久久| 国产精品,欧美在线| 亚洲av熟女| 欧美3d第一页| 日日摸夜夜添夜夜添小说| 亚洲精品一卡2卡三卡4卡5卡| 国产三级在线视频| 欧美日韩中文字幕国产精品一区二区三区| 中亚洲国语对白在线视频| 人妻久久中文字幕网| 国产免费男女视频| 婷婷精品国产亚洲av在线| 黄色视频不卡| 日韩有码中文字幕| 啦啦啦观看免费观看视频高清| 一级黄色大片毛片| 天天躁狠狠躁夜夜躁狠狠躁| 国产亚洲欧美在线一区二区| 免费看十八禁软件| 特大巨黑吊av在线直播| 国产午夜精品论理片| 999久久久国产精品视频| 亚洲成人国产一区在线观看| 久久精品国产亚洲av高清一级| 国产精品美女特级片免费视频播放器 | 国产精品免费视频内射| 两个人免费观看高清视频| av视频在线观看入口| 国产亚洲欧美98| 久久久精品大字幕| 久久国产精品影院| 色在线成人网| 极品教师在线免费播放| 又大又爽又粗| 国产欧美日韩一区二区精品| 中出人妻视频一区二区| 中文在线观看免费www的网站 | 欧美日韩亚洲综合一区二区三区_| 国产麻豆成人av免费视频| 亚洲av成人精品一区久久| 中文亚洲av片在线观看爽| 色综合亚洲欧美另类图片| 精品久久久久久久末码| 午夜成年电影在线免费观看| 日韩国内少妇激情av| 久久国产乱子伦精品免费另类| 久久久国产精品麻豆| 午夜精品在线福利| 日韩欧美在线二视频| 亚洲va日本ⅴa欧美va伊人久久| av中文乱码字幕在线| 欧美一区二区国产精品久久精品 | 免费看日本二区| 欧美 亚洲 国产 日韩一| 国产在线观看jvid| 日日干狠狠操夜夜爽| 亚洲avbb在线观看| 老司机在亚洲福利影院| 在线观看一区二区三区| 国内毛片毛片毛片毛片毛片| 成人av在线播放网站| 国产又黄又爽又无遮挡在线| 久久香蕉精品热| 波多野结衣高清作品| 国产av又大| 国产精品电影一区二区三区| 欧美一区二区精品小视频在线| 黄色视频不卡| 日韩有码中文字幕| 国产精品野战在线观看| 日韩欧美国产一区二区入口| 亚洲精品国产精品久久久不卡| 一进一出抽搐动态| 在线观看舔阴道视频| 国产男靠女视频免费网站| 淫秽高清视频在线观看| 两人在一起打扑克的视频| 久久久久免费精品人妻一区二区| 欧美+亚洲+日韩+国产| 久久久精品欧美日韩精品| 热99re8久久精品国产| 亚洲av片天天在线观看| 国产男靠女视频免费网站| 免费看美女性在线毛片视频| 成年免费大片在线观看| 岛国在线观看网站| 两个人免费观看高清视频| 午夜福利视频1000在线观看| 怎么达到女性高潮| 日韩免费av在线播放| 久久久久久大精品| 精品无人区乱码1区二区| 亚洲av片天天在线观看| 国产精品影院久久| 久久久精品欧美日韩精品| 亚洲免费av在线视频| 看黄色毛片网站| 久久国产乱子伦精品免费另类| 岛国在线免费视频观看| 国产片内射在线| 国产精品影院久久| 亚洲精品美女久久av网站| 日本一区二区免费在线视频| 女同久久另类99精品国产91| 欧美日韩亚洲综合一区二区三区_| 最近最新中文字幕大全电影3| 久久国产精品影院| 久久久国产精品麻豆| 午夜福利视频1000在线观看| www.