Anomaly detection algorithm for business process control flow based on event log: Status and evaluation

被引:0
|
作者
Fu, Jianping [1 ]
Zhao, Haiyan [1 ]
Cao, Jian [2 ]
Chen, Qingkui [1 ]
机构
[1] School of Optoelectronic Information and Computer Engineering, University of Shanghai for Science and Technology, Shanghai,200093, China
[2] School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai,200030, China
来源
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | 2024年 / 30卷 / 08期
关键词
D O I
10.13196/j.cims.2023.BPM01
中图分类号
学科分类号
摘要
引用
收藏
页码:2631 / 2643
相关论文
共 50 条
  • [31] Robust Log-Based Anomaly Detection on Unstable Log Data
    Zhang, Xu
    Xu, Yong
    Lin, Qingwei
    Qiao, Bo
    Zhang, Hongyu
    Dang, Yingnong
    Xie, Chunyu
    Yang, Xinsheng
    Cheng, Qian
    Li, Ze
    Chen, Junjie
    He, Xiaoting
    Yao, Randolph
    Lou, Jian-Guang
    Chintalapati, Murali
    Shen, Furao
    Zhang, Dongmei
    ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 807 - 817
  • [32] An Intelligent Framework for Log Anomaly Detection Based on Log Template Extraction
    Pan, Lei
    Zhu, Huichang
    JOURNAL OF CASES ON INFORMATION TECHNOLOGY, 2023, 25 (01)
  • [33] LogRank: An Approach to Sample Business Process Event Log for Efficient Discovery
    Liu, Cong
    Pei, Yulong
    Zeng, Qingtian
    Duan, Hua
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2018), PT I, 2018, 11061 : 415 - 425
  • [34] Log Delta Analysis: Interpretable Differencing of Business Process Event Logs
    van Beest, Nick R. T. P.
    Dumas, Marlon
    Garcia-Banuelos, Luciano
    La Rosa, Marcello
    BUSINESS PROCESS MANAGEMENT, BPM 2015, 2015, 9253 : 386 - 405
  • [35] LogRank++: An efficient business process event log sampling approach
    Liu, Cong
    Zhang, Shuaipeng
    Li, Huiling
    He, Hua
    Zeng, Qingtian
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2024, 30 (02): : 623 - 634
  • [36] Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems
    Skopik, Florian
    Wurzenberger, Markus
    Hoeld, Georg
    Landauer, Max
    Kuhn, Walter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3158 - 3175
  • [37] An Anomaly Detection Ensemble Algorithm for Power Dispatching Data Based on Log-interval Isolation
    Wang F.
    Gao X.
    Jia X.
    Ren B.
    Zha S.
    Dianwang Jishu/Power System Technology, 2021, 45 (12): : 4818 - 4827
  • [38] Data-Driven Anomaly Detection and Event Log Profiling of SCADA Alarms
    Andrade, J.R.
    Rocha, C.
    Silva, R.
    Viana, J.P.
    Bessa, Ricardo J.
    Gouveia, C.
    Almeida, B.
    Santos, R.J.
    Louro, M.
    Santos, P.M.
    Ribeiro, A.F.
    IEEE Access, 2022, 10 : 73758 - 73773
  • [39] Data-Driven Anomaly Detection and Event Log Profiling of SCADA Alarms
    Andrade, J. R.
    Rocha, C.
    Silva, R.
    Viana, J. P.
    Bessa, Ricardo J.
    Gouveia, C.
    Almeida, B.
    Santos, R. J.
    Louro, M.
    Santos, P. M.
    Ribeiro, A. F.
    IEEE ACCESS, 2022, 10 : 73758 - 73773
  • [40] Review on Log-Based Anomaly Detection Techniques
    Raut, Pooja
    Mishra, Akanksha
    Rao, Shreya
    Kawoor, Saloni
    Shelke, Sushila
    Deore, Mahendra
    Kumar, Vivek
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 893 - 906