Analyzing business process anomalies using autoencoders

被引:1
作者
Timo Nolle
Stefan Luettgen
Alexander Seeliger
Max Mühlhäuser
机构
[1] Technische Universität Darmstadt,Telecooperation Lab
来源
Machine Learning | 2018年 / 107卷
关键词
Deep learning; Autoencoder; Anomaly detection; Process mining; Business intelligence;
D O I
暂无
中图分类号
学科分类号
摘要
Businesses are naturally interested in detecting anomalies in their internal processes, because these can be indicators for fraud and inefficiencies. Within the domain of business intelligence, classic anomaly detection is not very frequently researched. In this paper, we propose a method, using autoencoders, for detecting and analyzing anomalies occurring in the execution of a business process. Our method does not rely on any prior knowledge about the process and can be trained on a noisy dataset already containing the anomalies. We demonstrate its effectiveness by evaluating it on 700 different datasets and testing its performance against three state-of-the-art anomaly detection methods. This paper is an extension of our previous work from 2016 (Nolle et al. in Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: International conference on discovery science, Springer, pp 442–456, 2016). Compared to the original publication we have further refined the approach in terms of performance and conducted an elaborate evaluation on more sophisticated datasets including real-life event logs from the Business Process Intelligence Challenges of 2012 and 2017. In our experiments our approach reached an F1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$F_1$$\end{document} score of 0.87, whereas the best unaltered state-of-the-art approach reached an F1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$F_1$$\end{document} score of 0.72. Furthermore, our approach can be used to analyze the detected anomalies in terms of which event within one execution of the process causes the anomaly.
引用
收藏
页码:1875 / 1893
页数:18
相关论文
共 61 条
  • [11] Hinton GE(2011)Scikit-learn: Machine learning in Python Journal of Machine Learning Research 12 2825-286
  • [12] Japkowicz N(2014)A review of novelty detection Signal Processing 99 215-16
  • [13] Juang BH(1989)A tutorial on hidden markov models and selected applications in speech recognition Proceedings of the IEEE 77 257-95
  • [14] Rabiner LR(1986)An introduction to hidden markov models IEEE ASSP Magazine 3 4-588
  • [15] LeCun Y(2008)Conformance checking of processes based on monitoring real behavior Information Systems 33 64-1958
  • [16] Bengio Y(1988)Learning representations by back-propagating errors Cognitive Modeling 5 1-1142
  • [17] Hinton G(1999)Support vector method for novelty detection NIPS 12 582-undefined
  • [18] Liu FT(2014)Dropout: A simple way to prevent neural networks from overfitting The Journal of Machine Learning Research 15 1929-undefined
  • [19] Ting KM(2004)Workflow mining: Discovering process models from event logs IEEE Transactions on Knowledge and Data Engineering 16 1128-undefined
  • [20] Zhou ZH(undefined)undefined undefined undefined undefined-undefined