Skip to main content

2020 | OriginalPaper | Buchkapitel

Supporting Process Mining with Recovered Residual Data

verfasst von : Ludwig Englbrecht, Stefan Schönig, Günther Pernul

Erschienen in: The Practice of Enterprise Modeling

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Understanding how workflows are actually carried out within an organization can provide a crucial contribution to business process improvement. This paper presents a concept for reconstructing a business process by using file residuals on a hard-drive and without the need for existing event logs. Thereby, methods from the area of process mining are enriched with approaches from digital forensics investigations in a Digital Trace Miner. First, a framework that extracts traces originating from business process execution based on residual data is developed in order to link them to the processes. The traces from the extraction are used in a life-cycle to keep related data up-to-date. This approach has been implemented and evaluated by a prototype. The evaluation shows that this approach enables useful insights regarding the tasks performed on a suspect computer by associating recovered files by using file-carving mechanisms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat van der Aalst, W.M.P., Adriansyah, A., et al.: Process mining manifesto. In: Business Process Management Workshops, vol. 99, pp. 169–194 (2011) van der Aalst, W.M.P., Adriansyah, A., et al.: Process mining manifesto. In: Business Process Management Workshops, vol. 99, pp. 169–194 (2011)
2.
Zurück zum Zitat van der Aalst, W.P., et al.: Business process mining: an industrial application. Inf. Syst. 32(5), 713–732 (2007)CrossRef van der Aalst, W.P., et al.: Business process mining: an industrial application. Inf. Syst. 32(5), 713–732 (2007)CrossRef
3.
Zurück zum Zitat van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128–1142 (2004)CrossRef van der Aalst, W.M.P., Weijters, T., Maruster, L.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128–1142 (2004)CrossRef
4.
Zurück zum Zitat Bala, S.: Mining projects from structured and unstructured data. In: Gulden, J., et al. (eds.) CEUR Workshop Proceedings, vol. 1859, pp. 133–137. CEUR-WS.org (2017) Bala, S.: Mining projects from structured and unstructured data. In: Gulden, J., et al. (eds.) CEUR Workshop Proceedings, vol. 1859, pp. 133–137. CEUR-WS.org (2017)
7.
Zurück zum Zitat Castellanos, M., de Medeiros, A.K.A., Mendling, J., Weber, B., Weijters, A.J.M.M.: Business process intelligence. In: Cardoso, J.S., van der Aalst, W.M.P. (eds.) Handbook of Research on Business Process Modeling, pp. 456–480. IGI Global, Hershey (2009)CrossRef Castellanos, M., de Medeiros, A.K.A., Mendling, J., Weber, B., Weijters, A.J.M.M.: Business process intelligence. In: Cardoso, J.S., van der Aalst, W.M.P. (eds.) Handbook of Research on Business Process Modeling, pp. 456–480. IGI Global, Hershey (2009)CrossRef
9.
Zurück zum Zitat Dakic, D., Stefanovic, D., Lolic, T., Narandzic, D., Simeunovic, N.: Event log extraction for the purpose of process mining: a systematic literature review. In: Prostean, G., Lavios Villahoz, J.J., Brancu, L., Bakacsi, G. (eds.) SIM 2019. SPBE, pp. 299–312. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44711-3_22CrossRef Dakic, D., Stefanovic, D., Lolic, T., Narandzic, D., Simeunovic, N.: Event log extraction for the purpose of process mining: a systematic literature review. In: Prostean, G., Lavios Villahoz, J.J., Brancu, L., Bakacsi, G. (eds.) SIM 2019. SPBE, pp. 299–312. Springer, Cham (2020). https://​doi.​org/​10.​1007/​978-3-030-44711-3_​22CrossRef
10.
Zurück zum Zitat Dewald, A., Freiling, F.C.: From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate (2014) Dewald, A., Freiling, F.C.: From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate (2014)
11.
Zurück zum Zitat Englbrecht, L., Pernul, G.: A privacy-aware digital forensics investigation in enterprises. In: Volkamer, M., Wressnegger, C. (eds.) ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, 25–28 August 2020, pp. 58:1–58:10. ACM (2020) Englbrecht, L., Pernul, G.: A privacy-aware digital forensics investigation in enterprises. In: Volkamer, M., Wressnegger, C. (eds.) ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, 25–28 August 2020, pp. 58:1–58:10. ACM (2020)
12.