熟女人妻精品国产| 亚洲精品一卡2卡三卡4卡5卡| 国产精品香港三级国产av潘金莲| 国产精品久久视频播放| 欧美一级a爱片免费观看看 | 夜夜爽天天搞| 国产精品 欧美亚洲| 国产亚洲av高清不卡| 在线免费观看的www视频| 成人手机av| 看免费av毛片| 一区二区三区高清视频在线| 嫩草影院精品99| 性欧美人与动物交配| 免费无遮挡裸体视频| 18禁国产床啪视频网站| 欧美日韩一级在线毛片| 在线国产一区二区在线| 午夜福利欧美成人| 日本 欧美在线| 制服人妻中文乱码| 久久婷婷成人综合色麻豆| 琪琪午夜伦伦电影理论片6080| 最新在线观看一区二区三区| 又黄又爽又免费观看的视频| 免费在线观看完整版高清| 国产成人av教育| 99国产精品一区二区三区| 丰满人妻一区二区三区视频av | 国产aⅴ精品一区二区三区波| 全区人妻精品视频| 日韩三级视频一区二区三区| 桃色一区二区三区在线观看| 老司机在亚洲福利影院| 国产精品,欧美在线| 嫁个100分男人电影在线观看| 国产精品电影一区二区三区| 国产av在哪里看| 国产亚洲精品久久久久5区| 婷婷丁香在线五月| 日本黄色视频三级网站网址| 淫秽高清视频在线观看| 婷婷丁香在线五月| 一边摸一边做爽爽视频免费| 亚洲精品粉嫩美女一区| 欧美3d第一页| 一二三四在线观看免费中文在| 免费av毛片视频| 最近在线观看免费完整版| 特级一级黄色大片| 美女黄网站色视频| e午夜精品久久久久久久| 婷婷精品国产亚洲av| 麻豆国产97在线/欧美 | 欧美最黄视频在线播放免费| 午夜福利18| 日韩高清综合在线| 国产激情偷乱视频一区二区| 国产成人系列免费观看| 丝袜人妻中文字幕| 亚洲av中文字字幕乱码综合| 美女免费视频网站| 午夜免费激情av| 一区二区三区国产精品乱码| 国产成人系列免费观看| 在线观看午夜福利视频| 精品高清国产在线一区| av欧美777| 日韩有码中文字幕| 日韩国内少妇激情av| 国产精品一及| 给我免费播放毛片高清在线观看| 一区二区三区国产精品乱码| 亚洲乱码一区二区免费版| 母亲3免费完整高清在线观看| xxx96com| 日韩欧美国产一区二区入口| 一级片免费观看大全| 可以在线观看毛片的网站| 亚洲国产看品久久| 精品欧美国产一区二区三| 中文资源天堂在线| 日韩欧美一区二区三区在线观看| 久久香蕉激情| 国产亚洲精品一区二区www| 免费av毛片视频| 午夜激情福利司机影院| 国产精品98久久久久久宅男小说| 亚洲18禁久久av| 国产69精品久久久久777片 | 国产乱人伦免费视频| 欧美日韩中文字幕国产精品一区二区三区| 狂野欧美激情性xxxx| 日本黄色视频三级网站网址| 亚洲狠狠婷婷综合久久图片| 色尼玛亚洲综合影院| 国内少妇人妻偷人精品xxx网站 | 18禁美女被吸乳视频| 看免费av毛片| 国产不卡一卡二| 三级毛片av免费| 在线观看美女被高潮喷水网站 | 后天国语完整版免费观看| 手机成人av网站| 麻豆国产97在线/欧美 | 特级一级黄色大片| 欧美黄色片欧美黄色片| 国产成人欧美在线观看| 每晚都被弄得嗷嗷叫到高潮| cao死你这个sao货| 亚洲 欧美一区二区三区| 精华霜和精华液先用哪个| 国产欧美日韩一区二区精品| 欧美激情久久久久久爽电影| videosex国产| 九色国产91popny在线| 国产一区在线观看成人免费| 亚洲欧美激情综合另类| 亚洲国产高清在线一区二区三| 日本免费a在线| 中文字幕久久专区| 婷婷六月久久综合丁香| aaaaa片日本免费| 亚洲成人免费电影在线观看| 听说在线观看完整版免费高清| 一本精品99久久精品77| 国产成人系列免费观看| 亚洲色图 男人天堂 中文字幕| 日本一二三区视频观看| netflix在线观看网站| 十八禁网站免费在线| 亚洲男人的天堂狠狠| 男人舔奶头视频| 久久香蕉激情| 亚洲欧美精品综合一区二区三区| 国产黄色小视频在线观看| 中文字幕久久专区| 男女做爰动态图高潮gif福利片| 热99re8久久精品国产| 亚洲国产高清在线一区二区三| av视频在线观看入口| 天堂av国产一区二区熟女人妻 | 亚洲性夜色夜夜综合| 亚洲在线自拍视频| 国产私拍福利视频在线观看| 中出人妻视频一区二区| 一进一出抽搐gif免费好疼| a级毛片在线看网站| 欧美日韩国产亚洲二区| 亚洲熟妇熟女久久| 亚洲欧洲精品一区二区精品久久久| 97人妻精品一区二区三区麻豆| 别揉我奶头~嗯~啊~动态视频| 欧美日韩精品网址| 日本免费a在线| 波多野结衣巨乳人妻| 久久精品国产清高在天天线| 久久久久久亚洲精品国产蜜桃av| 999精品在线视频| 久久久久国内视频| 白带黄色成豆腐渣| 免费观看人在逋| 国产激情偷乱视频一区二区| 在线免费观看的www视频| 欧美极品一区二区三区四区| 国产av在哪里看| 99在线视频只有这里精品首页| 亚洲熟女毛片儿| 国产精品 国内视频| 99国产精品一区二区三区| 亚洲中文av在线| 亚洲人成网站高清观看| 两个人免费观看高清视频| 一卡2卡三卡四卡精品乱码亚洲| 亚洲精品在线观看二区| 日韩有码中文字幕| 久久婷婷成人综合色麻豆| 在线观看免费日韩欧美大片| 手机成人av网站| 性色av乱码一区二区三区2| 在线国产一区二区在线| 国产三级黄色录像| 成人18禁高潮啪啪吃奶动态图| 久久精品aⅴ一区二区三区四区| 可以免费在线观看a视频的电影网站| 国产精品影院久久| 一进一出抽搐动态| 日本免费一区二区三区高清不卡| 男人的好看免费观看在线视频 | 亚洲中文av在线| 亚洲欧美日韩高清在线视频| 久久天堂一区二区三区四区| 亚洲第一电影网av| 久久精品夜夜夜夜夜久久蜜豆 | 欧美高清成人免费视频www| 国产一区二区激情短视频| 免费观看精品视频网站| 亚洲18禁久久av| 国产aⅴ精品一区二区三区波| 国产蜜桃级精品一区二区三区| 老司机午夜福利在线观看视频| 久久久久亚洲av毛片大全| 非洲黑人性xxxx精品又粗又长| 国产精品久久久久久亚洲av鲁大| 亚洲一卡2卡3卡4卡5卡精品中文| 悠悠久久av| 在线观看免费午夜福利视频| 999精品在线视频| 俺也久久电影网| 女同久久另类99精品国产91| 免费人成视频x8x8入口观看| 亚洲色图av天堂| 国产成人精品无人区| 成人国产综合亚洲| 国产精品久久视频播放| 三级男女做爰猛烈吃奶摸视频| 最近最新免费中文字幕在线| 白带黄色成豆腐渣| 岛国在线免费视频观看| 亚洲一区中文字幕在线| 欧美在线一区亚洲| 欧美激情久久久久久爽电影| 两个人视频免费观看高清| 99国产精品一区二区三区| 91av网站免费观看| www日本在线高清视频| 一夜夜www| 日本熟妇午夜| 日韩av在线大香蕉| 国语自产精品视频在线第100页| 一级片免费观看大全| 久热爱精品视频在线9| 亚洲精华国产精华精| 麻豆成人av在线观看| 在线观看午夜福利视频| 日韩中文字幕欧美一区二区| 香蕉国产在线看| 免费在线观看影片大全网站| 午夜精品久久久久久毛片777| 我的老师免费观看完整版| 亚洲一卡2卡3卡4卡5卡精品中文| 午夜福利高清视频| bbb黄色大片| 日本五十路高清| 久久久久久亚洲精品国产蜜桃av| 精品久久久久久,| 特大巨黑吊av在线直播| 午夜a级毛片| 黄色丝袜av网址大全| 亚洲av美国av| 亚洲av中文字字幕乱码综合| 精品久久久久久久毛片微露脸| 一级毛片高清免费大全| 成在线人永久免费视频| 日本熟妇午夜| 亚洲黑人精品在线| 在线观看免费视频日本深夜| 青草久久国产| 日本免费一区二区三区高清不卡| 精品无人区乱码1区二区| 午夜福利18| √禁漫天堂资源中文www| 一进一出好大好爽视频| 精品国产乱子伦一区二区三区|