A Requirements Based Approach for Automating Enterprise IT Architecture Modeling Using Multiple Data Sources

Enterprise Architecture (EA) is an approach where models of an enterprise are used for decision support. An important part of EA is enterprise IT architecture. Creating models of both types can be a complex task. EA can be difficult to model due to unavailable business data, while in the case of enterprise IT architecture, there can be too much IT data available. Furthermore, there is a trend of a growing availability of data possibly useful for modeling. We call the process of making use of available data, automatic modeling. There have been previous attempts to achieve automatic model creation using a single source of data. Often, a single source of data is not enough to create the models required. In this paper we address automatic modeling when data from multiple heterogeneous sources are needed. The paper looks at the potential data sources, requirements that the data must meet and proposes a four-part approach. The approach is tested in a study using the Cyber Security Modeling Language in order to model a lab setup at KTH Royal Institute of Technology. The lab aims at mirroring a small power utility's IT setup. The paper demonstrates that it is possible to create timely and scalable enterprise IT architecture models from multiple sources, and that manual modeling and data quality related problems can be resolved using known data processing methods.

[1]  Florian Matthes,et al.  Automating Enterprise Architecture Documentation using an Enterprise Service Bus , 2012, AMCIS.

[2]  Ruth Breu,et al.  On Enterprise Architecture Change Events , 2012, TEAR/PRET.

[3]  Alan MacCormack,et al.  A Methodology for Operationalizing Enterprise Architecture and Evaluating Enterprise IT Flexibility , 2015 .

[4]  James Clark,et al.  XSL Transformations (XSLT) Version 1.0 , 1999 .

[5]  Khurram Shahzad,et al.  A Tool for Automatic Enterprise Architecture Modeling , 2011, CAiSE Forum.

[6]  Markus Buschle,et al.  Automatic data collection for enterprise architecture models , 2012, Software & Systems Modeling.

[7]  Khurram Shahzad,et al.  P2AMF: Predictive, Probabilistic Architecture Modeling Framework , 2013, IWEI.

[8]  Pontus Johnson,et al.  Assessment of Enterprise Information Security : Estimating the Credibility of the Results , 2005 .

[9]  Markus Lupp,et al.  Extensible Markup Language , 2008, Encyclopedia of GIS.

[10]  Erhard Rahm,et al.  Data Cleaning: Problems and Current Approaches , 2000, IEEE Data Eng. Bull..

[11]  Ruth Breu,et al.  Automation Processes for Enterprise Architecture Management , 2011, 2011 IEEE 15th International Enterprise Distributed Object Computing Conference Workshops.

[12]  Robert Lagerström,et al.  A Bayesian network for IT governance performance prediction , 2008, ICEC.

[13]  Ruth Breu,et al.  Requirements for Automated Enterprise Architecture Model Maintenance - A Requirements Analysis based on a Literature Review and an Exploratory Survey , 2011, ICEIS.

[14]  Robert Lagerström,et al.  A Framework for Service Interoperability Analysis using Enterprise Architecture Models , 2008, 2008 IEEE International Conference on Services Computing.

[15]  Mathias Ekstedt,et al.  Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[16]  Matthias Brückmann,et al.  Some Process Patterns for Enterprise Architecture Management , 2009, Software Engineering.

[17]  Robert Lagerström,et al.  Enterprise architecture analysis with extended influence diagrams , 2007, Inf. Syst. Frontiers.

[18]  Robert Lagerström,et al.  Architecture analysis of enterprise systems modifiability - Models, analysis, and validation , 2010, J. Syst. Softw..

[19]  Christopher D. Wickens,et al.  A model for types and levels of human interaction with automation , 2000, IEEE Trans. Syst. Man Cybern. Part A.

[20]  Mathias Ekstedt,et al.  Enterprise Architecture Meta Models for IT/Business Alignment Situations , 2010, 2010 14th IEEE International Enterprise Distributed Object Computing Conference.

[21]  JohnsonPontus,et al.  Architecture analysis of enterprise systems modifiability , 2010 .

[22]  Ruth Breu,et al.  Enterprise Architecture Documentation: Empirical Analysis of Information Sources for Automation , 2013, 2013 46th Hawaii International Conference on System Sciences.

[23]  Markus Buschle,et al.  Enterprise Architecture Management's Impact on Information Technology Success , 2011, 2011 44th Hawaii International Conference on System Sciences.

[24]  Robert Lagerström,et al.  A method for creating entreprise architecture metamodels applied to systems modifiability , 2009, Int. J. Comput. Sci. Appl..

[25]  C. M. Sperberg-McQueen,et al.  Extensible markup language , 1997 .

[26]  Khurram Shahzad,et al.  P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language , 2015, IEEE Trans. Dependable Secur. Comput..

[27]  Mathias Ekstedt,et al.  Data Collection Prioritization for System Quality Analysis , 2009, Electron. Notes Theor. Comput. Sci..