Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction