Scenarios for Process-Aware Insider Attack Detection in Manufacturing

被引:1
|
作者
Macak, Martin [1 ]
Vaclavek, Radek [1 ]
Kusnirakova, Dasa [1 ]
Matulevicius, Raimundas [2 ]
Buhnova, Barbora [1 ]
机构
[1] Masaryk Univ, Fac Informat, Brno, Czech Republic
[2] Univ Tartu, Inst Comp Sci, Tartu, Estonia
关键词
insider attack; insider detection; process mining; manufacturing; CONFORMANCE CHECKING;
D O I
10.1145/3538969.3544449
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Manufacturing production heavily depends on the processes that need to be followed during manufacturing. As there might be many reasons behind possible deviations from these processes, the deviations can also cover ongoing insider attacks, e.g., intended to perform sabotage or espionage on these infrastructures. Insider attacks can cause tremendous damage to a manufacturing company because an insider knows how to act inconspicuously, making insider attacks very hard to detect. In this paper, we examine the potential of process-mining methods for insider-attack detection in the context of manufacturing, which is a new and promising application context for process-aware methods. To this end, we present five manufacturing-related scenarios of insider threats identified in cooperation with a manufacturing company, where the process mining could be most helpful in the detection of their respective attack events. We describe these scenarios and demonstrate the utilization of process mining in this context, creating ground for further future research.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Process-Aware Information Systems for Emergency Management
    de Leoni, Massimiliano
    Marrella, Andrea
    Russo, Alessandro
    [J]. TOWARDS A SERVICE-BASED INTERNET: SERVICEWAVE 2010 WORKSHOPS, 2011, 6569 : 50 - +
  • [22] Time patterns for process-aware information systems
    Lanz, Andreas
    Weber, Barbara
    Reichert, Manfred
    [J]. REQUIREMENTS ENGINEERING, 2014, 19 (02) : 113 - 141
  • [23] Tunable Sensors for Process-Aware Voltage Scaling
    Chan, Tuck-Boon
    Kahng, Andrew B.
    [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2012, : 7 - 14
  • [24] Cybersecurity for Control Systems: A Process-Aware Perspective
    Khorrami, Farshad
    Krishnamurthy, Prashanth
    Karri, Ramesh
    [J]. IEEE DESIGN & TEST, 2016, 33 (05) : 75 - 83
  • [25] Process-aware approach for managing organisational knowledge
    Toledo, Carlos M.
    Chiotti, Omar
    Galli, Maria R.
    [J]. INFORMATION SYSTEMS, 2016, 62 : 1 - 28
  • [26] Process mapping and anomaly detection in laser wire directed energy deposition additive manufacturing using in-situ imaging and process-aware machine learning
    Assad, Anis
    Bevans, Benjamin D.
    Potter, Willem
    Rao, Prahalada
    Cormier, Denis
    Deschamps, Fernando
    Hamilton, Jakob D.
    Rivero, Iris, V
    [J]. MATERIALS & DESIGN, 2024, 245
  • [27] Robust and Reliable Process-Aware Information Systems
    Schwerz, Andre Luis
    Liberato, Rafael
    Pu, Calton
    Ferreira, Joao Eduardo
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (03) : 820 - 833
  • [28] Process-aware continuation management in web applications
    Book, Matthias
    Buss, Marco
    Gruhn, Volker
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2014, 94 : 3 - 17
  • [29] Mining and Simulation for Process-Aware Information Systems
    Brito e Abreu, Fernando
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2022), 2022, : 557 - 559
  • [30] Business Process-aware ERP Development and Evolution
    Wei, Daisen
    Zhang, Jiazhong
    Li, Xueqing
    Tang, Longye
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ELECTRONIC SCIENCE AND AUTOMATION CONTROL, 2015, 20 : 31 - 34