Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
HTTP Flood Attack Detection using Machine Learning, Deep Learning and Explainable AI
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
2025 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Background: Distributed Denial-of-Service (DDoS) attacks, particularly HTTP Flood Attacks, pose a severe threat to the availability and performance of web-based services. These attacks exploit HTTP methods to flood servers, often producing traffic patterns that differ from normal user behavior. As attack patterns evolve, there is an increasing need for intelligent and adaptable detection techniques that not only identify threats accurately but also provide explainable insights into their decision-making processes.

Objectives: This thesis investigates the effectiveness of machine learning and deep learning models for detecting HTTP Flood Attacks. It also explores how explainable AI techniques can improve model interpretability and guide the selection of the most suitable models for real-time deployment.

Methods: The study evaluates seven supervised models: Logistic Regression, Support Vector Machine, Random Forest, k-Nearest Neighbors, LightGBM, Convolutional Neural Network, and Long Short-Term Memory. The CICIDS 2017 dataset was used to train and test the models. Performance was assessed using accuracy, precision, recall, and F1-score. SHAP (SHapley Additive Explanations) was applied to analyze the importance of input features and understand the models' prediction behavior.

Results: The k-Nearest Neighbors (KNN) model achieved the best overall performance with an F1-score of 0.977 and balanced precision and recall, demonstrating strong generalization and minimal misclassifications. LightGBM also performed competitively with high accuracy and computational efficiency. In contrast, deep learning models such as CNN and LSTM exhibited higher false positive rates due to over-reliance on a single feature. SHAP analysis highlighted that models with balanced feature importance distributions, such as KNN and LightGBM, were more interpretable and reliable.

Conclusions: Machine learning models, particularly KNN and LightGBM, offer effective solutions for detecting HTTP Flood Attacks, outperforming deep learning models in accuracy, explainability, and real-time feasibility. Explainable AI plays a vital role in building trust, reducing false positives, and enhancing the transparency of detection systems. Future work should focus on live deployment, adaptive learning mechanisms, and the development of automated response strategies.

Place, publisher, year, edition, pages
2025. , p. 84
Keywords [en]
HTTP Flood Attacks, Machine Learning, Explainable AI, SHAP, Intrusion Detection
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:bth-28262OAI: oai:DiVA.org:bth-28262DiVA, id: diva2:1980071
Subject / course
DV2572 Master's Thesis in Computer Science
Educational program
DVATK Master´s Programme in Telecommunication Systems, 120 hp
Supervisors
Examiners
Available from: 2025-07-02 Created: 2025-07-01 Last updated: 2025-09-30Bibliographically approved

Open Access in DiVA

Thesis_Http_flood_attack_detection_Prajna_phani(1251 kB)367 downloads
File information
File name FULLTEXT01.pdfFile size 1251 kBChecksum SHA-512
2e08ac20934eec47e394dea61d27c1099c6a8fda05153733bc4ea989a6e59e951cae065e1ed1134e9f0aefbfad7312a162eddbff4cb3cb528d3a05c644612ff8
Type fulltextMimetype application/pdf

By organisation
Department of Computer Science
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 368 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 403 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf