Advances on P2P, Parallel, Grid, Cloud and Internet Computing

  • Baeyens R
  • Berkvens R
  • Daems W
  • et al.
N/ACitations
Citations of this article
169Readers
Mendeley users who have this article in their library.

Abstract

This paper introduces a Business Process Mining Based Insider Threat Detection System. The system firstly establishes the normal profiles of business activities and the operators by mining event logs, and then detects specific anomalies by comparing the content and the order of execution logs with the corresponding normal profile in order to find out the insiders and the threats they have brought. The anomalies concerned are defined and the corresponding detection algorithms are presented. We have performed experimentation using the ProM framework and Java programming with five synthetic business cases, and found that the system can effectively identify anomalies of both operators and business activities that may be indicative of potential insider threat.

Cite

CITATION STYLE

APA

Baeyens, R., Berkvens, R., Daems, W., Baeyens, J.-P., Goossens, M., & Weyn, M. (2018). Advances on P2P, Parallel, Grid, Cloud and Internet Computing. Advances on P2P, Parallel, Grid, Cloud and Internet Computing (Vol. 13, pp. 722–732). Retrieved from http://link.springer.com/10.1007/978-3-319-69835-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free