Look for events that are anomalous given their context, such as:
- Time of day (e.g. activity at 3am)
- Source/destination (e.g. traffic from unknown IP)
- Associated events (e.g. login without subsequent activity)
- Normal volume patterns (e.g. spike in requests)
Analyze events in context to identify deviations from normal patterns.