diff --git "a/txt/2104.04958.txt" "b/txt/2104.04958.txt" new file mode 100644--- /dev/null +++ "b/txt/2104.04958.txt" @@ -0,0 +1,1834 @@ +Supervised Feature Selection Techniques in +Network Intrusion Detection: a Critical Review +M. Di Mauroa,<, G. Galatrob, G. Fortinocand A. Liottad +aDepartment of Information and Electrical Engineering and Applied Mathematics (DIEM), University of Salerno, 84084, Fisciano, Italy +bAmazon AWS, Belgard Retail Park, Tallaght, Dublin, Ireland +cDepartment of Informatics, Modeling, Electronics and Systems, University of Calabria, Italy +dFaculty of Computer Science, Free University of Bozen-Bolzano, Italy +ARTICLE INFO +Keywords : +Feature Selection +Machine Learning +Network Intrusion Detection +Network PerformanceABSTRACT +Machine Learning (ML) techniques are becoming an invaluable support for network intrusion de- +tection, especially in revealing anomalous flows, which often hide cyber-threats. Typically, ML al- +gorithms are exploited to classify/recognize data traffic on the basis of statistical features such as +inter-arrival times, packets length distribution, mean number of flows, etc. Dealing with the vast +diversity and number of features that typically characterize data traffic is a hard problem. This re- +sults in the following issues: i)the presence of so many features leads to lengthy training processes +(particularly when features are highly correlated), while prediction accuracy does not proportionally +improve; ii)some of the features may introduce bias during the classification process, particularly +those that have scarce relation with the data traffic to be classified. To this end, by reducing the fea- +ture space and retaining only the most significant features, Feature Selection (FS) becomes a crucial +pre-processing step in network management and, specifically, for the purposes of network intrusion +detection. In this review paper, we complement other surveys in multiple ways: i)evaluating more +recentdatasets(updatedw.r.t. obsoleteKDD 99)bymeansofadesigned-from-scratchPython-based +procedure; ii)providingasynopsisofmostcreditedFSapproachesinthefieldofintrusiondetection, +includingMulti-ObjectiveEvolutionarytechniques; iii)assessingvariousexperimentalanalysessuch +as feature correlation, time complexity, and performance. Our comparisons offer useful guidelines +to network/security managers who are considering the incorporation of ML concepts into network +intrusion detection, where trade-offs between performance and resource consumption are crucial. +1. Introduction +With the rapid growth of digital technology and com- +munications, we are overwhelmed by network data traffic, +whicharediverseformediatype(e.g. video,voice,text,sen- +sory,etc.),andoriginatefrom(andaretransportedthrough) +abroadrangeofsources(e.g. mobilenetworks,cloudinfras- +tructures,InternetofThings,etc.). Consequently,wehandle +high-dimensionality data, calling for increasingly more so- +phisticated classification methods [1, 2]. +Typically,werefertohighdimensionalitywhenwedeal +with data whereby a large number of features may be ex- +tracted, to the point that the features may even exceed the +numberofobservations. Thisleadstomajorissues,particu- +larly the massive increase in training times. +To this end, Feature Selection (FS) is a promising re- +searchdirection,lookingatwaystoreducethefeaturespace +in order to pinpoint only the most significant features. As +a fundamental pre-processing step in machine learning, FS +is gaining prominence in network management and, specif- +ically, for the purposes of network intrusion detection and +network traffic classification problems [3, 4, 5, 6]. +Moregenerally,FSfindsanevenmuchbroaderapplica- +bilityinfieldasdiverseasbioinformatics[7,8,9,10],image +recognition/retrieval [11, 12, 13, 14, 15, 16, 17], fault diag- + 0is a scale factor, the product ärefers to en- +trywise multiplications, whereas Lis the Lévy distribution +with ( 1<f3). +Cuckoo search method has been exploited in network +trafficanalysispairedwithvarioustechniquesandtechnolo- +gies. In [124], authors propose an algorithm that uses PCA +and Cuckoo Search to reduce the feature space and to op- +timize the clustering center selection. A Cuckoo-based FS +algorithm is proposed in [125] to preprocess network data +Di Mauro et al.: Preprint submitted to Elsevier Page 6 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +aimedatimprovingtheIDSdetectionaccuracyinclouden- +vironments. A Cuckoo search strategy has been also used +in [126] to optimize Artificial Neural Networks when deal- +ing with traffic anomaly detection issues. Again, coupled +with SVM, Cuckoo search has been adopted in FS to deal +with problem of phishing mail detection [127]. Recently, +extended versions of Cuckoo Search algorithm have been +advanced to cope with classification of tweetsin sentiment +analysis[128],ortodefeatattacksinSoftwareDefinedNet- +work infrastructures [129]. +4.4. Evolutionary Feature Selection +Suchfamilyofalgorithmsisinspiredbynaturalselection +theory, claiming that living organisms survived across mil- +lions of years thanks to an adaptation process. In a similar +way,thisaptitudecanbetranslatedinsearchforoptimalso- +lutions to a problem. Two exemplary tested algorithms are: +Genetic search and Multi Objective Evolutionary search. +4.4.1. Genetic Search +Genetic Algorithms (GAs) have been designed around +themid-1950s,whenbiologistsstartedtoperformcomputer- +based simulations aimed at analyzing more in deep the +evolution of genetic processes [130]. Then, GAs have +been extended to face problems ranging from neural net- +works weight estimation [131] to inequalities-based prob- +lems[132]. Apioneeringworkinthisfieldhasbeencarried +outbyHolland[133,134],and,today,manyvariantsofGAs +exist [135] and are applied in economy, computer science, +sociology. +The basic skeleton of a GA includes three operators +[136]:Reproduction, Crossover andMutation. +Reproduction refers to a process in charge of evaluating +theabilityofanindividualtobeselected(amongothers)for +reproduction, on the basis of a fitnessscore. +Crossover concerns the capability of a genetic operator +in recombining information to create new offspring. Typi- +cally, offspring is generated by exchanging genes of parents +until acrossover point is reached. +Mutation pertains to the probability that some offspring +genes could be modified or altered. +Genetic-based feature selection in network traffic analy- +sishasbeenusedinconjunctionwithmanyML-basedmeth- +ods. Authors in [137] exploit a GA-based FS approach to +optimize network traffic data before applying an artificial +neuralnetworktoperformattacksdetectionacrosscloudin- +frastructures. A combination of a genetic FS method and a +supervised classifier based on J48 algorithm is proposed in +[138]. More frequent across the scientific literature is the +couplingbetweengeneticFSandSVMclassifiersappliedto +networktrafficclassificationproblems(see[139,140,141]). +When dealing with FS problems, GAs allow to explore +the solution space by selecting the most promising regions, +thus,avoidingacostlyexhaustivesearch. Inourdomain,the +initial population is represented by the whole feature space +and the fitness function relies on the correlation among fea-tures and expressed by means of a meritindicator defined +further ahead in eq. (12). +Once entered the cycle represented in Fig. 1, the algo- +rithm calculates the fitness of each candidate solution per +iteration, selects individuals to reproduce, and generates a +newpopulationbytakingintoaccountcrossover(featurere- +combination with a certain probability), and mutation (one +featurecanbeturnedintoanotherfeaturewithacertainprob- +ability). +!"#$#%&'()*&%$#(" +!"#"$%&"'%#'(#(&(%) +*+*,)%&(+#+-'(#.(/(.,%)0 +,%&*%$#(" +1/%),%&"&2"'-(&#"00' +-,#3&(+#4+567'-,#3&78 -#$".//01%&*./ +900(:#&2"'%**$+*$(%&"' +-(&#"00'/%),"0 +2.&.3$#(" +;(#:)"'+,&'&2"'(#.(/(.,%)0 +-+$'$"*$+.,3&(+# 4.)5(6*3$#(" +!"#"$%&"'#"<'(#.