In this paper, we consider the naive applications of process mining in network traffic comprehension, traffic anomaly detection, and intrusion detection. We standardise the procedure of transforming packet data into an event log. We mine multiple process models and analyse the process models mined with the inductive miner using ProM and the fuzzy miner using Disco. We compare the two types of process models extracted from event logs of differing sizes. We contrast the process models with the RFC TCP state transition diagram and the diagram by Bishop et al. We analyse the issues and challenges associated with process mining in intrusion detection and explain why naive process mining with network data is ineffective.
翻译:在本文中,我们考虑工艺采矿在网络交通理解、交通异常现象探测和入侵探测方面的天真应用。我们标准化了将包装数据转换成事件日志的程序。我们利用ProM和Disco来开采多种工艺模型并分析与导导导采矿器开采的工艺模型。我们比较了从不同大小的事件日志中提取的两种工艺模型。我们比较了流程模型与RFC TCP州过渡图和Bishop等人的图表。我们分析了与入侵探测过程采矿有关的问题和挑战,并解释了使用网络数据进行天真的开采为什么无效。