2021
DOI: 10.1016/j.engappai.2021.104216
|View full text |Cite
|
Sign up to set email alerts
|

Supervised feature selection techniques in network intrusion detection: A critical review

Abstract: Machine Learning (ML) techniques are becoming an invaluable support for network intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats. Typically, ML algorithms are exploited to classify/recognize data traffic on the basis of statistical features such as inter-arrival times, packets length distribution, mean number of flows, etc. Dealing with the vast diversity and number of features that typically characterize data traffic is a hard problem. This results in the following … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
61
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(62 citation statements)
references
References 134 publications
(118 reference statements)
0
61
0
1
Order By: Relevance
“…New datasets such as New Selected Learning-Knowledge Discovery in Databases Dataset (NSL-KDD) offer a much more impressive level of Big Data collected which influences the result of these anomalous detections. A study by Belgrana, F.Z., (2021) [41] implemented the Condensed Nearest Neighbors (CNN) algorithm as their approach using the classification and regression methods in a supervised learning method to analyse the distribution of samples. CNN reduced the data vector dimensions used and was able to utilise low consumption of system resources as well as a reduction in processing time while maintaining good detection results.…”
Section: Machine Learningmentioning
confidence: 99%
“…New datasets such as New Selected Learning-Knowledge Discovery in Databases Dataset (NSL-KDD) offer a much more impressive level of Big Data collected which influences the result of these anomalous detections. A study by Belgrana, F.Z., (2021) [41] implemented the Condensed Nearest Neighbors (CNN) algorithm as their approach using the classification and regression methods in a supervised learning method to analyse the distribution of samples. CNN reduced the data vector dimensions used and was able to utilise low consumption of system resources as well as a reduction in processing time while maintaining good detection results.…”
Section: Machine Learningmentioning
confidence: 99%
“…They are able to reduce the feature set size significantly. For network intrusion detection, supervised feature selection methods are commonly used [12]. When there are correlations among data, dimension reduction techniques are often utilized, for example, traditional approaches such as linear PCA and kernel PCA.…”
Section: Related Workmentioning
confidence: 99%
“…This method uses ACO and considers in its search process both the concepts of relevance and redundancy. In [26], an unsupervised probabilistic feature selection called UPFS is proposed. In order to reduce the redundancy between functions within the iterative search process of ACO, this method uses ACO and looks for the optimal feature subset by considering the inter-feature data.…”
Section: Related Workmentioning
confidence: 99%
“…While there are only a few papers that introduce and compare the existing works in this area. For example, in [26], only four data transformation methods are evaluated. This work does not consider adaptive methods, which is a majority part of multi-label feature selection methods.…”
mentioning
confidence: 99%