Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review M. Di Mauroa,<, G. Galatrob, G. Fortinocand A. Liottad aDepartment of Information and Electrical Engineering and Applied Mathematics (DIEM), University of Salerno, 84084, Fisciano, Italy bAmazon AWS, Belgard Retail Park, Tallaght, Dublin, Ireland cDepartment of Informatics, Modeling, Electronics and Systems, University of Calabria, Italy dFaculty of Computer Science, Free University of Bozen-Bolzano, Italy ARTICLE INFO Keywords : Feature Selection Machine Learning Network Intrusion Detection Network PerformanceABSTRACT Machine Learning (ML) techniques are becoming an invaluable support for network intrusion de- tection, especially in revealing anomalous flows, which often hide cyber-threats. Typically, ML al- gorithms are exploited to classify/recognize data traffic on the basis of statistical features such as inter-arrival times, packets length distribution, mean number of flows, etc. Dealing with the vast diversity and number of features that typically characterize data traffic is a hard problem. This re- sults in the following issues: i)the presence of so many features leads to lengthy training processes (particularly when features are highly correlated), while prediction accuracy does not proportionally improve; ii)some of the features may introduce bias during the classification process, particularly those that have scarce relation with the data traffic to be classified. To this end, by reducing the fea- ture space and retaining only the most significant features, Feature Selection (FS) becomes a crucial pre-processing step in network management and, specifically, for the purposes of network intrusion detection. In this review paper, we complement other surveys in multiple ways: i)evaluating more recentdatasets(updatedw.r.t. obsoleteKDD 99)bymeansofadesigned-from-scratchPython-based procedure; ii)providingasynopsisofmostcreditedFSapproachesinthefieldofintrusiondetection, includingMulti-ObjectiveEvolutionarytechniques; iii)assessingvariousexperimentalanalysessuch as feature correlation, time complexity, and performance. Our comparisons offer useful guidelines to network/security managers who are considering the incorporation of ML concepts into network intrusion detection, where trade-offs between performance and resource consumption are crucial. 1. Introduction With the rapid growth of digital technology and com- munications, we are overwhelmed by network data traffic, whicharediverseformediatype(e.g. video,voice,text,sen- sory,etc.),andoriginatefrom(andaretransportedthrough) abroadrangeofsources(e.g. mobilenetworks,cloudinfras- tructures,InternetofThings,etc.). Consequently,wehandle high-dimensionality data, calling for increasingly more so- phisticated classification methods [1, 2]. Typically,werefertohighdimensionalitywhenwedeal with data whereby a large number of features may be ex- tracted, to the point that the features may even exceed the numberofobservations. Thisleadstomajorissues,particu- larly the massive increase in training times. To this end, Feature Selection (FS) is a promising re- searchdirection,lookingatwaystoreducethefeaturespace in order to pinpoint only the most significant features. As a fundamental pre-processing step in machine learning, FS is gaining prominence in network management and, specif- ically, for the purposes of network intrusion detection and network traffic classification problems [3, 4, 5, 6]. Moregenerally,FSfindsanevenmuchbroaderapplica- bilityinfieldasdiverseasbioinformatics[7,8,9,10],image recognition/retrieval [11, 12, 13, 14, 15, 16, 17], fault diag- 0is a scale factor, the product ärefers to en- trywise multiplications, whereas Lis the Lévy distribution with ( 1<f3). Cuckoo search method has been exploited in network trafficanalysispairedwithvarioustechniquesandtechnolo- gies. In [124], authors propose an algorithm that uses PCA and Cuckoo Search to reduce the feature space and to op- timize the clustering center selection. A Cuckoo-based FS algorithm is proposed in [125] to preprocess network data Di Mauro et al.: Preprint submitted to Elsevier Page 6 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review aimedatimprovingtheIDSdetectionaccuracyinclouden- vironments. A Cuckoo search strategy has been also used in [126] to optimize Artificial Neural Networks when deal- ing with traffic anomaly detection issues. Again, coupled with SVM, Cuckoo search has been adopted in FS to deal with problem of phishing mail detection [127]. Recently, extended versions of Cuckoo Search algorithm have been advanced to cope with classification of tweetsin sentiment analysis[128],ortodefeatattacksinSoftwareDefinedNet- work infrastructures [129]. 4.4. Evolutionary Feature Selection Suchfamilyofalgorithmsisinspiredbynaturalselection theory, claiming that living organisms survived across mil- lions of years thanks to an adaptation process. In a similar way,thisaptitudecanbetranslatedinsearchforoptimalso- lutions to a problem. Two exemplary tested algorithms are: Genetic search and Multi Objective Evolutionary search. 4.4.1. Genetic Search Genetic Algorithms (GAs) have been designed around themid-1950s,whenbiologistsstartedtoperformcomputer- based simulations aimed at analyzing more in deep the evolution of genetic processes [130]. Then, GAs have been extended to face problems ranging from neural net- works weight estimation [131] to inequalities-based prob- lems[132]. Apioneeringworkinthisfieldhasbeencarried outbyHolland[133,134],and,today,manyvariantsofGAs exist [135] and are applied in economy, computer science, sociology. The basic skeleton of a GA includes three operators [136]:Reproduction, Crossover andMutation. Reproduction refers to a process in charge of evaluating theabilityofanindividualtobeselected(amongothers)for reproduction, on the basis of a fitnessscore. Crossover concerns the capability of a genetic operator in recombining information to create new offspring. Typi- cally, offspring is generated by exchanging genes of parents until acrossover point is reached. Mutation pertains to the probability that some offspring genes could be modified or altered. Genetic-based feature selection in network traffic analy- sishasbeenusedinconjunctionwithmanyML-basedmeth- ods. Authors in [137] exploit a GA-based FS approach to optimize network traffic data before applying an artificial neuralnetworktoperformattacksdetectionacrosscloudin- frastructures. A combination of a genetic FS method and a supervised classifier based on J48 algorithm is proposed in [138]. More frequent across the scientific literature is the couplingbetweengeneticFSandSVMclassifiersappliedto networktrafficclassificationproblems(see[139,140,141]). When dealing with FS problems, GAs allow to explore the solution space by selecting the most promising regions, thus,avoidingacostlyexhaustivesearch. Inourdomain,the initial population is represented by the whole feature space and the fitness function relies on the correlation among fea-tures and expressed by means of a meritindicator defined further ahead in eq. (12). Once entered the cycle represented in Fig. 1, the algo- rithm calculates the fitness of each candidate solution per iteration, selects individuals to reproduce, and generates a newpopulationbytakingintoaccountcrossover(featurere- combination with a certain probability), and mutation (one featurecanbeturnedintoanotherfeaturewithacertainprob- ability). !"#$#%&'()*&%$#(" !"#"$%&"'%#'(#(&(%) *+*,)%&(+#+-'(#.(/(.,%)0 +,%&*%$#(" 1/%),%&"&2"'-(&#"00' -,#3&(+#4+567'-,#3&78 -#$".//01%&*./ 900(:#&2"'%**$+*$(%&"' -(&#"00'/%),"0 2.&.3$#(" ;(#:)"'+,&'&2"'(#.(/(.,%)0 -+$'$"*$+.,3&(+# 4.)5(6*3$#(" !"#"$%&"'#"<'(#.(/(.,%)0 43$+00+/"$='>,&%&(+#8' Figure 1: Genetic Algorithms life cycle. 