(/(.,%)0 +43$+00+/"$='>,&%&(+#8' +Figure 1: Genetic Algorithms life cycle. +4.4.2. Multi-Objective Evolutionary Search +The family of solutions concerning a multiobjective op- +timization problem (MO) includes all the elements of the +search space whose objective vectors cannot be simultane- +ously improved (Pareto optimality concept) [142]. The set +of such objective vectors is said non-dominated. +Moreformally,aMOproblemcanbeformulatedasfol- +lows: given a vector of nobjective functions fof a vector +variable xin a domain Ddefined as +f.x/ = .f1.x/;f2.x/;§;fn.x/; (9) +a decision vector xhËDis Pareto-optimal iffthere is no +xkËDsuch that: +h +n +n +l +n +njÅiË ^1;§;n`;kifhi +á +ÇiË ^1;§;n` :ki0such that +p.Y=yðXi=xi/‘p.Y=y/: (11) +Namely,Xiis relevant if Yis conditionally dependent on +Xi. Thus, CFS is a filter algorithm that can rank feature +subsets according to a correlation-based heuristic function. +Precisely,givenasubset Sincludingkfeatures,theheuristic +meritMS;kis defined as: +MS;k=krfct +k+k.k* 1/rff; (12) +whererfcis the average value of feature/class correlations, +andrffis the average value of feature/feature correlations. +The numerator of (12) may be seen as an indicator of how +far a set of features is predictive of a class; whereas, the +denominator contains information about how much redun- +dancy there is among features. +Di Mauro et al.: Preprint submitted to Elsevier Page 8 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +(a) Ant (21 fts) + (b) Scatter (4 fts) + (c) MO-EA (5 fts) +(d) Ranking (10 fts) + (e) Cuckoo (7 fts) + (f) Tabu/LFS (6 fts) +(g) Genetic (27 fts) + (h) PSO (18 fts) +Figure 2: Correlation maps for different algorithms - DDoS dataset. In parenthesis is +reported the number of features surviving after the FS process. +Our assessment is split into two parts: the first one con- +cernsasingleclass analysis,whereweevaluatedatasetsex- +hibitingdichotomous information (malign/benign); the sec- +ond one is focused on multi class problems, where we eval- +uate the effectiveness of FS in the presence of multiple +classes. +6.1. Single Class Analysis +Let us consider the Distributed Denial of Service +(DDoS) attack which, recently, is also affecting modern +SDN-basednetworks[154,155]. DDoSattacksaredesignedto overwhelm the target network resources by means of a +botnet, namely, a network composed of a large number of +malicious nodes sending tiny packets towards the target, ul- +timately coordinated by a botmaster . +Let us now analyze the results obtained by pre- +processing the DDoS dataset through the set of FS algo- +rithms introduced above. In Fig. 2 we report, for each al- +gorithm, the correlation map corresponding to a graphical +representation of covariance matrices. This representation +embedsthreeimportantpiecesofinformation: i)thenumber +offeaturessurvivingaftertheFSprocessingstep; ii)thetype +Di Mauro et al.: Preprint submitted to Elsevier Page 9 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +0 1 2 3 4 5 +Training Size ×104100101102Feat. Sel. Time (sec)MO-EA +Rank +Ant +Tabu +Genetic +Particle Swarm +Cuckoo +Lin.Fwd.Sel. +Scatter +0 1 2 3 4 5 +Training Size ×104100101102Training Time (sec)NO Feat. Sel. +MO-EA +Rank +Ant +Tabu +Genetic +Particle Swarm +Cuckoo +Lin.Fwd.Sel. +Scatter +Figure 3: FS times - DDoS dataset (a); Training times - DDoS dataset (b). +offeatures;and iii)therelationshipexistingamongsurviving +features. Thelatteristakenintoaccountbymeansofagray +scale, in which darker shades indicate higher levels of cor- +relation. Thus, each .i;j/“pixel" gives the correlation level +between feature iand featurej. Accordingly, the pixels on +the main diagonal are always black (maximum correlation, +corr= 1), due to the self-correlation. As was to be expected, +highercorrelationarefoundamongthosefeaturesbelonging +to the same family (Time-based, Flow-based, etc.). +Some interesting considerations about the various cor- +relation maps arise. First, the number of features retained +by different algorithms may significantly diverge, which is +due to the specific approaches adopted by each algorithm. +TheGeneticalgorithmistheoneretainingthemostfeatures. +This is to be ascribed to the particular strategy of this al- +gorithm, which strives to escape local optima by applying +themutationoperator,thusallowingtoconsidermorepaths, +namely, more features. Second, some common features re- +tained by all the algorithms can be recognized. For in- +stance,thedestinationportfeatureisalwayspresentsince,in +aDDoSattack, atargetvictimis typicallyreachedonapar- +ticular exposed TCP/UDP port. Moreover, since DDoS at- +tacksarecharacterizedbyalargeamountofsmall-sizepack- +ets, features embodying information about packet lengths +are retained. The difference is that, some algorithms (e.g. +Scatter, MO-EA, Cuckoo, Tabu, LFS) just keep the essen- +tialfeaturesrelatedtopacketlength(e.g. totalpacketlength, +total number of bytes sent in initial window); whereas, +other algorithms (e.g. Ranking, Genetic, PSO, Ant) pre- +fer to retain more features belonging to the same family. +DDoSisalsocharacterizedbysomekindofsynchronization +amongthebots,whicharecoordinatedtolaunchanalmost- +simultaneous attack. This means that time-related features +willoftenprovideusefulinformationtodetectDDoS.Inter- +estingly, the Genetic algorithm retains 5features relating to +the inter-arrival flow times, resulting in a dark gray cluster +at the center of the correlation map (Fig. 2(g)).ItisalsopossibleforDDoSattackstobeevenmoreeffec- +tivethroughthemodificationoftheIPflags(e.g. SYN/RST +flooding). Accordingly, features embodying information +aboutIPflags(e.g. RST-SYN-URGflagcount)areretained +by algorithms such as Ant (Fig. 2(a)), MO-EA (Fig. 2(c)), +Cuckoo (Fig. 2(e)), Genetic (Fig. 2(g)), and PSO (Fig. +2(h)). Let us note that many algorithms opt for selecting +featuresthatareuncorrelatedamongthem(fewdarkgrayor +blackclustersarepresent)sincetheyconveymorevariegated +information. +Let us now analyze some findings obtained from the +time-complexity evaluation. To this aim, we use a PC +equipped with Intel CoreTMi5-7200U CPU@ 2.50GHz +CPUand16GBofRAM.InFig. 3(a),weshowhowtheFS +timevarieswithtrainingsize,fortheDDoSdataset. Nodra- +maticdifferencesareobservedacrossthevariousalgorithms, +even more significantly as the training size grows. Consid- +ering a relatively large training size (with 5 104training +instances), FS times range from about 10seconds (Scatter +algorithm) to almost 26seconds (MO-EA algorithm). Sur- +prisingly, the FS times are rather uniform, in spite of the +broadvariationinnumberofretainedfeatures(byeachofthe +algorithms). For instance, remaining in the case of 5 104 +training instances, Scatter retains the minimum number of +features (4), while Genetic retains the maximum number of +features(27);yetFStimesarecomparable( 16:19and10:18 +seconds, respectively). Although it is legitimate to expect +that higher FS time could be justified to produce a more re- +ducedfeaturespace,thescarcecorrelationbetweensuchob- +servables is due to the particular logic implemented in each +FS algorithm. +On the other hand, Fig. 3(b) provides the training times +obtained by applying the J48 benchmark algorithm, down- +stream of the FS processing step. Here, the black line (with +emptycircles)givesthetrainingtimesobtainedwhennoFS +processing is employed. We can observe how FS leads to +significantimprovements,intermsofbothtimesandtrends. +Di Mauro et al.: Preprint submitted to Elsevier Page 10 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.0051.01DDoS Dataset +Accuracy (DDoS) +F-Measure (DDoS) +Accuracy (Benign) +F-Measure (Benign) +(a) + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.0051.01Portscan Dataset +Accuracy (Portscan) +F-Measure (Portscan) +Accuracy (Benign) +F-Measure (Benign) (b) + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.005WebAttack Dataset +Accuracy (WebAttack) +F-Measure (WebAttack) +Accuracy (Benign) +F-Measure (Benign) +(c) + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.005TOR Dataset +Accuracy (TOR) +F-Measure (TOR) +Accuracy (Non