精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

Geyecloud's Technology Director Explains How Artificial Intelligence Assists in Detection of

原創 精選
Techplur
In this article, we invited Mr. Fu Jixiang, Technology Director of Geyecloud.com, to share his insights on how artificial intelligence can help to tackle security issues that used to be challenging to

Advanced persistent threats (APT) are hard to be detected because of their variability and strong invisibility. To combat them, enterprises have been seeking methods such as adopting artificial intelligence to solve this problem more efficiently and accurately.

In this article, we invited Mr. Fu Jixiang, Technology Director of Geyecloud.com, to share his insights on how artificial intelligence can help to tackle security issues that used to be challenging to resolve with traditional feature detection methods.


Challenges of APT detection

Generally, advanced persistent threats refer to cyberattacks carried out by an organized team that uses the information they have to build corresponding weapons and attack means, which are utilized in long-term continuous cyberattacks.

Several stages could be involved in the attack chain, including:

scanning detection,

attempted attacks,

exploiting vulnerabilities,

Trojans in downloads,

gaining remote control,

horizontal penetration,

harvesting operations,

Complex and highly sophisticated in terms of methods and payloads, these attacks are those viewed as advanced persistent threats by professionals in the security field.

As part of the defending process, it is necessary to determine the attack mechanisms to respond to and dispose of them. Unfortunately, traditional feature detection techniques are not well-suited to dealing with these higher-level threats.

Usually, when a new threat arises, defenders have to obtain a sample of it first. Then they need to update the network security equipment to detect or defend against it based on the analysis of the sample.

The problem, however, is that there is a defense vacuum for unknown threats before upgrading security protections or detection appliances. Today we could see variants of malicious code, such as malevolent samples and Trojan horses, and attackers will allow the sample to bypass defenses and detections. In this manner, an attacker can hide or obfuscate features that the antivirus software may have detected. Thus, the antivirus, the file hash code, or the signature code will no longer be able to see these threats effectively.

Through the entire process of the attack chain, some behaviors can be easily found by specific means such as detection engines. Despite this, there will also be hidden parts of the process that will be difficult to discover, which are equally important to assess the attacking circle. Currently, many cyberattacks use encryption techniques, and in the entire network traffic, we can only see handshakes and certificate information. With only this information, it will be impossible to determine whether there is a problem with the encrypted traffic load or whether a Trojan or malicious attack is taking place.

Upon completion of the intrusion, the computer will connect to its command and control (C&C) server to maintain communication and receive the attacker's following instructions. Today, firewalls are common network security appliances that do not intercept or deeply examine popular protocols such as DNS, HTTP, and ICMP. Therefore, using standard network protocols for C&C communication in the above back-connection process is advisable if you desire covert communication.

Cryptographic agents that are malicious will encrypt the entire session. Browsers that offer dark web access, such as Onion, can mask content and access behaviors. It is also possible to hide the communication behavior using an open VPN service. These clues may provide the key to identifying the entire attack chain.


AI application in APT detection

Protocols control how behaviors interact in a network. Multiple interactions occur between the client and server in the network whenever a client visits a website or sends an email. In this process, the information returned from the website end is usually greater than the request information sent. The process can be visualized, and the network behavior can be modeled.

Data leaking by Trojans also involves multiple rounds of data interaction. This creates a dominant pattern based on the distribution of session data in time and packet size. It is necessary to construct a pattern for all traffic to identify it, and a model of AI can be employed to learn this pattern.

This scenario would benefit from the use of artificial intelligence. For example, Apple's virtual assistant Siri captures speeches, converts them into digital signals, and then extracts linear parameters to construct feature vectors by combining multidimensional data. Later, it is given to an artificial intelligence algorithm for modeling. As soon as the model is constructed, the speech can be effectively recognized.

Likewise, network traffic patterns can be identified using a similar process. Samples of uplink and downlink bidirectional network session packets are collected first, and the packet content will be digitized. After that, the message content will be parsed by different ways, such as protocol parsing at the network, transport, and application layers. The packets can also be counted in this process, and then the data can be learned through pre-modulated algorithms and applied to network security appliances.

