Survey and Benchmark of Anomaly Detection in Business Processes

被引:0
|
作者
Guan, Wei [1 ]
Cao, Jian [1 ]
Zhao, Haiyan [2 ]
Gu, Yang [1 ]
Qian, Shiyou [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Univ Shanghai Sci & Technol, Shanghai 200093, Peoples R China
基金
美国国家科学基金会;
关键词
Business; Anomaly detection; Surveys; Benchmark testing; Process control; Streams; Process mining; Source coding; Organizations; Measurement; business process; event log quality; process mining; DISCOVERY; PATTERNS;
D O I
10.1109/TKDE.2024.3484159
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Effective management of business processes is crucial for organizational success. However, despite meticulous design and implementation, anomalies are inevitable and can result in inefficiencies, delays, or even significant financial losses. Numerous methods for detecting anomalies in business processes have been proposed recently. However, there is no comprehensive benchmark to evaluate these methods. Consequently, the relative merits of each method remain unclear due to differences in their experimental setup, choice of datasets and evaluation measures. In this paper, we present a systematic literature review and taxonomy of business process anomaly detection methods. Additionally, we select at least one method from each category, resulting in 16 methods that are cross-benchmarked against 32 synthetic logs and 19 real-life logs from different industry domains. Our analysis provides insights into the strengths and weaknesses of different anomaly detection methods. Ultimately, our findings can help researchers and practitioners in the field of process mining make informed decisions when selecting and applying anomaly detection methods to real-life business scenarios. Finally, some future directions are discussed in order to promote the evolution of business process anomaly detection.
引用
收藏
页码:493 / 512
页数:20
相关论文
共 50 条
  • [1] Temporal Anomaly Detection in Business Processes
    Rogge-Solti, Andreas
    Kasneci, Gjergji
    BUSINESS PROCESS MANAGEMENT, BPM 2014, 2014, 8659 : 234 - 249
  • [2] Sequential Anomaly Detection Techniques in Business Processes
    Linn, Christian
    Werth, Dirk
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2016, 2017, 263 : 196 - 208
  • [3] Anomaly and Interestingness Detection in Timed Hierarchical Business Processes
    Zhao, Deng
    Zhou, Zhangbing
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 12619 - 12634
  • [4] Anomaly detection of business processes based on attention mechanism
    Sun, Jinyong
    Zhou, Bowen
    Wen, Lijie
    Xu, Qian
    Deng, Wenwei
    Sun, Zhigang
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (10): : 3039 - 3051
  • [5] ADBench: Anomaly Detection Benchmark
    Han, Songqiao
    Hu, Xiyang
    Huang, Hailiang
    Jiang, Minqi
    Zhao, Yue
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,
  • [6] Functional anomaly detection: a benchmark study
    Staerman, Guillaume
    Adjakossa, Eric
    Mozharovskyi, Pavlo
    Hofer, Vera
    Sen Gupta, Jayant
    Clemencon, Stephan
    INTERNATIONAL JOURNAL OF DATA SCIENCE AND ANALYTICS, 2023, 16 (01) : 101 - 117
  • [7] Functional anomaly detection: a benchmark study
    Guillaume Staerman
    Eric Adjakossa
    Pavlo Mozharovskyi
    Vera Hofer
    Jayant Sen Gupta
    Stephan Clémençon
    International Journal of Data Science and Analytics, 2023, 16 : 101 - 117
  • [8] Anomaly detection in business processes logs using social network analysis
    Mina Ebrahim
    Seyed Alireza Hashemi Golpayegani
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 127 - 139
  • [9] Anomaly detection in business processes logs using social network analysis
    Ebrahim, Mina
    Golpayegani, Seyed Alireza Hashemi
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 127 - 139
  • [10] Anomaly Detection: A Survey
    Chandola, Varun
    Banerjee, Arindam
    Kumar, Vipin
    ACM COMPUTING SURVEYS, 2009, 41 (03)