JOURNAL ARTICLE

MOCA: A Network Intrusion Monitoring and Classification System

Jessil FuhrFeng WangYongning Tang

Year: 2022 Journal:   Journal of Cybersecurity and Privacy Vol: 2 (3)Pages: 629-639   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

Optimizing the monitoring of network traffic features to detect abnormal traffic is critical. We propose a two-stage monitoring and classification (MOCA) system requiring fewer features to detect and classify malicious network attacks. The first stage monitors abnormal traffic, and the anomalous traffic is forwarded for processing in the second stage. A small subset of features trains both classifiers. We demonstrate MOCA’s effectiveness in identifying attacks in the CICIDS2017 dataset with an accuracy of 99.84% and in the CICDDOS2019 dataset with an accuracy of 93%, which significantly outperforms previous methods. We also found that MOCA can use a pre-trained classifier with one feature to distinguish DDoS and Botnet attacks from normal traffic in four different datasets. Our measurements show that MOCA can distinguish DDoS attacks from normal traffic in the CICDDOS2019 dataset with an accuracy of 96% and DDoS attacks in non-IoT and IoT traffic with an accuracy of 99.94%. The results emphasize the importance of using connection features to discriminate new DDoS and Bot attacks from benign traffic, especially with insufficient training samples.

Keywords:
Computer science Denial-of-service attack Botnet Traffic classification Artificial intelligence Classifier (UML) Data mining Computer network Network packet The Internet

Metrics

8
Cited By
1.71
FWCI (Field Weighted Citation Impact)
36
Refs
0.79
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Network Intrusion Monitoring System

Yash Phadatare

Journal:   INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT Year: 2025 Vol: 09 (03)Pages: 1-9
JOURNAL ARTICLE

Honeypots: Virtual Network Intrusion Monitoring System

Manmohan DagarRashmi Popli

Journal:   International Journal of Scientific Research in Network Security and Communication Year: 2018 Vol: 6 (2)Pages: 45-49
© 2026 ScienceGate Book Chapters — All rights reserved.