Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 11, No. 1, February 2026
  4. Articles

Issue

Vol. 11, No. 1, February 2026

Issue Published : Feb 1, 2026
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Weighted ANOVA and Mutual Information for Enhanced Intrusion Detection System

https://doi.org/10.22219/kinetik.v11i1.2448
I Gede Teguh Satya Dharma
Politeknik Negeri Bali
I Wayan Rizky Wijaya
Politeknik Negeri Bali
I Made Agus Oka Gunawan
Politeknik Negeri Bali
Made Pradnyana Ambara
Politeknik Negeri Bali

Corresponding Author(s) : I Gede Teguh Satya Dharma

teguh@pnb.ac.id

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 11, No. 1, February 2026
Article Published : Feb 1, 2026

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

The rapid escalation in the sophistication of network attacks has exposed the limitations of traditional Intrusion Detection Systems (IDS). While machine learning has shown great promise in enhancing IDS performance, its success often hinges on the effectiveness of feature selection. Standard feature selection techniques, however, struggle in cybersecurity applications due to the highly imbalanced nature of network traffic datasets. In such settings, minority attack classes—though critical—are often overshadowed by majority classes, leading to reduced detection of rare intrusions. To address this challenge, we propose a hybrid feature selection framework that integrates Analysis of Variance (ANOVA) and Mutual Information (MI) with a novel class-frequency weighting mechanism. This weighting scheme adjusts the relevance score of each feature according to the distribution of classes, ensuring that features associated with rare attacks are more strongly emphasized during the selection process. We evaluate our method on the UNSW-NB15 dataset using a Support Vector Machine classifier. The results show that our approach achieves substantial gains in recall for underrepresented classes while simultaneously reducing feature dimensionality and maintaining efficiency. By improving the visibility of features tied to minority attacks, the proposed framework provides a more balanced and reliable solution for modern IDS. This contribution advances the detection of rare but impactful threats and highlights a scalable pathway for building more resilient cybersecurity defenses.

