Automatic modeling of cyber intrusions using the diamond model utilizing security logs and events