Research Article

Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach

Table 7

Feature selection output.

FS methodSelected features

SelectKBest (20)F1, F3, F4, F5, F6, F10, F12, F13, F16, F23, F24, F25, F26, F29, F32, F33, F34, F36, F38, F39
Random Forest (20)F1, F3, F4, F5, F6, F7, F9, F10, F17, F20, F23, F28, F29, F30, F32, F34, F35, F38, F39, F40
AdaBoost (18)F1, F2, F3, F4, F5, F6, F8, F11, F23, F26, F29, F32, F33, F34, F35, F38, F39, F40 
HEFSM (11)F1, F3, F4, F5, F6, F23, F29, F32, F34, F38, F39