Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar

  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Register
  • Login
  • Home
  • Current
  • Archives
  • Join As Reviewer
  • Info
  • Announcements
  • Statistics
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  1. Home
  2. Archives
  3. Vol. 11, No. 1, February 2026 (Article in Progress)
  4. Articles

Issue

Vol. 11, No. 1, February 2026 (Article in Progress)

Issue Published : Jan 24, 2026
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Weighted ANOVA and Mutual Information for Enhanced Intrusion Detection System

https://doi.org/10.22219/kinetik.v11i1.2448
I Gede Teguh Satya Dharma
Politeknik Negeri Bali
I Wayan Rizky Wijaya
Politeknik Negeri Bali
I Made Agus Oka Gunawan
Politeknik Negeri Bali
Made Pradnyana Ambara
Politeknik Negeri Bali

Corresponding Author(s) : I Gede Teguh Satya Dharma

teguh@pnb.ac.id

Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, Vol. 11, No. 1, February 2026 (Article in Progress)
Article Published : Jan 24, 2026

Share
WA Share on Facebook Share on Twitter Pinterest Email Telegram
  • Abstract
  • Cite
  • References
  • Authors Details

Abstract

The rapid escalation in the sophistication of network attacks has exposed the limitations of traditional Intrusion Detection Systems (IDS). While machine learning has shown great promise in enhancing IDS performance, its success often hinges on the effectiveness of feature selection. Standard feature selection techniques, however, struggle in cybersecurity applications due to the highly imbalanced nature of network traffic datasets. In such settings, minority attack classes, though critical, are often overshadowed by majority classes, leading to reduced detection of rare intrusions. To address this challenge, we propose a hybrid feature selection framework that integrates Analysis of Variance (ANOVA) and Mutual Information (MI) with a novel class-frequency weighting mechanism. This weighting scheme adjusts the relevance score of each feature according to the distribution of classes, ensuring that features associated with rare attacks are more strongly emphasized during the selection process. We evaluate our method on the UNSW-NB15 dataset using a Support Vector Machine classifier. The results show that our approach achieves substantial gains in recall for underrepresented classes while simultaneously reducing feature dimensionality and maintaining efficiency. By improving the visibility of features tied to minority attacks, the proposed framework provides a more balanced and reliable solution for modern IDS. This contribution advances the detection of rare but impactful threats and highlights a scalable pathway for building more resilient cybersecurity defenses.

