5 Citations (Scopus)

Abstract

Security is one of the main issues in the era of technology that every organization should take into account. Among the existing approach, process mining takes an important role in security investigations. The ability to discover the process and check the conformance of the running process are key features of process mining which helpful to perform security investigation. The deviation between the process model compared to event log data is considered a security issue. Thus, it is important to keep the log data stored safely and well-documented. However, many information systems are not process-aware due to the variability of the event data sources. Therefore, this paper briefly identifies and summarizes previously published studies and recent works in terms of the state-of-the-art process mining techniques used in the security domain. This survey identifies the existing effort on methods, datasets, tools and frameworks. Finally, we summarize possible future works in utilizing process mining for security-related problems.

Original languageEnglish
Title of host publication2022 International Seminar on Application for Technology of Information and Communication
Subtitle of host publicationTechnology 4.0 for Smart Ecosystem: A New Way of Doing Digital Business, iSemantic 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-6
Number of pages6
ISBN (Electronic)9781665488396
DOIs
Publication statusPublished - 2022
Event2022 International Seminar on Application for Technology of Information and Communication, iSemantic 2022 - Semarang, Indonesia
Duration: 17 Sept 202218 Sept 2022

Publication series

Name2022 International Seminar on Application for Technology of Information and Communication: Technology 4.0 for Smart Ecosystem: A New Way of Doing Digital Business, iSemantic 2022

Conference

Conference2022 International Seminar on Application for Technology of Information and Communication, iSemantic 2022
Country/TerritoryIndonesia
CitySemarang
Period17/09/2218/09/22

Keywords

  • event logs
  • log mining
  • network infrastructure
  • process mining
  • security

Fingerprint

Dive into the research topics of 'A Survey on Process Mining for Security'. Together they form a unique fingerprint.

Cite this