4.4.2. Multi-Objective Evolutionary Search The family of solutions concerning a multiobjective op- timization problem (MO) includes all the elements of the search space whose objective vectors cannot be simultane- ously improved (Pareto optimality concept) [142]. The set of such objective vectors is said non-dominated. Moreformally,aMOproblemcanbeformulatedasfol- lows: given a vector of nobjective functions fof a vector variable xin a domain Ddefined as f.x/ = .f1.x/;f2.x/;§;fn.x/; (9) a decision vector xhËDis Pareto-optimal iffthere is no xkËDsuch that: h n n l n njÅiË ^1;§;n`;kifhi á ÇiË ^1;§;n` :ki0such that p.Y=yðXi=xi/‘p.Y=y/: (11) Namely,Xiis relevant if Yis conditionally dependent on Xi. Thus, CFS is a filter algorithm that can rank feature subsets according to a correlation-based heuristic function. Precisely,givenasubset Sincludingkfeatures,theheuristic meritMS;kis defined as: MS;k=krfct k+k.k* 1/rff; (12) whererfcis the average value of feature/class correlations, andrffis the average value of feature/feature correlations. The numerator of (12) may be seen as an indicator of how far a set of features is predictive of a class; whereas, the denominator contains information about how much redun- dancy there is among features. Di Mauro et al.: Preprint submitted to Elsevier Page 8 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review (a) Ant (21 fts) (b) Scatter (4 fts) (c) MO-EA (5 fts) (d) Ranking (10 fts) (e) Cuckoo (7 fts) (f) Tabu/LFS (6 fts) (g) Genetic (27 fts) (h) PSO (18 fts) Figure 2: Correlation maps for different algorithms - DDoS dataset. In parenthesis is reported the number of features surviving after the FS process. Our assessment is split into two parts: the first one con- cernsasingleclass analysis,whereweevaluatedatasetsex- hibitingdichotomous information (malign/benign); the sec- ond one is focused on multi class problems, where we eval- uate the effectiveness of FS in the presence of multiple classes. 6.1. Single Class Analysis Let us consider the Distributed Denial of Service (DDoS) attack which, recently, is also affecting modern SDN-basednetworks[154,155]. DDoSattacksaredesignedto overwhelm the target network resources by means of a botnet, namely, a network composed of a large number of malicious nodes sending tiny packets towards the target, ul- timately coordinated by a botmaster . Let us now analyze the results obtained by pre- processing the DDoS dataset through the set of FS algo- rithms introduced above. In Fig. 2 we report, for each al- gorithm, the correlation map corresponding to a graphical representation of covariance matrices. This representation embedsthreeimportantpiecesofinformation: i)thenumber offeaturessurvivingaftertheFSprocessingstep; ii)thetype Di Mauro et al.: Preprint submitted to Elsevier Page 9 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review 0 1 2 3 4 5 Training Size ×104100101102Feat. Sel. Time (sec)MO-EA Rank Ant Tabu Genetic Particle Swarm Cuckoo Lin.Fwd.Sel. Scatter 0 1 2 3 4 5 Training Size ×104100101102Training Time (sec)NO Feat. Sel. MO-EA Rank Ant Tabu Genetic Particle Swarm Cuckoo Lin.Fwd.Sel. Scatter Figure 3: FS times - DDoS dataset (a); Training times - DDoS dataset (b). offeatures;and iii)therelationshipexistingamongsurviving features. Thelatteristakenintoaccountbymeansofagray scale, in which darker shades indicate higher levels of cor- relation. Thus, each .i;j/“pixel" gives the correlation level between feature iand featurej. Accordingly, the pixels on the main diagonal are always black (maximum correlation, corr= 1), due to the self-correlation. As was to be expected, highercorrelationarefoundamongthosefeaturesbelonging to the same family (Time-based, Flow-based, etc.). Some interesting considerations about the various cor- relation maps arise. First, the number of features retained by different algorithms may significantly diverge, which is due to the specific approaches adopted by each algorithm. TheGeneticalgorithmistheoneretainingthemostfeatures. This is to be ascribed to the particular strategy of this al- gorithm, which strives to escape local optima by applying themutationoperator,thusallowingtoconsidermorepaths, namely, more features. Second, some common features re- tained by all the algorithms can be recognized. For in- stance,thedestinationportfeatureisalwayspresentsince,in aDDoSattack, atargetvictimis typicallyreachedonapar- ticular exposed TCP/UDP port. Moreover, since DDoS at- tacksarecharacterizedbyalargeamountofsmall-sizepack- ets, features embodying information about packet lengths are retained. The difference is that, some algorithms (e.g. Scatter, MO-EA, Cuckoo, Tabu, LFS) just keep the essen- tialfeaturesrelatedtopacketlength(e.g. totalpacketlength, total number of bytes sent in initial window); whereas, other algorithms (e.g. Ranking, Genetic, PSO, Ant) pre- fer to retain more features belonging to the same family. DDoSisalsocharacterizedbysomekindofsynchronization amongthebots,whicharecoordinatedtolaunchanalmost- simultaneous attack. This means that time-related features willoftenprovideusefulinformationtodetectDDoS.Inter- estingly, the Genetic algorithm retains 5features relating to the inter-arrival flow times, resulting in a dark gray cluster at the center of the correlation map (Fig. 2(g)).ItisalsopossibleforDDoSattackstobeevenmoreeffec- tivethroughthemodificationoftheIPflags(e.g. SYN/RST flooding). Accordingly, features embodying information aboutIPflags(e.g. RST-SYN-URGflagcount)areretained by algorithms such as Ant (Fig. 2(a)), MO-EA (Fig. 2(c)), Cuckoo (Fig. 2(e)), Genetic (Fig. 2(g)), and PSO (Fig. 2(h)). Let us note that many algorithms opt for selecting featuresthatareuncorrelatedamongthem(fewdarkgrayor blackclustersarepresent)sincetheyconveymorevariegated information. Let us now analyze some findings obtained from the time-complexity evaluation. To this aim, we use a PC equipped with Intel CoreTMi5-7200U CPU@ 2.50GHz CPUand16GBofRAM.InFig. 3(a),weshowhowtheFS timevarieswithtrainingsize,fortheDDoSdataset. Nodra- maticdifferencesareobservedacrossthevariousalgorithms, even more significantly as the training size grows. Consid- ering a relatively large training size (with 5 104training instances), FS times range from about 10seconds (Scatter algorithm) to almost 26seconds (MO-EA algorithm). Sur- prisingly, the FS times are rather uniform, in spite of the broadvariationinnumberofretainedfeatures(byeachofthe algorithms). For instance, remaining in the case of 5 104 training instances, Scatter retains the minimum number of features (4), while Genetic retains the maximum number of features(27);yetFStimesarecomparable( 16:19and10:18 seconds, respectively). Although it is legitimate to expect that higher FS time could be justified to produce a more re- ducedfeaturespace,thescarcecorrelationbetweensuchob- servables is due to the particular logic implemented in each FS algorithm. On the other hand, Fig. 3(b) provides the training times obtained by applying the J48 benchmark algorithm, down- stream of the FS processing step. Here, the black line (with emptycircles)givesthetrainingtimesobtainedwhennoFS processing is employed. We can observe how FS leads to significantimprovements,intermsofbothtimesandtrends. Di Mauro et al.: Preprint submitted to Elsevier Page 10 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.0051.01DDoS Dataset Accuracy (DDoS) F-Measure (DDoS) Accuracy (Benign) F-Measure (Benign) (a) NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.0051.01Portscan Dataset Accuracy (Portscan) F-Measure (Portscan) Accuracy (Benign) F-Measure (Benign) (b) NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.005WebAttack Dataset Accuracy (WebAttack) F-Measure (WebAttack) Accuracy (Benign) F-Measure (Benign) (c) NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.970.9750.980.9850.990.99511.005TOR Dataset Accuracy (TOR) F-Measure (TOR) Accuracy (Non TOR) F-Measure (Non TOR) (d) Figure 4: Performance in terms of