Anomaly detection algorithm for business process control flow based on event log: Status and evaluation

被引:0
|
作者
Fu, Jianping [1 ]
Zhao, Haiyan [1 ]
Cao, Jian [2 ]
Chen, Qingkui [1 ]
机构
[1] School of Optoelectronic Information and Computer Engineering, University of Shanghai for Science and Technology, Shanghai,200093, China
[2] School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai,200030, China
来源
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | 2024年 / 30卷 / 08期
关键词
D O I
10.13196/j.cims.2023.BPM01
中图分类号
学科分类号
摘要
引用
收藏
页码:2631 / 2643
相关论文
共 50 条
  • [41] Behavioral Anomaly Detection Approach Based on Log Monitoring
    Du, Sizhong
    Cao, Jian
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC, SOCIO-CULTURAL COMPUTING (BESC), 2015, : 188 - 194
  • [42] A MODEL FOR WEBSITE ANOMALY DETECTION BASED ON LOG ANALYSIS
    Han, Xu
    Lv, Tao
    Wei, Lin
    Wu, Yanyan
    Liu, Jianyi
    Wang, Cong
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 604 - 608
  • [43] Performance Evaluation of Anomaly Detection in Imbalanced System Log Data
    Studiawan, Hudan
    Sohel, Ferdous
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 239 - 246
  • [44] Network Log Anomaly Detection Based on GRU and SVDD
    Liu, Shirong
    Chen, Xiong
    Peng, Xingxiong
    Xiao, Ruliang
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 1244 - 1249
  • [45] Ensemble Methods for Anomaly Detection Based on System Log
    Xia, Xuze
    Zhang, Wei
    Jiang, Jianhui
    2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019), 2019, : 93 - 94
  • [46] Control-flow anomaly detection by process mining-based feature extraction and dimensionality reduction
    Vitale, Francesco
    Pegoraro, Marco
    van der Aalst, Wil M. P.
    Mazzocca, Nicola
    KNOWLEDGE-BASED SYSTEMS, 2025, 310
  • [47] Anomaly detection on software log based on Temporal Memory
    Hirakawa, Rin
    Uchida, Hironori
    Nakano, Asato
    Tominaga, Keitaro
    Nakatoh, Yoshihisa
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 95
  • [48] A Practice-Oriented, Control-Flow-Based Anomaly Detection Approach for Internal Process Audits
    Schumann, Gerrit
    Kruse, Felix
    Nonnenmacher, Jakob
    SERVICE-ORIENTED COMPUTING (ICSOC 2020), 2020, 12571 : 533 - 543
  • [49] Multi Instance Anomaly Detection in Business Process Executions
    Boehmer, Kristof
    Rinderle-Ma, Stefanie
    BUSINESS PROCESS MANAGEMENT, BPM 2017, 2017, 10445 : 77 - 93
  • [50] Process next event prediction method based on event log sampling
    Dong, Lele
    Liu, Cong
    Zhang, Shuaipeng
    Ni, Weijian
    Ren, Chongguang
    Zeng, Qingtian
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2024, 30 (10): : 3621 - 3632