“…These fields were selected based on the heuristic analysis of the data whereby they were found to be unique to the attack. So, with the assumption that all rules have full confidence factor, the formulated rules include: (2,14), (2,16), (3,15), (4,17), (5,13), (5,14), (6,15), (7,16), (7,17), (13,8), (14,9), (15,10), (16,11), (17,12)} 5) in = {σ 1 ,σ 2 σ 3 ,σ 4 σ 5 , σ 6 ,σ 7 } out = {σ 8 ,σ 9 σ 10 ,σ 11 σ 12 } Fig. 3.…”