TOR) +F-Measure (Non TOR) (d) +Figure 4: Performance in terms of Accuracy/F-Measures for different single class datasets: +DDoS (a), Portscan (b), WebAttack (c), TOR (d). +The black (benchmark) line grows rapidly to almost 80 sec- +onds,whilemostalgorithmspeaktoalmost5seconds,with +theexceptionoftheGeneticalgorithm(yellowline)andthe +Particle Swarm algorithm (light blue line) that take over 10 +seconds to complete. This indicates that the FS process, on +the whole, brings gains in the range of about one order of +magnitude,whichmaybecomeevenmoresignificantasthe +dataset grows. +Let us now analyze the performance of the proposed FS +algorithmsintermsofAccuracyandF-Measure. Thesetwo +metrics,widelyusedinthefieldoftrafficclassification[156, +157], are defined as follows: +•Accuracy : the ratio of the correctly predicted obser- +vations to the total observations. This is the most in- +tuitive indicator. +•F-Measure : the weighted average of precision (ratio +ofcorrectlyclassifiedflowsoverallpredictedflowsina class) and recall (ratio of correctly classified flows +overallgroundtruthflowsinaclass). Thisisanindi- +cator of a per-class performance. +To verify that the effectiveness of the FS algorithms is +notlinkedtospecificdatasets,wehaveconsideredthe 4dif- +ferent datasets introduced in Sect. 5(DDoS, Portscan, We- +bAttack, and TOR), reporting our findings in Fig. 4. Just +like for the previous experiments, we have used the tree- +based J 48algorithm as a benchmark. We have adopted a +10-foldcross-validationwhichistypicalinappliedML,and +offersagoodtrade-offbetweentrainingtimeandrobustness. +Noticeably,allFSalgorithmsperformsatisfactorily(bothin +accuracy and F-measure) in comparison to the benchmark +(firstbarsinallthehistograms,labeledas“NOF.S.”)forthe +four datasets. +InsomeinstancestheFSalgorithmsperformedevenbet- +ter than the benchmark (e.g., Rank and Genetic algorithms +in the WebAttack dataset). This can be explained by a phe- +Di Mauro et al.: Preprint submitted to Elsevier Page 11 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +(a) Ant (22 fts) + (b) Scatter/Tabu (9 fts) +Tot Lenof BwdPktsFwdPktLenStdBwdPktLenMeanInit_Win_bytes_FwdInit_Win_bytes_BwdFlow Pkt/sTot Lenof BwdPktsFwdPktLenStdBwdPktLenMeanInit_Win_bytes_FwdInit_Win_bytes_BwdFlow Pkt/s (c) MO-EA (6 fts) +(d) Ranking (28 fts) + (e) Cuckoo (17 fts) +Tot Lenof BwdPktsFwdPktLenStdAvgBwdSegmentSizeInit_Win_bytes_FwdInit_Win_bytes_BwdFlow IAT MaxFwdPktLenMaxBwdPktLenStdFlow IAT MinTot Lenof BwdPktsFwdPktLenStd +AvgBwdSegmentSizeInit_Win_bytes_FwdInit_Win_bytes_BwdFlow IAT MaxFwdPktLenMaxBwdPktLenStdFlow IAT Min (f) LFS (9 fts) +(g) Genetic (31 fts) + (h) PSO (23 fts) +Figure 5: Correlation maps - MultiAndroid dataset. In parenthesis is reported the number +of features surviving after the FS process. +nomenon that is well-known in ML, whereby models based +on too many features may lead to biased classification. On +theotherhand,whenFSmanagestoretainasufficientlyhigh +number of meaningful features, there is a positive effect on +accuracy. This is the case of the Genetic algorithm applied +to the TOR dataset (Fig. 4(d)) that performs better than the +other methods.6.2. Multi Class Analysis +Another fruitful analysis is aimed at evaluating FS al- +gorithms when multi-instance datasets are considered. This +turns out to be particularly useful when it is not possible to +discerndifferenttypesofdatatrafficviasomepre-processing +filter (e.g. IP/Port-based filtering). To assess this case, we +consider two datasets: the MultiAndroid dataset, containing +benigntrafficmixedupwithfivedifferenttypesofAndroid- +based threats; and the DDoS/Portscan dataset, including a +Di Mauro et al.: Preprint submitted to Elsevier Page 12 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +0 1 2 3 4 5 +Training Size ×104100101102Feat. Sel. Time (sec)MO-EA +Rank +Ant +Tabu +Genetic +Particle Swarm +Cuckoo +Lin.Fwd.Sel. +Scatter +(a) +0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 +Training Size ×104100101102103Training Time (sec)NO Feat. Sel. +MO-EA +Rank +Ant +Tabu +Genetic +Particle Swarm +Cuckoo +Lin.Fwd.Sel. +Scatter (b) +Figure 6: FS times - MultiAndroid dataset (a); Training times - MultiAndroid dataset (b). +mix of DDoS, Portscan, and benign traffic. The MultiAn- +droiddataset,includesthefollowingtypesofmaligntraffic: +•FakeApp.AL : a scareware hidden inside a fake +Minecraft application, one of the most popular game +applications; +•Android Defender : a malware which, once acci- +dentally downloaded and installed, raises some fake +alerts; +•Gooligam : an insidious malware that has already in- +fected more than 1million Android-based devices, +aimed at stealing Google accounts for Drive, Docs, +Gmail, etc.; +•Feiwo: belonging to the adware family, it acts by +showingadvertisementsinthesystemnotificationbar, +and by sending device GPS coordinates to a remote +server; +•Charger: a ransomware hidden in some Google Play +applications, which gains root privileges and steals +contacts before asking for a ransom. +Let us analyze how FS algorithms impact on the Mul- +tiAndroid dataset in terms of feature correlation referring +first to the panels of Fig. 5. Comparing these results with +the ones of Fig. 2, an interesting difference emerges: all FS +algorithms retain more features w.r.t. the single-class case. +Thisbehavioriscoherentwiththefactthat,todealwithdif- +ferent types of threats (ransomware, adware, malware) we +need more features, to be able to capture this higher vari- +ability. This effect is even more evident in time-based fea- +tures (mainly inter-arrival times) and in size-based features +(mainly packet lengths). +Looking at DDoS, we observe a difference between +single- and multi-class analysis. In the latter, the destina-tion port is not retained as a crucial feature. This is possi- +blybecausemalwaresexploitdifferentmechanismstocreate +damage: rather than directly overwhelming a particular tar- +getport,theyfirstactinthebackground(e.g. bystealingpri- +vacy data) and then produce malicious traffic in egress. On +the other hand, DDoS attacks generate ingress traffic from +the infected device. +It is worth noticing that, when applied to multi-class +problems,allalgorithmshavepreservedtheiroriginallogic. +For instance, with 31 surviving features, the Genetic algo- +rithm is still the algorithm that saves more features, thanks +totheroleplayedbythemutationoperator. Anotherexample +istheMO-EAalgorithmthat,justlikeinthesingle-classex- +periment,retainsthesmallestnumberoffeatures( 6). Thisis +mainly due to the diversity-preservation mechanism, which +forces the selection of a representative subset of the whole +Pareto front. It optimizes conflicting objective functions, +thus few solutions survive. +The time-complexity evaluation is reported in Fig. 6, +which evaluates the usual FS algorithms onto the MultiAn- +droid dataset. FS times exhibit the same order of magni- +tude as in single-class analysis (Figs.3(a)). For a training +size amounting to 5 104instances, the fastest algorithm is +Scatter (FS time amounting to 9:541seconds); whereas the +slowest one is MO-EA (FS time amounting to 24:827sec- +onds). +The situation changes dramatically when we consider +training times for the J 48benchmark algorithm (Fig. 6(b)). +Notably, multi-class algorithms are roughly one order of +magnitudeslowerthantheirsingle-classcounterpart. Forin- +stance,letusconsidertheGeneticalgorithm(yellowcurve). +Fora 103trainingsize,GeneticFSreducesthetrainingtime +to1:861seconds, growing to the following (X;Y) points: +(104;10:731); (2 < 104;56:748); (3 < 104;133:346); +(5 < 104;301:997). Thelongertrainingtimesarisefromthe +process of training multiple classes. Nevertheless, signifi- +Di Mauro et al.: Preprint submitted to Elsevier Page 13 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS/Scat 0.20.30.40.50.60.70.80.9Multi-Class Dataset (Android threats) - Accuracy +FakeAppal +Andr.Defender +Gooligan +Feiwo +Charger +Benign +(a) + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS/Scat 