Matching business process behavior with encoding techniques via meta-learning: An anomaly detection study

نویسندگان

چکیده

Recording anomalous traces in business processes diminishes an event log?s quality. The abnormalities may represent bad execution, security issues, or deviant behavior. Focusing on mitigating this phenomenon, organizations spend efforts to detect their save resources and improve process execution. However, many real-world environments, reference models are unavailable, requiring expert assistance increasing costs. considerable number of techniques reduced availability experts pose additional challenge for particular scenarios. In work, we combine the representational power encoding with a Meta-learning strategy enhance detection logs towards fitting best discriminative capability between common irregular traces. Our approach creates log profile recommends most suitable technique increase anomaly performance. We used eight from different families, 80 descriptors, 168 logs, six types experiments. Results indicate that characteristics influence encodings. Moreover, investigate behavior?s choosing technique, demonstrating traditional mining analysis can be leveraged when matched intelligent decision support approaches.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anomaly Detection in Business Process Runtime Behavior - Challenges and Limitations

Anomaly detection is generally acknowledged as an important problem that has already drawn attention to various domains and research areas, such as, network security. For such “classic” application domains a wide range of surveys and literature reviews exist already – which is not the case for the process domain. Hence, this systematic literature review strives to provide an organized holistic ...

متن کامل

Concept drift detection in business process logs using deep learning

Process mining provides a bridge between process modeling and analysis on the one hand and data mining on the other hand. Process mining aims at discovering, monitoring, and improving real processes by extracting knowledge from event logs. However, as most business processes change over time (e.g. the effects of new legislation, seasonal effects and etc.), traditional process mining techniques ...

متن کامل

Anomaly Detection Algorithms in Business Process Logs

In some domains of application, like software development and health care processes, a normative business process system (e.g. workflow management system) is not appropriate because a flexible support is needed to the participants. On the other hand, while it is important to support flexibility of execution in these domains, security requirements can not be met whether these systems do not offe...

متن کامل

Business process impact visualization and anomaly detection

Received: 25 February 2005 Revised: 29 November 2005 Accepted: 3 January 2006; Online publication date: 10 April 2006 Abstract Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes of complex data. The operational data are instances of the process flow, taking different p...

متن کامل

A Study of Anomaly Intrusion Detection Using Machine Learning Techniques

In the era of information systems and internet there is more concern rising towards information security in daya to day life, along with the availability of the vulnerability assessment mechanisms to identifying the electronic attacks.Anomaly detection is the process of attempting to identify instances of attacks by comparing current activity against the expected actions of intruder. Machine le...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Science and Information Systems

سال: 2023

ISSN: ['1820-0214', '2406-1018']

DOI: https://doi.org/10.2298/csis220110005t