A method of analyzing computer intrusion detection information that looks
beyond known attacks and abnormal access patterns to the critical
information that an intruder may want to access. Unique target
identifiers and type of work performed by the networked targets is added
to audit log records. Analysis using vector space modeling, dissimilarity
matrix comparison, and clustering of the event records is then performed.