TY - GEN
T1 - A Survey on Process Mining for Security
AU - Silalahi, Swardiantara
AU - Yuhana, Umi Laili
AU - Ahmad, Tohari
AU - Studiawan, Hudan
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Security is one of the main issues in the era of technology that every organization should take into account. Among the existing approach, process mining takes an important role in security investigations. The ability to discover the process and check the conformance of the running process are key features of process mining which helpful to perform security investigation. The deviation between the process model compared to event log data is considered a security issue. Thus, it is important to keep the log data stored safely and well-documented. However, many information systems are not process-aware due to the variability of the event data sources. Therefore, this paper briefly identifies and summarizes previously published studies and recent works in terms of the state-of-the-art process mining techniques used in the security domain. This survey identifies the existing effort on methods, datasets, tools and frameworks. Finally, we summarize possible future works in utilizing process mining for security-related problems.
AB - Security is one of the main issues in the era of technology that every organization should take into account. Among the existing approach, process mining takes an important role in security investigations. The ability to discover the process and check the conformance of the running process are key features of process mining which helpful to perform security investigation. The deviation between the process model compared to event log data is considered a security issue. Thus, it is important to keep the log data stored safely and well-documented. However, many information systems are not process-aware due to the variability of the event data sources. Therefore, this paper briefly identifies and summarizes previously published studies and recent works in terms of the state-of-the-art process mining techniques used in the security domain. This survey identifies the existing effort on methods, datasets, tools and frameworks. Finally, we summarize possible future works in utilizing process mining for security-related problems.
KW - event logs
KW - log mining
KW - network infrastructure
KW - process mining
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85141528716&partnerID=8YFLogxK
U2 - 10.1109/iSemantic55962.2022.9920473
DO - 10.1109/iSemantic55962.2022.9920473
M3 - Conference contribution
AN - SCOPUS:85141528716
T3 - 2022 International Seminar on Application for Technology of Information and Communication: Technology 4.0 for Smart Ecosystem: A New Way of Doing Digital Business, iSemantic 2022
SP - 1
EP - 6
BT - 2022 International Seminar on Application for Technology of Information and Communication
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2022 International Seminar on Application for Technology of Information and Communication, iSemantic 2022
Y2 - 17 September 2022 through 18 September 2022
ER -