Research Article

Trust in Intrusion Detection Systems: An Investigation of Performance Analysis for Machine Learning and Deep Learning Models

Table 8

Feature selection of KDD dataset using values.

Feature NoFeature name valueStatistically significant

1Duration2.33E − 60Yes
2Service0.604708Yes
3src_bytes1.34E − 68Yes
4Land9.51E − 128Yes
5Urgent0.402631Yes
6hot5.01E − 230Yes
7num_compromised2.69E − 43Yes
8su_attempted2.45E − 21Yes
9num_file_creations3.48E − 11Yes
10num_shells9.85E − 43Yes
11num_access_files6.50E − 26Yes
12num_outbound_cmds0.043069Yes
13is_host_login0.039867Yes
14srv_diff_host_rate1.56E − 70Yes
15protocol_type0No
16Flag0No
17dst_bytes0No
18wrong_fragment0No
19num_failed_logins0No
20logged_in0No
21root_shell0No
22is_guest_login0No
23Count0No
24serror_rate0No
25rerror_rate0No
26same_srv_rate0No
27diff_srv_rate0No
28dst_host_count0No
29dst_host_diff_srv_rate0No
30dst_host_srv_diff_host_rate0No