Keywords

Intrusion Detection System Weighted ANOVA Mutual Information Cybersecurity Machine Learning Dimensionality Reduction Feature Selection
I Gede Teguh Satya Dharma, I Wayan Rizky Wijaya, I Made Agus Oka Gunawan, & Made Pradnyana Ambara. (2026). Weighted ANOVA and Mutual Information for Enhanced Intrusion Detection System. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 11(1), 113-122. https://doi.org/10.22219/kinetik.v11i1.2448
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. N. Challa, “Unveiling the Shadows: A Comprehensive Exploration of Advanced Persistent Threats (APTs) and Silent Intrusions in Cybersecurity,” Journal of Artificial Intelligence & Cloud Computing, pp. 1–5, Dec. 2022. https://doi.org/10.47363/jaicc/2022(1)190
  2. I. A. Kandhro et al., “Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures,” IEEE Access, vol. 11, pp. 9136–9148, 2023. https://doi.org/10.1109/ACCESS.2023.3238664
  3. B. Alotaibi, “A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities,” Sensors, vol. 23, no. 17, p. 7470, Aug. 2023. https://doi.org/10.3390/s23177470
  4. N. Singh, R. Buyya, and H. Kim, “Securing Cloud-Based Internet of Things: Challenges and Mitigations,” Sensors, vol. 25, no. 1, p. 79, Dec. 2024. https://doi.org/10.3390/s25010079
  5. H. A. Hassan, E. E. Hemdan, W. El-Shafai, M. Shokair, and F. E. A. El-Samie, “Intrusion Detection Systems for the Internet of Thing: A Survey Study,” Wirel Pers Commun, vol. 128, no. 4, pp. 2753–2778, Feb. 2023. https://doi.org/10.1007/s11277-022-10069-6
  6. Z. Dai et al., “An intrusion detection model to detect zero-day attacks in unseen data using machine learning,” PLoS One, vol. 19, no. 9, Sep. 2024. https://doi.org/10.1371/journal.pone.0308469
  7. K. Bonagiri, P. Krishnamoorthy, V. Keerthiga, D. Kirubakaran, R. David, and B. Nancharaiah, “Cybersecurity With Machine Learning: Implementing AI Algorithms for Intrusion Prevention, Advanced Data Protection, and Real-Time Threat Analysis,” in 2025 International Conference on Computational, Communication and Information Technology (ICCCIT), IEEE, Feb. 2025, pp. 292–298. https://doi.org/10.1109/ICCCIT62592.2025.10928115
  8. A. Hussain, A. Khatoon, A. Aslam, and M. A. Khosa, “A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification,” Journal of Cyber Security, vol. 6, no. 1, pp. 1–23, 2024. https://doi.org/10.32604/jcs.2023.046915
  9. X. Zhao, “Real-time Application of Intrusion Detection Algorithm Based on Machine Learning in Security System,” in 2024 International Conference on Power, Electrical Engineering, Electronics and Control (PEEEC), IEEE, Aug. 2024, pp. 752–757. https://doi.org/10.1109/PEEEC63877.2024.00141
  10. S. Qadir Mohammed and M. A. Hussein, “Performance Analysis of different Machine Learning Models for Intrusion Detection Systems,” Journal of Engineering, vol. 28, no. 5, pp. 61–91, May 2022. https://doi.org/10.31026/j.eng.2022.05.05
  11. M. Udurume, V. Shakhov, and I. Koo, “Comparative Evaluation of Network-Based Intrusion Detection: Deep Learning vs Traditional Machine Learning Approach,” in 2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, Jul. 2024, pp. 520–525. 10.1109/ICUFN61752.2024.10625037
  12. S. Sreelakshmi, A. A. Babu, C. Lakshmipriya, L. A. Anto Gracious, M. Nalini, and R. Siva Subramanian, “Enhancing Intrusion Detection Systems with Machine Learning,” in 2024 2nd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), IEEE, Oct. 2024, pp. 557–564. https://doi.org/10.1109/ICSSAS64001.2024.10760341
  13. Y. Wang, “Deep Learning-Based Network Intrusion Detection Systems,” Applied and Computational Engineering, vol. 109, no. 1, pp. 179–188, Dec. 2024. https://doi.org/10.54254/2755-2721/2024.18104
  14. J. Simioni, E. K. Viegas, A. Santin, and P. Horchulhack, “An Early Exit Deep Neural Network for Fast Inference Intrusion Detection,” in Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, New York, NY, USA: ACM, Mar. 2025, pp. 730–737. https://doi.org/10.1145/3672608.3707974
  15. R. Picot, F. Gohring de Magalhães, A. Shahnejat Bushehri, M. Ben Atti, G. Nicolescu, and A. Quintero, “Protocol-Agnostic and Packet-Based Intrusion Detection Using a Multi-Layer Deep-Learning Architecture at the Network Edge,” IEEE Access, vol. 13, pp. 57867–57877, 2025. https://doi.org/10.1109/ACCESS.2025.3555201
  16. H. Zhang, L. Ge, G. Zhang, J. Fan, D. Li, and C. Xu, “A two-stage intrusion detection method based on light gradient boosting machine and autoencoder,” Mathematical Biosciences and Engineering, vol. 20, no. 4, pp. 6966–6992, 2023. https://doi.org/10.3934/mbe.2023301
  17. M. Mohy-eddine, A. Guezzaz, S. Benkirane, and M. Azrour, “An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection,” Multimed Tools Appl, vol. 82, no. 15, pp. 23615–23633, Jun. 2023. https://doi.org/10.1007/s11042-023-14795-2
  18. D. Kshirsagar and S. Kumar, “Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques,” Cyber-Physical Systems, vol. 9, no. 3, pp. 244–259, Jul. 2023. https://doi.org/10.1080/23335777.2021.2023651
  19. Q. Liu and Y. Li, “Research on Intrusion Detection Model Based on Filter Feature Selection Algorithm,” in 2024 8th International Conference on Communication and Information Systems (ICCIS), IEEE, Oct. 2024, pp. 120–125. https://doi.org/10.1109/ICCIS63642.2024.10779410
  20. M. A. Umar, Z. Chen, K. Shuaib, and Y. Liu, “Effects of feature selection and normalization on network intrusion detection,” Data Science and Management, vol. 8, no. 1, pp. 23–39, Mar. 2025. https://doi.org/10.1016/j.dsm.2024.08.001
  21. M. . K and N. . S, “An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach with ML Classifier,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 12, no. 10, pp. 11881–11885, Oct. 2024. https://doi.org/10.15680/IJIRCCE.2024.1210063
  22. M. Bakro et al., “An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach With ML Classifier,” IEEE Access, vol. 11, pp. 64228–64247, 2023. https://doi.org/10.1109/ACCESS.2023.3289405
  23. R. Al-Syouf, O. Y. Aljarrah, R. Bani-Hani, and A. Alma’aitah, “Ensemble Machine Learning Models Utilizing a Hybrid Recursive Feature Elimination (RFE) Technique for Detecting GPS Spoofing Attacks Against Unmanned Aerial Vehicles,” Sensors, vol. 25, no. 8, p. 2388, Apr. 2025. https://doi.org/10.3390/s25082388
  24. Y. Yin et al., “IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset,” J Big Data, vol. 10, no. 1, p. 15, Feb. 2023. https://doi.org/10.1186/s40537-023-00694-8
  25. G. N. N. Barbosa, M. Andreoni, and D. M. F. Mattos, “Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation,” Ad Hoc Networks, vol. 159, p. 103485, Jun. 2024. https://doi.org/10.1016/j.adhoc.2024.103485
  26. Y. Zhang, H. Zhang, and B. Zhang, “An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection,” Information, vol. 13, no. 7, p. 314, Jun. 2022. https://doi.org/10.3390/info13070314
  27. N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, Nov. 2015, pp. 1–6. https://doi.org/10.1109/MilCIS.2015.7348942
  28. L. Liu, G. Engelen, T. Lynar, D. Essam, and W. Joosen, “Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018,” in 2022 IEEE Conference on Communications and Network Security (CNS), IEEE, Oct. 2022, pp. 254–262. https://doi.org/10.1109/CNS56114.2022.9947235
  29. S. B. Mallampati and H. Seetha, “An Integrated Feature Extraction Based on Principal Components and Deep Auto Encoder with Extra Tree for Intrusion Detection Systems,” Journal of Information & Knowledge Management, vol. 23, no. 01, Feb. 2024. https://doi.org/10.1142/S0219649223500661
  30. Md. B. Pranto, Md. H. A. Ratul, Md. M. Rahman, I. J. Diya, and Z.-B. Zahir, “Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System,” Journal of Advances in Information Technology, vol. 13, no. 1, 2022. https://doi.org/10.12720/jait.13.1.36-44
  31. H. A. Al Essa and W. S. Bhaya, “Ensemble learning classifiers hybrid feature selection for enhancing performance of intrusion detection system,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 1, pp. 665–676, Feb. 2024. https://doi.org/10.11591/eei.v13i1.5844
  32. S. Shakeela, N. S. Shankar, P. M. Reddy, T. K. Tulasi, and M. M. Koneru, “Optimal ensemble learning based on distinctive feature selection by univariate ANOVA-F statistics for IDS,” International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267–275, 2021.https://doi.org/10.24425/ijet.2021.135975
  33. V. S. Bilaskar, S. V. Aradhye, S. S. Shinde, D. D. Kshirsagar, and P. R. Nimbalkar, “An intrusion detection system for industrial IoT using chi-square feature selection,” Journal of Statistics and Management Systems, vol. 27, no. 5, pp. 1021–1031, 2024. https://doi.org/10.47974/JSMS-1303
  34. W. Xu, S. Wang, B. Yan, and Y. He, “Analysis on the Impact of Feature Selection on Cloud Intrusion Detection,” in 2023 4th International Conference on Computer Engineering and Application (ICCEA), IEEE, Apr. 2023, pp. 147–153. https://doi.org/10.1109/ICCEA58433.2023.10135348
  35. Jupriyadi, A. Budiman, E. A. Z. Hamidi, S. Ahdan, and R. M. Negara, “Wrapper-Based Feature Selection to Improve The Accuracy of Intrusion Detection System (IDS),” in 2024 10th International Conference on Wireless and Telematics (ICWT), IEEE, Jul. 2024, pp. 1–5. https://doi.org/10.1109/ICWT62080.2024.10674687
  36. S. Walling and S. Lodh, “Enhancing IoT intrusion detection through machine learning with AN-SFS: a novel approach to high performing adaptive feature selection,” Discover Internet of Things, vol. 4, no. 1, p. 16, Oct. 2024. https://doi.org/10.1007/s43926-024-00074-5
Read More

References


N. Challa, “Unveiling the Shadows: A Comprehensive Exploration of Advanced Persistent Threats (APTs) and Silent Intrusions in Cybersecurity,” Journal of Artificial Intelligence & Cloud Computing, pp. 1–5, Dec. 2022. https://doi.org/10.47363/jaicc/2022(1)190

I. A. Kandhro et al., “Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures,” IEEE Access, vol. 11, pp. 9136–9148, 2023. https://doi.org/10.1109/ACCESS.2023.3238664

B. Alotaibi, “A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities,” Sensors, vol. 23, no. 17, p. 7470, Aug. 2023. https://doi.org/10.3390/s23177470

N. Singh, R. Buyya, and H. Kim, “Securing Cloud-Based Internet of Things: Challenges and Mitigations,” Sensors, vol. 25, no. 1, p. 79, Dec. 2024. https://doi.org/10.3390/s25010079

H. A. Hassan, E. E. Hemdan, W. El-Shafai, M. Shokair, and F. E. A. El-Samie, “Intrusion Detection Systems for the Internet of Thing: A Survey Study,” Wirel Pers Commun, vol. 128, no. 4, pp. 2753–2778, Feb. 2023. https://doi.org/10.1007/s11277-022-10069-6

Z. Dai et al., “An intrusion detection model to detect zero-day attacks in unseen data using machine learning,” PLoS One, vol. 19, no. 9, Sep. 2024. https://doi.org/10.1371/journal.pone.0308469

K. Bonagiri, P. Krishnamoorthy, V. Keerthiga, D. Kirubakaran, R. David, and B. Nancharaiah, “Cybersecurity With Machine Learning: Implementing AI Algorithms for Intrusion Prevention, Advanced Data Protection, and Real-Time Threat Analysis,” in 2025 International Conference on Computational, Communication and Information Technology (ICCCIT), IEEE, Feb. 2025, pp. 292–298. https://doi.org/10.1109/ICCCIT62592.2025.10928115

A. Hussain, A. Khatoon, A. Aslam, and M. A. Khosa, “A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification,” Journal of Cyber Security, vol. 6, no. 1, pp. 1–23, 2024. https://doi.org/10.32604/jcs.2023.046915

X. Zhao, “Real-time Application of Intrusion Detection Algorithm Based on Machine Learning in Security System,” in 2024 International Conference on Power, Electrical Engineering, Electronics and Control (PEEEC), IEEE, Aug. 2024, pp. 752–757. https://doi.org/10.1109/PEEEC63877.2024.00141

S. Qadir Mohammed and M. A. Hussein, “Performance Analysis of different Machine Learning Models for Intrusion Detection Systems,” Journal of Engineering, vol. 28, no. 5, pp. 61–91, May 2022. https://doi.org/10.31026/j.eng.2022.05.05

M. Udurume, V. Shakhov, and I. Koo, “Comparative Evaluation of Network-Based Intrusion Detection: Deep Learning vs Traditional Machine Learning Approach,” in 2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, Jul. 2024, pp. 520–525. 10.1109/ICUFN61752.2024.10625037

S. Sreelakshmi, A. A. Babu, C. Lakshmipriya, L. A. Anto Gracious, M. Nalini, and R. Siva Subramanian, “Enhancing Intrusion Detection Systems with Machine Learning,” in 2024 2nd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), IEEE, Oct. 2024, pp. 557–564. https://doi.org/10.1109/ICSSAS64001.2024.10760341

Y. Wang, “Deep Learning-Based Network Intrusion Detection Systems,” Applied and Computational Engineering, vol. 109, no. 1, pp. 179–188, Dec. 2024. https://doi.org/10.54254/2755-2721/2024.18104

J. Simioni, E. K. Viegas, A. Santin, and P. Horchulhack, “An Early Exit Deep Neural Network for Fast Inference Intrusion Detection,” in Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, New York, NY, USA: ACM, Mar. 2025, pp. 730–737. https://doi.org/10.1145/3672608.3707974

R. Picot, F. Gohring de Magalhães, A. Shahnejat Bushehri, M. Ben Atti, G. Nicolescu, and A. Quintero, “Protocol-Agnostic and Packet-Based Intrusion Detection Using a Multi-Layer Deep-Learning Architecture at the Network Edge,” IEEE Access, vol. 13, pp. 57867–57877, 2025. https://doi.org/10.1109/ACCESS.2025.3555201

H. Zhang, L. Ge, G. Zhang, J. Fan, D. Li, and C. Xu, “A two-stage intrusion detection method based on light gradient boosting machine and autoencoder,” Mathematical Biosciences and Engineering, vol. 20, no. 4, pp. 6966–6992, 2023. https://doi.org/10.3934/mbe.2023301

M. Mohy-eddine, A. Guezzaz, S. Benkirane, and M. Azrour, “An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection,” Multimed Tools Appl, vol. 82, no. 15, pp. 23615–23633, Jun. 2023. https://doi.org/10.1007/s11042-023-14795-2

D. Kshirsagar and S. Kumar, “Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques,” Cyber-Physical Systems, vol. 9, no. 3, pp. 244–259, Jul. 2023. https://doi.org/10.1080/23335777.2021.2023651

Q. Liu and Y. Li, “Research on Intrusion Detection Model Based on Filter Feature Selection Algorithm,” in 2024 8th International Conference on Communication and Information Systems (ICCIS), IEEE, Oct. 2024, pp. 120–125. https://doi.org/10.1109/ICCIS63642.2024.10779410

M. A. Umar, Z. Chen, K. Shuaib, and Y. Liu, “Effects of feature selection and normalization on network intrusion detection,” Data Science and Management, vol. 8, no. 1, pp. 23–39, Mar. 2025. https://doi.org/10.1016/j.dsm.2024.08.001

M. . K and N. . S, “An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach with ML Classifier,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 12, no. 10, pp. 11881–11885, Oct. 2024. https://doi.org/10.15680/IJIRCCE.2024.1210063

M. Bakro et al., “An Improved Design for a Cloud Intrusion Detection System Using Hybrid Features Selection Approach With ML Classifier,” IEEE Access, vol. 11, pp. 64228–64247, 2023. https://doi.org/10.1109/ACCESS.2023.3289405

R. Al-Syouf, O. Y. Aljarrah, R. Bani-Hani, and A. Alma’aitah, “Ensemble Machine Learning Models Utilizing a Hybrid Recursive Feature Elimination (RFE) Technique for Detecting GPS Spoofing Attacks Against Unmanned Aerial Vehicles,” Sensors, vol. 25, no. 8, p. 2388, Apr. 2025. https://doi.org/10.3390/s25082388

