ABSTRACT
Identifying fraudulent or anomalous business procedures is today a key challenge for organisations of any dimension. Nevertheless, the continuous nature of business conveys to the continuous acquisition of data in support of business process monitoring. In light of this, we propose a method for online anomaly detection in business processes. From a stream of events, our approach extract cases descriptors and applies a density-based clustering technique to detect outliers. We applied our method to a real-life dataset, and we used streaming clustering measures for evaluating performances. In particular, we obtained Cluster Mapping Measure of 95.3% and Homogeneity of 98.1% discovering anomalous cases in real-time.
- S. Barbon, G. M. Tavares, V. G. T. da Costa, P. Ceravolo, and E. Damiani. A framework for human-in-the-loop monitoring of concept-drift detection in event log stream. In WWW '18 Companion: The 2018 Web Conference Companion, April 23-27, 2018, Lyon, France. ACM, 2018. Google ScholarDigital Library
- T. Becker and W. Intoyoad. Context aware process mining in logistics. Procedia CIRP, 63:557--562, 2017. Manufacturing Systems 4.0 -- Proceedings of the 50th CIRP Conference on Manufacturing Systems.Google ScholarCross Ref
- A. Bifet, G. Holmes, R. Kirkby, and B. Pfahringer. Moa: Massive online analysis. Journal of Machine Learning Research, 11(May):1601--1604, 2010. Google ScholarDigital Library
- K. Böhmer and S. Rinderle-Ma. Anomaly detection in business process runtime behavior--challenges and limitations. arXiv preprint arXiv:1705.06659, 2017.Google Scholar
- R. J. C. Bose and W. M. van der Aalst. Trace alignment in process mining: Opportunities for process diagnostics. In BPM, volume 6336, pages 227--242. Springer, 2010. Google ScholarDigital Library
- F. Cao, M. Estert, W. Qian, and A. Zhou. Density-based clustering over an evolving data stream with noise. In Proceedings of the 2006 SIAM international conference on data mining, pages 328--339. SIAM, 2006.Google ScholarCross Ref
- J. Carmona and J. Cortadella. Process mining meets abstract interpretation. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pages 184--199. Springer, 2010. Google ScholarDigital Library
- P. Ceravolo, E. Damiani, M. Torabi, and S. Barbon. Toward a New Generation of Log Pre-processing Methods for Process Mining, pages 55--70. Springer International Publishing, Cham, 2017.Google Scholar
- P. Domingos and G. Hulten. Mining high-speed data streams. In Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 71--80. ACM, 2000. Google ScholarDigital Library
- M. Ester, H.-P. Kriegel, J. Sander, and X. Xu. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD'96, pages 226--231. AAAI Press, 1996. Google ScholarDigital Library
- M. Frigge, D. C. Hoaglin, and B. Iglewicz. Some implementations of the boxplot. The American Statistician, 43(1):50--54, 1989.Google Scholar
- G. L. Gray and R. S. Debreceny. A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits. International Journal of Accounting Information Systems, 15(4):357--380, 2014.Google ScholarCross Ref
- M. Jans, J. M. van der Werf, N. Lybaert, and K. Vanhoof. A business process mining application for internal transaction fraud mitigation. Expert Systems with Applications, 38(10):13351--13359, 2011. Google ScholarDigital Library
- L. Juhaňák, J. Zounek, and L. Rohlíková. Using process mining to analyze students' quiz-taking behavior patterns in a learning management system. Computers in Human Behavior, 2017.Google Scholar
- T. Kilpeläinen and P. Tyrväinen. The degree of digitalization of the information over-flow: A case study. In ICEIS 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004, pages 367--374, 2004.Google Scholar
- H. Kremer, P. Kranen, T. Jansen, T. Seidl, A. Bifet, G. Holmes, and B. Pfahringer. An effective evaluation measure for clustering on evolving data streams. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 868--876. ACM, 2011. Google ScholarDigital Library
- S. J. J. Leemans, D. Fahland, and W. M. P. van der Aalst. Discovering block-structured process models from event logs containing infrequent behaviour. In N. Lohmann, M. Song, and P. Wohed, editors, Business Process Management Workshops, pages 66--78, Cham, 2014. Springer International Publishing.Google ScholarCross Ref
- L. Lévesque. Nyquist sampling theorem: understanding the illusion of a spinning wheel captured with a video camera. Physics Education, 49(6):697--705, 2014.Google ScholarCross Ref
- T. Murata. Petri nets: Properties, analysis and applications. Proceedings of the IEEE, 77(4):541--580, Apr 1989.Google ScholarCross Ref
- E. Ngai, Y. Hu, Y. Wong, Y. Chen, and X. Sun. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3):559--569, 2011. Google ScholarDigital Library
- W. Reisig. Petri Nets: An Introduction, volume 4 of EATCS Monographs on Theoretical Computer Science. Springer, 1985. Google ScholarDigital Library
- A. Rosenberg and J. Hirschberg. V-measure: A conditional entropy-based external cluster evaluation measure. In EMNLP-CoNLL, volume 7, pages 410--420, 2007.Google Scholar
- W. M. P. van der Aalst. Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer Publishing Company, Incorporated, 1st edition, 2011. Google ScholarCross Ref
- R. A. Wagner and M. J. Fischer. The string-to-string correction problem. J. ACM, 21(1):168--173, Jan. 1974. Google ScholarDigital Library
- J. Wang, R. K. Wong, J. Ding, Q. Guo, and L. Wen. On recommendation of process mining algorithms. In Web Services (ICWS), 2012 IEEE 19th International Conference on, pages 311--318. IEEE, 2012. Google ScholarDigital Library
- J. West and M. Bhattacharya. Intelligent financial fraud detection: a comprehensive review. Computers & Security, 57:47--66, 2016. Google ScholarDigital Library
- I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2016. Google ScholarDigital Library
- W.-S. Yang and S.-Y. Hwang. A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications, 31(1):56--68, 2006.Google ScholarCross Ref
Index Terms
- Anomaly Detection in Business Process based on Data Stream Mining
Recommendations
Process Mining: Overview and Opportunities
Over the last decade, process mining emerged as a new research field that focuses on the analysis of processes using event data. Classical data mining techniques such as classification, clustering, regression, association rule learning, and sequence/...
Process mining: a research agenda
Special issue: Process/workflow miningEnterprise information systems support and control operational business processes ranging from simple internal back-office process to complex interorganizational processes. Technologies such as workflow management (WFM), enterprise, application ...
Business process mining: An industrial application
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover process, control, data, organizational, and social structures. Although ...
Comments