A key component of the above process is identifying the data source. There are many Trojan horses on the Internet that send encrypted traffic. As a result, Trojan samples can be captured and placed within a sandboxed cluster environment to generate Internet traffic and capture encrypted PCAP traffic. In addition, many websites or academic institutions will disclose some encrypted PCAP traffic and malicious encrypted traffic, which are valuable data sources.

It should be noted that not all original traffic or files can be applied directly. Once the data capture has been completed, it must be analyzed to determine the data quality and filtered accordingly. A standard or security appliance engine is used to parse the traffic and extract statistics and feature data. AI engineers analyze the acquired data by applying various models or algorithms to classify it into several categories.

Classification begins by determining whether there are other protocol traffic flows. There are many Trojans that simulate normal web browsing behaviors to avoid detection. In this case, we could capture the DNS context associated with the session and then analyze and extract the data.

Furthermore, to gather different kinds of interaction data, the session must first be authenticated with TLS.

The practice can be analyzed based on the two dimensions mentioned above: whether DNS is associated and its authentication is complete. By dividing the data into four groups and using these data to train models, different models can effectively identify the data in the corresponding categories.

Once the data has been classified, the features will need to be extracted to construct feature vectors.

First, it can distinguish what data it will extract based on whether DNS-associated data is present. If no DNS-associated data exists, its statistics and TLS protocol data are extracted.

Second, take note of the encryption certificate data. These data are converged together to generate feature vectors. As for the DNS association data, we should consider extracting DNS-related fields such as domain length, domain suffix, and TTL to form feature vectors.

Lastly, before training and modeling, it is necessary to conduct visualized dimensionality reduction analysis to determine whether AI algorithms can classify data effectively. In terms of the dimensionality reduction graph, this is more like identifying a curve or surface that will enable us to evaluate whether the AI algorithms are capable of accurately categorizing the data. Many algorithms are available for dimensionality reduction, e.g., the PCA algorithm, and different algorithms will be appropriate for various practical purposes.

Modeling is the next step in the process. Deep learning has recently gained popularity as an alternative to traditional machine learning. A better identification effect and accuracy of malicious encrypted traffic can be achieved through ensemble learning algorithms, which use multiple machine learning algorithms within one model or in conjunction with one machine learning algorithm to build multiple submodels.

Some rapidly-changed variants of malicious files are also advanced threats. The traditional feature codes have difficulty keeping up with the production of new variants of the samples. By transforming the file into an image, the file can be indirectly identified by a convolutional neural network capable of recognizing the image. Convolutional neural networks for image recognition are not as computationally intensive as traditional feature detection algorithms.

Specifically, the malicious code needs to be mapped as a grayscale image and extracted features. Then, the features are used for clustering, and clustering results are used to identify malicious code families. The next step is to build a CNN model and set up the network structure and training parameters. A convolutional neural network is then trained with grayscale image sets from the malicious code family to build the detection model. Finally, the detection model can detect malicious code families and variants.

Currently, many malicious programs communicate with external entities of the enterprises through covert channels. DNS covert channels allow leaky data to be encoded in BASE64 as a subdomain and transmitted through the firewall using the DNS protocol to the controlled server. Requests and responses can also be sent using a DNS 'text' (TXT) record. Similarly, hackers register the domain's resolution server to retrieve the desired data.

The ICMP channel is one of the most commonly used methods. Generally, it uses the ICMP packets of Echo and Reply to locate the fields within them and then populate them with data. Similarly, it may be transformed into another form by encoding or encryption before being sent out repeatedly in multiple frequencies to a controlled server.

Another common covert channel is HTTP, which is an application layer protocol. After it establishes a channel, we can use it to transmit some data on the transport layer or TCP/IP layer, i.e., data is carried through the upper application layer. When this occurs, a firewall is unable to intercept the information effectively.

We must obtain the corresponding tool traffic or real channel traffic to solve the problem. Following this, the DNS and other protocol traffic feature vectors are extracted. This includes both the content of the protocol itself as well as the statistical feature values, which form the feature vector. Finally, it is used as the basis for training a machine learning or ensemble learning model. With the trained model, the previously mentioned tools can identify traffic patterns.

Several methods can be used to improve the accuracy of the models discussed above. In utilizing AI, we can establish models based on different classes of data related to a specific issue using various algorithms. It is then possible to integrate these models and make them worthwhile. In addition, the same algorithm may be trained with different data to set up models that can be used in parallel. Blacklists and whitelists can also be considered alternatives to the AI approach for improving the model's accuracy.

Modeling involves a large number of processes and tools, and the entire process can be incorporated through modeling platforms and tool scripts. Many algorithms and libraries are currently available for application, such as TensorFlow and MLlib. Furthermore, the model can be continuously improved through multiple rounds of iteration to make it more adaptable to new sample categories or to reduce its false alarm rates.


Case studies and practical results

The trained model can be put into the appliance if the data input source is traffic. The original network traffic can be provided so that the appliance can use the built-in parsing engine to perform protocol parsing and feature vector extraction on the traffic, which can then be passed to the AI model for detection.

For the training of neural network-like deep learning algorithms requiring high computing power, you can use multiple devices or GPUs. While machine learning algorithms do not ask for high computing power. Alternatively, a distributed architecture can be used to apply the model, with the front-end appliance analyzing traffic protocols and generating metadata; the back-end appliance extracts feature vectors and pass them to the model.

Besides AI models, other detection methods can also be used in threat detection. For example, antivirus engines, Yara, features, threat intelligence, etc., can be combined with other applications to create a comprehensive solution. Furthermore, malicious encrypted traffic gives rise to another difficulty in the production environment; that is, if a problem is discovered, it is hard to determine whether it exists, which may be verified through other indirect means.

Consider the following scenario. An internal host accessed an external server and triggered an alarm on malicious encrypted traffic. Thus, we could assess the original host and attempt to make sure whether it has recently been attacked, whether there are harmful samples or Trojans, and whether it has been compromised successfully. On the remote end, we can identify whether there is a problem with the remote server by using IP or domain name intelligence. There is a greater chance of the event being malicious if both ends of the chain are risky.

A web-based attack can be evaluated by extracting its payload. For example, if it had experienced SQL injection, the injected content can be extracted in the traffic, allowing the injected statements to be seen after decoding. Webshell can also identify whether the content inside is abnormal access, much like XSS and other threats.

A complete attack process could be like the below image: a ransomware program is delivered to an asset of internal concern. The asset parses DNS and obtains an IP address, and then covert HTTP channels occur. All events are recorded in raw format. Additionally, the system automatically combines different events to form a more advanced alert. The entire process can also be visually and dynamically displayed, making it easy to understand and retrace which assets, external IP addresses, or devices have been connected to our network.

Upon threat detection with AI algorithms, it is possible to associate threats with different dimensions, such as the asset we are concerned about, the network behavior of the asset, and external threat intelligence. Then, a dynamic knowledge graph can be created. By relating form data intelligently, we will be able to improve the analysis efficiency, traceability, and ultimately, our daily operations.


Guest Introduction

Mr. Fu Jixiang is a graduate of Northeastern University with a degree in Information Security. Prior to joining Geyecloud.com as the technology director and pre-sales leader, he worked for KDDI China, Huawei, and WebRAY. As a network security expert with over ten years of experience, he specializes in applying artificial intelligence, big data, and network traffic analysis to detect advanced persistent threats.

Previously Mr. Fu was invited as a guest speaker at the Information Security Conference and the XFocus Information Security Conference (Xcon). Besides being interviewed, he also gave an impressive speech at the release conference of the 'Enterprise Advanced Threat Protection Guide' by one of China's leading cybersecurity media outlets aqniu.com.

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2022-08-31 16:38:34

AISummitAI

2021-01-15 12:56:36

人工智能人工智能應用

2021-09-26 12:00:58

AI創新Gartner

2009-12-24 10:16:19

Systems Dir

2012-09-13 09:47:16

CA收購PGTI

2012-05-29 09:44:30

戴爾Wyse Techno云計算

2014-10-15 14:07:40

思科UCS

2011-03-11 09:34:23

VMware vClo

2012-08-16 09:32:19

VMware

2011-08-01 16:52:00

ibmdwAIX

2012-09-13 11:17:22

IBMdw

2012-06-27 09:47:05

ibmdw

2010-12-29 10:25:07

VMControl

2013-02-21 10:07:28

vFabric AppVMware云平臺

2012-05-09 11:34:48

JavaScriptMotion Dete

2011-04-19 13:48:55

vCloud Dire

2018-08-10 08:45:10

2011-04-19 13:32:52

2022-08-30 19:53:54

cognitiveAINLP

2011-09-07 01:03:01

ibmdwDB2
點贊
收藏

51CTO技術棧公眾號

国产一级在线观看视频| 色黄视频免费看| 91精品专区| 福利片在线看| 国语对白在线刺激| 91在线porny国产在线看| 91超碰caoporn97人人| 欧美亚一区二区三区| 亚洲精品国产嫩草在线观看| 中文字幕一区免费在线观看| 成人在线看片| jizz国产在线观看| 亚洲色图国产| 亚洲欧美www| 视频区 图片区 小说区| 厕沟全景美女厕沟精品| 亚洲人成网站在线| 日本视频一区二区在线观看| 国产黄色一区二区| 快she精品国产999| 九九精品在线播放| 最近中文字幕在线mv视频在线 | 亚洲精品v日韩精品| 韩日午夜在线资源一区二区| 一本久道久久综合无码中文| 亚洲国产黄色| 久久久精品网站| a级大片在线观看| 国产精品45p| 欧美老肥妇做.爰bbww| 黄色国产精品视频| 久草在线资源站资源站| 最新热久久免费视频| 欧美一区二区三区四区五区六区| 亚洲精品成人电影| 精品一区二区三区的国产在线播放| 1769国内精品视频在线播放| 国产女片a归国片aa| 免费久久精品| 精品视频在线播放色网色视频| 91插插插影院| 欧美美女福利视频| 色偷偷成人一区二区三区91 | 亚洲最大成人综合网| 久久久久观看| 亚洲成人久久久久| 国产伦理在线观看| 久久wwww| 日韩午夜中文字幕| 日韩精品视频网址| 在线观看欧美| 51久久夜色精品国产麻豆| 在线观看高清免费视频| 蜜桃成人精品| 欧美三级三级三级爽爽爽| 无遮挡又爽又刺激的视频| 国产精品一区二区av影院萌芽| 午夜伦欧美伦电影理论片| 91免费黄视频| 17videosex性欧美| 午夜成人免费视频| 亚洲午夜无码av毛片久久| √最新版天堂资源网在线| 亚洲成av人在线观看| 九九爱精品视频| 在线观看福利电影| 欧美专区亚洲专区| 向日葵污视频在线观看| 亚洲精品aaa| 日韩免费在线观看| 日韩Av无码精品| 少妇精品导航| 在线看日韩欧美| 糖心vlog免费在线观看| 国产精品分类| 九九精品视频在线| 日韩不卡在线播放| 日本亚洲欧美天堂免费| 国产专区欧美专区| 午夜精品久久久久久久91蜜桃| 懂色av一区二区三区免费观看| 国产高清一区视频| 欧美成人免费| 成人免费小视频| 精品久久久久久无码中文野结衣| 国产精品一二三产区| 色综合久久久久综合体| 日韩av在线中文| 伊人精品综合| 激情久久一区二区| 国产日韩欧美麻豆| 中文字幕第一页亚洲| 色呦呦呦在线观看| 