Analyzing business process anomalies using autoencoders

被引:81
作者
Nolle, Timo [1 ]
Luettgen, Stefan [1 ]
Seeliger, Alexander [1 ]
Muehlhaeuser, Max [1 ]
机构
[1] Tech Univ Darmstadt, Telecooperat Lab, Darmstadt, Germany
关键词
Deep learning; Autoencoder; Anomaly detection; Process mining; Business intelligence; NEURAL-NETWORKS; MODELS;
D O I
10.1007/s10994-018-5702-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Businesses are naturally interested in detecting anomalies in their internal processes, because these can be indicators for fraud and inefficiencies. Within the domain of business intelligence, classic anomaly detection is not very frequently researched. In this paper, we propose a method, using autoencoders, for detecting and analyzing anomalies occurring in the execution of a business process. Our method does not rely on any prior knowledge about the process and can be trained on a noisy dataset already containing the anomalies. We demonstrate its effectiveness by evaluating it on 700 different datasets and testing its performance against three state-of-the-art anomaly detection methods. This paper is an extension of our previous work from 2016 (Nolle et al. in Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: International conference on discovery science, Springer, pp 442-456, 2016). Compared to the original publication we have further refined the approach in terms of performance and conducted an elaborate evaluation on more sophisticated datasets including real-life event logs from the Business Process Intelligence Challenges of 2012 and 2017. In our experiments our approach reached an score of 0.72. Furthermore, our approach can be used to analyze the detected anomalies in terms of which event within one execution of the process causes the anomaly.
引用
收藏
页码:1875 / 1893
页数:19
相关论文
共 44 条
[1]  
[Anonymous], 2013, INT C MACHINE LEARNI
[2]  
[Anonymous], ABS15060 CORR
[3]  
[Anonymous], 1996, Proceedings of 1996 IEEE Symposium on Security and Privacy, DOI DOI 10.1109/SECPRI.1996.502675
[4]  
[Anonymous], 2001, Ph.D. Thesis
[5]  
Bahdanau D., 2015, Neural machine translation
[6]   Algorithms for anomaly detection of traces in logs of process aware information systems [J].
Bezerra, Fabio ;
Wainer, Jacques .
INFORMATION SYSTEMS, 2012, 38 (01) :33-44
[7]  
Bezerra F, 2009, LECT NOTES BUS INF P, V29, P149
[8]   Multi-perspective Anomaly Detection in Business Process Execution Events [J].
Boehmer, Kristof ;
Rinderle-Ma, Stefanie .
ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2016 CONFERENCES, 2016, 10033 :80-98
[9]   Anomaly Detection for Discrete Sequences: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (05) :823-839
[10]   Comparative Evaluation of Anomaly Detection Techniques for Sequence Data [J].
Chandola, Varun ;
Mithal, Varun ;
Kumar, Vipin .
ICDM 2008: EIGHTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2008, :743-+