Traditional approaches to forensics are massively cumbersome. These would include analyzing network traffic, continually instrumenting and analyzing log files and then watching for anomalous behavior ...