Keywords

Intrusion Detection System Weighted ANOVA Mutual Information Cybersecurity Machine Learning Dimensionality Reduction Feature Selection
I Gede Teguh Satya Dharma, I Wayan Rizky Wijaya, I Made Agus Oka Gunawan, & Made Pradnyana Ambara. (2026). Weighted ANOVA and Mutual Information for Enhanced Intrusion Detection System. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 11(1). https://doi.org/10.22219/kinetik.v11i1.2448
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
Download Citation
Endnote/Zotero/Mendeley (RIS)
BibTeX
References
  1. N. Challa, “Unveiling the Shadows: A Comprehensive Exploration of Advanced Persistent Threats (APTs) and Silent Intrusions in Cybersecurity,” Journal of Artificial Intelligence & Cloud Computing, pp. 1–5, Dec. 2022, doi: 10.47363/JAICC/2022(1)190.
  2. I. A. Kandhro et al., “Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures,” IEEE Access, vol. 11, pp. 9136–9148, 2023, doi: 10.1109/ACCESS.2023.3238664.
  3. B. Alotaibi, “A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities,” Sensors, vol. 23, no. 17, p. 7470, Aug. 2023, doi: 10.3390/s23177470.
  4. N. Singh, R. Buyya, and H. Kim, “Securing Cloud-Based Internet of Things: Challenges and Mitigations,” Sensors, vol. 25, no. 1, p. 79, Dec. 2024, doi: 10.3390/s25010079.
  5. H. A. Hassan, E. E. Hemdan, W. El-Shafai, M. Shokair, and F. E. A. El-Samie, “Intrusion Detection Systems for the Internet of Thing: A Survey Study,” Wirel Pers Commun, vol. 128, no. 4, pp. 2753–2778, Feb. 2023, doi: 10.1007/s11277-022-10069-6.
  6. Z. Dai et al., “An intrusion detection model to detect zero-day attacks in unseen data using machine learning,” PLoS One, vol. 19, no. 9, Sep. 2024, doi: 10.1371/journal.pone.0308469.
  7. K. Bonagiri, P. Krishnamoorthy, V. Keerthiga, D. Kirubakaran, R. David, and B. Nancharaiah, “Cybersecurity With Machine Learning: Implementing AI Algorithms for Intrusion Prevention, Advanced Data Protection, and Real-Time Threat Analysis,” in 2025 International Conference on Computational, Communication and Information Technology (ICCCIT), IEEE, Feb. 2025, pp. 292–298. doi: 10.1109/ICCCIT62592.2025.10928115.
  8. A. Hussain, A. Khatoon, A. Aslam, and M. A. Khosa, “A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification,” Journal of Cyber Security, vol. 6, no. 1, pp. 1–23, 2024, doi: 10.32604/jcs.2023.046915.
  9. X. Zhao, “Real-time Application of Intrusion Detection Algorithm Based on Machine Learning in Security System,” in 2024 International Conference on Power, Electrical Engineering, Electronics and Control (PEEEC), IEEE, Aug. 2024, pp. 752–757. doi: 10.1109/PEEEC63877.2024.00141.
  10. S. Qadir Mohammed and M. A. Hussein, “Performance Analysis of different Machine Learning Models for Intrusion Detection Systems,” Journal of Engineering, vol. 28, no. 5, pp. 61–91, May 2022, doi: 10.31026/j.eng.2022.05.05.
  11. M. Udurume, V. Shakhov, and I. Koo, “Comparative Evaluation of Network-Based Intrusion Detection: Deep Learning vs Traditional Machine Learning Approach,” in 2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, Jul. 2024, pp. 520–525. doi: 10.1109/ICUFN61752.2024.10625037.
  12. S. Sreelakshmi, A. A. Babu, C. Lakshmipriya, L. A. Anto Gracious, M. Nalini, and R. Siva Subramanian, “Enhancing Intrusion Detection Systems with Machine Learning,” in 2024 2nd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), IEEE, Oct. 2024, pp. 557–564. doi: 10.1109/ICSSAS64001.2024.10760341.
  13. Y. Wang, “Deep Learning-Based Network Intrusion Detection Systems,” Applied and Computational Engineering, vol. 109, no. 1, pp. 179–188, Dec. 2024, doi: 10.54254/2755-2721/2024.18104.
  14. J. Simioni, E. K. Viegas, A. Santin, and P. Horchulhack, “An Early Exit Deep Neural Network for Fast Inference Intrusion Detection,” in Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, New York, NY, USA: ACM, Mar. 2025, pp. 730–737. doi: 10.1145/3672608.3707974.
  15. R. Picot, F. Gohring de Magalhães, A. Shahnejat Bushehri, M. Ben Atti, G. Nicolescu, and A. Quintero, “Protocol-Agnostic and Packet-Based Intrusion Detection Using a Multi-Layer Deep-Learning Architecture at the Network Edge,” IEEE Access, vol. 13, pp. 57867–57877, 2025, doi: 10.1109/ACCESS.2025.3555201.
  16. H. Zhang, L. Ge, G. Zhang, J. Fan, D. Li, and C. Xu, “A two-stage intrusion detection method based on light gradient boosting machine and autoencoder,” Mathematical Biosciences and Engineering, vol. 20, no. 4, pp. 6966–6992, 2023, doi: 10.3934/mbe.2023301.
  17. M. Mohy-eddine, A. Guezzaz, S. Benkirane, and M. Azrour, “An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection,” Multimed Tools Appl, vol. 82, no. 15, pp. 23615–23633, Jun. 2023, doi: 10.1007/s11042-023-14795-2.
  18. D. Kshirsagar and S. Kumar, “Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques,” Cyber-Physical Systems, vol. 9, no. 3, pp. 244–259, Jul. 2023, doi: 10.1080/23335777.2021.2023651.
  19. Q. Liu and Y. Li, “Research on Intrusion Detection Model Based on Filter Feature Selection Algorithm,” in 2024 8th International Conference on Communication and Information Systems (ICCIS), IEEE, Oct. 2024, pp. 120–125. doi: 10.1109/ICCIS63642.2024.10779410.
  20. M. A. Umar, Z. Chen, K. Shuaib, and Y. Liu, “Effects of feature selection and normalization on network intrusion detection,” Data Science and Management, vol. 8, no. 1, pp. 23–39, Mar. 2025, doi: 10.1016/j.dsm.2024.08.001.
  21. H. Zouhri, A. Idri, and A. Ratnani, “Evaluating the impact of filter-based feature selection in intrusion detection systems,” Int J Inf Secur, vol. 23, no. 2, pp. 759–785, Apr. 2024, doi: 10.1007/s10207-023-00767-y.
  22. G. N. N. Barbosa, M. Andreoni, and D. M. F. Mattos, “Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation,” Ad Hoc Networks, vol. 159, p. 103485, Jun. 2024, doi: 10.1016/j.adhoc.2024.103485.
  23. Y. Zhang, H. Zhang, and B. Zhang, “An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection,” Information, vol. 13, no. 7, p. 314, Jun. 2022, doi: 10.3390/info13070314.
  24. N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, Nov. 2015, pp. 1–6. doi: 10.1109/MilCIS.2015.7348942.
  25. S. B. Mallampati and H. Seetha, “An Integrated Feature Extraction Based on Principal Components and Deep Auto Encoder with Extra Tree for Intrusion Detection Systems,” Journal of Information & Knowledge Management, vol. 23, no. 01, Feb. 2024, doi: 10.1142/S0219649223500661.
  26. Md. B. Pranto, Md. H. A. Ratul, Md. M. Rahman, I. J. Diya, and Z.-B. Zahir, “Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System,” Journal of Advances in Information Technology, vol. 13, no. 1, 2022, doi: 10.12720/jait.13.1.36-44.
  27. H. A. Al Essa and W. S. Bhaya, “Ensemble learning classifiers hybrid feature selection for enhancing performance of intrusion detection system,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 1, pp. 665–676, Feb. 2024, doi: 10.11591/eei.v13i1.5844.
  28. S. Shakeela, N. S. Shankar, P. M. Reddy, T. K. Tulasi, and M. M. Koneru, “Optimal ensemble learning based on distinctive feature selection by univariate ANOVA-F statistics for IDS,” International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267–275, 2021, doi: 10.24425/ijet.2021.135975.
Read More