Accuracy/F-Measures for different single class datasets: DDoS (a), Portscan (b), WebAttack (c), TOR (d). The black (benchmark) line grows rapidly to almost 80 sec- onds,whilemostalgorithmspeaktoalmost5seconds,with theexceptionoftheGeneticalgorithm(yellowline)andthe Particle Swarm algorithm (light blue line) that take over 10 seconds to complete. This indicates that the FS process, on the whole, brings gains in the range of about one order of magnitude,whichmaybecomeevenmoresignificantasthe dataset grows. Let us now analyze the performance of the proposed FS algorithmsintermsofAccuracyandF-Measure. Thesetwo metrics,widelyusedinthefieldoftrafficclassification[156, 157], are defined as follows: •Accuracy : the ratio of the correctly predicted obser- vations to the total observations. This is the most in- tuitive indicator. •F-Measure : the weighted average of precision (ratio ofcorrectlyclassifiedflowsoverallpredictedflowsina class) and recall (ratio of correctly classified flows overallgroundtruthflowsinaclass). Thisisanindi- cator of a per-class performance. To verify that the effectiveness of the FS algorithms is notlinkedtospecificdatasets,wehaveconsideredthe 4dif- ferent datasets introduced in Sect. 5(DDoS, Portscan, We- bAttack, and TOR), reporting our findings in Fig. 4. Just like for the previous experiments, we have used the tree- based J 48algorithm as a benchmark. We have adopted a 10-foldcross-validationwhichistypicalinappliedML,and offersagoodtrade-offbetweentrainingtimeandrobustness. Noticeably,allFSalgorithmsperformsatisfactorily(bothin accuracy and F-measure) in comparison to the benchmark (firstbarsinallthehistograms,labeledas“NOF.S.”)forthe four datasets. InsomeinstancestheFSalgorithmsperformedevenbet- ter than the benchmark (e.g., Rank and Genetic algorithms in the WebAttack dataset). This can be explained by a phe- Di Mauro et al.: Preprint submitted to Elsevier Page 11 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review (a) Ant (22 fts) (b) Scatter/Tabu (9 fts) Tot Lenof BwdPktsFwdPktLenStdBwdPktLenMeanInit_Win_bytes_FwdInit_Win_bytes_BwdFlow Pkt/sTot Lenof BwdPktsFwdPktLenStdBwdPktLenMeanInit_Win_bytes_FwdInit_Win_bytes_BwdFlow Pkt/s (c) MO-EA (6 fts) (d) Ranking (28 fts) (e) Cuckoo (17 fts) Tot Lenof BwdPktsFwdPktLenStdAvgBwdSegmentSizeInit_Win_bytes_FwdInit_Win_bytes_BwdFlow IAT MaxFwdPktLenMaxBwdPktLenStdFlow IAT MinTot Lenof BwdPktsFwdPktLenStd AvgBwdSegmentSizeInit_Win_bytes_FwdInit_Win_bytes_BwdFlow IAT MaxFwdPktLenMaxBwdPktLenStdFlow IAT Min (f) LFS (9 fts) (g) Genetic (31 fts) (h) PSO (23 fts) Figure 5: Correlation maps - MultiAndroid dataset. In parenthesis is reported the number of features surviving after the FS process. nomenon that is well-known in ML, whereby models based on too many features may lead to biased classification. On theotherhand,whenFSmanagestoretainasufficientlyhigh number of meaningful features, there is a positive effect on accuracy. This is the case of the Genetic algorithm applied to the TOR dataset (Fig. 4(d)) that performs better than the other methods.6.2. Multi Class Analysis Another fruitful analysis is aimed at evaluating FS al- gorithms when multi-instance datasets are considered. This turns out to be particularly useful when it is not possible to discerndifferenttypesofdatatrafficviasomepre-processing filter (e.g. IP/Port-based filtering). To assess this case, we consider two datasets: the MultiAndroid dataset, containing benigntrafficmixedupwithfivedifferenttypesofAndroid- based threats; and the DDoS/Portscan dataset, including a Di Mauro et al.: Preprint submitted to Elsevier Page 12 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review 0 1 2 3 4 5 Training Size ×104100101102Feat. Sel. Time (sec)MO-EA Rank Ant Tabu Genetic Particle Swarm Cuckoo Lin.Fwd.Sel. Scatter (a) 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 Training Size ×104100101102103Training Time (sec)NO Feat. Sel. MO-EA Rank Ant Tabu Genetic Particle Swarm Cuckoo Lin.Fwd.Sel. Scatter (b) Figure 6: FS times - MultiAndroid dataset (a); Training times - MultiAndroid dataset (b). mix of DDoS, Portscan, and benign traffic. The MultiAn- droiddataset,includesthefollowingtypesofmaligntraffic: •FakeApp.AL : a scareware hidden inside a fake Minecraft application, one of the most popular game applications; •Android Defender : a malware which, once acci- dentally downloaded and installed, raises some fake alerts; •Gooligam : an insidious malware that has already in- fected more than 1million Android-based devices, aimed at stealing Google accounts for Drive, Docs, Gmail, etc.; •Feiwo: belonging to the adware family, it acts by showingadvertisementsinthesystemnotificationbar, and by sending device GPS coordinates to a remote server; •Charger: a ransomware hidden in some Google Play applications, which gains root privileges and steals contacts before asking for a ransom. Let us analyze how FS algorithms impact on the Mul- tiAndroid dataset in terms of feature correlation referring first to the panels of Fig. 5. Comparing these results with the ones of Fig. 2, an interesting difference emerges: all FS algorithms retain more features w.r.t. the single-class case. Thisbehavioriscoherentwiththefactthat,todealwithdif- ferent types of threats (ransomware, adware, malware) we need more features, to be able to capture this higher vari- ability. This effect is even more evident in time-based fea- tures (mainly inter-arrival times) and in size-based features (mainly packet lengths). Looking at DDoS, we observe a difference between single- and multi-class analysis. In the latter, the destina-tion port is not retained as a crucial feature. This is possi- blybecausemalwaresexploitdifferentmechanismstocreate damage: rather than directly overwhelming a particular tar- getport,theyfirstactinthebackground(e.g. bystealingpri- vacy data) and then produce malicious traffic in egress. On the other hand, DDoS attacks generate ingress traffic from the infected device. It is worth noticing that, when applied to multi-class problems,allalgorithmshavepreservedtheiroriginallogic. For instance, with 31 surviving features, the Genetic algo- rithm is still the algorithm that saves more features, thanks totheroleplayedbythemutationoperator. Anotherexample istheMO-EAalgorithmthat,justlikeinthesingle-classex- periment,retainsthesmallestnumberoffeatures( 6). Thisis mainly due to the diversity-preservation mechanism, which forces the selection of a representative subset of the whole Pareto front. It optimizes conflicting objective functions, thus few solutions survive. The time-complexity evaluation is reported in Fig. 6, which evaluates the usual FS algorithms onto the MultiAn- droid dataset. FS times exhibit the same order of magni- tude as in single-class analysis (Figs.3(a)). For a training size amounting to 5 104instances, the fastest algorithm is Scatter (FS time amounting to 9:541seconds); whereas the slowest one is MO-EA (FS time amounting to 24:827sec- onds). The situation changes dramatically when we consider training times for the J 48benchmark algorithm (Fig. 6(b)). Notably, multi-class algorithms are roughly one order of magnitudeslowerthantheirsingle-classcounterpart. Forin- stance,letusconsidertheGeneticalgorithm(yellowcurve). Fora 103trainingsize,GeneticFSreducesthetrainingtime to1:861seconds, growing to the following (X;Y) points: (104;10:731); (2 < 104;56:748); (3 < 104;133:346); (5 < 104;301:997). Thelongertrainingtimesarisefromthe process of training multiple classes. Nevertheless, signifi- Di Mauro et al.: Preprint submitted to Elsevier Page 13 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS/Scat 0.20.30.40.50.60.70.80.9Multi-Class Dataset (Android threats) - Accuracy FakeAppal Andr.Defender Gooligan Feiwo Charger Benign (a) NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS/Scat 0.20.250.30.350.40.450.50.550.6Multi-Class