Skip to main content

Evaluating the Performance of LSTM and GRU in Detection of Distributed Denial of Service Attacks Using CICDDoS2019 Dataset

  • Conference paper
  • First Online:
Proceedings of 7th International Conference on Harmony Search, Soft Computing and Applications

Abstract

A Distributed Denial of Service (DDoS) attack occurs when an intruder or a group of attackers attempts to block legitimate users from accessing a service. A DoS attack is carried out by a single system, while a DDoS attack is carried out by numerous systems. DDoS attacks can be directed at several OSI layers. Deep learning has played a crucial role in the advancement of intrusion detection technologies in recent years. The main purpose of this work is to detect and identify DDoS attacks in the OSI model’s application, network, and transport layers using deep learning models. The proposed models have been evaluated against the CICDDoS2019 dataset which consists of application, network and transport layer DDoS attacks. For the CICIDDOS2019 dataset, Long-Short-Term memory and Gated Recurrent Unit attained an average accuracy of 99.4% and 92.5%, respectively. We also compared the suggested models’ performance to that of a few other higher accuracy models and found that the proposed models have higher accuracy with fewer epochs. In addition, the performance of the proposed system is also evaluated for various types of DDoS attacks in the CICDDoD2019 dataset and LSTM is found to produce good accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hsieh C-J, Chan T-Y, Detection of DDoS attacks based on neural network using apache spark. In: International conference on applied system innovation (ICASI), 26–30 May 2016. https://doi.org/10.1109/ICASI.2016.7539833

  2. Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, data sets, and comparative study. J Inf Secur Appl 50(4)

    Google Scholar 

  3. Doriguzzi-Corin R, Millar S, Scott-Hayward S, Martinez-del-Rinconand J, Siracusa D, LUCID: a practical, lightweight deep learning solution for DDoS attack detection IEEE Trans Netw Serv Manage. https://doi.org/10.1109/TNSM.2020.2971776

  4. Asad M, Asim M, Javed T, Beg MO, Mujtaba H, Abbas S (2020) Deep detect: detection of distributed denial of service attacks using deep learning. Comput J 63(7):983–994

    Google Scholar 

  5. Anthi E, Williams L, Burnap P, Pulse: an adaptive intrusion detection for the internet of things. In: Living in the internet of things: cybersecurity of the IoT—2018 conference, 28–29 Mar 2018. https://doi.org/10.1049/cp.2018.0035

  6. Doshi R, Apthrope N, Feamster N (2018) Machine learning DDoS detection for consumer Internet of Things devices. In: 2018 IEEE security and privacy workshops (SPW). https://doi.org/10.1109/SPW.2018.00013

  7. Elsayed MS, Le-Khac N-A, Dev S, Jurcut AD (2020) DDoSNET—a deep learning model for detecting network attacks. In: 2020 IEEE 21st international symposium on “a world of wireless, mobile and multimedia networks” (WoWMoM), 31 Aug–3 Sept 2020. https://doi.org/10.1109/WoWMoM49955.2020.00072

  8. Jiang J, Yu Q, Yu M, Li G, Chen J: ALDD: A hybrid traffic-user behavior detection method for application layer DDoS. In: 2018 17th IEEE international conference on trust, security and privacy in communications. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00225

  9. Shone N, Ngoc TN, Phai VD, Shi Q (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Topics Comput Intell 2(1)

    Google Scholar 

  10. Shurman M, Khrais R, Yateem A (2020) DoS and DDoS attack detection using deep learning and IDS. Int Arab J Inf Technol 17(4A)

    Google Scholar 

  11. Muraleedharan N, Janet B (2020) A deep learning based HTTP slow DoS classification approach using flow data. https://doi.org/10.1016/j.icte.2020.08.005

  12. Cil AE, Yildiz K, Buldu A, Detection of DDoS attacks with feed forward based deep neural network model. Expert Syst Appl 169:114520

    Google Scholar 

  13. Bolodurina I, Shukhman A, Parfenov D, Zhigalov A, Zabrodina L (2020) Investigation of the problem of classifying unbalanced datasets in identifying distributed denial of service attacks. J Phys Conf Ser 1679:042020

    Google Scholar 

  14. Sindian S, Sindian S (2020) An enhanced deep Autoencoder-based approach for DDoS attack detection. WSEAS Trans Syst Control 15

    Google Scholar 

  15. Kim J, Kim J, Kim H, Shim M, Choi E (2020) CNN-based network intrusion detection against denial of service attacks. Electronics 9(6):916

    Google Scholar 

  16. Dong S, Abbas K, Jain R (2019) A survey on Distributed Denial of Service (DDoS) attacks in SDN and cloud computing environments. IEEE Access 7:80813–80828. https://doi.org/10.1109/ACCESS.2019.2922196

    Article  Google Scholar 

  17. Bhardwaj A, Goundar S (2017) Comparing single tier and three tier infrastructure designs against DDoS attacks. Int J Cloud Appl Comput 7:59

    Google Scholar 

  18. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 7(7):80–84. https://doi.org/10.1109/MC.2017.201

    Article  Google Scholar 

  19. Hou J, Fu P, Cao Z, Xu A (2018) Machine learning based DDos detection through NetFlow analysis. In: MILCOM 2018—2018 IEEE military communications conference (MILCOM), pp 1–6. https://doi.org/10.1109/MILCOM.2018.8599738

  20. Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inf Secur Appl 50:102419

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Malliga Subrmanian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subrmanian, M., Shanmugavadivel, K., Nandhini, P.S., Sowmya, R. (2022). Evaluating the Performance of LSTM and GRU in Detection of Distributed Denial of Service Attacks Using CICDDoS2019 Dataset. In: Kim, J.H., Deep, K., Geem, Z.W., Sadollah, A., Yadav, A. (eds) Proceedings of 7th International Conference on Harmony Search, Soft Computing and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 140. Springer, Singapore. https://doi.org/10.1007/978-981-19-2948-9_38

Download citation

Publish with us

Policies and ethics