欧美性猛xxx| 在线不卡一区二区三区| 99久热这里只有精品视频免费观看| 亚洲国产精品热久久| 制服 丝袜 综合 日韩 欧美| 久久精品青草| 91av在线播放| 国产乱码精品一区二区三区精东| 丁香婷婷综合色啪| 日韩欧美99| 欧美人与牲禽动交com| 日韩欧美中文字幕在线观看| 亚洲欧美日本一区二区三区| 国产成人澳门| 久久久精品在线| 99精品在线播放| 国产一区二区三区国产| 欧美日韩一区在线观看视频| 97超碰资源站在线观看| 色狠狠一区二区三区香蕉| 三上悠亚 电影| 国产一区二区三区四区二区| 欧美大片在线免费观看| 美女黄页在线观看| av在线播放不卡| 欧洲美女和动交zoz0z| 超碰超碰人人人人精品| 精品国产一区二区三区忘忧草| 国产123在线| 最新国产拍偷乱拍精品| 91久久国产综合久久91精品网站 | 亚洲国产精品免费| 欧美h片在线观看| 久久久久综合| 好吊色欧美一区二区三区四区| 黄色在线视频网站| 91国产福利在线| 亚洲第一成人网站 | 久久9精品区-无套内射无码| 蜜桃在线一区| 日韩一区二区在线视频| 无码人妻丰满熟妇精品| av午夜精品一区二区三区| 国产911在线观看| 欧洲一区在线| 免费不卡欧美自拍视频| 人妻中文字幕一区二区三区| 91在线视频18| 亚洲熟妇无码av在线播放| 精品国产伦一区二区三区观看说明| 伊人久久精品视频| 国产一级片av| 中文一区二区完整视频在线观看| 久草资源站在线观看| 一区二区三区国产好的精华液| 日韩色性视频| 精品国内亚洲在观看18黄| 在线免费看毛片| 中文字幕永久在线不卡| 午夜一级免费视频| 亚洲欧美偷拍自拍| 99在线看视频| 春色校园综合激情亚洲| 日韩激情视频在线| 国产区一区二区三| 国产欧美一区二区精品仙草咪| 日韩av资源在线| 久久99国内| 国产噜噜噜噜噜久久久久久久久| 波多野结衣在线网站| 欧美日韩免费不卡视频一区二区三区| 内射毛片内射国产夫妻| 精品一区二区影视| 国产精品视频网站在线观看| 好吊妞视频这里有精品| 4438全国亚洲精品在线观看视频| 日韩三级电影网| 欧美性极品少妇| 久久精品亚洲a| 国产麻豆欧美日韩一区| 日韩精品一区二区三区四| 国产精品白丝av嫩草影院| 777国产偷窥盗摄精品视频| 男女网站在线观看| 欧美日韩电影一区| 久久久精品国产sm调教| 99re热这里只有精品免费视频| 黑鬼大战白妞高潮喷白浆| 日韩激情一区| 国产成人女人毛片视频在线| 欧美在线极品| 日韩一区二区三区国产| 免费成人在线看| 欧美无砖砖区免费| 欧美日韩精品在线观看视频| 久久综合狠狠综合久久综合88| 天堂网在线免费观看| 欧美日韩一区二区国产| 久久久精彩视频| 成人av在线播放| 2023亚洲男人天堂| av网址在线| 亚洲免费电影在线观看| 99草在线视频| 欧美在线不卡视频| 国产精品成人久久| 欧美国产视频在线| 亚洲啪av永久无码精品放毛片 | 天堂av手机版| 欧美日韩和欧美的一区二区| 欧美一级高潮片| 国产精品萝li| 丝袜美腿中文字幕| 国产精品主播直播| 各处沟厕大尺度偷拍女厕嘘嘘| 国产精品福利在线观看播放| 九色91视频| 欧美成人一级| 国产精品丝袜高跟| 625成人欧美午夜电影| 欧美精品一本久久男人的天堂| 你懂的视频在线免费| 欧美xingq一区二区| 中文天堂在线视频| 日韩欧美在线观看视频| 久久久久久福利| 亚洲欧美综合在线精品| 久久久久久久久久久国产精品| 国产一区二区在线电影| 国产成人精品无码播放| 一区二区三区高清视频在线观看| 三级网在线观看| 欧美日韩国产传媒| 久久久久久亚洲精品不卡4k岛国| 欧洲大片精品免费永久看nba| 国产精品一区二区三区免费视频| xx欧美xxx| 77777亚洲午夜久久多人| 操喷在线视频| 精品中文字幕乱| 中国av在线播放| 久久久精品一区二区| 快射av在线播放一区| 色综合亚洲精品激情狠狠| 国产香蕉在线| 一本色道久久综合狠狠躁篇的优点 | 一本色道久久综合一区| 国产真实老熟女无套内射| 午夜日韩av| 国产欧美123| 黄色亚洲免费| 国产一区二区四区| 激情综合网址| 欧美久久久久久久久久久久久| 欧美日韩一区二区高清| 成年人网站国产| 日韩视频二区| 免费看的黄色大片| 免费在线亚洲| 日韩一级在线免费观看| 久久九九精品| 亚洲一区在线不卡| 久久99精品久久久久久久久久久久 | 免费在线看黄网址| 亚洲曰韩产成在线| 日本视频www| 欧美日韩精品在线视频| www.欧美色| 欧美三级日韩三级国产三级| 一级黄色大片免费观看| 91精品久久久久久久99蜜桃| 99国产精品一区二区三区| 欧美大片一区二区| 天天操天天插天天射| 日韩精品在线影院| 成人全视频高清免费观看| 日韩中文在线中文网三级| av在线免费播放| 午夜精品一区二区三区视频免费看| 色综合亚洲图丝熟| 国产精品va在线播放我和闺蜜| 97精品国产综合久久久动漫日韩| 国产精品爽黄69| 视频在线亚洲| 欧美日韩国产一二| 羞羞答答成人影院www| 18黄暴禁片在线观看| 久久午夜精品一区二区| mm131亚洲精品| 成人性视频网站| 性欧美一区二区| 亚洲欧美日韩系列| 亚洲GV成人无码久久精品| 欧美日韩精品久久久| 亚洲经典一区二区| 亚洲性无码av在线| 色老头在线观看| 国产精品电影网| 亚洲性视频在线| 日韩欧美亚洲精品| 欧美日韩亚洲一区三区| 免费男同深夜夜行网站| 国产一区啦啦啦在线观看| 国产传媒第一页| 自拍av一区二区三区| 波多野结衣视频网站| 欧美一区日韩一区| 精品亚洲成a人片在线观看| 欧美成人h版在线观看| 亚洲欧美一区二区三区| 亚洲影视九九影院在线观看| 亚洲素人在线| 17c丨国产丨精品视频| 美女任你摸久久| 少妇毛片一区二区三区| 亚洲美女偷拍久久| 狠狠躁夜夜躁人人爽视频| 精品国产sm最大网站免费看| av电影在线观看| 欧美中文在线观看国产| 亚洲3区在线| 在线视频福利一区| 日一区二区三区| 特级西西人体wwwww| 亚洲综合色视频| 国产精品久久久久久免费播放| 亚洲女人天堂成人av在线| 24小时免费看片在线观看| 亚洲一区二区免费| 日韩精品免费| 精品久久久久久久无码| 国产98色在线|日韩| 成人在线观看高清| 欧美日韩国产小视频| 国产午夜在线观看| 日本一区二区不卡| 小嫩嫩12欧美| 国产免费毛卡片| 91麻豆产精品久久久久久| 国产一级aa大片毛片| 日韩你懂的在线观看| 怡红院av在线| 91精品免费| 国内精品久久久久久久97牛牛 | 欧美日韩成人免费视频| 国产成人亚洲综合色影视| 欧美日韩午夜视频| 3atv在线一区二区三区| 蜜桃av在线免费观看| 国产一区二中文字幕在线看| 日韩欧美不卡| 校园春色 亚洲色图| 日本一区二区三区四区| 最近中文在线观看| 国产亚洲一区精品| 成人一区视频| 一区二区免费电影| 国产一区在线观看视频| 久草视频手机在线观看| 日韩精品自拍偷拍| 91探花在线观看| 蜜桃传媒视频麻豆一区 | 欧美主播福利视频| 精品一区免费| 天天色综合社区| 国产精品久久久久毛片软件| 一区二区三区免费在线| 插插插亚洲综合网| 国产精品极品国产中出| 黄色网页免费在线观看| 久久亚洲综合色一区二区三区| 国产又粗又猛又黄视频| 色青青草原桃花久久综合| 国产aa精品| 亚洲国产成人精品无码区99| 91一区二区三区在线观看| 男人天堂视频在线| 久久精品成人动漫| 视频精品二区| 黄色动漫网站入口| 国产精品久久久久影院亚瑟 | 亚洲精品一区二区在线| 欧美free嫩15| 国产日韩第一页| av爱爱亚洲一区| 中文字幕欧美人妻精品| 欧美伦理91i| 国产精品亚洲片在线播放| 日本中文字幕观看| 亚洲成人www| 成人h小游戏| 成人三级在线| 蜜桃传媒麻豆第一区在线观看| 亚洲一级生活片| 亚洲摸下面视频| 欧美三级一区| 成年人网站大全| 亚洲精品国产高清久久伦理二区| 日日噜噜噜噜夜夜爽亚洲精品| 婷婷综合视频| 日韩综合第一页| 欧美丰满少妇xxxbbb| 九色porny丨入口在线| 亚洲一卡二卡三卡四卡无卡网站在线看| 国产乱码精品一区二区三区忘忧草 | 在线免费看av| 国产欧美一区二区三区另类精品 |