Process mining methods for detection of malicious computer usage by masquerading traitors – Bc. Matúš Štovčik
Bc. Matúš Štovčik
Master's thesis
Process mining methods for detection of malicious computer usage by masquerading traitors
Process mining methods for detection of malicious computer usage by masquerading traitors
Abstract:
Táto práca obsahuje prehľad tém, ktoré môžu byť užitočné pri odhaľovaní maskujúcich sa zradcov pomocou užívateľovho záznamu o aktivite na počítači. Predstavujeme dostupné nástroje na zber údajov, techniky procesného dolovania, nástroje procesného dolovania a procesné modely. Vyvinuli sme riešenie pomocou vybraných nástrojov prezentovaných v prehľade. Toto riešenie vykonáva zber a predspracovanie údajov …moreAbstract:
This thesis presents an examination of topics that can be useful for the detection of masquerading traitors in computer usage - available data gathering tools, process mining techniques, process mining tools, and process models. We develop a solution using selected tools presented in the examination. This solution performs data gathering and data preprocessing and applies the process discovery technique …more
Language used: English
Date on which the thesis was submitted / produced: 17. 5. 2022
Identifier:
https://is.muni.cz/th/v0k9m/
Thesis defence
- Date of defence: 20. 6. 2022
- Supervisor: RNDr. Martin Macák
- Reader: PhD Bruno Rossi
Citation record
ISO 690-compliant citation record:
ŠTOVČIK, Matúš. \textit{Process mining methods for detection of malicious computer usage by masquerading traitors}. Online. Master's thesis. Brno: Masaryk University, Faculty of Informatics. 2022. Available from: https://theses.cz/id/15yllw/.
Full text of thesis
Contents of on-line thesis archive
Published in Theses:- světu
Other ways of accessing the text
Institution archiving the thesis and making it accessible: Masarykova univerzita, Fakulta informatikyMasaryk University
Faculty of InformaticsMaster programme / field:
Computer systems, communication and security / Networks and communication
Theses on a related topic
-
The utilization of process mining for insider attack detection in information systems
Daniel Rozehnal -
Process-aware Insider Threat Detection and Mitigation in Organizations
Martin Macák -
Comparison of data-oriented and process-oriented approaches for insider attack detection from audit logs
Marek Laššák -
Tool for Transforming BPMN4FRSS Models to Attack Scenarios
Ondřej Holiš