Sequential Anomaly Detection Techniques in Business Processes

被引:6
|
作者
Linn, Christian [1 ]
Werth, Dirk [1 ]
机构
[1] AWS Inst Digitized Prod & Proc, Saarbrucken, Germany
关键词
Anomaly detection; Business process; Business analytics;
D O I
10.1007/978-3-319-52464-1_18
中图分类号
F [经济];
学科分类号
02 ;
摘要
Many companies use information systems to manage their business processes and thereby collect large amounts of transactional data. The analysis of this data offers the possibility of automated detection of anomalies, i.e. flaws and faults, in the execution of the process. The anomalies can be related not only to the sequence of executed activities but also to other dimensions like the organization or the person performing the respective activity. This paper discusses two approaches of detecting the different anomalies types using basic sequential analysis techniques. Besides the classical one-dimensional approach, a simple approach to use multiple dimensions of the process information in the sequential analysis is discussed and evaluated on a simulated artificial business process.
引用
收藏
页码:196 / 208
页数:13
相关论文
共 50 条
  • [1] Temporal Anomaly Detection in Business Processes
    Rogge-Solti, Andreas
    Kasneci, Gjergji
    [J]. BUSINESS PROCESS MANAGEMENT, BPM 2014, 2014, 8659 : 234 - 249
  • [2] Anomaly and Interestingness Detection in Timed Hierarchical Business Processes
    Zhao, Deng
    Zhou, Zhangbing
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 12619 - 12634
  • [3] Anomaly detection of business processes based on attention mechanism
    Sun, Jinyong
    Zhou, Bowen
    Wen, Lijie
    Xu, Qian
    Deng, Wenwei
    Sun, Zhigang
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (10): : 3039 - 3051
  • [4] Anomaly detection in business processes logs using social network analysis
    Mina Ebrahim
    Seyed Alireza Hashemi Golpayegani
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 127 - 139
  • [5] Anomaly detection in business processes logs using social network analysis
    Ebrahim, Mina
    Golpayegani, Seyed Alireza Hashemi
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 127 - 139
  • [6] An Anomaly Detection Technique for Business Processes based on Extended Dynamic Bayesian Networks
    Pauwels, Stephen
    Calders, Toon
    [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 494 - 501
  • [7] Anomaly Detection for Service-Oriented Business Processes Using Conformance Analysis
    Tariq, Zeeshan
    Charles, Darryl
    McClean, Sally
    McChesney, Ian
    Taylor, Paul
    [J]. ALGORITHMS, 2022, 15 (08)
  • [8] Enhanced Anomaly Detection in Manufacturing Processes Through Hybrid Deep Learning Techniques
    Lee, Kyung Sung
    Kim, Seong Beom
    Kim, Hee-Woong
    [J]. IEEE ACCESS, 2023, 11 : 93368 - 93380
  • [9] Sequential anomaly detection with observation control
    Tsopelakos, Aristomenis
    Fellouris, Georgios
    Veeravalli, Venugopal V.
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2389 - 2393
  • [10] Sequential Feature Explanations for Anomaly Detection
    Siddiqui, Md Amran
    Fern, Alan
    Dietterich, Thomas G.
    Wong, Weng-Keen
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2019, 13 (01)