References


N. Challa, “Unveiling the Shadows: A Comprehensive Exploration of Advanced Persistent Threats (APTs) and Silent Intrusions in Cybersecurity,” Journal of Artificial Intelligence & Cloud Computing, pp. 1–5, Dec. 2022, doi: 10.47363/JAICC/2022(1)190.

I. A. Kandhro et al., “Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures,” IEEE Access, vol. 11, pp. 9136–9148, 2023, doi: 10.1109/ACCESS.2023.3238664.

B. Alotaibi, “A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities,” Sensors, vol. 23, no. 17, p. 7470, Aug. 2023, doi: 10.3390/s23177470.

N. Singh, R. Buyya, and H. Kim, “Securing Cloud-Based Internet of Things: Challenges and Mitigations,” Sensors, vol. 25, no. 1, p. 79, Dec. 2024, doi: 10.3390/s25010079.

H. A. Hassan, E. E. Hemdan, W. El-Shafai, M. Shokair, and F. E. A. El-Samie, “Intrusion Detection Systems for the Internet of Thing: A Survey Study,” Wirel Pers Commun, vol. 128, no. 4, pp. 2753–2778, Feb. 2023, doi: 10.1007/s11277-022-10069-6.

Z. Dai et al., “An intrusion detection model to detect zero-day attacks in unseen data using machine learning,” PLoS One, vol. 19, no. 9, Sep. 2024, doi: 10.1371/journal.pone.0308469.

