J 2022

Process Mining Usage in Cybersecurity and Software Reliability Analysis: A Systematic Literature Review

MACÁK, Martin; Lukáš DAUBNER; Mohammadreza FANI SANI and Barbora BÜHNOVÁ

Basic information

Original name

Process Mining Usage in Cybersecurity and Software Reliability Analysis: A Systematic Literature Review

Authors

MACÁK, Martin (703 Slovakia, guarantor, belonging to the institution); Lukáš DAUBNER (203 Czech Republic, belonging to the institution); Mohammadreza FANI SANI and Barbora BÜHNOVÁ (203 Czech Republic, belonging to the institution)

Edition

Array, Elsevier Inc. 2022, 2590-0056

Other information

Language

English

Type of outcome

Article in a journal

Field of Study

10200 1.2 Computer and information sciences

Country of publisher

Netherlands

Confidentiality degree

is not subject to a state or trade secret

References:

RIV identification code

RIV/00216224:14330/22:00125085

Organization unit

Faculty of Informatics

UT WoS

001161069100008

EID Scopus

2-s2.0-85129071002

Keywords in English

Process mining; Cybersecurity; Software reliability; Systematic literature review

Tags

International impact, Reviewed
Changed: 14/5/2024 12:43, RNDr. Pavel Šmerk, Ph.D.

Abstract

In the original language

The digitalization of our society is only possible in the presence of secure and reliable software systems governing ongoing critical processes, so-called critical information infrastructures. The understanding of mutual interdependencies of events and processes is crucial for cybersecurity and software reliability. One of the promising ways to tackle these challenges is process mining, which is a set of techniques that aims to mine essential knowledge from processes, thus providing more perspectives and temporal context to data interpretation and process understanding. However, it is unclear how process mining can help and can be practically used in the context of cybersecurity and reliability. Therefore, in this work, we investigate the potential of process mining to aid in cybersecurity and software reliability to analyze and support research efforts in these areas. Concretely, we collect existing process mining applications, discuss current trends and promising research directions that can be used to tackle the current cybersecurity and software reliability challenges. To this end, we conduct a systematic literature review covering 35 relevant research approaches to examine how the process mining is currently used for these tasks and what are the research gaps and promising research directions in the area. This work is an extension of our previous work, which focused solely on the cybersecurity area, based on the observation of relative closeness and similar goals of those two fields, in which some approaches tend to overlap.

Links

CZ.02.1.01/0.0/0.0/16_019/0000822, interní kód MU
(CEP code: EF16_019/0000822)
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur (Acronym: C4e)
Investor: Ministry of Education, Youth and Sports of the CR, CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence, Priority axis 1: Strengthening capacities for high-quality research
EF16_019/0000822, research and development project
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur