Anomaly Detection for Service-Oriented Business Processes Using Conformance Analysis
نویسندگان
چکیده
A significant challenge for organisations is the timely identification of abnormalities or deviations in their process executions. Abnormalities are generally due to missing vital aspects a possession unwanted behaviour execution. Conformance analysis techniques examine synchronisation between recorded logs and learned models, but exploitation event abnormality detection relatively under-explored area mining. In this paper, we proposed novel technique business execution through extension available conformance techniques. Non-traditional used find correlations discrepancies simulated observed logs. Initially, raw log filtered into two variants, successful failed, based upon outcome instances. Successfully executed instances refer an ideal conduct utilised discover optimal model. Later, model as behavioural benchmark classify failed Abnormal compiled grounded on three dimensions conformance, control flow-based alignment, trace-level alignment event-level alignment. For early predictions, introduced notion lifeline presenting impact varying fitness scores during We applied methodology real-world presented several process-specific improvement measures discussion section.
منابع مشابه
Temporal Anomaly Detection in Business Processes
The analysis of business processes is often challenging not only because of intricate dependencies between process activities but also because of various sources of faults within the activities. The automated detection of potential business process anomalies could immensely help business analysts and other process participants detect and understand the causes of process errors. This work focuse...
متن کاملModel Support for Confidential Service-Oriented Business Processes
A core motivation of service-oriented execution of business processes is the opportunity to reduce costs by outsourcing certain tasks to third-party service providers. For legal or economic reasons, it might be undesirable that delicate information (e. g., customer data, trade secrets, or financial details) “leak” to the involved third parties. The absence of such leaks — called noninterference...
متن کاملTool support for Service Oriented Development from Business Processes
The integration of Business Process Management (BPM), Service Oriented Computing (SOC) and Model Driven Development (MDD) paradigms to improve the development of services oriented solutions from business models is nowadays in the spotlight. Organizations wanting to remain competitive despite the constant changes in their business are paying more attention to their business processes and its bas...
متن کاملA service-oriented architecture for financial business processes
Recent years have witnessed a tremendous growth in information and communication technologies that facilitate the design and implementation of complex inter-enterprise business processes. One of the major innovations is the concept of service-oriented architectures which considers software systems as being made up with autonomous, dynamic, loosely coupled and service-based components. This pape...
متن کاملModel-Driven Development of Adaptable Service-Oriented Business Processes
Businesses typically structure their activities with workflows, which are often implemented in a rather static fashion in their IT systems. Nowadays, system requirements change rapidly as businesses try to maintain their competitive edge, calling for similar agility of the IT systems. To this end, we present StPowla, an approach that marries service oriented architecture, policies and workflows...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Algorithms
سال: 2022
ISSN: ['1999-4893']
DOI: https://doi.org/10.3390/a15080257