K. Bonagiri, P. Krishnamoorthy, V. Keerthiga, D. Kirubakaran, R. David, and B. Nancharaiah, “Cybersecurity With Machine Learning: Implementing AI Algorithms for Intrusion Prevention, Advanced Data Protection, and Real-Time Threat Analysis,” in 2025 International Conference on Computational, Communication and Information Technology (ICCCIT), IEEE, Feb. 2025, pp. 292–298. doi: 10.1109/ICCCIT62592.2025.10928115.

A. Hussain, A. Khatoon, A. Aslam, and M. A. Khosa, “A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification,” Journal of Cyber Security, vol. 6, no. 1, pp. 1–23, 2024, doi: 10.32604/jcs.2023.046915.

X. Zhao, “Real-time Application of Intrusion Detection Algorithm Based on Machine Learning in Security System,” in 2024 International Conference on Power, Electrical Engineering, Electronics and Control (PEEEC), IEEE, Aug. 2024, pp. 752–757. doi: 10.1109/PEEEC63877.2024.00141.

S. Qadir Mohammed and M. A. Hussein, “Performance Analysis of different Machine Learning Models for Intrusion Detection Systems,” Journal of Engineering, vol. 28, no. 5, pp. 61–91, May 2022, doi: 10.31026/j.eng.2022.05.05.

M. Udurume, V. Shakhov, and I. Koo, “Comparative Evaluation of Network-Based Intrusion Detection: Deep Learning vs Traditional Machine Learning Approach,” in 2024 Fifteenth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE, Jul. 2024, pp. 520–525. doi: 10.1109/ICUFN61752.2024.10625037.

S. Sreelakshmi, A. A. Babu, C. Lakshmipriya, L. A. Anto Gracious, M. Nalini, and R. Siva Subramanian, “Enhancing Intrusion Detection Systems with Machine Learning,” in 2024 2nd International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), IEEE, Oct. 2024, pp. 557–564. doi: 10.1109/ICSSAS64001.2024.10760341.

Y. Wang, “Deep Learning-Based Network Intrusion Detection Systems,” Applied and Computational Engineering, vol. 109, no. 1, pp. 179–188, Dec. 2024, doi: 10.54254/2755-2721/2024.18104.

J. Simioni, E. K. Viegas, A. Santin, and P. Horchulhack, “An Early Exit Deep Neural Network for Fast Inference Intrusion Detection,” in Proceedings of the 40th ACM/SIGAPP Symposium on Applied Computing, New York, NY, USA: ACM, Mar. 2025, pp. 730–737. doi: 10.1145/3672608.3707974.

R. Picot, F. Gohring de Magalhães, A. Shahnejat Bushehri, M. Ben Atti, G. Nicolescu, and A. Quintero, “Protocol-Agnostic and Packet-Based Intrusion Detection Using a Multi-Layer Deep-Learning Architecture at the Network Edge,” IEEE Access, vol. 13, pp. 57867–57877, 2025, doi: 10.1109/ACCESS.2025.3555201.

H. Zhang, L. Ge, G. Zhang, J. Fan, D. Li, and C. Xu, “A two-stage intrusion detection method based on light gradient boosting machine and autoencoder,” Mathematical Biosciences and Engineering, vol. 20, no. 4, pp. 6966–6992, 2023, doi: 10.3934/mbe.2023301.

M. Mohy-eddine, A. Guezzaz, S. Benkirane, and M. Azrour, “An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection,” Multimed Tools Appl, vol. 82, no. 15, pp. 23615–23633, Jun. 2023, doi: 10.1007/s11042-023-14795-2.

D. Kshirsagar and S. Kumar, “Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques,” Cyber-Physical Systems, vol. 9, no. 3, pp. 244–259, Jul. 2023, doi: 10.1080/23335777.2021.2023651.

Q. Liu and Y. Li, “Research on Intrusion Detection Model Based on Filter Feature Selection Algorithm,” in 2024 8th International Conference on Communication and Information Systems (ICCIS), IEEE, Oct. 2024, pp. 120–125. doi: 10.1109/ICCIS63642.2024.10779410.

M. A. Umar, Z. Chen, K. Shuaib, and Y. Liu, “Effects of feature selection and normalization on network intrusion detection,” Data Science and Management, vol. 8, no. 1, pp. 23–39, Mar. 2025, doi: 10.1016/j.dsm.2024.08.001.

