999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Optimal Machine Learning Enabled Intrusion Detection in Cyber-Physical System Environment

2022-11-11 10:45:30BassamAlqarallehFahadAldhabanEsamAlQarallehsandAhmadAlOmari
Computers Materials&Continua 2022年9期

Bassam A.Y.Alqaralleh,Fahad Aldhaban,Esam A.AlQarallehs and Ahmad H.Al-Omari

1MIS Department,College of Business Administration,University of Business and Technology,Jeddah,21448,Saudi Arabia

2School of Engineering,Princess Sumaya University for Technology,Amman,11941,Jordan

3Faculty of Science,Computer Science Department,Northern Border University,Arar,91431,Saudi Arabia

Abstract: Cyber-attacks on cyber-physical systems(CPSs)resulted to sensing and actuation misbehavior,severe damage to physical object,and safety risk.Machine learning(ML)models have been presented to hinder cyberattacks on the CPS environment; however, the non-existence of labelled data from new attacks makes their detection quite interesting.Intrusion Detection System(IDS)is a commonly utilized to detect and classify the existence of intrusions in the CPS environment,which acts as an important part in secure CPS environment.Latest developments in deep learning(DL)and explainable artificial intelligence(XAI)stimulate new IDSs to manage cyberattacks with minimum complexity and high sophistication.In this aspect,this paper presents an XAI based IDS using feature selection with Dirichlet Variational Autoencoder(XAIIDS-FSDVAE)model for CPS.The proposed model encompasses the design of coyote optimization algorithm(COA)based feature selection(FS)model is derived to select an optimal subset of features.Next, an intelligent Dirichlet Variational Autoencoder (DVAE)technique is employed for the anomaly detection process in the CPS environment.Finally, the parameter optimization of the DVAE takes place using a manta ray foraging optimization(MRFO)model to tune the parameter of the DVAE.In order to determine the enhanced intrusion detection efficiency of the XAIIDS-FSDVAE technique, a wide range of simulations take place using the benchmark datasets.The experimental results reported the better performance of the XAIIDSFSDVAE technique over the recent methods in terms of several evaluation parameters.

Keywords: Cyber-physical systems; explainable artificial intelligence; deep learning;security;intrusion detection;metaheuristics

1 Introduction

Cyber-physical systems(CPS)being a strongly coupled combination of physical systems,computing systems,and communication devices,have proved to pose many security problems because of their basic complex design[1].The CPS has wide-ranging applications includes transport industry,aviation,chemical and consumer appliances,civil,and also in the fields of healthcare and manufacturing.The attack on a CPS might cause a failure of the system and lose sensitive data to the attackers[2].This could result in multiple losses.For preventing damages to systems and users,it is necessary to deploy and design secure CPS.It could assist in maintaining privacy and security for CPS and also improve the quality of applications[3].The security of CPS is an extension of traditional cybersecurity,wherein the process of the physical model is further taken into account.One of the most significant privacy problems in the traditional cybersecurity fields because of the risks of private data leaks are password cracking,which is password recovery method for the systems[4].In CPS security,simple data leaks by the password cracking could not damage the CPSs;but,the operation of the physical process by illegal access with a password could affect the dynamics of the physical system.

Hence, different CPS security researches have been carried out by modelling physical dynamics with control theory [5].But CPS is impacted by several factors, namely unexpected events, quick environment changes,and physical system-based CPS security suffers from false alarm that degrades recognition accuracy against cyber-physical attacks.Furthermore, the CPS becomes larger and the relationship of all the CPS components becomes difficult,the accuracy levels exhibited by a real CPS and the traditional CPS reduces which creates further attack vectors [6].From a control theoretical perspective,complex and massive models could be characterized as higher-order differential equations,in which arithmetical models with higher-order terms are susceptible to noise on the state variable.Hence, it is hard to attain accurate arithmetical models of complicated physical systems, as well as unconsidered arithmetical terms of the incorrect dynamic models, which turn out to be the vulnerability of the system-based attack detectors,which leads to incorrect recognition[7].

In order to conquer the limitation of legacy method-based CPS security,the data-driven anomaly recognition method(wherein abnormal information is attained from many controlled experiments and simulations)is adapted in CPS security[8].Especially,machine learning(ML)that shows correlation among input and output using large number of information without modelling based physical laws,is adapted in CPS security for satisfying reliability concerns and higher-level security[9].Moreover,ML technique enables a method to be made for the complex and massive relations of all the components of the CPS, involving several physical models in the real-time, complex application software, and heterogeneous network protocol in the cyberworld, the generated method could improve the safety levels of the CPSs.Fig.1 illustrates the process of explainable artificial intelligence(XAI)technique[10].

