5 juli 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.

Slides:



Advertisements
Similar presentations
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining Nikola Trčka Mykola Pechenizkiy.
Advertisements

/faculteit technologie management /faculteit wiskunde en informatica PM-1 Process mining: Discovering Process Models from Event Logs Prof.dr.ir. Wil van.
Jorge Muñoz-Gama Josep Carmona
A university for the world real R © 2009, Chapter 3 Advanced Synchronization Moe Wynn Wil van der Aalst Arthur ter Hofstede.
Sequential Patterns & Process Mining Current State of Research Edgar de Graaf LIACS.
Chapter 5.2 Factoring by Grouping. 3y (2x – 7)( ) (2x – 7) (2x – 7) – 8 3y 1. Factor. GCF = (2x – 7) Find the GCF. Divide each term by the GCF. (2x –
Process Mining in the Context of Web Services Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven, The Netherlands.
/faculteit technologie management 1 Process Mining: Organizational and Conformance Mining Algorithms Ana Karla Alves de Medeiros Ana Karla Alves de Medeiros.
MXML A Meta model for process mining data
/faculteit technologie management 1 Process Mining: Control-Flow Mining Algorithms Ana Karla Alves de Medeiros Ana Karla Alves de Medeiros Eindhoven University.
Verifying Segment Relations
Models vs. Reality dr.ir. B.F. van Dongen Assistant Professor Eindhoven University of Technology
Block-Structured Process Discovery: Filtering Infrequent Behaviour Sander Leemans Dirk Fahland Wil van der Aalst Eindhoven University of Technology.
Boudewijn van Dongen /t Multi-phase process mining Building instance graphs.
/faculteit technologie management Genetic Process Mining Ana Karla Medeiros Ton Weijters Wil van der Aalst Eindhoven University of Technology Department.
Process Mining from discovery to checking Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology, Department of Information Systems, P.O. Box.
/faculteit technologie management Genetic Process Mining Ana Karla Alves de Medeiros Eindhoven University of Technology Department.
Process Mining in CSCW Systems All truths are easy to understand once they are discovered; the point is to discover them. Galileo Galilei ( )
Mining Social Networks Uncovering interaction patterns in business processes Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department.
1 Analysis of workflows a-priori and a-posteriori analysis Wil van der Aalst Eindhoven University of Technology Faculty of Technology Management Department.
Business Alignment Using Process Mining as a Tool for Delta Analysis Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information.
Process Mining: The next step in Business Process Management Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information.
/faculteit technologie management Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst.
Discovering Coordination Patterns using Process Mining Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department of Information and Technology.
/faculteit technologie management 1 Process Mining: General Introduction Ana Karla Alves de Medeiros Ana Karla Alves de Medeiros Eindhoven University of.
Process Mining: Discovering processes from event logs All truths are easy to understand once they are discovered; the point is to discover them. Galileo.
/faculteit technologie management Genetic Process Mining Wil van der Aalst Ana Karla Medeiros Ton Weijters Eindhoven University of Technology Department.
Process Mining: An iterative algorithm using the Theory of Regions Kristian Bisgaard Lassen Boudewijn van Dongen Wil van.
/faculteit technologie management 1 Process Mining: Extension Mining Algorithms Ana Karla Alves de Medeiros Ana Karla Alves de Medeiros Eindhoven University.
Process Mining for Ubiquitous Mobile Systems An Overview and a Concrete Algorithm Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology Department.
A university for the world real R © 2009, Chapter 17 Process Mining and Simulation Moe Wynn Anne Rozinat Wil van der Aalst Arthur.
2.4 Reasoning with Properties from Algebra
HIERARCHICAL CONFORMANCE CHECKING OF PROCESS MODELS BASED ON EVENT LOGS Jorge Munoz-Gama, Josep Carmona and Wil M.P. van der Aalst.
Process Mining Control flow process discovery Fabrizio Maria Maggi (based on Process Mining book – Springer copyright 2011 and lecture material by Marlon.
Jorge Muñoz-Gama Universitat Politècnica de Catalunya (Barcelona, Spain) Algorithms for Process Conformance and Process Refinement.
Process Mining Control flow process discovery
Process Mining: Discovering processes from event logs All truths are easy to understand once they are discovered; the point is to discover them. Galileo.
Pontificia Universidad Católica de Chile School of Engineering Department of Computer Science A feedback-based framework for process enhancement of causal.
Jianmin Wang 1, Shaoxu Song 1, Xiaochen Zhu 1, Xuemin Lin 2 1 Tsinghua University, China 2 University of New South Wales, Australia 1/23 VLDB 2013.
Systems II San Pham CS /20/03. Topics Operating Systems Resource Management – Process Management – CPU Scheduling – Deadlock Protection/Security.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Han-na Yang Rediscovering Workflow Models from Event-Based Data using Little Thumb.
Process-oriented System Analysis Process Mining. BPM Lifecycle.
Decision Mining in Prom A. Rozinat and W.M.P. van der Aalst Joosung, Ko.
Objective: Students will use proportional parts of triangles and divide a segment into parts. S. Calahan 2008.
Alignment-based Precision Checking A. Adriansyah 1, J. Munoz Gamma 2, J. Carmona 2, B.F. van Dongen 1, W.M.P. van der Aalst 1 Tallinn, 3 September 2012.
/faculteit technologie management Workflow Mining: Current Status and Future Directions Ana Karla A. de Medeiros, W.M.P van der Aalst and A.J.M.M. Weijters.
Decomposing Data-aware Conformance Checking Massimiliano de Leoni, Jorge Munoz-Gama, Josep Carmona, Wil van der Aalst PAGE 0.
Representing Relations Using Matrices A relation between finite sets can be represented using a zero-one matrix Suppose R is a relation from A = {a 1,
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Towards comprehensive support for organizational mining Presenter : Yu-hui Huang Authors : Minseok Song,
1 CS techniques for IT auditing Lecture 6. Dept of Mathematics and Computer Science 2 Transition system (1) Basic process model of CS is a transition.
Process Mining – Concepts and Algorithms Review of literature on process mining techniques for event log data.
30 januari 2018 Mining Social Networks Uncovering interaction patterns in business processes Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology.
7 mei 2018 Process Mining in CSCW Systems All truths are easy to understand once they are discovered; the point is to discover them. Galileo Galilei.
MTAT Business Process Management (BPM) Lecture 11: Process Monitoring and Mining Fabrizio Maggi (based on lecture material by Marlon Dumas, Wil.
Profiling based unstructured process logs
Exploring processes and deviations
David Redlich, Thomas Molka, Wasif Gilani, Awais Rashid, Gordon Blair
Formal Methods in Business Process Management
Patterns extraction from process executions
Set up ratios: = = Fill in ratios: Solve the proportion: =
Concurrent Systems Modeling using Petri Nets – Part II
Decomposed Process Mining: The ILP Case
Wil van der Aalst Eindhoven University of Technology
Wil van der Aalst Eindhoven University of Technology
Multi-phase process mining
3 mei 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros.
2.4 Building a System of Geometry Knowledge
Business Alignment Using Process Mining as a Tool for Delta Analysis
19 augustus 2019 Mining Social Networks Uncovering interaction patterns in business processes Prof.dr.ir. Wil van der Aalst Eindhoven University of Technology.
Presentation transcript:

5 juli 2019 Process Mining and Security: Detecting Anomalous Process Executions and Checking Process Conformance Wil van der Aalst Ana Karla A. de Medeiros Eindhoven University of Technology Department of Information and Technology a.k.medeiros@tm.tue.nl 1

Outline Motivation Process Mining: -algorithm Detecting Anomalous Process Execution Checking Process Conformance Conclusion and Future work

Process Mining: Overview 2) process model 3) organizational model 4) social network 1) basic performance metrics 5) performance characteristics 6) auditing/security If …then …

Motivation Workflow Mining (What is the process?) Delta analysis (Are we doing what was specified?) Performance analysis (How can we improve?)

Motivation How can we benefit from process mining to verify security issues in computer systems? Detect anomalous process execution Check process conformance

Process Mining – Process log case 1 : task A case 2 : task A case 3 : task A case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task A case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D Minimal information in noise-free log: case id’s and task id’s Additional information: event type, time, resources, and data In this log there are three possible sequences: ABCD ACBD EF

Process Mining – Ordering Relations >,,||,# Direct succession: x>y iff for some case x is directly followed by y. Causality: xy iff x>y and not y>x. Parallel: x||y iff x>y and y>x Unrelated: x#y iff not x>y and not y>x. case 1 : task A case 2 : task A case 3 : task A case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task A case 2 : task B ... ABCD ACBD EF A>B A>C B>C B>D C>B C>D E>F AB AC BD CD EF B||C C||B

Process Mining – -algorithm 5 juli 2019 Process Mining – -algorithm Let W be a workflow log over T. a(W) is defined as follows. TW = { t Î T  |  $s Î W t Î s}, TI = { t Î T  |  $s Î W t = first(s) }, TO = { t Î T  |  $s Î W t = last(s) }, XW = { (A,B) |  A Í TW  Ù B Í TW  Ù  "a Î A"b Î B a ®W b   Ù  "a1,a2 Î A a1#W a2  Ù  "b1,b2 Î B b1#W b2 }, YW = { (A,B) Î X  |  "(A¢,B¢) Î XA Í A¢ ÙB Í B¢Þ (A,B) = (A¢,B¢) }, PW = { p(A,B)  |  (A,B) Î YW } È{iW,oW}, FW = { (a,p(A,B))  |  (A,B) Î YW  Ù a Î A }  È { (p(A,B),b)  |  (A,B) Î YW  Ù b Î B }  È{ (iW,t)  |  t Î TI}  È{ (t,oW)  | t Î TO}, and a(W) = (PW,TW,FW).

Process Mining – -algorithm AB AC BD CD EF ABCD ACBD EF B||C C||B

Process Mining – -algorithm If log is complete with respect to relation >, it can be used to mine SWF-net without short loops Structured Workflow Nets (SWF-nets) have no implicit places and the following two constructs cannot be used:

Detecting Anomalous Process Executions Use the -algorithm to discover the acceptable behavior Log traces = audit trails Cases = session ids Complete log only has acceptable audit trails Verify the conformance of new audit trails by playing the “token game”

Detecting Anomalous Process Executions  Enter, Select Product, Add to Basket, Cancel Order

Detecting Anomalous Process Executions  Enter, Select Product, Add to Basket, Proceed to Checkout, Fill in Delivery Info, Fill in Payment Info, Process Order, Finish Checkout

Checking Process Conformance Verify if a pattern holds Provide Password  Process Order So… Provide Password > Process Order and NOT Process Order > Provide Password

Checking Process Conformance Provide Password  Process Order (!) Token game can be used to verify if the pattern holds for every audit trail

Conclusion and Future Work Process mining can be used to Detect anomalous behavior Check process conformance Tools are available at our website www.processmining.org Future Work Apply process mining to audit trails from real-life case studies

Questions? www.processmining.org