Increasing our ability to find attacks through analyzing the seemingly benign activities happening on a system for behaviors, characteristics, or patterns that raise red flags.