Watch this video on YouTube
A security team wants to analyze multiple log sources to detect attack patterns, such as failed logins followed by privilege escalation. Which of the following techniques is BEST suited for this task?