0.20.250.30.350.40.450.50.550.6Multi-Class Dataset (Android threats) - F-Measure +FakeAppal +Andr.Defender +Gooligan +Feiwo +Charger +Benign (b) + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.980.9850.990.99511.005Multi-Class Dataset (DDoS/Portscan) - Accuracy +DDoS +Portscan +Benign +(c) + NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.980.9850.990.99511.005Multi-Class Dataset (DDoS/Portscan) - F-Measure +DDoS +Portscan +Benign (d) +Figure 7: MultiAndroid dataset: Accuracy (a), F-Measure (b); DDoS/Portscan dataset: +Accuracy (c), F-Measure (d); +cant gains are still obtained by all FS algorithms compared +to the “NO F.S.” benchmark, which peaks at 446:329secs. +Turning now to the performance analysis, in Fig. 7 +wecomparethetwomulti-classdatasets,MultiAndroidand +DDoS/Portscan,drawingsomeinterestingconsiderations. It +is comparably more difficult to detect Android threats than +DDoS/Portscan attacks - MultiAndroid accuracy is below +0:7and F-Measure is below 0:5. However, this issue is +not generated by the FS processes, since the “NO F.S.” per- +formance is poor too, particularly with the “Benign” class. +This issue arises from two facts. First, mobile network at- +tacks are often accompanied by activities that do not di- +rectly/immediately generate network anomalies. Examples +are ransomware and malware, whereby the anomalies arise +after the user has downloaded the malicious application. +There is typically a lag between infection and anomalies, +as the malicious program initially establishes a secret/silent +communication with a remote server, and then graduallysteals/sends private user data. Another example is adware, +wherethoseannoyingbannersactuallyincurverylittledata, +thusmakingithardtodetectfromtheregulartraffic. Asec- +ond reason for the poor MultiAndroid performance is the +strongsimilarityamongdifferentmalignclasses(e.g.,scare- +ware, adware, ransomware). Similar considerations hold +trueinthecaseinwhichweconsideradatasetincludingWe- +battackandTORtraffic(notreportedforspaceconstraints), +whereby the high similarity between the two classes re- +sulted in poor classification performance. We should how- +ever stress that FS algorithms are still very beneficial, since +thetime-complexitybenefitsidentifiedareachievedwithno +dramatic loss in accuracy. +By contrast, the DDoS/Portscan multi-class case +achieves outstanding performance (Figs.7(c) and (d)). This +is because these types of attacks are radically distinct in +the way they exploit network vulnerabilities: DDoS falls +under the umbrella of volumetric attacks; whereas Portscan +Di Mauro et al.: Preprint submitted to Elsevier Page 14 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +attacks employ monitoring strategies to unveil possible +open ports. In other words, a peculiar symptom of a DDoS +attack is the presence of an exceptionally large number +of connections coming from different nodes and heading +towards one network target’s port. Conversely, a symptom +of Portscan attacks is the presence of just a single node (or +a few nodes in case of simultaneous Portscans) opening a +considerably large number of connections towards multiple +ports of a certain network target. Thus it is relatively easier +to differentiate between these two attacks. +6.3. General Remarks +Overall, we can observe that FS algorithms do lead to +an effective reduction in feature space, ranging from 65~ +(Single Class, Genetic) to 95~(Single Class, Scatter) and +from 60~(Multi Class, Genetic) to 92~(Multi Class, MO- +EA). Such feature-space reduction translates into signifi- +cantcomputational-timeimprovements,whichbecomeeven +more remarked as the training size grows. For instance, +with a training set of 50ksamples (single-class DDoS) the +MO-EA algorithm takes 24:8secs to perform FS, while the +trainingtimecomparedtothebenchmarkdropsfrom 72:2to +5:13secs. Atthesametime,performanceisnotsignificantly +degraded by the feature reduction process - accuracy drops +from 0:9993to0:9971. Similar considerations hold for all +other algorithms. +The performed assessment provides invaluable guide- +linesfornetwork/securitymanagementpractitionersdealing +with traffic classification problems. Our evaluation frame- +work aims at weighing the practical benefits of the vari- +ous FS techniques in terms of time-complexity reduction +and performance guarantees. For instance, if we aimed at +minimizing the overall processing time (i.e., FS plus train- +ing times), the Scatter algorithm would be the best choice. +Thisincursatotalprocessingtimeamountingto 14:338sec- +onds for the single-class case (FS= 10:178secs plus train- +ing= 4:16secs),andto 219:963secondsformulti-class(FS= +9:541secsplustraining= 210:422secs). Conversely,theGe- +neticmethodwouldbepreferabletomaximizeperformance. +7. Conclusion and Future Direction +Aprominentresearchdirectionfornetworkintrusionde- +tectionistheadoptionofmachinelearningmethods,partic- +ularly for the detection of anomalous (and often malicious) +network-traffic flows. Looking at the literature, we find am- +ple examples of network classification problems. Yet, little +attention has been turned towards feature selection, which +is an essential classification pre-processing step. We argue +that the main reason for this overlook is that most studies +have been based on the obsolete KDD 99dataset, which in- +cludesfewfeatures,thusmakingFSirrelevant. Ontheother +hand, we consider that modern network engines generate +much richer features (in fact, hundreds of features), which +allowmorefineandgranularnetworktrafficanalyses. How- +ever, this extra capability results into impractical ML train- +ingtimes,makingitnecessarytounderstandhowFSmaybe +realized effectively.To this end, herein we have carried out an experimental +comparativeevaluationofprominentmethods,withtheview +to provide insights as to how the different FS algorithms +perform in the peculiar context of network-traffic classifica- +tion. Our assessment shows how few, relevant features are +retained, but also that the FS reduction process is virtually +lossless, with a significant acceleration of the overall train- +ing process. +To sum up, the novelties of our work are: +i)we carry out an experimental-based review, consider- +ingrecentdatasets(includingDDoS,Portscan,WebAttacks, +and Android threats), as opposed to the obsolete KDD 99 +dataset adopted in most literature; +ii)we compare and contrast a representative number +of alternative FS algorithm types, including classic rank- +guided methods (LFS, Ranking), meta-heuristic methods +(Particle Swarm, Tabu, Scatter), nature-inspired methods +(Ant, Cuckoo), and evolutionary methods (Genetic, MO- +EA); +iii)we provide actual experimental results, unveiling +trade-offs between performance (Accuracy/F-Measure) and +computational time, at different scales (training set size). +Ultimately,ouranalysisshowsthebenefitslinkedtoem- +bedding the FS process into network analysis, providing a +valuable tool for identifying the most useful features out of +hundreds of possibilities. This will prove invaluable to the +fieldsofnetworkmanagement,securitymanagement,intru- +sion detection and incident response. We should note that, +the purpose of our comparative evaluation was not to claim +the predominance of some FS algorithms over others but, +rather, to suggest a methodical framework to work with FS. +As a byproduct of our investigation, some interesting +open research directions emerge: i)extending the present +analysisto unsupervised FStechniques,whichwouldbeuse- +ful to deal with datasets lacking class labels, or with new +types of (unknown) malicious traffic - this is the case of so +called zero-day attacks that have no prior information; ii) +consideringthecaseofstreameddataanalysis,whichisnec- +essary when dealing with extremely time-variant streams, +wherebytheFSprocessshouldberepeatedacrosstime(e.g. +byusingamobiletimewindow),soastoperiodicallyupdate +theresultingdatasetwiththefreshestfeatures; iii)designing +routines to automatically manage the best FS strategies