A Systematic Review of Anomaly Detection for Business Process Event Logs

被引:0
|
作者
Jonghyeon Ko
Marco Comuzzi
机构
[1] Free University of Bozen-Bolzano,Faculty of Computer Science
[2] Ulsan National Institute of Science and Technology,Department of Industrial Engineering
关键词
Anomaly detection; Event log quality; Business process; Process data;
D O I
暂无
中图分类号
学科分类号
摘要
While a business process is most often executed following a normal path, anomalies may sometimes arise and can be captured in event logs. Event log anomalies stem, for instance, from system malfunctioning or unexpected behavior of human resources involved in a process. To identify and possibly fix these, anomaly detection has emerged recently as a key discipline in process mining. In the paper, the authors present a systematic review of the literature on business process event log anomaly detection. The review aims at selecting systematically studies in the literature that have tackled the issue of event log anomaly detection, classifying existing approaches based on criteria emerging from previous literature reviews, and identifying those research directions in this field that have not been explored extensively. Based on the results of the review, the authors argue that future research should look more specifically into anomaly detection on event streams, extending the number of event log attributes considered to determine anomalies, and producing more standard labeled datasets to benchmark the techniques proposed.
引用
收藏
页码:441 / 462
页数:21
相关论文
共 50 条
  • [11] Anomaly Detection Algorithms in Logs of Process Aware Systems
    Bezerra, Fabio
    Wainer, Jacques
    [J]. APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 951 - 952
  • [12] Discovering Structural Errors From Business Process Event Logs
    Song, Wei
    Chang, Zhen
    Jacobsen, Hans-Arno
    Zhang, Pengcheng
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (11) : 5293 - 5306
  • [13] Explanation of Anomalies in Business Process Event Logs with Linguistic Summaries
    Chouhan, Sudhanshu
    Wilbik, Anna
    Dijkman, Remco
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2022,
  • [14] FARE: Schema-Agnostic Anomaly Detection in Social Event Logs
    Shah, Neil
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2019), 2019, : 337 - 350
  • [15] Converting Unstructured System Logs into Structured Event List for Anomaly Detection
    Li, Zongze
    Davidson, Matthew
    Fu, Song
    Blanchard, Sean
    Lang, Michael
    [J]. 13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [16] Anomaly detection in business processes logs using social network analysis
    Mina Ebrahim
    Seyed Alireza Hashemi Golpayegani
    [J]. Journal of Computer Virology and Hacking Techniques, 2022, 18 : 127 - 139
  • [17] Anomaly detection in business processes logs using social network analysis
    Ebrahim, Mina
    Golpayegani, Seyed Alireza Hashemi
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 127 - 139
  • [18] Fraud Detection on Event Logs of Goods and Services Procurement Business Process Using Heuristics Miner Algorithm
    Rahmawati, Dewi
    Yaqin, Muhammad Ainul
    Sarno, Riyanarto
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND SYSTEMS (ICTS), 2016, : 249 - 254
  • [19] From event logs to goals: a systematic literature review of goal-oriented process mining
    Ghasemi, Mahdi
    Amyot, Daniel
    [J]. REQUIREMENTS ENGINEERING, 2020, 25 (01) : 67 - 93
  • [20] Log Delta Analysis: Interpretable Differencing of Business Process Event Logs
    van Beest, Nick R. T. P.
    Dumas, Marlon
    Garcia-Banuelos, Luciano
    La Rosa, Marcello
    [J]. BUSINESS PROCESS MANAGEMENT, BPM 2015, 2015, 9253 : 386 - 405