Skip to main content

Analyzing a TCP/IP-Protocol with Process Mining Techniques

  • Conference paper
  • First Online:
Business Process Management Workshops (BPM 2014)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 202))

Included in the following conference series:

Abstract

In many legacy software systems the communication between client and server is based on proprietary Ethernet protocols. We consider the case that the implementation and specification of such a protocol is unknown and try to reconstruct the rules of the protocol by observation of the network communication. To this end, we translate TCP/IP-logs to appropriate event logs and apply Petri net based process mining techniques. The results of this contribution are a systematic approach to mine client/server protocols, an according tool chain involving existing tools and new tools, and an evaluation of this approach, using a concrete example from practice.

Based on the thesis [14] of the first author, supervised by the second author.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Our study is based on ProM 6.2.

References

  1. van der Aalst, W.M.P.: Service mining: using process mining to discover, check, and improve service behavior. IEEE Trans. Serv. Comput. 6(4), 525–535 (2013)

    Article  Google Scholar 

  2. van der Aalst, W.M.P., van Dongen, B.F.: Discovering Petri nets from event logs (2013). http://wwwis.win.tue.nl/wvdaalst/publications/z2.pdf. Accessed 10 May 2013

  3. van der Aalst, W.M.P.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169–194. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  4. van Dongen, B.F., van der Aalst, W.M.P.: A meta model for process mining data. In: EMOI-INTEROP (2005)

    Google Scholar 

  5. Dustdar, S., Gombotz, R.: Discovering web service workflows using web services interaction mining. Int. J. Bus. Process Integr. Manage. 1(4), 256–266 (2006)

    Article  Google Scholar 

  6. Günther, C.W., Verbeek, E.: Xes standard definition (2012). http://www.xes-standard.org/meida/xes/xesstandarddefinition-1.4.pdf. Accessed 26 April 2013

  7. König, H.: Protocol Engineering. Springer, Heidelberg (2012)

    Book  Google Scholar 

  8. Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Dokl. Akad. Nauk SSSR 163(4), 845–848 (1965)

    MathSciNet  Google Scholar 

  9. rubecon information technologies GmbH. hd-druckdialog (2013)

    Google Scholar 

  10. Service technology.org (2013). http://service-technology.org/tools/start. Accessed 10 May 2013

  11. Wireshark Foundation. Wireshark version 1.6.3. http://www.wireshark.org

  12. ProM. Process Mining Workbench. http://www.promtools.org

  13. Rozinat, A.: ProM tips - which Mining Algorithm sould you use (2012). http://fluxicon.com/blog/2010/10/prom-tips-mining-algorithm. Accessed 28 April 2013

  14. Wakup, C.: Konzeption und Evaluation eines Verfahrens zur Ermittlung der internen Funktionsweise eines TCP/IP-basierten Kommunikationsprotokollsmit Hilfe von Process-Mining. Bachelorarbeit, FernUniversität in Hagen (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jörg Desel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wakup, C., Desel, J. (2015). Analyzing a TCP/IP-Protocol with Process Mining Techniques. In: Fournier, F., Mendling, J. (eds) Business Process Management Workshops. BPM 2014. Lecture Notes in Business Information Processing, vol 202. Springer, Cham. https://doi.org/10.1007/978-3-319-15895-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15895-2_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15894-5

  • Online ISBN: 978-3-319-15895-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics