Text this: A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records

 __   __     ___     __   __    ______    _____   
 \ \\/ //   / _ \\   \ \\/ //  /_   _//  |__  //  
  \   //   / //\ \\   \   //    -| ||-     / //   
  / . \\  |  ___  ||  / . \\    _| ||_    / //__  
 /_//\_\\ |_||  |_|| /_//\_\\  /_____//  /_____|| 
 `-`  --` `-`   `-`  `-`  --`  `-----`   `-----`