Research Article

LNNLS-KH: A Feature Selection Method for Network Intrusion Detection

Table 10

The feature selection results of different feature selection algorithms (NSL-KDD dataset).

Data categoriesCMPSOACOKHIKHLNNLS-KH

Probe14 (2, 3, 4, 7, 8, 10, 11, 17, 19, 20, 21, 27, 30, 33)15 (1, 3, 4, 6, 15, 16, 17, 19, 21, 23, 29, 35, 39, 40, 41)13 (3, 4, 5, 7, 8, 13, 14, 18, 19, 21, 26, 28, 40)11 (2, 3, 5, 8, 10, 17, 18, 29, 34, 35, 41)8 (3, 4, 8, 11, 15, 29, 34, 40)
DoS16 (3, 4, 5, 6, 8, 13, 14, 17, 18, 22, 23, 26, 30, 32, 35, 41)16 (3, 4, 7, 12, 14, 19, 20, 25, 27, 28, 30, 33, 34, 37, 40, 41)12 (2, 3, 4, 5, 8, 9, 12, 15, 19, 24, 26, 30)12 (2, 3, 4, 6, 12, 18, 20, 22, 27, 28, 30, 31)10 (3, 4, 6, 15, 17, 19, 20, 21, 30, 37)
U2R9 (3, 4, 5, 9, 12, 19, 32, 33, 41)8 (3, 4, 6, 8, 20, 24, 33, 36)8 (3, 4, 10, 12, 19, 23, 31, 32)6 (3, 10, 11, 21, 36, 39)3 (3, 33, 36)
R2L11 (2, 3, 4, 8, 21, 22, 25, 27, 37, 40, 41)10 (3, 4, 7, 12, 17, 21, 29, 37, 38, 40)10 (2, 3, 4, 6, 13, 18, 19, 22, 32, 41)8 (3, 4, 5, 8, 11, 14, 21, 31)7 (2, 3, 4, 10, 15, 21, 36)