Towards the application of Process Mining for analyzing Network Security

  • Salah-Eddine SAMIRI LS2ME Laboratory, Sultan Moulay Slimane University of Beni Mellal, Polydisciplinary faculty of Khouribga, B.P. 145, 25000 Khouribga, Morocco.
  • Zineb LAMGHARI Department of Computer Science, Faculty of Sciences, Mohammed V University in Rabat, Rabat 10000, Morocco.
  • Rachid FAKHAR LS2ME Laboratory, Sultan Moulay Slimane University of Beni Mellal, Polydisciplinary faculty of Khouribga, B.P. 145, 25000 Khouribga, Morocco.
Keywords: Process Mining, Cybersecurity, Network Security, Forensic, MitM attack

Abstract

The objective of our study is to investigate the use of process mining algorithms in analyzing data collected from a Man-in-the-Middle (MitM) attack that we simulated in a controlled local network to detect malicious activities. After analyzing the data we found results that indicate that under normal network conditions the BPMN model displays standard interactions without duplicate or conflicting IP addresses. However, in the case of MitM attack, the model shows duplicate and conflicting IP addresses which was a real manipulation and disruption. These results highlight how process mining canimprove forensic investigations into network security intrusions
Published
2025-05-27
How to Cite
SAMIRI, S.-E., LAMGHARI, Z., & FAKHAR, R. (2025). Towards the application of Process Mining for analyzing Network Security. Statistics, Optimization & Information Computing. https://doi.org/10.19139/soic-2310-5070-2557
Section
I2CEAI24