Utilizing Persistence for Post Facto Suppression of Invalid Anomalies Using System Logs