2020
DOI: 10.1109/tnsm.2020.2971776
|View full text |Cite
|
Sign up to set email alerts
|

Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection

Abstract: Distributed Denial of Service (DDoS) attacks are one of the most harmful threats in today's Internet, disrupting the availability of essential services. The challenge of DDoS detection is the combination of attack approaches coupled with the volume of live traffic to be analysed. In this paper, we present a practical, lightweight deep learning DDoS detection system called LUCID, which exploits the properties of Convolutional Neural Networks (CNNs) to classify traffic flows as either malicious or benign. We mak… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
121
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 250 publications
(126 citation statements)
references
References 57 publications
2
121
0
3
Order By: Relevance
“…Despite the detection performance of the proposed MLP is not the best when considering CIC-IDS2017, it still presents outstanding results, with Acc = 98.95%, DR = 98.31% and FAR = 0.15%. Note that our scheme is outperformed by [10], in which a convolutional neural network (CNN) based IDS is proposed. In [10], DDoS attacks and legitimate traffic patterns are learnt by CNN through convolutional filters sliding over packet flow inputs to identify anomalous characteristics, which may explain its higher Acc and DR results compared to our MLP based solution.…”
Section: A Resultsmentioning
confidence: 92%
“…Despite the detection performance of the proposed MLP is not the best when considering CIC-IDS2017, it still presents outstanding results, with Acc = 98.95%, DR = 98.31% and FAR = 0.15%. Note that our scheme is outperformed by [10], in which a convolutional neural network (CNN) based IDS is proposed. In [10], DDoS attacks and legitimate traffic patterns are learnt by CNN through convolutional filters sliding over packet flow inputs to identify anomalous characteristics, which may explain its higher Acc and DR results compared to our MLP based solution.…”
Section: A Resultsmentioning
confidence: 92%
“…Although it is not the best IDS among the compared ones, the proposed scheme still presents a considerable performance, with Acc = , DR = and FAR = for gradient boosting algorithm, outperforming almost all competitor schemes. It is worth to mention the performance shown by LUCID, proposed by Doriguzzi-Corin et al in [ 29 ], with Acc, DR and FAR of , and , respectively. The authors presented a practical, lightweight CNN-based DDoS detection architecture with low processing overhead and attack detection time.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Obviously, there are more sophisticated types of neural networks [52,53] that can classify DDoS network traffic with a higher accuracy. The above examples were only meant as an illustration of how security analysts could contribute different ML models and/or adversarial examples that are misclassified.…”
Section: Discussionmentioning
confidence: 99%