Segregate Malicious Behavior and Profit Maximization In Cross Organisational Business Process-As-A-Service (COBPAAS) Event Logs (original) (raw)
As of late, web based shopping incorporating third-party payment platforms (TPPs) acquaints new security challenges due with complex communications between Application Programming Interfaces (APIs) of Merchants and TPPs. Malicious users may misuse security vulnerabilities by calling APIs in a subjective request or assuming different roles. To manage the security issue in the beginning times of framework improvement, this paper introduces a formal strategy for displaying and check of web based shopping business forms with malicious behavior patterns method considered in light of Petri nets. We propose a formal model called E-commerce Business Process Net to display a typical internet shopping business process that speak to expected capacities, and malicious behavior patterns representing to a potential attack that violates the security goals at the requirement examination stage. We build up an organized procedure that applies formal strategies while coordinating users through determining value-based prerequisites and choosing configurable highlights. The Binary Decision Diagram (BDD) analysis is then used to confirm that chose configurable features don't damage any limitations. At last, demonstrate checking is connected to confirm the arranged administration against the transactional requirement set we analyze whether a web based shopping business process is impervious to the known malicious behavior patterns. Process mining goes for transforming such event data into significant, noteworthy knowledge, so process execution or consistence issues can be recognized and rectified. Diverse process mining systems are accessible. These incorporate methods for mechanized process disclosure, conformance checking, execution mining and process variation analysis.
Sign up for access to the world's latest research.
checkGet notified about relevant papers
checkSave papers to use in your research
checkJoin the discussion with peers
checkTrack your impact
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.