Matching business process behavior with encoding techniques via meta-learning: An anomaly detection study
نویسندگان
چکیده
Recording anomalous traces in business processes diminishes an event log?s quality. The abnormalities may represent bad execution, security issues, or deviant behavior. Focusing on mitigating this phenomenon, organizations spend efforts to detect their save resources and improve process execution. However, many real-world environments, reference models are unavailable, requiring expert assistance increasing costs. considerable number of techniques reduced availability experts pose additional challenge for particular scenarios. In work, we combine the representational power encoding with a Meta-learning strategy enhance detection logs towards fitting best discriminative capability between common irregular traces. Our approach creates log profile recommends most suitable technique increase anomaly performance. We used eight from different families, 80 descriptors, 168 logs, six types experiments. Results indicate that characteristics influence encodings. Moreover, investigate behavior?s choosing technique, demonstrating traditional mining analysis can be leveraged when matched intelligent decision support approaches.
منابع مشابه
Anomaly Detection in Business Process Runtime Behavior - Challenges and Limitations
Anomaly detection is generally acknowledged as an important problem that has already drawn attention to various domains and research areas, such as, network security. For such “classic” application domains a wide range of surveys and literature reviews exist already – which is not the case for the process domain. Hence, this systematic literature review strives to provide an organized holistic ...
متن کاملConcept drift detection in business process logs using deep learning
Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...
متن کاملAnomaly Detection Algorithms in Business Process Logs
In some domains of application, like software development and health care processes, a normative business process system (e.g. workflow management system) is not appropriate because a flexible support is needed to the participants. On the other hand, while it is important to support flexibility of execution in these domains, security requirements can not be met whether these systems do not offe...
متن کاملBusiness process impact visualization and anomaly detection
Received: 25 February 2005 Revised: 29 November 2005 Accepted: 3 January 2006; Online publication date: 10 April 2006 Abstract Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes of complex data. The operational data are instances of the process flow, taking different p...
متن کاملA Study of Anomaly Intrusion Detection Using Machine Learning Techniques
In the era of information systems and internet there is more concern rising towards information security in daya to day life, along with the availability of the vulnerability assessment mechanisms to identifying the electronic attacks.Anomaly detection is the process of attempting to identify instances of attacks by comparing current activity against the expected actions of intruder. Machine le...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Systems
سال: 2023
ISSN: ['1820-0214', '2406-1018']
DOI: https://doi.org/10.2298/csis220110005t