This paper presents an XAI based intrusion detection system (IDS)using feature selection with Dirichlet Variational Autoencoder(XAIIDS-FSDVAE)model for CPS.The presented strategy encompasses the design of coyote optimization algorithm(COA)based FS model is derived to elect an optimal subset of features.Next,an intelligent DVAE technique is employed for the anomaly detection process in the CPS environment.Finally,the parameter optimization of the DVAE takes place using a manta ray foraging optimization(MRFO)algorithm to tune the parameters of the DVAE.In order to determine the enhanced intrusion detection efficacy of the XAIIDS-FSDVAE technique,a wide range of simulations take place using the benchmark datasets.

Figure 1:Process of XAI

2 Related Works

Aljehane [11] presented a parameter-tuning deep-stacked autoencoder (PT-DSAE)based deep learning (DL)method for the IDS in CPS.The presented method comprises feature extraction,preprocessing,classification,and parameter tuning.Firstly,preprocessing is performed for eliminating the noise existing in the information.Followed by,a DL-based DSAE method is exploited for finding anomalies in the CPS.Furthermore,hyperparameter tuning of the DSAE performs by a search-andrescue optimization model for parameter tuning the DSAEs,namely the learning rate,epoch count,batch size,and the number of hidden layers.

Hariri et al.[12] introduced customized malware scripts to manipulate and sniff data and demonstrate the capacity of the malware for triggering false positives in the neural network response.The malware is proposed to be a vaccine to reinforce the IDS against data processing attacks by improving the capacity of the neural network to adapt and learn those threats.Li et al.[13]presented a federated DL method,termed DeepFed,to identify cyberattacks against industrial CPS.Especially,developed a new DL-based IDS for industrial CPSs, by using a gated recurrent unit (GRU)and convolutional neural network(CNN).Later,designed a federated learning architecture,which allows various industrial CPS models to jointly construct a wide-ranging IDS in a privacy-preserving method.

Gifty et al.[14]aimed at the privacy and security factors in handling big data for CPS and review current challenges in data integrity.As well,introduce a security architecture for IDS recognition and investigate the failure rate, performance parameter, and reliability in a malicious big data context.Belenko et al.[15] examined generative adversarial artificial neural network (ANN)for detecting security intrusion in largescale network of cyber devices.As per the outcomes of the experiment, a calculation is composed of applicability of generative adversarial ANN to identify privacy anomalies,and real-world recommendation is deliberated for using interconnected CPS.

Khan et al.[16] presented an architecture named Intrusion detection through electromagneticsignal analysis(IDEA)which exploits electromagnetic(EM)side-channel signals for detecting malevolent activities on embedded and CPSs.First, IDEA records EM emanation from uncompromised reference devices to determine a starting point of reference EM pattern.Then, IDEA monitors the targeted device’s EM emanation.Filho et al.[17] designed an fog based intrusion detection using generative adversarial network (FID-GAN).The IDS is presented for a fog framework that brings computational resources nearer to the end node and consequently contributes to meeting lower-latency requirements.To accomplish high detection rate,the presented framework computes a reconstruction loss-based reconstruction of data sample mapped to the latent space.

3 The Proposed Model

In this study,a novel XAIIDS-FSDVAE technique has been presented for the detection and classification of intrusion in the CPS environment.The XAIIDS-FSDVAE technique encompasses different subprocesses namely pre-processing,COA based election of features,DVAE based classification,and MRFO based parameter tuning.The COA application reduces the computational complexity and MRFO algorithm helps to accomplish maximum intrusion detection performance.Fig.2 illustrates the overall process of proposed XAIIDS-FSDVAE technique.

3.1 Data Pre-Processing

Primarily, the pre-processing of data is carried out to transform the actual data into a useful format and thereby improve the performance of the applied model.To accomplish this, a min-max normalization technique is performed, which rescales the output or features from a range of values into new ones (0 to 1 or -1 to +1).The rescaling process is performed by the utilization of linear interpolation process,as given below.

where(ymax-ymin) = 0; when(xmax-xmin) = 0 for a feature, it defines a continuous value for the feature.

