Identifying unusual or suspicious patterns in system logs that indicate errors, attacks, or failures.