z-logo
open-access-imgOpen Access
Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance
Author(s) -
Wil M. P. van der Aalst,
Ana Karla Alves de Medeiros
Publication year - 2005
Publication title -
electronic notes in theoretical computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.242
H-Index - 60
ISSN - 1571-0661
DOI - 10.1016/j.entcs.2004.10.013
Subject(s) - computer science , audit , process (computing) , computer security , audit trail , trace (psycholinguistics) , process mining , component (thermodynamics) , intrusion detection system , conformance checking , work in process , business process , business , operating system , accounting , business process management , business process modeling , physics , marketing , linguistics , philosophy , thermodynamics
One approach to secure systems is through the analysis of audit trails. An audit trail is a record of all events that take place in a system and across a network, i.e., it provides a trace of user/system actions so that security events can be related to the actions of a specific individual or system component. Audit trails can be inspected for the presence or absence of certain patterns. This paper advocates the use of process mining techniques to analyze audit trails for security violations. It is shown how a specific algorithm, called the α-algorithm, can be used to support security efforts at various levels ranging from low-level intrusion detection to high-level fraud prevention

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom