Analyzing business process anomalies using autoencoders

被引:1
作者
Timo Nolle
Stefan Luettgen
Alexander Seeliger
Max Mühlhäuser
机构
[1] Technische Universität Darmstadt,Telecooperation Lab
来源
Machine Learning | 2018年 / 107卷
关键词
Deep learning; Autoencoder; Anomaly detection; Process mining; Business intelligence;
D O I
暂无
中图分类号
学科分类号
摘要
Businesses are naturally interested in detecting anomalies in their internal processes, because these can be indicators for fraud and inefficiencies. Within the domain of business intelligence, classic anomaly detection is not very frequently researched. In this paper, we propose a method, using autoencoders, for detecting and analyzing anomalies occurring in the execution of a business process. Our method does not rely on any prior knowledge about the process and can be trained on a noisy dataset already containing the anomalies. We demonstrate its effectiveness by evaluating it on 700 different datasets and testing its performance against three state-of-the-art anomaly detection methods. This paper is an extension of our previous work from 2016 (Nolle et al. in Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: International conference on discovery science, Springer, pp 442–456, 2016). Compared to the original publication we have further refined the approach in terms of performance and conducted an elaborate evaluation on more sophisticated datasets including real-life event logs from the Business Process Intelligence Challenges of 2012 and 2017. In our experiments our approach reached an F1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$F_1$$\end{document} score of 0.87, whereas the best unaltered state-of-the-art approach reached an F1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$F_1$$\end{document} score of 0.72. Furthermore, our approach can be used to analyze the detected anomalies in terms of which event within one execution of the process causes the anomaly.
引用
收藏
页码:1875 / 1893
页数:18
相关论文
共 61 条
  • [1] Bezerra F(2013)Algorithms for anomaly detection of traces in logs of process aware information systems Information Systems 38 33-44
  • [2] Wainer J(2012)Anomaly detection for discrete sequences: A survey IEEE Transactions on Knowledge and Data Engineering 24 823-839
  • [3] Chandola V(1995)Support-vector networks Machine Learning 20 273-297
  • [4] Banerjee A(2010)Understanding the difficulty of training deep feedforward neural networks Aistats 9 249-256
  • [5] Kumar V(1995)Replicator neural networks for universal optimal source coding Science 269 1861-234
  • [6] Cortes C(1989)Connectionist learning procedures Artificial Intelligence 40 185-122
  • [7] Vapnik V(2001)Supervised versus unsupervised binary-learning by feedforward neural networks Machine Learning 42 97-272
  • [8] Glorot X(1991)Hidden markov models for speech recognition Technometrics 33 251-444
  • [9] Bengio Y(2015)Deep learning Nature 521 436-2830
  • [10] Hecht-Nielsen R(2012)Isolation-based anomaly detection ACM Transactions on Knowledge Discovery from Data (TKDD) 6 3-249