Zurück zum Zitat Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, 64–73 (2010)CrossRef Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, 64–73 (2010)CrossRef
14.
Zurück zum Zitat Inman, K., Rudin, N.: Principles and Practice of Criminalistics: The Profession of Forensic Science. Protocols in Forensic Science. CRC Press, Boca Raton (2000)CrossRef Inman, K., Rudin, N.: Principles and Practice of Criminalistics: The Profession of Forensic Science. Protocols in Forensic Science. CRC Press, Boca Raton (2000)CrossRef
16.
Zurück zum Zitat Kälber, S., Dewald, A., Freiling, F.C.: Forensic application-fingerprinting based on file system metadata. In: Seventh International Conference on IT Security Incident Management and IT Forensics, pp. 98–112 (2013) Kälber, S., Dewald, A., Freiling, F.C.: Forensic application-fingerprinting based on file system metadata. In: Seventh International Conference on IT Security Incident Management and IT Forensics, pp. 98–112 (2013)
17.
Zurück zum Zitat Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensic Techniques into Incident Response: NIST SP 800-86 (2006) Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensic Techniques into Incident Response: NIST SP 800-86 (2006)
18.
Zurück zum Zitat Li, H., Xiao, F., Xiong, N.: Efficient metadata management in block-level CDP system for cyber security. IEEE Access 7, 151569–151578 (2019)CrossRef Li, H., Xiao, F., Xiong, N.: Efficient metadata management in block-level CDP system for cyber security. IEEE Access 7, 151569–151578 (2019)CrossRef
19.
Zurück zum Zitat Lu, M., Chiueh, T.: File versioning for block-level continuous data protection. In: 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Québec, Canada, 22–26 June 2009, pp. 327–334. IEEE Computer Society (2009) Lu, M., Chiueh, T.: File versioning for block-level continuous data protection. In: 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Québec, Canada, 22–26 June 2009, pp. 327–334. IEEE Computer Society (2009)
20.
Zurück zum Zitat McCreight, S., Weber, D.: System and method for entropy-based near-match analysis (2010), US Patent App. 12/722,482 McCreight, S., Weber, D.: System and method for entropy-based near-match analysis (2010), US Patent App. 12/722,482
21.
Zurück zum Zitat Meier, S.: Digitale Forensik in Unternehmen. Universität Regensburg, January 2017 Meier, S.: Digitale Forensik in Unternehmen. Universität Regensburg, January 2017
23.
Zurück zum Zitat Palmer, G.: A road map for digital forensic research: Report from the first digital forensic research workshop (DFRWS). In: First Digital Forensic Research Workshop, Utica, New York, pp. 27–30 (2001) Palmer, G.: A road map for digital forensic research: Report from the first digital forensic research workshop (DFRWS). In: First Digital Forensic Research Workshop, Utica, New York, pp. 27–30 (2001)
24.
Zurück zum Zitat Pasquier, T., et al.: Practical whole-system provenance capture. In: Proceedings of the 2017 Symposium on Cloud Computing, pp. 405–418. ACM (2017) Pasquier, T., et al.: Practical whole-system provenance capture. In: Proceedings of the 2017 Symposium on Cloud Computing, pp. 405–418. ACM (2017)
25.
Zurück zum Zitat Sheng, Y., Wang, D., He, J., Ju, D.: TH-CDP: an efficient block level continuous data protection system. In: International Conference on Networking, Architecture, and Storage, pp. 395–404 (2009) Sheng, Y., Wang, D., He, J., Ju, D.: TH-CDP: an efficient block level continuous data protection system. In: International Conference on Networking, Architecture, and Storage, pp. 395–404 (2009)
26.
Zurück zum Zitat Soltani, S., Seno, S.A.H.: A survey on digital evidence collection and analysis. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 247–253. IEEE (2017) Soltani, S., Seno, S.A.H.: A survey on digital evidence collection and analysis. In: 2017 7th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 247–253. IEEE (2017)
27.
Zurück zum Zitat Weijters, A., van der Aalst, W.M.P., de Medeiros, A.A.: Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Technical report WP 166, 1–34 (2006) Weijters, A., van der Aalst, W.M.P., de Medeiros, A.A.: Process mining with the heuristics miner-algorithm. Technische Universiteit Eindhoven, Technical report WP 166, 1–34 (2006)
Metadaten
Titel
Supporting Process Mining with Recovered Residual Data
verfasst von
Ludwig Englbrecht
Stefan Schönig
Günther Pernul
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-63479-7_27

Premium Partner