2005
DOI: 10.1016/j.entcs.2004.10.013
|View full text |Cite
|
Sign up to set email alerts
|

Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance

Abstract: One approach to secure systems is through the analysis of audit trails. An audit trail is a record of all events that take place in a system and across a network, i.e., it provides a trace of user/system actions so that security events can be related to the actions of a specific individual or system component. Audit trails can be inspected for the presence or absence of certain patterns. This paper advocates the use of process mining techniques to analyze audit trails for security violations. It is shown how a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0
2

Year Published

2005
2005
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 137 publications
(84 citation statements)
references
References 23 publications
0
82
0
2
Order By: Relevance
“…There are several lines of related work, among them the development of support for system audits, e. g., by integrating analysis techniques such as [2,4]. In particular, process mining approaches appear to be particularly interesting: combing process mining with our business process animation, i. e., the visualization of attack traces, allows for interactively investigation deviations of the actual process execution with the intended one.…”
Section: Discussionmentioning
confidence: 99%
“…There are several lines of related work, among them the development of support for system audits, e. g., by integrating analysis techniques such as [2,4]. In particular, process mining approaches appear to be particularly interesting: combing process mining with our business process animation, i. e., the visualization of attack traces, allows for interactively investigation deviations of the actual process execution with the intended one.…”
Section: Discussionmentioning
confidence: 99%
“…However, all event logs have one thing in common: they show occurrences of events at specific moments in time, where each event refers to a specific process and an instance thereof, i.e. a case (Van Der Aalst & De Medeiros, 2005).…”
Section: Process Miningmentioning
confidence: 99%
“…ProM framework (De Medeiros et al, 2005) is a pluggable environment for process mining. Since each system has its own format for output log files, ProM framework works with a generic XML formats like MXML and XES (Van Der Aalst & Van Der Aalst, 2011).…”
Section: Process Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11] the results are extended to include time aspects. The notion of conformance has also been discussed in the context of security [4], business alignment [2], and genetic mining [26].…”
Section: Related Workmentioning
confidence: 99%