Y. Yin et al., “IGRF-RFE: a hybrid feature selection method for MLP-based network intrusion detection on UNSW-NB15 dataset,” J Big Data, vol. 10, no. 1, p. 15, Feb. 2023. https://doi.org/10.1186/s40537-023-00694-8

G. N. N. Barbosa, M. Andreoni, and D. M. F. Mattos, “Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation,” Ad Hoc Networks, vol. 159, p. 103485, Jun. 2024. https://doi.org/10.1016/j.adhoc.2024.103485

Y. Zhang, H. Zhang, and B. Zhang, “An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection,” Information, vol. 13, no. 7, p. 314, Jun. 2022. https://doi.org/10.3390/info13070314

N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, Nov. 2015, pp. 1–6. https://doi.org/10.1109/MilCIS.2015.7348942

L. Liu, G. Engelen, T. Lynar, D. Essam, and W. Joosen, “Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018,” in 2022 IEEE Conference on Communications and Network Security (CNS), IEEE, Oct. 2022, pp. 254–262. https://doi.org/10.1109/CNS56114.2022.9947235

S. B. Mallampati and H. Seetha, “An Integrated Feature Extraction Based on Principal Components and Deep Auto Encoder with Extra Tree for Intrusion Detection Systems,” Journal of Information & Knowledge Management, vol. 23, no. 01, Feb. 2024. https://doi.org/10.1142/S0219649223500661

Md. B. Pranto, Md. H. A. Ratul, Md. M. Rahman, I. J. Diya, and Z.-B. Zahir, “Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System,” Journal of Advances in Information Technology, vol. 13, no. 1, 2022. https://doi.org/10.12720/jait.13.1.36-44

H. A. Al Essa and W. S. Bhaya, “Ensemble learning classifiers hybrid feature selection for enhancing performance of intrusion detection system,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 1, pp. 665–676, Feb. 2024. https://doi.org/10.11591/eei.v13i1.5844

S. Shakeela, N. S. Shankar, P. M. Reddy, T. K. Tulasi, and M. M. Koneru, “Optimal ensemble learning based on distinctive feature selection by univariate ANOVA-F statistics for IDS,” International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267–275, 2021.https://doi.org/10.24425/ijet.2021.135975

V. S. Bilaskar, S. V. Aradhye, S. S. Shinde, D. D. Kshirsagar, and P. R. Nimbalkar, “An intrusion detection system for industrial IoT using chi-square feature selection,” Journal of Statistics and Management Systems, vol. 27, no. 5, pp. 1021–1031, 2024. https://doi.org/10.47974/JSMS-1303

W. Xu, S. Wang, B. Yan, and Y. He, “Analysis on the Impact of Feature Selection on Cloud Intrusion Detection,” in 2023 4th International Conference on Computer Engineering and Application (ICCEA), IEEE, Apr. 2023, pp. 147–153. https://doi.org/10.1109/ICCEA58433.2023.10135348

Jupriyadi, A. Budiman, E. A. Z. Hamidi, S. Ahdan, and R. M. Negara, “Wrapper-Based Feature Selection to Improve The Accuracy of Intrusion Detection System (IDS),” in 2024 10th International Conference on Wireless and Telematics (ICWT), IEEE, Jul. 2024, pp. 1–5. https://doi.org/10.1109/ICWT62080.2024.10674687

S. Walling and S. Lodh, “Enhancing IoT intrusion detection through machine learning with AN-SFS: a novel approach to high performing adaptive feature selection,” Discover Internet of Things, vol. 4, no. 1, p. 16, Oct. 2024. https://doi.org/10.1007/s43926-024-00074-5

Author biographies is not available.
Download this PDF file
PDF
Statistic
Read Counter : 256 Download : 25

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Prof. Robert Lis
Editorial Board
Wrocław University of Science and Technology
Orcid  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Prof. Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License