%0 Journal Article
%T On the Use of <i>k</i>-NN in Anomaly Detection
%A Theocharis Tsigkritis
%A George Groumas
%A Moti Schneider
%J Journal of Information Security
%P 70-84
%@ 2153-1242
%D 2018
%I Scientific Research Publishing
%R 10.4236/jis.2018.91006
%X In this paper, we describe an algorithm that uses the k-NN technology to help detect threatening behavior in a computer network or a cloud. The k-NN technology is very simple and yet very powerful. It has several disadvantages and if they are removed the k-NN can be an asset to detect malicious behavior.
%K <
%K i>
%K k<
%K /i>
%K -NN
%K Fuzzy Logic
%K Matching Process
%K Network Security
%U http://www.scirp.org/journal/PaperInformation.aspx?PaperID=81756