Known Vulnerabilities in Log Analysis -