to +be applied in accordance to specific criteria (e.g. accuracy +target, latency needs, etc.). Our investigation goes into the +direction of the 6G paradigm that, according to most net- +workscientists,willbecharacterizedbyintelligentresource +management,smartadjustments,andautomaticservicepro- +visioning. +References +[1] F. Camastra and A. Staiano, “Intrinsic dimension estimation: Ad- +vances and open problems,” Information Sciences , vol. 328, pp. 26 +– 41, 2016. +[2] F. Camastra, “Data dimensionality estimation methods: a survey,” +Pattern Recognition , vol. 36, no. 12, pp. 2945 – 2954, 2003. +[3] I. Possebon, A. Santos da Silva, L. Zambenedetti Granville, +A. Schaeffer-Filho, and A. Marnerides, “Improved network traffic +Di Mauro et al.: Preprint submitted to Elsevier Page 15 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +classification using ensemble learning,” in 2019 IEEE Symposium +on Computers and Communications (ISCC) , 2019. +[4] F. Grando, L. Zambenedetti Granville, and L. Lamb, “Machine +learninginnetworkcentralitymeasures: Tutorialandoutlook,” ACM +Comput. Surv. , vol. 51, no. 5, pp. 102:1–102:32, 2018. +[5] R. Stadler, R. Pasquini, and V. Fodor, “Learning from network +device statistics,” Journal of Network and Systems Management , +vol. 25, no. 4, pp. 672–698, 2017. +[6] A. A. Daya, M. A. Salahuddin, N. Limam, and R. Boutaba, “A +graph-based machine learning approach for bot detection,” in 2019 +IFIP/IEEESymposiumonIntegratedNetworkandServiceManage- +ment (IM) , 2019, pp. 144–152. +[7] G. Li, X. Hu, X. Shen, X. Chen, and Z. Li, “A novel unsupervised +feature selection method for bioinformatics data sets through fea- +ture clustering,” in 2008 IEEE International Conference on Granu- +lar Computing , 2008, pp. 41–47. +[8] C. Zheng, D. Huang, L. Zhang, and X. Kong, “Tumor clustering +using nonnegative matrix factorization with gene selection,” IEEE +Transactions on Information Technology in Biomedicine , vol. 13, +no. 4, pp. 599–607, 2009. +[9] D. Huang and H. Yu, “Normalized feature vectors: A novel +alignment-free sequence comparison method based on the numbers +of adjacent amino acids,” IEEE/ACM Transactions on Computa- +tionalBiologyandBioinformatics ,vol.10,no.2,pp.457–467,2013. +[10] H.Abusamra,“Acomparativestudyoffeatureselectionandclassifi- +cationmethodsforgeneexpressiondataofglioma,” ProcediaCom- +puter Science , vol. 23, pp. 5 – 14, 2013. +[11] A. Khotanzad and Y. Hong, “Rotation invariant image recognition +using features selected via a systematic method,” Pattern Recogni- +tion, vol. 23, no. 10, pp. 1089 – 1101, 1990. +[12] J. Y. Choi, Y. M. Ro, and K. N. Plataniotis, “Boosting color feature +selection for color face recognition,” IEEE Transactions on Image +Processing , vol. 20, no. 5, pp. 1425–1434, 2011. +[13] A. Goltsev and V. Gritsenko, “Investigation of efficient features for +image recognition by neural networks,” Neural Networks , vol. 28, +pp. 15 – 23, 2012. +[14] D. L. Swets and J. J. Weng, “Using discriminant eigenfeatures for +image retrieval,” IEEE Transactions on Pattern Analysis and Ma- +chine Intelligence , vol. 18, no. 8, pp. 831–836, 1996. +[15] E.Rashedi,H.Nezamabadi-pour,andS.Saryazdi,“Asimultaneous +feature adaptation and feature selection method for content-based +imageretrievalsystems,” Knowledge-BasedSystems ,vol.39,pp.85 +– 94, 2013. +[16] Y.Liang,M.Zhang,andW.Browne,“Imagefeatureselectionusing +geneticprogrammingforfigure-groundsegmentation,” Engineering +Applications of Artificial Intelligence , vol. 62, pp. 96–108, 2017. +[17] R. Chatterjee, T. Maitra, S. Hafizul Islam, M. Mehedi Hassan, +A. Alamri, and G. Fortino, “A novel machine learning based fea- +tureselectionformotorimageryeegsignalclassificationininternet +of medical things environment,” Future Generation Computer Sys- +tems, vol. 98, pp. 419–434, 2019. +[18] K. Zhang, Y. Li, P. Scarf, and A. Ball, “Feature selection for high- +dimensional machinery fault diagnosis data using multiple mod- +els and radial basis function networks,” Neurocomputing , vol. 74, +no. 17, pp. 2941 – 2952, 2011. +[19] T.W.Rauber,F.deAssisBoldt,andF.M.Varejao,“Heterogeneous +featuremodelsandfeatureselectionappliedtobearingfaultdiagno- +sis,”IEEETransactionsonIndustrialElectronics ,vol.62,no.1,pp. +637–646, 2015. +[20] D.Lewis,Y.Yang,T.Rose,andF.Li,“Rcv1: Anewbenchmarkcol- +lectionfortextcategorizationresearch,” JournalofMachineLearn- +ing Research , vol. 5, pp. 361–397, 2004. +[21] S. V. Landeghem, T. Abeel, Y. Saeys, and Y. V. de Peer, “Discrim- +inative and informative features for biomolecular text mining with +ensemblefeatureselection,” Bioinformatics ,vol.26,no.18,pp.554– +560, 2010. +[22] M. Labani, P. Moradi, F. Ahmadizar, and M. Jalili, “A novel multi- +variate filter method for feature selection in text classification prob-lems,”Engineering Applications of Artificial Intelligence , vol. 70, +pp. 25–37, 2018. +[23] M.Injadat,A.Moubayed,A.B.Nassif,andA.Shami,“Multi-stage +optimizedmachinelearningframeworkfornetworkintrusiondetec- +tion,”IEEE Transactions on Network and Service Management , pp. +1–1, 2020. +[24] C.Xu,R.Zhang,M.Xie,andL.Yang,“Networkintrusiondetection +systemasaserviceinopenstackcloud,”in 2020InternationalCon- +ference on Computing, Networking and Communications (ICNC) , +2020, pp. 450–455. +[25] A. Shahraki, M. Abbasi, and O. Haugen, “Boosting algorithms for +network intrusion detection: A comparative evaluation of real ad- +aboost, gentle adaboost and modest adaboost,” Engineering Appli- +cations of Artificial Intelligence , vol. 94, 2020. +[26] M. Di Mauro, M. Longo, F. Postiglione, G. Carullo, and M. Tam- +basco,“ServicefunctionchainingdeployedinanNFVenvironment: +An availability modeling,” in 2017 IEEE Conference on Standards +for Communications and Networking (CSCN) , 2017, pp. 42–47. +[27] M. Di Mauro, M. Longo, F. Postiglione, and M. Tambasco, “Avail- +ability modeling and evaluation of a network service deployed via +NFV,”in DigitalCommunication.TowardsaSmartandSecureFu- +ture Internet , 2017, pp. 31–44. +[28] M.DiMauro,M.Longo,andF.Postiglione,“Availabilityevaluation +of multi-tenant service function chaining infrastructures by multi- +dimensional universal generating function,” IEEE Transactions on +Services Computing , pp. 1–1, 2018. +[29] M. Di Mauro, M. Longo, F. Postiglione, R. Restaino, and M. Tam- +basco,“Availabilityevaluationofthevirtualizedinfrastructureman- +ager in network function virtualization environments,” in Proc. of +the 26th European Safety and Reliability Conference, ESREL 2016 , +2017, pp. 2591–2596. +[30] M.DiMauro,M.Longo,andF.Postiglione,“Reliabilityanalysisof +thecontrollerarchitectureinsoftwaredefinednetworks,”in Proc.of +the 26th European Safety and Reliability Conference, ESREL 2015 , +2015, pp. 1503–1510. +[31] M. Di Mauro, G. Galatro, M. Longo, F. Postiglione, and M. Tam- +basco, “Availability evaluation of a virtualized IP Multimedia Sub- +systemfor5Gnetworkarchitectures,”in Proc.ofthe26thEuropean +Safety and Reliability Conference, ESREL 2017 , 2017, pp. 2203– +2210. +[32] ——,“ComparativeperformabilityassessmentofSFCs: Thecaseof +containerizedIPMultimediaSubsystem,” IEEETrans.Netw.Service +Manag., 2020. +[33] ——, “Performability management of softwarized IP Multimedia +Subsystem,” in IEEE/IFIP Network Operations and Management +Symposium, 2020 , 2020, pp. 1–6. +[34] M. Di Mauro, G. Galatro, M. Longo, A. Palma, F. Postiglione, +and M. Tambasco, “Automated generation of availability models +for SFCs: The case of virtualized IP Multimedia Subsystem,” in +IEEE/IFIPNetworkOperationsandManagementSymposium,2020 , +2020, pp. 1–6. +[35] V.Matta,M.DiMauro,andM.Longo,“Botnetidentificationinran- +domizedDDoSattacks,”in Proceedingsofthe24thEuropeanSignal +Processing Conference , 2016, pp. 2260–2264. +[36] ——, “Botnet identification in multi-clustered DDoS attacks,” in +2017 25th European Signal Processing Conference (EUSIPCO) , +2017, pp. 2171–2175. +[37] P. Addesso, M. Cirillo, M. Di Mauro, and V. Matta, “ADVoIP: Ad- +versarialdetectionofencryptedandconcealedvoip,” IEEETransac- +tions