A Security-aware Simulation Method for Generating Business Process Event Logs
نویسنده
چکیده
One of the difficulties at developing mechanisms for business process security monitoring and auditing is the existence of representative, realistic and controlled test runs. This paper presents ongoing work toward a business process simulation method geared to the synthesis of event logs. The novelty is that it considers the activity of an (internal) attacker able purposefully infringe the designated security requirements or simply manipulate the process’ control and data flow. The resultant logs can be, e.g., readily replayed on a reference monitor, business activity monitoring tool, or serve as input for process discovery tools.
منابع مشابه
Generating event logs from non-process-aware systems enabling business process mining
Generating event logs from nonprocess-aware systems enabling business process mining Ricardo Pérez-Castillo a , Barbara Weber b , Jakob Pinggera b , Stefan Zugal b , Ignacio García-Rodríguez de Guzmán a & Mario Piattini a a Alarcos Research Group, University of Castilla-La Mancha, Paseo de la Universidad 4, 13071, Ciudad Real, Spain b Quality Engineering, University of Innsbruck, Technikerstraß...
متن کاملGenerating event logs for high-level process models
Business Process Model and Notation (BPMN) is a de-facto standard for practitioners working in the Business Process Management (BPM) field. The BPMN standard [1] offers highlevel modeling constructs, such as subprocesses, events, data and message flows, lanes, and is widely used to model processes in various domains. Recently several BPMN-based process mining techniques [2, 3, 4] were introduce...
متن کاملConcept drift detection in event logs using statistical information of variants
In recent years, business process management (BPM) has been highly regarded as an improvement in the efficiency and effectiveness of organizations. Extracting and analyzing information on business processes is an important part of this structure. But these processes are not sustainable over time and may change for a variety of reasons, such as the environment and human resources. These changes ...
متن کاملSecSy: Security-aware Synthesis of Process Event Logs
One difficulty at developing mechanisms for business process security monitoring and auditing is the lack of representative, controllably generated test runs to serve as an evaluation basis. This paper presents an approach and the corresponding tool support for event log synthesis. The novelty is that it considers the activity of an “attacker” able to purposefully infringe security and complian...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012