Discovering Signature Patterns from Event Logs

被引:0
|
作者
Bose, R. P. Jagadeesh Chandra [1 ]
van der Aalst, Wil M. P. [1 ]
机构
[1] Eindhoven Univ Technol, NL-5600 MB Eindhoven, Netherlands
关键词
Process Mining; Signature Patterns; Event Log; Discriminatory Patterns; ALARM CORRELATION; FRAUD;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
More and more information about processes is recorded in the form of so-called "event logs". High-tech systems such as X-ray machines and high-end copiers provide their manufacturers and services organizations with detailed event data. Larger organizations record relevant business events for process improvement, auditing, and fraud detection. Traces in such event logs can be classified as desirable or undesirable (e. g., faulty or fraudulent behavior). In this paper, we present a comprehensive framework for discovering signatures that can be used to explain or predict the class of seen or unseen traces. These signatures are characteristic patterns that can be used to discriminate between desirable and undesirable behavior. As shown, these patterns can, for example, be used to predict remotely whether a particular component in an X-ray machine is broken or not. Moreover, the signatures also help to improve systems and organizational processes. Our framework for signature discovery is fully implemented in ProM and supports class labeling, feature extraction and selection, pattern discovery, pattern evaluation and cross-validation, reporting, and visualization. A real-life case study is used to demonstrate the applicability and scalability of the approach.
引用
收藏
页码:111 / 118
页数:8
相关论文
共 50 条
  • [1] Discovering work prioritisation patterns from event logs
    Suriadi, Suriadi
    Wynn, Moe T.
    Xu, Jingxin
    van der Aalst, Wil M. P.
    ter Hofstede, Arthur H. M.
    [J]. DECISION SUPPORT SYSTEMS, 2017, 100 : 77 - 92
  • [2] Discovering and Analyzing Contextual Behavioral Patterns From Event Logs
    Acheli, Mehdi
    Grigori, Daniela
    Weidlich, Matthias
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (12) : 5708 - 5721
  • [3] Discovering anomalous frequent patterns from partially ordered event logs
    Genga, Laura
    Alizadeh, Mahdi
    Potena, Domenico
    Diamantini, Claudia
    Zannone, Nicola
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2018, 51 (02) : 257 - 300
  • [4] Discovering anomalous frequent patterns from partially ordered event logs
    Laura Genga
    Mahdi Alizadeh
    Domenico Potena
    Claudia Diamantini
    Nicola Zannone
    [J]. Journal of Intelligent Information Systems, 2018, 51 : 257 - 300
  • [5] On Systematic Approach to Discovering Periodic Patterns in Event Logs
    Zimniak, Marcin
    Getta, Janusz R.
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2016, PT I, 2016, 9875 : 249 - 259
  • [6] Discovering Decision Models from Event Logs
    Bazhenova, Ekaterina
    Buelow, Susanne
    Weske, Mathias
    [J]. BUSINESS INFORMATION SYSTEMS (BIS 2016), 2016, 255 : 237 - 251
  • [7] Discovering Data Models from Event Logs
    Bano, Dorina
    Weske, Mathias
    [J]. CONCEPTUAL MODELING, ER 2020, 2020, 12400 : 62 - 76
  • [8] Discovering social networks from event logs
    Van Der Aalst W.M.P.
    Reijers H.A.
    Song M.
    [J]. Computer Supported Cooperative Work (CSCW), 2005, 14 (6): : 549 - 593
  • [9] Discovering Unseen Behaviour from Event Logs
    Cervantes, Abel Armas
    Taymouri, Farbod
    [J]. APPLICATION AND THEORY OF PETRI NETS AND CONCURRENCY (PETRI NETS 2022), 2022, 13288 : 23 - 42
  • [10] Discovering Business Process Architectures from Event Logs
    Bano, Dorina
    Nikaj, Adriatik
    Weske, Mathias
    [J]. BUSINESS PROCESS MANAGEMENT FORUM (BPM 2021), 2021, 427 : 162 - 177