3.2 Process Involved in COA Based Feature Selection Approach

At this stage, the preprocessed data is applied as input into the COA model to choose a useful set of features.COA is a recently established meta-heuristic technique which is presented by Pierezan et al.[18].This technique was dependent upon the alteration performance of coyotes by the environment and also the coyote experiences replacing.COA is a stimulating approach for obtaining a balance amongst exploration as well as exploitation.This technique begins withNPamount of populations andNccount of coyotes as candidate solution:

wherecrepresents the number andprefers to the group andtindicates the time of inspiration to the design variable.Primary, a few arbitrary coyotes are created as candidate solution from the search space.The subsequent formula demonstrated this procedure modeling:

whereη∈[0,1]refers to an arbitrary value andLrjandUrjsignifies the lower as well as upper ranges ofjthvariable from the search space:

This technique upgrades the group’s place arbitrarily.In addition,the candidate upgrades its place by leaving its groups to another one.The subsequent formula defines the leaving procedure dependent upon the probability design:

An optimum solution of all iterations is regarded as the alpha coyote and attained by the subsequent formula:

The general property of coyotes to the culture alteration is as follows:

where,Rp,tindicates the coyotes,social state ranking to group numberpat timetto the variablej:

where,rj∈[0,1]implies the arbitrary value andr2defines an arbitrary coyote from the groupsp,σjsignifies the arbitrary value from the design variable limit[19],j1andj2represents the arbitrary design variables, andpraandprsdemonstrates the connection and scatter probability correspondingly that announce the coyote cultural diversity in the group.The arithmetical process topraandprsis as follows:

wheredstands for the dimensional to variables.The cultural transitions amongst the group were determined by 2 features containingδ1andδ2as:

whereδ1stands for the culture variances amongst the leader (alpha)and chosen coyote(cr1)andδ2implies the culture variance amongst group culture trending and the chosen coyote(cr2):

wherer1andr2represents the arbitrary numbers amongst zero and one.With assuming the upgrade formulas,a novel cost was lastly attained by the subsequent formula:

An essential part of these approaches is their ability to escape at the local optimal point.

The feature selection using the FS approach can be denoted as aNsized vector whereNindicates the feature count[20].Here,every location of the vectors can consider the values as 0 or 1 in which 0 signifies the features which are unselected and 1 denotes the chosen features.The transfer function approach signifies the possibility of varying a position vector component from 0 to 1 and vice versa more easily and effectively.A transfer function considerably influences the outcome of the FS technique at the time of searching the optimal set of features related to avoiding local optimal problems and maintaining the tradeoff among exploration as well as exploitation processes:

wherenew-indicates the upgraded social condition vector by considering the constant values[21].

3.3 Intrusion Detection Using DVAE Model

During the intrusion detection process,the DVAE model can be employed for the detection and classification of intrusions in the CPS environment.The major difference of the generative approaches is the preceding distribution supposition on the latent parameterz.Rather than the utilization of the uniform Gaussian distribution,the Dirichlet distribution can be employed,representing a conjugate prior distribution of the multi-nomial distribution[22].

The probabilistic encoding unit with an approximation of the posterior distributionq?(z|x) can be defined as DirichletThe approximation of the posterior variablecan be defined using the multilayer perceptron(MLP)from the observationxin data setDwith positive outcome functions like softplus function,therefore,the outcome could be positive value limited by the Dirichlet distribution.Initially,it is considered thatv~MultiGamma(α,β1K).Afterward,vis normalized to the summation∑vi.The objective function aims in the optimization of the model variablesθand ?.The loss function used for the optimization next to the composition is presented in Eq.(18).The inverse Gamma cumulative distribution function(CDF)approach allows the flow of backpropagation into the input with stochastic gradient descent (SGD).Then, the Dirichlet distribution with inverse Gamma CDF approximation and softmax Gaussian approach can be compared,assumeαk=1-1/Kwhenμk=0 and∑k=1;andβ=1.

The approximation with inverse GammaCDF.When if ~Gamma(α,β), and ifF(x;α,β) is a CDF of the arbitrary variableX[23],the inverse CDF undergo approximation byF-1(u;α,β) ≈β-1(uαΓ(α))1/α.Therefore,the secondary parameteru~Uniform(0,1)for considering the arbitrariness ofX,and the Gamma undergoes samplingXas a deterministic value forαandβ.

