Text this: A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records

  _____     _____     ____     _    _   __    __  
 / ____||  |  ___||  |  _ \\  | || | || \ \\ / // 
/ //---`'  | ||__    | |_| || | || | ||  \ \/ //  
\ \\___    | ||__    | .  //  | \\_/ ||   \  //   
 \_____||  |_____||  |_|\_\\   \____//     \//    
  `----`   `-----`   `-` --`    `---`       `