Survey and Benchmark of Anomaly Detection in Business Processes

被引:0
作者
Guan, Wei [1 ]
Cao, Jian [1 ]
Zhao, Haiyan [2 ]
Gu, Yang [1 ]
Qian, Shiyou [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] Univ Shanghai Sci & Technol, Shanghai 200093, Peoples R China
基金
美国国家科学基金会;
关键词
Business; Anomaly detection; Surveys; Benchmark testing; Process control; Streams; Process mining; Source coding; Organizations; Measurement; business process; event log quality; process mining; DISCOVERY; PATTERNS;
D O I
10.1109/TKDE.2024.3484159
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Effective management of business processes is crucial for organizational success. However, despite meticulous design and implementation, anomalies are inevitable and can result in inefficiencies, delays, or even significant financial losses. Numerous methods for detecting anomalies in business processes have been proposed recently. However, there is no comprehensive benchmark to evaluate these methods. Consequently, the relative merits of each method remain unclear due to differences in their experimental setup, choice of datasets and evaluation measures. In this paper, we present a systematic literature review and taxonomy of business process anomaly detection methods. Additionally, we select at least one method from each category, resulting in 16 methods that are cross-benchmarked against 32 synthetic logs and 19 real-life logs from different industry domains. Our analysis provides insights into the strengths and weaknesses of different anomaly detection methods. Ultimately, our findings can help researchers and practitioners in the field of process mining make informed decisions when selecting and applying anomaly detection methods to real-life business scenarios. Finally, some future directions are discussed in order to promote the evolution of business process anomaly detection.
引用
收藏
页码:493 / 512
页数:20
相关论文
共 128 条
  • [1] Natural language-based detection of semantic execution anomalies in event logs
    Aa, Han van der
    Rebmann, Adrian
    Leopold, Henrik
    [J]. INFORMATION SYSTEMS, 2021, 102
  • [2] Abdi Herve., 2007, ENCY MEASUREMENT STA, P1
  • [3] Alpaydin E., 2021, Introduction to Machine Learning
  • [4] [Anonymous], 2004, P 2004 C EMP METH NA
  • [5] Armentano Marcelo G., 2015, Database and Expert Systems Applications. 26th International Conference, DEXA 2015. Proceedings: LNCS 9261, P111, DOI 10.1007/978-3-319-22849-5_8
  • [6] Anomaly Detection on Event Logs with a Scarcity of Labels
    Barbon Junior, Sylvio
    Ceravolo, Paolo
    Damiani, Ernesto
    Omori, Nicolas Jashchenko
    Tavares, Gabriel Marques
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
  • [7] An evolving approach to data streams clustering based on typicality and eccentricity data analytics
    Bezerra, Clauber Gomes
    Jales Costa, Bruno Sielly
    Guedes, Luiz Affonso
    Angelov, Plamen Parvanov
    [J]. INFORMATION SCIENCES, 2020, 518 : 13 - 28
  • [8] Algorithms for anomaly detection of traces in logs of process aware information systems
    Bezerra, Fabio
    Wainer, Jacques
    [J]. INFORMATION SYSTEMS, 2012, 38 (01) : 33 - 44
  • [9] Bezerra F, 2009, LECT NOTES BUS INF P, V29, P149
  • [10] Bezerra F, 2008, APPLIED COMPUTING 2008, VOLS 1-3, P951