Research Article

Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention

Table 2

Examples of spanning tree paths to leaves and values.

Spanning tree paths to leavesInvocation 1Invocation 2

p_0_user_loginLogin_1Login_2
p_0_selectedProducts_0_product_barcodeBarcode_1Barcode_1
p_0_selectedProducts_0_product_characteristics_characteristic11value_11value_11
p_0_selectedProducts_0_selectedQuantity12
p_0_totalPriceWithoutTax1330.05700.0
p_0_selectedProducts_3_product_characteristics_characteristic42Inexistent pathValue_42 (1st time seen)
p_0_selectedProducts_3_product_taxRateInexistent path20 (1st time seen)