JOURNAL ARTICLE

Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems

Mohammed AwadF.M.A. Salam

Year: 2023 Journal:   Journal of Sensor and Actuator Networks Vol: 12 (5)Pages: 67-67   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

The frequency of cyber-attacks on the Internet of Things (IoT) networks has significantly increased in recent years. Anomaly-based network intrusion detection systems (NIDSs) offer an additional layer of network protection by detecting and reporting the infamous zero-day attacks. However, the efficiency of real-time detection systems relies on several factors, including the number of features utilized to make a prediction. Thus, minimizing them is crucial as it implies faster prediction and lower storage space. This paper utilizes recursive feature elimination with cross-validation using a decision tree model as an estimator (DT-RFECV) to select an optimal subset of 15 of UNSW-NB15’s 42 features and evaluates them using several ML classifiers, including tree-based ones, such as random forest. The proposed NIDS exhibits an accurate prediction model for network flow with a binary classification accuracy of 95.30% compared to 95.56% when using the entire feature set. The reported scores are comparable to those attained by the state-of-the-art systems despite decreasing the number of utilized features by about 65%.

Keywords:
Computer science Decision tree Intrusion detection system Random forest Feature selection Feature (linguistics) Data mining Artificial intelligence Estimator Machine learning Anomaly detection Tree (set theory) Cross-validation Binary decision diagram Feature vector Set (abstract data type) Pattern recognition (psychology) Algorithm Mathematics Statistics

Metrics

117
Cited By
51.43
FWCI (Field Weighted Citation Impact)
49
Refs
1.00
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Anomaly Detection Techniques and Applications
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.