Research Article

Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach

Table 13

Comparison with related work.

SourceFS method (type)ML algorithm (s)CAERPRRCFPRFNRFAR (FNR + FPR)/2

Proposed binary detection engine using HEFSMHybridHEFSM (DT, RF, KNN)99.550.4599.5299.540.440.460.45
Luo and Xia [38]FilterSVM94.36
Eesa et al. [40]WrapperDT91.99913.917
Bhattacharya and Sel-vakumar [51]HybridBN, J48, KM96.46
Osanaiye et al. [1]FilterDT99.6799.760.42
Ambusaidi et al. [37]FilterSVM99.9198.760.28
Belouch et al. [44]WrapperREPTree89.85
Moustafa and Slay [47]HybridEM, LR, NB82.117.5
Mogal et al. [48]HybridNB, LR99.82
Idhammad et al. [39]FilterANN99.20.02
Vijayanand et al. [45]WrapperSVM98.954.118.511.3
Aljawarneh et al. [46]WrapperNB, J48, RT99.81
Anwer et al. [50]HybridJ48, NB88
Sun et al. [41]WrapperSVM91.68
Pham et al. [42]WrapperEC (J48)84.252.79
Besharati et al. [43]WrapperEC (DT, LDA, ANN)97.51
Mohammadi et al. [49]HybridDT95.0395.231.65
Maza and Touahria [15]HybridNB, MLP, SVM, KNN, DT99.11
Tama et al. [22]HybridRoF, CF85.888

DT: Decision Tree; SVM: support vector machine; REPTree: reduced error pruning tree algorithm; EM: expectation-maximisation clustering; LR: logistic regression; BN: bayesian networks; NB: Naïve Bayes; KM: K means learning algorithm; ANN: artificial neural networks; J48: J48 decision tree; EC: ensemble classifiers, bagging, or boosting; CF: conjunctive rule; LDA: linear discriminant analysis; MLP: multilayer perceptron; RoF: rotation forest.