Specifically, during the context of abuse and network intrusion detection, the interesting objects are frequently not unusual objects, but unexpected bursts of inactivity. This pattern does not adhere towards the common statistical definition of the outlier as being a scarce object.In unsupervised machine learning, k-implies clustering is usually u