Dataset (Android threats) - F-Measure FakeAppal Andr.Defender Gooligan Feiwo Charger Benign (b) NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.980.9850.990.99511.005Multi-Class Dataset (DDoS/Portscan) - Accuracy DDoS Portscan Benign (c) NO F.S. MO-EA Rank Ant Tabu Genetic PSO Cuckoo LFS Scatter 0.980.9850.990.99511.005Multi-Class Dataset (DDoS/Portscan) - F-Measure DDoS Portscan Benign (d) Figure 7: MultiAndroid dataset: Accuracy (a), F-Measure (b); DDoS/Portscan dataset: Accuracy (c), F-Measure (d); cant gains are still obtained by all FS algorithms compared to the “NO F.S.” benchmark, which peaks at 446:329secs. Turning now to the performance analysis, in Fig. 7 wecomparethetwomulti-classdatasets,MultiAndroidand DDoS/Portscan,drawingsomeinterestingconsiderations. It is comparably more difficult to detect Android threats than DDoS/Portscan attacks - MultiAndroid accuracy is below 0:7and F-Measure is below 0:5. However, this issue is not generated by the FS processes, since the “NO F.S.” per- formance is poor too, particularly with the “Benign” class. This issue arises from two facts. First, mobile network at- tacks are often accompanied by activities that do not di- rectly/immediately generate network anomalies. Examples are ransomware and malware, whereby the anomalies arise after the user has downloaded the malicious application. There is typically a lag between infection and anomalies, as the malicious program initially establishes a secret/silent communication with a remote server, and then graduallysteals/sends private user data. Another example is adware, wherethoseannoyingbannersactuallyincurverylittledata, thusmakingithardtodetectfromtheregulartraffic. Asec- ond reason for the poor MultiAndroid performance is the strongsimilarityamongdifferentmalignclasses(e.g.,scare- ware, adware, ransomware). Similar considerations hold trueinthecaseinwhichweconsideradatasetincludingWe- battackandTORtraffic(notreportedforspaceconstraints), whereby the high similarity between the two classes re- sulted in poor classification performance. We should how- ever stress that FS algorithms are still very beneficial, since thetime-complexitybenefitsidentifiedareachievedwithno dramatic loss in accuracy. By contrast, the DDoS/Portscan multi-class case achieves outstanding performance (Figs.7(c) and (d)). This is because these types of attacks are radically distinct in the way they exploit network vulnerabilities: DDoS falls under the umbrella of volumetric attacks; whereas Portscan Di Mauro et al.: Preprint submitted to Elsevier Page 14 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review attacks employ monitoring strategies to unveil possible open ports. In other words, a peculiar symptom of a DDoS attack is the presence of an exceptionally large number of connections coming from different nodes and heading towards one network target’s port. Conversely, a symptom of Portscan attacks is the presence of just a single node (or a few nodes in case of simultaneous Portscans) opening a considerably large number of connections towards multiple ports of a certain network target. Thus it is relatively easier to differentiate between these two attacks. 6.3. General Remarks Overall, we can observe that FS algorithms do lead to an effective reduction in feature space, ranging from 65~ (Single Class, Genetic) to 95~(Single Class, Scatter) and from 60~(Multi Class, Genetic) to 92~(Multi Class, MO- EA). Such feature-space reduction translates into signifi- cantcomputational-timeimprovements,whichbecomeeven more remarked as the training size grows. For instance, with a training set of 50ksamples (single-class DDoS) the MO-EA algorithm takes 24:8secs to perform FS, while the trainingtimecomparedtothebenchmarkdropsfrom 72:2to 5:13secs. Atthesametime,performanceisnotsignificantly degraded by the feature reduction process - accuracy drops from 0:9993to0:9971. Similar considerations hold for all other algorithms. The performed assessment provides invaluable guide- linesfornetwork/securitymanagementpractitionersdealing with traffic classification problems. Our evaluation frame- work aims at weighing the practical benefits of the vari- ous FS techniques in terms of time-complexity reduction and performance guarantees. For instance, if we aimed at minimizing the overall processing time (i.e., FS plus train- ing times), the Scatter algorithm would be the best choice. Thisincursatotalprocessingtimeamountingto 14:338sec- onds for the single-class case (FS= 10:178secs plus train- ing= 4:16secs),andto 219:963secondsformulti-class(FS= 9:541secsplustraining= 210:422secs). Conversely,theGe- neticmethodwouldbepreferabletomaximizeperformance. 7. Conclusion and Future Direction Aprominentresearchdirectionfornetworkintrusionde- tectionistheadoptionofmachinelearningmethods,partic- ularly for the detection of anomalous (and often malicious) network-traffic flows. Looking at the literature, we find am- ple examples of network classification problems. Yet, little attention has been turned towards feature selection, which is an essential classification pre-processing step. We argue that the main reason for this overlook is that most studies have been based on the obsolete KDD 99dataset, which in- cludesfewfeatures,thusmakingFSirrelevant. Ontheother hand, we consider that modern network engines generate much richer features (in fact, hundreds of features), which allowmorefineandgranularnetworktrafficanalyses. How- ever, this extra capability results into impractical ML train- ingtimes,makingitnecessarytounderstandhowFSmaybe realized effectively.To this end, herein we have carried out an experimental comparativeevaluationofprominentmethods,withtheview to provide insights as to how the different FS algorithms perform in the peculiar context of network-traffic classifica- tion. Our assessment shows how few, relevant features are retained, but also that the FS reduction process is virtually lossless, with a significant acceleration of the overall train- ing process. To sum up, the novelties of our work are: i)we carry out an experimental-based review, consider- ingrecentdatasets(includingDDoS,Portscan,WebAttacks, and Android threats), as opposed to the obsolete KDD 99 dataset adopted in most literature; ii)we compare and contrast a representative number of alternative FS algorithm types, including classic rank- guided methods (LFS, Ranking), meta-heuristic methods (Particle Swarm, Tabu, Scatter), nature-inspired methods (Ant, Cuckoo), and evolutionary methods (Genetic, MO- EA); iii)we provide actual experimental results, unveiling trade-offs between performance (Accuracy/F-Measure) and computational time, at different scales (training set size). Ultimately,ouranalysisshowsthebenefitslinkedtoem- bedding the FS process into network analysis, providing a valuable tool for identifying the most useful features out of hundreds of possibilities. This will prove invaluable to the fieldsofnetworkmanagement,securitymanagement,intru- sion detection and incident response. We should note that, the purpose of our comparative evaluation was not to claim the predominance of some FS algorithms over others but, rather, to suggest a methodical framework to work with FS. As a byproduct of our investigation, some interesting open research directions emerge: i)extending the present analysisto unsupervised FStechniques,whichwouldbeuse- ful to deal with datasets lacking class labels, or with new types of (unknown) malicious traffic - this is the case of so called zero-day attacks that have no prior information; ii) consideringthecaseofstreameddataanalysis,whichisnec- essary when dealing with extremely time-variant streams, wherebytheFSprocessshouldberepeatedacrosstime(e.g. byusingamobiletimewindow),soastoperiodicallyupdate theresultingdatasetwiththefreshestfeatures; iii)designing routines to automatically manage the best FS strategies to be applied in accordance to specific criteria (e.g. accuracy target, latency needs, etc.). Our investigation goes into the direction of the 6G paradigm that, according to most net- workscientists,willbecharacterizedbyintelligentresource management,smartadjustments,andautomaticservicepro- visioning. References [1] F. Camastra and A. Staiano, “Intrinsic dimension estimation: Ad- vances and open problems,” Information Sciences , vol. 328, pp. 26 – 41, 2016. [2] F. Camastra, “Data dimensionality estimation methods: a survey,” Pattern Recognition , vol. 36, no. 12, pp. 2945 – 2954, 2003. [3] I. Possebon, A. Santos da Silva, L. Zambenedetti Granville, A. Schaeffer-Filho, and A. Marnerides, “Improved network traffic Di Mauro et al.: Preprint submitted to Elsevier Page 15 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review classification using ensemble learning,” in 2019 IEEE Symposium on Computers and Communications (ISCC) , 2019. [4] F. Grando, L. Zambenedetti Granville, and L. Lamb, “Machine learninginnetworkcentralitymeasures: Tutorialandoutlook,” ACM Comput. Surv. , vol. 51, no. 5, pp. 102:1–102:32, 2018. [5] R. Stadler, R. Pasquini, and V. Fodor, “Learning from network device statistics,” Journal of Network and Systems Management , vol. 25, no. 4, pp. 672–698, 2017. [6] A. A. Daya, M. A. Salahuddin, N. Limam, and R. Boutaba, “A graph-based machine learning approach for bot detection,” in 2019 IFIP/IEEESymposiumonIntegratedNetworkandServiceManage- ment (IM) , 2019, pp. 144–152. [7] G. Li, X. Hu, X. Shen, X. Chen, and Z. Li, “A novel unsupervised feature selection method for bioinformatics data sets through fea- ture clustering,” in 2008 IEEE International Conference on Granu- lar Computing , 2008, pp. 41–47. [8] C. Zheng, D. Huang, L. Zhang, and X. Kong, “Tumor clustering using nonnegative matrix factorization with gene selection,” IEEE Transactions on Information Technology in Biomedicine , vol. 13, no. 4, pp. 599–607, 2009. [9] D. Huang and H. Yu, “Normalized feature vectors: A novel alignment-free sequence comparison method based on the numbers of adjacent amino acids,” IEEE/ACM Transactions on Computa- tionalBiologyandBioinformatics ,vol.10,no.2,pp.457–467,2013. [10] H.Abusamra,“Acomparativestudyoffeatureselectionandclassifi- cationmethodsforgeneexpressiondataofglioma,” ProcediaCom- puter Science , vol. 23, pp. 5 – 14, 2013. [11] A. Khotanzad and Y. Hong, “Rotation invariant image recognition using features selected via a systematic method,” Pattern Recogni- tion, vol. 23, no. 10, pp. 1089 – 1101, 1990. [12] J. Y. Choi, Y. M. Ro, and K. N. Plataniotis, “Boosting color feature selection for color face recognition,” IEEE Transactions on Image Processing , vol. 20, no. 5, pp. 1425–1434, 2011. [13] A. Goltsev and V. Gritsenko, “Investigation of efficient features for image recognition by neural networks,” Neural Networks , vol. 28, pp. 15 – 23, 2012. [14] D. L. Swets and J. J. Weng, “Using discriminant eigenfeatures for image retrieval,” IEEE Transactions on Pattern Analysis and Ma- chine Intelligence , vol. 18, no. 8, pp. 831–836, 1996. [15] E.Rashedi,H.Nezamabadi-pour,andS.Saryazdi,“Asimultaneous feature adaptation and feature selection method for content-based imageretrievalsystems,” Knowledge-BasedSystems ,vol.39,pp.85 – 94, 2013. [16] Y.Liang,M.Zhang,andW.Browne,“Imagefeatureselectionusing geneticprogrammingforfigure-groundsegmentation,” Engineering Applications of Artificial Intelligence , vol. 62, pp. 96–108, 2017. [17] R. Chatterjee, T. Maitra, S. Hafizul Islam, M. Mehedi Hassan, A. Alamri, and G. Fortino, “A novel machine learning based fea- tureselectionformotorimageryeegsignalclassificationininternet of medical things environment,” Future Generation Computer Sys- tems, vol. 98, pp. 419–434, 2019. [18] K. Zhang, Y. Li, P. Scarf, and A. Ball, “Feature selection for high- dimensional machinery fault diagnosis data using multiple mod- els and radial basis function networks,” Neurocomputing , vol. 74, no. 17, pp. 2941 – 2952, 2011. [19] T.W.Rauber,F.deAssisBoldt,andF.M.Varejao,“Heterogeneous featuremodelsandfeatureselectionappliedtobearingfaultdiagno- sis,”IEEETransactionsonIndustrialElectronics ,vol.62,no.1,pp. 637–646, 2015. [20] D.Lewis,Y.Yang,T.Rose,andF.Li,“Rcv1: Anewbenchmarkcol- lectionfortextcategorizationresearch,” JournalofMachineLearn- ing Research , vol. 5, pp. 361–397, 2004. [21] S. V. Landeghem, T. Abeel, Y. Saeys, and Y. V. de Peer, “Discrim- inative and informative features for biomolecular text mining with ensemblefeatureselection,” Bioinformatics ,vol.26,no.18,pp.554– 560, 2010. [22] M. Labani, P. Moradi, F. Ahmadizar, and M. Jalili, “A novel multi- variate filter method for feature selection in text classification prob-lems,”Engineering Applications of Artificial Intelligence , vol. 70, pp. 25–37, 2018. [23] M.Injadat,A.Moubayed,A.B.Nassif,andA.Shami,“Multi-stage optimizedmachinelearningframeworkfornetworkintrusiondetec- tion,”IEEE Transactions on Network and Service Management , pp. 1–1, 2020. [24] C.Xu,R.Zhang,M.Xie,andL.Yang,“Networkintrusiondetection systemasaserviceinopenstackcloud,”in 2020InternationalCon- ference on Computing, Networking and Communications (ICNC) , 2020, pp. 450–455. [25] A. Shahraki, M. Abbasi, and O. Haugen, “Boosting algorithms for network intrusion detection: A comparative evaluation of real ad- aboost, gentle adaboost and modest adaboost,” Engineering Appli- cations of Artificial Intelligence , vol. 94, 2020. [26] M. Di Mauro, M. Longo, F. Postiglione, G. Carullo, and M. Tam- basco,“ServicefunctionchainingdeployedinanNFVenvironment: An availability modeling,” in 2017 IEEE Conference on Standards for Communications and Networking (CSCN) , 2017, pp. 42–47. [27] M. Di Mauro, M. Longo, F. Postiglione, and M. Tambasco, “Avail- ability modeling and evaluation of a network service deployed via NFV,”in DigitalCommunication.TowardsaSmartandSecureFu- ture Internet , 2017, pp. 31–44. [28] M.DiMauro,M.Longo,andF.Postiglione,“Availabilityevaluation of multi-tenant service function chaining infrastructures by multi- dimensional universal generating function,” IEEE Transactions on Services Computing , pp. 1–1, 2018. [29] M. Di Mauro, M. Longo, F. Postiglione, R. Restaino, and M. Tam- basco,“Availabilityevaluationofthevirtualizedinfrastructureman- ager in network function virtualization environments,” in Proc. of the 26th European Safety and Reliability Conference, ESREL 2016 , 2017, pp. 2591–2596. [30] M.DiMauro,M.Longo,andF.Postiglione,“Reliabilityanalysisof thecontrollerarchitectureinsoftwaredefinednetworks,”in Proc.of the 26th European Safety and Reliability Conference, ESREL 2015 , 2015, pp. 1503–1510. [31] M. Di Mauro, G. Galatro, M. Longo, F. Postiglione, and M. Tam- basco, “Availability evaluation of a virtualized IP Multimedia Sub- systemfor5Gnetworkarchitectures,”in Proc.ofthe26thEuropean Safety and Reliability Conference, ESREL 2017 , 2017, pp. 2203– 2210. [32] ——,“ComparativeperformabilityassessmentofSFCs: Thecaseof containerizedIPMultimediaSubsystem,” IEEETrans.Netw.Service Manag., 2020. [33] ——, “Performability management of softwarized IP Multimedia Subsystem,” in IEEE/IFIP Network Operations and Management Symposium, 2020 , 2020, pp. 1–6. [34] M. Di Mauro, G. Galatro, M. Longo, A. Palma, F. Postiglione, and M. Tambasco, “Automated generation of availability models for SFCs: The case of virtualized IP Multimedia Subsystem,” in IEEE/IFIPNetworkOperationsandManagementSymposium,2020 , 2020, pp. 1–6. [35] V.Matta,M.DiMauro,andM.Longo,“Botnetidentificationinran- domizedDDoSattacks,”in Proceedingsofthe24thEuropeanSignal Processing Conference , 2016, pp. 2260–2264. [36] ——, “Botnet identification in multi-clustered DDoS attacks,” in 2017 25th European Signal Processing Conference (EUSIPCO) , 2017, pp. 2171–2175. [37] P. Addesso, M. Cirillo, M. Di Mauro, and