A Self Adaptive Learning Approach for Optimum Path Evaluation of Process for Forensic use to Finding Uniqueness

One approach to protected systems is from first to last the examination of audit trails or logs. An audit trail is a evidence of all procedures that take place in a system and across a network, it provides a outline of user/system events so that safety measures events can be associated to the actions of a specific individual or system element. In the optimum path evaluation of a process working with the audit log of the system generated by our data format, a  different kinds of processes accessed during the different user session .our proposed work is based on the concept of forensic activities and the process mining, where we introduce a new process analysis method by which we discover what the users next application. Keywords - Audit Logs, reference graph building,forensic,optimum path evaluation, process mining.

[1]  Pieter H. Hartel,et al.  A log mining approach for process monitoring in SCADA , 2010, International Journal of Information Security.

[2]  Thomas Magedanz,et al.  Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks , 2009, Int. J. Secur. Networks.

[3]  Daisuke Takahashi,et al.  Retrieving knowledge from auditing log-files for computer and network forensics and accountability , 2008, Secur. Commun. Networks.

[4]  Wil M.P. van der Aalst,et al.  Process Mining Put into Context , 2012, IEEE Internet Computing.

[5]  D. McDowell Foreword , 1999 .

[6]  Zhenyu Wang,et al.  The Research of Process Mining Assessment Used in Business Intelligence , 2012, 2012 IEEE/ACIS 11th International Conference on Computer and Information Science.

[7]  Brandon Dixon,et al.  Using an edge-dual graph and k-connectivity to identify strong connections in social networks , 2008, ACM-SE 46.

[8]  Tzong-Chen Wu,et al.  Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks , 2010, Int. J. Secur. Networks.

[9]  Wil M. P. van der Aalst,et al.  Process mining: making knowledge discovery process centric , 2012, SKDD.

[10]  Rafael Accorsi,et al.  On the exploitation of process mining for security audits: the conformance checking case , 2012, SAC '12.

[11]  Bo Fu,et al.  An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[12]  René Mayrhofer,et al.  Secure Spontaneous Interaction, Special issue, International Journal of Security and Networks Volume 4 Nos. 1/2 , 2009 .