ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS

被引:0
|
作者
Bezerra, Fabio [1 ]
Wainer, Jacques [1 ]
机构
[1] IC UNICAMP, Sao Paulo, Brazil
关键词
Anomaly Detection; Process Mining; Business Process Systems;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In some domains of application, like software development and health care processes, a non-native business process system (e.g. workflow management system) is not appropriate because a flexible support is needed to the participants. On the other hand, while it is important to support flexibility of execution in these domains, security requirements can not be met whether these systems do not offer extra control, which characterizes a trade off between flexibility and security in such domains. This work presents and assesses a set of anomaly detection algorithms in logs of Process Aware Systems (PAS). The detection of an anomalous instance is based on the "noise" which an instance makes in a process model discovered by a process mining algorithm. As a result, a trace that is an anomaly for a discovered model will require more structural changes for this model fit it than a trace that is not an anomaly. Hence, when aggregated to PAS, these methods can support the coexistence of security and flexibility.
引用
收藏
页码:11 / 18
页数:8
相关论文
共 50 条
  • [41] Discovery of Business Process Models from Incomplete Logs
    Wang, Lili
    Fang, Xianwen
    Shao, Chifeng
    [J]. ELECTRONICS, 2022, 11 (19)
  • [42] Mining Business Process Stages from Event Logs
    Hoang Nguyen
    Dumas, Marlon
    ter Hofstede, Arthur H. M.
    La Rosa, Marcello
    Maggi, Fabrizio Maria
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2017), 2017, 10253 : 577 - 594
  • [43] Mining Business Process Activities from Email Logs
    Jlailaty, Diana
    Grigori, Daniela
    Belhajjame, Khalid
    [J]. 2017 IEEE 1ST INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (ICCC 2017), 2017, : 112 - 119
  • [44] Large Scale Anomaly Detection in Data Center Logs and Metrics
    Martinez-Alvarez, Rafael P.
    Giraldo-Rodriguez, Carlos
    Chaves-Dieguez, David
    [J]. ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
  • [45] Anomaly Detection Using System Logs: A Deep Learning Approach
    Sinha, Rohit
    Sur, Rittika
    Sharma, Ruchi
    Shrivastava, Avinash K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [46] SwissLog: Robust Anomaly Detection and Localization for Interleaved Unstructured Logs
    Li, Xiaoyun
    Chen, Pengfei
    Jing, Linxiao
    He, Zilong
    Yu, Guangba
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 2762 - 2780
  • [47] ConAnomaly: Content-Based Anomaly Detection for System Logs
    Lv, Dan
    Luktarhan, Nurbol
    Chen, Yiyong
    [J]. SENSORS, 2021, 21 (18)
  • [48] How to Configure Masked Event Anomaly Detection on Software Logs?
    Nyyssola, Jesse
    Mantyla, Mika
    Varela, Martin
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 414 - 418
  • [49] Memetic Algorithms for Mining Change Logs in Process Choreographies
    Fdhila, Walid
    Rinderle-Ma, Stefanie
    Indiono, Conrad
    [J]. SERVICE-ORIENTED COMPUTING, ICSOC 2014, 2014, 8831 : 47 - 62
  • [50] Anomaly Detection on System Generated Logs-A Survey Study
    Jose, Jisha M.
    Reeja, S. R.
    [J]. MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 779 - 793