on Information Forensics and Security , vol. 15, pp. 943–958, +2020. +[38] V.Matta,M.DiMauro,M.Longo,andA.Farina,“Cyber-threatmit- +igationexploitingthebirth–death–immigrationmodel,” IEEETrans- +actions on Information Forensics and Security , vol. 13, no. 12, pp. +3137–3152, 2018. +[39] W. Cerroni, G. Moro, R. Pasolini, and M. Ramilli, “Decentralized +detection of network attacks through p2p data clustering of snmp +data,”Computers & Security , vol. 52, pp. 1 – 16, 2015. +Di Mauro et al.: Preprint submitted to Elsevier Page 16 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +[40] ——,“Networkattackdetectionbasedonpeer-to-peerclusteringof +snmpdata,”in LectureNotesoftheInstituteforComputerSciences , +vol. 22, 2009. +[41] W. Cerroni, G. Moro, T. Pirini, and M. Ramilli, “Peer-to-peer data +miningclassifiersfordecentralizeddetectionofnetworkattacks,”in +Proceedings of the Twenty-Fourth Australasian Database Confer- +ence - Volume 137 , 2013, pp. 101–107. +[42] “The CSE-CIC-IDS2018 Dataset,” https://github.com/alekzandr/ +flowmeter, accessed: 2020-10-01. +[43] G.ChandrashekarandF.Sahin,“Asurveyonfeatureselectionmeth- +ods,”Computers & Electrical Engineering , vol. 40, no. 1, pp. 16 – +28, 2014. +[44] S. Khalid, T. Khalil, and S. Nasreen, “A survey of feature selection +andfeatureextractiontechniquesinmachinelearning,”in 2014Sci- +ence and Information Conference , 2014, pp. 372–378. +[45] L. C. Molina, L. Belanche, and A. Nebot, “Feature selection algo- +rithms: a survey and experimental evaluation,” in 2002 IEEE Inter- +nationalConferenceonDataMining,2002.Proceedings. ,2002,pp. +306–313. +[46] L. Yu and H. Liu, “Efficient feature selection via analysis of rele- +vanceandredundancy,” TheJournalofMachineLearningResearch , +vol. 5, pp. 1205–1224, 2004. +[47] F. Camastra and A. Vinciarelli, Feature Extraction Methods and +Manifold Learning Methods . Springer London, 2008. +[48] A. L. Blum and P. Langley, “Selection of relevant features and ex- +amples in machine learning,” Artificial Intelligence , vol. 97, no. 1, +pp. 245 – 271, 1997. +[49] M.DashandH.Liu,“Featureselectionforclassification,” Intelligent +Data Analysis , vol. 1, no. 1, pp. 131 – 156, 1997. +[50] S.Alelyani,J.Tang,andH.Liu,“Featureselectionforclustering: A +review,” in Data Clustering: Algorithms and Applications , 2013. +[51] L. Rendell and R. Seshu, “Learning hard concepts through con- +structive induction: Framework and rationale,” in Proceedings of a +Workshop on Computational Learning Theory and Natural Learn- +ing Systems (Vol. 1) : Constraints and Prospects: Constraints and +Prospects , 1994, pp. 83–141. +[52] L.Talavera,“Anevaluationoffilterandwrappermethodsforfeature +selection in categorical clustering,” in Advances in Intelligent Data +Analysis VI , 2005, pp. 440–451. +[53] M. A. Hall and L. A. Smith, “Feature selection for machine learn- +ing: Comparing a correlation-based filter approach to the wrapper,” +inProceedings of the Twelfth International Florida Artificial Intel- +ligence Research Society Conference , 1999, pp. 235–239. +[54] R. Kohavi and G. H. John, “Wrappers for feature subset selection,” +Artificial Intelligence , vol. 97, no. 1, pp. 273 – 324, 1997. +[55] I. Guyon, “An introduction to variable and feature selection,” Jour- +nal of Machine Learning Research , vol. 3, pp. 1157–1182, 2003. +[56] J. C. Ang, A. Mirzal, H. Haron, and H. N. A. Hamed, “Supervised, +unsupervised, and semi-supervised feature selection: A review on +geneselection,” IEEE/ACMTransactionsonComputationalBiology +and Bioinformatics , vol. 13, no. 5, pp. 971–989, 2016. +[57] J.Dromard,G.Roudière,andP.Owezarski,“Onlineandscalableun- +supervised network anomaly detection method,” IEEE Trans. Netw. +Service Manag. , vol. 14, no. 1, pp. 34–47, 2017. +[58] W. Wang, Y. He, J. Liu, and S. Gombault, “Constructing important +features from massive network traffic for lightweight intrusion de- +tection,”IETInformationSecurity ,vol.9,no.6,pp.374–379,2015. +[59] T. Janarthanan and S. Zargari, “Feature selection in unsw-nb15 and +kddcup’99 datasets,” in 2017 IEEE 26th International Symposium +on Industrial Electronics (ISIE) , 2017, pp. 1881–1886. +[60] K.El-Khatib,“Impactoffeaturereductionontheefficiencyofwire- +lessintrusiondetectionsystems,” IEEETransactionsonParalleland +Distributed Systems , vol. 21, no. 8, pp. 1143–1149, 2010. +[61] Y. Chen, Y. Li, X. Cheng, and L. Guo, “Survey and taxonomy of +feature selection algorithms in intrusion detection system,” in Pro- +ceedingsoftheSecondSKLOISConferenceonInformationSecurity +and Cryptology , 2006, pp. 153–167. +[62] A.Nisioti,A.Mylonas,P.D.Yoo,andV.Katos,“Fromintrusionde-tection to attacker attribution: A comprehensive survey of unsuper- +vised methods,” IEEE Communications Surveys Tutorials , vol. 20, +no. 4, pp. 3369–3388, 2018. +[63] F. Iglesias and T. Zseby, “Analysis of network traffic features for +anomaly detection,” Machine Learning , vol. 101, no. 1, pp. 59–84, +2015. +[64] R.Singh,H.Kumar,andR.K.Singla,“Analysisoffeatureselection +techniques for network traffic dataset,” in 2013 International Con- +ference on Machine Intelligence and Research Advancement , 2013, +pp. 42–46. +[65] M. Bahrololum, E. Salahi, and M. Khaleghi, “Machine learning +techniques for feature reduction in intrusion detection systems: A +comparison,” in Progress in Computing, Analytics and Networking. +Advances in Intelligent Systems and Computing , 2009, pp. 1091– +1095. +[66] Y.Dhote,S.Agrawal,andA.J.Deen,“Asurveyonfeatureselection +techniques for internet traffic classification,” in 2015 International +ConferenceonComputationalIntelligenceandCommunicationNet- +works (CICN) , 2015, pp. 1375–1380. +[67] A. L. Buczak and E. Guven, “A survey of data mining and machine +learningmethodsforcybersecurityintrusiondetection,” IEEECom- +municationsSurveysTutorials ,vol.18,no.2,pp.1153–1176,2016. +[68] P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A de- +tailed investigation and analysis of using machine learning tech- +niques for intrusion detection,” IEEE Communications Surveys Tu- +torials, vol. 21, no. 1, pp. 686–728, 2019. +[69] M. Di Mauro and C. Di Sarno, “Improving SIEM capabilities +through an enhanced probe for encrypted skype traffic detection,” +Journal of Information Security and Applications , vol. 38, pp. 85– +95, 2018. +[70] M. Di Mauro and M. Longo, “Skype traffic detection: A decision +theory based tool,” in 2014 International Carnahan Conference on +Security Technology (ICCST) , 2014, pp. 1–6. +[71] M. Di Mauro and C. Di Sarno, “A framework for internet data real- +time processing: A machine-learning approach,” in 2014 Interna- +tionalCarnahanConferenceonSecurityTechnology(ICCST) ,2014, +pp. 1–6. +[72] F. Cauteruccio, G. Fortino, A. Guerrieri, A. Liotta, D. Mocanu, +C. Perra, G. Terracina, and M. Torres Vega, “Short-long term +anomaly detection in wireless sensor networks based on machine +learning and multi-parameterized edit distance,” Information Fu- +sion, vol. 52, pp. 13 – 30, 2019. +[73] M. Di Mauro, G. Galatro, and A. Liotta, “Experimental review of +neural-based approaches for network intrusion management,” IEEE +Transactions on Network and Service Management , pp. 1–1, 2020. +[74] M. Di Mauro and M. Longo, “Revealing encrypted webrtc traffic +viamachinelearningtools,”in 201512thInternationalJointConfer- +enceone-BusinessandTelecommunications(ICETE) ,vol.04,2015, +pp. 259–266. +[75] H. Benaddi, K. Ibrahimi, and A. Benslimane, “Improving the in- +trusion detection system for nsl-kdd dataset based on pca-fuzzy +clustering-knn,” in 2018 6th International Conference on Wireless +Networks and Mobile Communications (WINCOM) , 2018, pp. 1–6. +[76] W. Wang, X. Du, and N. Wang, “Building a cloud ids using an ef- +ficient feature selection method and svm,” IEEE Access , vol. 7, pp. +1345–1354, 2019. +[77] S.M.KasongoandY.Sun,“Adeeplearningmethodwithfilterbased +feature engineering for wireless intrusion detection system,” IEEE +Access, vol. 7, pp. 38597–38607, 2019. +[78] K. Wu, Z. Chen, and W. Li, “A novel intrusion detection model