On the Use of <i>k</i>-NN in Anomaly Detection

来源 :信息安全(英文) | 被引量 : 0次 | 上传用户:fine_yhy
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
In this paper, we describe an algorithm that uses the k-NN technology to help detect threatening behavior in a computer network or a cloud. The k-NN technology is very simple and yet very powerful. It has several disadvantages and if they are removed the
其他文献
The advent of technology brought forth a myriad of developments that have streamlined the manner through which people operate. With the growing need to be at th
A Distributed Denial of Service Attack (DDoS) is an attack in which multiple systems compromised by a Trojan are maliciously used to target a single system. The
答:成形裂主要指注坯过程中和干燥完成后,模内湿坯、脱模湿坯、修粘湿坯、湿坯干燥、存放、运输、施釉等过程中发生的各自开裂现象,因为主要开裂均发生在成形工序,因此称为成
This study research attempts to prohibit privacy and loss of money for individuals and organization by creating a reliable model which can detect the fraud expo
分析了扁平类陶瓷制品真空挤压成形用挤压筒的传统设计制造方法的缺陷——铸造式挤压筒两端面的形状位置精度差(如同轴度误差大)和内腔工作表面粗糙及凹凸不平等。虽然板料焊接
The nature of crime has dramatically changed after the revolution of the new digital era. It is no longer based on violence but on the criminal computer abiliti
对方城县棉花黄枯萎病的发生与气象条件的关系,以及传播途径进行了详细分析,并提出了综合防治措施。
随着竞争的加剧和信息技术的不断发展,企业必须把IT服务管理与业务结合起来。ITIL是流程为中心的IT服务管理最佳实践,文章分析了ITIL在企业中的运行情况,并给出实施ITIL的具体建
在 MDT 平台 ARX 开发环境中,利用 MCAD API 函数完成 CAPP 系统中工序图的图形生成,并在 AutoCAD环境下利用其开发工具 ARX 实现工艺信息标注。