TITLE:
On the Use of k-NN in Anomaly Detection
AUTHORS:
Theocharis Tsigkritis, George Groumas, Moti Schneider
KEYWORDS:
k-NN, Fuzzy Logic, Matching Process, Network Security
JOURNAL NAME:
Journal of Information Security,
Vol.9 No.1,
January
16,
2018
ABSTRACT: In this paper, we describe an algorithm that uses the k-NN technology to help detect threatening behavior in a computer network or a cloud. The k-NN technology is very simple and yet very powerful. It has several disadvantages and if they are removed the k-NN can be an asset to detect malicious behavior.