过程挖掘算法的分析与比较及过程挖掘在入侵检测系统中的应用

V. P. Mishra, Joanita Dsouza, Laura Elizabeth
{"title":"过程挖掘算法的分析与比较及过程挖掘在入侵检测系统中的应用","authors":"V. P. Mishra, Joanita Dsouza, Laura Elizabeth","doi":"10.1109/ICRITO.2018.8748748","DOIUrl":null,"url":null,"abstract":"Process mining assumes to find, screen and improve the genuine procedures through picking up understanding from the log events which are promptly accessible in the existing data framework. It gives the missing connection between one hand process, demonstrate examination and information arranged, investigation and then again execution and conformance. In this manuscript, we have discussed the process mining and intrusion detection concepts and compared the various algorithms which have been used in process mining. We have also discussed the application of process mining approach to detect the intrusions. Traditional information mining procedures, for example, characterization, grouping, relapse, affiliation administer learning, and arrangement/scene mining doesn't concentrate on the business process models and it is regularly used to advancement in the general procedure. Process mining centers around end-to-end forms and is conceivable in view of the developing accessibility of occasion information and developing the new processes and conformance checking with enhancement of the existing processes.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Analysis and Comparison of Process Mining Algorithms with Application of Process Mining in Intrusion Detection System\",\"authors\":\"V. P. Mishra, Joanita Dsouza, Laura Elizabeth\",\"doi\":\"10.1109/ICRITO.2018.8748748\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Process mining assumes to find, screen and improve the genuine procedures through picking up understanding from the log events which are promptly accessible in the existing data framework. It gives the missing connection between one hand process, demonstrate examination and information arranged, investigation and then again execution and conformance. In this manuscript, we have discussed the process mining and intrusion detection concepts and compared the various algorithms which have been used in process mining. We have also discussed the application of process mining approach to detect the intrusions. Traditional information mining procedures, for example, characterization, grouping, relapse, affiliation administer learning, and arrangement/scene mining doesn't concentrate on the business process models and it is regularly used to advancement in the general procedure. Process mining centers around end-to-end forms and is conceivable in view of the developing accessibility of occasion information and developing the new processes and conformance checking with enhancement of the existing processes.\",\"PeriodicalId\":439047,\"journal\":{\"name\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO.2018.8748748\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2018.8748748","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

过程挖掘假定通过从日志事件中获取可在现有数据框架中立即访问的理解,来发现、筛选和改进真正的过程。它给出了一手流程、演示检查和信息整理、调查再执行和一致性之间缺失的联系。在本文中,我们讨论了过程挖掘和入侵检测的概念,并比较了在过程挖掘中使用的各种算法。我们还讨论了过程挖掘方法在检测入侵中的应用。传统的信息挖掘过程,例如特征描述、分组、复发、隶属关系管理学习和安排/场景挖掘,并不关注业务流程模型,而是经常用于一般过程的改进。流程挖掘以端到端表单为中心,考虑到不断发展的场合信息可访问性、开发新的流程和增强现有流程的一致性检查,流程挖掘是可以想象的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis and Comparison of Process Mining Algorithms with Application of Process Mining in Intrusion Detection System
Process mining assumes to find, screen and improve the genuine procedures through picking up understanding from the log events which are promptly accessible in the existing data framework. It gives the missing connection between one hand process, demonstrate examination and information arranged, investigation and then again execution and conformance. In this manuscript, we have discussed the process mining and intrusion detection concepts and compared the various algorithms which have been used in process mining. We have also discussed the application of process mining approach to detect the intrusions. Traditional information mining procedures, for example, characterization, grouping, relapse, affiliation administer learning, and arrangement/scene mining doesn't concentrate on the business process models and it is regularly used to advancement in the general procedure. Process mining centers around end-to-end forms and is conceivable in view of the developing accessibility of occasion information and developing the new processes and conformance checking with enhancement of the existing processes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信