Towards the application of Process Mining for analyzing Network Security

Authors

  • Salah-Eddine SAMIRI LS2ME Laboratory, Sultan Moulay Slimane University of Beni Mellal, Polydisciplinary faculty of Khouribga, Morocco
  • Zineb LAMGHARI Department of Computer Science, Faculty of Sciences, Mohammed V University in Rabat, Rabat 10000, Morocco
  • Rachid FAKHAR LS2ME Laboratory, Sultan Moulay Slimane University of Beni Mellal, Polydisciplinary faculty of Khouribga, Morocco

DOI:

https://doi.org/10.19139/soic-2310-5070-2557

Keywords:

Process Mining, Cybersecurity, Network Security, Forensic, MitM attack

Abstract

The objective of our study is to investigate the use of process mining algorithms in analyzing data collected from a Man-in-the-Middle (MitM) attack that we simulated in a controlled local network to detect malicious activities. After analyzing the data we found results that indicate that under normal network conditions the BPMN model displays standard interactions without duplicate or conflicting IP addresses. However, in the case of MitM attack, the model shows duplicate and conflicting IP addresses which was a real manipulation and disruption. These results highlight how process mining can improve forensic investigations into network security intrusions

Downloads

Published

2025-05-27

How to Cite

SAMIRI, S.-E., LAMGHARI, Z. ., & FAKHAR, R. . (2025). Towards the application of Process Mining for analyzing Network Security. Statistics, Optimization & Information Computing, 15(2), 1151–1161. https://doi.org/10.19139/soic-2310-5070-2557

Issue

Section

Research Articles