Smart City Gnosys

Smart city article details

Title Machine Learning-Based Intrusion Detection: Feature Selection Versus Feature Extraction
ID_Doc 36055
Authors Ngo V.-D.; Vuong T.-C.; Van Luong T.; Tran H.
Year 2024
Published Cluster Computing, 27, 3
DOI http://dx.doi.org/10.1007/s10586-023-04089-5
Abstract Internet of Things (IoTs) has been playing an important role in many sectors, such as smart cities, smart agriculture, smart healthcare, and smart manufacturing. However, IoT devices are highly vulnerable to cyber-attacks, which may result in security breaches and data leakages. To effectively prevent these attacks, a variety of machine learning-based network intrusion detection methods for IoT networks have been developed, which often rely on either feature extraction or feature selection techniques for reducing the dimension of input data before being fed into machine learning models. This aims to make the detection complexity low enough for real-time operations, which is particularly vital in any intrusion detection systems. This paper provides a comprehensive comparison between these two feature reduction methods of intrusion detection in terms of various performance metrics, namely, precision rate, recall rate, detection accuracy, as well as runtime complexity, in the presence of the modern UNSW-NB15 dataset as well as both binary and multiclass classification. For example, in general, the feature selection method not only provides better detection performance but also lower training and inference time compared to its feature extraction counterpart, especially when the number of reduced features K increases. However, the feature extraction method is much more reliable than its selection counterpart, particularly when K is very small, such as K=4. Additionally, feature extraction is less sensitive to changing the number of reduced features K than feature selection, and this holds true for both binary and multiclass classifications. Based on this comparison, we provide a useful guideline for selecting a suitable intrusion detection type for each specific scenario, as detailed in Table 14 at the end of Sect. 4. Note that such the comparison between feature selection and feature extraction over UNSW-NB15 as well as theoretical guideline have been overlooked in the literature. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023.
Author Keywords Binary/multiclass classification; Feature extraction; Feature selection; Internet of Things; Intrusion detection; IoT; Machine learning; NIDS; PCA; Runtime; UNSW-NB15


Similar Articles


Id Similarity Authors Title Published
831 View0.968Vuong T.-C.; Tran H.; Trang M.X.; Ngo V.-D.; Luong T.V.A Comparison Of Feature Selection And Feature Extraction In Network Intrusion Detection SystemsProceedings of 2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2022 (2022)
23837 View0.938Almotairi A.; Atawneh S.; Khashan O.A.; Khafajah N.M.Enhancing Intrusion Detection In Iot Networks Using Machine Learning-Based Feature Selection And Ensemble ModelsSystems Science and Control Engineering, 12, 1 (2024)
2483 View0.927Nepolo E.; Ngxande M.; Zodi G.-A.L.A Machine Learning-Based Performance Analysis Of Feature Selection Methods For Anomaly Detection For Iot Network SecurityLearning and Analytics in Intelligent Systems, 43 (2025)
22935 View0.921Merlin R.T.; Ravi R.Empowering Smart City Iot Network Intrusion Detection With Advanced Ensemble Learning-Based Feature SelectionInternational Journal of Electrical and Electronics Research, 12, 2 (2024)
3003 View0.92Gopalakrishnan B.; Purusothaman P.A New Design Of Intrusion Detection In Iot Sector Using Optimal Feature Selection And High Ranking-Based Ensemble Learning ModelPeer-to-Peer Networking and Applications, 15, 5 (2022)
33346 View0.913Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
11324 View0.91Liu J.; Chung S.S.Automatic Feature Extraction And Selection For Machine Learning Based Intrusion DetectionProceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019 (2019)
35958 View0.903Lefoane M.; Ghafir I.; Kabir S.; Awan I.-U.Machine Learning For Botnet Detection: An Optimized Feature Selection ApproachACM International Conference Proceeding Series (2021)
31583 View0.902Gaber T.; El-Ghamry A.; Hassanien A.E.Injection Attack Detection Using Machine Learning For Smart Iot ApplicationsPhysical Communication, 52 (2022)
57650 View0.898Hazman C.; Guezzaz A.; Benkirane S.; Azrour M.Toward An Intrusion Detection Model For Iot-Based Smart EnvironmentsMultimedia Tools and Applications, 83, 22 (2024)