3.4 Parameter Optimization Using MRFO Algorithm

Finally, the parameter tuning of the DVAE model takes place using the MRFO algorithm such that the recognition rate could be improvised.Zhao et al.[24] projected a state-of-the-art metaheuristic optimized manner called MRFO simulated in the foraging approach then manta ray from catch its prey.In 3 foraging functions like somersault,chain,and cyclone foraging.The chain foraging procedure is written as:

whererefers theithindividuals place at iterationst,rimplies the arbitrary vector from range;indicates the optimum solution at iterationst,Ncharacterizes the amount of manta rays andαmeans the weighting coefficient as:

Mentioning to Eq.(7),the place ofithindividual excepts a primary one is based on the place of(i-1)thindividualsand optimum oneOnce the place of the plankton patch was detected by manta ray, it is join creating chain, and afterward swim near the prey from spiral shapes.Also,the spiral swimming,all individuals swim near the manta ray in front,it can be monitored in cyclone foraging[25].This effort was expressed as:

whereωstands for an arbitrary number from range,the cyclone foraging stage is demonstrated as:

whereβimplies the weighting factors determined as:

wheretrefers to the present iterations,Tstands for the maximal count of iterations andr1indicates the arbitrary number from range.The cyclone foraging is an optimum use to better solutions region as every manta ray do exploring method to the food-dependent upon its reference places.Also,this procedure improves the exploration procedure using the strength of individuals for searching novel places that are far from the present optimum.This performance is carried out by allocating an arbitrary place from the search space as:

whereLbandUbdefines the lower as well as upper limits of problem variable,χrandrefers to the arbitrary place allocated to the search spaces.The last stage monitored in MRFO was somersault foraging whereas the food was detected as hinge.During this phase,all manta rays prefer swim back and forth about the hinge as well as tumble to novel place.It could be mathematically written as:

whereSimplies the factor of somersault utilized from determining the manta ray somersault range,r2andr3represents the arbitrary numbers from the range.As regards Eq.(20),all individuals are moved to someplace from the search space amongst their present place and symmetrical one around the hinge.In this stage,the distances amongst the manta rays places an optimum one decreases that means converging to optimum solutions.Therefore,the somersault foraging range was adaptably decreased with iteration.

The MRFO approach develops a fitness function (FF)for attaining enhanced classification efficiency.It defines a positive integer for representing the optimum efficiency of the candidate solution.During this analysis, the minimized classifier error rate was assumed as FF, as provided in Eq.(27).The optimum solutions have a lesser error rate and the worst solution gains a higher error rate.

4 Results and Discussion

The experimental validation of the XAIIDS-FSDVAE technique takes place using the CICIDS-2017[26]and NSL-KDD-2015[27]datasets.The first NSL-KDD 2015 data set has 125973 instances with two classes,41 features,and five kinds of attacks.Secondly,the CICIDS-2017 data set includes 2830743 samples with two classes and 80 features.The best cost(BC)analysis of the COA-FS model with other FS models takes place in Tab.1 and Fig.3.The results show that the COA-FS technique has chosen a set of 16 and 42 features on the test NSL-KDD-2015 and CICIDS-2017 datasets.On the test NSL-KDD-2015 dataset,the COA-FS technique has depicted minimum BC of 0.05321 while the grey wolf optimization(GWO)-FS, ant colony optimization(ACO)-FS, and particle swarm optimization(PSO)-FS models have attained maximum BC of 0.06495,0.10646,and 0.12680 respectively.Likewise,on the test CICIDS-2017 datasets,the COA-FS procedure has offered lower BC of 0.05341 while the GWO-FS,ACO-FS,and PSO-FS systems have resulted in higher BC of 0.09486,0.12543,and 0.13557 respectively.

Table 1: Results of existing methods with proposed COA-FS method on applied dataset

Tab.2 offers a detailed intrusion detection result analysis of the XAIIDS-FSDVAE technique on the test NSL-KDD-2015 dataset.Fig.4 illustrates the brief result analysis of the XAIIDS-FSDVAE technique under BS of 64 on the test NSL-KDD-2015 datasets.The figure displayed that the XAIIDSFSDVAE technique has gained improved performance under all epochs.For instance,with 100 epochs,the XAIIDS-FSDVAE technique has provideden,recl,Fmeasure, andaccyof 99.21%, 99.38%, 99.32%,99.54%, and 99.42% respectively.Similarly, with 500 epochs, the XAIIDS-FSDVAE technique has resulted toen,recl,Fmeasure,andaccyof 99.34%,99.18%,99.52%,99.34%,and 99.28%respectively.