V. Matta, “ADVoIP: Ad- versarialdetectionofencryptedandconcealedvoip,” IEEETransac- tions on Information Forensics and Security , vol. 15, pp. 943–958, 2020. [38] V.Matta,M.DiMauro,M.Longo,andA.Farina,“Cyber-threatmit- igationexploitingthebirth–death–immigrationmodel,” IEEETrans- actions on Information Forensics and Security , vol. 13, no. 12, pp. 3137–3152, 2018. [39] W. Cerroni, G. Moro, R. Pasolini, and M. Ramilli, “Decentralized detection of network attacks through p2p data clustering of snmp data,”Computers & Security , vol. 52, pp. 1 – 16, 2015. Di Mauro et al.: Preprint submitted to Elsevier Page 16 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review [40] ——,“Networkattackdetectionbasedonpeer-to-peerclusteringof snmpdata,”in LectureNotesoftheInstituteforComputerSciences , vol. 22, 2009. [41] W. Cerroni, G. Moro, T. Pirini, and M. Ramilli, “Peer-to-peer data miningclassifiersfordecentralizeddetectionofnetworkattacks,”in Proceedings of the Twenty-Fourth Australasian Database Confer- ence - Volume 137 , 2013, pp. 101–107. [42] “The CSE-CIC-IDS2018 Dataset,” https://github.com/alekzandr/ flowmeter, accessed: 2020-10-01. [43] G.ChandrashekarandF.Sahin,“Asurveyonfeatureselectionmeth- ods,”Computers & Electrical Engineering , vol. 40, no. 1, pp. 16 – 28, 2014. [44] S. Khalid, T. Khalil, and S. Nasreen, “A survey of feature selection andfeatureextractiontechniquesinmachinelearning,”in 2014Sci- ence and Information Conference , 2014, pp. 372–378. [45] L. C. Molina, L. Belanche, and A. Nebot, “Feature selection algo- rithms: a survey and experimental evaluation,” in 2002 IEEE Inter- nationalConferenceonDataMining,2002.Proceedings. ,2002,pp. 306–313. [46] L. Yu and H. Liu, “Efficient feature selection via analysis of rele- vanceandredundancy,” TheJournalofMachineLearningResearch , vol. 5, pp. 1205–1224, 2004. [47] F. Camastra and A. Vinciarelli, Feature Extraction Methods and Manifold Learning Methods . Springer London, 2008. [48] A. L. Blum and P. Langley, “Selection of relevant features and ex- amples in machine learning,” Artificial Intelligence , vol. 97, no. 1, pp. 245 – 271, 1997. [49] M.DashandH.Liu,“Featureselectionforclassification,” Intelligent Data Analysis , vol. 1, no. 1, pp. 131 – 156, 1997. [50] S.Alelyani,J.Tang,andH.Liu,“Featureselectionforclustering: A review,” in Data Clustering: Algorithms and Applications , 2013. [51] L. Rendell and R. Seshu, “Learning hard concepts through con- structive induction: Framework and rationale,” in Proceedings of a Workshop on Computational Learning Theory and Natural Learn- ing Systems (Vol. 1) : Constraints and Prospects: Constraints and Prospects , 1994, pp. 83–141. [52] L.Talavera,“Anevaluationoffilterandwrappermethodsforfeature selection in categorical clustering,” in Advances in Intelligent Data Analysis VI , 2005, pp. 440–451. [53] M. A. Hall and L. A. Smith, “Feature selection for machine learn- ing: Comparing a correlation-based filter approach to the wrapper,” inProceedings of the Twelfth International Florida Artificial Intel- ligence Research Society Conference , 1999, pp. 235–239. [54] R. Kohavi and G. H. John, “Wrappers for feature subset selection,” Artificial Intelligence , vol. 97, no. 1, pp. 273 – 324, 1997. [55] I. Guyon, “An introduction to variable and feature selection,” Jour- nal of Machine Learning Research , vol. 3, pp. 1157–1182, 2003. [56] J. C. Ang, A. Mirzal, H. Haron, and H. N. A. Hamed, “Supervised, unsupervised, and semi-supervised feature selection: A review on geneselection,” IEEE/ACMTransactionsonComputationalBiology and Bioinformatics , vol. 13, no. 5, pp. 971–989, 2016. [57] J.Dromard,G.Roudière,andP.Owezarski,“Onlineandscalableun- supervised network anomaly detection method,” IEEE Trans. Netw. Service Manag. , vol. 14, no. 1, pp. 34–47, 2017. [58] W. Wang, Y. He, J. Liu, and S. Gombault, “Constructing important features from massive network traffic for lightweight intrusion de- tection,”IETInformationSecurity ,vol.9,no.6,pp.374–379,2015. [59] T. Janarthanan and S. Zargari, “Feature selection in unsw-nb15 and kddcup’99 datasets,” in 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE) , 2017, pp. 1881–1886. [60] K.El-Khatib,“Impactoffeaturereductionontheefficiencyofwire- lessintrusiondetectionsystems,” IEEETransactionsonParalleland Distributed Systems , vol. 21, no. 8, pp. 1143–1149, 2010. [61] Y. Chen, Y. Li, X. Cheng, and L. Guo, “Survey and taxonomy of feature selection algorithms in intrusion detection system,” in Pro- ceedingsoftheSecondSKLOISConferenceonInformationSecurity and Cryptology , 2006, pp. 153–167. [62] A.Nisioti,A.Mylonas,P.D.Yoo,andV.Katos,“Fromintrusionde-tection to attacker attribution: A comprehensive survey of unsuper- vised methods,” IEEE Communications Surveys Tutorials , vol. 20, no. 4, pp. 3369–3388, 2018. [63] F. Iglesias and T. Zseby, “Analysis of network traffic features for anomaly detection,” Machine Learning , vol. 101, no. 1, pp. 59–84, 2015. [64] R.Singh,H.Kumar,andR.K.Singla,“Analysisoffeatureselection techniques for network traffic dataset,” in 2013 International Con- ference on Machine Intelligence and Research Advancement , 2013, pp. 42–46. [65] M. Bahrololum, E. Salahi, and M. Khaleghi, “Machine learning techniques for feature reduction in intrusion detection systems: A comparison,” in Progress in Computing, Analytics and Networking. Advances in Intelligent Systems and Computing , 2009, pp. 1091– 1095. [66] Y.Dhote,S.Agrawal,andA.J.Deen,“Asurveyonfeatureselection techniques for internet traffic classification,” in 2015 International ConferenceonComputationalIntelligenceandCommunicationNet- works (CICN) , 2015, pp. 1375–1380. [67] A. L. Buczak and E. Guven, “A survey of data mining and machine learningmethodsforcybersecurityintrusiondetection,” IEEECom- municationsSurveysTutorials ,vol.18,no.2,pp.1153–1176,2016. [68] P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A de- tailed investigation and analysis of using machine learning tech- niques for intrusion detection,” IEEE Communications Surveys Tu- torials, vol. 21, no. 1, pp. 686–728, 2019. [69] M. Di Mauro and C. Di Sarno, “Improving SIEM capabilities through an enhanced probe for encrypted skype traffic detection,” Journal of Information Security and Applications , vol. 38, pp. 85– 95, 2018. [70] M. Di Mauro and M. Longo, “Skype traffic detection: A decision theory based tool,” in 2014 International Carnahan Conference on Security Technology (ICCST) , 2014, pp. 1–6. [71] M. Di Mauro and C. Di Sarno, “A framework for internet data real- time processing: A machine-learning approach,” in 2014 Interna- tionalCarnahanConferenceonSecurityTechnology(ICCST) ,2014, pp. 1–6. [72] F. Cauteruccio, G. Fortino, A. Guerrieri, A. Liotta, D. Mocanu, C. Perra, G. Terracina, and M. Torres Vega, “Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance,” Information Fu- sion, vol. 52, pp. 13 – 30, 2019. [73] M. Di Mauro, G. Galatro, and A. Liotta, “Experimental review of neural-based approaches for network intrusion management,” IEEE Transactions on Network and Service Management , pp. 1–1, 2020. [74] M. Di Mauro and M. Longo, “Revealing encrypted webrtc traffic viamachinelearningtools,”in 201512thInternationalJointConfer- enceone-BusinessandTelecommunications(ICETE) ,vol.04,2015, pp. 259–266. [75] H. Benaddi, K. Ibrahimi, and A. Benslimane, “Improving the in- trusion detection system for nsl-kdd dataset based on pca-fuzzy clustering-knn,” in 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM) , 2018, pp. 1–6. [76] W. Wang, X. Du, and N. Wang, “Building a cloud ids using an ef- ficient feature selection method and svm,” IEEE Access , vol. 7, pp. 1345–1354, 2019. [77] S.M.KasongoandY.Sun,“Adeeplearningmethodwithfilterbased feature engineering for wireless intrusion detection system,” IEEE Access, vol. 7, pp. 38597–38607, 2019. [78] K. Wu, Z. Chen, and W. Li, “A novel intrusion