Feature Selection for Network Intrusion Detection