Constructing important features from massive network traffic for lightweight intrusion detection. Issue 6 (1st November 2015)