On the Use of k-NN in Anomaly Detection

HTML  XML Download Download as PDF (Size: 1051KB)  PP. 70-84  
DOI: 10.4236/jis.2018.91006    1,302 Downloads   5,983 Views  Citations

Affiliation(s)

ABSTRACT

In this paper, we describe an algorithm that uses the k-NN technology to help detect threatening behavior in a computer network or a cloud. The k-NN technology is very simple and yet very powerful. It has several disadvantages and if they are removed the k-NN can be an asset to detect malicious behavior.

Share and Cite:

Tsigkritis, T. , Groumas, G. and Schneider, M. (2018) On the Use of k-NN in Anomaly Detection. Journal of Information Security, 9, 70-84. doi: 10.4236/jis.2018.91006.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.