%0 Journal Article %T On the Use of <i>k</i>-NN in Anomaly Detection %A Theocharis Tsigkritis %A George Groumas %A Moti Schneider %J Journal of Information Security %P 70-84 %@ 2153-1242 %D 2018 %I Scientific Research Publishing %R 10.4236/jis.2018.91006 %X In this paper, we describe an algorithm that uses the k-NN technology to help detect threatening behavior in a computer network or a cloud. The k-NN technology is very simple and yet very powerful. It has several disadvantages and if they are removed the k-NN can be an asset to detect malicious behavior. %K < %K i> %K k< %K /i> %K -NN %K Fuzzy Logic %K Matching Process %K Network Security %U http://www.scirp.org/journal/PaperInformation.aspx?PaperID=81756