Abstract
In many legacy software systems the communication between client and server is based on proprietary Ethernet protocols. We consider the case that the implementation and specification of such a protocol is unknown and try to reconstruct the rules of the protocol by observation of the network communication. To this end, we translate TCP/IP-logs to appropriate event logs and apply Petri net based process mining techniques. The results of this contribution are a systematic approach to mine client/server protocols, an according tool chain involving existing tools and new tools, and an evaluation of this approach, using a concrete example from practice.
Based on the thesis [14] of the first author, supervised by the second author.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Our study is based on ProM 6.2.
References
van der Aalst, W.M.P.: Service mining: using process mining to discover, check, and improve service behavior. IEEE Trans. Serv. Comput. 6(4), 525–535 (2013)
van der Aalst, W.M.P., van Dongen, B.F.: Discovering Petri nets from event logs (2013). http://wwwis.win.tue.nl/wvdaalst/publications/z2.pdf. Accessed 10 May 2013
van der Aalst, W.M.P.: Process mining manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169–194. Springer, Heidelberg (2012)
van Dongen, B.F., van der Aalst, W.M.P.: A meta model for process mining data. In: EMOI-INTEROP (2005)
Dustdar, S., Gombotz, R.: Discovering web service workflows using web services interaction mining. Int. J. Bus. Process Integr. Manage. 1(4), 256–266 (2006)
Günther, C.W., Verbeek, E.: Xes standard definition (2012). http://www.xes-standard.org/meida/xes/xesstandarddefinition-1.4.pdf. Accessed 26 April 2013
König, H.: Protocol Engineering. Springer, Heidelberg (2012)
Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Dokl. Akad. Nauk SSSR 163(4), 845–848 (1965)
rubecon information technologies GmbH. hd-druckdialog (2013)
Service technology.org (2013). http://service-technology.org/tools/start. Accessed 10 May 2013
Wireshark Foundation. Wireshark version 1.6.3. http://www.wireshark.org
ProM. Process Mining Workbench. http://www.promtools.org
Rozinat, A.: ProM tips - which Mining Algorithm sould you use (2012). http://fluxicon.com/blog/2010/10/prom-tips-mining-algorithm. Accessed 28 April 2013
Wakup, C.: Konzeption und Evaluation eines Verfahrens zur Ermittlung der internen Funktionsweise eines TCP/IP-basierten Kommunikationsprotokollsmit Hilfe von Process-Mining. Bachelorarbeit, FernUniversität in Hagen (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wakup, C., Desel, J. (2015). Analyzing a TCP/IP-Protocol with Process Mining Techniques. In: Fournier, F., Mendling, J. (eds) Business Process Management Workshops. BPM 2014. Lecture Notes in Business Information Processing, vol 202. Springer, Cham. https://doi.org/10.1007/978-3-319-15895-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-15895-2_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15894-5
Online ISBN: 978-3-319-15895-2
eBook Packages: Computer ScienceComputer Science (R0)