Although users can enter into agreements with services in which they agree to provide a PUID or TUID and no personally identifying data, their interactions may still be traceable, perhaps through their IP address.
In addition to frequently requested data elements, the base set also includes the PUID and TUID elements and a set of abstract elements that do not have static values stored in the repository.
The proposed method is evaluated using real life TUIDS Intrusion datasets.
Experimental results for datasets TUIDS intrusion, KDD 1999, and NSL-KDD datasets are reported in Section 5.
The algorithm was evaluated with three real life TUIDS  intrusion datasets and two benchmark intrusion datasets, viz., KDD Cup 1999  and NSL-KDD  datasets.
The real life TUIDS Intrusion datasets consist of three datasets Packet level, Flow level and Portscan where each dataset consists of attributes (numerical/categorical) of 50(11/39), 24(9/15) and 23(9/14), respectively as given in Table 3.