-   Developing a system for automatically detecting suspicious activity of IT systems by reviewing system logs and application logs