Research Article
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention
Table 2
Examples of spanning tree paths to leaves and values.
| Spanning tree paths to leaves | Invocation 1 | Invocation 2 |
| p_0_user_login | Login_1 | Login_2 | p_0_selectedProducts_0_product_barcode | Barcode_1 | Barcode_1 | p_0_selectedProducts_0_product_characteristics_characteristic11 | value_11 | value_11 | p_0_selectedProducts_0_selectedQuantity | 1 | 2 | p_0_totalPriceWithoutTax | 1330.0 | 5700.0 | p_0_selectedProducts_3_product_characteristics_characteristic42 | Inexistent path | Value_42 (1st time seen) | p_0_selectedProducts_3_product_taxRate | Inexistent path | 20 (1st time seen) |
|
|