Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
HTTP Flood Attack Detection using Machine Learning, Deep Learning and Explainable AI
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.
Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.
2025 (Engelska)Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
Abstract [en]

Background: Distributed Denial-of-Service (DDoS) attacks, particularly HTTP Flood Attacks, pose a severe threat to the availability and performance of web-based services. These attacks exploit HTTP methods to flood servers, often producing traffic patterns that differ from normal user behavior. As attack patterns evolve, there is an increasing need for intelligent and adaptable detection techniques that not only identify threats accurately but also provide explainable insights into their decision-making processes.

Objectives: This thesis investigates the effectiveness of machine learning and deep learning models for detecting HTTP Flood Attacks. It also explores how explainable AI techniques can improve model interpretability and guide the selection of the most suitable models for real-time deployment.

Methods: The study evaluates seven supervised models: Logistic Regression, Support Vector Machine, Random Forest, k-Nearest Neighbors, LightGBM, Convolutional Neural Network, and Long Short-Term Memory. The CICIDS 2017 dataset was used to train and test the models. Performance was assessed using accuracy, precision, recall, and F1-score. SHAP (SHapley Additive Explanations) was applied to analyze the importance of input features and understand the models' prediction behavior.

Results: The k-Nearest Neighbors (KNN) model achieved the best overall performance with an F1-score of 0.977 and balanced precision and recall, demonstrating strong generalization and minimal misclassifications. LightGBM also performed competitively with high accuracy and computational efficiency. In contrast, deep learning models such as CNN and LSTM exhibited higher false positive rates due to over-reliance on a single feature. SHAP analysis highlighted that models with balanced feature importance distributions, such as KNN and LightGBM, were more interpretable and reliable.

Conclusions: Machine learning models, particularly KNN and LightGBM, offer effective solutions for detecting HTTP Flood Attacks, outperforming deep learning models in accuracy, explainability, and real-time feasibility. Explainable AI plays a vital role in building trust, reducing false positives, and enhancing the transparency of detection systems. Future work should focus on live deployment, adaptive learning mechanisms, and the development of automated response strategies.

Ort, förlag, år, upplaga, sidor
2025. , s. 84
Nyckelord [en]
HTTP Flood Attacks, Machine Learning, Explainable AI, SHAP, Intrusion Detection
Nationell ämneskategori
Telekommunikation
Identifikatorer
URN: urn:nbn:se:bth-28262OAI: oai:DiVA.org:bth-28262DiVA, id: diva2:1980071
Ämne / kurs
DV2572 Masterarbete i Datavetenskap
Utbildningsprogram
DVATK Masterprogram i telekommunikationssystem, 120 hp
Handledare
Examinatorer
Tillgänglig från: 2025-07-02 Skapad: 2025-07-01 Senast uppdaterad: 2025-09-30Bibliografiskt granskad

Open Access i DiVA

Thesis_Http_flood_attack_detection_Prajna_phani(1251 kB)407 nedladdningar
Filinformation
Filnamn FULLTEXT01.pdfFilstorlek 1251 kBChecksumma SHA-512
2e08ac20934eec47e394dea61d27c1099c6a8fda05153733bc4ea989a6e59e951cae065e1ed1134e9f0aefbfad7312a162eddbff4cb3cb528d3a05c644612ff8
Typ fulltextMimetyp application/pdf

Av organisationen
Institutionen för datavetenskap
Telekommunikation

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 408 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

urn-nbn

Altmetricpoäng

urn-nbn
Totalt: 416 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf