Research Article
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection
Table 11
Feature selection time and detection time of different feature selection algorithms (NSL-KDD dataset).
| Data categories | Time of feature selection (second) | Time of detection (second) | CMPSO | ACO | KH | IKH | LNNLS-KH | CMPSO | ACO | KH | IKH | LNNLS-KH |
| Probe | 5231.78 | 4998.14 | 4745.33 | 5348.87 | 5490.48 | 37.13 | 38.23 | 35.30 | 34.05 | 31.06 | DoS | 7892.35 | 7630.86 | 7168.52 | 8038.16 | 8296.92 | 118.69 | 118.15 | 106.66 | 105.14 | 98.44 | U2R | 154.87 | 147.29 | 144.18 | 157.79 | 172.24 | 0.087 | 0.086 | 0.086 | 0.086 | 0.078 | R2L | 2556.75 | 2369.08 | 2240.92 | 2669.51 | 2727.70 | 9.55 | 9.13 | 9.07 | 8.62 | 8.03 |
|
|