for +a massive network using convolutional neural networks,” IEEE Ac- +cess, vol. 6, pp. 50850–50859, 2018. +[79] M. A. Ambusaidi, X. He, P. Nanda, and Z. Tan, “Building an in- +trusion detection system using a filter-based feature selection algo- +rithm,”IEEETransactionsonComputers ,vol.65,no.10,pp.2986– +2998, 2016. +[80] K. A. Taher, B. Mohammed Yasin Jisan, and M. M. Rahman, “Net- +work intrusion detection using supervised machine learning tech- +Di Mauro et al.: Preprint submitted to Elsevier Page 17 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +nique with feature selection,” in 2019 International Conference on +Robotics,Electrical and Signal Processing Techniques (ICREST) , +2019, pp. 643–646. +[81] J. Woo, J. Song, and Y. Choi, “Performance enhancement of deep +neural network using feature selection and preprocessing for intru- +sion detection,” in 2019 International Conference on Artificial In- +telligence in Information and Communication (ICAIIC) , 2019, pp. +415–417. +[82] F. Amiri, M. R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani, +“Mutual information-based feature selection for intrusion detection +systems,” Journal of Network and Computer Applications , vol. 34, +no. 4, pp. 1184 – 1199, 2011. +[83] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed +analysis of the kdd cup 99 data set,” in 2009 IEEE Symposium on +Computational Intelligence for Security and Defense Applications , +2009, pp. 1–6. +[84] N.MoustafaandJ.Slay,“Unsw-nb15: acomprehensivedatasetfor +networkintrusiondetectionsystems(unsw-nb15networkdataset),” +in2015MilitaryCommunicationsandInformationSystemsConfer- +ence (MilCIS) , 2015, pp. 1–6. +[85] N.Moustafa,J.Slay,andG.Creech,“Novelgeometricareaanalysis +techniqueforanomalydetectionusingtrapezoidalareaestimationon +large-scalenetworks,” IEEETransactionsonBigData ,vol.5,no.4, +pp. 481–494, 2019. +[86] Doreswamy, M. K. Hooshmand, and I. Gad, “Feature selection ap- +proach using ensemble learning for network anomaly detection,” +CAAI Transactions on Intelligence Technology , vol. 5, no. 4, pp. +283–293, 2020. +[87] A. Binbusayyis and T. Vaiyapuri, “Identifying and benchmarking +key features for cyber intrusion detection: An ensemble approach,” +IEEE Access , vol. 7, pp. 106495–106513, 2019. +[88] “canadian institute for cybersecurity,” https://www.unb.ca/cic/, ac- +cessed: 2020-10-01. +[89] M.A.HallandG.Holmes,“Benchmarkingattributeselectiontech- +niquesfordiscreteclassdatamining,” IEEETransactionsonKnowl- +edge and Data Engineering , vol. 15, no. 6, pp. 1437–1447, 2003. +[90] R. B and G. S, “An intelligent fuzzy rule based feature selection for +effective intrusion detection,” in 2018 International Conference on +RecentTrendsinAdvanceComputing(ICRTAC) ,2018,pp.206–211. +[91] V. S. Takkellapati and G. V. Prasad, “Network intrusion detection +system based on feature selection and triangle area support vector +machine,” International Journal of Engineering Trends and Tech- +nology, vol. 3, no. 4, pp. 466–470, 2012. +[92] S.Ganapathy,K.Kulothungan,P.Yogesh,andA.Kannan,“Anintel- +ligentintrusiondetectionsystemforadhocnetworks,”in IETChen- +nai3rdInternationalonSustainableEnergyandIntelligentSystems +(SEISCON 2012) , 2012, pp. 1–5. +[93] J.M.HernándezJimà ©nezandK.Goseva-Popstojanova,“Theef- +fectonnetworkflows-basedfeaturesandtrainingsetsizeonmalware +detection,”in 2018IEEE17thInternationalSymposiumonNetwork +Computing and Applications (NCA) , 2018, pp. 1–9. +[94] P. Singh and A. Tiwari, “An efficient approach for intrusion detec- +tion in reduced features of kdd99 using id3 and classification with +knnga,” in 2015 Second International Conference on Advances in +Computing and Communication Engineering , 2015, pp. 445–452. +[95] M. Gutlein, E. Frank, M. Hall, and A. Karwath, “Large-scale at- +tributeselectionusingwrappers,”in 2009IEEESymposiumonCom- +putational Intelligence and Data Mining , 2009, pp. 332–339. +[96] W.Wang,X.Wang,D.Feng,J.Liu,Z.Han,andX.Zhang,“Explor- +ing permission-induced risk in android applications for malicious +applicationdetection,” IEEETransactionsonInformationForensics +and Security , vol. 9, no. 11, pp. 1869–1882, 2014. +[97] I. Finizio, C. Mazzariello, and C. Sansone, “Combining genetic- +basedmisuseandanomalydetectionforreliablydetectingintrusions +in computer networks,” in Proceedings of the 13th International +Conference on Image Analysis and Processing , 2005, pp. 66–74. +[98] Y. Liu, Z. Xu, J. Yang, L. Wang, C. Song, and K. Chen, “A novel +meta-heuristic-based sequential forward feature selection approachfor anomaly detection systems,” in 2016 International Conference +onNetworkandInformationSystemsforComputers(ICNISC) ,2016, +pp. 218–227. +[99] F.Glover,“Futurepathsforintegerprogrammingandlinkstoartifi- +cialintelligence,” Computers&OperationsResearch ,vol.13,no.5, +pp. 533 – 549, 1986. +[100] G.F.W.andL.M., TabuSearch . NewYork,USA:Springer,1997. +[101] C. Rego and B. Alidaee, Metaheuristic Optimization via Memory +and Evolution: Tabu Search and Scatter Search (Operations Re- +search/Computer Science Interfaces Series) . Berlin, Heidelberg: +Springer-Verlag, 2005. +[102] A.-R.Hedar,J.Wang,andM.Fukushima,“Tabusearchforattribute +reduction in rough set theory,” Soft Computing , vol. 12, no. 9, pp. +909–918, 2008. +[103] H.Mohamadi,J.Habibi,andH.Saadi,“Intrusiondetectionincom- +puter networks using tabu search based fuzzy system,” in 2008 7th +IEEE International Conference on Cybernetic Intelligent Systems , +2008, pp. 1–6. +[104] W.Jian-guang,T.Ran,andL.Zhi-Yong,“Animprovingtabusearch +algorithmforintrusiondetection,”in 2011ThirdInternationalCon- +ference on Measuring Technology and Mechatronics Automation , +vol. 1, 2011, pp. 435–439. +[105] Y. Chen, L. Dai, and X. Cheng, “Gats-c4.5: An algorithm for opti- +mizing features in flow classification,” in 2008 5th IEEE Consumer +Communications and Networking Conference , 2008, pp. 466–470. +[106] K.Bakour,G.S.Das,andH.M.Unver,“Anintrusiondetectionsys- +tembasedonahybridtabu-geneticalgorithm,”in 2017International +Conference on Computer Science and Engineering (UBMK) , 2017, +pp. 215–220. +[107] XiaocongZ.,DonglingL.,andYangY.,“Improvedincrementalsup- +portvectormachinewithhybridfeatureselectionfornetworkintru- +sion detection,” in 2013 International Conference on Information +and Network Security (ICINS 2013) , 2013, pp. 1–6. +[108] F.Glover,“Heuristicsforintegerprogrammingusingsurrogatecon- +straints,” Decision Sciences , vol. 8, pp. 156–166, 1977. +[109] Z. Ugray, L. Lasdon, J. Plummer, F. Glover, J. Kelly, and R. Marti, +“Scatter search and local nlp solvers: a multistart framework for +globaloptimization,” InformsJournalonComputing ,vol.19,no.3, +pp. 328 – 340, 2007. +[110] J. Wang, A. R. Hedar, S. Wang, and J. Ma, “Rough set and scat- +ter search metaheuristic based feature selection for credit scoring,” +Expert Systems with Applications , vol. 39, no. 6, pp. 6123 – 6128, +2012. +[111] F. G. Lopez, M. G. Torres, B. M. Batista, J. A. M. Perez, and J. M. +Moreno-Vega,“Solvingfeaturesubsetselectionproblembyaparal- +lel scatter search,” European Journal of Operational Research , vol. +169, no. 2, pp. 477 – 489, 2006. +[112] E. Duman and M. H. Ozcelik, “Detecting credit card fraud by ge- +netic algorithm and scatter search,” Expert Systems with Applica- +tions, vol. 38, no. 10, pp. 13057 – 13063, 2011. +[113] D.ByersandN.Shahmehri,“Prioritisationandselectionofsoftware +security activities,” in 2009 International Conference on Availabil- +ity, Reliability and Security , 2009, pp. 201–207. +[114] J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Pro- +ceedings of ICNN’95 - International Conference on Neural Net- +works, vol. 4, 1995, pp. 1942–1948 vol.4. +[115] Q.Yao,J.Cai,andJ.Zhang,“Simultaneousfeatureselectionandls- +svmparametersoptimizationalgorithmbasedonPSO,”in 2009WRI +WorldCongressonComputerScienceandInformationEngineering , +vol. 5, 2009, pp. 723–727. +[116] W.Hu,J.Gao,Y.Wang,O.Wu,andS.Maybank,“Onlineadaboost- +basedparameterizedmethodsfordynamicdistributednetworkintru- +sion detection,” IEEE