Swardiantara Silalahi, Umi Laili Yuhana, T. Ahmad, H. Studiawan
{"title":"面向安全的过程挖掘研究综述","authors":"Swardiantara Silalahi, Umi Laili Yuhana, T. Ahmad, H. Studiawan","doi":"10.1109/iSemantic55962.2022.9920473","DOIUrl":null,"url":null,"abstract":"Security is one of the main issues in the era of technology that every organization should take into account. Among the existing approach, process mining takes an important role in security investigations. The ability to discover the process and check the conformance of the running process are key features of process mining which helpful to perform security investigation. The deviation between the process model compared to event log data is considered a security issue. Thus, it is important to keep the log data stored safely and well-documented. However, many information systems are not process-aware due to the variability of the event data sources. Therefore, this paper briefly identifies and summarizes previously published studies and recent works in terms of the state-of-the-art process mining techniques used in the security domain. This survey identifies the existing effort on methods, datasets, tools and frameworks. Finally, we summarize possible future works in utilizing process mining for security-related problems.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Survey on Process Mining for Security\",\"authors\":\"Swardiantara Silalahi, Umi Laili Yuhana, T. Ahmad, H. Studiawan\",\"doi\":\"10.1109/iSemantic55962.2022.9920473\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security is one of the main issues in the era of technology that every organization should take into account. Among the existing approach, process mining takes an important role in security investigations. The ability to discover the process and check the conformance of the running process are key features of process mining which helpful to perform security investigation. The deviation between the process model compared to event log data is considered a security issue. Thus, it is important to keep the log data stored safely and well-documented. However, many information systems are not process-aware due to the variability of the event data sources. Therefore, this paper briefly identifies and summarizes previously published studies and recent works in terms of the state-of-the-art process mining techniques used in the security domain. This survey identifies the existing effort on methods, datasets, tools and frameworks. Finally, we summarize possible future works in utilizing process mining for security-related problems.\",\"PeriodicalId\":360042,\"journal\":{\"name\":\"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iSemantic55962.2022.9920473\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iSemantic55962.2022.9920473","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security is one of the main issues in the era of technology that every organization should take into account. Among the existing approach, process mining takes an important role in security investigations. The ability to discover the process and check the conformance of the running process are key features of process mining which helpful to perform security investigation. The deviation between the process model compared to event log data is considered a security issue. Thus, it is important to keep the log data stored safely and well-documented. However, many information systems are not process-aware due to the variability of the event data sources. Therefore, this paper briefly identifies and summarizes previously published studies and recent works in terms of the state-of-the-art process mining techniques used in the security domain. This survey identifies the existing effort on methods, datasets, tools and frameworks. Finally, we summarize possible future works in utilizing process mining for security-related problems.