Designing practical security systems via information flow analysis of log data