detection model for a massive network using convolutional neural networks,” IEEE Ac- cess, vol. 6, pp. 50850–50859, 2018. [79] M. A. Ambusaidi, X. He, P. Nanda, and Z. Tan, “Building an in- trusion detection system using a filter-based feature selection algo- rithm,”IEEETransactionsonComputers ,vol.65,no.10,pp.2986– 2998, 2016. [80] K. A. Taher, B. Mohammed Yasin Jisan, and M. M. Rahman, “Net- work intrusion detection using supervised machine learning tech- Di Mauro et al.: Preprint submitted to Elsevier Page 17 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review nique with feature selection,” in 2019 International Conference on Robotics,Electrical and Signal Processing Techniques (ICREST) , 2019, pp. 643–646. [81] J. Woo, J. Song, and Y. Choi, “Performance enhancement of deep neural network using feature selection and preprocessing for intru- sion detection,” in 2019 International Conference on Artificial In- telligence in Information and Communication (ICAIIC) , 2019, pp. 415–417. [82] F. Amiri, M. R. Yousefi, C. Lucas, A. Shakery, and N. Yazdani, “Mutual information-based feature selection for intrusion detection systems,” Journal of Network and Computer Applications , vol. 34, no. 4, pp. 1184 – 1199, 2011. [83] M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the kdd cup 99 data set,” in 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications , 2009, pp. 1–6. [84] N.MoustafaandJ.Slay,“Unsw-nb15: acomprehensivedatasetfor networkintrusiondetectionsystems(unsw-nb15networkdataset),” in2015MilitaryCommunicationsandInformationSystemsConfer- ence (MilCIS) , 2015, pp. 1–6. [85] N.Moustafa,J.Slay,andG.Creech,“Novelgeometricareaanalysis techniqueforanomalydetectionusingtrapezoidalareaestimationon large-scalenetworks,” IEEETransactionsonBigData ,vol.5,no.4, pp. 481–494, 2019. [86] Doreswamy, M. K. Hooshmand, and I. Gad, “Feature selection ap- proach using ensemble learning for network anomaly detection,” CAAI Transactions on Intelligence Technology , vol. 5, no. 4, pp. 283–293, 2020. [87] A. Binbusayyis and T. Vaiyapuri, “Identifying and benchmarking key features for cyber intrusion detection: An ensemble approach,” IEEE Access , vol. 7, pp. 106495–106513, 2019. [88] “canadian institute for cybersecurity,” https://www.unb.ca/cic/, ac- cessed: 2020-10-01. [89] M.A.HallandG.Holmes,“Benchmarkingattributeselectiontech- niquesfordiscreteclassdatamining,” IEEETransactionsonKnowl- edge and Data Engineering , vol. 15, no. 6, pp. 1437–1447, 2003. [90] R. B and G. S, “An intelligent fuzzy rule based feature selection for effective intrusion detection,” in 2018 International Conference on RecentTrendsinAdvanceComputing(ICRTAC) ,2018,pp.206–211. [91] V. S. Takkellapati and G. V. Prasad, “Network intrusion detection system based on feature selection and triangle area support vector machine,” International Journal of Engineering Trends and Tech- nology, vol. 3, no. 4, pp. 466–470, 2012. [92] S.Ganapathy,K.Kulothungan,P.Yogesh,andA.Kannan,“Anintel- ligentintrusiondetectionsystemforadhocnetworks,”in IETChen- nai3rdInternationalonSustainableEnergyandIntelligentSystems (SEISCON 2012) , 2012, pp. 1–5. [93] J.M.HernándezJimà ©nezandK.Goseva-Popstojanova,“Theef- fectonnetworkflows-basedfeaturesandtrainingsetsizeonmalware detection,”in 2018IEEE17thInternationalSymposiumonNetwork Computing and Applications (NCA) , 2018, pp. 1–9. [94] P. Singh and A. Tiwari, “An efficient approach for intrusion detec- tion in reduced features of kdd99 using id3 and classification with knnga,” in 2015 Second International Conference on Advances in Computing and Communication Engineering , 2015, pp. 445–452. [95] M. Gutlein, E. Frank, M. Hall, and A. Karwath, “Large-scale at- tributeselectionusingwrappers,”in 2009IEEESymposiumonCom- putational Intelligence and Data Mining , 2009, pp. 332–339. [96] W.Wang,X.Wang,D.Feng,J.Liu,Z.Han,andX.Zhang,“Explor- ing permission-induced risk in android applications for malicious applicationdetection,” IEEETransactionsonInformationForensics and Security , vol. 9, no. 11, pp. 1869–1882, 2014. [97] I. Finizio, C. Mazzariello, and C. Sansone, “Combining genetic- basedmisuseandanomalydetectionforreliablydetectingintrusions in computer networks,” in Proceedings of the 13th International Conference on Image Analysis and Processing , 2005, pp. 66–74. [98] Y. Liu, Z. Xu, J. Yang, L. Wang, C. Song, and K. Chen, “A novel meta-heuristic-based sequential forward feature selection approachfor anomaly detection systems,” in 2016 International Conference onNetworkandInformationSystemsforComputers(ICNISC) ,2016, pp. 218–227. [99] F.Glover,“Futurepathsforintegerprogrammingandlinkstoartifi- cialintelligence,” Computers&OperationsResearch ,vol.13,no.5, pp. 533 – 549, 1986. [100] G.F.W.andL.M., TabuSearch . NewYork,USA:Springer,1997. [101] C. Rego and B. Alidaee, Metaheuristic Optimization via Memory and Evolution: Tabu Search and Scatter Search (Operations Re- search/Computer Science Interfaces Series) . Berlin, Heidelberg: Springer-Verlag, 2005. [102] A.-R.Hedar,J.Wang,andM.Fukushima,“Tabusearchforattribute reduction in rough set theory,” Soft Computing , vol. 12, no. 9, pp. 909–918, 2008. [103] H.Mohamadi,J.Habibi,andH.Saadi,“Intrusiondetectionincom- puter networks using tabu search based fuzzy system,” in 2008 7th IEEE International Conference on Cybernetic Intelligent Systems , 2008, pp. 1–6. [104] W.Jian-guang,T.Ran,andL.Zhi-Yong,“Animprovingtabusearch algorithmforintrusiondetection,”in 2011ThirdInternationalCon- ference on Measuring Technology and Mechatronics Automation , vol. 1, 2011, pp. 435–439. [105] Y. Chen, L. Dai, and X. Cheng, “Gats-c4.5: An algorithm for opti- mizing features in flow classification,” in 2008 5th IEEE Consumer Communications and Networking Conference , 2008, pp. 466–470. [106] K.Bakour,G.S.Das,andH.M.Unver,“Anintrusiondetectionsys- tembasedonahybridtabu-geneticalgorithm,”in 2017International Conference on Computer Science and Engineering (UBMK) , 2017, pp. 215–220. [107] XiaocongZ.,DonglingL.,andYangY.,“Improvedincrementalsup- portvectormachinewithhybridfeatureselectionfornetworkintru- sion detection,” in 2013 International Conference on Information and Network Security (ICINS 2013) , 2013, pp. 1–6. [108] F.Glover,“Heuristicsforintegerprogrammingusingsurrogatecon- straints,” Decision Sciences , vol. 8, pp. 156–166, 1977. [109] Z. Ugray, L. Lasdon, J. Plummer, F. Glover, J. Kelly, and R. Marti, “Scatter search and local nlp solvers: a multistart framework for globaloptimization,” InformsJournalonComputing ,vol.19,no.3, pp. 328 – 340, 2007. [110] J. Wang, A. R. Hedar, S. Wang, and J. Ma, “Rough set and scat- ter search metaheuristic based feature selection for credit scoring,” Expert Systems with Applications , vol. 39, no. 6, pp. 6123 – 6128, 2012. [111] F. G. Lopez, M. G. Torres, B. M. Batista, J. A. M. Perez, and J. M. Moreno-Vega,“Solvingfeaturesubsetselectionproblembyaparal- lel scatter search,” European Journal of Operational Research , vol. 169, no. 2, pp. 477 – 489, 2006. [112] E. Duman and M. H. Ozcelik, “Detecting credit card fraud by ge- netic algorithm and scatter search,” Expert Systems with Applica- tions, vol. 38, no. 10, pp. 13057 – 13063, 2011. [113] D.ByersandN.Shahmehri,“Prioritisationandselectionofsoftware security activities,” in 2009 International Conference on Availabil- ity, Reliability and Security , 2009, pp. 201–207. [114] J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Pro- ceedings of ICNN’95 - International Conference on Neural Net- works, vol. 4, 1995, pp. 1942–1948 vol.4. [115] Q.Yao,J.Cai,andJ.Zhang,“Simultaneousfeatureselectionandls- svmparametersoptimizationalgorithmbasedonPSO,”in 2009WRI WorldCongressonComputerScienceandInformationEngineering , vol. 5, 2009, pp. 723–727. [116] W.Hu,J.Gao,Y.Wang,O.Wu,andS.Maybank,“Onlineadaboost- basedparameterizedmethodsfordynamicdistributednetworkintru- sion