Analysis of alarms to prevent the organizations network in real-time using process mining approach

被引:0
|
作者
Ved Prakash Mishra
Balvinder Shukla
Abhay Bansal
机构
[1] Amity University,
[2] Amity University,undefined
[3] Amity School of Engineering and Technology,undefined
来源
Cluster Computing | 2019年 / 22卷
关键词
Attacks; Event logs; Audit trails; Process mining; Data mining; Intrusion;
D O I
暂无
中图分类号
学科分类号
摘要
The analysis of alarms in the current intrusion detection system depends upon the manual system by network administrators. Due to the manual analysis, still many organizations are facing the false alarm problem causing the performance deficiency. In this manuscript, a model has been proposed for profile-based system, which will work on real time to analyze the suspicious activities and detect the intrusion automatically. The proposed model will also analyze the alarms to detect attacks and give the automatic response to prevent in real time. Processes were compared with original log events with tempered log events and the difference was found. Our extended work will be to develop the plugin in java with the combination of proposed algorithm, which could be imbedded in the tool to get the automatic response.
引用
收藏
页码:7023 / 7030
页数:7
相关论文
共 50 条
  • [1] Analysis of alarms to prevent the organizations network in real-time using process mining approach
    Mishra, Ved Prakash
    Shukla, Balvinder
    Bansal, Abhay
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7023 - S7030
  • [3] Behavioral and Performance Analysis of a Real-Time Case Study Event Log: A Process Mining Approach
    Butt, Naveed Anwer
    Mahmood, Zafar
    Sana, Muhammad Usman
    Diez, Isabel de la Torre
    Galan, Juan Castanedo
    Brie, Santiago
    Ashraf, Imran
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [4] Using Process Mining in Real-Time to Reduce the Number of Faulty Products
    Nagy, Zsuzsanna
    Werner-Stark, Agnes
    Dulai, Tibor
    ADVANCES IN DATABASES AND INFORMATION SYSTEMS, ADBIS 2019, 2019, 11695 : 89 - 104
  • [5] A real-time Network Intrusion Detection System based on incremental mining approach
    Su, Ming-Yang
    Chang, Kai-Chi
    Wei, Hua-Fu
    Lin, Chun-Yuen
    ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 179 - +
  • [6] Predictive analysis of real-time strategy games: A graph mining approach
    Alobaidi, Isam A.
    Leopold, Jennifer L.
    Allami, Ali A.
    Eloe, Nathan W.
    Tanksley, Dustin
    WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2021, 11 (02)
  • [7] A Process Algebraic Approach to the Schedulability Analysis of Real-Time Systems
    Hanene Ben-Abdallah
    Jin-Young Choi
    Duncan Clarke
    Young Si Kim
    Insup Lee
    Hong-Liang Xie
    Real-Time Systems, 1998, 15 : 189 - 219
  • [8] A process algebraic approach to the schedulability analysis of real-time systems
    Ben-Abdallah, H
    Choi, JY
    Clarke, D
    REAL-TIME SYSTEMS, 1998, 15 (03) : 189 - 219
  • [9] Process Mining Methodology for Health Process Tracking Using Real-Time Indoor Location Systems
    Fernandez-Llatas, Carlos
    Lizondo, Aroa
    Monton, Eduardo
    Benedi, Jose-Miguel
    Traver, Vicente
    SENSORS, 2015, 15 (12) : 29821 - 29840
  • [10] Real-time network data analysis using time series models
    Vafeiadis, Thanasis
    Papanikolaou, Alexandros
    Ilioudis, Christos
    Charchalakis, Stefanos
    SIMULATION MODELLING PRACTICE AND THEORY, 2012, 29 : 173 - 180