Skip to main content

From Network Traffic Data to Business Activities: A Process Mining Driven Conceptualization

  • Conference paper
  • First Online:
Book cover Enterprise, Business-Process and Information Systems Modeling (BPMDS 2021, EMMSAD 2021)

Abstract

Event logs are the main source for business process mining techniques. However, they are produced by part of the systems and are not always available. Furthermore, logs that are created by a given information system may not span the full process, which may entail actions performed outside the system. We suggest that data generated by communication network traffic associated with the process can fill this gap, both in availability and in span. However, traffic data is technically oriented and noisy, and there is a huge conceptual gap between this data and business meaningful event logs. Addressing this gap, this work develops a conceptual model of traffic behavior in a business activity. To develop the model, we use simulated traffic data annotated by the originating activity and perform an iterative process of abstracting and filtering the data, along with application of process discovery. The results include distinct process models for each activity type and a generic higher-level model of traffic behavior in a business activity. Conformance checking used for evaluating the models shows high fitness and generalization across different organizational domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.wireshark.org.

  2. 2.

    Available upon contacting gal.engelberg@accenture.com.

  3. 3.

    https://useopenerp.com/v8.

  4. 4.

    https://www.system-overload.org/sap/tables.html.

  5. 5.

    Excluding vendor response activity an external communication activity which is out of model’s scope.

References

  1. Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A. (eds): Fundamentals of Business Process Management, Springer, Berlin (2013)

    Google Scholar 

  2. Škrinjar, R., Indihar-Štemberger, M., Hernaus, T.: The impact of business process orientation on organizational performance. In: Proceedings of the 2007 Informing Science and IT Education Joint Conference (2007)

    Google Scholar 

  3. Van Der Aalst, W.: Process mining: discovery. Conformance and Enhancement of Business Processes. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-28108-2_19

    Book  MATH  Google Scholar 

  4. Calvanese, D., Kalayci, T.E., Montali, M., Tinella, S.: Ontology-based data access for extracting event logs from legacy data: the onprom tool and methodology. In: Abramowicz, W. (eds.) Business Information Systems. BIS 2017. Lecture Notes in Business Information Processing, vol. 288, pp. 220–236. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59336-4_16

  5. González López de Murillas, E., Reijers, H.A., van der Aalst, W.M.P.: Connecting databases with process mining: a meta model and toolset. Softw. Syst. Model. 18, 1209–1247 (2019). https://doi.org/10.1007/s10270-018-0664-7

  6. Van der Aalst, W.M.: Extracting event data from databases to unleash process mining. In: vom Brocke, J., Schmiedel, T. (eds.) BPM – Driving Innovation in a Digital World Management for Professionals, pp. 105–128. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14430-6_8

  7. Zimmermann, H.: OSI reference model - the ISO model of architecture for open systems interconnection. IEEE Trans. Commun. 28, 425–432 (1980)

    Article  Google Scholar 

  8. The DoD internet architecture model. Comput. Netw. (1976) 7, 307–318 (1983)

    Google Scholar 

  9. Mannhardt, F., de Leoni, M., Reijers, H.A., van der Aalst, W.M.P., Toussaint, P.J.: From low-level events to activities - a pattern-based approach. In: La Rosa, M., Loos, P., Pastor, O. (eds.) BPM 2016. LNCS, vol. 9850, pp. 125–141. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45348-4_8

    Chapter  Google Scholar 

  10. Tax, N., Sidorova, N., Haakma, R., van der Aalst, W.M.: Event abstraction for process mining using supervised learning techniques. In: Bi, Y., Kapoor, S., Bhatia, R. (eds.) IntelliSys 2016. LNNS, vol. 15, pp. 251–269. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-56994-9_18

    Chapter  Google Scholar 

  11. Günther, C.W., Rozinat, A., van der Aalst, W.M.P.: Activity mining by global trace segmentation. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) Business Process Management Workshops, pp. 128–139. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12186-9_13

  12. van Dongen, B.F., Adriansyah, A.: Process mining: fuzzy clustering and performance visualization. In: Rinderle-Ma, S., Sadiq, S., Leymann, F. (eds.) BPM 2009. LNBIP, vol. 43, pp. 158–169. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12186-9_15

  13. Bala, S., Mendling, J., Schimak, M., Queteschiner, P.: Case and activity identification for mining process models from middleware. In: Buchmann, R.A., Karagiannis, D., Kirikova, M. (eds.) PoEM 2018. LNBIP, vol. 335, pp. 86–102. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02302-7_6

  14. Wakup, C., Desel, J.: Analyzing a TCP/IP-protocol with process mining techniques. In: Fournier, F., Mendling, J. (eds.) BPM 2014. LNBIP, vol. 202, pp. 353–364. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-15895-2_30

    Chapter  Google Scholar 

  15. Leemans, M., van der Aalst, W.M.: Process mining in software systems: discovering real-life business transactions and process models from distributed systems. In: 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS), pp. 44–53. IEEE (2015)

    Google Scholar 

  16. Wolny, S., Mazak, A., Wimmer, M.: Automatic reverse engineering of interaction models from system logs. In: 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 57–64 (2019)

    Google Scholar 

  17. Ackermann, C., Lindvall, M., Cleaveland, R.: Recovering views of inter-system interaction behaviors. In: 2009 16th Working Conference on Reverse Engineering, pp. 53–61 (2009)

    Google Scholar 

  18. Ganesh, A., Shanil, K.N., Sunitha, C., Midhundas, A.M.: OpenERP/Odoo-an open source concept to ERP solution. In: 2016 IEEE 6th International Conference on Advanced Computing (IACC), pp. 112–116. IEEE (2016)

    Google Scholar 

  19. PostgreSQL: The world’s most advanced open source database. https://www.postgresql.org/ Accessed 28 June 2020

  20. Mannhardt, F., de Leoni, M., Reijers, H.A.: Heuristic mining revamped: an interactive, data-aware, and conformance-aware miner. In: BPM (Demos) (2017)

    Google Scholar 

  21. Mannhardt, F., De. Leoni, M., Reijers, H.A.: The Multi-perspective process explorer. BPM (Demos). 1418, 130–134 (2015)

    Google Scholar 

  22. Dijkman, R., Dumas, M., García-Bañuelos, L.: Graph matching algorithms for business process model similarity search. In: Dayal, U., Eder, J., Koehler, J., Reijers, H.A. (eds.) BPM 2009. Lecture Notes in Computer Science, vol. 5701, pp. 48–63. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03848-8_5

    Chapter  Google Scholar 

  23. Brownlee, J.: Imbalanced classification with Python: better metrics, balance skewed classes, cost-sensitive learning. Machine Learning Mastery (2020)

    Google Scholar 

Download references

Acknowledgment

This work was done in collaboration with Accenture Labs, Israel, and supported by the Center for Cyber Law & Policy (CCLP), established by the University of Haifa in collaboration with the Israeli National Cyber Bureau.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Gal Engelberg , Moshe Hadad or Pnina Soffer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Engelberg, G., Hadad, M., Soffer, P. (2021). From Network Traffic Data to Business Activities: A Process Mining Driven Conceptualization. In: Augusto, A., Gill, A., Nurcan, S., Reinhartz-Berger, I., Schmidt, R., Zdravkovic, J. (eds) Enterprise, Business-Process and Information Systems Modeling. BPMDS EMMSAD 2021 2021. Lecture Notes in Business Information Processing, vol 421. Springer, Cham. https://doi.org/10.1007/978-3-030-79186-5_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79186-5_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79185-8

  • Online ISBN: 978-3-030-79186-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics