A Security-aware Simulation Method for Generating Business Process Event Logs

نویسنده

  • Rafael Accorsi
چکیده

One of the difficulties at developing mechanisms for business process security monitoring and auditing is the existence of representative, realistic and controlled test runs. This paper presents ongoing work toward a business process simulation method geared to the synthesis of event logs. The novelty is that it considers the activity of an (internal) attacker able purposefully infringe the designated security requirements or simply manipulate the process’ control and data flow. The resultant logs can be, e.g., readily replayed on a reference monitor, business activity monitoring tool, or serve as input for process discovery tools.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generating event logs from non-process-aware systems enabling business process mining

Generating event logs from nonprocess-aware systems enabling business process mining Ricardo Pérez-Castillo a , Barbara Weber b , Jakob Pinggera b , Stefan Zugal b , Ignacio García-Rodríguez de Guzmán a & Mario Piattini a a Alarcos Research Group, University of Castilla-La Mancha, Paseo de la Universidad 4, 13071, Ciudad Real, Spain b Quality Engineering, University of Innsbruck, Technikerstraß...

متن کامل

Generating event logs for high-level process models

Business Process Model and Notation (BPMN) is a de-facto standard for practitioners working in the Business Process Management (BPM) field. The BPMN standard [1] offers highlevel modeling constructs, such as subprocesses, events, data and message flows, lanes, and is widely used to model processes in various domains. Recently several BPMN-based process mining techniques [2, 3, 4] were introduce...

متن کامل

Concept drift detection in event logs using statistical information of variants

In recent years, business process management (BPM) has been highly regarded as an improvement in the efficiency and effectiveness of organizations. Extracting and analyzing information on business processes is an important part of this structure. But these processes are not sustainable over time and may change for a variety of reasons, such as the environment and human resources. These changes ...

متن کامل

SecSy: Security-aware Synthesis of Process Event Logs

One difficulty at developing mechanisms for business process security monitoring and auditing is the lack of representative, controllably generated test runs to serve as an evaluation basis. This paper presents an approach and the corresponding tool support for event log synthesis. The novelty is that it considers the activity of an “attacker” able to purposefully infringe security and complian...

متن کامل

Concept drift detection in business process logs using deep learning

Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012