{"title":"过程挖掘算法的分析与比较及过程挖掘在入侵检测系统中的应用","authors":"V. P. Mishra, Joanita Dsouza, Laura Elizabeth","doi":"10.1109/ICRITO.2018.8748748","DOIUrl":null,"url":null,"abstract":"Process mining assumes to find, screen and improve the genuine procedures through picking up understanding from the log events which are promptly accessible in the existing data framework. It gives the missing connection between one hand process, demonstrate examination and information arranged, investigation and then again execution and conformance. In this manuscript, we have discussed the process mining and intrusion detection concepts and compared the various algorithms which have been used in process mining. We have also discussed the application of process mining approach to detect the intrusions. Traditional information mining procedures, for example, characterization, grouping, relapse, affiliation administer learning, and arrangement/scene mining doesn't concentrate on the business process models and it is regularly used to advancement in the general procedure. Process mining centers around end-to-end forms and is conceivable in view of the developing accessibility of occasion information and developing the new processes and conformance checking with enhancement of the existing processes.","PeriodicalId":439047,"journal":{"name":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Analysis and Comparison of Process Mining Algorithms with Application of Process Mining in Intrusion Detection System\",\"authors\":\"V. P. Mishra, Joanita Dsouza, Laura Elizabeth\",\"doi\":\"10.1109/ICRITO.2018.8748748\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Process mining assumes to find, screen and improve the genuine procedures through picking up understanding from the log events which are promptly accessible in the existing data framework. It gives the missing connection between one hand process, demonstrate examination and information arranged, investigation and then again execution and conformance. In this manuscript, we have discussed the process mining and intrusion detection concepts and compared the various algorithms which have been used in process mining. We have also discussed the application of process mining approach to detect the intrusions. Traditional information mining procedures, for example, characterization, grouping, relapse, affiliation administer learning, and arrangement/scene mining doesn't concentrate on the business process models and it is regularly used to advancement in the general procedure. Process mining centers around end-to-end forms and is conceivable in view of the developing accessibility of occasion information and developing the new processes and conformance checking with enhancement of the existing processes.\",\"PeriodicalId\":439047,\"journal\":{\"name\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRITO.2018.8748748\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRITO.2018.8748748","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis and Comparison of Process Mining Algorithms with Application of Process Mining in Intrusion Detection System
Process mining assumes to find, screen and improve the genuine procedures through picking up understanding from the log events which are promptly accessible in the existing data framework. It gives the missing connection between one hand process, demonstrate examination and information arranged, investigation and then again execution and conformance. In this manuscript, we have discussed the process mining and intrusion detection concepts and compared the various algorithms which have been used in process mining. We have also discussed the application of process mining approach to detect the intrusions. Traditional information mining procedures, for example, characterization, grouping, relapse, affiliation administer learning, and arrangement/scene mining doesn't concentrate on the business process models and it is regularly used to advancement in the general procedure. Process mining centers around end-to-end forms and is conceivable in view of the developing accessibility of occasion information and developing the new processes and conformance checking with enhancement of the existing processes.