Figure 3:BC analysis of COA-FS technique

Table 2: Intrusion detection results of XAIIDS-FSDVAE technique on NSL-KDD-2015 dataset

Fig.5 demonstrates the overall intrusion detection result analysis of the XAIIDS-FSDVAE technique under BS of 32 on the test NSL-KDD-2015 datasets.The figure shows that the XAIIDSFSDVAE technique has obtained effective outcomes under all epochs.For instance,with 100 epochs,the XAIIDS-FSDVAE technique has provideden,recl,Fmeasure, andaccyof 99.49%, 99.20%, 99.12%,99.17%, and 99.54% respectively.Likewise, with 500 epochs, the XAIIDS-FSDVAE technique has attaineden,recl,Fmeasure,andaccyof 99.15%,99.22%,99.30%,99.02%,and 99.45%respectively.

Figure 4:Result analysis of XAIIDS-FSDVAE technique under BS of 32 on NSL-KDD-2015 dataset

Figure 5:Result analysis of XAIIDS-FSDVAE technique under BS of 64 on NSL-KDD-2015 dataset

Fig.6 depicts the receiver operating characteristic (ROC)analysis of the XAIIDS-FSDVAE approach on NSL-KDD-2015 dataset.The figure clear that the XAIIDS-FSDVAE process has reached increased outcome with the minimal ROC of 99.8110.

Tab.3 illustrates a comprehensive intrusion detection result analysis of the XAIIDS-FSDVAE technique on the test CICIDS-2017 dataset.

Fig.7 exhibits the overall intrusion detection result analysis of the XAIIDS-FSDVAE technique under BS of 32 on the test CICIDS-2017 dataset.The figure revealed that the XAIIDS-FSDVAE technique has obtained operational outcomes under all epochs.For instance, with 100 epochs, the XAIIDS-FSDVAE technique has provideden,recl,Fmeasure, andaccyof 99.27%, 99.36%, 99.35%,98.90%,and 99.11%respectively.Simultaneously,with 500 epochs,the XAIIDS-FSDVAE technique has attaineden,recl,Fmeasure,andaccyof 99.16%,99.20%,99.19%,99.31%,and 99.21%respectively.

Figure 6:ROC analysis of XAIIDS-FSDVAE technique on NSL-KDD-2015 dataset

Table 3: Intrusion detection results of XAIIDS-FSDVAE technique on CICIDS-2017 dataset

Figure 7:Result analysis of XAIIDS-FSDVAE technique under BS of 32 on CICIDS-2017 dataset

Fig.8 validates the brief result analysis of the XAIIDS-FSDVAE technique under BS of 64 on the test CICIDS-2017 dataset.The figure exhibits that the XAIIDS-FSDVAE algorithm has extended better performance under all epochs.For instance,with 100 epochs,the XAIIDS-FSDVAE technique has provideden,recl,Fmeasure,andaccyof 99.21%,99.38%,99.32%,99.54%,and 99.42%respectively.In the same way,with 500 epochs,the XAIIDS-FSDVAE technique has led toen,recl,Fmeasure,andaccyof 99.35%,99.22%,99.23%,99.10%,and 99.15%respectively.

Figure 8:Result analysis of XAIIDS-FSDVAE technique under BS of 64 on CICIDS-2017 dataset

Fig.9 demonstrates the ROC analysis of the XAIIDS-FSDVAE technique on CICIDS-2017 dataset.The figure exposed that the XAIIDS-FSDVAE technique has reached enhanced outcome with the minimum ROC of 99.6543.

Figure 9:ROC analysis of XAIIDS-FSDVAE technique on CICIDS-2017 dataset

Tab.4 and Fig.10 provide a brief result analysis of the XAIIDS-FSDVAE technique with recent methods.The figure reported that the decision tree (DT), random forest (RF), and Adversarially Learned Anomaly Detection(ALAD)techniques have showcased poor performance with least values ofen,recl,andFmeasure.Followed by,the FID-GAN and Multivariate Anomaly Detection with GAN(MAD-GAN)techniques have resulted in slightly improved values ofen,recl,andFmeasure.Along with that,the DVAE and PT-DSAE techniques have reached moderately closer values ofen,recl,andFmeasure.But the XAIIDS-FSDVAE technique has outperformed the other methods with theen,recl,andFmeasureof 99.20%,99.23%,and 99.27%respectively.

Table 4: Result analysis of existing with proposed model in terms of different measures

Figure 10:Comparative analysis of XAIIDS-FSDVAE technique

A comparativeaccyanalysis of the XAIIDS-FSDVAE system with existing methodologies are shown in Fig.11.The figure reported that the DT and ALAD techniques have obtained loweraccyvalues of 93.65% and 94.10% respectively.In line with, the MAD-GAN, FID-GAN, and RF techniques have attained moderately closeraccyvalues of 96.80%, 96.07%, and 95.98% respectively.Moreover,the DVAE and PT-DSAE technique has resulted in reasonableaccyof 99.02%and 98.49%respectively.However, the XAIIDS-FSDVAE methodology has outperformed the existing systems with the highestaccyof 99.27%.

Figure 11:Accuracy analysis of XAIIDS-FSDVAE technique

5 Conclusion

In this study, a novel XAIIDS-FSDVAE approach has been presented for the detection and classification of intrusion in the CPS environments.The XAIIDS-FSDVAE technique encompasses different subprocesses namely pre-processing,COA based election of features,DVAE based classifiers,and MRFO based parameter tuning.The COA application reduces the computational complexity and MRFO algorithm helps to accomplish maximum intrusion detection performance.For demonstrating the enhanced intrusion detection efficiency of the XAIIDS-FSDVAE technique, a wide range of simulations take place using the benchmark datasets.The experimental results reported the better performance of the XAIIDS-FSDVAE technique over the recent methods in terms of several evaluation parameters.As a part of future extension,outlier detection and cluster-based approaches can be designed to boost the detection rate of the XAIIDS-FSDVAE technique.

Funding Statement:This Research was funded by the Deanship of Scientific Research at University of Business and Technology,Saudi Arabia.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 国产呦视频免费视频在线观看| 日韩精品一区二区三区中文无码| 久久人与动人物A级毛片| 2018日日摸夜夜添狠狠躁| 亚洲第一页在线观看| 伊人婷婷色香五月综合缴缴情| 久久综合国产乱子免费| 欧美综合一区二区三区| 日韩欧美中文字幕一本| 亚洲第一成年网| 欧美亚洲国产精品久久蜜芽| 精品成人一区二区| yy6080理论大片一级久久| 国产真实自在自线免费精品| 午夜少妇精品视频小电影| 99一级毛片| 四虎国产精品永久在线网址| 国产成人高清在线精品| 久久男人视频| 亚洲 日韩 激情 无码 中出| 欧美一级大片在线观看| 视频一区亚洲| 日韩最新中文字幕| 无码人中文字幕| a在线亚洲男人的天堂试看| 91小视频在线播放| 中文字幕亚洲无线码一区女同| 狠狠操夜夜爽| 亚洲国产精品VA在线看黑人| 亚洲69视频| 日韩精品视频久久| 永久免费无码日韩视频| 97狠狠操| 国内精自视频品线一二区| 欧美国产综合色视频| 试看120秒男女啪啪免费| 午夜国产小视频| 高清久久精品亚洲日韩Av| 亚洲视频免费在线| 国产午夜福利亚洲第一| 亚洲精品国偷自产在线91正片| 找国产毛片看| 亚洲综合极品香蕉久久网| 极品国产一区二区三区| 91人妻在线视频| 9久久伊人精品综合| 亚洲天堂成人在线观看| 亚洲成年人片| 成人精品区| 狂欢视频在线观看不卡| 国产在线精彩视频论坛| 免费看av在线网站网址| 日本人妻丰满熟妇区| 亚洲小视频网站| 99re在线免费视频| 美女被操黄色视频网站| 亚洲福利视频一区二区| 天天综合色网| 99精品视频九九精品| 美女高潮全身流白浆福利区| 国产美女视频黄a视频全免费网站| 专干老肥熟女视频网站| 久久婷婷国产综合尤物精品| 日韩精品毛片| 国产成人精品一区二区免费看京| a级毛片免费看| 99re热精品视频中文字幕不卡| 一区二区偷拍美女撒尿视频| 直接黄91麻豆网站| 在线亚洲精品自拍| 国产人免费人成免费视频| 久青草免费在线视频| 一级毛片在线免费视频| 日韩国产欧美精品在线| 性做久久久久久久免费看| 亚洲欧美日韩中文字幕在线| 国产成人福利在线| 久久毛片网| 成人午夜在线播放| 国产成人久久777777| 国产亚卅精品无码| 97青青青国产在线播放|