detection,” IEEE Transactions on Cybernetics , vol. 44, no. 1, pp. 66–82, 2014. [117] H.Li,W.Guo,G.Wu,andY.Li,“ARF-PSObasedhybridfeaturese- lectionmodelinintrusiondetectionsystem,”in 2018IEEEThirdIn- ternationalConferenceonDataScienceinCyberspace(DSC) ,2018, pp. 795–802. Di Mauro et al.: Preprint submitted to Elsevier Page 18 of 19Supervised Feature Selection Techniques in Network Intrusion Detection: a Critical Review [118] S. Fong, R. Wong, and A. V. Vasilakos, “Accelerated PSO swarm search feature selection for data stream mining big data,” IEEE TransactionsonServicesComputing ,vol.9,no.1,pp.33–45,2016. [119] M.Dorigo,V.Maniezzo,andA.Colorni,“Antsystem: optimization by a colony of cooperating agents,” IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) , vol. 26, no. 1, pp. 29– 41, 1996. [120] T. Mehmood and H. B. M. Rais, “Svm for network anomaly detec- tion using aco feature subset,” in 2015 International Symposium on MathematicalSciencesandComputingResearch(iSMSC) ,2015,pp. 121–126. [121] S.Hardeand V. Sahare,“Designandimplementationof acofeature selection algorithm for data stream mining,” in 2016 International ConferenceonAutomaticControlandDynamicOptimizationTech- niques (ICACDOT) , 2016, pp. 1047–1051. [122] H. Peng, C. Ying, S. Tan, B. Hu, and Z. Sun, “An improved feature selectionalgorithmbasedonantcolonyoptimization,” IEEEAccess , vol. 6, pp. 69203–69209, 2018. [123] X. Yang, Cuckoo Search and Firefly Algorithm: Theory and Appli- cations. London, UK: Springer, 2013. [124] Z.Li,Y.Su,andQ.Han,“Intrusiondetectionbasedonpcaandfuzzy clustering optimized by cs,” in 2017 Chinese Automation Congress (CAC), 2017, pp. 6334–6339. [125] E. J. L. D. Asir Antony Gnana Singh, R. Priyadharshini, “Cuckoo optimisationbasedintrusiondetectionsystemforcloudcomputing,” InternationJournalofComputerNetworkandInformationSecurity , vol. 11, pp. 42–49, 2018. [126] K. Rithesh, “Anomaly-based nids using artificial neural networks optimised with cuckoo search optimizer,” in Emerging Research in Electronics, Computer Science and Technology , 2019, pp. 23–35. [127] W. Niu, X. Zhang, G. Yang, Z. Ma, and Z. Zhuo, “Phishing emails detection using cs-svm,” in 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEEInternationalConferenceonUbiquitousComputingandCom- munications (ISPA/IUCC) , 2017, pp. 1054–1059. [128] M.Redmond,S.Salesi,andG.Cosma,“Anovelapproachbasedon anextendedcuckoosearchalgorithmfortheclassificationoftweets which contain emoticon and emoji,” in 2017 2nd International Conference on Knowledge Engineering and Applications (ICKEA) , 2017, pp. 13–19. [129] I.H.Abdulqadder,D.Zou,I.T.Aziz,B.Yuan,andW.Li,“Secsdn- cloud: Defeatingvulnerableattacksthroughsecuresoftware-defined networks,” IEEE Access , vol. 6, pp. 8292–8301, 2018. [130] T. Weise, “Global optimization algorithms – theory and applica- tion,” 2009. [131] W.W.BledsoeandI.Browning,“Patternrecognitionandreadingby machine,” in Papers Presented at the December 1-3, 1959, Eastern Joint IRE-AIEE-ACM Computer Conference , 1959, pp. 225–232. [132] H.J.Bremermann,“Optimizationthroughevolutionandrecombina- tion,” inSelf-Organizing Systems , M. C. Yovits, G. T. Jacobi, , and G. D. Goldstein, Eds. Spartan Books, 1962. [133] J.Holland,“Outlineforalogicaltheoryofadaptivesystems,” Jour- nal of ACM , vol. 9, no. 3, pp. 297–314, 1962. [134] ——, AdaptationinNaturalandArtificialSystems: AnIntroductory AnalysiswithApplicationstoBiology,ControlandArtificialIntelli- gence. Cambridge, MA, USA: MIT Press, 1992. [135] C.Coello,“Anupdatedsurveyofga-basedmultiobjectiveoptimiza- tion techniques,” ACM Computing Surveys , vol. 32, no. 2, pp. 109– 143, 2000. [136] D. Goldberg, Genetic Algorithms in Search, Optimization and Ma- chineLearning ,1sted. Boston,MA,USA:Addison-WesleyLong- man Publishing Co., Inc., 1989. [137] S. Guha, S. S. Yau, and A. B. Buduru, “Attack detection in cloud infrastructures using artificial neural network with genetic feature selection,” in 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing , 2016, pp. 414–419. [138] B. Senthilnayaki, K. Venkatalakshmi, and A. Kannan, “An intelli- gentintrusiondetectionsystemusinggeneticbasedfeatureselectionandmodifiedJ48decisiontreeclassifier,”in 2013FifthInternational Conference on Advanced Computing (ICoAC) , 2013, pp. 1–7. [139] ——, “Intrusion detection using optimal genetic feature selection and svm based classifier,” in 2015 3rd International Conference on SignalProcessing,CommunicationandNetworking(ICSCN) ,2015, pp. 1–4. [140] H.GharaeeandH.Hosseinvand,“Anewfeatureselectionidsbased ongeneticalgorithmandsvm,”in 20168thInternationalSymposium on Telecommunications (IST) , 2016, pp. 139–144. [141] P. Tao, Z. Sun, and Z. Sun, “An improved intrusion detection al- gorithm based on GA and SVM,” IEEE Access , vol. 6, pp. 13624– 13631, 2018. [142] C.M.FonsecaandP.J.Fleming,“Anoverviewofevolutionaryalgo- rithms in multiobjective optimization,” Evolutionary Computation , vol. 3, no. 1, pp. 1–16, 1995. [143] F. Jimenez, G. Sanchez, J. Garcia, G. Sciavicco, and L. Miralles, “Multi-objectiveevolutionaryfeatureselectionforonlinesalesfore- casting,”Neurocomputing , vol. 234, pp. 75 – 92, 2017. [144] M.S.AliakbarianandA.Fanian,“Internettrafficclassificationusing moeaandonlinerefinementinvotingonensemblemethods,”in 2013 21st Iranian Conference on Electrical Engineering (ICEE) , 2013, pp. 1–6. [145] Y.Zhu,J.Liang,J.Chen,andZ.Ming,“Animprovednsga-iiialgo- rithm for feature selection used in intrusion detection,” Knowledge- Based Systems , vol. 116, pp. 74–85, 2017. [146] “Buildinganeffectiveintrusiondetectionsystemusingunsupervised feature selection in multi-objective optimization framework,” arxiv. org/pdf/1905.06562.pdf, accessed: 2020-10-01. [147] P. Ducange, G. Mannara, F. Marcelloni, R. Pecori, and M. Vecchio, “A novel approach for internet traffic classification based on multi- objectiveevolutionaryfuzzyclassifiers,”in 2017IEEEInternational Conference on Fuzzy Systems (FUZZ-IEEE) , 2017, pp. 1–6. [148] “The KDD99 Dataset,” http://kdd.ics.uci.edu/databases/kddcup99\ /kddcup99.html, accessed: 2020-10-01. [149] G.Draper-Gil,A.H.Lashkari,M.S.I.Mamun,andA.A.Ghorbani, “Characterization of encrypted and vpn traffic using time-related features,” in International Conference on Information Systems Se- curity and Privacy , 2016. [150] “Cicflowmeter network analyzer,” https://www.unb.ca/cic/datasets/ ids-2018.html, accessed: 2020-10-01. [151] “Correlation-based feature selection for machine learning,” cs. waikato.ac.nz/~mhall/thesis.pdf, accessed: 2020-10-01. [152] F. Fabris, A. A. Freitas, and J. M. A. Tullet, “An extensive empiri- calcomparisonofprobabilistichierarchicalclassifiersindatasetsof ageing-related genes,” IEEE/ACM Transactions on Computational Biology and Bioinformatics , vol. 13, no. 6, pp. 1045–1058, 2016. [153] R. Kohavi and G. H. John, “Wrappers for feature subset selection,” Artificial Intelligence , vol. 97, no. 1, pp. 273 – 324, 1997. [154] L. Zhu, X. Tang, M. Shen, X. Du, and M. Guizani, “Privacy- preserving ddos attack detection using cross-domain traffic in soft- ware defined networks,” IEEE Journal on Selected Areas in Com- munications , vol. 36, no. 3, pp. 628–643, 2018. [155] K. Kalkan, L. Altay, G. Gür, and F. Alagöz, “Jess: Joint entropy- basedddosdefenseschemeinsdn,” IEEEJournalonSelectedAreas in Communications , vol. 36, no. 10, pp. 2358–2372, 2018. [156] H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee, “Internet traffic classification demystified: Myths, caveats, and the best practices,” in Proceedings of the 2008 ACM CoNEXT Conference , 2008, pp. 11:1–11:12. [157] J. Zhang, Y. Xiang, Y. Wang, W. Zhou, Y. Xiang, and Y. Guan, “Network traffic classification using correlation information,” IEEE TransactionsonParallelandDistributedSystems ,vol.24,no.1,pp. 104–117, 2013. Di Mauro et al.: Preprint submitted to Elsevier Page 19 of 19