Detecting Anomalies in Hybrid Business Process Logs

被引:10
|
作者
Pauwels, Stephen [1 ]
Calders, Toon [2 ]
机构
[1] Univ Antwerp, Comp Sci, Middelheimlaan 1, Antwerp, Belgium
[2] Univ Antwerp, Middelheimlaan 1, Antwerp, Belgium
来源
APPLIED COMPUTING REVIEW | 2019年 / 19卷 / 02期
关键词
Anomaly Detection; Probabilistic models; Event log and Workflow data;
D O I
10.1145/3357385.3357387
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Checking and analyzing various executions of different Business Processes can be a tedious task as the logs from these executions may contain lots of events, each with a (possibly large) number of both numerical and categorical attributes. We developed a way to automatically model the behavior captured in log files with dozens of these attributes. The advantage of our method is that we do not need any prior knowledge about the data or the attributes. We introduce a new algorithm that is able to learn a model of a log file starting from the data itself. The learned model can then be used to detect anomalous executions in the data. To achieve this we extend Dynamic Bayesian Networks with numerical attributes and functional dependencies to better model the normal behavior found in log files. The model is capable of scoring events and cases, even when previously unseen values or new combinations of values appear in the log file. An important benefit of our model is the ability to give a decomposition of the score that indicates the root cause of the anomalies. We also conducted a comparison with other state-of-the-art algorithms for detecting anomalies in Business Processes which shows that our approach outperforms other algorithms.
引用
收藏
页码:18 / 30
页数:13
相关论文
共 50 条
  • [1] Detecting anomalies in business process event logs using statistical leverage
    Ko, Jonghyeon
    Comuzzi, Marco
    [J]. INFORMATION SCIENCES, 2021, 549 : 53 - 67
  • [2] Detecting anomalies in business process event logs using statistical leverage
    Ko, Jonghyeon
    Comuzzi, Marco
    [J]. Information Sciences, 2021, 549 : 53 - 67
  • [3] Explanation of Anomalies in Business Process Event Logs with Linguistic Summaries
    Chouhan, Sudhanshu
    Wilbik, Anna
    Dijkman, Remco
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2022,
  • [4] Detecting artifact anomalies in business process specifications with a formal model
    Wang, Ching-Huey
    Wang, Feng-Jian
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (10) : 1600 - 1619
  • [5] Verifying Compliance for Business Process Logs with a Hybrid Logic Model Checker
    Letia, Ioan Alfred
    Goron, Anca
    [J]. COMBINATIONS OF INTELLIGENT METHODS AND APPLICATIONS (CIMA 2014), 2016, 46 : 61 - 78
  • [6] Detecting Data-model-oriented Anomalies in Parallel Business Process
    Yin, Ning
    Wang, Shanshan
    Li, Hongyan
    Fan, Lilue
    [J]. WEB-AGE INFORMATION MANAGEMENT, PT II, 2016, 9659 : 65 - 77
  • [7] Detecting Anomalies in System Logs With a Compact Convolutional Transformer
    Larisch, Rene
    Vitay, Julien
    Hamker, Fred H.
    [J]. IEEE ACCESS, 2023, 11 : 113464 - 113479
  • [8] Detecting Anomalies in Firewall Logs using Artificially Generated Attacks
    Komadina, Adrian
    Kovacevic, Ivan
    Stengl, Bruno
    Gros, Stjepan
    [J]. 2023 17TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS, CONTEL, 2023,
  • [9] The Sub-Sequence Summary Method for Detecting Anomalies in Logs
    Horvath, Gabor
    Kadar, Attila
    Szilagyi, Peter
    [J]. IEEE ACCESS, 2023, 11 : 37412 - 37423
  • [10] SiaLog: detecting anomalies in software execution logs using the siamese network
    Shayan Hashemi
    Mika Mäntylä
    [J]. Automated Software Engineering, 2022, 29