Abstract
In the maritime domain, electronic sensors such as AIS receivers and radars collect large amounts of data about the vessels in a certain geographical area. We investigate the use of process mining techniques for analyzing the behavior of the vessels based on these data. In the context of maritime safety and security, the goal is to support operators in identifying suspicious behavior that may indicate accidents or undesired activities such as smuggling and piracy. Our approach consists of two phases. In the first phase, process mining is used offline to extract from historical data a reference model of the normal vessel behavior, which can be adapted by experienced operators and domain experts. In the second phase, process mining is used online to verify whether the current vessel behavior is compliant with the reference model, thus allowing for the identification of suspicious behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
All the experiments illustrated in this chapter use AIS data registered along the Dutch coast in the first week of June 2007
- 4.
References
Bauer A, Leucker M, Schallhart C (2010) Comparing LTL semantics for runtime verification. J Log Comput 20(3):651–674
Beer I, Ben-David S, Eisner C, Rodeh Y (2001) Efficient detection of vacuity in temporal model checking. Form Methods Syst Des 18(2):141–163
Eisner C, Fisman D, Havlicek J, Mcisaac A, Lustig Y, van Campenhout D (2003) Reasoning with temporal logic on truncated paths. In: International conference on computer aided verification, vol 2725. Springer, Berlin/New York, pp 27–40
Günther CW, van der Aalst WMP (2007) Fuzzy mining – adaptive process simplification based on multi-perspective metrics. In: Business process management conference, vol 4714. Springer, Berlin/New York, pp 328–343
International Telecommunications Union (2001) Technical characteristics for a universal shipborne Automatic Identification System using time division multiple access in the VHF maritime mobile band, Recommendation ITU-R M.1371-1
Jagadeesh Chandra Bose RP, van der Aalst WMP (2009) Abstractions in process mining: a taxonomy of patterns. In: Business process management conference. Springer, Berlin/New York, pp 159–175
Kupferman O, Vardi MY (2003) Vacuity detection in temporal model checking. Int J Softw Tools Technol Transf 4(2):224–233
Leucker M, Schallhart C (2009) A brief account of runtime verification. J Log Algebraic Program 78(5):293–303
Maggi FM, Montali M, Westergaard M, van der Aalst WMP (2011) Monitoring business constraints with linear temporal logic: an approach based on colored automata. In: Rinderle-Ma R, Toumani F, Wolf K (eds) International conference on business process management (BPM 2011). Lecture notes in computer science, vol 6896. Springer, Berlin/New York, pp 132–147
Maggi FM, Mooij AJ, van der Aalst WMP (2011) User-guided discovery of declarative process models. In: IEEE symposium on computational intelligence and data mining (CIDM). IEEE Computer Society, Piscataway, pp 192–199
Maggi FM, Westergaard M, Montali M, van der Aalst WMP (2012) Runtime verification of LTL-based declarative process models. In: Khurshid S, Sen K (eds) International conference on runtime verification (RV 2011). Lecture notes in computer science, vol 7186. Springer, Berlin/New York, pp 131–146
Pesic M (2008) Constraint-based workflow management systems: shifting Controls to users. Ph.D. thesis, Beta Research School for Operations Management and Logistics, Eindhoven University of Technology
Pesic M, Schonenberg H, van der Aalst WMP (2007) Declare: full support for loosely-structured processes. In: IEEE international EDOC conference. IEEE, Los Alamitos, pp 287–300
Pnueli A (1977) The temporal logic of programs. In: Annual IEEE symposium on foundations of computer science, Providence, pp 46–57
Simmonds J, Davies J, Gurfinkel A, Chechik M (2010) Exploiting resolution proofs to speed up LTL vacuity detection for BMC. Int J Softw Tools Technol Transf 12(5):319–335
van der Aalst WMP (2011) Process mining: discovery, conformance and enhancement of business processes. Springer, Berlin Heidelberg/New York
van der Aalst WMP, Pesic M, Schonenberg H (2009) Declarative workflows: balancing between flexibility and support. Comput Sci Res Dev 23(2):99–113
Weske M (2007) Business process management: concepts, languages, architectures. Springer, Berlin/New York
Acknowledgements
This research has been carried out as a part of the Poseidon project at Thales under the responsibilities of the Embedded Systems Institute (ESI). This project is partially supported by the Dutch Ministry of Economic Affairs under the BSIK program.
The authors wish to thank Marco Montali and Michael Westergaard for their contribution in the development of the approach to monitor Declare models described in this chapter.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Maggi, F.M., Mooij, A.J., van der Aalst, W.M.P. (2013). Analyzing Vessel Behavior Using Process Mining. In: van de Laar, P., Tretmans, J., Borth, M. (eds) Situation Awareness with Systems of Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6230-9_9
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6230-9_9
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6229-3
Online ISBN: 978-1-4614-6230-9
eBook Packages: EngineeringEngineering (R0)