Research Article
Improving the Accuracy of Network Intrusion Detection with Causal Machine Learning
Table 6
The number of features selected by different feature selection methods in CICIDS19 dataset.
| The number of attacks | Feature selection method (the number of features required) | SMOTE | SMOTE (do) | CFS | CFS (do) | Min-max | Min-max (do) |
| 1 | 70 | 5 | 9 | 4 | 70 | 4 | 3 | 70 | 6 | 8 | 3 | 70 | 5 | 7 | 70 | 6 | 13 | 6 | 70 | 5 | 11 | 70 | 8 | 16 | 7 | 70 | 14 |
|
|