Text this: Applying double clustering technique for intrusion detection in large-scale log