Research Article

LNNLS-KH: A Feature Selection Method for Network Intrusion Detection

Table 14

The number of feature selection for different algorithms (CICIDS2017 dataset).

Data categoriesCMPSOACOKHIKHLNNLS-KH

Normal28 (3, 7, 13, 15, 16, 17, 20, 22, 24, 26, 30, 35, 37, 38, 42, 43, 44, 45, 46, 49, 50, 56, 59, 62, 63, 64, 65, 76)25 (1, 3, 4, 7, 10, 11, 12, 13, 15, 19, 29, 32, 34, 35, 37, 43, 46, 47, 51, 55, 56, 58, 73, 76, 78)14 (11, 19, 33, 39, 43, 49, 55, 56, 58, 65, 66, 68, 71, 73)14 (5, 10, 19, 20, 21, 23, 27, 33, 43, 56, 69, 70, 73, 78)8 (6, 12, 16, 32, 38, 50, 54, 73)

DoS24 (1, 3, 4, 13, 16, 17, 24, 26, 30, 33, 35, 39, 40, 44, 48, 51, 53, 57, 58, 59, 60, 62, 67, 70)19 (3, 6, 12, 13, 15, 26, 35, 39, 51, 55, 60, 61, 66, 69, 71, 73, 75, 77, 78)13 (8, 16, 21, 30, 45, 50, 52, 57, 59, 63, 66, 67)14 (2, 12, 15, 16, 19, 21, 32, 34, 44, 46, 65, 68, 76, 77)9 (6, 8, 20, 44, 46, 49, 61, 75, 76)

DDoS29 (15, 18, 19, 20, 23, 25, 26, 33, 34, 35, 38, 39, 42, 43, 46, 47, 49, 51, 55, 56, 57, 59, 60, 61, 62, 63, 71, 72, 78)27 (6, 9, 10, 13, 16, 19, 24, 28, 31, 41, 42, 45, 47, 48, 50, 51, 52, 53, 54, 56, 59, 60, 61, 62, 65, 68, 72)21 (10, 12, 13, 15, 18, 23, 27, 30, 34, 35, 41, 42, 45, 55, 61, 63, 65, 66, 68, 70, 76)18 (1, 11, 13, 14, 19, 24, 32, 35, 36, 40, 42, 47, 51, 57, 60, 69, 70, 75)14 (2, 5, 8, 9, 11, 22, 26, 33, 41, 43, 47, 51, 74, 77)

PortScan24 (1, 3, 6, 15, 16, 28, 30, 33, 35, 37, 44, 45, 52, 56, 59, 60, 61, 63, 65, 68, 70, 75, 77, 78)21 (1, 2, 6, 10, 15, 17, 26, 27, 29, 39, 42, 43, 46, 49, 58, 61, 66, 69, 70, 71, 76)14 (15, 20, 22, 27, 37, 44, 49, 50, 53, 59, 62, 65, 67, 78)15 (1, 24, 30, 32, 33, 43, 49, 53, 54, 58, 60, 61, 63, 64, 69)12 (2, 6, 15, 24, 25, 28, 32, 57, 59, 63, 66, 76)

WebAttack16 (2, 7, 26, 29, 45, 47, 50, 52, 53, 54, 63, 66, 68, 69, 72, 78)15 (3, 9, 10, 12, 19, 26, 40, 46, 50, 54, 64, 65, 68, 69, 73)8 (1, 17, 19, 36, 48, 49, 53, 60)7 (14, 17, 35, 39, 44, 48, 54)8 (3, 29, 32, 37, 61, 64, 73, 77)