Text this: A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records

 _    _     ______   __   _      ___      _  _   
| \  / ||  /_   _// | || | ||   / _ \\   | \| || 
|  \/  ||   -| ||-  | '--' ||  / //\ \\  |  ' || 
| .  . ||   _| ||_  | .--. || |  ___  || | .  || 
|_|\/|_||  /_____// |_|| |_|| |_||  |_|| |_|\_|| 
`-`  `-`   `-----`  `-`  `-`  `-`   `-`  `-` -`