H. Zouhri, A. Idri, and A. Ratnani, “Evaluating the impact of filter-based feature selection in intrusion detection systems,” Int J Inf Secur, vol. 23, no. 2, pp. 759–785, Apr. 2024, doi: 10.1007/s10207-023-00767-y.

G. N. N. Barbosa, M. Andreoni, and D. M. F. Mattos, “Optimizing feature selection in intrusion detection systems: Pareto dominance set approaches with mutual information and linear correlation,” Ad Hoc Networks, vol. 159, p. 103485, Jun. 2024, doi: 10.1016/j.adhoc.2024.103485.

Y. Zhang, H. Zhang, and B. Zhang, “An Effective Ensemble Automatic Feature Selection Method for Network Intrusion Detection,” Information, vol. 13, no. 7, p. 314, Jun. 2022, doi: 10.3390/info13070314.

N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” in 2015 Military Communications and Information Systems Conference (MilCIS), IEEE, Nov. 2015, pp. 1–6. doi: 10.1109/MilCIS.2015.7348942.

S. B. Mallampati and H. Seetha, “An Integrated Feature Extraction Based on Principal Components and Deep Auto Encoder with Extra Tree for Intrusion Detection Systems,” Journal of Information & Knowledge Management, vol. 23, no. 01, Feb. 2024, doi: 10.1142/S0219649223500661.

Md. B. Pranto, Md. H. A. Ratul, Md. M. Rahman, I. J. Diya, and Z.-B. Zahir, “Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System,” Journal of Advances in Information Technology, vol. 13, no. 1, 2022, doi: 10.12720/jait.13.1.36-44.

H. A. Al Essa and W. S. Bhaya, “Ensemble learning classifiers hybrid feature selection for enhancing performance of intrusion detection system,” Bulletin of Electrical Engineering and Informatics, vol. 13, no. 1, pp. 665–676, Feb. 2024, doi: 10.11591/eei.v13i1.5844.

S. Shakeela, N. S. Shankar, P. M. Reddy, T. K. Tulasi, and M. M. Koneru, “Optimal ensemble learning based on distinctive feature selection by univariate ANOVA-F statistics for IDS,” International Journal of Electronics and Telecommunications, vol. 67, no. 2, pp. 267–275, 2021, doi: 10.24425/ijet.2021.135975.

Author biographies is not available.
Download this PDF file
Statistic
Read Counter : 0

Downloads

Download data is not yet available.

Quick Link

  • Author Guidelines
  • Download Manuscript Template
  • Peer Review Process
  • Editorial Board
  • Reviewer Acknowledgement
  • Aim and Scope
  • Publication Ethics
  • Licensing Term
  • Copyright Notice
  • Open Access Policy
  • Important Dates
  • Author Fees
  • Indexing and Abstracting
  • Archiving Policy
  • Scopus Citation Analysis
  • Statistic
  • Article Withdrawal

Meet Our Editorial Team

Ir. Amrul Faruq, M.Eng., Ph.D
Editor in Chief
Universitas Muhammadiyah Malang
Google Scholar Scopus
Prof. Robert Lis
Editorial Board
Wrocław University of Science and Technology
Orcid  Scopus
Hanung Adi Nugroho
Editorial Board
Universitas Gadjah Mada
Google Scholar Scopus
Prof. Roman Voliansky
Editorial Board
Dniprovsky State Technical University, Ukraine
Google Scholar Scopus
Read More
 

KINETIK: Game Technology, Information System, Computer Network, Computing, Electronics, and Control
eISSN : 2503-2267
pISSN : 2503-2259


Address

Program Studi Elektro dan Informatika

Fakultas Teknik, Universitas Muhammadiyah Malang

Jl. Raya Tlogomas 246 Malang

Phone 0341-464318 EXT 247

Contact Info

Principal Contact

Amrul Faruq
Phone: +62 812-9398-6539
Email: faruq@umm.ac.id

Support Contact

Fauzi Dwi Setiawan Sumadi
Phone: +62 815-1145-6946
Email: fauzisumadi@umm.ac.id

© 2020 KINETIK, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License