Known Vulnerabilities in Log Analysis page 4