https://1library.net/document/yn2kwxjy-intrusion-detection-using-log-files-reinforcement-learning.html