Can process mining help in anomaly-based intrusion detection?
Yinzheng ZhongAlexei LisitsaPublished in: CoRR (2022)
Keyphrases
- process mining
- anomaly based intrusion detection
- network intrusion detection
- anomaly detection
- process model
- event logs
- business process
- intrusion detection
- business processes
- intrusion detection system
- formal concept analysis
- clinical pathway
- network traffic
- fraud detection
- unsupervised learning
- rough set theory
- network security
- real world
- web mining
- support vector machine
- web services
- machine learning