An Explanation of the LSTM Model Used for DDoS Attacks Classification

With the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding how machine learning models work is not trivial. This is particularly true for complex and nonlinear models, such as deep learning models that...

Full description

Bibliographic Details
Main Authors: Abdulmuneem Bashaiwth, Hamad Binsalleeh, Basil AsSadhan
Format: Article
Language:English
Published: MDPI AG 2023-07-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/15/8820
_version_ 1827731461162139648
author Abdulmuneem Bashaiwth
Hamad Binsalleeh
Basil AsSadhan
author_facet Abdulmuneem Bashaiwth
Hamad Binsalleeh
Basil AsSadhan
author_sort Abdulmuneem Bashaiwth
collection DOAJ
description With the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding how machine learning models work is not trivial. This is particularly true for complex and nonlinear models, such as deep learning models that have high accuracy. The struggle to explain these models creates a tension between accuracy and explanation. Recently, different methods have been used to explain deep learning models and address ambiguity issues. In this paper, we utilize the LSTM model to classify DDoS attacks. We then investigate the explanation of LSTM using LIME, SHAP, Anchor, and LORE methods. Predictions of 17 DDoS attacks are explained by these methods, where common explanations are obtained for each class. We also use the output of the explanation methods to extract intrinsic features needed to differentiate DDoS attacks. Our results demonstrate 51 intrinsic features to classify attacks. We finally compare the explanation methods and evaluate them using descriptive accuracy (DA) and descriptive sparsity (DS) metrics. The comparison and evaluation show that the explanation methods can explain the classification of DDoS attacks by capturing either the dominant contribution of input features in the prediction of the classifier or a set of features with high relevance.
first_indexed 2024-03-11T00:31:34Z
format Article
id doaj.art-aebf5f15763a414d8c618661e3b82135
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-11T00:31:34Z
publishDate 2023-07-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-aebf5f15763a414d8c618661e3b821352023-11-18T22:37:59ZengMDPI AGApplied Sciences2076-34172023-07-011315882010.3390/app13158820An Explanation of the LSTM Model Used for DDoS Attacks ClassificationAbdulmuneem Bashaiwth0Hamad Binsalleeh1Basil AsSadhan2Department of Electronic Engineering and Communication, Hadhramout University, Mukalla 50512, YemenDepartment of Computer Science, Imam Mohammad Ibn Saud Islamic University, Riyadh 11432, Saudi ArabiaDepartment of Electrical Engineering, King Saud University, Riyadh 11421, Saudi ArabiaWith the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding how machine learning models work is not trivial. This is particularly true for complex and nonlinear models, such as deep learning models that have high accuracy. The struggle to explain these models creates a tension between accuracy and explanation. Recently, different methods have been used to explain deep learning models and address ambiguity issues. In this paper, we utilize the LSTM model to classify DDoS attacks. We then investigate the explanation of LSTM using LIME, SHAP, Anchor, and LORE methods. Predictions of 17 DDoS attacks are explained by these methods, where common explanations are obtained for each class. We also use the output of the explanation methods to extract intrinsic features needed to differentiate DDoS attacks. Our results demonstrate 51 intrinsic features to classify attacks. We finally compare the explanation methods and evaluate them using descriptive accuracy (DA) and descriptive sparsity (DS) metrics. The comparison and evaluation show that the explanation methods can explain the classification of DDoS attacks by capturing either the dominant contribution of input features in the prediction of the classifier or a set of features with high relevance.https://www.mdpi.com/2076-3417/13/15/8820machine learningDDoS attack classificationexplanation methodsdescriptive accuracydescriptive sparsity
spellingShingle Abdulmuneem Bashaiwth
Hamad Binsalleeh
Basil AsSadhan
An Explanation of the LSTM Model Used for DDoS Attacks Classification
Applied Sciences
machine learning
DDoS attack classification
explanation methods
descriptive accuracy
descriptive sparsity
title An Explanation of the LSTM Model Used for DDoS Attacks Classification
title_full An Explanation of the LSTM Model Used for DDoS Attacks Classification
title_fullStr An Explanation of the LSTM Model Used for DDoS Attacks Classification
title_full_unstemmed An Explanation of the LSTM Model Used for DDoS Attacks Classification
title_short An Explanation of the LSTM Model Used for DDoS Attacks Classification
title_sort explanation of the lstm model used for ddos attacks classification
topic machine learning
DDoS attack classification
explanation methods
descriptive accuracy
descriptive sparsity
url https://www.mdpi.com/2076-3417/13/15/8820
work_keys_str_mv AT abdulmuneembashaiwth anexplanationofthelstmmodelusedforddosattacksclassification
AT hamadbinsalleeh anexplanationofthelstmmodelusedforddosattacksclassification
AT basilassadhan anexplanationofthelstmmodelusedforddosattacksclassification
AT abdulmuneembashaiwth explanationofthelstmmodelusedforddosattacksclassification
AT hamadbinsalleeh explanationofthelstmmodelusedforddosattacksclassification
AT basilassadhan explanationofthelstmmodelusedforddosattacksclassification