Transactions on Cybernetics , vol. 44, no. 1, +pp. 66–82, 2014. +[117] H.Li,W.Guo,G.Wu,andY.Li,“ARF-PSObasedhybridfeaturese- +lectionmodelinintrusiondetectionsystem,”in 2018IEEEThirdIn- +ternationalConferenceonDataScienceinCyberspace(DSC) ,2018, +pp. 795–802. +Di Mauro et al.: Preprint submitted to Elsevier Page 18 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review +[118] S. Fong, R. Wong, and A. V. Vasilakos, “Accelerated PSO swarm +search feature selection for data stream mining big data,” IEEE +TransactionsonServicesComputing ,vol.9,no.1,pp.33–45,2016. +[119] M.Dorigo,V.Maniezzo,andA.Colorni,“Antsystem: optimization +by a colony of cooperating agents,” IEEE Transactions on Systems, +Man, and Cybernetics, Part B (Cybernetics) , vol. 26, no. 1, pp. 29– +41, 1996. +[120] T. Mehmood and H. B. M. Rais, “Svm for network anomaly detec- +tion using aco feature subset,” in 2015 International Symposium on +MathematicalSciencesandComputingResearch(iSMSC) ,2015,pp. +121–126. +[121] S.Hardeand V. Sahare,“Designandimplementationof acofeature +selection algorithm for data stream mining,” in 2016 International +ConferenceonAutomaticControlandDynamicOptimizationTech- +niques (ICACDOT) , 2016, pp. 1047–1051. +[122] H. Peng, C. Ying, S. Tan, B. Hu, and Z. Sun, “An improved feature +selectionalgorithmbasedonantcolonyoptimization,” IEEEAccess , +vol. 6, pp. 69203–69209, 2018. +[123] X. Yang, Cuckoo Search and Firefly Algorithm: Theory and Appli- +cations. London, UK: Springer, 2013. +[124] Z.Li,Y.Su,andQ.Han,“Intrusiondetectionbasedonpcaandfuzzy +clustering optimized by cs,” in 2017 Chinese Automation Congress +(CAC), 2017, pp. 6334–6339. +[125] E. J. L. D. Asir Antony Gnana Singh, R. Priyadharshini, “Cuckoo +optimisationbasedintrusiondetectionsystemforcloudcomputing,” +InternationJournalofComputerNetworkandInformationSecurity , +vol. 11, pp. 42–49, 2018. +[126] K. Rithesh, “Anomaly-based nids using artificial neural networks +optimised with cuckoo search optimizer,” in Emerging Research in +Electronics, Computer Science and Technology , 2019, pp. 23–35. +[127] W. Niu, X. Zhang, G. Yang, Z. Ma, and Z. Zhuo, “Phishing emails +detection using cs-svm,” in 2017 IEEE International Symposium +on Parallel and Distributed Processing with Applications and 2017 +IEEEInternationalConferenceonUbiquitousComputingandCom- +munications (ISPA/IUCC) , 2017, pp. 1054–1059. +[128] M.Redmond,S.Salesi,andG.Cosma,“Anovelapproachbasedon +anextendedcuckoosearchalgorithmfortheclassificationoftweets +which contain emoticon and emoji,” in 2017 2nd International +Conference on Knowledge Engineering and Applications (ICKEA) , +2017, pp. 13–19. +[129] I.H.Abdulqadder,D.Zou,I.T.Aziz,B.Yuan,andW.Li,“Secsdn- +cloud: Defeatingvulnerableattacksthroughsecuresoftware-defined +networks,” IEEE Access , vol. 6, pp. 8292–8301, 2018. +[130] T. Weise, “Global optimization algorithms – theory and applica- +tion,” 2009. +[131] W.W.BledsoeandI.Browning,“Patternrecognitionandreadingby +machine,” in Papers Presented at the December 1-3, 1959, Eastern +Joint IRE-AIEE-ACM Computer Conference , 1959, pp. 225–232. +[132] H.J.Bremermann,“Optimizationthroughevolutionandrecombina- +tion,” inSelf-Organizing Systems , M. C. Yovits, G. T. Jacobi, , and +G. D. Goldstein, Eds. Spartan Books, 1962. +[133] J.Holland,“Outlineforalogicaltheoryofadaptivesystems,” Jour- +nal of ACM , vol. 9, no. 3, pp. 297–314, 1962. +[134] ——, AdaptationinNaturalandArtificialSystems: AnIntroductory +AnalysiswithApplicationstoBiology,ControlandArtificialIntelli- +gence. Cambridge, MA, USA: MIT Press, 1992. +[135] C.Coello,“Anupdatedsurveyofga-basedmultiobjectiveoptimiza- +tion techniques,” ACM Computing Surveys , vol. 32, no. 2, pp. 109– +143, 2000. +[136] D. Goldberg, Genetic Algorithms in Search, Optimization and Ma- +chineLearning ,1sted. Boston,MA,USA:Addison-WesleyLong- +man Publishing Co., Inc., 1989. +[137] S. Guha, S. S. Yau, and A. B. Buduru, “Attack detection in cloud +infrastructures using artificial neural network with genetic feature +selection,” in 2016 IEEE 14th Intl Conf on Dependable, Autonomic +and Secure Computing , 2016, pp. 414–419. +[138] B. Senthilnayaki, K. Venkatalakshmi, and A. Kannan, “An intelli- +gentintrusiondetectionsystemusinggeneticbasedfeatureselectionandmodifiedJ48decisiontreeclassifier,”in 2013FifthInternational +Conference on Advanced Computing (ICoAC) , 2013, pp. 1–7. +[139] ——, “Intrusion detection using optimal genetic feature selection +and svm based classifier,” in 2015 3rd International Conference on +SignalProcessing,CommunicationandNetworking(ICSCN) ,2015, +pp. 1–4. +[140] H.GharaeeandH.Hosseinvand,“Anewfeatureselectionidsbased +ongeneticalgorithmandsvm,”in 20168thInternationalSymposium +on Telecommunications (IST) , 2016, pp. 139–144. +[141] P. Tao, Z. Sun, and Z. Sun, “An improved intrusion detection al- +gorithm based on GA and SVM,” IEEE Access , vol. 6, pp. 13624– +13631, 2018. +[142] C.M.FonsecaandP.J.Fleming,“Anoverviewofevolutionaryalgo- +rithms in multiobjective optimization,” Evolutionary Computation , +vol. 3, no. 1, pp. 1–16, 1995. +[143] F. Jimenez, G. Sanchez, J. Garcia, G. Sciavicco, and L. Miralles, +“Multi-objectiveevolutionaryfeatureselectionforonlinesalesfore- +casting,”Neurocomputing , vol. 234, pp. 75 – 92, 2017. +[144] M.S.AliakbarianandA.Fanian,“Internettrafficclassificationusing +moeaandonlinerefinementinvotingonensemblemethods,”in 2013 +21st Iranian Conference on Electrical Engineering (ICEE) , 2013, +pp. 1–6. +[145] Y.Zhu,J.Liang,J.Chen,andZ.Ming,“Animprovednsga-iiialgo- +rithm for feature selection used in intrusion detection,” Knowledge- +Based Systems , vol. 116, pp. 74–85, 2017. +[146] “Buildinganeffectiveintrusiondetectionsystemusingunsupervised +feature selection in multi-objective optimization framework,” arxiv. +org/pdf/1905.06562.pdf, accessed: 2020-10-01. +[147] P. Ducange, G. Mannara, F. Marcelloni, R. Pecori, and M. Vecchio, +“A novel approach for internet traffic classification based on multi- +objectiveevolutionaryfuzzyclassifiers,”in 2017IEEEInternational +Conference on Fuzzy Systems (FUZZ-IEEE) , 2017, pp. 1–6. +[148] “The KDD99 Dataset,” http://kdd.ics.uci.edu/databases/kddcup99\ +/kddcup99.html, accessed: 2020-10-01. +[149] G.Draper-Gil,A.H.Lashkari,M.S.I.Mamun,andA.A.Ghorbani, +“Characterization of encrypted and vpn traffic using time-related +features,” in International Conference on Information Systems Se- +curity and Privacy , 2016. +[150] “Cicflowmeter network analyzer,” https://www.unb.ca/cic/datasets/ +ids-2018.html, accessed: 2020-10-01. +[151] “Correlation-based feature selection for machine learning,” cs. +waikato.ac.nz/~mhall/thesis.pdf, accessed: 2020-10-01. +[152] F. Fabris, A. A. Freitas, and J. M. A. Tullet, “An extensive empiri- +calcomparisonofprobabilistichierarchicalclassifiersindatasetsof +ageing-related genes,” IEEE/ACM Transactions on Computational +Biology and Bioinformatics , vol. 13, no. 6, pp. 1045–1058, 2016. +[153] R. Kohavi and G. H. John, “Wrappers for feature subset selection,” +Artificial Intelligence , vol. 97, no. 1, pp. 273 – 324, 1997. +[154] L. Zhu, X. Tang, M. Shen, X. Du, and M. Guizani, “Privacy- +preserving ddos attack detection using cross-domain traffic in soft- +ware defined networks,” IEEE Journal on Selected Areas in Com- +munications , vol. 36, no. 3, pp. 628–643, 2018. +[155] K. Kalkan, L. Altay, G. Gür, and F. Alagöz, “Jess: Joint entropy- +basedddosdefenseschemeinsdn,” IEEEJournalonSelectedAreas +in Communications , vol. 36, no. 10, pp. 2358–2372, 2018. +[156] H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and +K. Lee, “Internet traffic classification demystified: Myths, caveats, +and the best practices,” in Proceedings of the 2008 ACM CoNEXT +Conference , 2008, pp. 11:1–11:12. +[157] J. Zhang, Y. Xiang, Y. Wang, W. Zhou, Y. Xiang, and Y. Guan, +“Network traffic classification using correlation information,” IEEE +TransactionsonParallelandDistributedSystems ,vol.24,no.1,pp. +104–117, 2013. +Di Mauro et al.: Preprint submitted to Elsevier Page 19 of 19 \ No newline at end of file