A Self Adaptive Learning Approach for Optimum Path Evaluation of Process for Forensic use to Finding Uniqueness

作者: Pallavi Ramteke , Yashpal Kadam , Sanket Gupta

DOI:

关键词:

摘要: One approach to protected systems is from first last the examination of audit trails or logs. An trail a evidence all procedures that take place in system and across network, it provides outline user/system events so safety measures can be associated actions specific individual element. In optimum path evaluation process working with log generated by our data format, a  different kinds processes accessed during user session .our proposed work based on concept forensic activities mining, where we introduce new analysis method which discover what users next application. Keywords - Audit Logs, reference graph building,forensic,optimum evaluation, mining.

参考文章(12)
Wil M.P. van der Aalst, Schahram Dustdar, Process Mining Put into Context IEEE Internet Computing. ,vol. 16, pp. 82- 86 ,(2012) , 10.1109/MIC.2012.12
Kuo Yu Tsai, Chien Lung Hsu, Tzong Chen Wu, Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks International Journal of Security and Networks. ,vol. 5, pp. 45- 52 ,(2010) , 10.1504/IJSN.2010.030722
Daisuke Takahashi, Yang Xiao, Retrieving knowledge from auditing log‐files for computer and network forensics and accountability Security and Communication Networks. ,vol. 1, pp. 147- 160 ,(2008) , 10.1002/SEC.10
Li Ding, Brandon Dixon, Using an edge-dual graph and k-connectivity to identify strong connections in social networks acm southeast regional conference. pp. 475- 480 ,(2008) , 10.1145/1593105.1593230
Rafael Accorsi, Thomas Stocker, On the exploitation of process mining for security audits: the conformance checking case acm symposium on applied computing. pp. 1709- 1716 ,(2012) , 10.1145/2245276.2232051
Sven Ehlert, Yacine Rebahi, Thomas Magedanz, Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks International Journal of Security and Networks. ,vol. 4, pp. 189- 200 ,(2009) , 10.1504/IJSN.2009.027344
Wil van der Aalst, Process mining ACM SIGKDD Explorations Newsletter. ,vol. 13, pp. 45- 49 ,(2012) , 10.1145/2207243.2207251
Dina Hadžiosmanović, Damiano Bolzoni, Pieter H. Hartel, A log mining approach for process monitoring in SCADA International Journal of Information Security. ,vol. 11, pp. 231- 251 ,(2012) , 10.1007/S10207-012-0163-8
Zhenyu Wang, Qing Yao, Yuqing Sun, The Research of Process Mining Assessment Used in Business Intelligence annual acis international conference on computer and information science. pp. 179- 183 ,(2012) , 10.1109/ICIS.2012.109