PMiner: Process Mining using Deep Autoencoder for Anomaly Detection and Reconstruction of Business Processes

被引:0
作者
Chinnaiah, Veluru [1 ]
Veerabhadram, Vadlamani [2 ]
Aavula, Ravi [3 ]
Aluvala, Srinivas [4 ]
机构
[1] Vijaya Engn Coll, Dept CSE, Khammam, Telangana, India
[2] CVR Coll Engn, Dept CSE, Hyderabad, Telangana, India
[3] Anurag Univ, Dept CSE DS, Hyderabad, India
[4] SR Univ, Dept Comp Sci & Artificial Intelligence, Warangal, India
关键词
Process Mining; Artificial Intelligence; Deep Autoencoder; Long Short Term Memory; Deep Learning;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We proposed a deep learning-based process mining framework known as PMiner for automatic detection of anomalies in business processes. Since there are thousands of business processes in real-time applications such as e-commerce, in the presence of concurrency, they are prone to exhibit anomalies. Such anomalies if not detected and rectified, cause severe damage to businesses in the long run. Our Artificial Intelligence (AI) enabled framework PMiner takes business process event longs as input and detects anomalies using a deep autoencoder. The framework exploits a deep autoencoder technique which is well-known for Its ability to discriminate anomalies. We proposed an algorithm known as Intelligent Business Process Anomaly Detector (IBPAD) to realize the framework. This algorithm learns from historical data and performs encoding and decoding procedures to detect business process anomalies automatically. Our empirical results using the BPI Challenge dataset, released by the IEEE Task Force on Process Mining, revealed that PMiner outperforms state-of-the-art methods in detecting business process anomalies. This framework helps businesses to identify process anomalies and rectify them in time to leverage business continuity prospects.
引用
收藏
页码:531 / 542
页数:12
相关论文
共 32 条
  • [1] Abhijit G., 2020, International Journal of Automation and Computing, V18, P1
  • [2] act2vec, trace2vec, log2vec, and model2vec: Representation Learning for Business Processes
    De Koninck, Pieter
    vanden Broucke, Seppe
    De Weerdt, Jochen
    [J]. BUSINESS PROCESS MANAGEMENT (BPM 2018), 2018, 11080 : 305 - 321
  • [3] Deep reinforcement learning for data-efficient weakly supervised business process anomaly detection
    Elaziz, Eman Abd
    Fathalla, Radwa
    Shaheen, Mohamed
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [4] A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks
    Fernandez Maimo, Lorenzo
    Perales Gomez, Angel Luis
    Garcia Clemente, Felix J.
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    [J]. IEEE ACCESS, 2018, 6 : 7700 - 7712
  • [5] Process Mining for Individualized Behavior Modeling Using Wireless Tracking in Nursing Homes
    Fernandez-Llatas, Carlos
    Benedi, Jose-Miguel
    Garcia-Gomez, Juan M.
    Traver, Vicente
    [J]. SENSORS, 2013, 13 (11) : 15434 - 15451
  • [6] AI-Empowered Process Mining for Complex Application Scenarios: Survey and Discussion
    Folino, Francesco
    Pontieri, Luigi
    [J]. JOURNAL ON DATA SEMANTICS, 2021, 10 (1-2) : 77 - 106
  • [7] A multi-perspective approach for the analysis of complex business processes behavior
    Guzzo, Antonella
    Joaristi, Mikel
    Rullo, Antonino
    Serra, Edoardo
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 177
  • [8] A Graph-Based Approach to Interpreting Recurrent Neural Networks in Process Mining
    Hanga, Khadijah Muzzammil
    Kovalchuk, Yevgeniya
    Gaber, Mohamed Medhat
    [J]. IEEE ACCESS, 2020, 8 : 172923 - 172938
  • [9] A Process Mining Approach for Supporting IoT Predictive Security
    Hemmer, Adrien
    Badonnel, Remi
    Chrisment, Isabelle
    [J]. NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [10] A business process mining application for internal transaction fraud mitigation
    Jans, Mieke
    van der Werf, Jan Martijn
    Lybaert, Nadine
    Vanhoof, Koen
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (10) : 13351 - 13359